Yu Chen
Orcid: 0000-0003-1880-0586Affiliations:
- Binghamton University, New York, NY, USA
- University of Southern California, Los Angeles, CA, USA
According to our database1,
Yu Chen
authored at least 161 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Secure Interconnected Autonomous System Architecture for Multi-Domain IoT Ecosystems.
IEEE Commun. Mag., July, 2024
Future Internet, February, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
2023
Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling.
IEEE Trans. Serv. Comput., 2023
Electric Vehicle Aggregation Review: Benefits and Vulnerabilities of Managing a Growing EV Fleet.
CoRR, 2023
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
A Digital Healthcare Service Architecture for Seniors Safety Monitoring in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Poster Abstract: Light-Weight Real-Time Senior Safety Monitoring using Digital Twins.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023
Enhance Public Safety Surveillance in Smart Cities by Fusing Optical and Thermal Cameras.
Proceedings of the 26th International Conference on Information Fusion, 2023
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
2022
μDFL: A Secure Microchained Decentralized Federated Learning Fabric Atop IoT Networks.
IEEE Trans. Netw. Serv. Manag., 2022
Proc. Priv. Enhancing Technol., 2022
IT Prof., 2022
SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network.
Future Internet, 2022
Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach.
Future Internet, 2022
Future Internet, 2022
Robustness of Electrical Network Frequency Signals as a Fingerprint for Digital Media Authentication.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Real-Time Elderly Monitoring for Senior Safety by Lightweight Human Action Recognition.
Proceedings of the 16th IEEE International Symposium on Medical Information and Communication Technology, 2022
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
Proceedings of the Dynamic Data Driven Applications Systems - 4th International Conference, 2022
Fairledger: a Fair Proof-of-Sequential-Work based Lightweight Distributed Ledger for IoT Networks.
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
Toward Intelligent Surveillance as an Edge Network Service (iSENSE) Using Lightweight Detection and Tracking Algorithms.
IEEE Trans. Serv. Comput., 2021
IEEE Signal Process. Lett., 2021
EAI Endorsed Trans. Security Safety, 2021
I-ViSE: Interactive Video Surveillance as an Edge Service Using Unsupervised Feature Queries.
IEEE Internet Things J., 2021
EconLedger: A Proof-of-ENF Consensus Based Lightweight Distributed Ledger for IoVT Networks.
Future Internet, 2021
Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT).
Future Internet, 2021
Comput., 2021
IEEE Consumer Electron. Mag., 2021
Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint Consensus.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
Proceedings of the 23rd International Workshop on Multimedia Signal Processing, 2021
A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Mosaic: Modeling Safety Index in Crowd by Detecting Face Masks against COVID-19 and Beyond.
Proceedings of the IEEE International Smart Cities Conference, 2021
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021
Fed-DDM: A Federated Ledgers based Framework for Hierarchical Decentralized Data Marketplaces.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
2020
Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge.
EAI Endorsed Trans. Security Safety, 2020
Enabling Continuous Operations for UAVs with an Autonomous Service Network Infrastructure.
CoRR, 2020
Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems.
CoRR, 2020
CoRR, 2020
<i>iRyP</i>: a purely edge-based visual privacy-respecting system for mobile cameras.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the IEEE International Smart Cities Conference, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
2019
Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals.
Sensors, 2019
Future Gener. Comput. Syst., 2019
CoRR, 2019
CoRR, 2019
A Distributed Agent-Based Framework for a Constellation of Drones in a Military Operation.
Proceedings of the 2019 Winter Simulation Conference, 2019
A Study of Lightweight DDDAS Architecture for Real-Time Public Safety Applications Through Hybrid Simulation.
Proceedings of the 2019 Winter Simulation Conference, 2019
Proceedings of the IEEE Sustainability through ICT Summit, 2019
BlendSM-DDM: BLockchain-ENabled Secure Microservices for Decentralized Data Marketplaces.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019
I-SAFE: instant suspicious activity identification at the edge using fuzzy decision making.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Kerman: A Hybrid Lightweight Tracking Algorithm to Enable Smart Surveillance as an Edge Service.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019
BlendMAS: A Blockchain-Enabled Decentralized Microservices Architecture for Smart Public Safety.
Proceedings of the IEEE International Conference on Blockchain, 2019
A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge.
Proceedings of the IEEE International Conference on Blockchain, 2019
Smart Surveillance Video Stream Processing at the Edge for Real-Time Human Objects Tracking.
Proceedings of the Fog and Edge Computing, 2019
2018
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model.
IEEE Trans. Comput. Soc. Syst., 2018
An Exploration of Blockchain Enabled Decentralized Capability based Access Control Strategy for Space Situation Awareness.
