Thomas M. Chen

  • City University of London, Department of Electrical & Electronic Engineering, UK
  • Swansea University, College of Engineering, UK
  • Southern Methodist University, Dallas, TX, USA
  • GTE Laboratories, Waltham, MA, USA
  • University of California, Berkeley, CA, USA (PhD 1990)

According to our database1, Thomas M. Chen authored at least 74 papers between 1988 and 2022.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:



Classification of Motor Imagery EEG Signals Based on Deep Autoencoder and Convolutional Neural Network Approach.
IEEE Access, 2022

Estimation of Ransomware Payments in Bitcoin Ecosystem.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A Noise Removal Approach from EEG Recordings Based on Variational Autoencoders.
Proceedings of the 13th International Conference on Computer and Automation Engineering, 2021

Reinforcement Learning for Efficient Network Penetration Testing.
Inf., 2020

OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

Cryptography in WSNs.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

Wearables Security and Privacy.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

Automated generation of colluding apps for experimental research.
J. Comput. Virol. Hacking Tech., 2018

Detection of app collusion potential using logic programming.
J. Netw. Comput. Appl., 2018

Optimal Policy Derivation for Transmission Duty-Cycle Constrained LPWAN.
IEEE Internet Things J., 2018

Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect.
CoRR, 2018

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations.
Proceedings of the Security Protocols XXVI, 2018

Mitigating CSRF attacks on OAuth 2.0 Systems.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

PIndroid: A novel Android malware detection system using ensemble learning methods.
Comput. Secur., 2017

Android Application Collusion Demystified.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves.
J. Univers. Comput. Sci., 2016

A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices.
Int. J. Cyber Situational Aware., 2016

A Survey of Wearable Biometric Recognition Systems.
ACM Comput. Surv., 2016

Towards Automated Android App Collusion Detection.
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks.
J. Sensors, 2015

A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things.
IEEE Trans. Ind. Informatics, 2014

Write Pattern Format Algorithm for Reliable NAND-Based SSDs.
IEEE Trans. Circuits Syst. II Express Briefs, 2014

Concatenated LDPC-TCM coding for reliable storage in multi-level flash memories.
Proceedings of the 9th International Symposium on Communication Systems, 2014

Energy Harvesting Aware routing protocol for wireless sensor networks.
Proceedings of the 9th International Symposium on Communication Systems, 2014

Nonintrusive tracing in the Internet.
Secur. Commun. Networks, 2013

Design and Evaluation of a Framework for Cooperative and Adaptive QoS Control of DSRC Network for Road Safety Applications.
Int. J. Distributed Sens. Networks, 2013

Editor's note.
IEEE Netw., 2012

Performance analysis of DSRC priority mechanism for road safety applications in vehicular networks.
Wirel. Commun. Mob. Comput., 2011

Petri Net Modeling of Cyber-Physical Attacks on Smart Grid.
IEEE Trans. Smart Grid, 2011

How networks changed the world.
IEEE Netw., 2011

Lessons from Stuxnet.
Computer, 2011

Malicious and Spam Posts in Online Social Networks.
Computer, 2011

Identity Theft through the Web.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Proliferation and Detection of Blog Spam.
IEEE Secur. Priv., 2010

Adaptive congestion control for DSRC vehicle networks.
IEEE Commun. Lett., 2010

Web Filtering and Censoring.
Computer, 2010

Studying Non-intrusive Tracing in the Internet.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

Recent developments in network intrusion detection [guest editorial].
IEEE Netw., 2009

Classification of Traffic Flows into QoS Classes by Unsupervised Learning and KNN Clustering.
KSII Trans. Internet Inf. Syst., 2009

Design considerations for a honeypot for SQL injection Attacks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

A Mathematical View of Network-Based Suppressions of Worm Epidemics.
Proceedings of IEEE International Conference on Communications, 2009

Authentication and Privacy.
Encyclopedia of Wireless and Mobile Communications, 2008

A Web-Based Network Worm Simulator.
Proceedings of IEEE International Conference on Communications, 2007

HEAF: A Novel Estimator for Long-Range Dependent Self-similar Network Traffic.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

A Decision Theoretic Approach to Measurement-based Admission Control.
Proceedings of IEEE International Conference on Communications, 2006

Effectiveness of Quarantine in Worm Epidemics.
Proceedings of IEEE International Conference on Communications, 2006

Effectiveness of Rate Control in Slowing Down Worm Epidemics.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks.
IEEE Internet Comput., 2005

Worm Epidemics in High-Speed Networks.
Computer, 2004

Enhancing the support of multihopping in an IEEE 802.11 ad-hoc network.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Measurement-based real-time traffic model classification.
Proceedings of IEEE International Conference on Communications, 2004

An overlay algorithm to improve the support of multi-hopping in the IEEE 802.11 WLANs.
Proceedings of IEEE International Conference on Communications, 2004

ATM dynamic bandwidth allocation using F-ARIMA prediction model.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

Internet performance monitoring.
Proc. IEEE, 2002

A model and evaluation of distributed network management approaches.
IEEE J. Sel. Areas Commun., 2002

Guest editorial - trends in high-performance switching and routing technologies.
IEEE Commun. Mag., 2002

Perspectives - internet computing as a utility.
IEEE Commun. Mag., 2002

Increasing the observability of Internet behavior.
Commun. ACM, 2001

Models and Analysis of Trade-offs in Distributed Network Management Approaches.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

Guest editorial recent advances in network management and operations.
IEEE J. Sel. Areas Commun., 2000

Network traffic measurements and experiments [Guest Editorial].
IEEE Commun. Mag., 2000

Evolution to the programmable Internet.
IEEE Commun. Mag., 2000

Fault restoration and spare capacity allocation with QoS constraints for MPLS networks.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

INQIRE: a software approach to monitoring QoS in ATM networks.
IEEE Netw., 1998

Editorial - Wireless LANs.
Mob. Networks Appl., 1998

Network And Internet Security (Guest Editorial).
IEEE Netw., 1997

Monitoring and control of ATM networks using special cells.
IEEE Netw., 1996

The available bit rate service for data in ATM networks.
IEEE Commun. Mag., 1996

Time-Dependent Behavior of Fluid Buffer Models with Markov Input and Constant Output Rates.
SIAM J. Appl. Math., 1995

ATM switching systems.
Artech House, ISBN: 978-0-89006-682-9, 1995

Parameter estimation for partially observed queues.
IEEE Trans. Commun., 1994

Management and control functions in ATM switching systems.
IEEE Netw., 1994

Dynamic priority protocols for packet voice.
IEEE J. Sel. Areas Commun., 1989

Integrated voice/data switching.
IEEE Commun. Mag., 1988