D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 39 Citations 6,468 212 World Ranking 6123 National Ranking 2948

Research.com Recognitions

Awards & Achievements

2019 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Operating system

His main research concerns Computer network, Cloud computing, Computer security, Mobile computing and Encryption. His Computer network research integrates issues from Wireless ad hoc network and Distributed computing. His studies deal with areas such as Virtual machine, Server and Network security as well as Cloud computing.

He combines subjects such as Control, Construct and Vehicular ad hoc network with his study of Computer security. His work in Mobile computing addresses issues such as Mobile search, which are connected to fields such as Mobile database and Mobile device. His Encryption research incorporates themes from Revocation, Cryptography and Access control.

His most cited work include:

  • Location-aware key management scheme for wireless sensor networks (224 citations)
  • NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems (210 citations)
  • MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication (177 citations)

What are the main themes of his work throughout his whole career to date?

Dijiang Huang focuses on Computer network, Computer security, Cloud computing, Distributed computing and Encryption. Dijiang Huang focuses mostly in the field of Computer network, narrowing it down to matters related to Cryptography and, in some cases, Authentication. His study in Computer security is interdisciplinary in nature, drawing from both Revocation, Identity and Server.

Within one scientific family, Dijiang Huang focuses on topics pertaining to Mobile computing under Cloud computing, and may sometimes address concerns connected to Mobile search and Mobile device. His research integrates issues of Security policy, Static routing, Routing protocol, Provisioning and Secure communication in his study of Distributed computing. His Encryption study combines topics in areas such as Overhead and Access control.

He most often published in these fields:

  • Computer network (48.15%)
  • Computer security (32.41%)
  • Cloud computing (31.02%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (32.41%)
  • Cloud computing (31.02%)
  • Computer network (48.15%)

In recent papers he was focusing on the following fields of study:

Dijiang Huang spends much of his time researching Computer security, Cloud computing, Computer network, Software-defined networking and Scalability. In the field of Computer security, his study on Network security, Encryption, Access control and Intrusion detection system overlaps with subjects such as CVSS. The concepts of his Encryption study are interwoven with issues in Attribute-based access control, Revocation and Server.

Dijiang Huang has researched Cloud computing in several fields, including Firewall, Object-oriented programming, OpenFlow and Network administrator. His research in Computer network tackles topics such as Cryptography which are related to areas like Information sharing. His Scalability study which covers Distributed computing that intersects with State, Security policy, Propagation delay and Network topology.

Between 2017 and 2021, his most popular works were:

  • Attribute-based Access Control for ICN Naming Scheme (51 citations)
  • A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities (46 citations)
  • Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments (36 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Operating system

His primary areas of investigation include Computer security, Cloud computing, Scalability, Software-defined networking and Distributed computing. Dijiang Huang has included themes like Control, Overhead, Software deployment and Big data in his Computer security study. His Cloud computing research focuses on Network security and how it relates to Quality of service and Targeted threat.

His studies deal with areas such as Intrusion detection system and Propagation delay as well as Scalability. His Software-defined networking research is multidisciplinary, incorporating perspectives in Network topology, The Internet and Software engineering. His studies in Distributed computing integrate themes in fields like Security policy and State.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Chun-Jen Chung;P. Khatkar;Tianyi Xing;Jeongkeun Lee.
IEEE Transactions on Dependable and Secure Computing (2013)

372 Citations

Location-aware key management scheme for wireless sensor networks

Dijiang Huang;Manish Mehta;Deep Medhi;Lein Harn.
security of ad hoc and sensor networks (2004)

346 Citations

Efficient and secure data storage operations for mobile cloud computing

Zhibin Zhou;Dijiang Huang.
conference on network and service management (2012)

281 Citations

MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication

Dijiang Huang;Xinwen Zhang;Myong Kang;Jim Luo.
service oriented software engineering (2010)

271 Citations

PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs

Dijiang Huang;S. Misra;M. Verma;Guoliang Xue.
IEEE Transactions on Intelligent Transportation Systems (2011)

225 Citations

Mobile Cloud Computing: Foundations and Service Models

Dijiang Huang;Huijun Wu.
(2017)

224 Citations

iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization

Yin Zhang;Min Chen;Dijiang Huang;Di Wu.
Future Generation Computer Systems (2017)

219 Citations

SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment

Tianyi Xing;Dijiang Huang;Le Xu;Chun-Jen Chung.
2013 Second GENI Research and Educational Experiment Workshop (2013)

182 Citations

Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption

Dijiang Huang;Zhibin Zhou.
IEEE Transactions on Computers (2014)

171 Citations

Secure data processing framework for mobile cloud computing

Dijiang Huang;Zhibin Zhou;Le Xu;Tianyi Xing.
conference on computer communications workshops (2011)

160 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Dijiang Huang

Mohamed Younis

Mohamed Younis

University of Maryland, Baltimore County

Publications: 32

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 16

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 14

Min Chen

Min Chen

Huazhong University of Science and Technology

Publications: 14

Yuguang Fang

Yuguang Fang

City University of Hong Kong

Publications: 11

Shui Yu

Shui Yu

University of Technology Sydney

Publications: 11

Abdullah Gani

Abdullah Gani

University of Malaya

Publications: 11

M. Shamim Hossain

M. Shamim Hossain

King Saud University

Publications: 11

Huimin Lu

Huimin Lu

Kyushu Institute of Technology

Publications: 10

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 10

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 10

Yan Zhang

Yan Zhang

Chinese Academy of Sciences

Publications: 10

Samee U. Khan

Samee U. Khan

Mississippi State University

Publications: 9

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 9

Mauro Conti

Mauro Conti

University of Padua

Publications: 9

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 9

Trending Scientists

W. Keith Edwards

W. Keith Edwards

Georgia Institute of Technology

Zoe Radnor

Zoe Radnor

The University of Law

Philip Brown

Philip Brown

University of Western Australia

Marcelo M. Wanderley

Marcelo M. Wanderley

McGill University

Antonio Huerta

Antonio Huerta

Universitat Politècnica de Catalunya

Hongyu Yu

Hongyu Yu

Southern University of Science and Technology

Lionel Salmon

Lionel Salmon

Federal University of Toulouse Midi-Pyrénées

Simon G. Bott

Simon G. Bott

University of Houston

Maitreya J. Dunham

Maitreya J. Dunham

University of Washington

Hideki Tanzawa

Hideki Tanzawa

Chiba University

Amlan Kumar Patra

Amlan Kumar Patra

West Bengal University of Animal and Fishery Sciences

Isabelle Dusart

Isabelle Dusart

Université Paris Cité

Leszek Kubin

Leszek Kubin

University of Pennsylvania

Siegfried Kasper

Siegfried Kasper

Medical University of Vienna

Timothy Koschmann

Timothy Koschmann

Southern Illinois University School of Medicine

Poshak Gandhi

Poshak Gandhi

University of Southampton

Something went wrong. Please try again later.