default search action
Keman Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j25]Xiaoqing Wang, Yuanjing Tian, Keman Huang, Bin Liang:
Practically implementing an LLM-supported collaborative vulnerability remediation process: A team-based approach. Comput. Secur. 148: 104113 (2025) - 2024
- [j24]Benjamin F. Madnick, Keman Huang, Stuart E. Madnick:
The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process. Inf. Secur. J. A Glob. Perspect. 33(3): 204-225 (2024) - [c37]Puwei Wang, Ruiheng Liu, Bo Liu, Keman Huang, Xiaoyong Du:
Mitigating the Data Communication Overhead in Microservice-based Data-intensive Systems. ICWS 2024: 1103-1105 - [i3]Yikuan Yan, Keman Huang, Michael D. Siegel:
ISSF: The Intelligent Security Service Framework for Cloud-Native Operation. CoRR abs/2403.01507 (2024) - [i2]Yikuan Yan, Yaolun Zhang, Keman Huang:
Depending on yourself when you should: Mentoring LLM with RL agents to become the master in cybersecurity games. CoRR abs/2403.17674 (2024) - [i1]Xiaoqing Wang, Yuanjing Tian, Keman Huang, Bin Liang:
Practically implementing an LLM-supported collaborative vulnerability remediation process: a team-based approach. CoRR abs/2409.14058 (2024) - 2022
- [j23]Leilei Qu, Ruojin Xiao, Wenchang Shi, Keman Huang, Bo Qin, Bin Liang:
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges. Comput. Secur. 122: 102891 (2022) - [j22]Keman Huang, Jilei Zhou, Shao Chen:
Being a Solo Endeavor or Team Worker in Crowdsourcing Contests? It is a Long-term Decision You Need to Make. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-32 (2022) - 2021
- [j21]Xianghui Wang, Zhiyong Feng, Keman Huang, Shizhan Chen:
Self-adaptation and distributed knowledge-based service ecosystem evolution. Concurr. Comput. Pract. Exp. 33(24) (2021) - [c36]Keman Huang, Stuart E. Madnick:
Does High Cybersecurity Capability Lead to Openness in Digital Trade? The Mediation Effect of E-Government Maturity. HICSS 2021: 1-10 - [c35]Runqiang Zang, Meiyun Zuo, Jilei Zhou, Yining Xue, Keman Huang:
Sequence and Distance Aware Transformer for Recommendation Systems. ICWS 2021: 117-124 - 2020
- [j20]Keman Huang, Jia Zhang, Wei Tan, Zhiyong Feng:
Shifting to Mobile: Network-Based Empirical Study of Mobile Vulnerability Market. IEEE Trans. Serv. Comput. 13(1): 144-157 (2020) - [c34]Keman Huang, Stuart E. Madnick:
The Next Global Financial Crisis Could Be Caused by Efforts to Prevent the Cyberattack. WEB 2020: 3-11
2010 – 2019
- 2019
- [j19]Keman Huang, Jinhui Yao, Ming Yin:
Understanding the Skill Provision in Gig Economy from A Network Perspective: A Case Study of Fiverr. Proc. ACM Hum. Comput. Interact. 3(CSCW): 132:1-132:23 (2019) - [j18]Keman Huang, Jinhui Yao, Jia Zhang, Zhiyong Feng:
When Human Service Meets Crowdsourcing: Emerging in Human Service Collaboration. IEEE Trans. Serv. Comput. 12(3): 460-473 (2019) - [j17]Keman Huang, Jia Zhang, Wei Tan, Zhiyong Feng, Shizhan Chen:
Optimizing Semantic Annotations for Web Service Invocation. IEEE Trans. Serv. Comput. 12(4): 590-603 (2019) - [c33]Keman Huang, Samuel Chinnery, Stuart E. Madnick:
Analysis of Cross-border Data Trade Restrictions using Mixture-based Clustering. AMCIS 2019 - [c32]Keman Huang, Keri Pearlson:
For What Technology Can't Fix: Building a Model of Organizational Cybersecurity Culture. HICSS 2019: 1-10 - 2018
- [j16]Xianghui Wang, Zhiyong Feng, Keman Huang:
D3L-Based Service Runtime Self-Adaptation Using Replanning. IEEE Access 6: 14974-14995 (2018) - [j15]Qi An, Zhiyong Feng, Shizhan Chen, Keman Huang:
A Green Self-Adaptive Approach for Online Map Matching. IEEE Access 6: 51456-51469 (2018) - [j14]Keman Huang, Michael D. Siegel, Stuart E. Madnick:
Systematically Understanding the Cyber Attack Business: A Survey. ACM Comput. Surv. 51(4): 70:1-70:36 (2018) - [j13]Zhuobing Han, Xiaohong Li, Keman Huang, Zhiyong Feng:
