Tieming Chen

Orcid: 0000-0003-4664-3311

According to our database1, Tieming Chen authored at least 83 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Pruning Networks Only Using Few-Shot Pretraining Based on Gradient Similarity Frequency.
IEEE Trans. Artif. Intell., August, 2025

GANDACOG: Implicit Mobile User Authentication in Multi Environments With Scarce Data.
IEEE Internet Things J., July, 2025

HTs-GCN: Identifying Hardware Trojan Nodes in Integrated Circuits Using a Graph Convolutional Network.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., June, 2025

Privacy-Aware Edge Intelligent Parking Recommendation Using Intuitionistic Fuzzy Sets.
IEEE Trans. Ind. Informatics, May, 2025

ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting.
CoRR, January, 2025

METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift.
CoRR, January, 2025

SAPTSTA-AnoECG: a PatchTST-based ECG anomaly detection method with subtractive attention and data augmentation.
Appl. Intell., January, 2025

Dehydrator: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation.
IEEE Trans. Inf. Forensics Secur., 2025

TAGAPT: Toward Automatic Generation of APT Samples With Provenance-Level Granularity.
IEEE Trans. Inf. Forensics Secur., 2025

Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports.
IEEE Trans. Dependable Secur. Comput., 2025

Doctor: Optimizing Container Rebuild Efficiency by Instruction Re-orchestration.
Proc. ACM Softw. Eng., 2025

Actminer: Applying causality tracking and increment aligning for graph-based threat hunting.
Knowl. Based Syst., 2025

SAWD-AC: A spring-based adaptively weighted dual-stream model for aeromagnetic compensation.
Inf. Sci., 2025

A relational triplet extraction method for constructing network security knowledge graph.
Int. J. Sens. Networks, 2025

VulnTrace: Tracking and Detecting Code Vulnerabilities with Historical Commits and Semantic Embeddings.
Int. J. Softw. Eng. Knowl. Eng., 2025

LinTracer: An efficient tracking system for cyberattack chains fusing entity and event semantics.
Comput. Secur., 2025

MIRDETECTOR: Applying malicious intent representation for enhanced APT anomaly detection.
Comput. Secur., 2025

HER-PT: An intelligent penetration testing framework with Hindsight Experience Replay.
Comput. Secur., 2025

PDCleaner: A multi-view collaborative data compression method for provenance graph-based APT detection systems.
Comput. Secur., 2025

Kellect: A Kernel-based efficient and lossless event log collector for windows security.
Comput. Secur., 2025

DockInsight: A Knowledge-Augmented Dependency Extraction Approach for Dockerfile.
Proceedings of the 22nd IEEE/ACM International Conference on Software and Systems Reuse, 2025

2024
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs.
Cybersecur., December, 2024

TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy.
IEEE Trans. Mob. Comput., April, 2024

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters.
Comput. Secur., January, 2024

CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports.
CoRR, 2024

SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time.
CoRR, 2024

TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning.
CoRR, 2024

CoreCast: Leveraging Project Metrics to Predict Core Contributor Trends in Open Source C57.
Proceedings of the 36th International Conference on Software Engineering and Knowledge Engineering, 2024

DocSecKG: A Systematic Approach for Building Knowledge Graph to Understand the Relationship Between Docker Image and Vulnerability.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

A Novel Fuzzy Trust-Based Secure Vehicular Data Forwarding Scheme Using Incentive Consensus.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2024

FuzzyFollow: A Novel Privacy-Aware Intelligent Vehicle-Following Scheme for Safe Driving on Risky Roads Using Fuzzy Sets.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends.
Comput. Secur., December, 2023

Structure-Aware Subspace Clustering.
IEEE Trans. Knowl. Data Eng., October, 2023

Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons.
Inf. Sci., August, 2023

APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts.
IEEE Trans. Dependable Secur. Comput., 2023

fuzzyForward: A Novel Multi-hop Data Forwarding Scheme Using Fuzzy Decision for Edge VANETs.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023

TCFP: A Novel Privacy-Aware Edge Vehicular Trajectory Compression Scheme Using Fuzzy Markovian Prediction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

2022
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment.
IEEE Trans. Mob. Comput., 2022

Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network.
IEEE Trans. Mob. Comput., 2022

Privacy-Aware Fuzzy Range Query Processing Over Distributed Edge Devices.
IEEE Trans. Fuzzy Syst., 2022

Kellect: a Kernel-Based Efficient and Lossless Event Log Collector.
CoRR, 2022

2021
Privacy-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities.
IEEE Trans. Veh. Technol., 2021

Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction.
IEEE Trans. Intell. Transp. Syst., 2021

General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering.
IEEE Trans. Inf. Forensics Secur., 2021

A Domain-Specific Non-Factoid Question Answering System based on Terminology Mining and Siamese Neural Network.
J. Inf. Sci. Eng., 2021

APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts.
CoRR, 2021

A Heterogeneous Graph Learning Model for Cyber-Attack Detection.
CoRR, 2021

FuzzySkyline: QoS-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

2020
A Collaborative Deep and Shallow Semisupervised Learning Framework for Mobile App Classification.
Mob. Inf. Syst., 2020

A Risk control Framework for Mortgaged Cars based on trajectory Mining.
Int. J. Robotics Autom., 2020

WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
一种基于地形因素的空气质量空间估计方法 (Spatial Estimation Method of Air Quality Based on Terrain Factors LV Ming-qi LI Yi-fan CHEN Tie-ming).
计算机科学, 2019

DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network.
KSII Trans. Internet Inf. Syst., 2019

Air quality estimation by exploiting terrain features and multi-view transfer semi-supervised regression.
Inf. Sci., 2019

Discovering individual movement patterns from cell-id trajectory data by exploiting handoff features.
Inf. Sci., 2019

A hybrid deep convolutional and recurrent neural network for complex activity recognition using multimodal sensors.
Neurocomputing, 2019

Map matching based on Cell-ID localization for mobile phone users.
Clust. Comput., 2019

A sequence-to-sequence model for cell-ID trajectory prediction.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

2018
Bi-View Semi-Supervised Learning Based Semantic Human Activity Recognition Using Accelerometers.
IEEE Trans. Mob. Comput., 2018

TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification.
Mob. Inf. Syst., 2018

Urban Traffic Congestion Index Estimation With Open Ubiquitous Data.
J. Inf. Sci. Eng., 2018

Anti-chain based algorithms for timed/probabilistic refinement checking.
Sci. China Inf. Sci., 2018

An Efficient Privacy-Preserving Friend Recommendation Scheme for Social Network.
IEEE Access, 2018

Collaborative Pursuing of Multiple Mobile Robots in Dynamic Environment.
Proceedings of the 4th International Conference on Robotics and Artificial Intelligence, 2018

2017
Formal Analysis of Security Properties of Cyber-Physical System Based on Timed Automata.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Formalizing and verifying stochastic system architectures using Monterey Phoenix.
Softw. Syst. Model., 2016

From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT.
J. Sensors, 2016

Mining cell-id trajectory patterns by exploiting handoff features.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

Mystique: Evolving Android Malware for Auditing Anti-Malware Tools.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract).
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

2014
Efficient classification using parallel and scalable compressed model and its application on intrusion detection.
Expert Syst. Appl., 2014

2013
Efficient Attack Detection Based on a Compressed Model.
Proceedings of the Information Security Practice and Experience, 2013

2011
A Bilinear Pairing-Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A Naive Feature Selection Method and Its Application in Network Intrusion Detection.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor Networks.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2008
Robust and Efficient Rule Extraction Through Data Summarization and Its Application in Welding Fault Diagnosis.
IEEE Trans. Ind. Informatics, 2008

Tree parity machine-based One-Time Password authentication schemes.
Proceedings of the International Joint Conference on Neural Networks, 2008

2007
Designing Security Protocols Using Novel Neural Network Model.
Proceedings of the Third International Conference on Natural Computation, 2007

2005
A Novel Identity-Based Key Issuing Scheme Based on Interacting Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

A Novel Remote User Authentication Scheme Using Interacting Neural Network.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
A Structure Modeling Method for Multi-task Embedded Software Design.
Proceedings of the Embedded Software and Systems, First International Conference, 2004


  Loading...