Yu Chen

According to our database1, Yu Chen authored at least 102 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals.
Sensors, 2019

Blockchain Methods for Trusted Avionics Systems.
CoRR, 2019

Microchain: A Hybrid Consensus Mechanism for Lightweight Distributed Ledger for IoT.
CoRR, 2019

BlendSM-DDM: BLockchain-ENabled Secure Microservices for Decentralized Data Marketplaces.
CoRR, 2019

A Lightweight Blockchain-based Privacy Protection for Smart Surveillance at the Edge.
CoRR, 2019

I-SAFE: Instant Suspicious Activity identiFication at the Edge using Fuzzy Decision Making.
CoRR, 2019

No Peeking through My Windows: Conserving Privacy in Personal Drones.
CoRR, 2019

Decentralized Smart Surveillance through Microservices Platform.
CoRR, 2019

A Study on Smart Online Frame Forging Attacks against Video Surveillance System.
CoRR, 2019

BlendMAS: A BLockchain-ENabled Decentralized Microservices Architecture for Smart Public Safety.
CoRR, 2019

PReS: Power Peak Reduction by Real-time Scheduling for Urban Railway Transit.
Proceedings of the IEEE Sustainability through ICT Summit, 2019

I-SAFE: instant suspicious activity identification at the edge using fuzzy decision making.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

A Blockchain-Enabled Decentralized Time Banking for a New Social Value System.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Kerman: A Hybrid Lightweight Tracking Algorithm to Enable Smart Surveillance as an Edge Service.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

Smart Surveillance Video Stream Processing at the Edge for Real-Time Human Objects Tracking.
Proceedings of the Fog and Edge Computing, 2019

2018
An Exploration of Blockchain Enabled Decentralized Capability based Access Control Strategy for Space Situation Awareness.
CoRR, 2018

Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System.
CoRR, 2018

Kerman: A Hybrid Lightweight Tracking Algorithm to Enable Smart Surveillance as an Edge Service.
CoRR, 2018

EIQIS: Toward an Event-Oriented Indexable and Queryable Intelligent Surveillance System.
CoRR, 2018

A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology.
CoRR, 2018

Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain.
CoRR, 2018

A Novel PMU Fog based Early Anomaly Detection for an Efficient Wide Area PMU Network.
CoRR, 2018

A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs).
CoRR, 2018

Intelligent Surveillance as an Edge Network Service: from Harr-Cascade, SVM to a Lightweight CNN.
CoRR, 2018

Real-Time Human Detection as an Edge Service Enabled by a Lightweight CNN.
CoRR, 2018

BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs.
CoRR, 2018

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
CoRR, 2018

BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT.
Computers, 2018

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
Proceedings of the Security and Privacy in Communication Networks, 2018

Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain.
Proceedings of the IEEE International Smart Cities Conference, 2018

A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology.
Proceedings of the IEEE International Smart Cities Conference, 2018

A Novel PMU Fog Based Early Anomaly Detection for an Efficient Wide Area PMU Network.
Proceedings of the 2nd IEEE International Conference on Fog and Edge Computing, 2018

Real-Time Human Objects Tracking for Smart Surveillance at the Edge.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Real-Time Human Detection as an Edge Service Enabled by a Lightweight CNN.
Proceedings of the 2018 IEEE International Conference on Edge Computing, 2018

Smart Surveillance as an Edge Service for Real-Time Human Detection and Tracking.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

Smart Surveillance as an Edge Network Service: From Harr-Cascade, SVM to a Lightweight CNN.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
A Container-Based Elastic Cloud Architecture for Pseudo Real-Time Exploitation of Wide Area Motion Imagery (WAMI) Stream.
Signal Processing Systems, 2017

Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs.
ICST Trans. Security Safety, 2017

Who is Smarter? Intelligence Measure of Learning-based Cognitive Radios.
CoRR, 2017

Enabling Smart Urban Surveillance at The Edge.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis.
Proceedings of the Computer Network Security, 2017

Online anomalous vehicle detection at the edge using multidimensional SSA.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

MIST: Mobility-inspired software-defined fog system.
Proceedings of the IEEE International Conference on Consumer Electronics, 2017

Benefits and schemes of prefetching from cloud to fog networks.
Proceedings of the 6th IEEE International Conference on Cloud Networking, 2017

2016
Human-centric information technology and applications towards web 3.0.
The New Review of Hypermedia and Multimedia, 2016

Quantitative workload analysis and prediction using Google cluster traces.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Integration of machine learning and human learning for training optimization in robust linear regression.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Intelligence Measure of Cognitive Radios with Learning Capabilities.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Poster Abstract: Smart Urban Surveillance Using Fog Computing.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016

Dynamic Urban Surveillance Video Stream Processing Using Fog Computing.
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016

2015
Auditing for Data Integrity and Reliability in Cloud Storage.
Proceedings of the Handbook on Data Centers, 2015

Telemedicine in the Cloud Era: Prospects and Challenges.
IEEE Pervasive Computing, 2015

Ultra-lightweight deep packet anomaly detection for Internet of Things devices.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Singular Spectrum Analysis Based Quick Online Detection of Disturbance Start Time in Power Grid.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Pseudo-real-time Wide Area Motion Imagery (WAMI) processing for dynamic feature detection.
Proceedings of the 18th International Conference on Information Fusion, 2015

2014
Enabling Smart Personalized Healthcare: A Hybrid Mobile-Cloud Approach for ECG Telemonitoring.
IEEE J. Biomedical and Health Informatics, 2014

Hardware Security in the Dark.
Int. J. Software and Informatics, 2014

Cloud security auditing based on behavioural modelling.
IJBPIM, 2014

MEGA: An energy aware algorithm for self-powered wireless sensor networks in sustainable smart infrastructure.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

A study of SSL Proxy attacks on Android and iOS mobile applications.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

A container-based elastic cloud architecture for real-time full-motion video (FMV) target tracking.
Proceedings of the 2014 IEEE Applied Imagery Pattern Recognition Workshop, 2014

2013
A fair non-repudiation framework for data integrity in cloud storage services.
IJCC, 2013

An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection.
Computers & Electrical Engineering, 2013

Cloud Security Auditing Based on Behavioral Modeling.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

An optimized design of reconfigurable PSD accelerator for online shrew DDoS attacks detection.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Finding Needles in a Haystack: Reducing False Alarm Rate Using Telemedicine Mobile Cloud.
Proceedings of the IEEE International Conference on Healthcare Informatics, 2013

A deterministic loss model based analysis of CUBIC.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Scalable sentiment classification for Big Data analysis using Naïve Bayes Classifier.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

2012
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts.
Proceedings of the Computer Network Security, 2012

An extension of RDP code with parallel decoding procedure.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
A Survey on the Application of FPGAs for Network Infrastructure Security.
IEEE Communications Surveys and Tutorials, 2011

A self-powered adaptive wireless sensor network for wastewater treatment plants.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Mitigating DDoS Attacks Using Protection Nodes in Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2011

Consistency Control to Manage Dynamic Contents over Vehicular Communication Networks.
Proceedings of the Global Communications Conference, 2011

A fair multi-party non-repudiation scheme for storage clouds.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011

Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol.
Proceedings of the Consumer Communications and Networking Conference, 2011

A location aware virtual infrastructure for VANETs.
Proceedings of the Consumer Communications and Networking Conference, 2011

2010
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms.
Proceedings of the 39th International Conference on Parallel Processing, 2010

D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-Of-Order Keystream Generation.
Proceedings of IEEE International Conference on Communications, 2010

A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modeling.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Distributed Data Aggregation Technology for Real-Time DDoS Attacks Detection.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Privacy Protected Spatial Query Processing for Advanced Location Based Services.
Wireless Personal Communications, 2009

Weighted trust evaluation-based malicious node detection for wireless sensor networks.
IJICS, 2009

BLINK: pixel-domain encryption for secure document management.
Proceedings of the Multimedia and Security Workshop, 2009

2008
Malicious node detection in wireless sensor networks using weighted trust evaluation.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

2007
Collaborative Detection of DDoS Attacks over Multiple Network Domains.
IEEE Trans. Parallel Distrib. Syst., 2007

Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks.
Proceedings of IEEE International Conference on Communications, 2007

2006
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis.
J. Parallel Distrib. Comput., 2006

DHT-based security infrastructure for trusted internet and grid computing.
IJCIS, 2006

Collaborative Change Detection of DDoS Attacks on Community and ISP Networks.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

2005
Collaborative Internet Worm Containment.
IEEE Security & Privacy, 2005

Filtering of Shrew DDoS Attacks in Frequency Domain.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks.
Proceedings of the Computational Science, 2005


  Loading...