Selected Publications and Presentations
- Book
- C.-T. Huang, M. G. Gouda, Hop Integrity in the
Internet, Springer, December 2005.
- R. Falk, C.-T. Huang, F. Kohlmayer, A.-F. Sui, "Security in Wireless
Mesh Networks," book chapter of Wireless Mesh Networking:
Architectures, Protocols and Standards, Auerbach
Publications and CRC Press, December 2006.
- C.-T. Huang, "Hop Integrity in Wireless
Mesh Networks," book chapter of Security in Wireless Mesh
Networks, Auerbach
Publications and CRC Press, July 2008.
- Journal Publications
-
Q. Zeng, L. Luo, Z. Qian, X. Du, Z. Li, C.-T. Huang, C. Farkas, "Resilient
User-Side Android Application Repackaging and Tampering Detection Using
Cryptographically Obfuscated Logic Bombs," IEEE Transactions on
Dependable and Secure Computing, Vol. 18, No. 6, pp. 2582-2600, 1
Nov.-Dec. 2021.
-
J.-R. Sun, C.-T. Huang, M.-S. Hwang, "A SYN Flooding Attack Detection Approach
with Hierarchical Policies Based on Self-information," ETRI Journal,
in press, July 2021.
-
C.-T. Huang, M. Sakib, C. Kamhoua, K. Kwiat, L. Njilla, "A Bayesian Game
Theoretic Approach for Inspecting Web-based Malvertising," IEEE
Transactions on Dependable and Secure Computing, Vol. 17, No. 6, pp.
1257-1268, 1 Nov.-Dec. 2020.
-
M. Sakib, C.-T. Huang, Y.-D. Lin, "Maximizing Accuracy in Multi-Scanner
Malware Detection Systems," Computer Networks, Vol. 169, March 2020.
-
X. He, J. Liu, C.-T. Huang, D. Wang, B. Meng, "A Security Analysis Method of
Security Protocol Implementation Based on Unpurified Security Protocol Trace
and Security Protocol Implementation Ontology," IEEE Access, Vol. 7,
2019, September 2019.
-
J. Lu, L. Yao, X. He, C.-T. Huang, D. Wang, B. Meng, "A Security Analysis
Method for Security Protocol Implementations Based on Message Construction,"
Applied Sciences, Section on Computer Science and Electrical Engineering,
2018.
-
A. Rajab, C.-T. Huang, M. Al-Shargabi, "Decision tree rule learning approach
to counter burst header packet flooding attack in optical burst switching
network," Optical Switching and Networking, Vol. 29, pp. 15-26, July
2018.
-
S. M. Jang, T. Geng, J.-Y. Li, R. Xia, C.-T. Huang, H. Kim, J. Tang, "A
computational approach for examining the roots and spreading patterns of
fake news: Evolution tree analysis," Computers in Human Behavior, No.
84, 2018, pp. 103-113.
-
H. Gebre-Amlak, A. Jabbari, Y. Chen, B.-Y. Choi, C.-T. Huang, S. Song, "Agile
Polymorphic Software-Defined Fog Computing Platform for Mobile Wireless
Controllers and Sensors," International Journal of Internet Technology
and Secured Transactions, in press, 2017.
-
B. Meng, C.-T. Huang, Y. Yang, L. Niu, D. Wang, "Automatic Generation of
Security Protocol Implementations Written in Java from Abstract
Specifications Proved in the Computational Model," International Journal
of Network Security, Vol. 19, No. 1, January 2017, pp. 138-153.
-
J. Cobb, C.-T. Huang, "Stabilizing Breach-Free Sensor Barriers,"
International Journal on Advances in Security, Vol. 9, No. 3&4, 2016,
pp. 133-145.
