Chia-Mei Chen

Orcid: 0000-0002-4361-0461

According to our database1, Chia-Mei Chen authored at least 68 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

2022
A Novel Verification Scheme to Resist Online Password Guessing Attacks.
IEEE Trans. Dependable Secur. Comput., 2022

Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents.
J. Glob. Inf. Manag., 2022

Automatic Summarization of Critical Threat Intelligence Using Transfer Learning.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

Applying an IoT Analytics Framework in East Asia Area.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

2021
Detecting PE infection-based malware.
Int. J. Secur. Networks, 2021

A Novel Verification scheme for Resisting Password Guessing Attacks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding.
Multim. Tools Appl., 2020

A Power-Efficient Approach to Detect Mobile Threats on the Emergent Network Environment.
IEEE Access, 2020

The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Joint index coding and reversible data hiding methods for color image quantization.
Multim. Tools Appl., 2019

Applying Convolutional Neural Network for Malware Detection.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

A Study on Security Trend based on News Analysis.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

2018
Advancing Malware Classification With an Evolving Clustering Method.
Int. J. Appl. Metaheuristic Comput., 2018

Evolution of Advanced Persistent Threat (APT) Attacks and Actors.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

A Novel Tamper Detection and Image Recovery Technique for Color Image Demosaicking.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Network Anomaly Detection Based on Artificial Intelligence.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual?
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Improving Alert Accuracy for Smart Vehicles.
Proceedings of the Network and System Security - 11th International Conference, 2017

Identifying Threat Patterns of Android Applications.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2016
Exploring Cross-Site Scripting Botnet Detection and simulation.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
Detecting botnet by anomalous traffic.
J. Inf. Secur. Appl., 2015

Efficient suspicious URL filtering based on reputation.
J. Inf. Secur. Appl., 2015

Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks.
Proceedings of the Genetic and Evolutionary Computing, 2015

The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, an Advanced and Efficient Method.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Detecting Hybrid Botnets with Web Command and Control Servers or Fast Flux Domain.
J. Inf. Hiding Multim. Signal Process., 2014

Feature set identification for detecting suspicious URLs using Bayesian classification in social networks.
Inf. Sci., 2014

Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code.
Proceedings of the 2014 International Conference on Trustworthy Systems and their Applications, 2014

An efficient honeypot based malware classification system.
Proceedings of the Intelligent Systems and Applications, 2014

Targeted Attack Prevention at Early Stage.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
A proactive approach to intrusion detection and malware collection.
Secur. Commun. Networks, 2013

Detecting Web Attacks Based on Domain Statistics.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2013

Defending malicious attacks in Cyber Physical Systems.
Proceedings of the 1st IEEE International Conference on Cyber-Physical Systems, 2013

2012
Formulistic Detection of Malicious Fast-Flux Domains.
Proceedings of the Fifth International Symposium on Parallel Architectures, 2012

Attack Sequence Detection in Cloud Using Hidden Markov Model.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
A Group-Based Deployment for Wormhole Prevention in Sensor Networks.
J. Inf. Sci. Eng., 2011

A Specific Effort Estimation Method Using Function Point.
J. Inf. Sci. Eng., 2011

Secure Mechanism for Mobile Web Browsing.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

2010
An optimal new-node placement to enhance the coverage of wireless sensor networks.
Wirel. Networks, 2010

Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm.
Int. J. Bus. Intell. Data Min., 2010

Malicious web content detection by machine learning.
Expert Syst. Appl., 2010

An efficient network intrusion detection.
Comput. Commun., 2010

2009
Anti-spam Filter Based on Data Mining and Statistical Test.
Proceedings of the Computer and Information Science 2009 [outstanding papers from the 8th ACIS/IEEE International Conference on Computer and Information Science, 2009

A collaborative anti-spam system.
Expert Syst. Appl., 2009

Communication-efficient three-party protocols for authentication and key agreement.
Comput. Math. Appl., 2009

Anomaly Behavior Analysis for Web Page Inspection.
Proceedings of the First International Conference on Networks and Communications, 2009

2008
Ant-based IP traceback.
Expert Syst. Appl., 2008

Malicious Webpage Detection by Semantics-Aware Reasoning.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Defending On-Line Web Application Security with User-Behavior Surveillance.
Proceedings of the The Third International Conference on Availability, 2008

Distributed Detection in Wireless Sensor Networks.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Dynamic Service Composition for Virtual UPnP Device Creation in Home Network Environment.
Proceedings of the WEBIST 2007, 2007

A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

Information Exchange Mechanism Based on Reputation in Mobile P2P Networks.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Alliance-Based Anti-spam Approach.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
An Adaptive Data Broadcasting Scheme for Wireless Access.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006

Node Placement for Optimal Coverage in Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Tracing Denial of Service Origin: Ant Colony Approach.
Proceedings of the Applications of Evolutionary Computing, 2006

Optimal Tree-based Adaptive Broadcasting for Mobile Web Services.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Object-Based Multimedia Scheduling Based on Bipartite Graphs.
IEICE Trans. Commun., 2005

2004
Optimizing Object-based Multimedia Delivery Across Bandwidth Constrained Networks.
Comput. J., 2004

2002
Network topology management in a mobile-switch ATM network: dynamic partition algorithms.
Int. J. Netw. Manag., 2002

2000
A Fault-Tolerance Model for Multiprocessor Real-Time Systems.
J. Comput. Syst. Sci., 2000

Dynamic Round-based Resource Management for On-demand Multimedia Servers.
Comput. J., 2000

1998
Low-Power Design for Real-Time Systems.
Real Time Syst., 1998

1996
A Cyclic Scheduling for Relative Timing Requirements.
Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 1996

1994
A Resource Synchronization Protocol for Multiprocessor Real-Time Systems.
Proceedings of the 1994 International Conference on Parallel Processing, 1994


  Loading...