Et profilbilde

Professor
Rong Chunming { "honorific-suffix": "Professor", "fn": "Rong Chunming", "tel": "Telefon: 5183 2013", "email": "chunming.rong@uis.no" }

Avdeling/enhet Det teknisk- naturvitenskapelige fakultet
Institutt/senter Institutt for data- og elektroteknikk
Rom KE E-431
Hjemmeside www.chunming.net

Biography

is co-chair of IEEE Blockchain Initiative, the chair of IEEE Cloud Computing, the chair of IEEE CS STC on Blockchain, and the steering chair of IEEE Transactions on Cloud Computing (TCC). At work, he is the head of the ICT innovation centre CIPSI at the University of Stavanger (UiS) and is also an adjunct Senior Scientist leading Big-Data at the IRIS research institute in Norway. In 2017, he co-founded two start-ups Dataunitor.com and bitYoga.com. He was the vice president of CSA Norway Chapter (2016-2017). His research work focuses on data science, cloud computing, security and privacy. He is an IEEE senior member and is honoured as member of the Norwegian Academy of Technological Sciences (NTVA) since 2011. He has extensive contact network and projects in both the industry and academic. He is also founder and Steering Chair of IEEE CloudCom conference and workshop series. He is the steering chair and associate editor of the IEEE Transactions on Cloud Computing (TCC), and co-Editors-in-Chief of the Journal of Cloud Computing (ISSN: 2192-113X) by Springer. His patent on cloud security is recently awarded in USA and Canada, then acquired by a security software company in Norway. Prof. Rong has extensive experience in managing large-scale R&D projects funded by both industry and funding agencies, both in Norway and EU.    

Forskningsområder

Cloud Computing, Data Science, Energy Informatics, Security and Privacy

Utvalgte publikasjoner

INTERNATIONAL PATENTS:

·        Patent No. US20120269348 & PCT/EP2010/066386 (Approved in August 2014): Chunming Rong and Gansen Zhao: SYSTEM FOR PROTECTING AN ENCRYPTED INFORMATION UNIT

BOOKS & BOOK CHAPTERS:

(1)    Erdal Cayirci and Chunming Rong, ?Security in Wireless Ad Hoc, Sensor and Mesh Networks?, John Wiley & Sons, 2009, ISBN 978-0-470-02748-6.

(2)    Martin G. Jaatun, Gansen Zhao, Chunming Rong, ?Lecture Note for Computer Science (Springer) ?Cloud Computing?, Proc. of the first international conference, CloudCom 2009, Beijing, December 1-4, 2009, ISSN 0302-9743, ISBN 978-3-642-10664-4.

(3)    Chunming Rong, Martin G. Jaatun, Frode Eika Sandnes, Laurence T.Yang, Jianhua Ma, ?Lecture Note for Computer Science  ? Autonomic and Trusted Computing?, Proceedings of 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008,  Springer, ISSN 0302-9743, ISBN 978-3-540-69294-2.

(4)    Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence T. Yang, Jianhua Ma, ?Lecture Note for Computer Science  ? Ubiquitous Intelligent Computing?, Proceedings of 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Springer, ISSN 0302-9743, ISBN 978-3-540-69292-8.

(5)    Chunming Rong and Erdal Cayirci, ?Wireless Network Security?, Chapter 11, pp. 169-182, Computer and Information Security Handbook, by John R. Vacca (Editor). Morgan Kaufmann (Elsevier Science), 2009. ISBN: 9780123743541.

(6)    Chunming Rong and Erdal Cayirci, ?RFID Security?, Chapter 13, pp. 205-222, Computer and Information Security Handbook, by John R. Vacca (Editor). Morgan Kaufmann (Elsevier Science), 2009. ISBN: 9780123743541.

 

JOURNAL PAPERS:

(1)    Gansen Zhao, Zhongjie Ba, Jiahua Du, Xinming Wang, Ziliu Li, Chunming Rong, and Changqin Huang. 2015. Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data. Int. J. Data Warehous. Min. 11, 3 (July 2015), 49-67. DOI=10.4018/IJDWM.2015070103 http://dx.doi.org/10.4018/IJDWM.2015070103

(2)    Cheng, Hongbing; Rong, Chunming; Hwang, Kai; Wang, Weihong; Li, Yanyan. Secure big data storage and sharing scheme for cloud tenants. China Communications 2015 ;Volume 12.(6) p. 106-115

(3)    Zhao, Gansen; Ba, Zhongjie; Du, Jiahua; Wang, Xinming; Li, Ziliu; Rong, Chunming; Huang, Changqin. Resource constrained data stream clustering with concept drifting for processing sensor data. International Journal of Data Warehousing and Mining 2015 ;Volume 11.(3) p. 49-67

(4)    Zheng, Xianghan; zeng, zhipeng; Chen, Zheyi; Yu, Yuanlong; Rong, Chunming. Detecting spammers on social networks. Neurocomputing 2015 ;Volume 159. p. 27-34

(5)    Zheng, Xianghan; Zhang, Xueying; Yu, Yuanlong; Kechadi, Tahar; Rong, Chunming. ELM-based spammer detection in social networks. Journal of Supercomputing 2015. p. 1-15. DOI: 10.1007/s11227-015-1437-5

(6)    Esteves, Rui Paulo Maximo Pereira Mateu; Hacker, Thomas; Rong, Chunming. A new approach for accurate distributed cluster analysis for Big Data: competitive K-Means. International Journal of Big Data Intelligence 2014 ;Volume 1.(1-2) p. 50-64

(7)    Jaatun, Martin Gilje; Bernsmed, Karin; Rong, Chunming. Security Governance and SLAs in Cloud Computing. International Journal of Cloud Computing 2014 ;Volume 3.(1)

(8)    Rong, Chunming; Zhao, Gansen; Cayirci, Erdal; Hongbing, Cheng. RFID Security. I: Network and System Security. Elsevier 2014 ISBN 978-0-12-416689-9. p. 353-380

(9)    Rong, Chunming; Zhao, Gansen; Yan, Liang; Cayirci, Erdal; Hongbing, Cheng. Wireles Network Security. I: Network and System Security. Elsevier 2014 ISBN 978-0-12-416689-9. p. 291-319

(10) Xianghan Zheng, Nan Chen, Zheyi Chen, Chunming Rong, Guolong Chen, Wenzhong Guo, "Mobile Cloud Based Framework for Remote-Resident Multimedia Discovery and Access," Journal of Internet Technology, ISSN 1607-9264, Vol. 15 No. 6, PP. 1043-1050, November 2014.

(11) Dehua Chen, Changgan Shen, Yue Li, Jiajin Le, Chunming Rong, "Efficient Top-k Similarity Join of Massive Time Series Using MapReduce," Journal of Internet Technology, Vol. 15 No. 6, PP. 1025-1032, November 2014.

(12) Quan Zhou, Deqin Xiao, Yi Tang, Chunming Rong, "Trusted Big Data Capture and Transport Architecture for,Wireless Sensor Network", Journal of Internet Technology, Vol. 15 No.6, PP. 1033-1041, November 2014.

(13) Quan Zhou, Daixian Wu, Chunming Tang, Chunming Rong: STSHC: secure and trusted scheme for Hadoop cluster. International Journal of High Performance Systems Architecture, ISSN 1751-6528, 5(1): pp.63-69, 2014.

(14) Son Thanh Nguyen, Erdal Cayirci, Chunming Rong: A secure many-to-many routing protocol for wireless sensor and actuator networks, Security and Communication Networks, ISSN: 1939-0122, 7(1): pp.88-98, 2014.

(15) Chunming Rong, Son Thanh NguyenMartin Gilje Jaatun: Beyond lightning: A survey on security challenges in cloud computingComputers & Electrical Engineering 39(1): 47-54 (2013)

(16) Jianguo LiGansen Zhao, Chunming Rong, Yong TangSemantic description of scholar-oriented social network cloudThe Journal of Supercomputing, 65(1): 410-425 (2013). ISSN 0920-8542.

(17) Gansen Zhao, Chunming Rong, Martin G. Jaatun, Frode E. Sandnes, ?Reference deployment models for eliminating user concerns on cloud security?, in Journal of Supercomputing, Volume 61, Number 2, pp. 337-352,  August 2012, ISSN 0920-8542.

(18) Chunming Rong ,Son T. Nguyen, Martin G. Jaatun, ?Beyond lightning: A survey on security challenges in cloud computing?, Computers & Electrical Engineering, Elsevier, May, 2012.

(19) Sun, Lili; Wang, Hua; Soar, Jeffrey; Rong, Chunming. Purpose Based Access Control for Privacy Protection in E-Healthcare Services. Journal of Software 2012 ;Volum 7.(11) s. 2443-2449

(20) Wlodarczyk, Tomasz Wiktor; Han, Yi; Yu, Xiao; Rong, Chunming. Evaluation of some optimisation techniques for semantic query answering on shared?nothing architecture. International Journal of Space-Based and Situated Computing (IJSSC) 2012 ;Volum 2.(1) s. 12-22

(21) Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua; Zeng, Qingkai. Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing. Chinese journal of electronics 2012 ;Volum 21.(2) s. 254-259

(22) Dingyi Pei, Junwu Dong, and Chunming Rong, ?A novel key pre-distribution scheme for wireless distributed sensor networks?, in Science in China Series F: Information Sciences, pp 288-298, Vol. 53, No. 2, 2010, ISSN:1009-2757.

(23) Gansen Zhao, Chunming Rong, Jiale Liu, Hai Liu, Feng Zhang, Xiaoping Ye, Na Tang, Yong Tang, ?Modeling User Growth for Cloud Scalability and Availability?, in Journal of Internet Technology, Special issue on ?Security and Privacy in Cloud Computing?, Vol. 11, Number 3, 2010, ISSN 1607-9264.

(24) Trygve Eftestøl, Kari Anne Haaland Thorsen, Erlend Tøssebro, and Chunming Rong, Petter Andreas Steen, ?Representing resuscitation data - Considerations on efficient analysis of quality of cardiopulmonary resuscitation?, in Resuscitation journal, ISSN 0300-9572, Vol. 80, No. 3, pp. 311-317, 2009.

(25) Kari Anne Haaland Thorsen, Trygve Eftestøl, Erlend Tøssebro, and Chunming Rong, Petter Andreas Steen, ?Using Ontologies to Integrate and Share Resuscitation Data from Diverse Medical Devices?, in Resuscitation journal, ISSN 0300-9572, Vol. 80, No. 5, pp. 511-516, 2009.

(26) Son T. Nguyen, Erdal Cayirci, Liang Yan, Chunming Rong, ?A Shadow Zone Aware Routing Protocol for Acoustic Underwater Sensor Networks?, IEEE Communications Letters, ISSN: 1089-7798, Vol. 13 (5), pp. 366-368, May 2009.

(27) Yan Liang and Chunming Rong, ?Strengthen RFID Tags Security Using New Data Structure?, in International Journal of Control and Automation, pp.51-58, Vol.1, 2008, ISSN 2005-4297.

(28) Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong, ?Protection against unauthorized access and computer crime in Norwegian enterprises?; in Journal of Computer Security, pp.341-366, ISSN 0926-227X , Vol. 16, Number 3, IOS Press, 2008.

(29) Christian Veigner, Chunming Rong, ?Flooding Attack of the Binding Cache in Mobile IPv6?; in E-business and Telecommunication Networks. Volume III. pp. 187-200. 2007. ISSN 1865-0929. ISBN 9783540759928.

(30) Geng Yang, Chunming Rong, Jian-gang Sheng, Jiangtao Wang ?A Novel Approach to Role-Based Access Control?; in Chinese Journal of Electronics (in English), Vol. 16 No. 1, pp. 1-6, 2007.