-
J. Huang, C.-T. Huang, "Design and Verification of Secure Mutual
Authentication Protocols for Mobile Multihop Relay WiMAX Networks against
Rogue Base/Relay Stations," Journal of Electrical and Computer
Engineering, Vol. 2016, 2016, 12 pages, doi:10.1155/2016/9859830
-
J. Gerdes, Jr., C.-T. Huang, M. Sharaf, "Incorporating biometrics into veiled
certificates: preventing unauthorized use of anonymous certificates,"
Electronic Commerce Research, April 2016, pp. 1-28,
doi:10.1007/s10660-016-9222-y
-
M. Sakib, J. Tang, W. J. Zheng, C.-T. Huang, "Improving Transmission
Efficiency of Large Sequence Alignment/Map (SAM) Files", PLoS ONE,
Vol. 6, Issue 12, December 2011, e28251.
-
Y. Xian, C.-T. Huang, J. Cobb, "Look-Ahead Routing and Message
Scheduling in Delay-Tolerant Networks", Computer Communications,
Vol. 34, No. 18, 2011, pp. 2184-2194.
-
Y. Choi, C.-T. Huang, M. Gouda, "Stabilization of Flood Sequencing
Protocols in Sensor Networks", IEEE Transactions on
Parallel and Distributed Systems, Vol. 21, No. 7, 2010, pp. 1042-1055.
-
C.-T. Huang, J. Janies, "An Adaptive Approach to Granular Real-Time
Anomaly Detection", EURASIP Journal on Advances in Signal
Processing, Vol. 2009, 2009.
-
J. Gerdes, Jr., J. Kalvenes, C.-T. Huang, "Multi-Dimensional Credentialing Using Veiled Certificates: Protecting Privacy in the Face of Regulatory Reporting Requirements ", Computers & Security,
Vol. 28, No. 5, 2009, pp. 248-259.
-
Y. Kopylova, D. Buell, C.-T. Huang, J. Janies, "Mutual Information
Applied to Anomaly Detection", Journal of Communications
and Networks, Vol. 10, No. 1, 2008, pp. 89-97.
-
S. Xu, C.-T. Huang, M. Matthews, "Secure Multimast in WiMAX
", Journal of Networks
, Vol. 3, No. 2, 2008, pp. 48-57.
-
C.-T. Huang, S. Thareja, Y.-J. Shin, "Wavelet-based
Real Time Detection of Network Traffic Anomalies",
International Journal of Network Security, Vol. 6, No. 3, 2008, pp.
309-320.
-
C.-T. Huang, M. Matthews, M. Ginley, X. Zheng, C. Chen, J. Chang,
"Efficient and Secure Multicast in
WirelessMAN: A Cross-layer
Design", Journal of Communications Software and Systems, Vol.
3, No. 3, 2007, pp. 199-206.
-
J. Janies, C.-T. Huang, N. L. Johnson, T. Richardson, "SUMP: A Secure Unicast
Messaging Protocol for Wireless Ad Hoc Sensor Networks", International Journal of Sensor Networks,
Vol. 2, Issue 5/6, 2007.
-
C.-T. Huang, M. G. Gouda, E. N. Elnozahy, "Convergence of IPsec in Presence of Resets", Journal of High Speed Networks,
Vol. 15, No. 2, 2006.
-
M. G. Gouda, C.-T. Huang, "A Secure Address Resolution Protocol", Computer Networks, Vol. 41, No. 1, January 2003. The full version with BAN logic proof is available here.
-
M. G. Gouda, E. N. Elnozahy, C.-T. Huang, T. M. McGuire, "Hop Integrity in Computer Networks", IEEE/ACM Transactions on Networking, Volume 10, Issue 3, June 2002.
- Conference Publications
- E. M. Abuhdima, G. Comert, P. Pisu, C.-T. Huang, A. Elqaouaq, C. Zhao, S.
Alston, K. Ambrose, J. Liu, "The effect of Dust and Sand on the 5G
Millimetre-Wave links," Proceedings of 9th Annual IEEE International
Conference on Wireless for Space and Extreme Environments (WISEE 2021),
October 2021.
