Tieming Chen

According to our database1, Tieming Chen authored at least 29 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network.
TIIS, 2019

Air quality estimation by exploiting terrain features and multi-view transfer semi-supervised regression.
Inf. Sci., 2019

Discovering individual movement patterns from cell-id trajectory data by exploiting handoff features.
Inf. Sci., 2019

A hybrid deep convolutional and recurrent neural network for complex activity recognition using multimodal sensors.
Neurocomputing, 2019

Map matching based on Cell-ID localization for mobile phone users.
Cluster Computing, 2019

A sequence-to-sequence model for cell-ID trajectory prediction.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

2018
Bi-View Semi-Supervised Learning Based Semantic Human Activity Recognition Using Accelerometers.
IEEE Trans. Mob. Comput., 2018

TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification.
Mobile Information Systems, 2018

Urban Traffic Congestion Index Estimation With Open Ubiquitous Data.
J. Inf. Sci. Eng., 2018

Anti-chain based algorithms for timed/probabilistic refinement checking.
SCIENCE CHINA Information Sciences, 2018

An Efficient Privacy-Preserving Friend Recommendation Scheme for Social Network.
IEEE Access, 2018

2017
Formal Analysis of Security Properties of Cyber-Physical System Based on Timed Automata.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Formalizing and verifying stochastic system architectures using Monterey Phoenix.
Software and Systems Modeling, 2016

From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT.
J. Sensors, 2016

Mining cell-id trajectory patterns by exploiting handoff features.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Mystique: Evolving Android Malware for Auditing Anti-Malware Tools.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract).
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

2014
Efficient classification using parallel and scalable compressed model and its application on intrusion detection.
Expert Syst. Appl., 2014

Efficient classification using parallel and scalable compressed model and Its application on intrusion detection.
CoRR, 2014

2013
Efficient Attack Detection Based on a Compressed Model.
Proceedings of the Information Security Practice and Experience, 2013

2011
A Bilinear Pairing-Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A Naive Feature Selection Method and Its Application in Network Intrusion Detection.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor Networks.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2008
Robust and Efficient Rule Extraction Through Data Summarization and Its Application in Welding Fault Diagnosis.
IEEE Trans. Industrial Informatics, 2008

Tree parity machine-based One-Time Password authentication schemes.
Proceedings of the International Joint Conference on Neural Networks, 2008

2007
Designing Security Protocols Using Novel Neural Network Model.
Proceedings of the Third International Conference on Natural Computation, 2007

2005
A Novel Identity-Based Key Issuing Scheme Based on Interacting Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

A Novel Remote User Authentication Scheme Using Interacting Neural Network.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
A Structure Modeling Method for Multi-task Embedded Software Design.
Proceedings of the Embedded Software and Systems, First International Conference, 2004


  Loading...