(31) Geng Yang, Chunming Rong, Christian Veigner, Jiangtao Wang, Hongbing Cheng, ?Identity-Based Key Agreement and Encryption For Wireless Sensor Networks?, in International Journal of Computer Science and Network Security, Vol. 6  No. 5  pp. 182-189, 2006.

(32) Geng Yang, Jian-gang Sheng, Chunming Rong, ?Theoretical Research on Role Based Access Control? (in Chinese with English title and abstract); in Journal of Nanjing University  of Posts and Telecommunications (Natural Science), ISSN 1673-5439, Vol.26, No.3, (Sum. No. 104), June 2006.

(33) Anne Marie Hegland, Eli Winjum, Stig F. Mjølsnes, Chunming Rong, Øivind Kure, Pål Spilling,?A Survey of Key Management in ad hoc Networks?; in the IEEE Communications Surveys & Tutorials,  ISSN 1553-877X,  pp. 48-66, Vol. 8, No.3, 3rd quarter issue of 2006.

CONFERENCE PROCEEDING PAPERS:        

(1)    Chakravorty, Antorweep; Rong, Chunming; Evensen, Pål; Wlodarczyk, Tomasz Wiktor. A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage. I: Proceedings of 2014 International Conference on Smart Computing (SMARTCOMP 2014); 3-5 November 2014 Hong Kong, China. IEEE Computer Society 2014 ISBN 978-1-4799-5711-8. p. 229-236

(2)    Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong: A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare, Intercloud. IEEE IC2E 2014: 424-431, IEEE proceedings.

(3)    Aryan TaheriMonfared, Chunming Rong: Flexible building blocks for software defined network function virtualization. QSHINE 2014: 37-43, IEEE proceedings.

(4)    Bing Lin, Wenzhong Guo, Xianghan Zheng, Hong Zhang, Chunming Rong, Guolong Chen, Optimization scheduling for scientific applications with different priorities across multiple clouds, IEEE CloudCom 2014, Singapore, pp. 769-774, IEEE proceedings, ISBN 978-1-4799-4093-6/14.

(5)    Bikash Agrawal, A. Chakravorty, Chunming Rong, T. W. Wlodarczyk, R2Time: a framework to analyse OpenTSDB timeseries data in HBase, IEEE CloudCom 2014, Singapore, pp. 970-975, IEEE, ISBN 978-1-4799-4093-6/14.

(6)    Girma Kejela, Rui Maximo Esteves, and Chunming Rong, Predictive Analytics of Sensor Data Using Distributed Machine Learning Techniques, IEEE CloudCom 2014, Singapore, pp. 626-631, IEEE, ISBN 978-1-4799-4093-6/14.

(7)    Ming HaoTomasz Wiktor Wlodarczyk, Chunming Rong: Performance Analysis and Optimization of Map Only Left Outer Join. AINA Workshops 2013: 625-631

(8)    Byambajav, Byambajargal; Wlodarczyk, Tomasz Wiktor; Rong, Chunming; LePendu, Paea; Shah, Nigam. Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size. In: 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2012). IEEE Computer Society 2012 ISBN 978-0-7695-4652-0. s. 1075-1080

(9)    Cayirci, Erdal; Rong, Chunming; Koczur, Maciej; Hwang, Kai. A Multi-Criteria Design Scheme for Service Federating Inter-cloud Applications. In: CloudCom 2012 : IEEE proceedings, ISBN 978-1-4673-4509-5. s. 129-134

(10) Esteves, Rui Paulo Maximo Pereira Mateu; Hacker, Thomas; Rong, Chunming. Cluster Analysis for the Cloud: Parallel Competitive Fitness and Parallel K-means++ for Large Dataset Analysis. In: CloudCom 2012 : IEEE conference proceedings 2012 ISBN 978-1-4673-4509-5. s. 177-184

(11) Liu, Jin; Rong, Chunming; Zhao, Gansen. A Fast Estimation of Shortest Path Distance for Power-Law Network Predominant Cloud Service. In: CloudCom 2012. IEEE proceedings 2012 ISBN 978-1-4673-4509-5. s. 480-487

(12) Pearson, Siani; Tountopoulos, Vasilis; Catteddu, Daniele; Südholt, Mario; Molva, Refik; Reich, Christoph; Fischer-Hübner, Simone; Millard, Christopher; Jaatun, Martin Gilje; Leenes, Ronald; Rong, Chunming; Lopez, Javier. Accountability for Cloud and Other Future Internet Services. In: CloudCom 2012 : IEEE conference proceedings 2012 ISBN 978-1-4673-4509-5. s. 629-632

(13) Rong, Chunming; Cheng, Hongbing. A Secure Data Access Mechanism for Cloud Tenants. In: CLOUD COMPUTING 2012, Proceedings of the Third International Conference on Cloud Computing, GRIDs, and Virtualization, July 22-27, 2012, Nice, France. International Academy, Research and Industry Association (IARIA) 2012 ISBN 978-1-61208-216-5. s. 113-119

(14) Rong, Chunming; Cheng, Hongbing. Authenticated Health Monitoring Scheme for Wireless Body Sensor Networks. In: Proceedings of 7th International Conference on Body Area Networks (Bodynets) 2012. Association for Computing Machinery (ACM) 2012 ISBN 978-1-936968-60-2. s. 31-35

(15) Yang, Geng; Zhou, Qiang; Xu, Xiaolong; Xu, Jian; Rong, Chunming. A Novel Identity-Based Key Management and Encryption Scheme for Distributed System. In: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings. Springer 2012 ISBN 978-3-642-35361-1. s. 123-138

Pågående forskning

* Triangulum ? The Three Point Project / Demonstrate. Disseminate. Replicate, Principle Investigator on Data Hub, 2015-2019, an IA-project under H2020-SCC-2014: Smart Cities and Communities.

* A4Cloud ? Accountability For Cloud and Other Future Internet Services, Principle Investigator on Evidence WP, 2012-2016, EU FP7 IP in ICT-2011-8-1.4: Trustworthy ICT.

* Safer@Home ? Smart System to Support Safer Independent Living and Social Interaction for Elderly at Home, Project Manager, 2011-2015, VERDIKT.
* ERAC ? Efficient and Robust Architecture for the Big Data Cloud, leader of secure cloud WP, 2012-2016, VERDIKT.

* SEEDS ? Self-learning Energy Efficient,BuilDings and open Spaces, Leader on Data Hub and Demo at UiS, 2011-2014, EU FP7 STREP in EeB-ICT-2011.6.4.

* SCC-Computing ? Strategic collaboration with China on super-computing based on Tianhhe-1A, the world?s most powerful super-computer, WP leader on cloud computing, 2012-2013, EU FP7 CSA in ICT-2011.3.4: Computing Systems.

* IDP-DC ? Integrated Data Processing in Drilling and Completion, Project Manager, 2008-2012, SUPTEK.
* IOHN
? Integrated Operation for the High North, member of the Board of Directors, 2008-2011, Join Industrial Project.

* AutoConRig ? Semi-autonomous control system for unmanned drilling rigs, WP leader, 2008-2011, PETROMAKS.
* IS-OIL
? Information Security in Integrated Operations for Oil & Gas, Academic Investigator, 2009-2011, PETROMAKS.
* IS-Home
? Integrated IP-based Service for Home environment, Project Manager, 2007-2010, VERDIKT.
* SWACOM
? Secure and reliable Wireless and Ad-hoc COMmunications, Project Manager, 2005-2009, VERDIKT.

* GeoPlayGround Development Program ? Develop data processing architecture for oil and gas applications, 2011, VRI

Arbeidserfaring

1998- , Head & Professor, Center for IP-based Service Innovation (CIPSI), UiS
                2015- , Adjunct
Chief Scientist, (Big-Data Initiative), IRIS
                2013- , Chair, IEEE Computer Society STC on Cloud Computing
                2015- , IEEE Computer Society steering representative in IEEE Cloud Computing

                2009- , Steering Chair, Cloud Computing Association (CloudCom.org)
                2011- 2014, Advisor, SINTEF ICT (Software Security, Trondheim)
                2011-2014, Visiting Chair Professor, Tsinghua University, China

                2005-2009, Adjunct Professor, University of Oslo, Norway

Vitenskapelige publikasjoner (fra CRISTin)

