Publications

 

Book Chapter

1.      Supeng Leng, Jianding Guo, Huirong Fu, Ye Zhu, and Qing Wang, Chapter 11 Medium Access Control in Vehicular Ad Hoc Networks (VANETs), in the book of “Vehicular communications and networks: Architectures, Protocols, Operation and Deployment,” Woodhead Publishing, 2015.

Articles Published in Journals

1.      Yuanchao Lu, Ye Zhu, Matthew Itomlenskis, Seetharamayya Vyaghri, and Huirong Fu, “MMOPRG Bot Detection Based on Traffic Analysis,” International Journal of Electronics and Information Engineering, vol. 2, no. 1, pp. 18-26, 2014.

2.      Ye Zhu, Anil Vikram, Huirong Fu, and Yong Guan, “On Non-Cooperative Multiple-Target Tracking with Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, vol. 13, no. 11, pp. 6496-6510, 2014, DOI: 10.1109/TWC.2014.2329306.

3.      Ye Zhu, Anil Vikram, and Huirong Fu, “On Topology of Sensor Networks Deployed for Multi-Target Tracking,” IEEE Transactions on Intelligent Transportation Systems, vol. 15, no. 4, pp. 1489-1498, DOI: 10.1109/TITS.2014.2301033.

4.      Eralda Caushaj, Ivan Ivanov, Huirong Fu, Ishwar Sethi, and Ye Zhu, “Evaluating Throughput and Delay in 3G and 4G Mobile Architectures,” Journal of Computer and Communications, vol. 2, no.10, pp.1-8, 2014. DOI: 10.4236/jcc.2014.210001.  

5.      Nancy Alrajei, George Corser, Huirong Fu, and Ye Zhu, “Energy Prediction Based Intrusion Detection in Wireless Sensor Networks,” International Journal of Emerging Technology and Advanced Engineering, vol. 4, no. 2, pp. 760-767, 2014.

6.      Caixing Shao, Supeng Leng, Yan Zhang, and Huirong Fu, “A multi-priority supported medium access control in Vehicular Ad Hoc Networks,” Computer Communications, Elsevier Science, vol. 39, no. 2, pp. 11-21, 2014. DOI:10.1016/j.comcom.2013.11.002.

7.      Roanna Lun, Ye Zhu, and Huirong Fu, “BISTRO: BitTorrent Based on Space-Time Tradeoff,” Communications and Network, vol. 5, no. 3b, pp. 618-624, 2013. DOI: 10.4236/cn.2013.53B2111.

8.      George P. Corser, Suzan Arslanturk, Jared Oluoch, Huirong Fu and George E. Corser, “Knowing the Enemy at the Gates: Measuring Attacker Motivation,” International Journal of Interdisciplinary Telecommunications and Networking, Vol. 5, Issue 2, pp. 83-95, 2013.

9.      Eralda Caushaj, Huirong Fu, Ishwar Sethi, Haissam Badih, Dion Watson, Ye Zhu, and Supeng Leng, “Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications,” International Journal of Interdisciplinary Telecommunications and Networking, vol. 5, no. 2, pp. 66-82, 2013.

10.  Qing Wang, Supeng Leng, Huirong Fu, and Yan Zhang, “An IEEE 802.11p-based Multi-channel MAC Scheme with Channel Coordination for Vehicular Ad Hoc Networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 13, no.2, pp. 449-458, 2012.

11.  Hesiri D. Weerasinghe, Raymond Tackett, and Huirong Fu, “Verifying Position and Velocity for Vehicular Ad-Hoc Networks,” Special Issue on Security and Privacy in Wireless Systems, Security and Communication Networks, vol. 4, no. 7, pp. 785-791, 2011.

12.  Supeng Leng, Huirong Fu, Qing Wang, and Yan Zhang, “Medium Access Control in Vehicular Ad Hoc Networks,” Wireless Communications and Mobile Computing, vol. 11, no. 5, pp.796-812, 2011.

13.  Ye Zhu and Huirong Fu, “Traffic Analysis Attacks on Skype VoIP calls,” Computer Communications, Elsevier Science, vol. 34, no. 1, pp. 1202-1212, 2011.

14.  Ye Zhu, Yongjian Fu, and Huirong Fu, “Preserving Privacy in Time Series Data Mining,” International Journal of Data Warehousing and Mining, vol. 7, no. 4, pp. 64-85, 2011.