- J. Liu, C.-T. Huang, "Efficient and Trustworthy
Authentication in 5G Networks Based on Blockchain," Proceedings of 2021
IEEE International Conference on Computer Communication Networks (ICCCN
2021), July 2021.
- T. Geng, L. Njilla, C.-T. Huang, "Smart Markers in
Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for
Decentralized Runtime Verification," Proceedings of the 2021 IEEE
Conference on Dependable and Secure Computing (DSC 2021), January 2021.
-
C.-T. Huang, L. Njilla, T. Geng, "Detecting Counterfeit ICs with Blockchain-based
Verification Framework," Proceedings of 2020 IEEE International Smart
Cities Conference (ISC2), September 2020.
- T. Geng, H. Alsuwat, C.-T.
Huang, C. Farkas, "Securing Relational Database Storage with Attribute
Association Aware Shuffling," Proceedings of 2019 IEEE Conference on
Dependable and Secure Computing (DSC 2019), November 2019.
- C.-T.
Huang, L. Njilla, T. Geng, "Consensus of Whom? A Spectrum of Blockchain
Consensus Protocols and New Directions," Proceedings of 2019 IEEE
International Smart Cities Conference (ISC2), October 2019.
- H.
Alsuwat, T. Geng, C.-T. Huang, C. Farkas, "Can Shuffling Algorithms Preserve
Database Dependencies?" Proceedings of 2nd International Conference on
Data Intelligence and Security (ICDIS 2019), June 2019.
- J. Crichigno,
E. Kfoury, E. Bou-Harb, N. Ghani, Y. Prieto, C. Vega, J. Pezoa, C.-T. Huang,
D. Torres, "A Flow-based Entropy Characterization of a NATed Network and its
Application on Intrusion Detection," Proceedings of 2019 IEEE
International Conference on Communications (ICC 2019), May 2019.
- H.
Gulati, C.-T. Huang, "Self-Sovereign Dynamic Digital Identities based on
Blockchain Technology," Proceedings of IEEE SoutheastCon 2019, April
2019.
- C.-T. Huang, M. Sakib, L. Njilla, C. Kamhoua, "A Game Theoretic
Approach for Making IoT Device Connectivity Decisions During Malware
Outbreak," Proceedings of 2019 International Conference on Computing,
Networking and Communications (ICNC), February 2019.
- T. Geng, C.-T.
Huang, "Blockchain-inspired Framework for Runtime Verification of IoT
Ecosystem Task Fulfillment," Proceedings of 2018 IEEE International Smart
Cities Conference (ISC2), September 2018.
- N. Alkassab, C.-T. Huang, Y. Chen, B.-Y. Choi, S. Song, "Benefits and
Schemes of Prefetching from Cloud to Fog Networks," Proceedings of 2017
IEEE International Conference on Cloud Networking (CloudNet 2017),
September 2017.
- K. Ravindran, C.-T. Huang, "Probabilistic Treatment of
Service Assurance in Distributed Information Systems," Proceedings of
2017 IEEE International Conference on Distributed and Secure Computing
(DSC 2017), August 2017.
- C.-T. Huang, M. Sakib, C. Kamhoua, K. Kwiat, L. Njilla, "A Game
Theoretic Approach for Inspecting Web-based Malvertising," Proceedings of
IEEE 2017 Conference on Communications (ICC 2017), May 2017.
- H. Gebre-Amlak, S. Lee, A. Jabbari, Y. Chen, B.-Y. Choi, C.-T. Huang, S.
Song, "MIST: Mobility-Inspired SofTware-Defined Fog System," Proceedings
of 2017 IEEE International Conference on Consumer Electronics (ICCE
2017), January 2017.
- M. Sakib, C.-T. Huang, "Privacy Preserving Proximity Testing Using
Elliptic Curves," Proceedings of 2016 International Telecommunication
Networks and Applications Conference (ITNAC 2016), December 2016.
