Et profilbilde

Professor
Rong Chunming { "honorific-suffix": "Professor", "fn": "Rong Chunming", "tel": "Telefon: 5183 2013", "email": "chunming.rong@uis.no" }

Avdeling/enhet Det teknisk- naturvitenskapelige fakultet
Institutt/senter Institutt for data- og elektroteknikk
Rom KE E-431
Hjemmeside www.chunming.net

Biography

Prof. Chunming Rong is the head of the Center for IP-based Service Innovation (CIPSI) at the University of Stavanger (UiS) and adjunct Chief Scientist leading Big-Data Initiative at IRIS. His research work focuses on Cloud Computing, Data Science, Energy Informatics, Security and Privacy. He is an IEEE senior member and is honored as member of the Norwegian Academy of Technological Sciences (NTVA) since 2011. He has extensive contact network and projects in both the industry and academic. He is steering member of IEEE Cloud Computing and Steering Chair of IEEE CloudCom conference and workshop series. He is the co-Editors-in-Chief of the Journal of Cloud Computing (ISSN: 2192-113X) by Springer and associate editor of the IEEE Transactions on Cloud Computing (TCC). Prof. Rong is also a keynote speaker on ?Service Security in Cloud? at the IEEE CloudNet conference in Luxembourg, 2014. Prof. Rong has extensive experience in managing large-scale R&D projects funded by both industry and funding agencies, both in Norway and EU. 

Forskningsområder

Cloud Computing, Data Science, Energy Informatics, Security and Privacy

Utvalgte publikasjoner

INTERNATIONAL PATENTS:

·        Patent No. US20120269348 & PCT/EP2010/066386 (Approved in August 2014): Chunming Rong and Gansen Zhao: SYSTEM FOR PROTECTING AN ENCRYPTED INFORMATION UNIT

BOOKS & BOOK CHAPTERS:

(1)    Erdal Cayirci and Chunming Rong, ?Security in Wireless Ad Hoc, Sensor and Mesh Networks?, John Wiley & Sons, 2009, ISBN 978-0-470-02748-6.

(2)    Martin G. Jaatun, Gansen Zhao, Chunming Rong, ?Lecture Note for Computer Science (Springer) ?Cloud Computing?, Proc. of the first international conference, CloudCom 2009, Beijing, December 1-4, 2009, ISSN 0302-9743, ISBN 978-3-642-10664-4.

(3)    Chunming Rong, Martin G. Jaatun, Frode Eika Sandnes, Laurence T.Yang, Jianhua Ma, ?Lecture Note for Computer Science  ? Autonomic and Trusted Computing?, Proceedings of 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008,  Springer, ISSN 0302-9743, ISBN 978-3-540-69294-2.

(4)    Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence T. Yang, Jianhua Ma, ?Lecture Note for Computer Science  ? Ubiquitous Intelligent Computing?, Proceedings of 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Springer, ISSN 0302-9743, ISBN 978-3-540-69292-8.

(5)    Chunming Rong and Erdal Cayirci, ?Wireless Network Security?, Chapter 11, pp. 169-182, Computer and Information Security Handbook, by John R. Vacca (Editor). Morgan Kaufmann (Elsevier Science), 2009. ISBN: 9780123743541.

(6)    Chunming Rong and Erdal Cayirci, ?RFID Security?, Chapter 13, pp. 205-222, Computer and Information Security Handbook, by John R. Vacca (Editor). Morgan Kaufmann (Elsevier Science), 2009. ISBN: 9780123743541.

 

JOURNAL PAPERS:

(1)    Gansen Zhao, Zhongjie Ba, Jiahua Du, Xinming Wang, Ziliu Li, Chunming Rong, and Changqin Huang. 2015. Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data. Int. J. Data Warehous. Min. 11, 3 (July 2015), 49-67. DOI=10.4018/IJDWM.2015070103 http://dx.doi.org/10.4018/IJDWM.2015070103

(2)    Cheng, Hongbing; Rong, Chunming; Hwang, Kai; Wang, Weihong; Li, Yanyan. Secure big data storage and sharing scheme for cloud tenants. China Communications 2015 ;Volume 12.(6) p. 106-115

(3)    Zhao, Gansen; Ba, Zhongjie; Du, Jiahua; Wang, Xinming; Li, Ziliu; Rong, Chunming; Huang, Changqin. Resource constrained data stream clustering with concept drifting for processing sensor data. International Journal of Data Warehousing and Mining 2015 ;Volume 11.(3) p. 49-67

(4)    Zheng, Xianghan; zeng, zhipeng; Chen, Zheyi; Yu, Yuanlong; Rong, Chunming. Detecting spammers on social networks. Neurocomputing 2015 ;Volume 159. p. 27-34

(5)    Zheng, Xianghan; Zhang, Xueying; Yu, Yuanlong; Kechadi, Tahar; Rong, Chunming. ELM-based spammer detection in social networks. Journal of Supercomputing 2015. p. 1-15. DOI: 10.1007/s11227-015-1437-5

(6)    Esteves, Rui Paulo Maximo Pereira Mateu; Hacker, Thomas; Rong, Chunming. A new approach for accurate distributed cluster analysis for Big Data: competitive K-Means. International Journal of Big Data Intelligence 2014 ;Volume 1.(1-2) p. 50-64

(7)    Jaatun, Martin Gilje; Bernsmed, Karin; Rong, Chunming. Security Governance and SLAs in Cloud Computing. International Journal of Cloud Computing 2014 ;Volume 3.(1)

(8)    Rong, Chunming; Zhao, Gansen; Cayirci, Erdal; Hongbing, Cheng. RFID Security. I: Network and System Security. Elsevier 2014 ISBN 978-0-12-416689-9. p. 353-380

(9)    Rong, Chunming; Zhao, Gansen; Yan, Liang; Cayirci, Erdal; Hongbing, Cheng. Wireles Network Security. I: Network and System Security. Elsevier 2014 ISBN 978-0-12-416689-9. p. 291-319

(10) Xianghan Zheng, Nan Chen, Zheyi Chen, Chunming Rong, Guolong Chen, Wenzhong Guo, "Mobile Cloud Based Framework for Remote-Resident Multimedia Discovery and Access," Journal of Internet Technology, ISSN 1607-9264, Vol. 15 No. 6, PP. 1043-1050, November 2014.

(11) Dehua Chen, Changgan Shen, Yue Li, Jiajin Le, Chunming Rong, "Efficient Top-k Similarity Join of Massive Time Series Using MapReduce," Journal of Internet Technology, Vol. 15 No. 6, PP. 1025-1032, November 2014.

(12) Quan Zhou, Deqin Xiao, Yi Tang, Chunming Rong, "Trusted Big Data Capture and Transport Architecture for,Wireless Sensor Network", Journal of Internet Technology, Vol. 15 No.6, PP. 1033-1041, November 2014.

(13) Quan Zhou, Daixian Wu, Chunming Tang, Chunming Rong: STSHC: secure and trusted scheme for Hadoop cluster. International Journal of High Performance Systems Architecture, ISSN 1751-6528, 5(1): pp.63-69, 2014.

(14) Son Thanh Nguyen, Erdal Cayirci, Chunming Rong: A secure many-to-many routing protocol for wireless sensor and actuator networks, Security and Communication Networks, ISSN: 1939-0122, 7(1): pp.88-98, 2014.

(15) Chunming Rong, Son Thanh NguyenMartin Gilje Jaatun: Beyond lightning: A survey on security challenges in cloud computingComputers & Electrical Engineering 39(1): 47-54 (2013)

(16) Jianguo LiGansen Zhao, Chunming Rong, Yong TangSemantic description of scholar-oriented social network cloudThe Journal of Supercomputing, 65(1): 410-425 (2013). ISSN 0920-8542.

(17) Gansen Zhao, Chunming Rong, Martin G. Jaatun, Frode E. Sandnes, ?Reference deployment models for eliminating user concerns on cloud security?, in Journal of Supercomputing, Volume 61, Number 2, pp. 337-352,  August 2012, ISSN 0920-8542.

(18) Chunming Rong ,Son T. Nguyen, Martin G. Jaatun, ?Beyond lightning: A survey on security challenges in cloud computing?, Computers & Electrical Engineering, Elsevier, May, 2012.

(19) Sun, Lili; Wang, Hua; Soar, Jeffrey; Rong, Chunming. Purpose Based Access Control for Privacy Protection in E-Healthcare Services. Journal of Software 2012 ;Volum 7.(11) s. 2443-2449

(20) Wlodarczyk, Tomasz Wiktor; Han, Yi; Yu, Xiao; Rong, Chunming. Evaluation of some optimisation techniques for semantic query answering on shared?nothing architecture. International Journal of Space-Based and Situated Computing (IJSSC) 2012 ;Volum 2.(1) s. 12-22

(21) Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua; Zeng, Qingkai. Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing. Chinese journal of electronics 2012 ;Volum 21.(2) s. 254-259

(22) Dingyi Pei, Junwu Dong, and Chunming Rong, ?A novel key pre-distribution scheme for wireless distributed sensor networks?, in Science in China Series F: Information Sciences, pp 288-298, Vol. 53, No. 2, 2010, ISSN:1009-2757.