15.  Hang Dok, Huirong Fu, Ruben Echerravi, and Hesiri Weerasinghe, “Privacy Issues for Vehicular Ad-Hoc Networks,” International Journal of Future Generation Communication and Networking, vol.3, no.1, pp. 17-32, 2010.

16.  Yong-Zhong He, Zhen Han, Huirong Fu, and Guangzhi Qu, “The Formal Model of DBMS Enforcing Multiple Security Polices,” Journal of Software, vol. 5, no.5, pp. 514-521, 2010.

17.  Ye Zhu, Yongjian Fu, and Huirong Fu, “On Privacy-preserving Time Series Data Classification,” International Journal of Data Mining, Modelling and Management, vol. 2, no. 2, pp. 117-136, 2010.

18.  Ye Zhu, Yongjian Fu, and Huirong Fu, “A New Class of Attacks on Time Series Data Mining,” International Journal of Intelligent Data Analysis, vol. 14, no. 3, pp. 405-418, 2010.

19.  Bryan Fleming, Jason Watson, Mark Pellerito, and Huirong Fu, “Prevention of DoS Attacks on Inter-Vehicle Communications,” SAE 2007 Transactions Journal of Passenger Cars - Electronic and Electrical Systems, section 7, vol.116, pp. 723-727, 2008.

20.  Hesiri Weerashinghe and Huirong Fu, “Preventing Cooperative Black Hole Attack on Mobile Ad Hoc Networks: Simulation Implementation and Evaluation,” International Journal of Software Engineering and Its Applications (IJSEIA), vol.2, no.3, pp. 39-54, 2008.

21.  Sireesha Krupadanam and Huirong Fu, “Beacon-less Location Detection in Wireless Sensor Networks for Non-flat Terrain,” International Journal of Software Engineering and Its Applications (IJSEIA), vol.2, no.3, pp. 55-76, 2008.

22.  Huirong Fu, Satoshi Kawamura, Ming Zhang, and Liren Zhang, “Replication Attack on Random Key Pre-distribution Schemes for Wireless Sensor Networks,” Computer Communications, Elsevier Science, vol. 31, no. 4, pp. 842-857, 2008.

23.  Supeng Leng, Liren Zhang, Huirong Fu, and Jianjun Yang, “Mobility Analysis of Mobile Hosts with Random Walking in Ad Hoc Networks,” Journal of Computer Networks, Elsevier Science, vol. 51, no. 10, pp. 2514-2528, 2007.

24.  Supeng Leng, Liren Zhang, Huirong Fu, and Jianjun Yang, “A Novel Location Service Protocol Based on K-Hop Clustering for Mobile Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, vol. 56, no. 2, pp. 810-817, 2007.

25.  Kumar V. Mangipudi, Rajendra S. Katti, and Huirong Fu, “Authentication and Key Agreement Protocols Preserving Anonymity,” International Journal of Network Security, vol. 3, no. 3, pp. 259-270, 2006.

26.  Huirong Fu, “On Parameter Estimation of a Simple Real-Time Flow Aggregation Model,” International Journal of Communication Systems, vol. 19, no. 7, pp. 795-808, 2006.

27.  Huirong Fu and Ming Zhang, “On-line Adaptive Firewall Allocation in Internet Data Center,” Computer Communications, Elsevier Science, vol. 29, no.10, pp.1858-1867, 2006.

28.  Huirong Fu and Liren Zhang, “Variable Segmentation Scheme Based on Video Characteristics for Dynamic Bandwidth Allocation in Support of Video on Demand Service,” International Journal of Communication Systems, vol. 16, no. 10, pp. 923-934, 2003.

29.  Huirong Fu and Liren Zhang, “Low Cost Pre-stored Video Transmission across Networks,” Computer Communications, Elsevier Science, vol. 26, no. 18, pp. 2061-2069, 2003.

30.  Huirong Fu and Edward W. Knightly, “A Simple Model of Real-Time Flow Aggregation,” IEEE/ACM Transactions on Networking, vol. 11, no. 3, pp. 422-435, 2003.

31.  Liren Zhang and Huirong Fu, “Adaptive Dynamic Bandwidth Allocation Based on Playback Tunnel to Support Video on Demand Service over ATM Networks,” Computer Communications, Elsevier Science, vol. 24, no. 15-16, pp. 1485-1496, 2001.

