Hongmei Chi

Orcid: 0000-0003-4610-6479

Affiliations:
  • Florida State University, Tallahassee, USA


According to our database1, Hongmei Chi authored at least 104 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cascade 2D attentional decoders with context-enhanced encoder for scene text recognition.
Neural Comput. Appl., May, 2024

Securing Against Deception: Exploring Phishing Emails Through ChatGPT and Sentiment Analysis.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering Research, 2024

Enhancing 3D Printing Infill Quality through Advanced Machine Learning.
Proceedings of the 16th International Conference on Electronics, 2024

Gemini's Multimodal Prowess: Robust Detection of Adversarial Patch Attacks through Text and Image Inputs.
Proceedings of the 2024 ACM Southeast Conference, 2024

2023
SDAA: Secure Data Aggregation and Authentication Using Multiple Sinks in Cluster-Based Underwater Vehicular Wireless Sensor Network.
Sensors, 2023

Collaborative and Active Learning with Portable Online Hands-on Labware for Blockchain Development.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

BERT-Based Sentiment Forensics Analysis for Intrusion Detection.
Proceedings of the International Conference on Machine Learning and Applications, 2023

A Framework to Reconstruct Digital Forensics Evidence via Goal-Oriented Modeling.
Proceedings of the IEEE 2nd International Conference on AI in Cybersecurity, 2023

Forensic Analysis of Contents in Thumbnails Using Transfer Learning.
Proceedings of the Future Technologies Conference, 2023

AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Crime Scene Prediction for Unmanned Aerial Vehicles Investigation via Machine Learning.
Proceedings of the 8th International Conference on Automation, 2023

Enhancing Object Detection in YouTube Thumbnails Forensics with YOLOv4.
Proceedings of the IEEE International Conference on Big Data, 2023

Forecasting COVID-19 Hotspots in Florida Public Schools: A Machine Learning Approach.
Proceedings of the IEEE International Conference on Big Data, 2023

Secure Software Development in Google Colab.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

Quantum Machine Learning for Security Data Analysis.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

2022
Comparison of Deepfake Detection Techniques through Deep Learning.
J. Cybersecur. Priv., March, 2022

Digital Evidence Acquisition and Deepfake Detection with Decentralized Applications.
Proceedings of the PEARC '22: Practice and Experience in Advanced Research Computing, Boston, MA, USA, July 10, 2022

Targeted Data Extraction and Deepfake Detection with Blockchain Technology.
Proceedings of the 6th International Conference on Universal Village, 2022

Integrating Blockchain Technology into Cybersecurity Education.
Proceedings of the Future Technologies Conference, 2022

Investigating Gender and Racial Bias in ELECTRA.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

Unmanned Aerial Vehicle Forensics Investigation Performance under Different Attacks.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

Proof of Non-stationary Channel Polarization.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2021
A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage.
IEEE/ACM Trans. Netw., 2021

Regulations and Standards Aware Framework for Recording of mHealth App Vulnerabilities.
Int. J. E Health Medical Commun., 2021

A Personalized Learning Framework for Software Vulnerability Detection and Education.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021

Inherent Discriminability of BERT Towards Racial Minority Associated Data.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

CDetector: Extracting Textual Features of Financial Social Media to Detect Cyber Attacks.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Applying Machine Learning to Analyze Anti-Vaccination on Tweets.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

DECADE - Deep Learning Based Content-hiding Application Detection System for Android.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Embedded conformal deep low-rank auto-encoder network for matrix recovery.
Pattern Recognit. Lett., 2020

Competitive and collaborative representation for classification.
Pattern Recognit. Lett., 2020

Secure polar coding with delayed wiretapping information.
IET Commun., 2020

Secure Polar Coding for Adversarial Wiretap Channel.
CoRR, 2020

"Is your Smart Home a Secure Home?" - Analysis of Smart Home Breaches and an Approach for Vulnerability Analysis and Device Isolation.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

DeepDive: Examining Determinants of Health Disparities in COVID-19 for Improving Pandemic Health Care.
Proceedings of the ICVISP 2020: 4th International Conference on Vision, 2020

Integrating Blockchain Technology in Healthcare via Active Learning.
Proceedings of the 2020 ACM Southeast Conference, 2020

2019
Encrypted secure polar coding scheme for general two-way wiretap channel.
IET Inf. Secur., 2019

An augmented self-adaptive parameter control in evolutionary computation: A case study for the berth scheduling problem.
Adv. Eng. Informatics, 2019

Data Protection Labware for Mobile Security.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A Forensic Evidence Acquisition Model for Data Leakage Attacks.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

A Targeted Data Extraction System for Mobile Devices.
Proceedings of the Advances in Digital Forensics XV, 2019

Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

STPSA 2019 Welcome Message.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Supervised neighborhood regularized collaborative representation for face recognition.
Multim. Tools Appl., 2018

Strong Security Polar Coding with Delayed Wiretap Channel State Information.
CoRR, 2018

Computational Investigations of Optimal Scrambled Halton Sequences.
Proceedings of the Practice and Experience on Advanced Research Computing, 2018

Investigation of Florida Housing Prices using Predictive Time Series Model.
Proceedings of the Practice and Experience on Advanced Research Computing, 2018

A Framework for IoT Data Acquisition and Forensics Analysis.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

A framework for validating aimed mobile digital forensics evidences.
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018

Design of cybersecurity hands-on laboratory exercises using secDLC framework.
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018

