Tieming Chen

Orcid: 0000-0003-4664-3311

According to our database1, Tieming Chen authored at least 62 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs.
Cybersecur., December, 2024

TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy.
IEEE Trans. Mob. Comput., April, 2024

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters.
Comput. Secur., January, 2024

CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports.
CoRR, 2024

Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports.
CoRR, 2024

SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time.
CoRR, 2024

TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning.
CoRR, 2024

DocSecKG: A Systematic Approach for Building Knowledge Graph to Understand the Relationship Between Docker Image and Vulnerability.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

A Novel Fuzzy Trust-Based Secure Vehicular Data Forwarding Scheme Using Incentive Consensus.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2024

FuzzyFollow: A Novel Privacy-Aware Intelligent Vehicle-Following Scheme for Safe Driving on Risky Roads Using Fuzzy Sets.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends.
Comput. Secur., December, 2023

Structure-Aware Subspace Clustering.
IEEE Trans. Knowl. Data Eng., October, 2023

Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons.
Inf. Sci., August, 2023

APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts.
IEEE Trans. Dependable Secur. Comput., 2023

fuzzyForward: A Novel Multi-hop Data Forwarding Scheme Using Fuzzy Decision for Edge VANETs.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023

TCFP: A Novel Privacy-Aware Edge Vehicular Trajectory Compression Scheme Using Fuzzy Markovian Prediction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

2022
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment.
IEEE Trans. Mob. Comput., 2022

Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network.
IEEE Trans. Mob. Comput., 2022

Privacy-Aware Fuzzy Range Query Processing Over Distributed Edge Devices.
IEEE Trans. Fuzzy Syst., 2022

Kellect: a Kernel-Based Efficient and Lossless Event Log Collector.
CoRR, 2022

2021
Privacy-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities.
IEEE Trans. Veh. Technol., 2021

Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction.
IEEE Trans. Intell. Transp. Syst., 2021

General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering.
IEEE Trans. Inf. Forensics Secur., 2021

A Domain-Specific Non-Factoid Question Answering System based on Terminology Mining and Siamese Neural Network.
J. Inf. Sci. Eng., 2021

APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts.
CoRR, 2021

A Heterogeneous Graph Learning Model for Cyber-Attack Detection.
CoRR, 2021

FuzzySkyline: QoS-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

2020
A Collaborative Deep and Shallow Semisupervised Learning Framework for Mobile App Classification.
Mob. Inf. Syst., 2020

A Risk control Framework for Mortgaged Cars based on trajectory Mining.
Int. J. Robotics Autom., 2020

WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
一种基于地形因素的空气质量空间估计方法 (Spatial Estimation Method of Air Quality Based on Terrain Factors LV Ming-qi LI Yi-fan CHEN Tie-ming).
计算机科学, 2019

DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network.
KSII Trans. Internet Inf. Syst., 2019

Air quality estimation by exploiting terrain features and multi-view transfer semi-supervised regression.
Inf. Sci., 2019

Discovering individual movement patterns from cell-id trajectory data by exploiting handoff features.
Inf. Sci., 2019

A hybrid deep convolutional and recurrent neural network for complex activity recognition using multimodal sensors.
Neurocomputing, 2019

Map matching based on Cell-ID localization for mobile phone users.
Clust. Comput., 2019

A sequence-to-sequence model for cell-ID trajectory prediction.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

2018
Bi-View Semi-Supervised Learning Based Semantic Human Activity Recognition Using Accelerometers.
IEEE Trans. Mob. Comput., 2018

TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification.
Mob. Inf. Syst., 2018

Urban Traffic Congestion Index Estimation With Open Ubiquitous Data.
J. Inf. Sci. Eng., 2018

Anti-chain based algorithms for timed/probabilistic refinement checking.
Sci. China Inf. Sci., 2018

An Efficient Privacy-Preserving Friend Recommendation Scheme for Social Network.
IEEE Access, 2018

Collaborative Pursuing of Multiple Mobile Robots in Dynamic Environment.
Proceedings of the 4th International Conference on Robotics and Artificial Intelligence, 2018

2017
Formal Analysis of Security Properties of Cyber-Physical System Based on Timed Automata.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Formalizing and verifying stochastic system architectures using Monterey Phoenix.
Softw. Syst. Model., 2016

From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT.
J. Sensors, 2016

Mining cell-id trajectory patterns by exploiting handoff features.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

Mystique: Evolving Android Malware for Auditing Anti-Malware Tools.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract).
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

2014
Efficient classification using parallel and scalable compressed model and its application on intrusion detection.
Expert Syst. Appl., 2014

2013
Efficient Attack Detection Based on a Compressed Model.
Proceedings of the Information Security Practice and Experience, 2013

2011
A Bilinear Pairing-Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A Naive Feature Selection Method and Its Application in Network Intrusion Detection.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor Networks.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2008
Robust and Efficient Rule Extraction Through Data Summarization and Its Application in Welding Fault Diagnosis.
IEEE Trans. Ind. Informatics, 2008

Tree parity machine-based One-Time Password authentication schemes.
Proceedings of the International Joint Conference on Neural Networks, 2008

2007
Designing Security Protocols Using Novel Neural Network Model.
Proceedings of the Third International Conference on Natural Computation, 2007

2005
A Novel Identity-Based Key Issuing Scheme Based on Interacting Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

A Novel Remote User Authentication Scheme Using Interacting Neural Network.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
A Structure Modeling Method for Multi-task Embedded Software Design.
Proceedings of the Embedded Software and Systems, First International Conference, 2004


  Loading...