32.  Liren Zhang, Huirong Fu, and Chee Hock Ng, “Dynamic Bandwidth Allocation and Buffer Dimensioning under Equal Segment Scheme to Support Video-on-Demand Services,” International Journal of Communication Systems, vol. 14, no. 10, pp. 941-960, 2001.

33.  Liren Zhang and Huirong Fu, “Optional Dynamic Bandwidth Allocation Based on Playback Tunnel to Support Video on Demand Service in Virtual Private Networks,” Computer Communications, Elsevier Science, vol. 24, no. 11, pp. 1019-1030, 2001.

34.  Liren Zhang and Huirong Fu, “Dynamic Bandwidth Allocation and Buffer Dimensioning for Supporting Video-on-Demand Services in Virtual Private Networks,” Computer Communications, Special Issue on Support of Multimedia Communications over the Internet, Elsevier Science, vol. 23, no. 14-15, pp. 1410-1424, 2000.

35.  Liren Zhang and Huirong Fu, “A Novel Scheme of Transporting Pre-Stored MPEG Video in ATM Networks,” Computer Communications, Elsevier Science, vol. 23, no. 2, pp. 133-148, 2000.

 

      Articles in Conference Proceedings

 

1.      Richard Bassous, Roger Bassous, Huirong Fu, and Ye Zhu, “Ambiguous Multi-Symmetric Cryptography,” IEEE ICC, London, England, Jun. 2015.

2.      Nahed Alnahash, Huirong Fu, Ye Zhu, Wenjin Zhou, and Jared Oluoch, “Security and Privacy: Using Email Addresses as Identities,” Michigan Celebration of Women in Computing, Ann Arbor, MI, Mar. 2015.

3.      Jared Oluoch, Neha Gupta, Greg Johnson, Huirong Fu, Tao Shu, and Ye Zhu, “MCET: Message Centric Trust Model for Vehicular Ad Hoc Networks,” Michigan Celebration of Women in Computing, Ann Arbor, MI, Mar. 2015.

4.      Jared Oluoch, Stephen Jarnagin, and Huirong Fu, “Classification of VANET Properties,” Michigan Celebration of Women in Computing, Ann Arbor, MI, Mar. 2015.

5.      Aimie Xia, Eralda Caushaj, Huirong Fu, Brian Heller, and Ye Zhu, “Privacy Issues in Smartphone,” Michigan Celebration of Women in Computing, Ann Arbor, MI, Mar. 2015.

6.      Penna Kiran, Yalavarthi Venkatesh, Fu Huirong, and Zhu Ye, “Evaluation of Active Position Detection in Vehicular Ad Hoc Networks,” IEEE World Congress on Computational Intelligence, Beijing, China, Jul. 2014.

7.      George Corser, Huirong Fu, Tao Shu, Patrick D’Errico, Warren Ma, Supeng Leng, and Ye Zhu, “Privacy-by-Decoy: Protecting Location Privacy Against Collusion and Deanonymization in Vehicular Location Based Services,” IEEE Intelligent Vehicles Symposium, Dearborn, Michigan, Jun. 2014.

8.      Jared Oluoch, George Corser, Huirong Fu, Ye Zhu, and Supeng Leng, “A Simulation Evaluation of Existing Trust Models in Vehicular Ad Hoc Networks,” American Society for Engineering Education North Central Section Conference, Rochester, Michigan, Apr. 2014.

9.      Nahed Alnahash, George Corser, Huirong Fu, and Ye Zhu, “Protecting Vehicle Privacy Using Dummy Events,” American Society for Engineering Education North Central Section Conference, Rochester, Michigan, Apr. 2014.

10.  Mazen Alobaidi, Huirong Fu, and Ye Zhu, “Synchronize Confidential Authentication (SCA),”   American Society for Engineering Education North Central Section Conference, Rochester, Michigan, Apr. 2014.

11.  Nancy Alrajei, Huirong Fu, and Ye Zhu, “A Survey on Fault Tolerance in Wireless Sensor Networks,” American Society for Engineering Education North Central Section Conference, Rochester, Michigan, Apr. 2014.

12.  Eralda Caushaj, Ivan Ivanov, Huirong Fu, Ishwar Sethi, and Ye Zhu, “BYOD: Security and Privacy Issues in 4 Smartphone Platforms,” American Society for Engineering Education North Central Section Conference, Rochester, Michigan, Apr. 2014.

