Yi-Ming Chen
Orcid: 0000-0003-2981-6700Affiliations:
- National Central University, Department of Information Management, Jung-Li, Taiwan
According to our database1,
Yi-Ming Chen
authored at least 53 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Comparison of Interaction Profiling Bipartite Graph Mining and Graph Neural Network for Malware-Control Domain Detection.
Proceedings of the 2024 International Conference on Information Technology, 2024
2022
Android Malware Classifier Combining Permissions and API Features to Face Model Drifting.
Proceedings of the New Trends in Computer Technologies and Applications, 2022
A Novel Deep Learning Based Attention Mechanism for Android Malware Detection and Explanation.
Proceedings of the 10th International Conference on Computer and Communications Management, 2022
2021
Int. J. Grid High Perform. Comput., 2021
Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection.
Secur. Commun. Networks, 2020
Android malware detection system integrating block feature extraction and multi-head attention mechanism.
Proceedings of the International Computer Symposium, 2020
Dynamic Android Malware Analysis with De-Identification of Personal Identifiable Information.
Proceedings of the ICCBD 2020: The 3rd International Conference on Computing and Big Data, 2020
2019
NetFlowTotal: A Cloud Service Integration Platform for Malicious Traffic Analysis and Collaboration.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019
2018
CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
Wirel. Pers. Commun., 2017
2015
Mob. Inf. Syst., 2015
Energy Efficient Min Delay-based Geocast Routing Protocol for the Internet of Vehicles.
J. Inf. Sci. Eng., 2015
Adaptive Smart Power Control Algorithm for LTE downlink cross-tier interference avoidance.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015
2014
Multim. Tools Appl., 2014
Entropy, 2014
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014
2013
A beacon-based trust management system for enhancing user centric location privacy in VANETs.
J. Commun. Networks, 2013
Proceedings of the Network and Parallel Computing - 10th IFIP International Conference, 2013
2012
Telecommun. Syst., 2012
Secur. Commun. Networks, 2012
Int. J. Digit. Multim. Broadcast., 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 12th International Conference on ITS Telecommunications, 2012
2011
Int. J. Inf. Technol. Commun. Convergence, 2011
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011
Proceedings of the Security Technology, 2011
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011
Combining density-based clustering and wavelet methods for internal systems anomaly detection.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011
2010
A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems.
Proceedings of the Security Informatics, 2010
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010
2009
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009
A game theory approach for the reallocation of security forces against terrorist diversionary attacks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
2007
Proceedings of the Agent Computing and Multi-Agent Systems, 2007
Proceedings of the Advances in Grid and Pervasive Computing, 2007
2006
Proceedings of the Wired/Wireless Internet Communications, 4th International Conference, 2006
Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.
Proceedings of the Advances in Information and Computer Security, 2006
2005
Proceedings of the Management of Multimedia Networks and Services, 2005
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005
2004
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004
Interleaving harmonic broadcasting and receiving scheme with loss-anticipation delivery.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Proceedings of the 12th IEEE International Conference on Networks, 2004
Interleaving Staircase Broadcasting and Receiving Scheme with Loss-Anticipation Delivery.
Proceedings of the International Conference on Internet Computing, 2004
A Smooth Recursive Frequency-Splitting Scheme for Broadcasting VBR-Encoded Hot Videos.
Proceedings of the High Speed Networks and Multimedia Communications, 2004
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004
2003