(23) Gansen Zhao, Chunming Rong, Jiale Liu, Hai Liu, Feng Zhang, Xiaoping Ye, Na Tang, Yong Tang, ?Modeling User Growth for Cloud Scalability and Availability?, in Journal of Internet Technology, Special issue on ?Security and Privacy in Cloud Computing?, Vol. 11, Number 3, 2010, ISSN 1607-9264.

(24) Trygve Eftestøl, Kari Anne Haaland Thorsen, Erlend Tøssebro, and Chunming Rong, Petter Andreas Steen, ?Representing resuscitation data - Considerations on efficient analysis of quality of cardiopulmonary resuscitation?, in Resuscitation journal, ISSN 0300-9572, Vol. 80, No. 3, pp. 311-317, 2009.

(25) Kari Anne Haaland Thorsen, Trygve Eftestøl, Erlend Tøssebro, and Chunming Rong, Petter Andreas Steen, ?Using Ontologies to Integrate and Share Resuscitation Data from Diverse Medical Devices?, in Resuscitation journal, ISSN 0300-9572, Vol. 80, No. 5, pp. 511-516, 2009.

(26) Son T. Nguyen, Erdal Cayirci, Liang Yan, Chunming Rong, ?A Shadow Zone Aware Routing Protocol for Acoustic Underwater Sensor Networks?, IEEE Communications Letters, ISSN: 1089-7798, Vol. 13 (5), pp. 366-368, May 2009.

(27) Yan Liang and Chunming Rong, ?Strengthen RFID Tags Security Using New Data Structure?, in International Journal of Control and Automation, pp.51-58, Vol.1, 2008, ISSN 2005-4297.

(28) Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong, ?Protection against unauthorized access and computer crime in Norwegian enterprises?; in Journal of Computer Security, pp.341-366, ISSN 0926-227X , Vol. 16, Number 3, IOS Press, 2008.

(29) Christian Veigner, Chunming Rong, ?Flooding Attack of the Binding Cache in Mobile IPv6?; in E-business and Telecommunication Networks. Volume III. pp. 187-200. 2007. ISSN 1865-0929. ISBN 9783540759928.

(30) Geng Yang, Chunming Rong, Jian-gang Sheng, Jiangtao Wang ?A Novel Approach to Role-Based Access Control?; in Chinese Journal of Electronics (in English), Vol. 16 No. 1, pp. 1-6, 2007.

(31) Geng Yang, Chunming Rong, Christian Veigner, Jiangtao Wang, Hongbing Cheng, ?Identity-Based Key Agreement and Encryption For Wireless Sensor Networks?, in International Journal of Computer Science and Network Security, Vol. 6  No. 5  pp. 182-189, 2006.

(32) Geng Yang, Jian-gang Sheng, Chunming Rong, ?Theoretical Research on Role Based Access Control? (in Chinese with English title and abstract); in Journal of Nanjing University  of Posts and Telecommunications (Natural Science), ISSN 1673-5439, Vol.26, No.3, (Sum. No. 104), June 2006.

(33) Anne Marie Hegland, Eli Winjum, Stig F. Mjølsnes, Chunming Rong, Øivind Kure, Pål Spilling,?A Survey of Key Management in ad hoc Networks?; in the IEEE Communications Surveys & Tutorials,  ISSN 1553-877X,  pp. 48-66, Vol. 8, No.3, 3rd quarter issue of 2006.

CONFERENCE PROCEEDING PAPERS:        

(1)    Chakravorty, Antorweep; Rong, Chunming; Evensen, Pål; Wlodarczyk, Tomasz Wiktor. A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage. I: Proceedings of 2014 International Conference on Smart Computing (SMARTCOMP 2014); 3-5 November 2014 Hong Kong, China. IEEE Computer Society 2014 ISBN 978-1-4799-5711-8. p. 229-236

(2)    Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong: A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare, Intercloud. IEEE IC2E 2014: 424-431, IEEE proceedings.

(3)    Aryan TaheriMonfared, Chunming Rong: Flexible building blocks for software defined network function virtualization. QSHINE 2014: 37-43, IEEE proceedings.

(4)    Bing Lin, Wenzhong Guo, Xianghan Zheng, Hong Zhang, Chunming Rong, Guolong Chen, Optimization scheduling for scientific applications with different priorities across multiple clouds, IEEE CloudCom 2014, Singapore, pp. 769-774, IEEE proceedings, ISBN 978-1-4799-4093-6/14.

(5)    Bikash Agrawal, A. Chakravorty, Chunming Rong, T. W. Wlodarczyk, R2Time: a framework to analyse OpenTSDB timeseries data in HBase, IEEE CloudCom 2014, Singapore, pp. 970-975, IEEE, ISBN 978-1-4799-4093-6/14.

(6)    Girma Kejela, Rui Maximo Esteves, and Chunming Rong, Predictive Analytics of Sensor Data Using Distributed Machine Learning Techniques, IEEE CloudCom 2014, Singapore, pp. 626-631, IEEE, ISBN 978-1-4799-4093-6/14.

(7)    Ming HaoTomasz Wiktor Wlodarczyk, Chunming Rong: Performance Analysis and Optimization of Map Only Left Outer Join. AINA Workshops 2013: 625-631

(8)    Byambajav, Byambajargal; Wlodarczyk, Tomasz Wiktor; Rong, Chunming; LePendu, Paea; Shah, Nigam. Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size. In: 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2012). IEEE Computer Society 2012 ISBN 978-0-7695-4652-0. s. 1075-1080

(9)    Cayirci, Erdal; Rong, Chunming; Koczur, Maciej; Hwang, Kai. A Multi-Criteria Design Scheme for Service Federating Inter-cloud Applications. In: CloudCom 2012 : IEEE proceedings, ISBN 978-1-4673-4509-5. s. 129-134

(10) Esteves, Rui Paulo Maximo Pereira Mateu; Hacker, Thomas; Rong, Chunming. Cluster Analysis for the Cloud: Parallel Competitive Fitness and Parallel K-means++ for Large Dataset Analysis. In: CloudCom 2012 : IEEE conference proceedings 2012 ISBN 978-1-4673-4509-5. s. 177-184

(11) Liu, Jin; Rong, Chunming; Zhao, Gansen. A Fast Estimation of Shortest Path Distance for Power-Law Network Predominant Cloud Service. In: CloudCom 2012. IEEE proceedings 2012 ISBN 978-1-4673-4509-5. s. 480-487

(12) Pearson, Siani; Tountopoulos, Vasilis; Catteddu, Daniele; Südholt, Mario; Molva, Refik; Reich, Christoph; Fischer-Hübner, Simone; Millard, Christopher; Jaatun, Martin Gilje; Leenes, Ronald; Rong, Chunming; Lopez, Javier. Accountability for Cloud and Other Future Internet Services. In: CloudCom 2012 : IEEE conference proceedings 2012 ISBN 978-1-4673-4509-5. s. 629-632

(13) Rong, Chunming; Cheng, Hongbing. A Secure Data Access Mechanism for Cloud Tenants. In: CLOUD COMPUTING 2012, Proceedings of the Third International Conference on Cloud Computing, GRIDs, and Virtualization, July 22-27, 2012, Nice, France. International Academy, Research and Industry Association (IARIA) 2012 ISBN 978-1-61208-216-5. s. 113-119

(14) Rong, Chunming; Cheng, Hongbing. Authenticated Health Monitoring Scheme for Wireless Body Sensor Networks. In: Proceedings of 7th International Conference on Body Area Networks (Bodynets) 2012. Association for Computing Machinery (ACM) 2012 ISBN 978-1-936968-60-2. s. 31-35

(15) Yang, Geng; Zhou, Qiang; Xu, Xiaolong; Xu, Jian; Rong, Chunming. A Novel Identity-Based Key Management and Encryption Scheme for Distributed System. In: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings. Springer 2012 ISBN 978-3-642-35361-1. s. 123-138

Pågående forskning

* Triangulum ? The Three Point Project / Demonstrate. Disseminate. Replicate, Principle Investigator on Data Hub, 2015-2019, an IA-project under H2020-SCC-2014: Smart Cities and Communities.

* A4Cloud ? Accountability For Cloud and Other Future Internet Services, Principle Investigator on Evidence WP, 2012-2016, EU FP7 IP in ICT-2011-8-1.4: Trustworthy ICT.

* Safer@Home ? Smart System to Support Safer Independent Living and Social Interaction for Elderly at Home, Project Manager, 2011-2015, VERDIKT.
* ERAC ? Efficient and Robust Architecture for the Big Data Cloud, leader of secure cloud WP, 2012-2016, VERDIKT.

* SEEDS ? Self-learning Energy Efficient,BuilDings and open Spaces, Leader on Data Hub and Demo at UiS, 2011-2014, EU FP7 STREP in EeB-ICT-2011.6.4.

* SCC-Computing ? Strategic collaboration with China on super-computing based on Tianhhe-1A, the world?s most powerful super-computer, WP leader on cloud computing, 2012-2013, EU FP7 CSA in ICT-2011.3.4: Computing Systems.

* IDP-DC ? Integrated Data Processing in Drilling and Completion, Project Manager, 2008-2012, SUPTEK.
* IOHN
? Integrated Operation for the High North, member of the Board of Directors, 2008-2011, Join Industrial Project.

* AutoConRig ? Semi-autonomous control system for unmanned drilling rigs, WP leader, 2008-2011, PETROMAKS.
* IS-OIL
? Information Security in Integrated Operations for Oil & Gas, Academic Investigator, 2009-2011, PETROMAKS.
* IS-Home
? Integrated IP-based Service for Home environment, Project Manager, 2007-2010, VERDIKT.
* SWACOM
? Secure and reliable Wireless and Ad-hoc COMmunications, Project Manager, 2005-2009, VERDIKT.

* GeoPlayGround Development Program ? Develop data processing architecture for oil and gas applications, 2011, VRI

Arbeidserfaring

1998- , Head & Professor, Center for IP-based Service Innovation (CIPSI), UiS
                2015- , Adjunct
Chief Scientist, (Big-Data Initiative), IRIS
                2013- , Chair, IEEE Computer Society STC on Cloud Computing
                2015- , IEEE Computer Society steering representative in IEEE Cloud Computing

                2009- , Steering Chair, Cloud Computing Association (CloudCom.org)
                2011- 2014, Advisor, SINTEF ICT (Software Security, Trondheim)
                2011-2014, Visiting Chair Professor, Tsinghua University, China

                2005-2009, Adjunct Professor, University of Oslo, Norway

Vitenskapelige publikasjoner (fra CRISTin)

  • Chakravorty, Antorweep; Chunming, Rong (2017). Ushare: user controlled social media based on blockchain.
  • Agrawal, Bikash; Chakravorty, Antorweep; Chunming, Rong; Wiktorski, Tomasz (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning.
  • Agrawal, Bikash; Hansen, Raymond; Chunming, Rong; Wiktorski, Tomasz (2016). SD-HDFS: Secure Deletion in Hadoop Distributed File System.
  • Agrawal, Bikash; Wiktorski, Tomasz; Chunming, Rong (2016). Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis.
  • Chen, Xinjiao; Li, Chunlei; Chunming, Rong (2016). Perfect Gaussian integer sequences from cyclic difference sets. ISSN 2157-8095. Volum 2016-August. s. 115-119. DOI: 10.1109/ISIT.2016.7541272.
  • Chunming, Rong; Hongbing, Cheng; Jaatun, Martin Gilje (2016). Securing Big Data in the Cloud by Protected Mapping over Multiple Providers.
  • Xiao, Chengwei; Ye, Jiaqi; Esteves, Rui Paulo Maximo Pereira Mateu; Chunming, Rong (2016). Using Spearman's correlation coefficients for exploratory data analysis on big dataset. ISSN 1532-0626. Volum 28. Hefte 14. s. 3866-3878. DOI: 10.1002/cpe.3745.
  • Yu, Yuanlong; Zhifan, Ye; Zheng, Xianghan; Chunming, Rong (2016). An efficient cascaded method for network intrusion detection based on extreme learning machines. ISSN 0920-8542. DOI: 10.1007/s11227-016-1766-z.
  • Zhang, Feng; Gong, Ti; Lee, Victor; Zhao, Gansen; Chunming, Rong; Qu, Guangzhi (2016). Fast algorithms to evaluate collaborative filtering recommender systems. ISSN 0950-7051. DOI: 10.1016/j.knosys.2015.12.025.
  • Agrawal, Bikash; Chakravorty, Antorweep; Rong, Chunming; Wlodarczyk, Tomasz Wiktor (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase. ISSN 2330-2186. Volum 2015-February. Hefte February. s. 970-975. DOI: 10.1109/CloudCom.2014.84.
  • Agrawal, Bikash; Wiktorski, Tomasz; Chunming, Rong (2015). Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model.
  • An, Dongyun; Zheng, Xianghan; Chen, ChongCheng; Chunming, Rong; Kechadi, Tahar (2015). Gaussian Mixture Model Based Interest Prediction In Social Networks.
  • Chen, Jiangyong; Zheng, Xianghan; Chunming, Rong (2015). Survey on Software-Defined Networking.
  • Chen, Jiangyong; Zheng, Xianghan; Chunming, Rong (2015). Survey on software-defined networking. ISSN 0302-9743. Volum 9106. s. 115-124. DOI: 10.1007/978-3-319-28430-9_9.
  • Cheng, Hongbing; Rong, Chunming; Hwang, Kai; Wang, Weihong; Li, Yanyan (2015). Secure big data storage and sharing scheme for cloud tenants. ISSN 1673-5447. Volum 12. Hefte 6. s. 106-115. DOI: 10.1109/CC.2015.7122469.
  • Cheng, Hongbing; Rong, Chunming; Yang, Geng; Zeng, Qingkai (2015). Secure data storage scheme for cloud tenants based on encrypted data storage path mapping. ISSN 1673-5439. Volum 35. Hefte 3. s. 89-96. DOI: 10.14132/j.cnki.1673-5439.2015.03.014.
  • Cheng, Jie; Chunming, Rong; Ye, Huijuan; Zheng, Xianghan (2015). Risk Management Using Big Real Time Data.
  • Kejela, Girma; Chunming, Rong (2015). Cross-Device Consumer Identification.
  • Kejela, Girma; Esteves, Rui Paulo Maximo Pereira Mateu; Rong, Chunming (2015). Predictive analytics of sensor data using distributed machine learning techniques. ISSN 2330-2186. Volum 2015-February. Hefte February. s. 626-631. DOI: 10.1109/CloudCom.2014.44.
  • Li, Kun; Zheng, Xianghan; Chunming, Rong (2015). Machine Learning Based Scalable and Adaptive Network Function Virtualization.
  • Selsaas, Lars Ropeid; Agrawal, Bikash; Chunming, Rong; Wiktorski, Tomasz (2015). AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics.
  • Selsaas, Lars Ropeid; Agrawal, Bikash; Chunming, Rong; Wiktorski, Tomasz (2015). Data Mining Workshop (ICDMW), 2015 IEEE International Conference on.
  • TaheriMonfared, Aryan; Rong, Chunming (2015). Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants.
  • Ye, Jiaqi; Xiao, Chengwei; Esteves, Rui Paulo Maximo Pereira Mateu; Chunming, Rong (2015). Time Series Similarity Evaluation Based on Spearman’s Correlation Coefficients and Distance Measures.
  • Zhao, Gansen; Ba, Zhongjie; Du, Jiahua; Wang, Xinming; Li, Ziliu; Rong, Chunming; Huang, Changqin (2015). Resource constrained data stream clustering with concept drifting for processing sensor data. ISSN 1548-3924. Volum 11. Hefte 3. s. 49-67. DOI: 10.4018/IJDWM.2015070103.
  • Zheng, Xianghan; zeng, zhipeng; Chen, Zheyi; Yu, Yuanlong; Rong, Chunming (2015). Detecting spammers on social networks. ISSN 0925-2312. Volum 159. s. 27-34. DOI: 10.1016/j.neucom.2015.02.047.
  • Zheng, Xianghan; Zhang, Xueying; Yu, Yuanlong; Kechadi, Tahar; Rong, Chunming (2015). ELM-based spammer detection in social networks. ISSN 0920-8542. Volum 72. Hefte 8. s. 2991-3005. DOI: 10.1007/s11227-015-1437-5.
  • Agrawal, Bikash; Chakravorty, Antorweep; Rong, Chunming; Wlodarczyk, Tomasz Wiktor (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase.
  • Chakravorty, Antorweep; Rong, Chunming; Evensen, Pål; Wlodarczyk, Tomasz Wiktor (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud.
  • Chen, Dehua; Shen, Changgan; Li, Yue; Le, Jiajin; Rong, Chunming (2014). Efficient top-k similarity join of massive time series using MapReduce. ISSN 1607-9264. Volum 15. Hefte 6. s. 1025-1032. DOI: 10.6138/JIT.2014.15.6.13.
  • Cheng, Hongbing; Wang, Weihong; Chunming, Rong (2014). Information Technology and Electronic Commerce (ICITEC), 2014 2nd International Conference on.
  • Cheng, Hongbing; Wang, Weihong; Chunming, Rong (2014). Privacy Protection Beyond Encryption for Cloud Big Data.
  • Esteves, Rui Paulo Maximo Pereira Mateu; Hacker, Thomas; Rong, Chunming (2014). A new approach for accurate distributed cluster analysis for Big Data: competitive K-Means. ISSN 2053-1397. Volum 1. Hefte 1-2. s. 50-64. DOI: 10.1504/IJBDI.2014.063844.
  • Hong, Xin; Chunming, Rong (2014). Cloud data integration sharing and service.
  • Hong, Xin; Chunming, Rong (2014). 2014 World Congress on Computer Applications and Information Systems (WCCAIS).
  • Hong, Xin; Chunming, Rong (2014). Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on.
  • Hong, Xin; Chunming, Rong (2014). Multiple Data Integration Service.
  • Kejela, Girma; Esteves, Rui Paulo Maximo Pereira Mateu; Rong, Chunming (2014). Predictive Analytics of Sensor Data Using Distributed Machine Learning Techniques.
  • Lin, Bing; Guo, Wenzhong; Zhang, Hong; Rong, Chunming; Chen, Guolong (2014). Optimization scheduling for scientific applications with different priorities across multiple clouds.
  • Nguyen, Son Thanh; Cayirci, Erdal; Rong, Chunming (2014). A secure many-to-many routing protocol for wireless sensor and actuator networks. ISSN 1939-0114. Volum 7. Hefte 1. s. 88-98. DOI: 10.1002/sec.548.
  • Rong, Chunming; Zhao, Gansen; Cayirci, Erdal; Hongbing, Cheng (2014). RFID Security.
  • Rong, Chunming; Zhao, Gansen; Yan, Liang; Cayirci, Erdal; Hongbing, Cheng (2014). Wireles Network Security.
  • TaheriMonfared, Aryan; Rong, Chunming (2014). Flexible Building Blocks for Software Defined Network Function Virtualization.
  • Zheng, Xianghan; Chen, Nan; Chen, Zheyi; Rong, Chunming; Chen, Guolong; Guo, Wenzhong (2014). Mobile cloud based framework for remote-resident multimedia discovery and access. ISSN 1607-9264. Volum 15. Hefte 6. s. 1043-1050. DOI: 10.6138/JIT.2014.15.6.15.
  • Zhou, Quan; Wu, Daixian; Tang, Chunming; Chunming, Rong (2014). STSHC: secure and trusted scheme for Hadoop cluster. ISSN 1751-6528. Volum 5. Hefte 1. s. 63-69. DOI: 10.1504/IJHPSA.2014.059874.
  • Zhou, Quan; Xiao, Deqin; Tang, Yi; Rong, Chunming (2014). Trusted big data capture and transport architecture for wireless sensor network. ISSN 1607-9264. Volum 15. Hefte 6. s. 1033-1041. DOI: 10.6138/JIT.2014.15.6.14.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Privacy Preserving Data Analytics for Smart Homes.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes.
  • Esteves, Rui Paulo Maximo Pereira Mateu; Hacker, Thomas; Rong, Chunming (2013). Competitive K-means: a new accurate and distributed k-means algorithm for large datasets.
  • Hao, Ming; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Performance Analysis and Optimization of Map Only Left Outer Join.
  • Li, Jianguo; Zhao, Gansen; Rong, Chunming; Tang, Yong (2013). Semantic description of scholar-oriented social network cloud. ISSN 0920-8542. Volum 65. Hefte 1. s. 410-425. DOI: 10.1007/s11227-010-0550-8.
  • Quan, Zhou; Xiao, Deqin; Tang, Chunming; Rong, Chunming (2013). TSHC: Trusted Scheme for Hadoop Cluster.
  • Rong, Chunming; Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor (2013). A map reduce based K-anonymization solution for sharing of smart home data.
  • Rong, Chunming; Nguyen, Son Thanh; Jaatun, Martin Gilje (2013). Beyond lightning: A survey on security challenges in cloud computing. ISSN 0045-7906. Volum 39. Hefte 1. s. 47-54. DOI: 10.1016/j.compeleceng.2012.04.015.
  • Rong, Chunming; Oleshchuk, Vladimir (2013). Proceeding of Norwegian Information Security Conference / Norsk informasjonssikkerhetskonferanse - NISK 2013 - Stavanger, 18th-20th November 2013.
  • Rong, Chunming; Zhao, Gansen; Yan, Liang; Cayirci, Erdal; Hongbing, Cheng (2013). RFID Security.
  • Rong, Chunming; Zhao, Ganzen; Yan, Liang; Cayirci, Erdal; Hongbing, Cheng (2013). Wireless Network Security.