13.  George Corser, Huirong Fu, Tao Shu, Patrick D’Errico, Warren Ma, Supeng Leng, and Ye Zhu, “Endpoint Protection Zone (EPZ): Protecting LBS User Location Privacy against De-anonymization and Collusion in Vehicular Networks,” IEEE Proceedings of the Second International Conference on Connected Vehicles & Expo., Las Vegas, Nevada, USA, Dec. 2013.

14.  Roanna Lun, Ye Zhu, and Huirong Fu, “BISTRO: BitTorrent Based on Space-Time Tradeoff,” IEEE WiCOM, Beijing, China, Sep. 2013.

15.  Jared Ouoch, Huirong Fu, Astrid Younang, Ye Zhu, and Bao Tri-Tran, “A Simulation Study of Impacts of Collaborative Worm Hole Attacks in Mobile Ad Hoc Networks (MANETs),” ACM Proceedings of Information Security Curriculum Development Conference, Atlanta, Georgia, USA, 2012.

16.  Eralda Caushaj, Huirong Fu, Haissam Baddih, Ye Zhu, and Supeng Leng, “Attacks and Countermeasures in Wireless Cellular Networks,” ACM Proceedings of Information Security Curriculum Development Conference, Atlanta, Georgia, USA, 2012.

17.  Ye Zhu, Anil Vikram, and Huirong Fu, “On Tracking Multiple Indistinguishable Targets,” IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS’12), Las Vegas, Nevada, USA,  Oct. 2012.

18.  Caixing Shao, Supeng Leng, Yan Zhang, and Huirong Fu, “A Multi-priority Supported p-persistent MAC Protocol for Vehicular Ad Hoc Networks,” IEEE Wireless Communications and Networking Conference (WCNC’12), Paris, France, Apr. 2012.

19.  Ye Zhu, Anil Vikram, and Huirong Fu, “On Topology of Sensor Networks Deployed for Tracking,” the 6th International Conference on Wireless Algorithms, Systems, and Applications (WASA’11), Chengdu, China, Aug. 2011.

20.  Hesiri Weerasinghe, Huirong Fu, Supeng Leng and Ye Zhu, “Enhancing Unlinkability for Vehicular Ad hoc Networks,” IEEE Intelligence and Security Informatics (ISI’11), Beijing, China, Jun. 2011.

21.  Qing Wang, Supeng Leng, Yan Zhang and Huirong Fu, “A QoS Supported Multi-channel MAC for Vehicular Ad Hoc Networks,” IEEE Vehicular Technology Conference (VTC’11), Budapest, Hungary, May 2011.

22.  Kyohong Jin, Huirong Fu, and Hesiri Weerasinghe, “Enhancement of IEEE 802.11 Modules in ns-2 and Performance Evaluation with Error Rate,” the 43rd Annual Simulation Symposium (ANSS’10), Orlando, Florida, Apr. 2010.

23.  Qing Wang, Supeng Leng, Huirong Fu, Yan Zhang, and Hesiri Weerasinghe, “A Novel IEEE 1609.4-based Multi-channel MAC Scheme for Vehicular Ad Hoc Networks,” INFOCOM Workshops, San Diego, California, Mar. 2010.

24.  Ye Zhu, Yuanchao Lu, Anil Vikram, and Huirong Fu, “On the Privacy of Skype Calls,” IEEE GlobleCom’09, Hawaii, Dec. 2009.

25.  Kamakshi Subramaniam, Vanitha Sathyanayanan, Radhika Katamneni, Ye Zhu, and Huirong Fu, “A Heuristic Approach to Trust Management in Vehicle Infrastructure Integration,” the 2nd International Conference on Wireless Access in Vehicular Environments (WAVE’09), Shanghai, China, Dec. 2009.

26.  Ke Liu, Supeng Leng, Huirong Fu, Longjiang Li, “A Novel Dual Busy Tone Aided MAC Protocol for Multi-hop Wireless Networks,” the 8th International Conference on Dependable, Autonomic and Secure Computing (DASC’09), Chengdu, China, Dec. 2009.

27.  Hang Dok, Ruben Echerravi, and Huirong Fu, “Privacy Issues for Vehicular Ad-Hoc Networks,” International Conference on Future Generation Communication and Networking (FGCN’09), Jeju Island, Korea, Dec. 2009.

28.  David Wampler, Huirong Fu, and Ye Zhu, “Security Threats and Countermeasures for Intra-Vehicle Networks,” IEEE International Conference on Information Assurance and Security (IAS’09), Xi'an, China, Aug. 2009.

29.  Deepa Simon, Harsha Nakade, Chetan Yeole, Huirong Fu, and Ye Zhu, “Securing Position of a Vehicle in Multi-hop Networks,” IEEE International Conference on Information Assurance and Security (IAS’09), Xi’an, China, Aug. 2009.

30.  Michelle Oda, Huirong Fu, and Ye Zhu, “Enterprise Information Security Architecture: A Review of Frameworks, Methodology, and Case Studies,” IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009), Beijing, China, Aug. 2009.

31.  Yongzhong He and Huirong Fu, “Usage Control in Conditional Access System with Malicious Set-Top Box,” International Conference on Security and Management (SAM’09), Las Vegas, Nevada, Jul. 2009.

32.  Ye Zhu, Yongjian Fu, and Huirong Fu, “Preserving Privacy in Time Series Data Classification by Discretization,” International Conference on Machine Learning and Data Mining (MLDM’09), Leipzig, Germany, Jul. 2009.

33.  Ye Zhu, Yongjian Fu, and Huirong Fu, “Time Series Data Publishing and Mining System,” IADIS European Conference on Data Mining, Algarve, Portugal, Jun. 2009.

34.  Qing Wang, Supeng Leng, Huirong Fu, and Yan Zhang, “A Novel Multi-channel MAC Scheme for Vehicular Ad Hoc Networks,” IEEE International Conference on Wireless Access in Vehicular Environments (WAVE’08), Dearborn, Michigan, Dec. 2008.

35.  Sireesha Velagapalli and Huirong Fu, “Localization Anomaly Detection in Wireless Sensor Networks for Non-flat Terrains,” The Second International Conference on Networks for Grid Applications, Beijing, China, Oct. 2008.

36.  Todd Murray, Tammy Murray, Michael Cojocari, and Huirong Fu, “Measuring the Performance of IEEE 802.11p Using ns-2 Simulator,” IEEE EIT’08, Ames, Iowa, May 2008.

37.  Christopher Langley, Raul Lucas, and Huirong Fu, “Key Management in Vehicle Ad-Hoc Networks,” IEEE EIT’08, Ames, Iowa, May 2008.

38.  Xidong Wang, Charlie Gladden, and Huirong Fu, “Secure Inter-Vehicle Vital Signal Communication via Dynamic Group Management,” International Conference on Security and Management (SAM’08), Las Vegas, Nevada, Jun. 2008.

39.  Rahat Qureshi, Min K. Chang, Hesiri Weerasinghe, and Huirong Fu, “Intrusion Detection System for Wireless Sensor Networks,” International Conference on Security and Management (SAM’08), Las Vegas, Nevada, Jun. 2008.

40.  Manjiri Joshi, Ramya Pulimati, Srikanth Edula, Hesiri Weerasinghe, and Huirong Fu, “Robustness of Grid-based Deployment in Wireless Sensor Networks,” International Conference on Wireless Networks (ICWN’08), Las Vegas, Nevada, Jun. 2008.

41.  Doriel Josic, Vikram Chilukoti, Hesiri Weerasinghe, and Huirong Fu, “Modeling Attacks on Wireless Sensor Networks,” International Conference on Wireless Networks (ICWN’08), Las Vegas, Nevada, Jun. 2008.

42.  Ye Zhu, Yongjian Fu, and Huirong Fu, “On Privacy in Time Series Data Mining,” the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD’08), Osaka, Japan, May 2008.

43.  Hesiri Weerashinghe and Huirong Fu, “Preventing Cooperative Black Hole Attack on Mobile Ad Hoc Networks: Simulation Implementation and Evaluation,” International Workshop on Wireless Ad Hoc, Mesh and Sensor Networks (WAMSNet’07), Jeju Island, Korea, Dec. 2007.

44.  Sireesha Velagapalli and Huirong Fu, “Beacon-less Location Detection in Wireless Sensor Networks for Non-flat Terrain,” International Conference on Future Generation Communication and Networking (FGCN’07), Jeju Island, Korea, Dec. 2007.

