Professor Huang currently serves as Dean and Professor of the School of Internet of Things at Xi’an Jiaotong–Liverpool University (XJTLU).
His prior professional experience includes:
- Chief Scientist, Beijing Academy of Blockchain and Edge Computing (BAEC)
- Research Dean, Donghai Marine Digital Science Research Institute
- Tenured Associate Professor and Assistant Professor at Arizona State University, where he founded and led the Secure Networking and Computing (SNAC) Lab
- Visiting scientist and professor appointments in Japan, France, New Zealand, and China
- Industry experience as a network engineer and research intern in telecommunications and networking organizations
In addition to academic leadership, Professor Huang is an entrepreneur and technology innovator, having co-founded Athena Network Solutions LLC and CyNET LLC, promoting the commercialization of cybersecurity and intelligent computing technologies.
He has mentored 17 PhD graduates and over 26 Master’s students, many of whom now serve as faculty members or technology leaders in industry worldwide.
He has also contributed extensively to professional communities through leadership in IEEE technical committees, editorial boards, and over 40 international conference organizations.
Professor Dijiang Huang’s research focuses on trustworthy intelligent systems and secure distributed computing, particularly for intelligent systems operating across mobile, edge, cloud, and networked infrastructures.
His current research directions include:
- Autonomous cyber defense and AI-driven security analytics
- Trustworthy AI and federated learning systems
- Security architectures for edge–cloud–AIoT environments
- Zero-trust and data-centric security for distributed systems
- Blockchain and distributed system security
- Applied cryptography and secure access control
- AI-enabled anomaly detection and decision-making models
- Secure intelligent systems for real-world infrastructures
His work aims to build secure, resilient, and trustworthy intelligent systems that can operate autonomously and safely in large-scale digital and physical infrastructures.
These research efforts have produced over 200 peer-reviewed publications, three books, and 10 U.S. patents, supported by approximately $25M in competitive research funding from major agencies and industry partners.
Professor Dijiang Huang has extensive experience teaching undergraduate and graduate courses in computer networks, cloud computing, and cybersecurity, integrating research advances and industry practices into the classroom. His teaching emphasizes system-level thinking and project-driven learning, enabling students to connect theory with deployable solutions in networking, cloud platforms, and intelligent system security.
Courses he has developed and delivered include Computer Networks, Network Security, Virtualization and Cloud Computing, and advanced topics in security and distributed systems. Through hands-on projects and practical experimentation, his teaching prepares students to apply modern computing and security technologies to real-world systems and emerging intelligent infrastructures.
Professor Huang has received numerous honors recognizing his contributions to research, education, and innovation, including:
- IEEE Communications Society Distinguished Lecturer
- ONR Young Investigator Program Award
- JSPS Research Fellowship (Japan Society for the Promotion of Science)
- HP Innovation Research Program Award
- Member, National Academy of Inventors (NAI)
- Fulton Entrepreneurial Professor recognition
- Multiple fellowships and international visiting scholar awards
- Teaching excellence and innovation recognitions
- Project and technology innovation awards, including defense innovation and education innovation recognitions
Publications (Peer-reviewed)
Note: Authors who were mentored students at the time of publication are marked in Underlines. Authorship order is based on the level of contribution, except for the last author position, which is typically held by the faculty member who organized and led the project.
The peer-reviewed journal and conference/workshop publications listed below are organized by research area. The list includes only publications from the last 10 years (2015 and onward), reflecting recent advancements and contributions across these domains.
For the full list of publications, please refer to the Google Scholar page.
(The publications below are arranged in chronological order)
A. AI-driven Cybersecurity Research Publications
a. Explainable AI-enabled security research:
- Zeng, Zhen, Dijiang Huang, Guoliang Xue, Yuli Deng, Neha Vadnere, and Liguang Xie. "ILLATION: Improving Vulnerability Risk Prioritization By Learning From Network." IEEE Transactions on Dependable and Secure Computing (2023).
- Zhen Zeng, Zhun Yang, Dijiang Huang, and Chun-Jen Chung “LICALITY – Liklihood vs Criticality: Assessing Vulnerabilities Through Logical Reasoning and Machine Learning Approaches”, IEEE Transactions on Network and System Management, 2022
b. AI/ML-driven security research:
- Alexander Y.C. Huang, Yitao Chen, Dijiang Huang, Ming Zhao, “Semantic Privacy-Preserving for Video Surveillance Services on the Edge” in Proceedings of Trustworthy Edge Computing Workshop, in conjunction with ACM/IEEE Symposium on Edge Computing (SEC), December 2023.