  • Agrawal, Bikash; Surbiryala, Jayachander; Chunming, Rong (2017). Resource Allocation in Cloud-Based Distributed Cameras. I: 2017 IEEE International Congress on Big Data (BigData Congress). IEEE conference proceedings. ISBN 978-1-5386-1996-4. s. 153-160.
  • Agrawal, Bikash; Wiktorski, Tomasz; Chunming, Rong (2017). Adaptive real-time anomaly detection in cloud infrastructures. Concurrency and Computation. ISSN 1532-0626. DOI: 10.1002/cpe.4193.
  • Chakravorty, Antorweep; Chunming, Rong (2017). Ushare: user controlled social media based on blockchain. I: 11th ACM International Conference on Ubiquitous Information Management and Communication (ACM IMCOM). Association for Computing Machinery (ACM). ISBN 978-1-4503-4888-1.
  • Chakravorty, Antorweep; Chunming, Rong; Jayaram, K.R.; Tao, Shu (2017). Scalable, Efficient Anonymization with INCOGNITO - Framework & Algorithm. I: 2017 IEEE International Congress on Big Data (BigData Congress). IEEE conference proceedings. ISBN 978-1-5386-1996-4. s. 39-48.
  • Chen, Xing; Chen, Shihong; Zeng, Xuee; Zheng, Xianghan; Zhang, Ying; Chunming, Rong (2017). Framework for context-aware computation offloading in mobile cloud computing. Journal of Cloud Computing - Advances, Systems and Applications. ISSN 2192-113X. Volum 6. Hefte 1. DOI: 10.1186/s13677-016-0071-y.
  • Hacker, Thomas; Pais, Rui; Chunming, Rong (2017). A Markov Random Field Based Approach for Analyzing Supercomputer System Logs. IEEE Transactions on Cloud Computing. ISSN 2168-7161. Volum PP. Hefte 99. s. 1-1. DOI: 10.1109/TCC.2017.2678473.
  • Agrawal, Bikash; Chakravorty, Antorweep; Wiktorski, Tomasz; Chunming, Rong (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning. I: Proceedings of the 9th International Conference on Utility and Cloud Computing. Association for Computing Machinery (ACM). ISBN 978-1-4503-4616-0. s. 196-201.
  • Agrawal, Bikash; Hansen, Raymond; Chunming, Rong; Wiktorski, Tomasz (2016). SD-HDFS: Secure Deletion in Hadoop Distributed File System. I: Proceedings 2016 IEEE International Congress on Big Data, 27 June - 2 July 2016 San Francisco, California, USA. IEEE. ISBN 978-1-5090-2622-7. s. 181-189.
  • Agrawal, Bikash; Wiktorski, Tomasz; Chunming, Rong (2016). Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis. I: Proceedings of 2016 15th International Symposium on Parallel and Distributed Computing. IEEE. ISBN 978-1-5090-4152-7.
  • Chen, Xinjiao; Li, Chunlei; Chunming, Rong (2016). Perfect Gaussian integer sequences from cyclic difference sets. IEEE International Symposium on Information Theory. Proceedings. ISSN 2157-8095. Volum 2016-August. s. 115-119. DOI: 10.1109/ISIT.2016.7541272.
  • Chunming, Rong; Hongbing, Cheng; Jaatun, Martin Gilje (2016). Securing Big Data in the Cloud by Protected Mapping over Multiple Providers. I: Digital Media Industry & Academic Forum (DMIAF), 4-6 July, 2016. IEEE conference proceedings. ISBN 978-1-5090-1000-4. s. 166-171.
  • Hong, Xin; Zhang, HuiZhen; Chunming, Rong (2016). Mobile contact synchronous with cloud server. Applied Soft Computing. ISSN 1568-4946. DOI: http://dx.doi.org/10.1016/j.asoc.2015.06.049.
  • Xiao, Chengwei; Ye, Jiaqi; Esteves, Rui Paulo Maximo Pereira Mateu; Chunming, Rong (2016). Using Spearman's correlation coefficients for exploratory data analysis on big dataset. Concurrency and Computation. ISSN 1532-0626. Volum 28. Hefte 14. s. 3866-3878. DOI: 10.1002/cpe.3745.
  • Yu, Yuanlong; Zhifan, Ye; Zheng, Xianghan; Chunming, Rong (2016). An efficient cascaded method for network intrusion detection based on extreme learning machines. Journal of Supercomputing. ISSN 0920-8542. DOI: 10.1007/s11227-016-1766-z.
  • Zhang, Feng; Gong, Ti; Lee, Victor; Zhao, Gansen; Chunming, Rong; Qu, Guangzhi (2016). Fast algorithms to evaluate collaborative filtering recommender systems. Knowledge-Based Systems. ISSN 0950-7051. Volum 96. DOI: 10.1016/j.knosys.2015.12.025.
  • Agrawal, Bikash; Chakravorty, Antorweep; Rong, Chunming; Wlodarczyk, Tomasz Wiktor (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase. IEEE International Conference on Cloud Computing Technology and Science. ISSN 2330-2186. Volum 2015-February. Hefte February. s. 970-975. DOI: 10.1109/CloudCom.2014.84.
  • Agrawal, Bikash; Wiktorski, Tomasz; Chunming, Rong (2015). Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model. I: Cloud Computing and Big Data. Springer Publishing Company. ISBN 978-3-319-28429-3. s. 232-246.
  • An, Dongyun; Zheng, Xianghan; Chen, ChongCheng; Chunming, Rong; Kechadi, Tahar (2015). Gaussian Mixture Model Based Interest Prediction In Social Networks. I: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science, Vancouver, Canada, 30. November-3. December, 2015. IEEE. ISBN 978-1-4673-9560-1. s. 196-201.
  • Chen, Jiangyong; Zheng, Xianghan; Chunming, Rong (2015). Survey on Software-Defined Networking. I: Cloud Computing and Big Data. Springer Publishing Company. ISBN 978-3-319-28429-3. s. 115-124.
  • Chen, Jiangyong; Zheng, Xianghan; Chunming, Rong (2015). Survey on software-defined networking. Lecture Notes in Computer Science. ISSN 0302-9743. Volum 9106. s. 115-124. DOI: 10.1007/978-3-319-28430-9_9.
  • Cheng, Hongbing; Rong, Chunming; Hwang, Kai; Wang, Weihong; Li, Yanyan (2015). Secure big data storage and sharing scheme for cloud tenants. China Communications. ISSN 1673-5447. Volum 12. Hefte 6. s. 106-115. DOI: 10.1109/CC.2015.7122469.
  • Cheng, Hongbing; Rong, Chunming; Yang, Geng; Zeng, Qingkai (2015). Secure data storage scheme for cloud tenants based on encrypted data storage path mapping. Journal of Nanjing University of Posts and Telecommunications. ISSN 1673-5439. Volum 35. Hefte 3. s. 89-96. DOI: 10.14132/j.cnki.1673-5439.2015.03.014.
  • Cheng, Jie; Chunming, Rong; Ye, Huijuan; Zheng, Xianghan (2015). Risk Management Using Big Real Time Data. I: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science, Vancouver, Canada, 30. November-3. December, 2015. IEEE. ISBN 978-1-4673-9560-1. s. 542-547.
  • Kejela, Girma; Chunming, Rong (2015). Cross-Device Consumer Identification. I: Data Mining Workshop (ICDMW), 2015 IEEE International Conference on. IEEE Press. ISBN 978-1-4673-8492-6.
  • Kejela, Girma; Esteves, Rui Paulo Maximo Pereira Mateu; Rong, Chunming (2015). Predictive analytics of sensor data using distributed machine learning techniques. IEEE International Conference on Cloud Computing Technology and Science. ISSN 2330-2186. Volum 2015-February. Hefte February. s. 626-631. DOI: 10.1109/CloudCom.2014.44.
  • Li, Kun; Zheng, Xianghan; Chunming, Rong (2015). Machine Learning Based Scalable and Adaptive Network Function Virtualization. I: Multi-disciplinary Trends in Artificial Intelligence. Springer Publishing Company. ISBN 978-3-319-26180-5. s. 397-404.
  • Selsaas, Lars Ropeid; Agrawal, Bikash; Chunming, Rong; Wiktorski, Tomasz (2015). AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics. I: Data Mining Workshop (ICDMW), 2015 IEEE International Conference on. IEEE Press. ISBN 978-1-4673-8492-6. s. 1705-1709.
  • TaheriMonfared, Aryan; Rong, Chunming (2015). Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants. I: Wired/Wireless Internet Communications - 13th International Conference, WWIC 2015. Springer. ISBN 978-3-319-22571-5. s. 165-179.
  • Ye, Jiaqi; Xiao, Chengwei; Esteves, Rui Paulo Maximo Pereira Mateu; Chunming, Rong (2015). Time Series Similarity Evaluation Based on Spearman’s Correlation Coefficients and Distance Measures. I: Cloud Computing and Big Data. Springer Publishing Company. ISBN 978-3-319-28429-3. s. 319-331.
  • Zhao, Gansen; Ba, Zhongjie; Du, Jiahua; Wang, Xinming; Li, Ziliu; Rong, Chunming; Huang, Changqin (2015). Resource constrained data stream clustering with concept drifting for processing sensor data. International Journal of Data Warehousing and Mining. ISSN 1548-3924. Volum 11. Hefte 3. s. 49-67. DOI: 10.4018/IJDWM.2015070103.
  • Zheng, Xianghan; zeng, zhipeng; Chen, Zheyi; Yu, Yuanlong; Rong, Chunming (2015). Detecting spammers on social networks. Neurocomputing. ISSN 0925-2312. Volum 159. s. 27-34. DOI: 10.1016/j.neucom.2015.02.047.
  • Zheng, Xianghan; Zhang, Xueying; Yu, Yuanlong; Kechadi, Tahar; Rong, Chunming (2015). ELM-based spammer detection in social networks. Journal of Supercomputing. ISSN 0920-8542. Volum 72. Hefte 8. s. 2991-3005. DOI: 10.1007/s11227-015-1437-5.
  • Agrawal, Bikash; Chakravorty, Antorweep; Rong, Chunming; Wlodarczyk, Tomasz Wiktor (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase. I: CloudCom 2014, IEEE 6th International Conference on Cloud Computing Technology and Science, Singapore, 15-18. December, 2014. IEEE. ISBN 978-1-4799-4093-6. s. 970-975.
  • Chakravorty, Antorweep; Rong, Chunming; Evensen, Pål; Wlodarczyk, Tomasz Wiktor (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage. I: Proceedings of 2014 International Conference on Smart Computing (SMARTCOMP 2014); 3-5 November 2014 Hong Kong, China. IEEE. ISBN 978-1-4799-5711-8. s. 229-236.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud. I: Proceedings of IEEE International Conference on Cloud Engineering (IC2E 2014); 10–14 March 2014, Boston, Massachusetts. IEEE. ISBN 978-1-4799-3766-0. s. 424-431.
  • Chen, Dehua; Shen, Changgan; Li, Yue; Le, Jiajin; Rong, Chunming (2014). Efficient top-k similarity join of massive time series using MapReduce. Journal of Internet Technology. ISSN 1607-9264. Volum 15. Hefte 6. s. 1025-1032. DOI: 10.6138/JIT.2014.15.6.13.
  • Cheng, Hongbing; Wang, Weihong; Chunming, Rong (2014). Privacy Protection Beyond Encryption for Cloud Big Data. I: Information Technology and Electronic Commerce (ICITEC), 2014 2nd International Conference on. IEEE Press. ISBN 978-1-4799-5298-4. s. 188-191.
  • Esteves, Rui Paulo Maximo Pereira Mateu; Hacker, Thomas; Rong, Chunming (2014). A new approach for accurate distributed cluster analysis for Big Data: competitive K-Means. International Journal of Big Data Intelligence. ISSN 2053-1397. Volum 1. Hefte 1-2. s. 50-64. DOI: 10.1504/IJBDI.2014.063844.
  • Hong, Xin; Chunming, Rong (2014). Cloud data integration sharing and service. I: World Congress on Computer Applications and Information Systems (WCCAIS), 2014. IEEE conference proceedings. ISBN 978-1-4799-3350-1.
  • Hong, Xin; Chunming, Rong (2014). Multiple Data Integration Service. I: Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. IEEE conference proceedings. ISBN 978-1-4799-2652-7. s. 860-865.
  • Kejela, Girma; Esteves, Rui Paulo Maximo Pereira Mateu; Rong, Chunming (2014). Predictive Analytics of Sensor Data Using Distributed Machine Learning Techniques. I: CloudCom 2014, IEEE 6th International Conference on Cloud Computing Technology and Science, Singapore, 15-18. December, 2014. IEEE. ISBN 978-1-4799-4093-6. s. 626-631.
  • Lin, Bing; Guo, Wenzhong; Zhang, Hong; Rong, Chunming; Chen, Guolong (2014). Optimization scheduling for scientific applications with different priorities across multiple clouds. I: CloudCom 2014, IEEE 6th International Conference on Cloud Computing Technology and Science, Singapore, 15-18. December, 2014. IEEE. ISBN 978-1-4799-4093-6. s. 769-774.
  • Nguyen, Son Thanh; Cayirci, Erdal; Rong, Chunming (2014). A secure many-to-many routing protocol for wireless sensor and actuator networks. Security and Communication Networks. ISSN 1939-0114. Volum 7. Hefte 1. s. 88-98. DOI: 10.1002/sec.548.
  • Rong, Chunming; Zhao, Gansen; Cayirci, Erdal; Hongbing, Cheng (2014). RFID Security. I: Network and System Security. Elsevier. ISBN 978-0-12-416689-9. s. 353-380.
  • Rong, Chunming; Zhao, Gansen; Yan, Liang; Cayirci, Erdal; Hongbing, Cheng (2014). Wireles Network Security. I: Network and System Security. Elsevier. ISBN 978-0-12-416689-9. s. 291-319.
  • TaheriMonfared, Aryan; Rong, Chunming (2014). Flexible Building Blocks for Software Defined Network Function Virtualization. I: Proceedings of the 2014 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. IEEE. ISBN 978-1-63190-025-9. s. 37-43.
  • Zheng, Xianghan; Chen, Nan; Chen, Zheyi; Rong, Chunming; Chen, Guolong; Guo, Wenzhong (2014). Mobile cloud based framework for remote-resident multimedia discovery and access. Journal of Internet Technology. ISSN 1607-9264. Volum 15. Hefte 6. s. 1043-1050. DOI: 10.6138/JIT.2014.15.6.15.
  • Zhou, Quan; Wu, Daixian; Tang, Chunming; Chunming, Rong (2014). STSHC: secure and trusted scheme for Hadoop cluster. International Journal of High Performance Systems Architecture. ISSN 1751-6528. Volum 5. Hefte 1. s. 63-69. DOI: 10.1504/IJHPSA.2014.059874.
  • Zhou, Quan; Xiao, Deqin; Tang, Yi; Rong, Chunming (2014). Trusted big data capture and transport architecture for wireless sensor network. Journal of Internet Technology. ISSN 1607-9264. Volum 15. Hefte 6. s. 1033-1041. DOI: 10.6138/JIT.2014.15.6.14.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Privacy Preserving Data Analytics for Smart Homes. I: Security and Privacy Workshops (SPW), 2013 IEEE. IEEE. ISBN 978-1-4799-0458-7. s. 23-27.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes. I: 2013 IEEE International Conference on Cloud Computing Technology and Science. IEEE. ISBN 978-0-7695-5095-4. s. 705-710.
  • Esteves, Rui Paulo Maximo Pereira Mateu; Hacker, Thomas; Rong, Chunming (2013). Competitive K-means: a new accurate and distributed k-means algorithm for large datasets. I: 2013 IEEE International Conference on Cloud Computing Technology and Science. IEEE. ISBN 978-0-7695-5095-4. s. 17-24.
  • Hao, Ming; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Performance Analysis and Optimization of Map Only Left Outer Join. I: IEEE 27th International Conference on Advanced Information Networking and Applications Workshops. IEEE. ISBN 978-1-4673-6239-9. s. 625-631.
  • Li, Jianguo; Zhao, Gansen; Rong, Chunming; Tang, Yong (2013). Semantic description of scholar-oriented social network cloud. Journal of Supercomputing. ISSN 0920-8542. Volum 65. Hefte 1. s. 410-425. DOI: 10.1007/s11227-010-0550-8.
  • Quan, Zhou; Xiao, Deqin; Tang, Chunming; Rong, Chunming (2013). TSHC: Trusted Scheme for Hadoop Cluster. I: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies. IEEE. ISBN 978-1-4799-2140-9. s. 344-349.
  • Rong, Chunming; Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor (2013). A map reduce based K-anonymization solution for sharing of smart home data. I: Proceeding of Norwegian Information Security Conference / Norsk informasjonssikkerhetskonferanse - NISK 2013 - Stavanger, 18th-20th November 2013. Akademika forlag. ISBN 978-82-321-0366-9. s. 70-75.
  • Rong, Chunming; Nguyen, Son Thanh; Jaatun, Martin Gilje (2013). Beyond lightning: A survey on security challenges in cloud computing. Computers & electrical engineering. ISSN 0045-7906. Volum 39. Hefte 1. s. 47-54. DOI: 10.1016/j.compeleceng.2012.04.015.
  • Rong, Chunming; Zhao, Gansen; Yan, Liang; Cayirci, Erdal; Hongbing, Cheng (2013). RFID Security. I: Computer and information security. Morgan Kaufmann Publishers. ISBN 978-0-12-394397-2. s. 345-361.
  • Rong, Chunming; Zhao, Ganzen; Yan, Liang; Cayirci, Erdal; Hongbing, Cheng (2013). Wireless Network Security. I: Computer and information security. Morgan Kaufmann Publishers. ISBN 978-0-12-394397-2. s. 285-300.
  • Rong, Chunming; Zhou, Quan; Chakravorty, Antorweep (2013). On Access Control Schemes for Hadoop Data Storage. I: Proceedings International Conference on Cloud Computing and Big Data. IEEE. ISBN 978-1-4799-2830-9.
  • TaheriMonfared, Aryan; Rong, Chunming (2013). Multi-tenant Network Monitoring Based on Software Defined Networking. Lecture Notes in Computer Science. ISSN 0302-9743. Volum 8185. s. 327-341.
  • TaheriMonfared, Aryan; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework. I: 2013 IEEE International Conference on Cloud Computing Technology and Science. IEEE. ISBN 978-0-7695-5095-4. s. 258-265.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Evidence for Accountable Cloud Computing Services. IFIP WG 11.11 on Trust Management. ISSN 2079-2247.
  • Xu, Lingshan; Zheng, Xianghan; Rong, Chunming (2013). Trust Evaluation based Content Filtering in Social Interactive Data. I: Proceedings International Conference on Cloud Computing and Big Data. IEEE. ISBN 978-1-4799-2830-9. s. 538-542.
  • Zhang, Feng; Rong, Chunming; Zhao, Gansen; Wu, Jinxia; Wu, Xiangning (2013). Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data. I: Proceedings International Conference on Cloud Computing and Big Data. IEEE. ISBN 978-1-4799-2830-9.
  • Zhao, Gansen; Wang, Haiyu; Rong, Chunming; Tang, Yong (2013). Resource Pool Oriented Trust Management for Cloud Infrastructure. I: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, 2-6 September 2013. IEEE. ISBN 978-0-7695-5008-4. s. 268-273.
  • Zheng, Xianghan; Ye, Hui; Tang, Chunming; Rong, Chunming; Chen, Guolong (2013). A Survey on Cloud Accountability. I: Proceedings International Conference on Cloud Computing and Big Data. IEEE. ISBN 978-1-4799-2830-9. s. 627-632.
  • Zhao, Gansen; Rong, Chunming; Jaatun, Martin Gilje; Sandnes, Frode Eika (2012). Reference deployment models for eliminating user concerns on cloud security. Journal of Supercomputing. ISSN 0920-8542. Volum 61. Hefte 2. s. 337-352. DOI: 10.1007/s11227-010-0460-9.
  • Byambajav, Byambajargal; Wlodarczyk, Tomasz Wiktor; Rong, Chunming; LePendu, Paea; Shah, Nigam (2012). Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size. I: 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2012). IEEE. ISBN 978-0-7695-4652-0. s. 1075-1080.
  • Cayirci, Erdal; Rong, Chunming; Koczur, Maciej; Hwang, Kai (2012). A Multi-Criteria Design Scheme for Service Federating Inter-cloud Applications. I: CloudCom 2012 : Fourth IEEE International Conference on Cloud Computing Technology and Science, Proceedings, Taipei, Taiwan, December 3-6, 2012. IEEE conference proceedings. ISBN 978-1-4673-4509-5. s. 129-134.
  • Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua; Zeng, Qingkai (2012). Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing. Chinese journal of electronics. ISSN 1022-4653. Volum 21. Hefte 2. s. 254-259.
  • Esteves, Rui Paulo Maximo Pereira Mateu; Hacker, Thomas; Rong, Chunming (2012). Cluster Analysis for the Cloud: Parallel Competitive Fitness and Parallel K-means++ for Large Dataset Analysis. I: CloudCom 2012 : Fourth IEEE International Conference on Cloud Computing Technology and Science, Proceedings, Taipei, Taiwan, December 3-6, 2012. IEEE conference proceedings. ISBN 978-1-4673-4509-5. s. 177-184.
  • Liu, Jin; Rong, Chunming; Zhao, Gansen (2012). A Fast Estimation of Shortest Path Distance for Power-Law Network Predominant Cloud Service. I: CloudCom 2012 : Fourth IEEE International Conference on Cloud Computing Technology and Science, Proceedings, Taipei, Taiwan, December 3-6, 2012. IEEE conference proceedings. ISBN 978-1-4673-4509-5. s. 480-487.
  • Pearson, Siani; Tountopoulos, Vasilis; Catteddu, Daniele; Südholt, Mario; Molva, Refik; Reich, Christoph; Fischer-Hübner, Simone; Millard, Christopher; Jaatun, Martin Gilje; Leenes, Ronald; Rong, Chunming; Lopez, Javier (2012). Accountability for Cloud and Other Future Internet Services. I: CloudCom 2012 : Fourth IEEE International Conference on Cloud Computing Technology and Science, Proceedings, Taipei, Taiwan, December 3-6, 2012. IEEE conference proceedings. ISBN 978-1-4673-4509-5. s. 629-632.
  • Rong, Chunming; Cheng, Hongbing (2012). A Secure Data Access Mechanism for Cloud Tenants. I: CLOUD COMPUTING 2012, Proceedings of the Third International Conference on Cloud Computing, GRIDs, and Virtualization, July 22-27, 2012, Nice, France. International Academy, Research and Industry Association (IARIA). ISBN 978-1-61208-216-5. s. 113-119.
  • Rong, Chunming; Cheng, Hongbing (2012). Authenticated Health Monitoring Scheme for Wireless Body Sensor Networks. I: Proceedings of 7th International Conference on Body Area Networks (Bodynets) 2012. Association for Computing Machinery (ACM). ISBN 978-1-936968-60-2. s. 31-35.
  • Sun, Lili; Wang, Hua; Soar, Jeffrey; Rong, Chunming (2012). Purpose Based Access Control for Privacy Protection in E-Healthcare Services. Journal of Software. ISSN 1796-217X. Volum 7. Hefte 11. s. 2443-2449. DOI: 10.4304/jsw.7.11.2443-2449.
  • Wlodarczyk, Tomasz Wiktor; Han, Yi; Yu, Xiao; Rong, Chunming (2012). Evaluation of some optimisation techniques for semantic query answering on shared–nothing architecture. International Journal of Space-Based and Situated Computing (IJSSC). ISSN 2044-4893. Volum 2. Hefte 1. s. 12-22. DOI: 10.1504/IJSSC.2012.045567.
  • Yang, Geng; Zhou, Qiang; Xu, Xiaolong; Xu, Jian; Rong, Chunming (2012). A Novel Identity-Based Key Management and Encryption Scheme for Distributed System. I: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings. Springer. ISBN 978-3-642-35361-1. s. 123-138.
  • Cayirci, Erdal; Rong, Chunming (2011). Intercloud for Simulation Federations. I: High Performance Computing and Simulation (HPCS), 2011 International Conference on. IEEE. ISBN 978-1-61284-380-3.
  • Cheng, Hongbing; Rong, Chunming; Yang, Geng (2011). Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks. Advanced Information Networking and Applications. ISSN 1550-445X. s. 475-480. DOI: 10.1109/AINA.2011.18.