- S. Malebary, W. Xu, C.-T. Huang, "Jamming Mobility in 802.11p networks:
Modeling, evaluation, and detection," Proceedings of IEEE 35th
International Performance Computing and Communications Conference (IPCCC
2016), Las Vegas, NV, December 2016.
- A. Rajab, C.-T. Huang, M. Al-Shargabi, J. Cobb, "Countering Burst Header
Packet Flooding Attack in Optical Burst Switching Network," Proceedings
of 12th International Conference on Information Security Practice and
Experience (ISPEC 2016), November 2016.
- M. Sakib, C.-T. Huang, "Using Anomaly Detection Based Techniques to
Detect HTTP-based Botnet C&C Traffic," Proceedings of IEEE 2016
Conference on Communications (ICC 2016), May 2016.
- J. Cobb, C.-T. Huang, "Fault-Tolerant Breach-Free Sensor Barriers,"
Proceedings of the 10th International Conference on Systems and Networks
Communications (ICSNC 2015), November 2015.
- M. Sakib, C.-T. Huang, "Automated Collection and Analysis of Malware
Disseminated via Online Advertising," Proceedings of the 2nd
International Workshop on the Emerging Future Internet and Network Security
(EFINS 2015), August 2015.
- F. Li, C.-T. Huang, J. Huang, W. Peng, "Feedback-based Smartphone
Strategic Sampling for BYOD Security," Proceedings of 23rd IEEE
International Conference on Computer Communication Networks (ICCCN
2014), August 2014.
- M. Sakib, J. Halim, C.-T. Huang, "Determining Location and Movement
Pattern Using Anonymized WiFi Access Point BSSID," Proceedings of 7th
International Conference on Security Technology (SecTech 2014), 2014.
- W. Peng, F. Li, C.-T. Huang, X. Zou, "A Moving-target Defense Strategy
for Cloud-based Services with Heterogeneous and Dynamic Attack Surfaces,"
Proceedings of IEEE 2014 Conference on Communications (ICC 2014), June
2014.
- M. Sharaf, J. Huang, C.-T. Huang, "Using Bytecode Instrumentation to
Secure Information Flow in Multithreaded Java Applications," Proceedings
of ICDCS Workshops 2013, July 2013.
- F. Li, W. Peng, C.-T. Huang, X. Zou, "Smartphone strategic sampling in
defending enterprise network security," Proceedings of IEEE 2013
Conference on Communications (ICC 2013), June 2013.
- H. Park, S. Song, B.-Y. Choi, C.-T. Huang, "PASSAGES: Preserving
Anonymity of Sources and Sinks against Global Eavesdroppers," Proceedings
of IEEE INFOCOM 2013, April 2013.
- M. Sakib, C.-T. Huang, "Textact: A Text-Action based Web Authentication
Scheme", Proceedings of 55th Annual IEEE Global Telecommunications
Conference (GLOBECOM 2012), December 2012.
- J. Huang, M. Sharaf, C.-T.
Huang, "A Hierarchical Framework for Secure and Scalable EHR Sharing and
Access Control in Multi-Cloud", Proceedings of 4th International Workshop
on Security in Cloud Computing (CloudSec 2012), September 2012.
- J.
Huang, C.-T. Huang, "A Secure and Efficient Multi-Device and Multi-Service
Authentication Protocol (SEMMAP) for 3GPP-LTE Networks", Proceedings of
21st IEEE International Conference on Computer Communication Networks (ICCCN
2012), July 2012.
- C.-T. Huang, V. Gupta, "Modeling and Automating
Analysis of Server Duty and Client Obligation for High Assurance",
Proceedings of 11th International Workshop on Assurance in Distributed
Systems and Networks (ADSN 2012), June 2012.
- C.-T. Huang, K. J. Han,
J. Perretta, "Automatic Selection of Routers for Placing Early Filters of
Malicious Traffic", Proceedings of 54th Annual IEEE Global
Telecommunications Conference (GLOBECOM 2011), December 2011.
