Chao Chen

Orcid: 0000-0003-0502-8742

Affiliations:
  • Indiana University - Purdue University Fort Wayne, Department of Engineering, IN, USA


According to our database1, Chao Chen authored at least 31 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Defending against FakeBob Adversarial Attacks in Speaker Verification Systems with Noise-Adding.
Algorithms, 2022

2021
Defending Against Adversarial Attacks in Speaker Verification Systems.
Proceedings of the IEEE International Performance, 2021

2019
Self-stopping strategies for tractable information dissemination in dense mobile sensor networks.
Int. J. Sens. Networks, 2019

2016
Cognition and Cooperation in Advanced Wireless and Mobile Information Systems.
Mob. Inf. Syst., 2016

Characterising heterogeneity in vulnerable hosts on worm propagation.
Int. J. Secur. Networks, 2016

Self-stopping epidemic routing in cooperative wireless mobile sensor networks.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

2014
Adaptive energy-efficient spectrum probing in cognitive radio networks.
Ad Hoc Networks, 2014

2013
Design and Implementation of a Wireless Sensor and Actuator Network for Energy Measurement and Control at Home
CoRR, 2013

Wireless cloud architecture based on thin clients and ontologies.
Proceedings of the IEEE 56th International Midwest Symposium on Circuits and Systems, 2013

2012
On the Characteristics of the Worm Infection Family Tree.
IEEE Trans. Inf. Forensics Secur., 2012

Heterogeneity in vulnerable hosts slows down worm propagation.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Darknet-Based Inference of Internet Worm Temporal Characteristics.
IEEE Trans. Inf. Forensics Secur., 2011

Characterizing Internet Worm Infection Structure.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

2010
Design of a Child Localization System on RFID and Wireless Sensor Networks.
J. Sensors, 2010

On the scalability of Delay-Tolerant Botnets.
Int. J. Secur. Networks, 2010

Towards a routing framework in ad hoc space networks.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Implementing and Evaluating a Wireless Body Sensor System for Automated Physiological Data Acquisition at Home
CoRR, 2010

Characterizing and defending against divide-conquer-scanning worms.
Comput. Networks, 2010

On Spectrum Probing in Cognitive Radio Networks: Does Randomization Matter?
Proceedings of IEEE International Conference on Communications, 2010

On the Robustness of the Botnet Topology Formed by Worm Infection.
Proceedings of the Global Communications Conference, 2010

2009
Exploiting Contact Spatial Dependency for Opportunistic Message Forwarding.
IEEE Trans. Mob. Comput., 2009

Deriving a closed-form expression for worm-scanning strategies.
Int. J. Secur. Networks, 2009

Modeling primary user emulation attacks and defenses in cognitive radio networks.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

Delay-Tolerant Botnets.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Modeling of a Public Safety Communication System for Emergency Response.
Proceedings of IEEE International Conference on Communications, 2009

Design and Evaluation of a Wireless Body Sensor System for Smart Home Health Monitoring.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Understanding Divide-Conquer-Scanning Worms.
Proceedings of the 2008 IEEE International Performance, 2008

A Closed-Form Expression for Static Worm-Scanning Strategies.
Proceedings of IEEE International Conference on Communications, 2008

Inferring Internet Worm Temporal Characteristics.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Evaluating contacts for routing in highly partitioned mobile networks.
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007

Understanding Localized-Scanning Worms.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007


  Loading...