- Myneni, Sowmya, Garima Agrawal, Yuli Deng, Ankur Chowdhary, Neha Vadnere, and Dijiang Huang. "SCVS: On AI and Edge Clouds Enabled Privacy-preserved Smart-city Video Surveillance Services." ACM Transactions on Internet of Things 3, no. 4 (2022): 1-26.
- Sowmya Myneni, Ankur Chowdhary, Dijiang Huang, and Adel Alshamrani, “SmartDefense: A distributed deep defense against DDoS attacks with edge computing”, Computer Networks, 2022
- Adel Alshamrani, Ankur Chowdhary, Dijiang Huang, Sowmya Myneni, and Qussama Mjihil, “Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation”, in proceedings of IEEE Globalcom, Communication Information and System Security (CISS) Symposium, 2018.
- Mirza M. S. Maswood, Md M. I. Mamun, Dijiang Huang, and Deep Medhi, “A Sliding Window Based Monitoring Scheme to Detect and Prevent DDoS Attack in Data Center Networks in a Dynamic Traffic Environment”, in proceedings of 39th Sarnoof Symposium, 2018
- Jin B. Hong, Chun-Jen Chung, Dijiang Huang, and Dong Seong Kim, “Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems”, First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Achieved in Algorithms and Architectures for Parallel Processing, Volume 9532, Lecture Notes in Computer Science, Pages 582-592, December 2015.
c. ML/AI Cybersecurity Datasets
- Myneni, Sowmya, Kritshekhar Jha, Abdulhakim Sabur, Garima Agrawal, Yuli Deng, Ankur Chowdhary, and Dijiang Huang. "Unraveled—A semi-synthetic dataset for Advanced Persistent Threats." Computer Networks 227 (2023): 109688.
- Sowmya Myneni, Ankur Chowdhary, Abdulhakim Sabur, Sailik Sengupta, Garima Agrawal, Dijiang Huang, and Myong Kang, “DAPT 2020 - Constructing a Benchmark Dataset for Advanced Persistent Threats”, in proceedings of the First International Workshop on Deployable Machine Learning for Security Defense (MLHat), in conjunction with ACM KDD, 2020.
d. Moving-Target Defense Research (SDN networking)
- Neha Vadnere, Dijiang Huang, Abdulhakim Sabur, Jim Luo, and Ming Zhao, “Waterfall: Fast Network Flow Rules Checking and Conflict Resolution”, IEEE Transactions on Networking, Vol. 33, Issure 2, pages 881-896, April 2025
- Ankur Chowdhary, Dijiang Huang, Abdulhakim Sabur, Neha Vadnere, Myong Kang and Bruce Montrose, “SDN-based Moving Target Defense using Multi-agent Reinforcement Learning”, in proceedings of the first International Conference on Autonomous Intelligent Cyber-defence Agents (AICA), France, March 2021
- Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Myong Kang, Anya Kim, and Alexander Velazquez, “S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks”, in Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2019.
- Ankur Chowdhary, Dijiang Huang, Gail-Joon Ahn, Myong Kang, Anya Kim, and Alexander Velazquez, “SDNSOC: Object Oriented SDN Framework”, In proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFVSec’19), 2019. (Invited Paper).
- Ankur Chowdhary, Adel Alshamrani, Dijiang Huang, Myong Kang, Anya Kim, and Alexander Velazquez, “TRUFL: Distributed Trust Management framework in SDN”, IEEE ICC 2019.
- Ankur Chowdhary and Dijiang Huang, “SDN based Network Function Parallelism in Cloud”, In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019.
- Adel Alshamrani, Sayantan Guha, Sandeep Pisharody, Ankur Chowdhary, and Dijiang Huang, “Fault Tolerant Controller Placement in Distributed SDN Environments”, in Proceedings of IEEE ICC Communications QoS, Reliability, and Modeling Symposium, 2018.
- Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang, “MTD Analysis and evaluation framework in Software Defined Network (MASON)”, in Proceedings of the ACM SDN/NFV Security Workshop, 2018 (Invited Paper).
