Weifeng Chen

Orcid: 0000-0002-2314-757X

Affiliations:
  • California University of Pennsylvania, Department of Math, Computer Science and Information Systems, California, PA, USA
  • University of Massachusetts at Amherst, Department of Computer Science, MA, USA (PhD)


According to our database1, Weifeng Chen authored at least 28 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
A Lightweight And privacy-preserving public cloud auditing scheme without bilinear pairings in smart cities.
Comput. Stand. Interfaces, 2019

2016
CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks.
Wirel. Networks, 2016

NCLAS: a novel and efficient certificateless aggregate signature scheme.
Secur. Commun. Networks, 2016

Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation.
Multim. Tools Appl., 2016

Cyber-physical systems technologies and application - Part II.
Future Gener. Comput. Syst., 2016

Cyber physical systems technologies and applications.
Future Gener. Comput. Syst., 2016

2015
Advanced Service Technology and Application in Smart Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2014
Advanced signal processing and HCI issues for interactive multimedia services.
Multim. Tools Appl., 2014

2013
Editorial: advances in multimedia and ubiquitous technologies for the new era.
Multim. Tools Appl., 2013

2012
Advanced issues in artificial intelligence and pattern recognition for intelligent surveillance system in smart home environment.
Eng. Appl. Artif. Intell., 2012

Flow level detection and filtering of low-rate DDoS.
Comput. Networks, 2012

2010
RRED: robust RED algorithm to counter low-rate denial-of-service attacks.
IEEE Commun. Lett., 2010

On the privacy protection in publish/subscribe systems.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Attacks on BitTorrent - An Experimental Study.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
Traffic and security analysis on Sony Playstation 3.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Identifying Google Talk packets.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

2008
Analyzing Privacy in Enterprise Packet Trace Anonymization.
Proceedings of the Network and Distributed System Security Symposium, 2008

Wireless Forensic: A New Radio Frequency Based Locating System.
Proceedings of the Intelligence and Security Informatics, 2008

Challenges of Location Tracking Techniques in Wireless Forensics.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2005
Transnational Information Sharing, Event Notification, Rule Enforcement and Process Coordination.
Int. J. Electron. Gov. Res., 2005

Exploiting the IPID Field to Infer Network Path and End-System Characteristics.
Proceedings of the Passive and Active Network Measurement, 6th International Workshop, 2005

Optimizing cost-sensitive trust-negotiation protocols.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite Events.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

2004
On Dynamic Subset Difference Revocation Scheme.
Proceedings of the NETWORKING 2004, 2004



2000
The Defense Framework for Large-scale Computer Network System.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...