Shin-Ming Cheng

Orcid: 0000-0002-9796-0643

According to our database1, Shin-Ming Cheng authored at least 89 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security Threats to xApps Access Control and E2 Interface in O-RAN.
IEEE Open J. Commun. Soc., 2024

2023
Supporting 6G Mission-Critical Services on O-RAN.
IEEE Internet Things Mag., September, 2023

IoT malware classification based on reinterpreted function-call graphs.
Comput. Secur., 2023

On Manipulating Routing Table to Realize Redirect Attacks in O-RAN by Malicious xApp.
Proceedings of the 26th International Symposium on Wireless Personal Multimedia Communications, 2023

Hash-Based Function Call Graph Fusion Method for IoT Malware Detection.
Proceedings of the 26th International Symposium on Wireless Personal Multimedia Communications, 2023

Developing xApps for Rogue Base Station Detection in SDR-Enabled O-RAN.
Proceedings of the IEEE INFOCOM 2023, 2023

A Framework for Robustness Evaluation in AI-Based Malware Detectors.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023

2022
Attack Detection and Mitigation in MEC-Enabled 5G Networks for AIoT.
IEEE Internet Things Mag., 2022

Joint Beamforming and Power Allocation for M2M/H2H Co-Existence in Green Dynamic TDD Networks: Low-Complexity Optimal Designs.
IEEE Internet Things J., 2022

A Mobility-Based Epidemic Model for IoT Malware Spread.
IEEE Access, 2022

Conformance Testing for 5G O-RAN Entities through MEC.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2021
IoT Malware Detection Using Function-Call-Graph Embedding.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2020
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020

An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds.
CoRR, 2020

3GPP NR Sidelink Transmissions Toward 5G V2X.
IEEE Access, 2020

Cross Platform IoT- Malware Family Classification based on Printable Strings.
Proceedings of the 19th IEEE International Conference on Trust, 2020

ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Beamforming and Power Allocation in Dynamic TDD Based H2H/M2M Networks with Energy Harvesting.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

Beamforming and Power Allocation in Dynamic TDD Networks Supporting Machine-Type Communication.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

IoT-Malware Detection Based on Byte Sequences of Executable Files.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

DDoS Attacks in Experimental LTE Networks.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Toward Large-Scale Rogue Base Station Attacks Using Container-Based Virtualization.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Demo: An Emulator-Based Active Protection System Against IoT Malware.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

AutoZOOM: Autoencoder-Based Zeroth Order Optimization Method for Attacking Black-Box Neural Networks.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Intelligent Smoke Alarm System with Wireless Sensor Network Using ZigBee.
Wirel. Commun. Mob. Comput., 2018

Delay Guaranteed Network Association for Mobile Machines in Heterogeneous Cloud Radio Access Network.
IEEE Trans. Mob. Comput., 2018

Analysis of Data Dissemination and Control in Social Internet of Vehicles.
IEEE Internet Things J., 2018

Analysis of Information Delivery Dynamics in Cognitive Sensor Networks Using Epidemic Models.
IEEE Internet Things J., 2018

Privacy Preserved Mobile Sensing Using Region-Based Group Signature.
IEEE Access, 2018

Energy-Efficient D2D Underlaid MIMO Cellular Networks with Energy Harvesting.
Proceedings of the IEEE Global Communications Conference, 2018

2017
eNB Selection for Machine Type Communications Using Reinforcement Learning Based Markov Decision Process.
IEEE Trans. Veh. Technol., 2017

Traffic-Aware Patching for Cyber Security in Mobile IoT.
IEEE Commun. Mag., 2017

On Designing Energy Efficient Wi-Fi P2P Connections for Internet of Things.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Sum-rate maximization for energy harvesting-aided D2D communications underlaid cellular networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Retransmission-Based Access Class Barring for Machine Type Communications.
Proceedings of the IoT as a Service - Third International Conference, 2017

Energy-Efficient BLE Device Discovery for Internet of Things.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

On exploiting SDN to facilitate IPv4/IPv6 coexistence and transition.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Secure location tracking of femtocells in heterogeneous cellular networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

FEAST: An Automated Feature Selection Framework for Compilation Tasks.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Resource-Optimal Licensed-Assisted Access in Heterogeneous Cloud Radio Access Networks With Heterogeneous Carrier Communications.
IEEE Trans. Veh. Technol., 2016

Buffer Occupancy and Delivery Reliability Tradeoffs for Epidemic Routing.
CoRR, 2016