  • Rong, Chunming; Zhou, Quan; Chakravorty, Antorweep (2013). On Access Control Schemes for Hadoop Data Storage.
  • TaheriMonfared, Aryan; Rong, Chunming (2013). Multi-tenant Network Monitoring Based on Software Defined Networking. ISSN 0302-9743. Volum 8185. s. 327-341.
  • TaheriMonfared, Aryan; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Evidence for Accountable Cloud Computing Services. ISSN 2079-2247.
  • Xu, Lingshan; Zheng, Xianghan; Rong, Chunming (2013). Trust Evaluation based Content Filtering in Social Interactive Data.
  • Zhang, Feng; Rong, Chunming; Zhao, Gansen; Wu, Jinxia; Wu, Xiangning (2013). Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data.
  • Zhao, Gansen; Wang, Haiyu; Rong, Chunming; Tang, Yong (2013). Resource Pool Oriented Trust Management for Cloud Infrastructure.
  • Zheng, Xianghan; Ye, Hui; Tang, Chunming; Rong, Chunming; Chen, Guolong (2013). A Survey on Cloud Accountability.
  • Zhao, Gansen; Rong, Chunming; Jaatun, Martin Gilje; Sandnes, Frode Eika (2012). Reference deployment models for eliminating user concerns on cloud security. ISSN 0920-8542. Volum 61. Hefte 2. s. 337-352. DOI: 10.1007/s11227-010-0460-9.
  • Byambajav, Byambajargal; Wlodarczyk, Tomasz Wiktor; Rong, Chunming; LePendu, Paea; Shah, Nigam (2012). Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size.
  • Cayirci, Erdal; Rong, Chunming; Koczur, Maciej; Hwang, Kai (2012). A Multi-Criteria Design Scheme for Service Federating Inter-cloud Applications.
  • Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua; Zeng, Qingkai (2012). Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing. ISSN 1022-4653. Volum 21. Hefte 2. s. 254-259.
  • Esteves, Rui Paulo Maximo Pereira Mateu; Hacker, Thomas; Rong, Chunming (2012). Cluster Analysis for the Cloud: Parallel Competitive Fitness and Parallel K-means++ for Large Dataset Analysis.
  • Liu, Jin; Rong, Chunming; Zhao, Gansen (2012). A Fast Estimation of Shortest Path Distance for Power-Law Network Predominant Cloud Service.
  • Pearson, Siani; Tountopoulos, Vasilis; Catteddu, Daniele; Südholt, Mario; Molva, Refik; Reich, Christoph; Fischer-Hübner, Simone; Millard, Christopher; Jaatun, Martin Gilje; Leenes, Ronald; Rong, Chunming; Lopez, Javier (2012). Accountability for Cloud and Other Future Internet Services.
  • Rong, Chunming; Cheng, Hongbing (2012). A Secure Data Access Mechanism for Cloud Tenants.
  • Rong, Chunming; Cheng, Hongbing (2012). Authenticated Health Monitoring Scheme for Wireless Body Sensor Networks.
  • Sun, Lili; Wang, Hua; Soar, Jeffrey; Rong, Chunming (2012). Purpose Based Access Control for Privacy Protection in E-Healthcare Services. ISSN 1796-217X. Volum 7. Hefte 11. s. 2443-2449. DOI: 10.4304/jsw.7.11.2443-2449.
  • Wlodarczyk, Tomasz Wiktor; Han, Yi; Yu, Xiao; Rong, Chunming (2012). Evaluation of some optimisation techniques for semantic query answering on shared–nothing architecture. ISSN 2044-4893. Volum 2. Hefte 1. s. 12-22. DOI: 10.1504/IJSSC.2012.045567.
  • Yang, Geng; Zhou, Qiang; Xu, Xiaolong; Xu, Jian; Rong, Chunming (2012). A Novel Identity-Based Key Management and Encryption Scheme for Distributed System.
  • Cayirci, Erdal; Rong, Chunming (2011). Intercloud for Simulation Federations.
  • Cheng, Hongbing; Rong, Chunming; Yang, Geng (2011). Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks. ISSN 1550-445X. s. 475-480. DOI: 10.1109/AINA.2011.18.
  • Demchenko, Yuri; Ngo, Canh; de Laat, Cees; Rong, Chunming; Wlodarczyk, Tomasz Wiktor; Ziegler, Wolfgang (2011). Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services.
  • Esteves, Rui Paulo Maximo Pereira; Pais, Rui; Rong, Chunming (2011). K-means Clustering in the Cloud -- A Mahout Test.
  • Esteves, Rui Paulo Maximo Pereira; Rong, Chunming (2011). Using Mahout for Clustering Wikipedia’s Latest Articles: A Comparison between K-means and Fuzzy C-means in the Cloud.
  • Hsu, Ching-Hsien; Chen, Shih-Chang; Lee, Chih-Chun; Chang, Hsi-Ya; Li, Kuan-Ching; Rong, Chunming (2011). Energy-Aware Task Consolidation Technique for Cloud Computing.
  • Nguyen, Son Thanh; Ghebregiorgish, Semere Tsehaye; Nour Hafiz, Alabbasi; Rong, Chunming (2011). Integer Factorization Using Hadoop.
  • Rong, Chunming; Eggen, Skjalg; Hongbing, Cheng (2011). A novel intrusion detection algorithm for wireless sensor networks.
  • Rong, Chunming; Eggen, Skjalg; Hongbing, Cheng (2011). An Efficient Intrusion Detection Algorithm for Wireless Sensor networks. ISSN 1865-0929. Volum 187. s. 116-129. DOI: 10.1007/978-3-642-22365-5_15.
  • Wlodarczyk, Tomasz Wiktor; Han, Yi; Rong, Chunming (2011). Performance Analysis of Hadoop for Query Processing.
  • Wlodarczyk, Tomasz Wiktor; LePendu, Paea; Shah, Nigam; Rong, Chunming (2011). Position Paper: Scaling-out the NCBO Resource Index Processing and Maintenance. ISSN 1613-0073. Volum 736.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). An Initial Survey on Integration and Application of Cloud Computing to High Performance Computing.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). Applying SWRL-F to Intercloud Constraints Analysis.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming; O'Connor, Martin; Musen, Mark A. (2011). SWRL-F: a fuzzy logic extension of the semantic web rule language.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming; Wåge, Dagfinn (2011). Challenges in Healthcare and Welfare Intercloud.
  • Yan, Liang; Guo, Hongbo; Chen, Min; Rong, Chunming; Leung, Victor (2011). Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System. ISSN 0302-9743. Volum 6827. s. 243-250. DOI: 10.1007/978-3-642-23041-7_23.
  • Chang, A.C.-C.; Li, M.; Rong, Chunming; Patrikakis, C.Z; Slezak, D. (2010). Communication and Networking.
  • Li, Jin; Zhao, Gansen; Chen, Xiaofeng; Xie, Dongqing; Rong, Chunming; Tang, Lianzhang; Tang, Yong (2010). Fine-grained data access control systems with user accountability in cloud computing.
  • Pei, DingYi; Dong, JunWu; Rong, Chunming (2010). A novel key pre-distribution scheme for wireless distributed sensor networks. ISSN 1009-2757. Volum 53. Hefte 2. s. 288-298. DOI: 10.1007/s11432-010-0005-0.
  • Rong, Chunming; Esteves, Rui Máximo Esteves (2010). Social impact of privacy in cloud computing.
  • Rong, Chunming; Jia, Baodong; Wlodarczyk, Tomasz Wiktor (2010). Performance Considerations of Data Acquisition in Hadoop System.
  • Rong, Chunming; Yan, Liang (2010). Tag content access control with identity-based key exchange.
  • Sun, Wei; Xiong, Naixue; Yang, Laurence T.; Rong, Chunming (2010). Towards free task overloading in passive replication based real-time multiprocessors.
  • Wlodarczyk, Tomasz Wiktor; OConnor, Martin; Rong, Chunming; Musen, Mark A. (2010). SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language. ISSN 1613-0073. Volum 654. s. 97-100.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2010). On the sustainability impacts of cloud-enabled cyber physical space.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming; Jia, Baodong; Nyulas, Csongor I; Musen, Mark A. (2010). DataStorm - An Ontology-Driven Framework for Cloud-Based Data Analytic Systems.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming; Nyulas, Csongor I; Musen, Mark A. (2010). An efficient approach to intelligent real-time monitoring using ontologies and Hadoop.
  • Yan, Liang; Rong, Chunming (2010). Tag Content Access Control with Identity-based Key Exchange. ISSN 0094-243X. Volum 1281. s. 297-300.
  • Zhao, Gan-Sen; Rong, Chunming; Liu, Jia-Le; Liu, Hai; Zhang, Feng; Ye, Xiao-Ping; Tang, Na; Tang, Yong (2010). Modeling User Growth for Cloud Scalability and Availability. ISSN 1607-9264. Volum 11. Hefte 3. s. 395-405.
  • Zhao, Gansen; Rong, Chunming; Jaatun, Martin Gilje; Sandnes, Frode Eika (2010). Deployment models: Towards eliminating security concerns from cloud computing.
  • Zhao, Gansen; Rong, Chunming; Zhang, Feng; Tang, Yong (2010). Trusted data sharing over untrusted cloud storage providers.
  • Cayirci, Erdal; Nguyen, Son; Rong, Chunming (2009). Secure Many to Many Routing for Wireless Sensor and Actuator Networks.
  • Cayirci, Erdal; Rong, Chunming (2009). Security in wireless ad hoc and sensor networks.
  • Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor (2009). Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and It's Security Challenges.
  • Cui, Zhenping; Zhao, Gansen; Rong, Chunming; Sun, Wei; Zhang, Feng (2009). Improving Network Locality Awareness for BitTorrent.
  • Eftestøl, Trygve; Thorsen, Kari Anne Haaland; Tøssebro, Erlend; Rong, Chunming; Steen, Petter Andreas (2009). Representing resuscitation data - Considerations on efficient analysis of quality of cardiopulmonary resuscitation. ISSN 0300-9572. Volum doi:10.1016/j.resusc.
  • Esteves, Rui Máximo Esteves; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2009). Bayesian Networks for Fault Detection under Lack of Historical Data.
  • Hu, Duan; Wang, Furong; Huang, Chen; Rong, Chunming (2009). A Novel Relay Encryption Scheme for Mobile Ad hoc Networks.
  • Jaatun, Martin Gilje; Zhao, Gansen; Rong, Chunming (2009). Cloud Computing.
  • Nguyen, Son Thanh; Cayirci, Erdal; Yan, Liang; Rong, Chunming (2009). A Shadow Zone Aware Routing Protocol for Acoustic Underwater Sensor Networks. ISSN 1089-7798. Volum 13. Hefte 5. s. 366-368. DOI: 10.1109/LCOMM.2009.090278.
