近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
[1] S. Z hang, J. Huang , P. Li, and C. Liang, “Differentially private federated learning with local momentum updates and gradients filtering,” Information Sciences, vol. 680. 2024. doi : 10.1016/j.ins.2024.120960.
[2] Z. Zhang and J. Huang , “Aligning the domains in cross domain model inversion attack,” Neural Networks, vol. 178, p. 106490, Oct. 2024, doi : 10.1016/j.neunet.2024.106490.
[3] P. Li, J. Huang , H. Wu, Z. Zhang, and C. Qi, “ SecureNet : Proactive intellectual property protection and model security defense for DNNs based on backdoor learning,” Neural Networks, vol. 174, p. 106199, Jun. 2024, doi : 10.1016/j.neunet.2024.106199.
[4] Y. Peng, J. Huang , S. Zhou, Z. Ju, X. Wang, and P. Li, “BGET: A Blockchain-Based Grouping- EigenTrust Reputation Management Approach for P2P Networks,” Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 561 LNICST. pp. 225–242, 2024. doi : 10.1007/978-3-031-54521-4_13.
[5] C. Liang, J. Huang , Z. Zhang, and S. Zhang, “Defending against model extraction attacks with OOD feature learning and decision boundary confusion,” Computers & Security, vol. 136, p. 103563, Jan. 2024, doi : 10.1016/j.cose.2023.103563.
[6] S. Zhang, J. Huang , Z. Zhang, P. Li, and C. Qi, “Compromise privacy in large-batch Federated Learning via model poisoning,” Information Sciences, vol. 647, p. 119421, Nov. 2023, doi : 10.1016/j.ins.2023.119421.
[7] X. Zhu, J. Huang , and C. Qi, “ Modeling and Analysis of Malware Propagation for IoT Heterogeneous Devices,” IEEE Systems Journal, vol. 17, no. 3, pp. 3846–3857, 2023, doi : 10.1109/JSYST.2023.3269158.
[8] X. Zhu and J. Huang , “ SpreadRank : A Novel Approach for Identifying Influential Spreaders in Complex Networks,” Entropy, vol. 25, no. 4, 2023, doi : 10.3390/e25040637.
[9] X. Wang, J. Huang, and J. Chen, “Group Key Generation Scheme Based on Random Forwarding Network for Large-scale IoT Devices,” presented at the Proceedings - 2023 2nd International Conference on Sensing, Measurement, Communication and Internet of Things Technologies, SMC-IoT 2023, 2023, pp. 78–84. doi : 10.1109/SMC-IoT62253.2023.00022.
[10] Z. Zhang, X. Wang, J. Huang , and S. Zhang, “Analysis and Utilization of Hidden Information in Model Inversion Attacks,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4449–4462, 2023, doi : 10.1109/TIFS.2023.3295942.
[11] C. Qi, J. Huang , X. Zhao, and Z. Wang, “Lightweight network structure face recognition method based on cloud-edge collaboration,” Dongnan Daxue Xuebao ( Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), vol. 53, no. 1, pp. 1–13, 2023, doi : 10.3969/j.issn.1001-0505.2023.01.001.
[12] X. Wang, J. Huang , C. Qi, Y. Peng, and S. Zhang, “An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay,” PeerJ Computer Science, vol. 9, 2023, doi : 10.7717/PEERJ-CS.1349.
[13] S. Zhang, J. Huang , Z. Zhang, and C. Qi, “Compromise Privacy in Large-Batch Federated Learning via Malicious Model Parameters,” in Algorithms and Architectures for Parallel Processing, W. Meng, R. Lu, G. Min, and J. Vaidya, Eds., in Lecture Notes in Computer Science. Cham: Springer Nature Switzerland, 2023, pp. 63–80. doi : 10.1007/978-3-031-22677-9_4.
[14] P. Li, J. Huang , S. Zhang, C. Qi, C. Liang, and Y. Peng, “A Novel Backdoor Attack Adapted to Transfer Learning,” presented at the Proceedings - 2022 IEEE SmartWorld , Ubiquitous Intelligence and Computing, Autonomous and Trusted Vehicles, Scalable Computing and Communications, Digital Twin, Privacy Computing, Metaverse, SmartWorld /UIC/ATC/ ScalCom / DigitalTwin / PriComp/Metaverse 2022, 2022, pp. 1730–1735. doi : 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00246.
[15] C. Qi, J. Huang , C. Huang, H. Wu, and X. S. Shen, “Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model,” presented at the Proceedings - IEEE Global Communications Conference, GLOBECOM, 2022, pp. 6259–6264. doi : 10.1109/GLOBECOM48099.2022.10000946.
[16] X. Wang, J. Huang , Z. Duan, Y. Xu, and Y. Yao, “Randomness analysis of end-to-end delay in random forwarding networks,” PeerJ Computer Science, vol. 8, 2022, doi : 10.7717/PEERJ-CS.942.
[17] S. Zhang, J. Huang , C. Qi, and X. Wang, “Online IoT device identification method based on SOINN,” Dongnan Daxue Xuebao ( Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), vol. 51, no. 4, pp. 715–723, 2021, doi : 10.3969/j.issn.1001-0505.2021.04.023.
[18] X. Zhu, J. Huang , B. Wang, and C. Qi, “Malware homology determination using visualized images and feature fusion,” PeerJ Computer Science, vol. 7, pp. 1–22, 2021, doi : 10.7717/peerj-cs.494.
[19] C. Qi, J. Huang, X. Zhu, and X. Wang, “MCTA: Mobile-Coverage Scheme Based on Trust-Aware for Hybrid WSNs,” presented at the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference, CCWC 2021, 2021, pp. 839–845. doi : 10.1109/CCWC51732.2021.9375914.
[20] Xuejin Zhu, Jie Huang* , Bin Wang, Chunyang Qi. Malware homology determination using visualized images and feature fusion[J]. PeerJ Computer Science, Wireless Communications and Mobile Computing, 2021.4:1-22
[21] Chunyang Qi, Jie Huang* , Bin Wang, Hongkai Wang. A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs[J]. 2021.7: 1-16
[22] Xiang Liu, Teng Joon Lim, Jie Huang* . Universal Resource Allocation Framework for Preventing Pollution Attacks in Network-Coded Wireless Mesh Networks[J]. Ad Hoc Networks, 2020, 99: 102073.
[23] Xiang Liu, Teng Joon Lim, Jie Huang* . Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks[J]. IEEE Transactions on Information Forensics and Security, 2020,15(1): 2570-2583
[24] Xiang Liu, Jie Huang* , Yuanxi Wu, Guowen Zong. A Privacy-Preserving Signature Scheme for Network Coding[J]. IEEE Access, 2019, 7: 109739-109750
[25] Xiang Liu, Jie Huang* . A probabilistically weakly secure network coding scheme in multipath routing for WSNs[J]. Sensors, 2017,17(5)
[26] Jie Huang* , Bei Huang, A Security Key Distribution Scheme Based on Energy Efficiency for Hybrid Wireless Sensor Networks, Security and Communication Networks , 2014,7(8): 1189-1198.