Thomas M. Chen

According to our database1, Thomas M. Chen authored at least 70 papers between 1989 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Noise Removal Approach from EEG Recordings Based on Variational Autoencoders.
Proceedings of the 13th International Conference on Computer and Automation Engineering, 2021

2020
Reinforcement Learning for Efficient Network Penetration Testing.
Inf., 2020

2019
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

Cryptography in WSNs.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

Wearables Security and Privacy.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

2018
Automated generation of colluding apps for experimental research.
J. Comput. Virol. Hacking Tech., 2018

Detection of app collusion potential using logic programming.
J. Netw. Comput. Appl., 2018

Optimal Policy Derivation for Transmission Duty-Cycle Constrained LPWAN.
IEEE Internet Things J., 2018

Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect.
CoRR, 2018

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations.
Proceedings of the Security Protocols XXVI, 2018

Mitigating CSRF attacks on OAuth 2.0 Systems.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

2017
PIndroid: A novel Android malware detection system using ensemble learning methods.
Comput. Secur., 2017

Android Application Collusion Demystified.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

2016
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves.
J. Univers. Comput. Sci., 2016

A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices.
Int. J. Cyber Situational Aware., 2016

A Survey of Wearable Biometric Recognition Systems.
ACM Comput. Surv., 2016

Towards Automated Android App Collusion Detection.
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

2015
ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks.
J. Sensors, 2015

2014
A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things.
IEEE Trans. Ind. Informatics, 2014

Write Pattern Format Algorithm for Reliable NAND-Based SSDs.
IEEE Trans. Circuits Syst. II Express Briefs, 2014

Concatenated LDPC-TCM coding for reliable storage in multi-level flash memories.
Proceedings of the 9th International Symposium on Communication Systems, 2014

Energy Harvesting Aware routing protocol for wireless sensor networks.
Proceedings of the 9th International Symposium on Communication Systems, 2014

2013
Nonintrusive tracing in the Internet.
Secur. Commun. Networks, 2013

Design and Evaluation of a Framework for Cooperative and Adaptive QoS Control of DSRC Network for Road Safety Applications.
Int. J. Distributed Sens. Networks, 2013

2012
Editor's note.
IEEE Netw., 2012

2011
Performance analysis of DSRC priority mechanism for road safety applications in vehicular networks.
Wirel. Commun. Mob. Comput., 2011

Petri Net Modeling of Cyber-Physical Attacks on Smart Grid.
IEEE Trans. Smart Grid, 2011

How networks changed the world.
IEEE Netw., 2011

Lessons from Stuxnet.
Computer, 2011

Malicious and Spam Posts in Online Social Networks.
Computer, 2011

2010
Identity Theft through the Web.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Proliferation and Detection of Blog Spam.
IEEE Secur. Priv., 2010

Adaptive congestion control for DSRC vehicle networks.
IEEE Commun. Lett., 2010

Web Filtering and Censoring.
Computer, 2010

Studying Non-intrusive Tracing in the Internet.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

2009
Recent developments in network intrusion detection [guest editorial].
IEEE Netw., 2009

Classification of Traffic Flows into QoS Classes by Unsupervised Learning and KNN Clustering.
KSII Trans. Internet Inf. Syst., 2009

Design considerations for a honeypot for SQL injection Attacks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

A Mathematical View of Network-Based Suppressions of Worm Epidemics.
Proceedings of IEEE International Conference on Communications, 2009

2008
Authentication and Privacy.
Encyclopedia of Wireless and Mobile Communications, 2008

2007
A Web-Based Network Worm Simulator.
Proceedings of IEEE International Conference on Communications, 2007

2006
HEAF: A Novel Estimator for Long-Range Dependent Self-similar Network Traffic.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

A Decision Theoretic Approach to Measurement-based Admission Control.
Proceedings of IEEE International Conference on Communications, 2006

Effectiveness of Quarantine in Worm Epidemics.
Proceedings of IEEE International Conference on Communications, 2006

Effectiveness of Rate Control in Slowing Down Worm Epidemics.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks.
IEEE Internet Comput., 2005

2004
Worm Epidemics in High-Speed Networks.
Computer, 2004

Enhancing the support of multihopping in an IEEE 802.11 ad-hoc network.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Measurement-based real-time traffic model classification.
Proceedings of IEEE International Conference on Communications, 2004

An overlay algorithm to improve the support of multi-hopping in the IEEE 802.11 WLANs.
Proceedings of IEEE International Conference on Communications, 2004

2003
ATM dynamic bandwidth allocation using F-ARIMA prediction model.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

2002
A model and evaluation of distributed network management approaches.
IEEE J. Sel. Areas Commun., 2002

Guest editorial - trends in high-performance switching and routing technologies.
IEEE Commun. Mag., 2002

Perspectives - internet computing as a utility.
IEEE Commun. Mag., 2002

2001
Increasing the observability of Internet behavior.
Commun. ACM, 2001

Models and Analysis of Trade-offs in Distributed Network Management Approaches.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

2000
Guest editorial recent advances in network management and operations.
IEEE J. Sel. Areas Commun., 2000

Network traffic measurements and experiments [Guest Editorial].
IEEE Commun. Mag., 2000

Evolution to the programmable Internet.
IEEE Commun. Mag., 2000

Fault restoration and spare capacity allocation with QoS constraints for MPLS networks.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1998
INQIRE: a software approach to monitoring QoS in ATM networks.
IEEE Netw., 1998

Editorial - Wireless LANs.
Mob. Networks Appl., 1998

1997
Network And Internet Security (Guest Editorial).
IEEE Netw., 1997

1996
Monitoring and control of ATM networks using special cells.
IEEE Netw., 1996

The available bit rate service for data in ATM networks.
IEEE Commun. Mag., 1996

1995
Time-Dependent Behavior of Fluid Buffer Models with Markov Input and Constant Output Rates.
SIAM J. Appl. Math., 1995

ATM switching systems.
Artech House, ISBN: 978-0-89006-682-9, 1995

1994
Parameter estimation for partially observed queues.
IEEE Trans. Commun., 1994

Management and control functions in ATM switching systems.
IEEE Netw., 1994

1989
Dynamic priority protocols for packet voice.
IEEE J. Sel. Areas Commun., 1989


  Loading...