Qian Chen

Orcid: 0000-0002-0130-5901

Affiliations:
  • University of Texas at San Antonio, Department of Electrical and Computer Engineering, San Antonio, TX, USA
  • Savannah State University, Engineering Technology Department, Savannah, GA, USA (2014 - 2017)
  • Mississippi State University, Department of Electrical and Computer Engineering, Starkville, MS, USA (PhD 2014)


According to our database1, Qian Chen authored at least 32 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A comparative study of adversarial training methods for neural models of source code.
Future Gener. Comput. Syst., May, 2023

FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Blockchain-based automated and robust cyber security management.
J. Parallel Distributed Comput., 2022

ChainSCAN: A Blockchain-Based Supply Chain Alerting Framework for Food Safety.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification.
Inf. Syst. Frontiers, 2021

IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems.
IEEE Internet Things J., 2021

ExHPD: Exploiting Human, Physical, and Driving Behaviors to Detect Vehicle Cyber Attacks.
IEEE Internet Things J., 2021

Editorial for special issue on "security and privacy protection in the era of IoT devices".
Digit. Commun. Networks, 2021

2020
A Survey of Intrusion Detection Systems Leveraging Host Data.
ACM Comput. Surv., 2020

2019
Chapter Three - Toward realizing self-protecting healthcare information systems: Design and security challenges.
Adv. Comput., 2019

Recursive Gateway Allocation Combined with Self-localization and Model Checking in Mobile Ad-hoc Networks.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019

Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

2018
Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT Devices.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A safety and security architecture for reducing accidents in intelligent transportation systems.
Proceedings of the International Conference on Computer-Aided Design, 2018

2017
A data integrity verification scheme in mobile cloud computing.
J. Netw. Comput. Appl., 2017

Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Towards Realizing a Distributed Event and Intrusion Detection System.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

2016
Model-based autonomic security management for cyber-physical infrastructures.
Int. J. Crit. Infrastructures, 2016

An Open and Portable Platform for Learning Data Security in Mobile Cloud Computing.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Developing Hands-on Labware for Emerging Database Security.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

High-Performance Intrusion Response Planning on Many-Core Architectures.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Towards Realizing a Self-Protecting Healthcare Information System.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Towards Autonomic Security Management of Healthcare Information Systems.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC).
J. Artif. Intell. Soft Comput. Res., 2015

2014
A Model-Based Validated Autonomic Approach to Self-Protect Computing Systems.
IEEE Internet Things J., 2014

A Model-based Approach to Self-Protection in SCADA Systems.
Proceedings of the 9th International Workshop on Feedback Computing, 2014

Towards realizing self-protecting SCADA systems.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Towards automatic security management: a model-based approach.
Proceedings of the Cyber Security and Information Intelligence, 2013

A model-based approach to self-protection in computing system.
Proceedings of the ACM Cloud and Autonomic Computing Conference, 2013


  Loading...