  • Demchenko, Yuri; Ngo, Canh; de Laat, Cees; Rong, Chunming; Wlodarczyk, Tomasz Wiktor; Ziegler, Wolfgang (2011). Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services. I: Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on. IEEE. ISBN 978-0-7695-4622-3. s. 255-263.
  • Esteves, Rui Paulo Maximo Pereira; Pais, Rui; Rong, Chunming (2011). K-means Clustering in the Cloud -- A Mahout Test. I: Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on. IEEE. ISBN 978-1-61284-829-7. s. 514-519.
  • Esteves, Rui Paulo Maximo Pereira; Rong, Chunming (2011). Using Mahout for Clustering Wikipedia’s Latest Articles: A Comparison between K-means and Fuzzy C-means in the Cloud. I: Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on. IEEE. ISBN 978-0-7695-4622-3. s. 565-569.
  • Hsu, Ching-Hsien; Chen, Shih-Chang; Lee, Chih-Chun; Chang, Hsi-Ya; Li, Kuan-Ching; Rong, Chunming (2011). Energy-Aware Task Consolidation Technique for Cloud Computing. I: Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on. IEEE. ISBN 978-0-7695-4622-3. s. 115-121.
  • Nguyen, Son Thanh; Ghebregiorgish, Semere Tsehaye; Nour Hafiz, Alabbasi; Rong, Chunming (2011). Integer Factorization Using Hadoop. I: Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on. IEEE. ISBN 978-0-7695-4622-3. s. 628-633.
  • Rong, Chunming; Eggen, Skjalg; Hongbing, Cheng (2011). A novel intrusion detection algorithm for wireless sensor networks. I: Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on. IEEE Press. ISBN 978-1-4577-0786-5.
  • Rong, Chunming; Eggen, Skjalg; Hongbing, Cheng (2011). An Efficient Intrusion Detection Algorithm for Wireless Sensor networks. Communications in Computer and Information Science. ISSN 1865-0929. Volum 187. s. 116-129. DOI: 10.1007/978-3-642-22365-5_15.
  • Wlodarczyk, Tomasz Wiktor; Han, Yi; Rong, Chunming (2011). Performance Analysis of Hadoop for Query Processing. I: Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on. IEEE. ISBN 978-1-61284-829-7. s. 507-513.
  • Wlodarczyk, Tomasz Wiktor; LePendu, Paea; Shah, Nigam; Rong, Chunming (2011). Position Paper: Scaling-out the NCBO Resource Index Processing and Maintenance. CEUR Workshop Proceedings. ISSN 1613-0073. Volum 736.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). An Initial Survey on Integration and Application of Cloud Computing to High Performance Computing. I: Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on. IEEE. ISBN 978-0-7695-4622-3. s. 612-617.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). Applying SWRL-F to Intercloud Constraints Analysis. I: High Performance Computing and Simulation (HPCS), 2011 International Conference on. IEEE. ISBN 978-1-61284-380-3. s. 391-396.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming; O'Connor, Martin; Musen, Mark A. (2011). SWRL-F: a fuzzy logic extension of the semantic web rule language. I: Proceedings of WIMS '11, International Conference on Web Intelligence, Mining. ACM Publications. ISBN 978-1-4503-0148-0.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming; Wåge, Dagfinn (2011). Challenges in Healthcare and Welfare Intercloud. I: Digital Content, Multimedia Technology and its Applications (IDCTA), 2011 7th International Conference on. IEEE. ISBN 978-1-4577-0473-4.
  • Yan, Liang; Guo, Hongbo; Chen, Min; Rong, Chunming; Leung, Victor (2011). Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System. Lecture Notes in Computer Science. ISSN 0302-9743. Volum 6827. s. 243-250. DOI: 10.1007/978-3-642-23041-7_23.
  • Li, Jin; Zhao, Gansen; Chen, Xiaofeng; Xie, Dongqing; Rong, Chunming; Tang, Lianzhang; Tang, Yong (2010). Fine-grained data access control systems with user accountability in cloud computing. I: 2nd IEEE International Conference on Cloud Computing Technology and Science - CloudCom 2010. IEEE. ISBN 978-0-7695-4302-4. s. 89-96.
  • Pei, DingYi; Dong, JunWu; Rong, Chunming (2010). A novel key pre-distribution scheme for wireless distributed sensor networks. Science in China Series F: Information Sciences. ISSN 1009-2757. Volum 53. Hefte 2. s. 288-298. DOI: 10.1007/s11432-010-0005-0.
  • Rong, Chunming; Esteves, Rui Máximo Esteves (2010). Social impact of privacy in cloud computing. I: 2nd IEEE International Conference on Cloud Computing Technology and Science - CloudCom 2010. IEEE. ISBN 978-0-7695-4302-4. s. 593-596.
  • Rong, Chunming; Jia, Baodong; Wlodarczyk, Tomasz Wiktor (2010). Performance Considerations of Data Acquisition in Hadoop System. I: 2nd IEEE International Conference on Cloud Computing Technology and Science - CloudCom 2010. IEEE. ISBN 978-0-7695-4302-4. s. 545-549.
  • Rong, Chunming; Yan, Liang (2010). Tag content access control with identity-based key exchange. I: International Conference on Numerical Analysis and Applied Mathematics,ICNAAM 2010, Rhodes, Greece, 19-25 September, 2010. American Institute of Physics (AIP). ISBN 9780735408319. s. 297-300.
  • Sun, Wei; Xiong, Naixue; Yang, Laurence T.; Rong, Chunming (2010). Towards free task overloading in passive replication based real-time multiprocessors. I: The 10th IEEE International Conference on Computer and Information Technology, CIT 2010 : Bradford, West Yorkshire 29 June - 1 July, 2010. IEEE. ISBN 9780769541082. s. 1735-1742.
  • Wlodarczyk, Tomasz Wiktor; OConnor, Martin; Rong, Chunming; Musen, Mark A. (2010). SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language. CEUR Workshop Proceedings. ISSN 1613-0073. Volum 654. s. 97-100.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2010). On the sustainability impacts of cloud-enabled cyber physical space. I: 2nd IEEE International Conference on Cloud Computing Technology and Science - CloudCom 2010. IEEE. ISBN 978-0-7695-4302-4. s. 597-602.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming; Jia, Baodong; Nyulas, Csongor I; Musen, Mark A. (2010). DataStorm - An Ontology-Driven Framework for Cloud-Based Data Analytic Systems. I: 2010 IEEE 6th World Congress on Services : SERVICES 2010, 5-10 July 2010, Miami, Florida, USA. IEEE. ISBN 9780769541297. s. 123-127.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming; Nyulas, Csongor I; Musen, Mark A. (2010). An efficient approach to intelligent real-time monitoring using ontologies and Hadoop. I: Deployment models: Towards eliminating security concerns from cloud computing. IEEE Press. ISBN 9781424468270. s. 209-215.
  • Yan, Liang; Rong, Chunming (2010). Tag Content Access Control with Identity-based Key Exchange. AIP Conference Proceedings. ISSN 0094-243X. Volum 1281. s. 297-300.
  • Zhao, Gan-Sen; Rong, Chunming; Liu, Jia-Le; Liu, Hai; Zhang, Feng; Ye, Xiao-Ping; Tang, Na; Tang, Yong (2010). Modeling User Growth for Cloud Scalability and Availability. Journal of Internet Technology. ISSN 1607-9264. Volum 11. Hefte 3. s. 395-405.
  • Zhao, Gansen; Rong, Chunming; Jaatun, Martin Gilje; Sandnes, Frode Eika (2010). Deployment models: Towards eliminating security concerns from cloud computing. I: Deployment models: Towards eliminating security concerns from cloud computing. IEEE Press. ISBN 9781424468270. s. 189-195.
  • Zhao, Gansen; Rong, Chunming; Zhang, Feng; Tang, Yong (2010). Trusted data sharing over untrusted cloud storage providers. I: 2nd IEEE International Conference on Cloud Computing Technology and Science - CloudCom 2010. IEEE. ISBN 978-0-7695-4302-4. s. 97-103.
  • Cayirci, Erdal; Nguyen, Son; Rong, Chunming (2009). Secure Many to Many Routing for Wireless Sensor and Actuator Networks. I: Proceedings of the 2nd international conference on Security of information and networks. ACM Press. ISBN 978-1-60558-412-6. s. 172-178.
  • Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor (2009). Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and It's Security Challenges. I: Cloud Computing. Springer. ISBN 9783642106644. s. 57-68.
  • Cui, Zhenping; Zhao, Gansen; Rong, Chunming; Sun, Wei; Zhang, Feng (2009). Improving Network Locality Awareness for BitTorrent. I: Proceeding of the 4th International Conference on Pervasive Computing and Applications (ICPCA2009). IEEE. ISBN 9781424452286. s. 455-460.
  • Eftestøl, Trygve; Thorsen, Kari Anne Haaland; Tøssebro, Erlend; Rong, Chunming; Steen, Petter Andreas (2009). Representing resuscitation data - Considerations on efficient analysis of quality of cardiopulmonary resuscitation. Resuscitation. ISSN 0300-9572. Volum doi:10.1016/j.resusc.
  • Esteves, Rui Máximo Esteves; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2009). Bayesian Networks for Fault Detection under Lack of Historical Data. I: The International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN 2009). IEEE. ISBN 978-0-7695-3908-9. s. 732-736.
  • Hu, Duan; Wang, Furong; Huang, Chen; Rong, Chunming (2009). A Novel Relay Encryption Scheme for Mobile Ad hoc Networks. I: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with The UIC2009 and ATC 2009 Conferences. IEEE. ISBN 978-0-7695-3737-5. s. 417-422.
  • Nguyen, Son Thanh; Cayirci, Erdal; Yan, Liang; Rong, Chunming (2009). A Shadow Zone Aware Routing Protocol for Acoustic Underwater Sensor Networks. IEEE Communications Letters. ISSN 1089-7798. Volum 13. Hefte 5. s. 366-368. DOI: 10.1109/LCOMM.2009.090278.
  • Nguyen, Son; Cayirci, Erdal; Yan, Liang; Rong, Chunming (2009). Shadow Zone Aware Routing Protocol for Tactical Acoustic Undersea Surveillance Networks. I: Proceeding of MilCom 2009, Boston, USA. IEEE Press. ISBN 9781424452392.
  • Rong, Chunming (2009). An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf. I: Cloud Computing. Springer. ISBN 9783642106644. s. 19-23.
  • Rong, Chunming; Cayirci, Erdal (2009). RFID Security. I: Computer and information security handbook. Morgan Kaufmann Publishers. ISBN 978-0-12-374354-1. s. 205-221.
  • Rong, Chunming; Cayirci, Erdal (2009). Wireless network security. I: Computer and information security handbook. Morgan Kaufmann Publishers. ISBN 978-0-12-374354-1. s. 169-182.
  • Rong, Chunming; Thorsen, Kari Anne Haaland; Wlodarczyk, Tomasz Wiktor (2009). Industrial Cloud: Toward Inter-Enterprise Integration. I: Cloud Computing. Springer. ISBN 9783642106644. s. 460-471.
  • Thorsen, Kari Anne Haaland; Eftestøl, Trygve; Rong, Chunming; Steen, Petter Andreas (2009). An Integrated Information Sharing Structure for Resuscitation Data. I: Proceedings of the 23rd International Conference on Advanced Information Networking and Applications - Workshops. IEEE computer society. ISBN 9780769536392. s. 8-12.