- Ankur Chowdhary, Vaibhav Hemant Dixit, Naveen Tiwari, Sukhwa Kyung, Dijiang Huang, and Gail-Joon Ahn, “Science DMZ: SDN based Secured Cloud Testbed”, Demo, IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2017.
- Adel Alshamrani, Ankur Chowdhary, Sandeep Pisharody, Duo Lu, and Dijiang Huang, “A Defense System for Defeating DDoS Attacks in SDN based Networks”, in Proceedings of International Symposium on Mobility Management and Wireless Access (MobiWac), 2017
- Ankur Chowdhary, Sandeep Pisharody, Dijiang Huang “SDN based scalable MTD solution in Cloud Network”, in Proceedings of the ACM Moving Target Defense (MTD) Workshop, in conjunction with ACM CCS, 2016.
- Chun-Jen Chung, Tianyi Xing, Dijiang Huang, Deep Medhi, and Kishor Trivedi, “SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-Tenant Datacenter Environment”, in Proceedings of the Workshop on Dependability Issues on SDN and NFV (DISN), 2015
e. Dynamic Decision Making and Policy Management
- Neha Vadnere, Dijiang Huang, Abdulhakim Sabur, Jim Luo, and Ming Zhao, “Waterfall: Fast Network Flow Rules Checking and Conflict Resolution,” accepted and in press, IEEE Transactions on Networking, 2024.
- Ankur Chowdhary, Abdulhakim Sabur, Neha Vadnere, and Dijiang Huang. "Intent-Driven Security Policy Management for Software-Defined Systems." IEEE Transactions on Network and Service Management, June 16, 2022.
- Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, James Kirby, and Myong Kang, “Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC)”, IEEE Transactions on Dependable and Secure Computing, April 28, 2021.
- Adel Alshamran,Sowmya Myneni,Ankur Chowdhary, and Dijiang Huang, “A Survey of Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities”, IEEE Survey and Tutorials, 2019
- Jin B. Hong, Dong Seong Kim, Chun-Jen Chung, and Dijiang Huang, “A Survey on the Usability and Practical Applications of Graphical Security Models”, Computer Science Review, Elsevier, Jun 2017
- Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, and Subbarao Kambhampati, “General Sum Markov Games for Strategic Detection of Advanced Persistent Threats using Moving Target Defense in Cloud Networks”, in Proceedings of the Conference on Decision and Game Theory for Security (GameSec), 2019
- Ankur Chowdhary, Sailik Sengupta, Dijiang Huang, and Subbarao Kambhampati, “Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks”, in Proceedings of the AAAI-19 Workshop on Artificial Intelligence for Cyber Security (AICS), 2019
- Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang, “SUPC: SDN enabled Universal Policy Checking in Cloud Network”, In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019
- Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, and Abdulhakim Sabur, “Adaptive MTD Security using Markov Game Modeling”, In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019
- Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, and Subbarao Kambhampati, “Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud”, in Proceedings of GameSec, 2018.
- Oussama Mjihil, Dijiang Huang, and Abdelkrim Haqiq. "Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing", in proceedings of the International Symposium on Ubiquitous Networking, Springer, 2017.
- Ankur Chowdhary, Sandeep Pisharody, Adel Alshamrani, and Dijiang Huang, “Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments”, in Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Sec'17), 2017 (Invited Paper).
- Iman El Mir, Ankur Chowdhary, Dijiang Huang, Sandeep Pisharody, Dong Seong Kim and Abdelkrim Haqiq, “Software Defined Stochastic Model for Moving Target Defense”, in Proceedings of Third International Afro-European Conference for Industrial Advancement (AECIA), 2016.
- Sandeep Pisharody, Ankur Chowdhary, and Dijiang Huang, “Security Policy Checking in Distributed SDN based Clouds”, in Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2016.
f. Deep learning-driven Biometrics Research
- Duo Lu, Yuli Deng, and Dijiang Huang, “Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication”, in Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2021.
- Duo Lu, Linzhen Luo, Dijiang Huang, and Yezhou Yang, “FMKit - An In-Air-Handwriting Analysis Library and Data Repository”, in proceedings of the Fourth Workshop on Computer Vision for AR/VR, in conjunction with CVPR 2020.
- Duo Lu and Dijiang Huang, “FMHash: Deep Hashing of In-Air-Handwriting for User Identification”, IEEE ICC 2019.
- Duo Lu and Dijiang Huang, “Multifactor User Authentication with In-Air-Handwriting and Hand Geometry”, in Proceedings of the 11th IAPR International Conference on Biometrics (ICB), 2018.
- Duo Lu and Dijiang Huang, “A Data Driven In-Air-Handwriting Biometric Authentication System”, in Proceedings of the International Joint Conference on Biometrics (IJCB), 2017.
g. Other ML/AI Modeling Techniques and Applications
- Xinyi Liang, Rui Hu, Yu Liu, and Dijiang Huang, “Open-domain Question Answering over Tables with Large Language Models, ” in Proceedings of International Conference on Intelligent Computing (ICIC), August 2024.
- Yin Zhang, Min Chen, Dijiang Huang, Di Wu, Yong Li, "iDoctor: Personalized and Professionalized Medical Recommendations Based on Hybrid Matrix Factorization", Elsevier Future Generation Computer Systems, Pages 30-35, Volume 66 Issue C, January 2017. This paper was selected by Elsevier Article Selection Celebrating Computer Science Research in China (https://www.elsevier.com/physical-sciences/computer-science/article-selection-celebrating-computer-science-research-in-china)
- Zhiyuan Ma, Guangchun Luo, and Dijiang Huang, “Short Term Traffic Flow Prediction Based on On-line Sequential Extreme Learning Machine”, in proceedings of International Conference on Advanced Computational Intelligence, 2016
- Min Chen, Yixue Hao, Yong Li, Di Wu, and Dijiang Huang, “LIVES: Learning through Interactive Video and Emotion-aware System”, ACM MobiHoc, Demo, 2015
B. AI-driven Cybersecurity Education Publications
a. Cybersecurity Education Platform:
- Yuli Deng, Zhen Zeng and Dijiang Huang, “ThoTh Lab: A Web-Based, Virtualized, Adaptive Learning Platform for Cybersecurity Hands-on Projects”, Poster, in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, 2017.
- Dijiang Huang, "ThoTh Lab: Personalized Learning for Cybersecurity Education", Showcase at Reimagine Education Conference, 2017. (ThoTh Lab project won the Reimagine Education 2016 Bronze Award in Engineering/IT Discipline).
b. Cybersecurity Education Learning Models:
- Deng, Yuli, Zhen Zeng, Kritshekhar Jha, and Dijiang Huang. "Problem-Based Cybersecurity Lab with Knowledge Graph as Guidance." Journal of Artificial Intelligence and Technology, 2021.
- Yuli Deng, Duo Lu, Chun-Jen Chung, Dijiang Huang, and Zhen Zeng, “Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education”, in proceedings of IEEE Frontiers in Education Conference (FIE), 2018
- Zhen Zeng, Yuli Deng, IHan Hsiao, Dijiang Huang, and Chun-Jen Chung, “Improving student learning performance in a virtual hands-on lab system in cybersecurity education”, in proceedings of IEEE Frontiers in Education Conference (FIE), 2018
- Zhen Zeng, Yuli Deng, I-Han Hsiao, and Dijiang Huang, “Understanding Students’ Engagement behavior in Virtual Hands-on Lab: Findings from a Computer Network Security Course”, ACM SIGCSE, Poster, 2018
- Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang and Chun-Jen Chung, “Understanding students’ engagement behavior in virtual hands-on lab”, Poster, in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, 2017.
c. Cybersecurity AI-driven Learning Techniques:
- Yuli Deng, Zhen Zeng, and Dijiang Huang “NeoCyberKG: Using an ML-enabled Knowledge Graph for Cybersecurity Education via Hands-on Labs”, in proceedings of the 26th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE), Germany 2021
- Yuli Deng, Duo Lu, Dijiang Huang, Chun-Jen Chung, and Fanjie Lin, “Knowledge Graph based Learning Guidance for Cybersecurity Hands-on Labs” in Proceedings of ACM Global Computing Education Conference (CompEd), May 2019.
- Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang and Chun-Jen Chung, “Predicting learning outcome in virtual hands-on lab system: The role of student attitude”, Poster, in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, 2017.
- Yuli Deng, Dijiang Huang, and Chun-Jen Chung, “Adaptive Learning Framework in ThoTh Lab, a Virtual E-Learning Platform for CS Hands-on Projects”, Poster, SIGCSE 2017.