  • Nguyen, Son; Cayirci, Erdal; Yan, Liang; Rong, Chunming (2009). Shadow Zone Aware Routing Protocol for Tactical Acoustic Undersea Surveillance Networks.
  • Rong, Chunming (2009). An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf.
  • Rong, Chunming; Cayirci, Erdal (2009). RFID Security.
  • Rong, Chunming; Cayirci, Erdal (2009). Wireless network security.
  • Rong, Chunming; Thorsen, Kari Anne Haaland; Wlodarczyk, Tomasz Wiktor (2009). Industrial Cloud: Toward Inter-Enterprise Integration.
  • Thorsen, Kari Anne Haaland; Eftestøl, Trygve; Rong, Chunming; Steen, Petter Andreas (2009). An Integrated Information Sharing Structure for Resuscitation Data.
  • Thorsen, Kari Anne Haaland; Eftestøl, Trygve; Tøssebro, Erlend; Rong, Chunming; Steen, Petter Andreas (2009). Using Ontologies to Integrate and Share Resuscitation Data from Diverse Medical Devices. ISSN 0300-9572. Volum 80. Hefte 5. s. 511-516.
  • Thorsen, Kari Anne Haaland; Torbjørnsen, Odd Frode; Rong, Chunming (2009). Automatic Web Service Detection in Oil and Gas.
  • Yan, Liang; Rong, Chunming; Zhao, Gansen (2009). Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-based Cryptography.
  • Hagen, Janne Merete; Sivertsen, Tormod Kalberg; Rong, Chunming (2008). Protection against unauthorized access and computer crime in Norwegian enterprises. ISSN 0926-227X. Volum 16. Hefte 3. s. 341-366.
  • Hagen, Janne Merete; Sivertsen, Tormod Kalberg; Rong, Chunming (2008). Protection against unauthorized access and computer crime in Norwegian enterprises. ISSN 0926-227X. Volum 16. Hefte 3. s. 341-366.
  • Kawashima, Tomomi; Ma, Jianhua; Apduhan, Bernady O.; Huang, Runhe; Rong, Chunming (2008). A System Prototype with Multiple Robots for Finding u-Objects in a Smart Space.
  • Lu, Zhengxin; Huang, Chen; Wang, Furong; Rong, Chunming (2008). SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks.
  • Rong, Chunming; Jaatun, Martin Gilje; Sandnes, Frode Eika; Yang, Laurence T.; Ma, Jianhua (2008). Proceedings of Autonomous Trusted Computing Conference 2008 (ATC’08).
  • Thorsen, Kari Anne Haaland; Rong, Chunming (2008). Data Integration in Oil and Gas at Norwegian Continetal Shelf.
  • Thorsen, Kari Anne Haaland; Rong, Chunming (2008). On Ubiquitous Integrated Computing. ISSN 0972-9038. Volum 5. Hefte 3. s. 46-55.
  • Thorsen, Kari Anne Haaland; Rong, Chunming (2008). Towards Dataintegration from WITSML to ISO 15926.
  • Wang, Furong; Huang, Chen; Zhao, Jing; Rong, Chunming (2008). IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks.
  • Wang, Yi; Wang, Furong; Rong, Chunming; Wang, Sufang (2008). SPM: A Security Policy Based on Micropayment in Ad Hoc Networks.
  • Xu, Kui; Zhang, Fan; Rong, Chunming; Dai, Bin; Huang, Benxiong (2008). Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding.
  • Yan, Liang; Rong, Chunming (2008). RFID System Security Using Identity-Based Cryptography.
  • Yang, Tao; Huang, Ye; Chen, Jianxin; Yang, Geng; Rong, Chunming (2008). Di-GAFR: Directed Greedy Adaptive Face-Based Routing.
  • Yee, George O.M.; Rong, Chunming; Yang, Laurence T. (2008). Journal of Computer Security: Guest Editors' Introduction. ISSN 0926-227X. Hefte 16. s. 261-264.
  • Yu, Xin; Rong, Chunming; Huang, Benxiong (2008). A Flexible Garbage Collect Algorithm for Flash Storage Management.
  • Hagen, Janne Merete; Sivertsen, Tormod Kalberg; Rong, Chunming (2007). Information Security Threats and Access Control Practices in Norwegian Businesses. ISSN 1550-445X. Volum 21. Hefte 1. s. 470-476.
  • Meling, Hein; Rong, Chunming; Wåge, Dagfinn (2007). Towards Integrated Services for Health Monitoring. ISSN 1550-445X. Volum 21. Hefte 2. s. 776-781.
  • Nguyen, Son Thanh; Rong, Chunming (2007). Electronic Payment Scheme Using Identity-Based Cryptography. ISSN 0302-9743. Volum Volume 4582/2007. s. 330-337.
  • Nguyen, Son Thanh; Rong, Chunming (2007). Zigbee Security using Identity Based Cryptography. ISSN 0302-9743. Volum Volume 4610/2007. s. 3-12.
  • Rong, Chunming; Kim, Won-Chol (2007). Effective Storage Security in Incompletely Trusted Environment. ISSN 1550-445X. Volum 21. Hefte 1. s. 432-437.
  • veigner, christian; Rong, Chunming (2007). Flooding Attack on the Binding Cache in Mobile IPv6.
  • Yang, Geng; Rong, Chunming; Shen, J.G.; Wang, J.T. (2007). A novel approach for role-based access control. ISSN 1022-4653. Volum 16.
  • Yang, Geng; Wang, Jiangtao; Cheng, Hongbing; Rong, Chunming (2007). An Identity-Based Encryption Scheme for Broadcasting.
  • Hegland, Anne Marie; Winjum, Eli; Spilling, Pål; Rong, Chunming; Kure, Øyvind (2006). Analysis of IBS for MANET Security in Emergency and Rescure Operations.
  • Haaland, Kari Anne; Rong, Chunming (2006). Securing Web Services Using Identity-Based Encryption (IBE).
  • Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål (2006). Evaluation of Key Management in ad hoc Networks for Emergency and Rescue operations.
  • Hegland, Anne Marie; Winjum, Eli; Mjølsnes, Stig Frode; Rong, Chunming; Kure, Øivind; Spilling, Pål (2006). Survey of Key Management in Ad Hoc Networks. ISSN 1553-877X. Volum 8. Hefte 3. s. 48-66.
  • Jiang, Peng; Yang, Geng; Rong, Chunming (2006). Combined Method for Nonlinear Systems of Equations. ISSN 0302-9743. Volum 3994. Hefte 2006. s. 693-699.
  • Jiang, Peng; Yang, Geng; Rong, Chunming (2006). Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method. ISSN 0302-9743. Volum 3991. Hefte 2006. s. 794-797.
  • Kaland, Kjell Ove; Rong, Chunming; Yang, Geng (2006). An E-Wallet System with Decentralized Management.
  • Rong, Chunming (2006). Identity-Based Cryptography.
  • Veigner, Christian; Rong, Chunming (2006). On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption.
  • Veigner, Christian; Rong, Chunming (2006). On Use of Identity-Based Encryption for Secure Emailing.
  • Yang, Geng; Sheng, Jian-Gang; Rong, Chunming (2006). Theoretical Research on Role Based Access Control. ISSN 1673-5439. Volum 26. Hefte 3.
  • Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål (2005). Evaluation of Key Management in ad hoc Networks for Emergency and Rescue Operations.
  • Veigner, Christian; Rong, Chunming (2005). Flooding attack of the binding cache in Mobile IPv6.
  • Yang, Geng; Rong, Chunming; Peng, Lei (2005). A novel approach for redirecting module in Honeypot systems. ISSN 1005-8885. Volum 12. Hefte 3. s. 58-62.
  • Zhou, Quan; Yang, Geng; Rong, Chunming; Shen, Jiangang (2005). A Scalable Security Architecture for Grid.
  • Rong, Chunming (2004). NIK'2004.
  • Rong, Chunming; Yang, Geng (2004). A Distributed Honeypots for Grid Security. Volum 3032. s. 1083-1087.
  • Mjølsnes, Stig Frode; Rong, Chunming (2003). On-line E-Wallet System with Decentralized Credential Keeper. Volum 8. Hefte 1. s. 87-99.
  • Rong, Chunming (2003). On Probabilistic Scheme For Encryption Using Nonlinear Codes Mapped from Z4 Linear Codes. Volum E86-A. Hefte 9. s. 2248-2250.
  • Helleseth, Tor; Rong, Chunming; Yang, Kyeongcheol (2001). New 3-Designs from Goethals Codes over Z4. ISSN 0012-365X. Volum 226. s. 403-409.
  • Helleseth, Tor; Rong, Chunming; Yang, Kyeongcheol (2001). On t-designs from Codes over Z4. ISSN 0012-365X. Volum 238. Hefte 01.mar. s. 67-80.
  • Duursma, Iwan; Helleseth, Tor; Rong, Chunming; Yang, Kyeongcheol (1999). Split weight enumerators for the Preparata Codes with applications to designs. ISSN 0925-1022. Volum 18. Hefte 01.mar. s. 103-124.
  • Helleseth, Tor; Rong, Chunming; Sandberg, Daniel (1999). New Families of Almost Perfect Nonlinear Power Mappings. ISSN 0018-9448. Volum IT-45, No. 2. s. 475-485.
  • Helleseth, Tor; Rong, Chunming; Yang, Kyeongcheol (1999). New Infinite Families of 3-Designs from Preparata Codes over Z4. ISSN 0012-365X. Volum 195. s. 139-156.
  • Rong, Chunming; Helleseth, Tor; Lahtonen, Jyrki (1999). On Algebraic Decoding of the Z4-Linear Calderbank-McGuire Code. ISSN 0018-9448. Volum IT-45, No. 5. s. 1423-1434.
  • Hong, Xin; Zhang, HuiZhen; Chunming, Rong (2015). Mobile contact synchronous with cloud server.
  • Quan, Zhou; Chunming, Tang; Xianghan, Zhen; Chunming, Rong (2015). A secure user authentication protocol for sensor network in data capturing.
  • Østrem, Trond; Bolkesjø, Torjus Folsland; Rong, Chunming; Wolff, Robert; Sand, Kjell; Mathisen, Geir; Coldevin, Grete Håkonsen; Ryghaug, Marianne; Tomasgard, Asgeir; Heegaard, Poul Einar; Fosso, Olav B; Midtgård, Ole-Morten; Novakovic, Vojislav; Hovd, Morten (2015). Norwegian Smart Grid Research Strategy. The Scientific Committee of the Norwegian Smart Grid Centre. 59 s.
  • Chen, Xing; Zhang, Ying; Huang, Gang; Zheng, Xianghan; Guo, Wenzhong; Chunming, Rong (2014). Architecture-based integrated management of diverse cloud resources.
  • Esteves, Rui Paulo Maximo Pereira Mateu; Rong, Chunming (2013). Cluster Analysis for Big Data and Failure Detection. Universitetet i Stavanger. ISBN 978-82-7644-527-5. 139 s.
  • Rong, Chunming; Jaatun, Martin Gilje (2012). Message from the Cloud Computing Association – CloudCom.org.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). Handling Big Data: On Mutual Applications of Cloud Computing and Semantic Web Technologies. University of Stavanger. ISBN 978-82-7644-457-5. 118 s.
