Yu Chen

Orcid: 0000-0003-1880-0586

Affiliations:
  • Binghamton University, New York, NY, USA
  • University of Southern California, Los Angeles, CA, USA


According to our database1, Yu Chen authored at least 159 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Microverse: A Task-Oriented Edge-Scale Metaverse.
Future Internet, February, 2024

Authenticating AI-Generated Social Media Images Using Frequency Domain Analysis.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling.
IEEE Trans. Serv. Comput., 2023

Electric Vehicle Aggregation Review: Benefits and Vulnerabilities of Managing a Growing EV Fleet.
CoRR, 2023

A Lightweight Reputation System for UAV Networks.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023

A Digital Healthcare Service Architecture for Seniors Safety Monitoring in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Poster Abstract: Light-Weight Real-Time Senior Safety Monitoring using Digital Twins.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023

Enhance Public Safety Surveillance in Smart Cities by Fusing Optical and Thermal Cameras.
Proceedings of the 26th International Conference on Information Fusion, 2023

A Digital Twins Enabled Reputation System for Microchain-based UAV Networks.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

2022
μDFL: A Secure Microchained Decentralized Federated Learning Fabric Atop IoT Networks.
IEEE Trans. Netw. Serv. Manag., 2022

ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings.
Proc. Priv. Enhancing Technol., 2022

DeFakePro: Decentralized Deepfake Attacks Detection Using ENF Authentication.
IT Prof., 2022

SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network.
Future Internet, 2022

Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach.
Future Internet, 2022

Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service.
Future Internet, 2022

Robustness of Electrical Network Frequency Signals as a Fingerprint for Digital Media Authentication.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Real-Time Elderly Monitoring for Senior Safety by Lightweight Human Action Recognition.
Proceedings of the 16th IEEE International Symposium on Medical Information and Communication Technology, 2022

A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

High-Resolution Imaging Satellite Constellation.
Proceedings of the Dynamic Data Driven Applications Systems - 4th International Conference, 2022

Fairledger: a Fair Proof-of-Sequential-Work based Lightweight Distributed Ledger for IoT Networks.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Toward Intelligent Surveillance as an Edge Network Service (iSENSE) Using Lightweight Detection and Tracking Algorithms.
IEEE Trans. Serv. Comput., 2021

Lightweight 2D Imaging for Integrated Imaging and Communication Applications.
IEEE Signal Process. Lett., 2021

Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge.
EAI Endorsed Trans. Security Safety, 2021

I-ViSE: Interactive Video Surveillance as an Edge Service Using Unsupervised Feature Queries.
IEEE Internet Things J., 2021

EconLedger: A Proof-of-ENF Consensus Based Lightweight Distributed Ledger for IoVT Networks.
Future Internet, 2021

Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT).
Future Internet, 2021

Estimating Interpersonal Distance and Crowd Density with a Single-Edge Camera.
Comput., 2021

Decentralized Video Input Authentication as an Edge Service for Smart Cities.
IEEE Consumer Electron. Mag., 2021

Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint Consensus.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

DeFake: Decentralized ENF-Consensus Based DeepFake Detection in Video Conferencing.
Proceedings of the 23rd International Workshop on Multimedia Signal Processing, 2021

A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Mosaic: Modeling Safety Index in Crowd by Detecting Face Masks against COVID-19 and Beyond.
Proceedings of the IEEE International Smart Cities Conference, 2021

Characterizing Scattered Occlusions for Effective Dense-Mode Crowd Counting.
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021

Fed-DDM: A Federated Ledgers based Framework for Hierarchical Decentralized Data Marketplaces.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Crowd Safety Sensing (CroSS) for the Post Pandemic Era.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge.
EAI Endorsed Trans. Security Safety, 2020

Wireless multimedia surveillance networks.
Multim. Tools Appl., 2020

Enabling Continuous Operations for UAVs with an Autonomous Service Network Infrastructure.
CoRR, 2020

Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems.
CoRR, 2020

HODET: Hybrid Object DEtection and Tracking using mmWave Radar and Visual Sensors.
CoRR, 2020

<i>iRyP</i>: a purely edge-based visual privacy-respecting system for mobile cameras.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

BIT: A Blockchain Integrated Time Banking System for Community Exchange Economy.
Proceedings of the IEEE International Smart Cities Conference, 2020

An Experimental Study on Microservices based Edge Computing Platforms.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Minor Privacy Protection Through Real-time Video Processing at the Edge.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Privacy-Preserving Selective Video Surveillance.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Collaborative Multi-Object Tracking as an Edge Service using Transfer Learning.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

2019
Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals.
Sensors, 2019

Social Internet of Things: Applications, architectures and protocols.
Future Gener. Comput. Syst., 2019

Microchain: a Light Hierarchical Consensus Protocol for IoT System.
CoRR, 2019

Blockchain Methods for Trusted Avionics Systems.
CoRR, 2019

Microchain: A Hybrid Consensus Mechanism for Lightweight Distributed Ledger for IoT.
CoRR, 2019

Decentralized Smart Surveillance through Microservices Platform.
CoRR, 2019

A Study on Smart Online Frame Forging Attacks against Video Surveillance System.
CoRR, 2019

A Distributed Agent-Based Framework for a Constellation of Drones in a Military Operation.
Proceedings of the 2019 Winter Simulation Conference, 2019

A Study of Lightweight DDDAS Architecture for Real-Time Public Safety Applications Through Hybrid Simulation.
Proceedings of the 2019 Winter Simulation Conference, 2019

PReS: Power Peak Reduction by Real-time Scheduling for Urban Railway Transit.
Proceedings of the IEEE Sustainability through ICT Summit, 2019

BlendSM-DDM: BLockchain-ENabled Secure Microservices for Decentralized Data Marketplaces.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

No Peeking through My Windows: Conserving Privacy in Personal Drones.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

I-SAFE: instant suspicious activity identification at the edge using fuzzy decision making.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

A Blockchain-Enabled Decentralized Time Banking for a New Social Value System.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Kerman: A Hybrid Lightweight Tracking Algorithm to Enable Smart Surveillance as an Edge Service.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

BlendMAS: A Blockchain-Enabled Decentralized Microservices Architecture for Smart Public Safety.
Proceedings of the IEEE International Conference on Blockchain, 2019

A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge.
Proceedings of the IEEE International Conference on Blockchain, 2019

Smart Surveillance Video Stream Processing at the Edge for Real-Time Human Objects Tracking.
Proceedings of the Fog and Edge Computing, 2019

2018
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model.
IEEE Trans. Comput. Soc. Syst., 2018

An Exploration of Blockchain Enabled Decentralized Capability based Access Control Strategy for Space Situation Awareness.
CoRR, 2018

A Survey on Simulation Tools and Testbeds for Cognitive Radio Networks Study.
CoRR, 2018

EIQIS: Toward an Event-Oriented Indexable and Queryable Intelligent Surveillance System.
CoRR, 2018

A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs).
CoRR, 2018

Intelligent Surveillance as an Edge Network Service: from Harr-Cascade, SVM to a Lightweight CNN.
CoRR, 2018

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
CoRR, 2018

BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT.
Comput., 2018

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
Proceedings of the Security and Privacy in Communication Networks, 2018

Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain.
Proceedings of the IEEE International Smart Cities Conference, 2018

A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology.
Proceedings of the IEEE International Smart Cities Conference, 2018

Position Paper: A Theoretical Framework for General Cognition Evaluation of Cognitive Radios.
Proceedings of the IEEE International Smart Cities Conference, 2018

Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models.
Proceedings of the IEEE International Smart Cities Conference, 2018

A Novel PMU Fog Based Early Anomaly Detection for an Efficient Wide Area PMU Network.
Proceedings of the 2nd IEEE International Conference on Fog and Edge Computing, 2018

Real-Time Human Objects Tracking for Smart Surveillance at the Edge.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Real-Time Human Detection as an Edge Service Enabled by a Lightweight CNN.
Proceedings of the 2018 IEEE International Conference on Edge Computing, 2018

Smart Surveillance as an Edge Service for Real-Time Human Detection and Tracking.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

Smart Surveillance as an Edge Network Service: From Harr-Cascade, SVM to a Lightweight CNN.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
A Container-Based Elastic Cloud Architecture for Pseudo Real-Time Exploitation of Wide Area Motion Imagery (WAMI) Stream.
J. Signal Process. Syst., 2017

Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs.
EAI Endorsed Trans. Security Safety, 2017

Who is Smarter? Intelligence Measure of Learning-based Cognitive Radios.
CoRR, 2017

Preserving Local Differential Privacy in Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Enabling Smart Urban Surveillance at The Edge.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis.
Proceedings of the Computer Network Security, 2017

Online anomalous vehicle detection at the edge using multidimensional SSA.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

MIST: Mobility-inspired software-defined fog system.
Proceedings of the IEEE International Conference on Consumer Electronics, 2017

Benefits and schemes of prefetching from cloud to fog networks.
Proceedings of the 6th IEEE International Conference on Cloud Networking, 2017

2016
Human-centric information technology and applications towards web 3.0.
New Rev. Hypermedia Multim., 2016

Quantitative workload analysis and prediction using Google cluster traces.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Integration of machine learning and human learning for training optimization in robust linear regression.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Intelligence Measure of Cognitive Radios with Learning Capabilities.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Poster Abstract: Smart Urban Surveillance Using Fog Computing.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016

Dynamic Urban Surveillance Video Stream Processing Using Fog Computing.
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016

2015
Auditing for Data Integrity and Reliability in Cloud Storage.
Proceedings of the Handbook on Data Centers, 2015

Cloud, grid, P2P and internet computing: Recent trends and future directions.
Peer-to-Peer Netw. Appl., 2015

Telemedicine in the Cloud Era: Prospects and Challenges.
IEEE Pervasive Comput., 2015

Ultra-lightweight deep packet anomaly detection for Internet of Things devices.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Singular Spectrum Analysis Based Quick Online Detection of Disturbance Start Time in Power Grid.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Pseudo-real-time Wide Area Motion Imagery (WAMI) processing for dynamic feature detection.
Proceedings of the 18th International Conference on Information Fusion, 2015

2014
Enabling Smart Personalized Healthcare: A Hybrid Mobile-Cloud Approach for ECG Telemonitoring.
IEEE J. Biomed. Health Informatics, 2014

Hardware Security in the Dark.
Int. J. Softw. Informatics, 2014

Cloud security auditing based on behavioural modelling.
Int. J. Bus. Process. Integr. Manag., 2014

MEGA: An energy aware algorithm for self-powered wireless sensor networks in sustainable smart infrastructure.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

A study of SSL Proxy attacks on Android and iOS mobile applications.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

A container-based elastic cloud architecture for real-time full-motion video (FMV) target tracking.
Proceedings of the 2014 IEEE Applied Imagery Pattern Recognition Workshop, 2014

2013
A fair non-repudiation framework for data integrity in cloud storage services.
Int. J. Cloud Comput., 2013

An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection.
Comput. Electr. Eng., 2013

Cloud Security Auditing Based on Behavioral Modeling.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

An optimized design of reconfigurable PSD accelerator for online shrew DDoS attacks detection.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Finding Needles in a Haystack: Reducing False Alarm Rate Using Telemedicine Mobile Cloud.
Proceedings of the IEEE International Conference on Healthcare Informatics, 2013

LAVI: A Location Aware Virtual Infrastructure for VANETs.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

A deterministic loss model based analysis of CUBIC.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Scalable sentiment classification for Big Data analysis using Naïve Bayes Classifier.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts.
Proceedings of the Computer Network Security, 2012

An extension of RDP code with parallel decoding procedure.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
A Survey on the Application of FPGAs for Network Infrastructure Security.
IEEE Commun. Surv. Tutorials, 2011

A self-powered adaptive wireless sensor network for wastewater treatment plants.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Mitigating DDoS Attacks Using Protection Nodes in Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2011

Consistency Control to Manage Dynamic Contents over Vehicular Communication Networks.
Proceedings of the Global Communications Conference, 2011

A fair multi-party non-repudiation scheme for storage clouds.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011

Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

A location aware virtual infrastructure for VANETs.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms.
Proceedings of the 39th International Conference on Parallel Processing, 2010

D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-Of-Order Keystream Generation.
Proceedings of IEEE International Conference on Communications, 2010

A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modeling.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Bridging the Missing Link of Cloud Data Storage Security in AWS.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Distributed Data Aggregation Technology for Real-Time DDoS Attacks Detection.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Privacy Protected Spatial Query Processing for Advanced Location Based Services.
Wirel. Pers. Commun., 2009

Weighted trust evaluation-based malicious node detection for wireless sensor networks.
Int. J. Inf. Comput. Secur., 2009

BLINK: pixel-domain encryption for secure document management.
Proceedings of the Multimedia and Security Workshop, 2009

Two-stage decomposition of SNORT rules towards efficient hardware implementation.
Proceedings of the 7th International Workshop on Design of Reliable Communication Networks, 2009

BLINK: Securing Information to the Last Connection.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Self-Encryption Scheme for Data Security in Mobile Devices.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Malicious node detection in wireless sensor networks using weighted trust evaluation.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

2007
Collaborative Detection of DDoS Attacks over Multiple Network Domains.
IEEE Trans. Parallel Distributed Syst., 2007

Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks.
Proceedings of IEEE International Conference on Communications, 2007

2006
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis.
J. Parallel Distributed Comput., 2006

DHT-based security infrastructure for trusted internet and grid computing.
Int. J. Crit. Infrastructures, 2006

Collaborative Change Detection of DDoS Attacks on Community and ISP Networks.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

2005
Collaborative Internet Worm Containment.
IEEE Secur. Priv., 2005

Filtering of Shrew DDoS Attacks in Frequency Domain.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Achieving maximum throughput with a minimum number of label switched paths in MPLS networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks.
Proceedings of the Computational Science, 2005


  Loading...