2017
Predict Florida Tourism Trend via Using Data Mining Techniques.
Proceedings of the Practice and Experience in Advanced Research Computing 2017: Sustainability, 2017

A Quick Outlier Detection in Wireless Body Area Networks.
Proceedings of the Practice and Experience in Advanced Research Computing 2017: Sustainability, 2017

Developing serious games to promote cognitive abilities for the elderly.
Proceedings of the 5th IEEE International Conference on Serious Games and Applications for Health, 2017

A Case Study for Mobile Device Forensics Tools.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

Implement Hands-on Labs for File Integrity via Open Sources.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

2016
Survey of Security Challenges in NFC and RFID for E-Health Applications.
Int. J. E Health Medical Commun., 2016

Integrating Computing to STEM Curriculum via CodeBoard.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

Particle Swarm Optimization Simulation via Optimal Halton Sequences.
Proceedings of the International Conference on Computational Science 2016, 2016

2015
An online game simulation environment for detecting potential deceptive insiders.
Proceedings of the 2015 Winter Simulation Conference, 2015

An investigation of privacy protocols in location-based service.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

Integrate mobile devices into CS security education.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

A Fast Approach Towards Android Malware Detection.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

2014
Quasi-Monte Carlo method in population genetics parameter estimation.
Math. Comput. Simul., 2014

Design insider threat hands-on labs.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

Securing EHRs via CPMA attribute-based encryption on cloud systems.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

A framework for teaching secure coding practices to STEM students with mobile devices.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Generation of parallel modified Kronecker sequences.
Monte Carlo Methods Appl., 2013

Teaching Secure Coding Practices to STEM Students.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013

GPU-Based Simulation of Wireless Body Area Network.
Proceedings of the 8th International Conference on Body Area Networks, 2013

An empirical study of botnets on university networks using low-interaction honeypots.
Proceedings of the ACM Southeast Regional Conference 2013, 2013

2012
Enhancing Mentoring Between Alumni and Students via Smart Alumni System.
Proceedings of the International Conference on Computational Science, 2012

GPU-based simulation of wireless body sensor networks.
Proceedings of the Winter Simulation Conference, 2012

Designing and implementing cloud-based digital forensics hands-on labs.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

A framework for designing an environment science social network.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

2011
Teaching Computing to STEM Students via Visualization Tools.
Proceedings of the International Conference on Computational Science, 2011

Poster: Quasi-Monte Carlo method in population genetics parameter estimation.
Proceedings of the IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences, 2011

A framework for designing benchmarks of investigating digital forensics tools for mobile devices.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

Enhancing cryptography education via visualization tools.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

Cyber threat analysis for university networks via virtual honeypots.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
Computational investigations of scrambled Faure sequences.
Math. Comput. Simul., 2010

Designing a computer forensics concentration for cross-disciplinary undergraduate students.
Proceedings of the Information Security Curriculum Development Conference, 2010

Active learning approaches to teaching information assurance.
Proceedings of the Information Security Curriculum Development Conference, 2010

Generating Parallel Random Sequences via Parameterizing EICGs for Heterogeneous Computing Environments.
Proceedings of the Computational Science and Its Applications, 2010

Broadening Information Assurance Awareness by Gaming.
Proceedings of the 2010 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2010

A Framework for Smart Trusted Indicators for Browsers (STIB).
Proceedings of the 2010 International Conference on Security & Management, 2010

A framework for access control model in enterprise healthcare via SAML.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

2009
Parallel quasirandom number generations for heterogeneous computing environments.
Int. J. Parallel Emergent Distributed Syst., 2009

Rare Event Simulation Via Randomized Quasi-Monte Carlo (abstract).
Proceedings of the Huntsville Simulation Conference, 2009

Framework for the design of web-based learning for digital forensics labs.
Proceedings of the 47th Annual Southeast Regional Conference, 2009

2008
Exploitation of sensitivity derivatives via randomized quasi-Monte Carlo methods.
Monte Carlo Methods Appl., 2008

Implementation of a Security Access Control Model for Inter-organizational Healthcare Information Systems.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Generating parallel quasirandom sequences via randomization.
J. Parallel Distributed Comput., 2007

A conceptual model to support the integration of inter-organizational healthcare information systems.
Proceedings of the Winter Simulation Conference, 2007

Effectively generating random test data via cellular automata.
Proceedings of the Winter Simulation Conference, 2007

Efficient Generation of Parallel Quasirandom Faure Sequences Via Scrambling.
Proceedings of the Computational Science, 2007

2006
Computational investigations of quasirandom sequences in generating test cases for specification-based tests.
Proceedings of the Winter Simulation Conference WSC 2006, 2006

Quasi-random Walks on Balls Using C.U.D. Sequences.
Proceedings of the Numerical Methods and Applications, 6th International Conference, 2006

Generating Test Data for Specification-Based Tests Via Quasirandom Sequences.
Proceedings of the Computational Science, 2006

2005
On the optimal Halton sequence.
Math. Comput. Simul., 2005

Assesssing uncertainty in software reliability via quasi-monte carlo methods.
Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, 2005

Parallel Random Generators for Heterogeneous Computing Environments.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

On the Scrambled Sobol Sequence.
Proceedings of the Computational Science, 2005

2004
Parallel linear congruential generators with Sophie-Germain moduli.
Parallel Comput., 2004

On the Scrambled Halton Sequence.
Monte Carlo Methods Appl., 2004


  Loading...