  • Thorsen, Kari Anne Haaland; Eftestøl, Trygve; Tøssebro, Erlend; Rong, Chunming; Steen, Petter Andreas (2009). Using Ontologies to Integrate and Share Resuscitation Data from Diverse Medical Devices. Resuscitation. ISSN 0300-9572. Volum 80. Hefte 5. s. 511-516.
  • Thorsen, Kari Anne Haaland; Torbjørnsen, Odd Frode; Rong, Chunming (2009). Automatic Web Service Detection in Oil and Gas. I: Communication and Networking. Springer. ISBN 9783642108433. s. 193-200.
  • Yan, Liang; Rong, Chunming; Zhao, Gansen (2009). Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-based Cryptography. I: Cloud Computing. Springer. ISBN 9783642106644. s. 167-177.
  • Hagen, Janne Merete; Sivertsen, Tormod Kalberg; Rong, Chunming (2008). Protection against unauthorized access and computer crime in Norwegian enterprises. Journal of Computer Security. ISSN 0926-227X. Volum 16. Hefte 3. s. 341-366.
  • Hagen, Janne Merete; Sivertsen, Tormod Kalberg; Rong, Chunming (2008). Protection against unauthorized access and computer crime in Norwegian enterprises. Journal of Computer Security. ISSN 0926-227X. Volum 16. Hefte 3. s. 341-366.
  • Kawashima, Tomomi; Ma, Jianhua; Apduhan, Bernady O.; Huang, Runhe; Rong, Chunming (2008). A System Prototype with Multiple Robots for Finding u-Objects in a Smart Space. I: Proceeding of International Conference on Embedded Software and Systems. IEEE. s. 229-236.
  • Lu, Zhengxin; Huang, Chen; Wang, Furong; Rong, Chunming (2008). SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. I: Autonomic and Trusted Computing. Springer. s. 134-148.
  • Thorsen, Kari Anne Haaland; Rong, Chunming (2008). Data Integration in Oil and Gas at Norwegian Continetal Shelf. I: Proceedings of the 22rd International Conference on Advanced Information Networking and Applications - Workshops. IEEE.
  • Thorsen, Kari Anne Haaland; Rong, Chunming (2008). On Ubiquitous Integrated Computing. International Journal of Computer Science and Applications. ISSN 0972-9038. Volum 5. Hefte 3. s. 46-55.
  • Thorsen, Kari Anne Haaland; Rong, Chunming (2008). Towards Dataintegration from WITSML to ISO 15926. I: Ubiquitous Intelligence and Computing. Springer. s. 626-635.
  • Wang, Furong; Huang, Chen; Zhao, Jing; Rong, Chunming (2008). IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. I: 22nd International Conference on Advanced Information Networking and Applications (aina 2008). IEEE. s. 978-984.
  • Wang, Yi; Wang, Furong; Rong, Chunming; Wang, Sufang (2008). SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. I: Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd International Conference on. IEEE. s. 639-643.
  • Xu, Kui; Zhang, Fan; Rong, Chunming; Dai, Bin; Huang, Benxiong (2008). Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding. I: FGCN 2008 : Future Generation Communication and Networking. IEEE. s. 321-328.
  • Yan, Liang; Rong, Chunming (2008). RFID System Security Using Identity-Based Cryptography. I: Ubiquitous Intelligence and Computing. Springer. s. 482-489.
  • Yang, Tao; Huang, Ye; Chen, Jianxin; Yang, Geng; Rong, Chunming (2008). Di-GAFR: Directed Greedy Adaptive Face-Based Routing. I: Autonomic and Trusted Computing. Springer. s. 555-566.
  • Yee, George O.M.; Rong, Chunming; Yang, Laurence T. (2008). Journal of Computer Security: Guest Editors' Introduction. Journal of Computer Security. ISSN 0926-227X. Hefte 16. s. 261-264.
  • Yu, Xin; Rong, Chunming; Huang, Benxiong (2008). A Flexible Garbage Collect Algorithm for Flash Storage Management. I: Future Generation Communication and Networking, 2008. FGCN '08. Second International Conference on. IEEE. s. 354-357.
  • Hagen, Janne Merete; Sivertsen, Tormod Kalberg; Rong, Chunming (2007). Information Security Threats and Access Control Practices in Norwegian Businesses. Advanced Information Networking and Applications. ISSN 1550-445X. Volum 21. Hefte 1. s. 470-476.
  • Meling, Hein; Rong, Chunming; Wåge, Dagfinn (2007). Towards Integrated Services for Health Monitoring. Advanced Information Networking and Applications. ISSN 1550-445X. Volum 21. Hefte 2. s. 776-781.
  • Nguyen, Son Thanh; Rong, Chunming (2007). Electronic Payment Scheme Using Identity-Based Cryptography. Lecture Notes in Computer Science. ISSN 0302-9743. Volum Volume 4582/2007. s. 330-337.
  • Nguyen, Son Thanh; Rong, Chunming (2007). Zigbee Security using Identity Based Cryptography. Lecture Notes in Computer Science. ISSN 0302-9743. Volum Volume 4610/2007. s. 3-12.
  • Rong, Chunming; Kim, Won-Chol (2007). Effective Storage Security in Incompletely Trusted Environment. Advanced Information Networking and Applications. ISSN 1550-445X. Volum 21. Hefte 1. s. 432-437.
  • veigner, christian; Rong, Chunming (2007). Flooding Attack on the Binding Cache in Mobile IPv6. I: E-business and Telecommunication Networks. Springer. s. 187-200.
  • Yang, Geng; Rong, Chunming; Shen, J.G.; Wang, J.T. (2007). A novel approach for role-based access control. Chinese journal of electronics. ISSN 1022-4653. Volum 16.
  • Yang, Geng; Wang, Jiangtao; Cheng, Hongbing; Rong, Chunming (2007). An Identity-Based Encryption Scheme for Broadcasting. I: 2007 IFIP International Conference on Network and Parallel Computing - Workshops (NPC 2007). IEEE. s. 123-126.
  • Hegland, Anne Marie; Winjum, Eli; Spilling, Pål; Rong, Chunming; Kure, Øyvind (2006). Analysis of IBS for MANET Security in Emergency and Rescure Operations. I: Proceedings The 20th International Conference on Advanced Information Networking and Applications - Workshop on Pervasive Computing and Ad Hoc Communications (PCAC 2006). Springer Berlin. s. 155-159.
  • Haaland, Kari Anne; Rong, Chunming (2006). Securing Web Services Using Identity-Based Encryption (IBE). I: SECRYPT 2006: International Conference on Security and Cryptography, Setúbal, Portugal, August 2006, Proceedings. Institute for Systems and Technologies of Information, Control and Communication. s. 413-418.
  • Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål (2006). Evaluation of Key Management in ad hoc Networks for Emergency and Rescue operations. I: IEEE Communications Surveys & Tutorials. IEEE Communications Society. s. 48-66.
  • Hegland, Anne Marie; Winjum, Eli; Mjølsnes, Stig Frode; Rong, Chunming; Kure, Øivind; Spilling, Pål (2006). Survey of Key Management in Ad Hoc Networks. IEEE Communications Surveys and Tutorials. ISSN 1553-877X. Volum 8. Hefte 3. s. 48-66. DOI: 10.1109/COMST.2006.253271.
  • Jiang, Peng; Yang, Geng; Rong, Chunming (2006). Combined Method for Nonlinear Systems of Equations. Lecture Notes in Computer Science. ISSN 0302-9743. Volum 3994. Hefte 2006. s. 693-699.
  • Jiang, Peng; Yang, Geng; Rong, Chunming (2006). Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method. Lecture Notes in Computer Science. ISSN 0302-9743. Volum 3991. Hefte 2006. s. 794-797.
  • Kaland, Kjell Ove; Rong, Chunming; Yang, Geng (2006). An E-Wallet System with Decentralized Management. I: Management of E-Commerce and E-Government. Nova Science Publishers, Inc..
  • Rong, Chunming (2006). Identity-Based Cryptography. I: NIK 2006 : Norsk informatikkonferanse : Avdeling for økonomi, informatikk og samfunnsfag, Høgskolen i Molde 20.-22. november 2006. Tapir Akademisk Forlag.
  • Veigner, Christian; Rong, Chunming (2006). On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. I: Proceedings The 3rd International Conference on Autonomic and Trusted Computing (ATC-06). Springer Berlin. s. 521-530.
  • Veigner, Christian; Rong, Chunming (2006). On Use of Identity-Based Encryption for Secure Emailing. I: SECRYPT 2006: International Conference on Security and Cryptography, Setúbal, Portugal, August 2006, Proceedings. Institute for Systems and Technologies of Information, Control and Communication. s. 289-296.
  • Yang, Geng; Sheng, Jian-Gang; Rong, Chunming (2006). Theoretical Research on Role Based Access Control. Journal of Nanjing University of Posts and Telecommunications. ISSN 1673-5439. Volum 26. Hefte 3.
  • Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål (2005). Evaluation of Key Management in ad hoc Networks for Emergency and Rescue Operations. I: Norsk informatikkonferanse NIK'2005. Tapir Akademisk Forlag. s. 149-152.
  • Veigner, Christian; Rong, Chunming (2005). Flooding attack of the binding cache in Mobile IPv6. I: Proc. of the 2nd International Conference on E-Business and Telecommunication Networks (ICETE). Institute for Systems and Technologies of Information, Control and Communication. s. 36-43.
  • Yang, Geng; Rong, Chunming; Peng, Lei (2005). A novel approach for redirecting module in Honeypot systems. Journal of China Universities of Posts and Telecommunications. ISSN 1005-8885. Volum 12. Hefte 3. s. 58-62.
  • Zhou, Quan; Yang, Geng; Rong, Chunming; Shen, Jiangang (2005). A Scalable Security Architecture for Grid. I: Proc. of the 6th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005). IEEE. s. 89-96.
  • Rong, Chunming; Yang, Geng (2004). A Distributed Honeypots for Grid Security. ?. Volum 3032. s. 1083-1087.
  • Mjølsnes, Stig Frode; Rong, Chunming (2003). On-line E-Wallet System with Decentralized Credential Keeper. ?. Volum 8. Hefte 1. s. 87-99.
  • Rong, Chunming (2003). On Probabilistic Scheme For Encryption Using Nonlinear Codes Mapped from Z4 Linear Codes. ?. Volum E86-A. Hefte 9. s. 2248-2250.
  • Helleseth, Tor; Rong, Chunming; Yang, Kyeongcheol (2001). New 3-Designs from Goethals Codes over Z4. Discrete Mathematics. ISSN 0012-365X. Volum 226. s. 403-409.
  • Helleseth, Tor; Rong, Chunming; Yang, Kyeongcheol (2001). On t-designs from Codes over Z4. Discrete Mathematics. ISSN 0012-365X. Volum 238. Hefte 01.mar. s. 67-80.
  • Duursma, Iwan; Helleseth, Tor; Rong, Chunming; Yang, Kyeongcheol (1999). Split weight enumerators for the Preparata Codes with applications to designs. Designs, Codes and Cryptography. ISSN 0925-1022. Volum 18. Hefte 01.mar. s. 103-124.
  • Helleseth, Tor; Rong, Chunming; Sandberg, Daniel (1999). New Families of Almost Perfect Nonlinear Power Mappings. IEEE Transactions on Information Theory. ISSN 0018-9448. Volum IT-45, No. 2. s. 475-485.
  • Helleseth, Tor; Rong, Chunming; Yang, Kyeongcheol (1999). New Infinite Families of 3-Designs from Preparata Codes over Z4. Discrete Mathematics. ISSN 0012-365X. Volum 195. s. 139-156.
  • Rong, Chunming; Helleseth, Tor; Lahtonen, Jyrki (1999). On Algebraic Decoding of the Z4-Linear Calderbank-McGuire Code. IEEE Transactions on Information Theory. ISSN 0018-9448. Volum IT-45, No. 5. s. 1423-1434.
  • Selsaas, Lars Ropeid; Agrawal, Bikash; Chunming, Rong; Wiktorski, Tomasz (2015). Data Mining Workshop (ICDMW), 2015 IEEE International Conference on. IEEE Press. ISBN 978-1-4673-8492-6. 884 s.