- J. Huang, C.-T. Huang, "Secure Mutual Authentication Protocols for Mobile
Multi-hop Relay WiMAX Networks", Proceedings
of IEEE International Conference on Communications
2011 (ICC 2011).
- Y. Xian, C.-T. Huang, J. Cobb, "Look-Ahead Routing and Message
Scheduling in Delay-Tolerant Networks", Proceedings of 35th IEEE International Conference on
Local Computer Networks (LCN 2010), October 2010.
- J. Gerdes, Jr., C.-T. Huang, "Incorporating Biometrics into Veiled
Certificates", accepted by Identity in the Information Society
Workshop 2010 (IDIS 2010).
- C.-T. Huang, D. Chuck, J. Chang, "Analysis and Enhancement of
Bandwidth Request Strategies in IEEE 802.16 Networks", Proceedings
of IEEE International Conference on Communications
2010 (ICC 2010).
- P. Kalakota, C.-T. Huang, "On the Benefits of Early Filtering of
Botnet Unwanted Traffic", Proceedings of 18th IEEE International
Conference on Computer Communications and Networks (ICCCN 2009), August
2009.
- M. Jafari-Lafti, C.-T. Huang, C. Farkas, "P2F: A
User-Centric Privacy Protection Framework", Proceedings of the
Fourth International Conference on Availability, Reliability and Security
(ARES 2009), March 2009.
- S. Xu, C.-T. Huang, M. M. Matthews, "Modeling and Analysis of
IEEE 802.16 PKM Protocols using CasperFDR", Proceedings of the 5th IEEE
International Symposium on Wireless Communication Systems (ISWCS 2008),
October 2008.
- C.-T. Huang, "LOFT: Low-Overhead Freshness Transmission in Sensor
Networks", Proceedings of 2008 IEEE International Conference on
Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC 2008), June
2008.
- C.-T. Huang, P. Kalakota, A. B. Alexandrov, "Improving Availability
with Adaptive Roaming Replicas in Presence of Determined DoS Attacks",
Proceedings of 50th Annual IEEE Global Telecommunications Conference (GLOBECOM
2007), November 2007.
- Y. Xian, C.-T. Huang, "Securing VoIP Services in Multi-Hop Wireless
Mesh Networks", Proceedings of 4th IEEE International Symposium on
Wireless Communication Systems (ISWCS 2007), October 2007.
- J. Janies, C.-T. Huang, "Fates: A Granular Approach to Real-Time
Anomaly Detection", Proceedings of 16th IEEE International Conference
on Computer Communications and Networks (ICCCN 2007), August 2007.
- T. Richardson, C.-T. Huang, "Containing
Hitlist-Based Worms with
Polymorphic Signatures", Proceedings of 16th IEEE International Conference
on Computer Communications and Networks (ICCCN 2007), August 2007.
- X. Zheng, M. M. Matthews, C.-T. Huang, "Hierarchical Scalable Group
Key Management Based on Chinese Remainder Theorem", Proceedings of
the 6th Annual Security Conference, April 2007.
- S. Xu, C.-T. Huang, M. M. Matthews, "Secure Multicast in Various
Scenarios of WirelessMAN", Proceedings of the 2007 IEEE Southeast
Conference, March 2007.
- X. Zheng, C.-T. Huang, M. M. Matthews, "Chinese Remainder Theorem
Based Group Key Management", Proceedings of the 45th ACM Southeast
Conference (ACMSE 2007), March 2007.
- M. Ginley, S. Xu, C.-T. Huang, M. M. Matthews, "Efficient and Secure
Multicast in WirelessMAN", Proceedings of International Symposium on
Wireless Pervasive Computing 2007 (ISWPC2007), February 2007.
- M. G. Gouda, J. Cobb, C.-T. Huang, "Fault Masking in Tri-Redundant Systems",
Proceedings of the 8th International Symposium on Stabilization, Safety, and
Security of Distributed Systems (SSS 2006), November 2006.
