15.08.2013 Views

Huijie, Robert DENG Education Position(s) Held - Singapore ...

Huijie, Robert DENG Education Position(s) Held - Singapore ...

Huijie, Robert DENG Education Position(s) Held - Singapore ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

.<br />

Jan 1984 - Dec 1985 Research Assistant<br />

Illinois Institute of Technology, Chicago, Illinois, USA<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

Mar 1982 - Dec 1982 Teaching Assistant<br />

Beijing University of Aeronautics & Astronautics, Beijing, China<br />

Nov 2009 - Nov 2012 Guest Professor, Wuhan University, Wuhan, China<br />

.<br />

.<br />

.<br />

Journal Articles (Refereed)<br />

.<br />

1. "Detecting node replication attacks in wireless sensor networks: theory and approaches", by Wen<br />

Tao ZHU, Jianying ZHOU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO, 2012, 5, 5, Journal of Security<br />

and Communication Networks, Wiley, InterScience, 496-507<br />

.<br />

2. "TruRepec: A trust-behavior-based reputation and recommender system for mobile applications",<br />

by Zheng YAN, Peng ZHANG, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 5, 16, Journal of Personal and<br />

Ubiquitous Computing, Springer, 485-506<br />

.<br />

3. "HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud<br />

computing", by Zhiguo WAN, June LIU, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 7, 2, IEEE Transactions<br />

on Information Forensics and Security (TIFS), 732-754<br />

.<br />

4. "A Survey on Privacy Frameworks for RFID Authentication", by Chunhua SU, Yingjiu LI, Yunlei<br />

ZHAO, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Yiming ZHAO, and Jianying ZHOU, 2012, 95-D, 1, IEICE<br />

Transactions, 2-11<br />

.<br />

5. "Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain Systems", by Qiang YAN,<br />

Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 1, 1, International Journal of RFID Security and<br />

Cryptography, 25-35<br />

.<br />

6. "Detecting node replication attacks in wireless sensor networks: a survey", by Wen Tao ZHU,<br />

Jianying ZHOU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO, 2012, 35, 3, Journal of Network and<br />

Computer Applications, 1022-1034<br />

.<br />

7. "Enhanced authentication for commercial video services", by Xinyi HUANG, Cheng-Kang CHU,<br />

Hung-Min SUN, Jianying ZHOU, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 5, 11, Journal of Security and<br />

Communication Networks, Wiley InterScience, 1248-1259<br />

.<br />

8. "A scalable and format-compliant encryption scheme for H.264/SVC bitstreams", by Zhuo WEI,<br />

Yongdong WU, Xuhua DING, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 27, 9, Signal Processing: Image<br />

Communication, Elsevier, 1011-1024<br />

.<br />

9. "A secure and efficient discovery service system in EPCglobal network", by Jie SHI, Yingjiu LI,<br />

and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 31, 8, Computers and Security, Elsevier, 870-885<br />

.<br />

10. "Database Access Pattern Protection Without Full-shuffles", by Xuhua DING, Yanjiang YANG,<br />

and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2011, 6, 1, IEEE Transactions on Information Forensics and Security<br />

(TIFS)<br />

.<br />

11. "On two RFID privacy notions and their relations", by Yingjiu LI, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Junzuo<br />

LAI, and Changshe MA, 2011, 14, 4, ACM Transactions on Information and System Security<br />

(TISSEC), 30:1-23<br />

.<br />

12. "A zero-knowledge based framework for RFID privacy", by <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Yingjiu LI, Moti<br />

YUNG, and Yunlei ZHAO, 2011, 19, 6, Journal of Computer Security (JCS), IOS, 1109-1146<br />

.<br />

13. "Secure mobile agents with controlled resources", by Qi ZHANG, Yi MU, Minjie ZHANG, and<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 08/2011, Journal of Concurrency and Computation: Practice and<br />

Experience, 1348-1366<br />

Page 2 of 32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!