default search action
Yih Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [p1]Yih Huang, Anup K. Ghosh:
Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services. Moving Target Defense 2011: 131-151 - 2010
- [c26]Yih Huang, Anup K. Ghosh, Tom Bracewell, Brian Mastropietro:
A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration. DSN Workshops 2010: 188-193 - [c25]Jiang Wang, Yih Huang, Anup K. Ghosh:
SafeFox: A Safe Lightweight Virtual Browsing Environment. HICSS 2010: 1-10
2000 – 2009
- 2009
- [j7]Jian-Gang Han, Wei-Xin Ren, Yih Huang:
A spline wavelet finite element formulation of thin plate bending. Eng. Comput. 25(4): 319-326 (2009) - [c24]Yih Huang, Anup K. Ghosh:
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. NCA 2009: 114-117 - 2008
- [c23]Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia:
Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28 - [c22]Jiang Wang, Anup K. Ghosh, Yih Huang:
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. CollaborateCom 2008: 24-33 - 2007
- [c21]David Arsenault, Arun Sood, Yih Huang:
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). ARES 2007: 343-350 - 2006
- [j6]Yih Huang, David Arsenault, Arun Sood:
SCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates. J. High Speed Networks 15(1): 5-19 (2006) - [j5]Yih Huang, David Arsenault, Arun Sood:
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security. J. Networks 1(5): 21-30 (2006) - [c20]Yih Huang, David Arsenault, Arun Sood:
Securing DNS Services through System Self Cleansing and Hardware Enhancements. ARES 2006: 132-139 - [c19]Yih Huang, David Arsenault, Arun Sood:
Closing Cluster Attack Windows Through Server Redundancy and Rotations. CCGRID 2006: 21 - [c18]Yih Huang, David Arsenault, Arun Sood:
Incorruptible system self-cleansing for intrusion tolerance. IPCCC 2006 - 2003
- [j4]Yih Huang, Philip K. McKinley:
Tree-based link-state routing in the presence of routing information corruption. Comput. Commun. 26(7): 691-699 (2003) - [c17]Leijun Huang, Yih Huang:
HIFI: a high-bandwidth flow identification algorithm and its applications. ICC 2003: 849-853 - [c16]Yih Huang, Genwen Xu, Leijun Huang:
Adaptive AIMD rate control for smooth multimedia streaming. ICCCN 2003: 171-177 - 2002
- [c15]Genwen Xu, Yih Huang:
Transitional behaviors of general AIMD rate control. ICCCN 2002: 132-137 - 2001
- [c14]Yih Huang, David Rine, Xunhua Wang:
A JCA-Based Implementation Framework for Threshold Cryptography. ACSAC 2001: 85-91 - [c13]Yih Huang, J. Mark Pullen:
Countering denial-of-service attacks using congestion triggered packet sampling and filtering. ICCCN 2001: 490-494 - 2000
- [j3]Yih Huang, Philip K. McKinley:
Group leader election under link-state routing. Comput. Commun. 23(7): 653-666 (2000) - [j2]Eric Fleury, Yih Huang, Philip K. McKinley:
On the performance and feasibility of multicast core selection heuristics. Networks 35(2): 145-156 (2000) - [c12]Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine:
Enabling Secure On-Line DNS Dynamic Update. ACSAC 2000: 52-
1990 – 1999
- 1999
- [c11]Yih Huang, Philip K. McKinley:
Tree-based link-state routing in the presence of routing information corruption. ICCCN 1999: 364-370 - 1998
- [c10]Yih Huang, Eric Fleury, Philip K. McKinley:
LCM: a multicast core management protocol for link-state routing networks. ICC 1998: 1197-1201 - [c9]Eric Fleury, Yih Huang, Philip K. McKinley:
On the Performance and Feasibility of Multicast Core Selection Heuristics. ICCCN 1998: 296-303 - 1997
- [j1]Yih Huang, Philip K. McKinley:
An Adaptive Global Reduction Algorithm for Wormhole-Routed 2D Meshes. Parallel Comput. 23(13): 1909-1936 (1997) - [c8]Yih Huang, Philip K. McKinley:
Group leader election under link-state routing. ICNP 1997: 95-104 - [c7]Yih Huang, Philip K. McKinley:
Switch-Aided Flooding Operations in ATM Networks. INFOCOM 1997: 1080-1087 - [c6]Philip K. McKinley, Yih Huang:
A Centralized Generic Protocol for Multipoint Connections. LCN 1997: 357-368 - 1996
- [c5]Yih Huang, Philip K. McKinley:
A Lightweight Protocol for Multipoint Connections under Link-State Routing. ICDCS 1996: 335-343 - [c4]Yih Huang, Philip K. McKinley:
Efficient Collective Operations with ATM Network Interface Support. ICPP, Vol. 1 1996: 34-43 - 1995
- [c3]Chengchang Huang, Yih Huang, Philip K. McKinley:
A Thread-Based Interface for Collective Communication on ATM Networks. ICDCS 1995: 254-261 - [c2]Yih Huang, Chengchang Huang, Philip K. McKinley:
Multicast Virtual Topologies for Collective Communication in MPCs and ATM Clusters. SC 1995: 9 - [c1]Yih Huang, Philip K. McKinley:
An adaptive global reduction algorithm for wormhole-routed 2D meshes. SPDP 1995: 114-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint