List of Publications
Z. Zheng, Y. Zhang, V. Gurram, J. Salazar Useche, I. Roth, Y. Hu, Best Practices in Designing and Implementing Cloud Authentication Schemes, in the proceedings of 2nd International Conference on Cloud Computing and IOT, March 2021.
C. Shi, H. Wang, Y. Hu, Q. Qian and H. Zhao, A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing, KSII Transactions ON Internet and Information Systems, Vol. 13, No. 5, May 2019
Yan Li Chen, Hongxia Wang, Y. Hu, and Asad Malik, Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment, Journal of IEEE Access, November, 2018.
Qing Qian, Hong-Xia Wang, Y. Hu, and Lin-Na Zhou, and Jin-Feng Li, A dual fragile watermarking scheme for speech authentication, Journal of IEEE Access, November, 2018.
Q. Qian, H. Wang, Y. Hu, L. Zhou, and J. Li, A dual fragile watermarking scheme for speech authentication, Multimedia Tools and Applications, Vol. 75, Issue 21, 2016.
L. Epling, B. Hinkel, and Y. Hu, Penetration Testing in a Box, in the Proceedings of 2015 Information Security Curriculum Development Conference (InfoSecCD 15), Kennesaw, GA, USA, October 2015.
K. Kurra, B. Panda, W. Li, and
Y. Hu,
An Agent Based Approach to Perform Damage
Assessment and Recovery Efficiently After a Cyber Attack to Ensure
E-Government Database Security, in the Proceedings of 48th
Annual Hawaii International Conference on System Sciences (HICSS-48),
Hawaii, USA, January 2015.
H. Wu, H. Wang,
Y. Hu and L. Zhou,
Efficient Reversible Data Hiding Based on
Prefix Matching and Directed LSB Embedding, in the
Proceedings of 13th International Workshop on Digital-Forensics and
Watermarking (IWDW 2014), Taipei, Taiwan, October 2014,
E. Emrick and
Y. Hu,
An
Adaptive Anomaly-based Intrusion Prevention System for Databases,
in the Proceedings of 2014 IEEE International Conference on Systems, Man,
and Cybernetics (SMC2014), San Diego, USA, October 2014.
K. Kurra, B. Panda, and
Y. Hu,
A Multi-version Database Damage Assessment
Model, in the Proceedings of 10th International
Workshop on Security in Information Systems (WOSIS 2013), Angers, France,
July 2013.
Y. Hu, C. Frank, J. Walden, E.
Crawford, and D. Kasturiratna,
Mining File
Repository Accesses for Detecting Data Exfiltration Activities,
Journal of Artificial Intelligence and Soft Computing Research, Vol. 2, No.
1, 2012.
A. Howard and
Y. Hu,
An
Approach for Detecting Malicious Keyloggers, in the
Proceedings of 2012 Information
Security Curriculum Development Conference (InfoSecCD 12), Kennesaw, GA,
USA, October 2012.
K. Viet, B. Panda, and
Y. Hu,
Detecting Collaborative Insider Attacks in Information Systems,
in the Proceedings of 2012 IEEE International Conference on Systems, Man,
and Cybernetics (IEEE SMC 2012), Seoul, Korea, October 2012.
Y. Hu,
R. Hossain, P. Seye, and S. Vasireddy,
Mining Windows Registry for
Data Exfiltration Detection, in the Proceedings of 9th
International Workshop on Security in Information Systems (WOSIS 2012),
Pages: 101 � 108,
Wrocław, Poland, June 2012.
N. Ramanathan, B. Panda, and
Y. Hu,
A
Grouping Model for Prompt Agent Based Damage Assessment,
in the Proceedings of 9th International Workshop on Security in Information
Systems (WOSIS 2012), Pages: 109 � 116, Wrocław, Poland, June 2012.
E. Crawford and Y. Hu, A Multi-user Adaptive Security Application for Educational Hacking, in the Proceedings of 2011 International Conference on Education and Information Technology (ICEIT�11), Pages: 251� 256, San Francisco, CA, USA, October 2011.
Y. Hu and B. Panda, Two-dimensional Traceability Link Rule Mining for Detection of Insider Attacks, in the Proceedings of the 43th Hawaii International Conference on System Sciences (HICSS-43), Minitrack: Cyber Security and Information Intelligence Research, January, 2010.
M. Sweikata, G. Waston, C. Frank, C. Christensen, and Y. Hu, The Usability Of End User Cryptographic Products, In Proceedings of 2009 Information Security Curriculum Development Conference (InfoSecCD 09), September, 2009.
Y. Nugmanov, B. Panda and Y. Hu, Analysis of Data Dependency Based Intrusion Detection System, In the proceedings of 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'09), Montreal, Canada, July, 2009.
Y. Hu and B. Panda, A Traceability Link Mining Approach for Identifying Insider Threats, In the proceedings of 2009 Cyber Security and Information Intelligence Research Workshop, Oak Ridge National Laboratory, Oak Ridge, TN, April 2009.
M. Chagarlamudi, B. Panda, and Y. Hu, Insider Threat in Database Systems: Preventing Malicious Users’ Activities in Databases, In the Proceedings of the 6th International Conference on Information Technology: New Generations, April 2009.
Y. Hu and Brajendra Panda, Mining Inter-transaction Data Dependencies for Database Intrusion Detection, In the Proceedings of 2008 International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, December 2008.
Y. Hu and B. Panda, A Web of Trust Oriented Information Flow Network, In the Proceedings of 2007 IEEE International Conference on Knowledge Intensive Multi-Agent Systems, Apr. 2007.
Y. Hu, Z. Xiao, and B. Panda, Modeling Deceptive Information Dissemination Using a Holistic Approach, In the proceedings of the 22th ACM Symposium on Applied Computing, Mar. 2007.
Y. Hu, Z. Xiao, and B. Panda, A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data, In the proceedings of the 40th Hawaii International Conference on System Sciences, Jan. 2007.
Y. Hu and B. Panda, Modeling Propagation of Deceptive Information, In the proceedings of the Second Secure Knowledge Management Workshop, Brooklyn, NY, 2006.
Y. Hu and B. Panda, Modeling Deceptive Action in Virtual Communities, In proceedings of the Fourth International Workshop on Security in Information Systems, May 2006.
Y. Hu and B. Panda, Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems, Journal of Network and Systems Management, Vol. 13, No. 3, Sep. 2005.
J. Zhou, B. Panda, and Y. Hu, A log Independent Distributed Database Damage Assessment Model, In Proceedings of the 6th IEEE SMC Information Assurance Workshop, West Point, NY, Jun. 2005.
Y. Hu and B. Panda, Utilizing Structural Analysis of Web of Trust for Evaluating the Effect of Deceptive Data, In Proceedings of 2005 IEEE International Conference on Knowledge Intensive Multi-Agent Systems, Apr. 2005.
J. Zhou, B. Panda, and Y. Hu, Succinct and Fast Accessible Data Structures for Database Damage Assessment, In Proceedings of International Conference on Distributed Computing & Internet Technology, Bhubaneswar, India, Dec. 2004.
Y. Hu, B. Panda, and Y. Zuo, Assessing the Effect of Deceptive Data in the Web of Trust, In Proceedings of 1st NSF/NSA/AFRL workshop on Secure Knowledge Management (SKM'04), Buffalo, NY, Sep. 2004.
Y. Hu and B. Panda, Mining Data Relationships for Database Damage Assessment in a Post Information Warfare Scenario, In Proceedings of 5th IEEE SMC Information Assurance Workshop, West Point, NY, Jun. 2004.
Y. Hu and B. Panda, A Data Mining Approach for Database Intrusion Detection, In Proceedings of the 19th ACM Symposium on Applied Computing, Nicosia, Cyprus, Mar. 2004.
Y. Hu and B. Panda, Identification of Malicious Transactions in Database Systems, In Proceedings of the 7th International Database Engineering and Applications Symposium, July 2003, Hong Kong.