Binbin Chen

Orcid: 0000-0002-9584-0082

Affiliations:
  • Singapore University of Technology and Design, Singapore


According to our database1, Binbin Chen authored at least 89 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains.
IEEE Trans. Mob. Comput., May, 2024

Exposing Hidden Attackers in Industrial Control Systems Using Micro-Distortions.
IEEE Trans. Smart Grid, 2024

2023
Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing.
IEEE Trans. Software Eng., November, 2023

Message Authentication and Provenance Verification for Industrial Control Systems.
ACM Trans. Cyber Phys. Syst., October, 2023

CyberSAGE: The cyber security argument graph evaluation tool.
Empir. Softw. Eng., 2023

TransNFV: Integrating Transactional Semantics for Efficient State Management in Virtual Network Functions.
CoRR, 2023

The Design and Implementation of a Cyber Exercise on EPIC Microgrid Testbed.
Proceedings of the IEEE International Conference on Communications, 2023

One Pass is Sufficient: A Solver for Minimizing Data Delivery Time over Time-varying Networks.
Proceedings of the IEEE INFOCOM 2023, 2023

Machine Learning Assisted Bad Data Detection for High-Throughput Substation Communication.
Proceedings of the IEEE International Conference on Communications, 2023

DNAttest: Digital-twin-based Non-intrusive Attestation under Transient Uncertainty.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Enhancing Earth Observation Throughput Using Inter-Satellite Communication.
IEEE Trans. Wirel. Commun., 2022

LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems.
IEEE Trans. Smart Grid, 2022

Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning.
Proceedings of the IEEE International Conference on Communications, 2022

Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery.
Proceedings of the IEEE Secure Development Conference, 2022

Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems.
Proceedings of the IEEE INFOCOM 2022, 2022

CoToRu: Automatic Generation of Network Intrusion Detection Rules from Code.
Proceedings of the IEEE INFOCOM 2022, 2022

FL-Task-aware Routing and Resource Reservation over Satellite Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Sublinear-Time Non-Adaptive Group Testing With O(k log n) Tests via Bit-Mixing Coding.
IEEE Trans. Inf. Theory, 2021

An IEC 61850 MMS Traffic Parser for Customizable and Efficient Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2021

Distort to Detect, not Affect: Detecting Stealthy Sensor Attacks with Micro-distortion.
Proceedings of the IEEE International Conference on Communications, 2021

Analyzing OpenAPI Specifications for Security Design Issues.
Proceedings of the IEEE Secure Development Conference, 2021

From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

2020
Electricity Theft Pinpointing Through Correlation Analysis of Master and Individual Meter Readings.
IEEE Trans. Smart Grid, 2020

Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems.
ACM Trans. Cyber Phys. Syst., 2020

Modeling Adversarial Physical Movement in a Railway Station: Classification and Metrics.
ACM Trans. Cyber Phys. Syst., 2020

Modeling Marked Temporal Point Process Using Multi-relation Structure RNN.
Cogn. Comput., 2020

Accurate Disaggregation of Chiller Plant Loads Using Noisy Magnetic Field Measurements.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

An Attack-Trace Generating Toolchain for Cybersecurity Study of IEC61850 based Substations.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Identifying Failing Point Machines from Sensor-Free Train System Logs.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
False Load Attack to Smart Meters by Synchronously Switching Power Circuits.
IEEE Trans. Smart Grid, 2019

Artificial Command Delaying for Secure Substation Remote Control: Design and Implementation.
IEEE Trans. Smart Grid, 2019

Data-driven Model-based Detection of Malicious Insiders via Physical Access Logs.
ACM Trans. Model. Comput. Simul., 2019

F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Cross-sender bit-mixing coding.
Proceedings of the 18th International Conference on Information Processing in Sensor Networks, 2019

Who's Scanning Our Smart Grid? Empirical Study on Honeypot Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions.
Proceedings of the 15th European Dependable Computing Conference, 2019

A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Attack and Countermeasure on Interlock-Based Device Pairing Schemes.
IEEE Trans. Inf. Forensics Secur., 2018

Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing.
ICT Express, 2018

Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

RFID Counting over Time-Varying Channels.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Analysis and enhancement of RPL under packet drop attacks.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

On Practical Threat Scenario Testing in an Electric Power ICS Testbed.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

2017
Analysis and Design of Low-Duty Protocol for Smartphone Neighbor Discovery.
IEEE Trans. Mob. Comput., 2017

Collaborative cellular tail energy reduction: Feasibility and fairness.
Pervasive Mob. Comput., 2017

Towards a grid-wide, high-fidelity electrical substation honeynet.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Reconciling Systems-Theoretic and Component-Centric Methods for Safety and Security Co-analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Systems-Theoretic Likelihood and Severity Analysis for Safety and Security Co-engineering.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2017

Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs.
Proceedings of the Quantitative Evaluation of Systems - 14th International Conference, 2017

On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation Log.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Developing Models for Physical Attacks in Cyber-Physical Systems.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Understanding RFID Counting Protocols.
IEEE/ACM Trans. Netw., 2016

Near-optimal communication-time tradeoff in fault-tolerant computation of aggregate functions.
Distributed Comput., 2016

An active command mediation approach for securing remote control interface of substations.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

SwapGuard: A software-only solution for attesting hot-swappable devices in power grids.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

Railway System Failure Scenario Analysis.
Proceedings of the Critical Information Infrastructures Security, 2016

SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

2014
The Cost of Fault Tolerance in Multi-Party Communication Complexity.
J. ACM, 2014

CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

Automatic Generation of Security Argument Graphs.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

Battery capacity planning for grid-connected solar photovoltaic systems.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

2013
Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids.
IEEE Trans. Smart Grid, 2013

Delay makes a difference: Smart grid resilience under remote meter disconnect attack.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Go with the flow: toward workflow-oriented security assessment.
Proceedings of the New Security Paradigms Workshop, 2013

2012
Efficient Error Estimating Coding: Feasibility and Applications.
IEEE/ACM Trans. Netw., 2012

Using anisotropic magnetoresistive (AMR) sensor arrays for electric sub-metering.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

Scalable load disaggregation system using distributed electrical signature detection.
Proceedings of the BuildSys '12 Proceedings of the Fourth ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings, 2012

Load disaggregation using harmonic analysis and regularized optimization.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

2011
Secure Aggregation with Malicious Node Revocation in Sensor Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Flow scheduling and endpoint rate control in GridNetworks.
Future Gener. Comput. Syst., 2009

DEAL: Discover and Exploit Asymmetric Links in Dense Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

MobTorrent: A Framework for Mobile Internet Access from Vehicles.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2007
Supporting Bulk Data Transfers of High-End Applications with Guaranteed Completion Time.
Proceedings of IEEE International Conference on Communications, 2007

Scheduling deadline-constrained bulk data transfers to minimize network congestion.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
A Flexible Bandwidth Reservation Framework for Bulk Data Transfers in Grid Networks
CoRR, 2006

Proportional Fairness for Overlapping Cells in Wireless Networks.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

Resource management in heterogenous wireless networks with overlapping coverage.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006


  Loading...