A Software Defined Network-Based Security Assessment Framework for CloudIoT. IEEE Internet Things J. 5(3): 1424-1434 (2018) - [j12]Bing Bai, Yushun Fan, Wei Tan, Jia Zhang, Keman Huang, Jing Bi:
End-to-End Web Service Recommendations by Extending Collaborative Topic Regression. Int. J. Web Serv. Res. 15(1): 89-112 (2018) - [c31]Ru Wang, Shizhan Chen, Zhiyong Feng, Keman Huang:
A Client MicroServices Automatic Collaboration Framework Based on Fine-Grained APP. SCC 2018: 25-32 - [c30]Xianghui Wang, Zhiyong Feng, Shizhan Chen, Keman Huang:
DKEM: A Distributed Knowledge Based Evolution Model for Service Ecosystem. ICWS 2018: 1-8 - [c29]Xuehao Sun, Shizhan Chen, Zhiyong Feng, Weimin Ge, Keman Huang:
A Service Annotation Quality Improvement Approach Based on Efficient Human Intervention. ICWS 2018: 107-114 - [c28]Dongxiao He, Xue Yang, Zhiyong Feng, Shizhan Chen, Keman Huang, Zhenzhu Wang, Françoise Fogelman-Soulié:
A Probabilistic Model for Service Clustering - Jointly Using Service Invocation and Service Characteristics. ICWS 2018: 302-305 - [c27]Xiaoli Hu, Zhiyong Feng, Shizhan Chen, Dongxiao He, Keman Huang:
Quantifying the Emergence of New Domains: Using Cybersecurity as a Case. KSEM (2) 2018: 324-336 - [c26]Dinan Zhang, Shizhan Chen, Qiang He, Zhiyong Feng, Keman Huang:
What Strokes to Modify in the Painting? Code Changes Prediction for Object-Oriented Software. SATE 2018: 103-119 - 2017
- [j11]Xiaocao Hu, Zhiyong Feng, Shizhan Chen, Keman Huang, Jianqiang Li, Mengchu Zhou:
Accurate Identification of Ontology Alignments at Different Granularity Levels. IEEE Access 5: 105-120 (2017) - [j10]Xianghui Wang, Zhiyong Feng, Keman Huang, Wei Tan:
An automatic self-adaptation framework for service-based process based on exception handling. Concurr. Comput. Pract. Exp. 29(5) (2017) - [c25]Haitao Yuan, Jing Bi, Jia Zhang, Wei Tan, Keman Huang:
Workload-Aware Revenue Maximization in SDN-Enabled Data Center. CLOUD 2017: 18-25 - [c24]Jianrui Lin, Zhiyong Feng, Shizhan Chen, Keman Huang, Wei Tan, Xiaohong Li:
ATM: A Framework to Support Application State Migration in Multiple Terminals Environment. SCC 2017: 188-195 - [c23]Xiaocao Hu, Zhiyong Feng, Keman Huang, Shizhan Chen:
Supporting Interoperability among Web Services Through Efficient Matching. COMPSAC (1) 2017: 557-566 - [c22]Weixin Yuan, Zhiyong Feng, Shizhan Chen, Keman Huang, Jinhui Yao:
What Biscuits to Put in the Basket? Features Prediction in Release Management for Android System. ICWS 2017: 73-80 - 2016
- [j9]Yayu Ni, Yushun Fan, Wei Tan, Keman Huang, Jing Bi:
NCSR: Negative-Connection-Aware Service Recommendation for Large Sparse Service Network. IEEE Trans Autom. Sci. Eng. 13(2): 579-590 (2016) - [c21]Keman Huang, Jinhui Yao, Jia Zhang, Zhiyong Feng:
Human-as-a-Service: Growth in Human Service Ecosystem. SCC 2016: 90-97 - [c20]Kai Zhang, Zhiyong Feng, Shizhan Chen, Keman Huang, Guiling Wang:
A Framework for Passengers Demand Prediction and Recommendation. SCC 2016: 340-347 - [c19]Jinjing Han, Zhiyong Feng, Shizhan Chen, Keman Huang:
A Framework for Permission Recommendation and Risk Evaluation Based on Skewness-Based Filtering. SCC 2016: 774-777 - [c18]Keman Huang, Jinjing Han, Shizhan Chen, Zhiyong Feng:
A Skewness-Based Framework for Mobile App Permission Recommendation and Risk Evaluation. ICSOC 2016: 252-266 - [c17]Siwen Yin, Shizhan Chen, Zhiyong Feng, Keman Huang, Dongxiao He, Peng Zhao, Michael Ying Yang:
Node-Grained Incremental Community Detection for Streaming Networks. ICTAI 2016: 585-592 - 2015
- [j8]Yi Liu, Yushun Fan, Keman Huang, Wei Tan:
Failure analysis and tolerance strategies in web service ecosystems. Concurr. Comput. Pract. Exp. 27(5): 1355-1374 (2015) - [j7]Yushun Fan, Keman Huang, Wei Tan, Yang Zhong, Jinhui Yao, Surya Nepal, Shiping Chen:
Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem. Int. J. Comput. Integr. Manuf. 28(11): 1178-1195 (2015) - [j6]Bo Liu, Keman Huang, Jianqiang Li, MengChu Zhou:
An Incremental and Distributed Inference Method for Large-Scale Ontologies Based on MapReduce Paradigm. IEEE Trans. Cybern. 45(1): 53-64 (2015) - [j5]Yang Zhong, Yushun Fan, Keman Huang, Wei Tan, Jia Zhang:
Time-Aware Service Recommendation for Mashup Creation. IEEE Trans. Serv. Comput. 8(3): 356-368 (2015) - [j4]Bofei Xia, Yushun Fan, Wei Tan, Keman Huang, Jia Zhang, Cheng Wu:
Category-Aware API Clustering and Distributed Recommendation for Automatic Mashup Creation. IEEE Trans. Serv. Comput. 8(5): 674-687 (2015) - [c16]Xiaocao Hu, Zhiyong Feng, Keman Huang, Shizhan Chen:
Classification Based Parameter Association for Non-redundant Annotation. SCC 2015: 688-695 - [c15]Xiaocao Hu, Zhiyong Feng, Shizhan Chen, Keman Huang:
Automated Clarification of Constraints in Web Services for Accurate Service Reuse. APSCC 2015: 76-91 - [c14]Bing Bai, Yushun Fan, Keman Huang, Wei Tan, Bofei Xia, Shuhui Chen:
Service Recommendation for Mashup Creation Based on Time-Aware Collaborative Domain Regression. ICWS 2015: 209-216 - [c13]Juan Chen, Zhiyong Feng, Shizhan Chen, Keman Huang, Wei Tan, Jia Zhang:
A Novel Lifecycle Framework for Semantic Web Service Annotation Assessment and Optimization. ICWS 2015: 361-368 - [c12]Keman Huang, Jia Zhang, Wei Tan, Zhiyong Feng:
An Empirical Analysis of Contemporary Android Mobile Vulnerability Market. IEEE MS 2015: 182-189 - [c11]Xiang Li, Zhiyong Feng, Keman Huang, Shizhan Chen:
Ajax API Self-adaptive Framework for End-to-end User. WWW (Companion Volume) 2015: 211-214 - 2014
- [j3]Yucong Duan, Keman Huang, Dan Chen, Yongzhi Wang, Ajay Kattepur, Wencai Du:
Service Value Broker Patterns: An Empirical Collection and Analysis. Int. J. Networked Distributed Comput. 2(1): 54-69 (2014) - [j2]Keman Huang, Yushun Fan, Wei Tan:
Recommendation in an Evolving Service Ecosystem Based on Network Prediction. IEEE Trans Autom. Sci. Eng. 11(3): 906-920 (2014) - [c10]Yayu Ni, Yushun Fan, Keman Huang, Jing Bi, Wei Tan:
Negative-Connection-Aware Tag-Based Association Mining and Service Recommendation. ICSOC 2014: 419-428 - [c9]Keman Huang, Yi Liu, Surya Nepal, Yushun Fan, Shiping Chen, Wei Tan:
A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem. ICSOC 2014: 510-517 - [c8]Yang Zhong, Yushun Fan, Keman Huang, Wei Tan, Jia Zhang:
Time-Aware Service Recommendation for Mashup Creation in an Evolving Service Ecosystem. ICWS 2014: 25-32 - [c7]Bofei Xia, Yushun Fan, Cheng Wu, Keman Huang, Wei Tan, Jia Zhang, Bing Bai:
Domain-Aware Service Recommendation for Service Composition. ICWS 2014: 439-446 - 2013
- [j1]Keman Huang, Yushun Fan, Wei Tan, Minghui Qian:
BSNet: a network-based framework for service-oriented business ecosystem management. Concurr. Comput. Pract. Exp. 25(13): 1861-1878 (2013) - [c6]Yucong Duan, Keman Huang, Ajay Kattepur, Wencai Du:
Towards Value-Driven Business Modelling Based on Service Brokerage. ICSOC Workshops 2013: 163-176 - [c5]Keman Huang, Jinhui Yao, Yushun Fan, Wei Tan, Surya Nepal, Yayu Ni, Shiping Chen:
Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All? - A Domain-Aware and Reputation-Aware Method for Service Recommendation. ICSOC 2013: 343-357 - [c4]Keman Huang, Yushun Fan, Wei Tan, Xiang Li:
Service Recommendation in an Evolving Ecosystem: A Link Prediction Approach. ICWS 2013: 507-514 - [c3]Xiang Li, Yushun Fan, Le Xin, Keman Huang, Yihang Luo, Yi Liu:
Impacts of Scheduling Algorithms in Services on Collective End-to-End Execution Time Characteristics of Web Service Workflows. SERVICES 2013: 378-385 - 2012
- [c2]Keman Huang, Yushun Fan, Wei Tan:
An Empirical Study of Programmable Web: A Network Analysis on a Service-Mashup System. ICWS 2012: 552-559 - 2011
- [c1]Keman Huang, Yushun Fan, Wei Tan:
BSNet: A Three-Layer Business Service Correlation Network Model. DASC 2011: 1117-1124
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint