Tieming Chen
Orcid: 0000-0003-4664-3311
According to our database1,
Tieming Chen
authored at least 83 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Pruning Networks Only Using Few-Shot Pretraining Based on Gradient Similarity Frequency.
IEEE Trans. Artif. Intell., August, 2025
GANDACOG: Implicit Mobile User Authentication in Multi Environments With Scarce Data.
IEEE Internet Things J., July, 2025
HTs-GCN: Identifying Hardware Trojan Nodes in Integrated Circuits Using a Graph Convolutional Network.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., June, 2025
Privacy-Aware Edge Intelligent Parking Recommendation Using Intuitionistic Fuzzy Sets.
IEEE Trans. Ind. Informatics, May, 2025
ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting.
CoRR, January, 2025
METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift.
CoRR, January, 2025
SAPTSTA-AnoECG: a PatchTST-based ECG anomaly detection method with subtractive attention and data augmentation.
Appl. Intell., January, 2025
Dehydrator: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation.
IEEE Trans. Inf. Forensics Secur., 2025
TAGAPT: Toward Automatic Generation of APT Samples With Provenance-Level Granularity.
IEEE Trans. Inf. Forensics Secur., 2025
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports.
IEEE Trans. Dependable Secur. Comput., 2025
Proc. ACM Softw. Eng., 2025
Actminer: Applying causality tracking and increment aligning for graph-based threat hunting.
Knowl. Based Syst., 2025
SAWD-AC: A spring-based adaptively weighted dual-stream model for aeromagnetic compensation.
Inf. Sci., 2025
A relational triplet extraction method for constructing network security knowledge graph.
Int. J. Sens. Networks, 2025
VulnTrace: Tracking and Detecting Code Vulnerabilities with Historical Commits and Semantic Embeddings.
Int. J. Softw. Eng. Knowl. Eng., 2025
LinTracer: An efficient tracking system for cyberattack chains fusing entity and event semantics.
Comput. Secur., 2025
MIRDETECTOR: Applying malicious intent representation for enhanced APT anomaly detection.
Comput. Secur., 2025
HER-PT: An intelligent penetration testing framework with Hindsight Experience Replay.
Comput. Secur., 2025
PDCleaner: A multi-view collaborative data compression method for provenance graph-based APT detection systems.
Comput. Secur., 2025
Kellect: A Kernel-based efficient and lossless event log collector for windows security.
Comput. Secur., 2025
Proceedings of the 22nd IEEE/ACM International Conference on Software and Systems Reuse, 2025
2024
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs.
Cybersecur., December, 2024
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy.
IEEE Trans. Mob. Comput., April, 2024
CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters.
Comput. Secur., January, 2024
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoreCast: Leveraging Project Metrics to Predict Core Contributor Trends in Open Source C57.
Proceedings of the 36th International Conference on Software Engineering and Knowledge Engineering, 2024
DocSecKG: A Systematic Approach for Building Knowledge Graph to Understand the Relationship Between Docker Image and Vulnerability.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
A Novel Fuzzy Trust-Based Secure Vehicular Data Forwarding Scheme Using Incentive Consensus.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2024
FuzzyFollow: A Novel Privacy-Aware Intelligent Vehicle-Following Scheme for Safe Driving on Risky Roads Using Fuzzy Sets.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends.
Comput. Secur., December, 2023
Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons.
Inf. Sci., August, 2023
IEEE Trans. Dependable Secur. Comput., 2023
fuzzyForward: A Novel Multi-hop Data Forwarding Scheme Using Fuzzy Decision for Edge VANETs.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023
TCFP: A Novel Privacy-Aware Edge Vehicular Trajectory Compression Scheme Using Fuzzy Markovian Prediction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
2022
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment.
IEEE Trans. Mob. Comput., 2022
Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network.
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Fuzzy Syst., 2022
2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Intell. Transp. Syst., 2021
General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
A Domain-Specific Non-Factoid Question Answering System based on Terminology Mining and Siamese Neural Network.
J. Inf. Sci. Eng., 2021
CoRR, 2021
FuzzySkyline: QoS-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
2020
A Collaborative Deep and Shallow Semisupervised Learning Framework for Mobile App Classification.
Mob. Inf. Syst., 2020
Int. J. Robotics Autom., 2020
WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
一种基于地形因素的空气质量空间估计方法 (Spatial Estimation Method of Air Quality Based on Terrain Factors LV Ming-qi LI Yi-fan CHEN Tie-ming).
计算机科学, 2019
KSII Trans. Internet Inf. Syst., 2019
Air quality estimation by exploiting terrain features and multi-view transfer semi-supervised regression.
Inf. Sci., 2019
Discovering individual movement patterns from cell-id trajectory data by exploiting handoff features.
Inf. Sci., 2019
A hybrid deep convolutional and recurrent neural network for complex activity recognition using multimodal sensors.
Neurocomputing, 2019
Clust. Comput., 2019
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019
2018
Bi-View Semi-Supervised Learning Based Semantic Human Activity Recognition Using Accelerometers.
IEEE Trans. Mob. Comput., 2018
TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification.
Mob. Inf. Syst., 2018
J. Inf. Sci. Eng., 2018
Sci. China Inf. Sci., 2018
IEEE Access, 2018
Proceedings of the 4th International Conference on Robotics and Artificial Intelligence, 2018
2017
Formal Analysis of Security Properties of Cyber-Physical System Based on Timed Automata.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
Softw. Syst. Model., 2016
From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT.
J. Sensors, 2016
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract).
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015
2014
Efficient classification using parallel and scalable compressed model and its application on intrusion detection.
Expert Syst. Appl., 2014
2013
Proceedings of the Information Security Practice and Experience, 2013
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor Networks.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2008
Robust and Efficient Rule Extraction Through Data Summarization and Its Application in Welding Fault Diagnosis.
IEEE Trans. Ind. Informatics, 2008
Proceedings of the International Joint Conference on Neural Networks, 2008
2007
Proceedings of the Third International Conference on Natural Computation, 2007
2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
Proceedings of the Advances in Natural Computation, First International Conference, 2005
2004
Proceedings of the Embedded Software and Systems, First International Conference, 2004