Kevin S. Chan

Orcid: 0000-0002-6425-5403

Affiliations:
  • U.S. Army Research Laboratory, Adelphi, MD, USA
  • Georgia Institute of Technology, Atlanta, GA, USA (PhD)


According to our database1, Kevin S. Chan authored at least 134 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Complex network effects on the robustness of graph convolutional networks.
Appl. Netw. Sci., December, 2024

TenGAN: adversarially generating multiplex tensor graphs.
Data Min. Knowl. Discov., January, 2024

2023
Optimal Resource Allocation for Crowdsourced Image Processing.
IEEE Trans. Mob. Comput., October, 2023

Use Coupled LSTM Networks to Solve Constrained Optimization Problems.
IEEE Trans. Cogn. Commun. Netw., April, 2023

Synthesis of Large-Scale Instant IoT Networks.
IEEE Trans. Mob. Comput., March, 2023

Using Overlapping Methods to Counter Adversaries in Community Detection.
CoRR, 2023

Harvester: Principled Factorization-based Temporal Tensor Granularity Estimation.
Proceedings of the 2023 SIAM International Conference on Data Mining, 2023

Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments.
Proceedings of the IEEE Military Communications Conference, 2023

Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation.
Proceedings of the IEEE Military Communications Conference, 2023

Federated Learning with Flexible Control.
Proceedings of the IEEE INFOCOM 2023, 2023

Reinforcement Learning for Resource Allocation with Periodic Traffic Patterns.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Communication-Efficient $k$k-Means for Edge-Based Machine Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Optimizing the quality of information of networked machine learning agents.
J. Netw. Comput. Appl., 2022

Adversarial Plannning.
CoRR, 2022

Joint Coreset Construction and Quantization for Distributed Machine Learning.
CoRR, 2022

Series Editorial: Military Communications and Networks.
IEEE Commun. Mag., 2022

Enabling Machine Learning on Resource-constrained Tactical Networks.
Proceedings of the IEEE Military Communications Conference, 2022

Adaptive Monitoring for Analytics Placement in Tactical Networks.
Proceedings of the IEEE Military Communications Conference, 2022

Communication-Efficient Device Scheduling for Federated Learning Using Stochastic Optimization.
Proceedings of the IEEE INFOCOM 2022, 2022

The Effects of Message Sorting in the Diffusion of Information in Online Social Media.
Proceedings of the Complex Networks and Their Applications XI, 2022

2021
Service Placement and Request Scheduling for Data-Intensive Applications in Edge Clouds.
IEEE/ACM Trans. Netw., 2021

Augur: Modeling the Resource Requirements of ConvNets on Mobile Devices.
IEEE Trans. Mob. Comput., 2021

PicSys: Energy-Efficient Fast Image Search on Distributed Mobile Networks.
IEEE Trans. Mob. Comput., 2021

Polarization and Fluctuations in Signed Social Networks.
IEEE Trans. Autom. Control., 2021

Nonbacktracking Eigenvalues under Node Removal: X-Centrality and Targeted Immunization.
SIAM J. Math. Data Sci., 2021

Series Editorial: Military Communications and Networks.
IEEE Commun. Mag., 2021

Robust Solutions to Constrained Optimization Problems by LSTM Networks.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

NATO Core Services profiling for Hybrid Tactical Networks - Results and Recommendations.
Proceedings of the International Conference on Military Communication and Information Systems, 2021

Eluding ML-based Adblockers With Actionable Adversarial Examples.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
NetVision: On-Demand Video Processing in Wireless Networks.
IEEE/ACM Trans. Netw., 2020

Looking Glass of NFV: Inferring the Structure and State of NFV Network From External Observations.
IEEE/ACM Trans. Netw., 2020

Resource Allocation in One-dimensional Distributed Service Networks with Applications.
Perform. Evaluation, 2020

Robust Coreset Construction for Distributed Machine Learning.
IEEE J. Sel. Areas Commun., 2020

Design of Robust Lyapunov-Based Observers for Nonlinear Systems With Sum-of-Squares Programming.
IEEE Control. Syst. Lett., 2020

Sharing Models or Coresets: A Study based on Membership Inference Attack.
CoRR, 2020

Topological Effects on Attacks Against Vertex Classification.
CoRR, 2020

Node Immunization with Non-backtracking Eigenvalues.
CoRR, 2020

A4 : Evading Learning-based Adblockers.
CoRR, 2020

GLEE: Geometric Laplacian Eigenmap Embedding.
J. Complex Networks, 2020

Joint Coreset Construction and Quantization for Distributed Machine Learning.
Proceedings of the 2020 IFIP Networking Conference, 2020

SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Decentralized placement of data and analytics in wireless networks for energy-efficient execution.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Optimizing Communication Strategies in Contested and Dynamic Environments.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Communication-efficient k-Means for Edge-based Machine Learning.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Rapid Top-Down Synthesis of Large-Scale IoT Networks.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Waypoint-based Topology Inference.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Learning and Planning in the Feature Deception Problem.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Harnessing the Power of Deception in Attack Graph-Based Security Games.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency.
Proceedings of the Computer Vision - ECCV 2020, 2020

You do (not) belong here: detecting DPI evasion attacks with context learning.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
Dynamic Service Migration in Mobile Edge Computing Based on Markov Decision Process.
IEEE/ACM Trans. Netw., 2019

CrowdVision: A Computing Platform for Video Crowdprocessing Using Deep Learning.
IEEE Trans. Mob. Comput., 2019

Adaptive Federated Learning in Resource Constrained Edge Computing Systems.
IEEE J. Sel. Areas Commun., 2019

Geometric Laplacian Eigenmap Embedding.
CoRR, 2019

Learning and Planning in Feature Deception Games.
CoRR, 2019

Robust Coreset Construction for Distributed Machine Learning.
CoRR, 2019

A queueing-theoretic model for resource allocation in one-dimensional distributed service network.
CoRR, 2019

Military Communications and Networks.
IEEE Commun. Mag., 2019

Hybrid SDN Control in Mobile Ad Hoc Networks.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Caesar: cross-camera complex activity recognition.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

Pub/Sub-Sum: A Content Summarization Pub/Sub Protocol for Information-Centric Networks.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Resource Allocation in One-Dimensional Distributed Service Networks.
Proceedings of the 27th IEEE International Symposium on Modeling, 2019

Service Placement and Request Scheduling for Data-intensive Applications in Edge Clouds.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

The Interplay of Emotions and Norms in Multiagent Systems.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Multicast-Based Weight Inference in General Network Topologies.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

MaxHedge: Maximizing a Maximum Online.
Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, 2019

2018
A queueing-theoretic model for resource allocation in one-dimensional distributed analytics network?
SIGMETRICS Perform. Evaluation Rev., 2018

Red/LeD: An Asymptotically Optimal and Scalable Online Algorithm for Service Caching at the Edge.
IEEE J. Sel. Areas Commun., 2018

MaxHedge: Maximising a Maximum Online with Theoretical Performance Guarantees.
CoRR, 2018

Experimentation With Fuzzy Interest Forwarding in Named Data Networking.
CoRR, 2018

Network Traffic Obfuscation: An Adversarial Machine Learning Approach.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

An Environment for Tactical SDN Experimentation.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Reinforcement Learning for Quality of Experience Optimization in Tactical Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Kestrel: Video Analytics for Augmented Multi-Camera Vehicle Tracking.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine Learning.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Computing Platform for Video Crowdprocessing Using Deep Learning.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Using MQTT to support mobile tactical force situational awareness.
Proceedings of the International Conference on Military Communications and Information Systems, 2018

Chaff Allocation and Performance for Network Traffic Obfuscation.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Distributed Machine Learning in Coalition Environments: Overview of Techniques.
Proceedings of the 21st International Conference on Information Fusion, 2018

Impact of Attributes on Group Formation.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks.
IEEE Trans. Serv. Comput., 2017

Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs.
IEEE Trans. Parallel Distributed Syst., 2017

Information Cascades in Feed-Based Networks of Users with Limited Attention.
IEEE Trans. Netw. Sci. Eng., 2017

Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach.
IEEE J. Sel. Areas Commun., 2017

Topology Design Games and Dynamics in Adversarial Environments.
IEEE J. Sel. Areas Commun., 2017