- C.-T. Huang, A. B. Alexandrov, P. Kalakota, "Roaming Data Redundancy
for Assurance in Critical Data Services", Proceedings of the 2006 High
Availability and Performance Computing Workshop (HAPCW 2006), in conjunction
with the 2006 Los Alamos Computer Science Institute Symposium 2006
(LACSI2006), October 2006.
- S. Xu, C.-T. Huang, "Attacks on PKM Protocols of IEEE 802.16 and Its
Later Versions", Proceedings of 3rd International Symposium on Wireless Communication Systems
(ISWCS 2006), September 2006.
- C.-T. Huang, S. Thareja, Y.-J. Shin, "Wavelet-based
Real Time Detection of Network Traffic Anomalies", Proceedings
of Workshop on Enterprise Network Security (WENS 2006) (in assoc. with
Second SecureComm), August 2006.
- J. Janies, C.-T. Huang, N. L. Johnson, "SUMP: A Secure Unicast
Messaging Protocol for Wireless Ad Hoc Sensor Networks", Proceedings
of IEEE International Conference on Communications 2006 (ICC 2006), June 2006.
- C.-T. Huang, N. L. Johnson, J. Janies, A. X. Liu, "On Capturing and
Containing E-mail Worms", Proceedings of the 25th IEEE International Performance
Computing and Communications Conference (IPCCC 2006), April 2006.
- S. Xu, M. M. Matthews, C.-T. Huang, "Security Issues in Privacy and Key
Management Protocols of IEEE 802.16", Proceedings of the 44th ACM Southeast
Conference (ACMSE 2006), March 2006.
- A. X. Liu, J. Kovacs, C.-T. Huang, M. G. Gouda, "A Secure Cookie
Protocol for HTTP", Proceedings of the 14th International Conference
on Computer and Communications and Networks (ICCCN 2005), October 2005.
- X. Zheng, C. Chen, C.-T. Huang, M. M. Matthews, N. Santhapuri, "A Dual Authentication Protocol for IEEE 802.11
Wireless LANs", Proceedings of the 2nd International Symposium on Wireless Communication Systems
(ISWCS 2005), September 2005.
- C.-T. Huang, M. G. Gouda, "State
Checksum and Its Role in System Stabilization", Proceedings of the 4th International Workshop on Assurance in Distributed Systems and Networks
(ADSN 2005),
Columbus, Ohio, June 2005.
- C.-T. Huang, M. G. Gouda, E. N. Elnozahy, "Convergence of IPsec in Presence of Resets", Proceedings of the 2nd International Workshop on Assurance in Distributed Systems and Networks
(ADSN 2003), Providence, Rhode Island, May 2003.
- M. G. Gouda, E. N. Elnozahy, C.-T. Huang, T. M. McGuire, "Hop Integrity in Computer Networks",
Proceedings of the 8th IEEE International Conference on Network Protocols (ICNP
2000), Osaka, Japan, November 2000.
- M. G. Gouda, C.-T. Huang, E. N. Elnozahy, "Key Trees and the Security of Interval Multicast", Proceedings of the 22nd International Conference on Distributed Computing Systems
(ICDCS 2002), Vienna, Austria, July 2002.
- C.-T. Huang, M. G. Gouda, "An Anti-Replay Window Protocol with Controlled Shift", Proceedings of the 10th IEEE International Conference on Computer Communications and Networks
(ICCCN 2001), Scottsdale, October 2001.
- M. G. Gouda, C.-T. Huang, A. Arora, "On the Security and Vulnerability of PING", Proceedings of the 5th International Workshop on Self-Stabilizing Systems
(WSS 2001), October 2001.
- M. G. Gouda, C.-T. Huang, E. Li, "Anti-Replay Window Protocols for Secure IP", Proceedings of the 9th IEEE International Conference on Computer Communications and Networks
(ICCCN 2000), Las Vegas, October 2000.