CoRR, 2018
CoRR, 2018
EIQIS: Toward an Event-Oriented Indexable and Queryable Intelligent Surveillance System.
CoRR, 2018
CoRR, 2018
Intelligent Surveillance as an Edge Network Service: from Harr-Cascade, SVM to a Lightweight CNN.
CoRR, 2018
An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
CoRR, 2018
BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT.
Comput., 2018
An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks.
Proceedings of the Security and Privacy in Communication Networks, 2018
Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain.
Proceedings of the IEEE International Smart Cities Conference, 2018
A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology.
Proceedings of the IEEE International Smart Cities Conference, 2018
Position Paper: A Theoretical Framework for General Cognition Evaluation of Cognitive Radios.
Proceedings of the IEEE International Smart Cities Conference, 2018
Proceedings of the IEEE International Smart Cities Conference, 2018
A Novel PMU Fog Based Early Anomaly Detection for an Efficient Wide Area PMU Network.
Proceedings of the 2nd IEEE International Conference on Fog and Edge Computing, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Edge Computing, 2018
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
Smart Surveillance as an Edge Network Service: From Harr-Cascade, SVM to a Lightweight CNN.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
2017
A Container-Based Elastic Cloud Architecture for Pseudo Real-Time Exploitation of Wide Area Motion Imagery (WAMI) Stream.
J. Signal Process. Syst., 2017
EAI Endorsed Trans. Security Safety, 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017
Proceedings of the Computer Network Security, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Proceedings of the IEEE International Conference on Consumer Electronics, 2017
Proceedings of the 6th IEEE International Conference on Cloud Networking, 2017
2016
New Rev. Hypermedia Multim., 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Integration of machine learning and human learning for training optimization in robust linear regression.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016
2015
Proceedings of the Handbook on Data Centers, 2015
Peer-to-Peer Netw. Appl., 2015
IEEE Pervasive Comput., 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Singular Spectrum Analysis Based Quick Online Detection of Disturbance Start Time in Power Grid.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Pseudo-real-time Wide Area Motion Imagery (WAMI) processing for dynamic feature detection.
Proceedings of the 18th International Conference on Information Fusion, 2015
2014
Enabling Smart Personalized Healthcare: A Hybrid Mobile-Cloud Approach for ECG Telemonitoring.
IEEE J. Biomed. Health Informatics, 2014
Int. J. Bus. Process. Integr. Manag., 2014
MEGA: An energy aware algorithm for self-powered wireless sensor networks in sustainable smart infrastructure.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
A container-based elastic cloud architecture for real-time full-motion video (FMV) target tracking.
Proceedings of the 2014 IEEE Applied Imagery Pattern Recognition Workshop, 2014
2013
Int. J. Cloud Comput., 2013
An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection.
Comput. Electr. Eng., 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013
An optimized design of reconfigurable PSD accelerator for online shrew DDoS attacks detection.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Finding Needles in a Haystack: Reducing False Alarm Rate Using Telemedicine Mobile Cloud.
Proceedings of the IEEE International Conference on Healthcare Informatics, 2013
Proceedings of the International Conference on Connected Vehicles and Expo, 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
Scalable sentiment classification for Big Data analysis using Naïve Bayes Classifier.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
2012
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts.
Proceedings of the Computer Network Security, 2012
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
2011
IEEE Commun. Surv. Tutorials, 2011
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Proceedings of the Global Communications Conference, 2011
Consistency Control to Manage Dynamic Contents over Vehicular Communication Networks.
Proceedings of the Global Communications Conference, 2011
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
Proceedings of the 18th Euromicro Conference on Parallel, 2010
Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms.
Proceedings of the 39th International Conference on Parallel Processing, 2010
D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-Of-Order Keystream Generation.
Proceedings of IEEE International Conference on Communications, 2010
A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modeling.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
2009
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009
Wirel. Pers. Commun., 2009
Weighted trust evaluation-based malicious node detection for wireless sensor networks.
Int. J. Inf. Comput. Secur., 2009
Proceedings of the Multimedia and Security Workshop, 2009
Proceedings of the 7th International Workshop on Design of Reliable Communication Networks, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Malicious node detection in wireless sensor networks using weighted trust evaluation.
Proceedings of the 2008 Spring Simulation Multiconference, 2008
Proceedings of The 2008 IEEE International Conference on Networking, 2008
2007
IEEE Trans. Parallel Distributed Syst., 2007
Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007
Proceedings of IEEE International Conference on Communications, 2007
2006
J. Parallel Distributed Comput., 2006
Int. J. Crit. Infrastructures, 2006
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006
2005
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Achieving maximum throughput with a minimum number of label switched paths in MPLS networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks.
Proceedings of the Computational Science, 2005