  • Cayirci, Erdal; Rong, Chunming (2008). Wireless Technologies for Automatic Meter Reading and Security Applications. Lyse Tele.
  • Rong, Chunming; Liang, Yan (2008). GSM and UMTS Jamming. Lyse Tele.
  • Sandnes, Frode Eika; Zhang, Yang; Rong, Chunming; Yang, Laurence T.; Ma, Jianhua (2008). Lecture Note for Computer Science - Ubiquitous Intelligent Computing. Springer. ISBN 9783540692928.
  • Veigner, Christian; Rong, Chunming (2004). A new protocol for location management in Mobile IPv6. ISBN 8251920043.
  • Wåge, Dagfinn; Calvet, Juan Carlos; Haga, Karsten; Rong, Chunming; Sandvik, Birger (2004). Security related business opportunities in IPv6. Telenor FoU. 24 s.
  • Rong, Chunming (1998). Computational Analysis in Algebraic Decoding, APN-Mappings and t-Designs. Department of Informatics, University of Bergen.
  • Rong, Chunming (2012). General Storage & Technology AS.
  • Rong, Chunming; Zhao, Gansen (2012). System for å beskytte en kryptert informasjonsenhet.
  • Rong, Chunming; Zhao, Gansen (2009). System for Protecting an Encrypted Information Unit.
  • Chakravorty, Antorweep; Chunming, Rong (2017). Ushare: user controlled social media based on blockchain. 2017-01-05 - 2017-01-07.
  • Agrawal, Bikash; Chakravorty, Antorweep; Wiktorski, Tomasz; Chunming, Rong (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning. 2016-12-06 - 2016-12-09.
  • Chunming, Rong; Liu, Lu; Chen, Guolong (2016). Big data and smart computing: methodology and practice.
  • Rong, Chunming (2015). Secure Future Services in Cloud. 2015-06-02 - 2015-06-04.
  • Rong, Chunming (2015). Viste frem fremtidens smarte byer. regjeringen.no. [Internett]; 2015-05-18.
  • Wolff, Russel; Rong, Chunming (2015). Velferdsteknologi.
  • Chakravorty, Antorweep; Rong, Chunming; Evensen, Pål; Wlodarczyk, Tomasz Wiktor (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage. 2014-11-04.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud. 2014-03-11.
  • Jaatun, Martin Gilje; Bernsmed, Karin; Rong, Chunming (2014). Security Governance and SLAs in Cloud Computing.
  • Rong, Chunming (2014). Furture Service Security: Data Accountability and Multitenant Monitoring. 2014-05-05 - 2014-05-07.
  • Rong, Chunming (2014). Nye tjenester gir en enklere hverdag hjemmet. NTVA;
  • Rong, Chunming (2014). Service Security in Cloud. IEEE; 2014-10-08 - 2014-10-10.
  • Rong, Chunming (2014). UiS Professor sikrer deg i nettskyen. Stavanger Aftenbladet. [Avis]; 2014-11-26.
  • TaheriMonfared, Aryan; Rong, Chunming (2014). Flexible Building Blocks for Software Defined Network Function Virtualization. 2014-08-18 - 2014-08-20.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data. 2013-11-18 - 2013-11-20.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Privacy Preserving Data Analytics for Smart Homes. 2013-05-23.
  • Chakravorty, Antorweep; Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes. 2013-12-02 - 2013-12-05.
  • Leung, Victor C.M.; Wen, Yonggang; Chen, Min; Rong, Chunming (2013). Mobile cloud computing Untitled.
  • Rong, Chunming (2013). Cloud Service Security and Accountability. 2013-12-16 - 2013-12-19.
  • Rong, Chunming (2013). Safer@Home: Ny teknologi-hverdag for eldre. NITO Rogaland; 2013-04-23.
  • Jaatun, Martin Gilje; Lambrinoudakis, Costas; Rong, Chunming (2012). Special issue on security in cloud computing.
  • Rong, Chunming; Sandnes, Frode Eika; Buyya, Rajkumar (2012). Preface to special issue on Advances in Cloud Computing.
  • Cayirci, Erdal; Rong, Chunming (2011). Intercloud for Simulation Federations. 2011-07-04 - 2011-07-08.
  • Cheng, Hongbing; Rong, Chunming; Yang, Geng (2011). Design and analysis of a secure routing protocol algorithm for wireless sensor networks. 2011-03-22 - 2011-03-25.
  • Demchenko, Yuri; Ngo, Canh; de Laat, Cees; Wlodarczyk, Tomasz Wiktor; Rong, Chunming; Ziegler, Wolfgang (2011). Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services. IEEE, Cloud Computing Association; 2011-11-29 - 2011-12-01.
  • Esteves, Rui Paulo Maximo Pereira; Pais, Rui; Rong, Chunming (2011). K-means Clustering in the Cloud? A Mahout Test. 2011-03-22 - 2011-03-25.
  • Esteves, Rui Paulo Maximo Pereira; Pais, Rui; Rong, Chunming (2011). Using Mahout for Clustering Wikipedia’s Latest Articles: A Comparison between K-means and Fuzzy C-means in the Cloud. IEEE, Cloud Computing Association; 2011-11-29 - 2011-12-01.
  • Hsu, Ching-Hsien; Chen, Shih-Chang; Lee, Chih-Chun; Chang, Hsi-Ya; Li, Kuan-Ching; Rong, Chunming (2011). Energy-Aware Task Consolidation Technique for Cloud Computing. IEEE, Cloud Computing Association; 2011-11-29 - 2011-12-01.
  • Nguyen, Son Thanh; Ghebregiorgish, Semere Tsehaye; Alabbasi, Nour; Rong, Chunming (2011). Integer Factorization Using Hadoop. IEEE, Cloud Computing Association; 2011-11-29 - 2011-12-01.
  • Nguyen, Son Thanh; Rong, Chunming (2011). Cloud Trends and Security Challenges. Gjøvik University College; 2011-05-18 - 2011-05-20.
  • Rong, Chunming (2011). Cloud Data Management and It’s Security Challenges. COMADEM; 2011-05-30 - 2011-06-01.
  • Rong, Chunming (2011). Cloud Trends & Security Challenges. NISNet.no; 2011-05-22 - 2011-05-27.
  • Rong, Chunming (2011). Cloud Trends and Security Challenges. Høgskolen i Gjøvik; 2011-05-18 - 2011-05-20.
  • Rong, Chunming (2011). Hus tenker sjæl – sparer strøm. forskning.no. [Internett]; 2011-12-18.
  • Rong, Chunming (2011). SEEDS: Self-Learning Energy-Efficient builDings and open Spaces. Tsinghua University; 2011-12-16 - 2011-12-17.
  • Rong, Chunming (2011). Tar styring i huset. UniverS (Universitetet i Stavanger). [Avis]; 2011-12-12.
  • Rong, Chunming; Eggen, Skjalg; Cheng, Hongbing (2011). A Novel Intrusion Detection Algorithm for Wireless Sensor networks. 2011-02-28 - 2011-03-03.
  • Rong, Chunming; Eggen, Skjalg; Cheng, Hongbing (2011). An Efficient Intrusion Detection Algorithm for Wireless Sensor networks. 2011-06-28 - 2011-06-30.
  • Rong, Chunming; Nguyen, Son Thanh; JAATUN, Martin Gilje (2011). Beyond Lightning: A Survey on Security Challenges in Cloud Computing. Future Technology Research Association International (FTRA); 2011-12-12 - 2011-12-15.
  • Rong, Chunming; Wlodarczyk, Tomasz Wiktor (2011). Security challenges in Clouds. NATO; 2011-09-12 - 2011-09-15.
  • Rong, Chunming; Wåge, Dagfinn (2011). Bo lenger hjemme med nettbrett. forskningsradet.no. [Internett]; 2011-12-19.
  • Rong, Chunming; Wåge, Dagfinn (2011). Eldrebølgen – muligheter for omsorgsteknologi. UniverS (Universitetet i Stavanger). [Avis]; 2011-06-14.
  • Rong, Chunming; Wåge, Dagfinn (2011). Nettbrett forlenger hjemmelivet. NRK. [Internett]; 2011-12-30.
  • Rong, Chunming; Wåge, Dagfinn (2011). Nettbrett-tjenester for eldre. forskning.no. [Internett]; 2011-12-30.
  • Rong, Chunming; Wåge, Dagfinn (2011). Slik skal høgteknologi gi tryggare eldrebustader. UniverS (Universitetet i Stavanger). [Avis]; 2011-10-17.
  • Wlodarczyk, Tomasz Wiktor; Han, Yi; Rong, Chunming (2011). Performance Analysis of Hadoop for Query Processing. 2011-03-22 - 2011-03-25.
  • Wlodarczyk, Tomasz Wiktor; LePendu, Paea; Shah, Nigam; Rong, Chunming (2011). Scaling-out the NCBO Resource Index Processing and Maintenance. 2011-05-29 - 2011-05-30.
  • Wlodarczyk, Tomasz Wiktor; O'Connor, Martin; Musen, Mark A.; Rong, Chunming (2011). SWRL-F: a fuzzy logic extension of the semantic web rule language. 2011-05-25 - 2011-05-27.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). An Initial Survey on Integration and Application of Cloud Computing to High Performance Computing. IEEE, Cloud Computing Association; 2011-11-29 - 2011-12-01.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). Applying SWRL-F to Intercloud Constraints Analysis. 2011-07-04 - 2011-07-08.
  • Wlodarczyk, Tomasz Wiktor; Rong, Chunming (2011). Handling Big Data - Overview of 3 Projects. Stanford BMIR; 2011-10-31.
  • Wlodarczyk, Tomasz Wiktor; Wåge, Dagfinn; Rong, Chunming (2011). Challenges in healthcare and welfare intercloud. 2011-08-16 - 2011-08-18.
  • Wåge, Dagfinn; Rong, Chunming (2011). Denne kan bli viktig for de eldre. Trønder Avisa. [Avis]; 2011-12-30.
  • Wåge, Dagfinn; Rong, Chunming (2011). Nettbrett for eldre. Ringblad.no. [Internett]; 2011-12-30.
  • Wåge, Dagfinn; Rong, Chunming (2011). Safer@Home using Cloud Computing Technology. 2011-11-08 - 2011-11-09.
  • Yan, Liang; Guo, Hongbo; Chen, Min; Rong, Chunming; Leung, Victor (2011). Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System. 2011-05-09 - 2011-09-13.
  • Rong, Chunming (2010). Trådløs usikkerhet.
  • Thorsen, Kari Anne Haaland; Eftestøl, Trygve; Rong, Chunming; Steen, Petter Andreas (2009). An Integrated Information Sharing Structure for Resuscitation Data. 2009-05-26 - 2009-05-29.
  • Rong, Chunming (2008). A Flexible Garbage Collect Algorithm for Flash Storage Management. 2008-12-13 - 2008-12-15.
  • Rong, Chunming (2008). Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding. 2008-12-13 - 2008-12-15.
  • Rong, Chunming (2008). Di-GAFR: Directed Greedy Adaptive Face-Based Routing. 2008-06-23 - 2008-06-25.
  • Rong, Chunming (2008). IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. 2008-03-25 - 2008-03-28.