C. Applied Cryptography and Its Applications Research Publications
- Zhu, Yan, Ruyun Yu, E. Chen, and Dijiang Huang. "An Efficient Broadcast Encryption Supporting Designation and Revocation Mechanisms." Chinese Journal of Electronics 28, no. 3, pages 445-456, 2019
- Yan Zhu, Ruyun Yu, E. Chen, and Dijiang Huang, “Dual-mode broadcast encryption”, Science China Information Sciences, 2018.
- Yan Zhu, Guohua Gan, Ruiqi Guo, and Dijiang Huang, "PHE: An Efficient Tracing and Revoking for Traitors in Cloud File Syncing-and-Sharing", IEEE Transactions on Cloud Computing, Volume 6, Issue 4, Pages 1110-1124, Oct-Dec, 2018.
- Jim Luo, Qiuxiang Dong, Dijiang Huang, and Myong Kang, “Attribute Based Encryption for Information Sharing on Tactical Mobile Networks”, IEEE Milcom 2018.
- Qiuxiang Dong,Dijiang Huang, Jim Luo, Myong Kang, "Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data", in proceedings of the 4th IEEE Workshop on Security and Privacy in the Cloud (SPC), in conjunction with IEEE CNS, 2018
- Qiuxiang Dong and Dijiang Huang, “Privacy-preserving Matchmaking in Geosocial Networks with Untrusted Servers”, in Proceedings of the 37th IEEE International Conference on Distributed Computing systems (ICDCS), Poster, 2017.
- Bing Li, Dijiang Huang, Zhijie Wang, and Yan Zhu, “Attribute-based Access Control for ICN Naming Scheme”, IEEE Transactions on Dependable and Secure Computing, April 2016
- Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, and Chun-Jen Chung, “Efficient Attribute-Based Comparable Data Access Control”, IEEE Transactions on Computers, Vol 64, Issue 12, Pages 3430-3443, February 2015.
- Yan Zhu, Dijiang Huang, Xin Wang, and Changjun Hu, “From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services”, IEEE Transactions on Service Computing, Vol 8, Issue 4, pages 601-616, August 2015
- Zhibin Zhou, Dijiang Huang, and Zhijie Wang, "Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption", IEEE Transactions on Computers, Vol 64, Issue 1, pages 126-138, January, 2015.
D. Network and Cloud System Security Research Publications
- Sabur, Abdulhakim, Ankur Chowdhary, Dijiang Huang, and Adel Alshamrani. "Toward scalable graph-based security analysis for cloud networks." Computer Networks 206 (2022): 108795.
- Safaa Mahrach, Iman EL MIR, Abdelkrim HAQIQ, Dijiang Huang, “SDN-based SYN Flooding Defense in Cloud”, Journal of Information Assurance & Security, Vol. 13, Issue 1, pages 30-39, 2018.
- Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, and Dijiang Huang, "Beyond Dynamic Programming: Performance Evaluation and Enhancement of Multi-tenant Cloud Infrastructures." Journal of Information Assurance & Security, Vol. 13, Issue 1, pages 21-29, 2018.
- Dijiang Huang, Chun-Jen Chung, Qiuxiang Dong, Jim Lou, Myong Kang, “Building Private Blockchains over Public Blockchains (PoP): An Attribute-Based Access Control Approach”, in Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (SAC), DAPP - Decentralized Applications with Blockchain, DLT and Crypto-Currencies, 2019.
- Abdullah Alshalan and Dijiang Huang, “Prompt Lightweight VPN Session Resumption for Rapid Client Mobility and MTD Enablement for VPN Servers”, in Proceedings of IEEE ICC Communication and Information Systems Security Symposium, 2018.
- J. Aikat (RENCI/UNC Chapel Hill), I. Baldin (RENCI/UNC Chapel Hill), M. Berman (BBN/Raytheon), J. Breen (Utah), R. rooks (Clemson), P. Calyam (Missouri), J. Chase (Duke), W. Chase (Clemson), R. Clark (Georgia Tech), C. Elliott (BBN/Raytheon), J. Griffioen (Kentucky), D. Huang (ASU), J. Ibarra (FIU), T. Lehman (Maryland), I. Monga (ESnet), A. Matta (Boston University), C. Papadopoulos (Colorado State), M. Reiter (UNC Chapel Hill), D. Raychaudhuri (Rutgers), G. Ricart (US Ignite), R. Ricci (Utah), P. Ruth (RENCI/UNC Chapel Hill), I. Seskar (Rutgers), J. Sobieski (NORDUnet/GEANT), K. Van der Merwe (Utah), K.-C.Wang (Clemson), T. Wolf (UMass), and M. Zink (UMass), “The Future of CISE Distributed Research Infrastructure”, Position white paper (https://arxiv.org/abs/1803.09886) for NSF and a refined version was published at ACM Computer Communication Review (CCR), 2018
- Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, and Dijiang Huang, “"Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming." In proceedings of the International Conference on Innovations in Bio-Inspired Computing and Applications. 2017.
E. Mobile Computing, IoT, Blockchain Research Publications
- Adrienne J. Raglin, Dijiang Huang, Huan Liu, and James McCabe, “Smart CCR IoT: Internet of Things Testbed”, in Proceedings of the 5th IEEE Internation Conference on Collaboration and Internet Computing (CIC), Dec 12-14, Los Angeles, 2019.
- Jiayue Li, Tracy Cheng, Xiaohua Jia, and Dijiang Huang, “Partially Overlapped Channel Detection in Heterogeneous Cognitive Networks”, IEEE WCNC 2019.
- Zhijie Wang and Dijiang Huang, “Privacy-Preserving Mobile Crowd Sensing in Ad Hoc Networks”, Elsevier Ad Hoc Networks, Pages 14-26, Volume 73, NO. 1, May 2018.
- Bo Li, Yijian Pei, Hao Wu, Dijiang Huang, “MADM-based smart parking guidance algorithm”, PLOS one, Issue 12, NO. 12, 2017.
- Lu, Duo and Li, Zhichao and Huang, Dijiang, “Platooning as a service of autonomous vehicles”, in Proceedings of IEEE 18th International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2017
- Duo Lu, Dijiang Huang, Andrew Walenstein, and Deep Medhi, “A Secure Microservice Framework for IoT”, in Proceedings of IEEE Service Oriented Software Engineering (SOSE), 2017 (Invited Paper).
- Duo Lu, Zhichao Li, and Dijiang Huang, Xianglong Lu, Yuli Deng, Ankur Chowdhary, and Bing Li, “VC-bots: A Vehicular Cloud Computing Testbed with Mobile Robots”, in Proceedings of ACM MobiHoc Workshop on Internet of Vehicles and Vehicles of Internet (IoV-VoI), 2016.
- Abdullah Alshalan, Sandeep Pisharody, and Dijiang Huang, “MobiVPN: A Mobile VPN Providing Persistency To Applications”, in Proceedings of 2016 International Conference on Computing, Networking and Communications, Wireless Networks (ICNC), 2016.
- Abdullah Alshalan, Sandeep Pisharody, and Dijiang Huang, “A Survey of Mobile VPN Technologies”, IEEE Communications Surveys and Tutorials, Vol PP, Issue 99, November 2015
- Huijun Wu, Dijiang Huang, and Yan Zhu, “Establishing a personal on-demand execution environment for mobile cloud applications,” Springer Journal on Mobile Networks and Applications (MONET), Volume 20, Number 3, pp. 297–307, June, 2015.
- Huijun Wu and Dijiang Huang, “POEM: On Establishing A Personal On-demand Execution Environment for Mobile Cloud Applications” in Proceedings of the IEEE 4th International Conference on Mobile Services (IEEE MS), pages 41-48, 2015
- Huijun Wu and Dijiang Huang, “MoSeC: Mobile-Cloud Service Composition”, in Proceedings of the 3rd International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015.
F. Patents
- Dijiang Huang, Jim Luo, Myong Hoon Kang, Qiuxiang Dong, Method and apparatus for achieving fine-grained access control with discretionary user revocation over cloud data, U.S. Patent # U.S 11,310,041, Issued on April 19, 2022
- Lu, Duo, and Dijiang Huang. "Systems and methods for a multifactor user identification and authentication framework for in-air-handwriting with hand geometry and deep hashing." U.S. Patent 11,120,255, issued September 14, 2021.
