Yi-Ming Chen

Orcid: 0000-0003-2981-6700

Affiliations:
  • National Central University, Department of Information Management, Jung-Li, Taiwan


According to our database1, Yi-Ming Chen authored at least 50 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Android Malware Classifier Combining Permissions and API Features to Face Model Drifting.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

A Novel Deep Learning Based Attention Mechanism for Android Malware Detection and Explanation.
Proceedings of the 10th International Conference on Computer and Communications Management, 2022

2021
Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration.
Int. J. Grid High Perform. Comput., 2021

Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection.
Secur. Commun. Networks, 2020

Android malware detection system integrating block feature extraction and multi-head attention mechanism.
Proceedings of the International Computer Symposium, 2020

2018
CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Autonomic Navigation System Based on Predicted Traffic and VANETs.
Wirel. Pers. Commun., 2017

2015
A Bipolar Traffic Density Awareness Routing Protocol for Vehicular Ad Hoc Networks.
Mob. Inf. Syst., 2015

Energy Efficient Min Delay-based Geocast Routing Protocol for the Internet of Vehicles.
J. Inf. Sci. Eng., 2015

Adaptive Smart Power Control Algorithm for LTE downlink cross-tier interference avoidance.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

2014
An anonymous DRM scheme for sharing multimedia files in P2P networks.
Multim. Tools Appl., 2014

Improving the Authentication Scheme and Access Control Protocol for VANETs.
Entropy, 2014

Adaptive decision making for improving trust establishment in VANET.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2013
A beacon-based trust management system for enhancing user centric location privacy in VANETs.
J. Commun. Networks, 2013

A Novel Search Engine to Uncover Potential Victims for APT Investigations.
Proceedings of the Network and Parallel Computing - 10th IFIP International Conference, 2013

2012
SafeAnon: a safe location privacy scheme for vehicular networks.
Telecommun. Syst., 2012

MalPEFinder: fast and retrospective assessment of data breaches in malware attacks.
Secur. Commun. Networks, 2012

A Seamless Broadcasting Scheme with Live Video Support.
Int. J. Digit. Multim. Broadcast., 2012

Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

N-Victims: An Approach to Determine N-Victims for APT Investigations.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Evaluation of collusion resistance on trust management systems for VANETs.
Proceedings of the 12th International Conference on ITS Telecommunications, 2012

2011
Retrospective detection of malware attacks by cloud computing.
Int. J. Inf. Technol. Commun. Convergence, 2011

A System Call Analysis Method with MapReduce for Malware Detection.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

Using Agent in Virtual Machine for Interactive Security Training.
Proceedings of the Security Technology, 2011

Beacon-based trust management for location privacy enhancement VANETs.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

Combining density-based clustering and wavelet methods for internal systems anomaly detection.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

2010
A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems.
Proceedings of the Security Informatics, 2010

Safe Distance Based Location Privacy in Vehicular Networks.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

2009
RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

A game theory approach for the reallocation of security forces against terrorist diversionary attacks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
A game theory approach for an emergency management security advisory system.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

2007
A Game Theoretic Approach for Deploying Intrusion Detection Agent.
Proceedings of the Agent Computing and Multi-Agent Systems, 2007

Meeting QoS Requirements of Mobile Computing by Dual-Level Congestion Control.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

2006
A smooth broadcasting scheme for VBR-encoded hot videos.
Comput. Commun., 2006

A Live Harmonic Broadcasting Scheme for VBR-Encoded Hot Videos.
Proceedings of the Wired/Wireless Internet Communications, 4th International Conference, 2006

Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.
Proceedings of the Advances in Information and Computer Security, 2006

2005
The enhanced staircase broadcasting for VBR videos.
Comput. Commun., 2005

Short-Delay Video Streaming with Restricted Supplying Peer Bandwidth.
Proceedings of the Management of Multimedia Networks and Services, 2005

An efficient staircase-harmonic scheme for broadcasting popular videos.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005

2004
Archive knowledge discovery by proxy cache.
Internet Res., 2004

Smooth Fast Broadcasting (SFB) for Compressed Videos.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

Interleaving harmonic broadcasting and receiving scheme with loss-anticipation delivery.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Fast and lossless broadcasting schemes for VBR-encoded hot videos.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Interleaving Staircase Broadcasting and Receiving Scheme with Loss-Anticipation Delivery.
Proceedings of the International Conference on Internet Computing, 2004

A Smooth Recursive Frequency-Splitting Scheme for Broadcasting VBR-Encoded Hot Videos.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Simple VBR staircase broadcasting (SVSB).
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2003
Improving Internet archive service through proxy cache.
Internet Res., 2003


  Loading...