  • Rong, Chunming (2008). SEMAP: Improving Multipath Security based on Attacking Point in Ad Hoc Networks. 2008-06-23 - 2008-06-25.
  • Rong, Chunming (2008). SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. 2008-03-25 - 2008-03-28.
  • Rong, Chunming (2008). Strengthen RFID Tags Security Using New Data Structure. 2008-12-13 - 2008-12-15.
  • Thorsen, Kari Anne Haaland; Rong, Chunming (2008). Data Integration in Oil and Gas at Norwegian Continental Shelf. 2008-03-25 - 2008-03-28.
  • Thorsen, Kari Anne Haaland; Rong, Chunming (2008). Towards Dataintegration from WITSML to ISO 15926. 2008-06-23 - 2008-06-25.
  • Yan, Liang; Rong, Chunming (2008). RFID System Security Using Identity-Based Cryptography. 2008-06-23 - 2008-06-25.
  • Yan, Liang; Rong, Chunming (2008). RFID System Security Using Identity-Based Cryptography. 2008-06-23 - 2008-06-25.
  • Chowdhury, Mohammad Mushfiqur R; Noll, Josef; Rong, Chunming (2007). NFR-project No. 172462/S10, SWACOM. 2007-10-29 - 2007-10-30.
  • Meling, Hein; Rong, Chunming (2007). Integrated IP-based Serivces for smart Home environment The IS-home project. 2007-10-29 - 2007-10-30.
  • Nguyen, Son Thanh; Rong, Chunming (2007). Electronic Payment Scheme Using Identity-Based Cryptography. 2007-06-28 - 2007-06-30.
  • Nguyen, Son Thanh; Rong, Chunming (2007). Zigbee Security using Identity Based Cryptography. 2007-07-11 - 2007-07-13.
  • Rong, Chunming (2007). Effective Storage Security in Incompletely Trusted Environment. 2007-05-21 - 2007-05-23.
  • Rong, Chunming (2007). How to secure web services using semantic web. 2007-04-26 - 2007-04-27.
  • Rong, Chunming (2007). Information Security Threats and Access Control Practices in Norwegian Businesses. 2007-05-21 - 2007-05-23.
  • Rong, Chunming (2007). Lettere å angripe nettbanker. [Avis]; 2007-02-05.
  • Rong, Chunming (2007). Secuirty in Semantic Web Services. Oljeindustriens Landsforening; 2007-02-06.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. Huangzhong University of Science and Technology; 2007-07-01 - 2007-07-03.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. INSA-Lyon; 2007-03-15.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. 2007-10-10.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. Lyse Tele; 2007-08-28.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. Hong Kong Baptist University; 2007-07-20.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. Chinese University of Hong Kong; 2007-07-19.
  • Rong, Chunming (2007). Semantic Integrated Services with Wireless Sensors. Nanjing University of Posts and Telecommunications; 2007-07-03 - 2007-07-06.
  • Rong, Chunming (2007). Smarthjem løsning med sensor teknologi. Stavanger Næringsforening; 2007-09-06.
  • Rong, Chunming (2007). Towards Integrated Services for Health Monitoring. 2007-05-21 - 2007-05-23.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. University of Stavanger; 2007-09-19.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. ConocoPhillips; 2007-11-23.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. IBM; 2007-11-13.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Roxar; 2007-09-28.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Laerdal Medical; 2007-10-25.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Nasjonal Senter for Telemedisin; 2007-10-08.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Invenia; 2007-10-08.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Akvaplan-NIVA; 2007-10-08.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. ABB; 2007-10-15.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Kunnskapsparken; 2007-10-02.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. WestControl; 2007-12-04.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Biota Guard; 2007-10-22.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Ergo Group; 2007-11-06.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Biota Guard; 2007-10-22.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Oljeindustriens Landsforening; 2007-10-22.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Stavanger Universitetssjukehuset; 2007-10-22.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. Infoteknikk; 2007-10-04.
  • Rong, Chunming (2007). Ubiquitous Integrated Computing. CapGemini; 2007-10-02.
  • Rong, Chunming (2007). Utvikler ditt trådløse hjem. [Avis]; 2007-01-11.
  • Rong, Chunming; Li, Frank Yong; Noll, Josef (2007). Secure and Reliable Wireless and Ad hoc Communications. 2007-10-29 - 2007-10-30.
  • Rong, Chunming; Liang, Yan (2007). Integrated Serivces for a Wireless Digital Home The IS-home project. 2007-10-29 - 2007-10-30.
  • Haaland, Kari Anne; Rong, Chunming (2006). Securing Web Services Using Identity-Based Encryption (IBE). 2006-08-07 - 2006-08-10.
  • Hegland, Anne Marie; Winjum, Eli; Spilling, Pål; Rong, Chunming; Kure, Øyvind (2006). Analysis of IBS for MANET Security in Emergency and Rescure Operations. 2006-04-18 - 2006-04-20.
  • Jiang, Peng; Yang, Geng; Rong, Chunming (2006). Combined Method for Nonlinear Systems of Equations. 2006-05-28 - 2006-05-31.
  • Jiang, Peng; Yang, Geng; Rong, Chunming (2006). Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method. 2006-05-28 - 2006-05-31.
  • Rong, Chunming (2006). En siktet i nettbanksvindel. [Avis]; 2006-12-28.
  • Rong, Chunming (2006). Identity-Based Cryptography. 2006-11-20 - 2006-11-22.
  • Rong, Chunming (2006). Identity-Based Cryptography. 2006-10-26.
  • Rong, Chunming (2006). Nettbanker skjerper datasikkerheten. [Avis]; 2006-12-28.
  • Rong, Chunming (2006). Nettbanker skjerper datasikkerheten. [Avis]; 2006-12-28.
  • Rong, Chunming (2006). Nettbanker skjerper datasikkerheten. [Avis]; 2006-12-28.
  • Rong, Chunming (2006). Sikkert og uten en tråd. [Avis]; 2006-03-31.
  • Rong, Chunming (2006). Sikkert og uten en tråd. [Avis]; 2006-05-04.
  • Rong, Chunming (2006). Sikkert og uten en tråd. [Avis]; 2006-03-31.
  • Rong, Chunming (2006). Søppelpost. [Radio]; 2006-10-09.
  • Veigner, Christian; Rong, Chunming (2006). On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. 2006-09-03 - 2006-09-06.
  • Veigner, Christian; Rong, Chunming (2006). On Use of Identity-Based Encryption for Secure Emailing. 2006-08-07 - 2006-08-10.
  • Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål (2005). Evaluation of Key Management in ad hoc Networks for Emergency and Rescue Operations. 2005-11-21 - 2005-11-23.
  • Rong, Chunming (2005). Hacking and Software Security. High Performance Laboratory, Tsinghua University; 2005-12-13 - 2005-12-14.
  • Rong, Chunming (2005). Hacking and Software Security. Guangzhou University; 2005-12-19 - 2005-12-20.
  • Rong, Chunming (2005). Hacking and Software Security. 2005-12-13 - 2005-12-17.
  • Rong, Chunming; Veigner, Christian (2005). Identity-Based Encryption on E-mails and Spam Vulnerabilities. 2005-11-07 - 2005-11-08.
  • Veigner, Christian; Rong, Chunming (2005). Flooding attack of the binding cache in Mobile IPv6. 2005-10-03 - 2005-10-07.
  • Veigner, Christian; Rong, Chunming (2005). Ruteoptimalisering og Sikkerhet i Mobile IPv6. 2005-06-15 - 2005-06-16.
  • Zhou, Quan; Yang, Geng; Rong, Chunming; Shen, Jiangang (2005). A Scalable Security Architecture for Grid. 2005-12-05 - 2005-12-08.
  • Rong, Chunming (2004). Digital Signatures & Protocols & Infrastructures. Nanjing University of Posts and Telecommunications; 2004-04-07.
  • Rong, Chunming (2004). Security of IP Mobility Management. 2004-10-25.
  • Rong, Chunming (2004). Security of Mobility Management in IPv6. 2004-12-23.
  • Veigner, Christian; Rong, Chunming (2004). A new Route Optimization protocol for Mobile IPv6 (ROM). 2004-12-15.
  • Kaland, Kjell Olav; Rong, Chunming (2003). Implementing a Online E-Wallet System with Decentralized Credential Keepers. 2003-10-23 - 2003-10-26.
  • Rong, Chunming; Kaland, Kjell Olav; Yang, Geng (2003). A E-Wallet System with Decentralized Management. 2003-10-28 - 2003-10-30.
  • Rong, Chunming; Yang, Geng (2003). Honeypots in Blackhat Mode and its Implications. 2003-08-27 - 2003-08-29.
  • Yang, Geng; Rong, Chunming (2003). Performance Analysis of Partition Algorithms for Parallel Solution of Nonlinear Systems of Equations. 2003-08-27 - 2003-08-29.
  • Yang, Geng; Rong, Chunming; Dai, Yunping (2003). A Distributed Honeypot System for Grid Security. 2003-12-07 - 2003-12-10.
  • Davidrajuh, Reggie; Rong, Chunming (2002). A Methodology for Tactical Design of Virtual Supply Chain for E-Tailing. 2002-10-23 - 2002-10-27.
  • Rong, Chunming (2002). On Probabilistic Scheme For Encryption Using Nonlinear Codes Mapped from Z4 Linear Codes. 2002-10-07 - 2002-10-11.
  • Rong, Chunming; Davidrajuh, Reggie (2002). A New Decentralized P2P Architecture Providing User Anonymity by Using Secret Sharing. 2002-10-23 - 2002-10-27.
  • Rong, Chunming; ukjent-for-m008249, ukjent-for-m008249 (2002). A New Decentralized P2P Architecture Providing User Anonymity by Using Secret Sharing. 2002-10-22 - 2002-10-27.
  • ukjent-for-m008249, ukjent-for-m008249; Rong, Chunming (2002). A Methodology for Tactical Design of Virtual Supply Chain for E-Tailing. 2002-10-22 - 2002-10-27.
  • Mjølsnes, Stig Frode; Rong, Chunming (2001). Localized Credentials for Server Assisted Mobile Wallet. 2001-10-16 - 2001-10-19.