Decapitation via digital epidemics: a bio-inspired transmissive attack.
IEEE Commun. Mag., 2016

SandUSB: An installation-free sandbox for USB peripherals.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Ecology-Based DoS Attack in Cognitive Radio Networks.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

A responsive probing approach to detect dynamic intrusion in a MANET.
Proceedings of the 7th International Conference on Information, 2016

2015
Sequential Defense Against Random and Intentional Attacks in Complex Networks.
CoRR, 2015

When crowdsourcing meets mobile sensing: a social network perspective.
IEEE Commun. Mag., 2015

Cognitive vertical handover in heterogeneous networks.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

Experimental emergency communication systems using USRP and GNU radio platform.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

Multivariate and Categorical Analysis of Gaming Statistics.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Supervised Collective Classification for Crowdsourcing.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
Optimal Control of Epidemic Information Dissemination Over Networks.
IEEE Trans. Cybern., 2014

Information Fusion to Defend Intentional Attack in Internet of Things.
IEEE Internet Things J., 2014

Modeling Dynamics of Malware with Incubation Period from the View of Individual.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

Duality on timing alignment and radio resources orthogonality toward 5G heterogeneous networks.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Cognitive access in multichannel wireless networks using two-dimension Markov chain.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Distributed anonymous authentication in heterogeneous networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

The Sybil Attack in Participatory Sensing: Detection and Analysis.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

2013
Interference Mitigation in CR-Enabled Heterogeneous Networks.
IEICE Trans. Commun., 2013

A Predator-Prey Model for Dynamics of Cognitive Radios.
IEEE Commun. Lett., 2013

Performance guaranteed statistical traffic control in cognitive cellular networks.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Performance Evaluation of Self-Configured Two-Tier Heterogeneous Cellular Networks.
Proceedings of the IEEE International Conference on Systems, 2013

Resource-optimal network resilience for real-time data exchanges in Cyber-Physical Systems.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

A lower bound on multi-hop transmission delay in cognitive radio ad hoc networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Detection of Sybil attacks in participatory sensing using Cloud based Trust Management System.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013

2012
Design and Analysis of Downlink Spectrum Sharing in Two-Tier Cognitive Femto Networks.
IEEE Trans. Veh. Technol., 2012

Radio Resource Management for QoS Guarantees in Cyber-Physical Systems.
IEEE Trans. Parallel Distributed Syst., 2012

Connectivity of Multiple Cooperative Cognitive Radio Ad Hoc Networks.
IEEE J. Sel. Areas Commun., 2012

Smart attacks in smart grid communication networks.
IEEE Commun. Mag., 2012

2011
On exploiting cognitive radio to mitigate interference in macro/femto heterogeneous networks.
IEEE Wirel. Commun., 2011

Efficiency of a Cognitive Radio Link with Opportunistic Interference Mitigation.
IEEE Trans. Wirel. Commun., 2011

Ecology of Cognitive Radio Ad Hoc Networks.
IEEE Commun. Lett., 2011

On Modeling Malware Propagation in Generalized Social Networks.
IEEE Commun. Lett., 2011

2010
Cognitive Radio Network Tomography.
IEEE Trans. Veh. Technol., 2010

Downlink capacity of two-tier cognitive femto networks.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

Statistical delay control of opportunistic links in cognitive radio networks.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

Phase Transition Diagram for Underlay Heterogeneous Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2010

2009
Modeling Key Caching for Mobile IP Authentication, Authorization, and Accounting (AAA) Services.
IEEE Trans. Veh. Technol., 2009

Performance Modeling for Application-Level Integration of Heterogeneous Wireless Networks.
IEEE Trans. Veh. Technol., 2009

2008
HISNs: Distributed gateways for application-level integration of heterogeneous wireless networks.
Wirel. Networks, 2008

Key Management for UMTS MBMS.
IEEE Trans. Wirel. Commun., 2008

Performance Evaluation for Minislot Allocation for Wireless Mesh Networks.
IEEE Trans. Veh. Technol., 2008

Performance modeling on handover latency in Mobile IP Regional Registration.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

2007
A Hash Function Scheme for Key Management in UMTS MBMS.
Proceedings of the Global Communications Conference, 2007

2006
Power-efficient routing mechanism for ODMA systems.
IEEE Trans. Veh. Technol., 2006

A study on distributed/centralized scheduling for wireless mesh network.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2005
An intelligent GGSN dispatching mechanism for UMTS.
Comput. Commun., 2005


  Loading...