45.  Shoua Yang, Shanti Sukumaran, Dipali Yermalkar, Hesiri Weerasinghe, Huirong Fu, “Security and Privacy: Open Issues with RFID,” International Conference on Security and Management (SAM’07), Las Vegas, Nevada, Jun. 2007.

46.  Slobodan Dokic, Andrea Kulesh, Megha Dombal, and Huirong Fu, “An Overview of Multi-modal Biometrics for Authentication,” International Conference on Security and Management (SAM’07), Las Vegas, Nevada, Jun. 2007.

47.  Jason D. Watson, Mark Pellerito, Charlie Gladden, and Huirong Fu, “Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks,” IEEE SAHNS’07, Toronto, Canada, Jun. 2007.

48.  Michael Dustin, Jagadish Shankarappa, Michael Petrowski, Hesiri Weerasinghe, and Huirong Fu, “Analysis of Key Management in Wireless Sensor Networks,” IEEE EIT’07, Chicago, Illinois, May 2007.

49.  Dmitriy Martynov, Jason Roman, Samir Vaidya, and Huirong Fu, “Design and Implementation of an Intrusion Detection System for Wireless Sensor Networks,” IEEE EIT’07, Chicago, Illinois, May 2007.

50.  Bryan Fleming, Jason Watson, Mark Pellerito, and Huirong Fu, “Prevention of DoS Attacks on Inter-Vehicle Communications,” SAE 2007 World Congress, Detroit, Michigan, Apr. 2007.

51.  Huirong Fu, Satoshi Kawamura, and Chengzhi Li, “Blom-Based Q-Composite: A Generalized Framework of Random Key Pre-Distribution Schemes for Wireless Sensor Networks,” IEEE/RSJ International Conference on Intelligent Robotics and System (IROS’06), Beijing, China, Oct. 2006.

52.  David Foster, Laura Stapleton, and Huirong Fu, “Secure Remote Electronic Voting,” the Sixth IEEE International Conference on Electro/Information Technology (EIT’06), East Lansing, Michigan, Jun. 2006.

53.  Imad H. Elhajj, Huirong Fu, Adrian Padilla, and Daniel Aloi, “Keyless Message Authentication by Verifying Position and Velocity for Inter-Vehicle Communication,” SAE 2006 World Congress, Detroit, Michigan, Apr. 2006.

54.  Huirong Fu and Hector Aybar, “Hierarchical Mobile Certificate Authority for Heterogeneous Wireless Ad Hoc Networks: Architecture and Protocols,” SAE 2006 World Congress, Detroit, Michigan, Apr. 2006.

55.  Huirong Fu, Satoshi Kawamura, Ming Zhang, and Liren Zhang, “Replication Attack on Random Key Pre-distribution Schemes for Wireless Sensor Networks,” IEEE Information Assurance Workshop, West Point, New York, Jun. 2005.

56.  Huirong Fu, Vivek Goel, Elangovan Murugaiyan, Sudhan Shanmugasundaram, and Liren Zhang, “Unified Solution to Registration, Authentication and Billing for Wireless Hotspots: Architecture and Protocols,” International Conference on Wireless Networks (ICWN’05), Las Vegas, Nevada, Jun. 2005.

57.  Sanjay Ramaswamy, Huirong Fu, and Kendall E. Nygard, “Simulation Study of Multiple Black Holes Attack on Mobile Ad Hoc Networks,” International Conference on Wireless Networks (ICWN’05), Las Vegas, Nevada, Jun. 2005.

58.  Kumar Mangipudi, Nagaraja Malneedi, Rajendra Katti, and Huirong Fu, “Attacks and Solutions on Aydos-Savas-Koç’s Wireless Authentication Protocol,” IEEE GLOBECOM’04, Dallas, Texas, Nov./Dec. 2004.

59.  Benzir M. Ahmed, Tanjina Helaly, and Huirong Fu, “Secure Routing in Wireless Mobile Ad Hoc Networks without the Support of Key Management Infrastructure,” International Conference on Wireless Networks (ICWN’04), Las Vegas, Nevada, Jun. 2004.

60.  Satoshi Kawamura, Huirong Fu, Meegeum Choi, and Shanhong Wu, “End-to-End Mobility Management: A Two-Phase Deployment Scheme for Personal Use,” International Conference on Wireless Networks (ICWN’04), Las Vegas, Nevada, Jun. 2004.