  • Østrem, Trond; Bolkesjø, Torjus Folsland; Rong, Chunming; Wolff, Robert; Sand, Kjell; Mathisen, Geir; Coldevin, Grete Håkonsen; Ryghaug, Marianne; Tomasgard, Asgeir; Heegaard, Poul Einar; Fosso, Olav B; Midtgård, Ole-Morten; Novakovic, Vojislav; Hovd, Morten (2015). Norwegian Smart Grid Research Strategy. The Scientific Committee of the Norwegian Smart Grid Centre. 59 s.
  • Cheng, Hongbing; Wang, Weihong; Chunming, Rong (2014). Information Technology and Electronic Commerce (ICITEC), 2014 2nd International Conference on. IEEE Press. ISBN 978-1-4799-5298-4. 325 s.
  • Hong, Xin; Chunming, Rong (2014). 2014 World Congress on Computer Applications and Information Systems (WCCAIS). IEEE Press. ISBN 978-1-4799-3350-1.
  • Hong, Xin; Chunming, Rong (2014). Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. IEEE conference proceedings. ISBN 978-1-4799-2652-7.
  • Esteves, Rui Paulo Maximo Pereira Mateu; Rong, Chunming (2013). Cluster Analysis for Big Data and Failure Detection. Universitetet i Stavanger. ISBN 978-82-7644-527-5. 139 s.
  • Rong, Chunming; Oleshchuk, Vladimir (2013). Proceeding of Norwegian Information Security Conference / Norsk informasjonssikkerhetskonferanse - NISK 2013 - Stavanger, 18th-20th November 2013. Akademika forlag. ISBN 978-82-321-0366-9. 133 s.
  • Rong, Chunming; Jaatun, Martin Gilje (2012). Message from the Cloud Computing Association – CloudCom.org.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). Handling Big Data: On Mutual Applications of Cloud Computing and Semantic Web Technologies. University of Stavanger. ISBN 978-82-7644-457-5. 118 s.
  • Chang, A.C.-C.; Li, M.; Rong, Chunming; Patrikakis, C.Z; Slezak, D. (2010). Communication and Networking. Springer. ISBN 9783642175862. 250 s.
  • Cayirci, Erdal; Rong, Chunming (2009). Security in wireless ad hoc and sensor networks. Wiley-Blackwell. ISBN 978-0-470-02748-6. 257 s.
  • Jaatun, Martin Gilje; Zhao, Gansen; Rong, Chunming (2009). Cloud Computing. Springer. ISBN 9783642106644. 707 s.
  • Cayirci, Erdal; Rong, Chunming (2008). Wireless Technologies for Automatic Meter Reading and Security Applications. Lyse Tele.
  • Rong, Chunming; Jaatun, Martin Gilje; Sandnes, Frode Eika; Yang, Laurence T.; Ma, Jianhua (2008). Proceedings of Autonomous Trusted Computing Conference 2008 (ATC’08). Springer. ISBN 3540692940. 1000 s.
  • Rong, Chunming; Liang, Yan (2008). GSM and UMTS Jamming. Lyse Tele.
  • Sandnes, Frode Eika; Zhang, Yang; Rong, Chunming; Yang, Laurence T.; Ma, Jianhua (2008). Lecture Note for Computer Science - Ubiquitous Intelligent Computing. Springer. ISBN 9783540692928.
  • Rong, Chunming (2004). NIK'2004. ISBN 8251920043.
  • Veigner, Christian; Rong, Chunming (2004). A new protocol for location management in Mobile IPv6. ISBN 8251920043.
  • Wåge, Dagfinn; Calvet, Juan Carlos; Haga, Karsten; Rong, Chunming; Sandvik, Birger (2004). Security related business opportunities in IPv6. Telenor FoU. 24 s.
  • Rong, Chunming (1998). Computational Analysis in Algebraic Decoding, APN-Mappings and t-Designs. Department of Informatics, University of Bergen.
  • Rong, Chunming (2012). General Storage & Technology AS.
  • Rong, Chunming; Zhao, Gansen (2012). System for å beskytte en kryptert informasjonsenhet.
  • Rong, Chunming; Zhao, Gansen (2009). System for Protecting an Encrypted Information Unit.
  • Cao, Jiannong; Chunming, Rong (2017). Edge Computing.
  • Chakravorty, Antorweep; Chunming, Rong (2017). Ushare: user controlled social media based on blockchain. 2017-01-05 - 2017-01-07.
  • Chunming, Rong (2017). Privacy and Accountability in Data Services. 2017-08-28 - 2017-09-01.
  • Agrawal, Bikash; Chakravorty, Antorweep; Wiktorski, Tomasz; Chunming, Rong (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning. 2016-12-06 - 2016-12-09.
  • Chunming, Rong; Liu, Lu; Chen, Guolong (2016). Big data and smart computing: methodology and practice.
  • Quan, Zhou; Chunming, Tang; Xianghan, Zhen; Chunming, Rong (2015). A secure user authentication protocol for sensor network in data capturing.
  • Rong, Chunming (2015). Secure Future Services in Cloud. 2015-06-02 - 2015-06-04.
  • Rong, Chunming (2015). Viste frem fremtidens smarte byer. regjeringen.no. [Internett]; 2015-05-18.
  • Wolff, Russel; Rong, Chunming (2015). Velferdsteknologi.
  • Chakravorty, Antorweep; Rong, Chunming; Evensen, Pål; Wlodarczyk, Tomasz Wiktor (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage. 2014-11-04.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud. 2014-03-11.
  • Chen, Xing; Zhang, Ying; Huang, Gang; Zheng, Xianghan; Guo, Wenzhong; Chunming, Rong (2014). Architecture-based integrated management of diverse cloud resources.
  • Jaatun, Martin Gilje; Bernsmed, Karin; Rong, Chunming (2014). Security Governance and SLAs in Cloud Computing.
  • Rong, Chunming (2014). Furture Service Security: Data Accountability and Multitenant Monitoring. 2014-05-05 - 2014-05-07.
  • Rong, Chunming (2014). Nye tjenester gir en enklere hverdag hjemmet. NTVA;
  • Rong, Chunming (2014). Service Security in Cloud. IEEE; 2014-10-08 - 2014-10-10.
  • Rong, Chunming (2014). UiS Professor sikrer deg i nettskyen. Stavanger Aftenbladet. [Avis]; 2014-11-26.
  • TaheriMonfared, Aryan; Rong, Chunming (2014). Flexible Building Blocks for Software Defined Network Function Virtualization. 2014-08-18 - 2014-08-20.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data. 2013-11-18 - 2013-11-20.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Privacy Preserving Data Analytics for Smart Homes. 2013-05-23.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes. 2013-12-02 - 2013-12-05.
  • Leung, Victor C.M.; Wen, Yonggang; Chen, Min; Rong, Chunming (2013). Mobile cloud computing Untitled.
  • Rong, Chunming (2013). Cloud Service Security and Accountability. 2013-12-16 - 2013-12-19.
  • Rong, Chunming (2013). Safer@Home: Ny teknologi-hverdag for eldre. NITO Rogaland; 2013-04-23.
  • Jaatun, Martin Gilje; Lambrinoudakis, Costas; Rong, Chunming (2012). Special issue on security in cloud computing.
  • Rong, Chunming; Sandnes, Frode Eika; Buyya, Rajkumar (2012). Preface to special issue on Advances in Cloud Computing.
  • Cayirci, Erdal; Rong, Chunming (2011). Intercloud for Simulation Federations. 2011-07-04 - 2011-07-08.
  • Cheng, Hongbing; Rong, Chunming; Yang, Geng (2011). Design and analysis of a secure routing protocol algorithm for wireless sensor networks. 2011-03-22 - 2011-03-25.
  • Demchenko, Yuri; Ngo, Canh; de Laat, Cees; Wlodarczyk, Tomasz Wiktor; Rong, Chunming; Ziegler, Wolfgang (2011). Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services. IEEE, Cloud Computing Association; 2011-11-29 - 2011-12-01.
  • Esteves, Rui Paulo Maximo Pereira; Pais, Rui; Rong, Chunming (2011). K-means Clustering in the Cloud? A Mahout Test. 2011-03-22 - 2011-03-25.
  • Esteves, Rui Paulo Maximo Pereira; Pais, Rui; Rong, Chunming (2011). Using Mahout for Clustering Wikipedia’s Latest Articles: A Comparison between K-means and Fuzzy C-means in the Cloud. IEEE, Cloud Computing Association; 2011-11-29 - 2011-12-01.
  • Hsu, Ching-Hsien; Chen, Shih-Chang; Lee, Chih-Chun; Chang, Hsi-Ya; Li, Kuan-Ching; Rong, Chunming (2011). Energy-Aware Task Consolidation Technique for Cloud Computing. IEEE, Cloud Computing Association; 2011-11-29 - 2011-12-01.
  • Nguyen, Son Thanh; Ghebregiorgish, Semere Tsehaye; Alabbasi, Nour; Rong, Chunming (2011). Integer Factorization Using Hadoop. IEEE, Cloud Computing Association; 2011-11-29 - 2011-12-01.
  • Nguyen, Son Thanh; Rong, Chunming (2011). Cloud Trends and Security Challenges. Gjøvik University College; 2011-05-18 - 2011-05-20.
  • Rong, Chunming (2011). Cloud Data Management and It’s Security Challenges. COMADEM; 2011-05-30 - 2011-06-01.
  • Rong, Chunming (2011). Cloud Trends & Security Challenges. NISNet.no; 2011-05-22 - 2011-05-27.
  • Rong, Chunming (2011). Cloud Trends and Security Challenges. Høgskolen i Gjøvik; 2011-05-18 - 2011-05-20.
  • Rong, Chunming (2011). Hus tenker sjæl – sparer strøm. forskning.no. [Internett]; 2011-12-18.
  • Rong, Chunming (2011). SEEDS: Self-Learning Energy-Efficient builDings and open Spaces. Tsinghua University; 2011-12-16 - 2011-12-17.
  • Rong, Chunming (2011). Tar styring i huset. UniverS (Universitetet i Stavanger). [Avis]; 2011-12-12.
  • Rong, Chunming; Eggen, Skjalg; Cheng, Hongbing (2011). A Novel Intrusion Detection Algorithm for Wireless Sensor networks. 2011-02-28 - 2011-03-03.
  • Rong, Chunming; Eggen, Skjalg; Cheng, Hongbing (2011). An Efficient Intrusion Detection Algorithm for Wireless Sensor networks. 2011-06-28 - 2011-06-30.
  • Rong, Chunming; Nguyen, Son Thanh; JAATUN, Martin Gilje (2011). Beyond Lightning: A Survey on Security Challenges in Cloud Computing. Future Technology Research Association International (FTRA); 2011-12-12 - 2011-12-15.
  • Rong, Chunming; Wlodarczyk, Tomasz Wiktor (2011). Security challenges in Clouds. NATO; 2011-09-12 - 2011-09-15.
  • Rong, Chunming; Wåge, Dagfinn (2011). Bo lenger hjemme med nettbrett. forskningsradet.no. [Internett]; 2011-12-19.
  • Rong, Chunming; Wåge, Dagfinn (2011). Eldrebølgen – muligheter for omsorgsteknologi. UniverS (Universitetet i Stavanger). [Avis]; 2011-06-14.
  • Rong, Chunming; Wåge, Dagfinn (2011). Nettbrett forlenger hjemmelivet. NRK. [Internett]; 2011-12-30.
  • Rong, Chunming; Wåge, Dagfinn (2011). Nettbrett-tjenester for eldre. forskning.no. [Internett]; 2011-12-30.
  • Rong, Chunming; Wåge, Dagfinn (2011). Slik skal høgteknologi gi tryggare eldrebustader. UniverS (Universitetet i Stavanger). [Avis]; 2011-10-17.
  • Wlodarczyk, Tomasz Wiktor; Han, Yi; Rong, Chunming (2011). Performance Analysis of Hadoop for Query Processing. 2011-03-22 - 2011-03-25.
  • Wlodarczyk, Tomasz Wiktor; LePendu, Paea; Shah, Nigam; Rong, Chunming (2011). Scaling-out the NCBO Resource Index Processing and Maintenance. 2011-05-29 - 2011-05-30.
  • Wlodarczyk, Tomasz Wiktor; O'Connor, Martin; Musen, Mark A.; Rong, Chunming (2011). SWRL-F: a fuzzy logic extension of the semantic web rule language. 2011-05-25 - 2011-05-27.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). An Initial Survey on Integration and Application of Cloud Computing to High Performance Computing. IEEE, Cloud Computing Association; 2011-11-29 - 2011-12-01.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). Applying SWRL-F to Intercloud Constraints Analysis. 2011-07-04 - 2011-07-08.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). Handling Big Data - Overview of 3 Projects. Stanford BMIR; 2011-10-31.