- Dijiang Huang, Duo Lu, “Three-Dimensional In-the-air Motion Based User Login Framework”, U.S. Patent # U.S 10,877,568, Issued on December 29, 2020
- Dijiang Huang, Ankur Chowdhary, and Sandeep Pishoardy, “Security policy analysis framework for distributed software defined networking (SDN) based cloud environments”, U.S. Patent # U.S 10,868,737, Issued on December 15, 2020
- Dijiang Huang, “Systems and Apparatuses for a Secure Mobile Cloud Framework for Mobile Computing and Communication”, U.S. Patent # U.S 10,425,411, Issued on September 24, 2019
- Dijiang Huang and Zhijie Wang, "Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds", U.S. Patent # 10,419,404, Issued on September 17, 2019.
- Dijiang Huang and Zhijie Wang, "Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds", U.S. Patent # 9,705,850, Issued on July 11, 2017.
- Dijiang Huang, “Systems and Apparatuses for a Secure Mobile Cloud Framework for Mobile Computing and Communication”, U.S. Patent # 9,357,331, Issued on May 31, 2016.
- Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang, "Selection of a countermeasure” (Based on our original work “Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems”), U.S. Patent # 9,160,761, Issue date: October 13, 2015.
- Dijiang Huang and Zhibin Zhou, “Methods, Systems, and Apparatuses for Optimal Group Key Management for Secure Multicast Communication”, U.S. Patent # 8,837,738, Issue date: September 16, 2014.
G. Tutorials
- “Moving Target Defense (MTD): A Software Defined Networking (SDN) Approach”, IEEE International Conference on Communications (ICC), Kansas City, 2018
- "Enhancing Cloud Security Through Software Defined Networking Approaches", IEEE International Conference on Cloud Networking (CloudNet), Paris, Nov 2012
- "Enhancing Cloud Security Through Software Defined Networking Approaches", International Conference on Network and Service Management (CNSM), Las Vegas, Oct 2012
- "Mobile Cloud Computing", IEEE International Conference on Consumer Electronics (ICCE), January 13, 2012, Las Vegas, USA
- “Elliptic & Curve Cryptography and Their Applications,” The Fourth IASTED International Conference on Communication, Network, and Information Security (CNIS) 2007, September 24-26, 2007, UC Berkeley, Berkeley, California, USA
H. Published Books
- Dijiang Huang, Qiuxiang Dong, and Yan Zhu, “Attribute-Based Encryption and Access Control”, CRC Press, Publishing Date: February 25, 2020.
- Dijiang Huang, Ankur Chowdhary, and Sandeep Pishoardy, “Software-Defined Networking And Security: From Theory to Practice”, CRC Press, Dec 2018. (published with educational materials)
- Dijiang Huang and Huijun Wu, “Mobile Cloud Computing: Foundations and Service Models”, Morgan Kaufmann Publishers (An imprint of Elsevier Science), Publishing date: September 22, 2017.
- Dijiang Huang and SNAC Research Group, "ThoTh Lab: Cyber Security Lab Manuel", online, 2020.
I. Book Chapters
(Book chapters #1, #2, and #3 are selected through open call for book chapter and book chapter #4 is invited.)
- Tianyi Xing, Zhenyang Xiong, Dijiang Huang, Deep Medhi, “Cloud Computing Security”, Cloud Services, Networking and Management, (Eds) N. Fonseca and R. Boutaba, IEEE and Wiley, page 269-294, 2014.
- Nirav Shah and Dijiang Huang, “DRP: Data Regulation Protocol for Source-End Mitgation of Distributed Denial of Service,” Network Security, Administration and Management: Advancing Technologies and Practices, D. C. Kar and M. R. Syed (Eds), IGI Global, 2010
- Dijiang Huang and Zhibin Zhou, “A Secure RFID Access Control Mechanism,”
Security in RFID and Sensor Networks, Y. Zhang, P. Kitsos (Eds), Auerbach Publications, CRC Press, Taylor and Francis Group, 2008 - Dijiang Huang, “Secure Multi-Path Data Delivery in Wireless Sensor Networks,”
Wireless and Sensor Networks Security, Z. Jiang, Y. Pan (Eds), Nova Science Publishers, Inc. 2008. - Deep Medhi and Dijiang Huang, “Secure and Resilient Routing: A Framework for Resilient Network Architectures,” Information Assurance: Dependability and Security in Networked Systems, Y. Qian, D. Tipper, P. Krishnamurthy, and J. Joshi, (Eds.), Morgan Kaufmann Publishers (an imprint of Elsevier), 2007.