61.  Guangyuan Sun and Huirong Fu, “Advances on Intrusion Detection Techniques,” International Conference on Computer Applications in Industry and Engineering (CAINE), Las Vegas, Nevada, Nov. 2003.

62.  Huirong Fu and Liren Zhang, “Video Segmentation for Transporting Pre-Stored Video across Networks,” International Conference on Computer Applications in Industry and Engineering (CAINE), Las Vegas, Nevada, Nov. 2003.

63.  Ming Zhang and Huirong Fu, “OPNET Simulation of Dynamic Firewalls Migration in Internet Data Centers,” OPNETWORK’03, Washington DC, Aug. 2003.

64.  Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks,” International Conference on Wireless Networks (ICWN’03), Las Vegas, Nevada, Jun. 2003.

65.  Supranamaya Sranjan, Jerry Rolia, Huirong Fu, and Edward W. Knightly, “QoS-Driven Server Migration for Internet Data Centers,” IWQoS’02, Miami, Florida, May 2002.

66.  Huirong Fu and Edward W. Knightly, “Aggregation and Scalable QoS: A Performance Study,” IWQoS’01, Karlsruhe, Germany, Jun. 2001.

67.  Liren Zhang and Huirong Fu, “Adaptive Bandwidth Allocation Based on Playback Tunnel to Support Video on Demand Service over VPN networks,” Networld+Interop 2000 Engineers Conference, Las Vegas, Nevada, May 2000.

68.  Huirong Fu and Liren Zhang, “Adaptive Bandwidth Allocation Based on Playback Tunnel in Support of Video on Demand Service over ATM Networks,” the Fifth International Conference on Computer Science and Informatics (CS&I’00), Atlantic City, New Jersey, Feb. 2000.

69.  Huirong Fu and Liren Zhang, “Optimized Dynamic Bandwidth Allocation Based on Playback Tunnel for Supporting Video on Demand Service,” the 2nd International Conference on Information, Communications & Signal Processing (ICICS’99), Singapore, Dec. 1999.

70.  Huirong Fu, Liren Zhang, Chee Hock Ng, and Krishnappa R. Subramanian, “A Novel Scheme of Transporting Pre-Stored MPEG Video in ATM Networks,” IEEE International Conference on Networks (ICON’99), Brisbane, Australia, Sept. 1999.

71.  Liren Zhang, Huirong Fu, and Lee Wu Yu, “Bandwidth Allocation and Buffer Dimensioning for the Transmission of Pre-Stored MPEG VBR Video in ATM Networks,” International Symposium on Intelligent Multimedia and Distance Education (ISIMADE’99), Baden, Germany, Aug. 1999.

72.  Huirong Fu, Liren Zhang, and Chee Hock Ng, “Dynamic Bandwidth Allocation and Buffer Dimensioning under Equal Segment Divisioning Scheme to Support Video on Demand Service,” Engineers Conferences on Broadband Access, Technologies, Systems and Services, Las Vegas, Nevada, May 1999.

 

Poster Presentations

1.      Jared Oluoch, Huirong Fu, and Theophilus Ogunyemi, “Enhancing Reputation of Intelligent Vehicles through Wisdom of Crowds,” Collective Intelligence, Anaheim, CA, May – Jun., 2015.

2.      Neha Gupta, Greg Johnson, Jared Oluoch, and Huirong Fu, “Classification of Available VANET Trust Models and A Proposed Message Based Approach,” Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Lansing, Michigan, Jul. 2013.

3.      Lars Kivari, Mathias Masasabi, George Corser, and Huirong Fu, “Threats Associated with Vehicular Ad Hoc Networks (VANETs),” Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Lansing, Michigan, Jul. 2013.

4.      Stephen Jarnagin, and Huirong Fu, “Trust Management in Vehicular Ad Hoc Networks,” Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Lansing, Michigan, Jul. 2013.

5.      Hang Dok, Ruben Echerravi, and Huirong Fu, “Privacy Issues for Vehicular Ad-Hoc Networks,” Michigan Celebration of Women in Computing, Hickory Corners, MI, Apr. 2009.

6.      Rahat Qureshi, Min Chang, Hesiri Weerasinghe, and Huirong Fu, “Intrusion Detection System for Wireless Sensor Networks,” the 12th Annual Michigan Space Grant Consortium Conference, Ann Arbor, Michigan, Oct. 2007.