  • Wlodarczyk, Tomasz Wiktor; Wåge, Dagfinn; Rong, Chunming (2011). Challenges in healthcare and welfare intercloud. 2011-08-16 - 2011-08-18.
  • Wåge, Dagfinn; Rong, Chunming (2011). Denne kan bli viktig for de eldre. Trønder Avisa. [Avis]; 2011-12-30.
  • Wåge, Dagfinn; Rong, Chunming (2011). Nettbrett for eldre. Ringblad.no. [Internett]; 2011-12-30.
  • Wåge, Dagfinn; Rong, Chunming (2011). Safer@Home using Cloud Computing Technology. 2011-11-08 - 2011-11-09.
  • Yan, Liang; Guo, Hongbo; Chen, Min; Rong, Chunming; Leung, Victor (2011). Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System. 2011-05-09 - 2011-09-13.
  • Rong, Chunming (2010). Trådløs usikkerhet.
  • Thorsen, Kari Anne Haaland; Eftestøl, Trygve; Rong, Chunming; Steen, Petter Andreas (2009). An Integrated Information Sharing Structure for Resuscitation Data. 2009-05-26 - 2009-05-29.
  • Rong, Chunming (2008). A Flexible Garbage Collect Algorithm for Flash Storage Management. 2008-12-13 - 2008-12-15.
  • Rong, Chunming (2008). Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding. 2008-12-13 - 2008-12-15.
  • Rong, Chunming (2008). Di-GAFR: Directed Greedy Adaptive Face-Based Routing. 2008-06-23 - 2008-06-25.
  • Rong, Chunming (2008). IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. 2008-03-25 - 2008-03-28.
  • Rong, Chunming (2008). SEMAP: Improving Multipath Security based on Attacking Point in Ad Hoc Networks. 2008-06-23 - 2008-06-25.
  • Rong, Chunming (2008). SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. 2008-03-25 - 2008-03-28.
  • Rong, Chunming (2008). Strengthen RFID Tags Security Using New Data Structure. 2008-12-13 - 2008-12-15.
  • Thorsen, Kari Anne Haaland; Rong, Chunming (2008). Data Integration in Oil and Gas at Norwegian Continental Shelf. 2008-03-25 - 2008-03-28.
  • Thorsen, Kari Anne Haaland; Rong, Chunming (2008). Towards Dataintegration from WITSML to ISO 15926. 2008-06-23 - 2008-06-25.
  • Yan, Liang; Rong, Chunming (2008). RFID System Security Using Identity-Based Cryptography. 2008-06-23 - 2008-06-25.
  • Yan, Liang; Rong, Chunming (2008). RFID System Security Using Identity-Based Cryptography. 2008-06-23 - 2008-06-25.
  • Chowdhury, Mohammad Mushfiqur R; Noll, Josef; Rong, Chunming (2007). NFR-project No. 172462/S10, SWACOM. 2007-10-29 - 2007-10-30.
  • Meling, Hein; Rong, Chunming (2007). Integrated IP-based Serivces for smart Home environment The IS-home project. 2007-10-29 - 2007-10-30.
  • Nguyen, Son Thanh; Rong, Chunming (2007). Electronic Payment Scheme Using Identity-Based Cryptography. 2007-06-28 - 2007-06-30.
  • Nguyen, Son Thanh; Rong, Chunming (2007). Zigbee Security using Identity Based Cryptography. 2007-07-11 - 2007-07-13.
  • Rong, Chunming (2007). Effective Storage Security in Incompletely Trusted Environment. 2007-05-21 - 2007-05-23.
  • Rong, Chunming (2007). How to secure web services using semantic web. 2007-04-26 - 2007-04-27.
  • Rong, Chunming (2007). Information Security Threats and Access Control Practices in Norwegian Businesses. 2007-05-21 - 2007-05-23.
  • Rong, Chunming (2007). Lettere å angripe nettbanker. [Avis]; 2007-02-05.
  • Rong, Chunming (2007). Secuirty in Semantic Web Services. Oljeindustriens Landsforening; 2007-02-06.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. Huangzhong University of Science and Technology; 2007-07-01 - 2007-07-03.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. INSA-Lyon; 2007-03-15.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. 2007-10-10.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. Lyse Tele; 2007-08-28.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. Hong Kong Baptist University; 2007-07-20.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. Chinese University of Hong Kong; 2007-07-19.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. Nanjing University of Posts and Telecommunications; 2007-07-03 - 2007-07-06.
  • Rong, Chunming (2007). Smarthjem løsning med sensor teknologi. Stavanger Næringsforening; 2007-09-06.
  • Rong, Chunming (2007). Towards Integrated Services for Health Monitoring. 2007-05-21 - 2007-05-23.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. University of Stavanger; 2007-09-19.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. ConocoPhillips; 2007-11-23.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. IBM; 2007-11-13.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Roxar; 2007-09-28.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Laerdal Medical; 2007-10-25.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Nasjonal Senter for Telemedisin; 2007-10-08.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Invenia; 2007-10-08.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Akvaplan-NIVA; 2007-10-08.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. ABB; 2007-10-15.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Kunnskapsparken; 2007-10-02.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. WestControl; 2007-12-04.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Biota Guard; 2007-10-22.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Ergo Group; 2007-11-06.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Biota Guard; 2007-10-22.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Oljeindustriens Landsforening; 2007-10-22.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Stavanger Universitetssjukehuset; 2007-10-22.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Infoteknikk; 2007-10-04.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. CapGemini; 2007-10-02.
  • Rong, Chunming (2007). Utvikler ditt trådløse hjem. [Avis]; 2007-01-11.
  • Rong, Chunming; Li, Frank Yong; Noll, Josef (2007). Secure and Reliable Wireless and Ad hoc Communications. 2007-10-29 - 2007-10-30.
  • Rong, Chunming; Liang, Yan (2007). Integrated Serivces for a Wireless Digital Home The IS-home project. 2007-10-29 - 2007-10-30.
  • Haaland, Kari Anne; Rong, Chunming (2006). Securing Web Services Using Identity-Based Encryption (IBE). 2006-08-07 - 2006-08-10.
  • Hegland, Anne Marie; Winjum, Eli; Spilling, Pål; Rong, Chunming; Kure, Øyvind (2006). Analysis of IBS for MANET Security in Emergency and Rescure Operations. 2006-04-18 - 2006-04-20.
  • Jiang, Peng; Yang, Geng; Rong, Chunming (2006). Combined Method for Nonlinear Systems of Equations. 2006-05-28 - 2006-05-31.
  • Jiang, Peng; Yang, Geng; Rong, Chunming (2006). Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method. 2006-05-28 - 2006-05-31.
  • Rong, Chunming (2006). En siktet i nettbanksvindel. [Avis]; 2006-12-28.
  • Rong, Chunming (2006). Identity-Based Cryptography. 2006-11-20 - 2006-11-22.
  • Rong, Chunming (2006). Identity-Based Cryptography. 2006-10-26.
  • Rong, Chunming (2006). Nettbanker skjerper datasikkerheten. [Avis]; 2006-12-28.
  • Rong, Chunming (2006). Nettbanker skjerper datasikkerheten. [Avis]; 2006-12-28.
  • Rong, Chunming (2006). Nettbanker skjerper datasikkerheten. [Avis]; 2006-12-28.
  • Rong, Chunming (2006). Sikkert og uten en tråd. [Avis]; 2006-03-31.
  • Rong, Chunming (2006). Sikkert og uten en tråd. [Avis]; 2006-05-04.
  • Rong, Chunming (2006). Sikkert og uten en tråd. [Avis]; 2006-03-31.
  • Rong, Chunming (2006). Søppelpost. [Radio]; 2006-10-09.
  • Veigner, Christian; Rong, Chunming (2006). On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. 2006-09-03 - 2006-09-06.
  • Veigner, Christian; Rong, Chunming (2006). On Use of Identity-Based Encryption for Secure Emailing. 2006-08-07 - 2006-08-10.
  • Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål (2005). Evaluation of Key Management in ad hoc Networks for Emergency and Rescue Operations. 2005-11-21 - 2005-11-23.
  • Rong, Chunming (2005). Hacking and Software Security. High Performance Laboratory, Tsinghua University; 2005-12-13 - 2005-12-14.
  • Rong, Chunming (2005). Hacking and Software Security. Guangzhou University; 2005-12-19 - 2005-12-20.
  • Rong, Chunming (2005). Hacking and Software Security. 2005-12-13 - 2005-12-17.
  • Rong, Chunming; Veigner, Christian (2005). Identity-Based Encryption on E-mails and Spam Vulnerabilities. 2005-11-07 - 2005-11-08.
  • Veigner, Christian; Rong, Chunming (2005). Flooding attack of the binding cache in Mobile IPv6. 2005-10-03 - 2005-10-07.
  • Veigner, Christian; Rong, Chunming (2005). Ruteoptimalisering og Sikkerhet i Mobile IPv6. 2005-06-15 - 2005-06-16.
  • Zhou, Quan; Yang, Geng; Rong, Chunming; Shen, Jiangang (2005). A Scalable Security Architecture for Grid. 2005-12-05 - 2005-12-08.
  • Rong, Chunming (2004). Digital Signatures & Protocols & Infrastructures. Nanjing University of Posts and Telecommunications; 2004-04-07.
  • Rong, Chunming (2004). Security of IP Mobility Management. 2004-10-25.
  • Rong, Chunming (2004). Security of Mobility Management in IPv6. 2004-12-23.
  • Veigner, Christian; Rong, Chunming (2004). A new Route Optimization protocol for Mobile IPv6 (ROM). 2004-12-15.
  • Kaland, Kjell Olav; Rong, Chunming (2003). Implementing a Online E-Wallet System with Decentralized Credential Keepers. 2003-10-23 - 2003-10-26.
  • Rong, Chunming; Kaland, Kjell Olav; Yang, Geng (2003). A E-Wallet System with Decentralized Management. 2003-10-28 - 2003-10-30.
  • Rong, Chunming; Yang, Geng (2003). Honeypots in Blackhat Mode and its Implications. 2003-08-27 - 2003-08-29.
  • Yang, Geng; Rong, Chunming (2003). Performance Analysis of Partition Algorithms for Parallel Solution of Nonlinear Systems of Equations. 2003-08-27 - 2003-08-29.
  • Yang, Geng; Rong, Chunming; Dai, Yunping (2003). A Distributed Honeypot System for Grid Security. 2003-12-07 - 2003-12-10.
  • Davidrajuh, Reggie; Rong, Chunming (2002). A Methodology for Tactical Design of Virtual Supply Chain for E-Tailing. 2002-10-23 - 2002-10-27.
  • Rong, Chunming (2002). On Probabilistic Scheme For Encryption Using Nonlinear Codes Mapped from Z4 Linear Codes. 2002-10-07 - 2002-10-11.
  • Rong, Chunming; Davidrajuh, Reggie (2002). A New Decentralized P2P Architecture Providing User Anonymity by Using Secret Sharing. 2002-10-23 - 2002-10-27.
  • Rong, Chunming; ukjent-for-m008249, ukjent-for-m008249 (2002). A New Decentralized P2P Architecture Providing User Anonymity by Using Secret Sharing. 2002-10-22 - 2002-10-27.
  • ukjent-for-m008249, ukjent-for-m008249; Rong, Chunming (2002). A Methodology for Tactical Design of Virtual Supply Chain for E-Tailing. 2002-10-22 - 2002-10-27.
  • Mjølsnes, Stig Frode; Rong, Chunming (2001). Localized Credentials for Server Assisted Mobile Wallet. 2001-10-16 - 2001-10-19.