A Survey on Modeling and Optimizing Multi-Objective Systems.
IEEE Commun. Surv. Tutorials, 2017

Influence of Personal Preferences on Link Dynamics in Social Networks.
Complex., 2017

Military Communications.
IEEE Commun. Mag., 2017

Data distribution and scheduling for distributed analytics tasks.
Proceedings of the 2017 IEEE SmartWorld, 2017

Physics-inspired models for agile code and data in federated edges.
Proceedings of the 2017 IEEE SmartWorld, 2017

Opportunities and challenges for named data networking to increase the agility of military coalitions.
Proceedings of the 2017 IEEE SmartWorld, 2017

Decentralized network protection games in adversarial environments.
Proceedings of the 2017 IFIP Networking Conference, 2017

Modeling the Resource Requirements of Convolutional Neural Networks on Mobile Devices.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

Efficient chaff-aided obfuscation in resource constrained environments.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

On-demand Information Retrieval from Videos Using Deep Learning in Wireless Networks: Demo Abstract.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Location Privacy in Mobile Edge Clouds.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Fuzzy Interest Forwarding.
Proceedings of the Asian Internet Engineering Conference, 2017

2016
Trust threshold based public key management in mobile ad hoc networks.
Ad Hoc Networks, 2016

Topology design under adversarial dynamics.
Proceedings of the 14th International Symposium on Modeling and Optimization in Mobile, 2016

Asymptotically optimal algorithm for online reconfiguration of edge-clouds.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Exploring dependencies of networks of multi-genre network experiments.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

On-demand video processing in wireless networks.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Video processing of complex activity detection in resource-constrained networks.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Co-evolution of two networks representing different social relations in NetSense.
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016

Editing network topologies by playing potential games.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Impact of message sorting on access to novel information in networks.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Dynamic service migration and workload scheduling in edge-clouds.
Perform. Evaluation, 2015

A Survey on Trust Modeling.
ACM Comput. Surv., 2015

TANDEM: a trust-based agent framework for networked decision making.
Comput. Math. Organ. Theory, 2015

Dynamic service migration in mobile edge-clouds.
Proceedings of the 14th IFIP Networking Conference, 2015

Emulation-based study of dynamic service placement in mobile micro-clouds.
Proceedings of the 34th IEEE Military Communications Conference, 2015

SOA and Wireless Mobile Networks in the tactical domain: Results from experiments.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Security-aware service migration for tactical mobile micro-clouds.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Topology control for time-varying contested environments.
Proceedings of the 34th IEEE Military Communications Conference, 2015

trustd: Trust daemon experimental testbed for network emulation.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Quality of information approach to improving source selection in tactical networks.
Proceedings of the 18th International Conference on Information Fusion, 2015

2014
Mobility-Induced Service Migration in Mobile Micro-clouds.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Trust-Based Information and Decision Fusion for Military Convoy Operations.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Finding true and credible information on Twitter.
Proceedings of the 17th International Conference on Information Fusion, 2014

A Model of Trust, Moods, and Emotions in Multiagent Systems and its Empirical Evaluation.
Proceedings of the 17th International Workshop on Trust in Agent Societies co-located with the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2014), 2014

2013
Building Trust-Based Sustainable Networks.
IEEE Technol. Soc. Mag., 2013

Composite trust-based public key management in mobile ad hoc networks.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Trust and independence aware decision fusion in distributed networks.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

2012
Composite Trust Model for an Information Sharing Scenario.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

The effect of zealotry in the naming game model of opinion dynamics.
Proceedings of the 31st IEEE Military Communications Conference, 2012

An agent based model for trust and information sharing in networked systems.
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2012

2009
Connectivity properties of large-scale sensor networks.
Wirel. Networks, 2009

2008
A Resiliency-Connectivity metric in wireless sensor networks with key predistribution schemes and node compromise attacks.
Phys. Commun., 2008

Analysis of latency in secure wireless sensor networks with key predistribution.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

2006
Security Services in Wireless Sensor Networks Using Sparse Random Coding.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

2005
Analysis of hierarchical algorithms for wireless sensor network routing protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

2004
A block cipher cryptosystem using wavelet transforms over finite fields.
IEEE Trans. Signal Process., 2004


  Loading...