Yu Chen Conferences

  • R. I. Ledesma Goyzueta and Y. Chen, "A Deterministic Loss Model based Analysis of CUBIC," the International Conference on Computing, Networking and Communications, Communication QoS and System Modeling Symposium (ICNC’13 - CQSM), San Diego, CA, USA, January 28 - 31, 2013.
  • B. Kerrigan and Y. Chen, “A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts,” the 6th International Conference on Mathematical Methods, Models, and Architecture for Computer Network Security (MMM-ACNS-2012), October 17-20, 2012, St. Petersburg, Russia.
  • J. Feng, Y. Chen, D. Summerville, and Z. Su, "An Extension of RDP Code with Parallel Decoding Procedure," the 9th IEEE Consumer Communications and Networking Conference (CCNC 2012), Las Vegas, NV, USA, Jan. 14 - 17, 2012.
  • Z. Su, P. Ren, and Y. Chen "Consistency Control to Manage Dynamic Contents over Vehicular Communication Networks," the IEEE GlobeCom 2011- Communications QoS. Reliability, and Modeling Symposium, Huston, Texas, USA, Dec. 5 - 9, 2011.
  • M. Xiang, Y. Chen, W.-S. Ku, and Z. Su, "Mitigating DDoS Attacks using Protection Nodes in Mobile Ad hoc Networks," the IEEE GlobeCom 2011- Communication & System Security Symposium, Huston, Texas, USA, Dec. 5 - 9, 2011.
  • S. Mazur, E. Blasch, Y. Chen, and V. Skormin, "Mitigating Cloud Computing Security using a Self-Monitoring Defense Scheme," the 2011 National Aerospace & Electronics Conference (NAECON’11), Dayton, OH., USA, July 20 - 22, 2011.
  • J. Feng, Y. Chen, and D. Summerville, "A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds," the 2011 International Conference on Collaboration Technologies and Systems (CTS 2011), Philadelphia, PA., USA, May 23 - 27, 2011.
  • Y. Chen, C. Twigg, O. Sadik, and S. Tong, “A Self-Powered Adaptive Wireless Sensor Network for Wastewater Treatment Plants”, the 9th Annual IEEE Conference on Pervasive Computing and Communications (PerCom’2011), Seattle, USA, March 21 - 25, 2011.
  • J. Feng, Y. Chen, D. Summerville, W.-S. Ku, and Z. Su, “Enhancing Cloud Storage Security against Roll-back Attacks with a New Fair Multi-Party Non-Repudiation Protocol”, the 8th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’11), Las Vegas, Nevada, USA, January 9 - 12, 2011.
  • Y. Chen, C.-J. Wang, W.-S. Ku, and Z. Su, “A Location Aware Virtual Infrastructure for VANETs”, the 8th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’11), Las Vegas, Nevada, USA, January 9 - 12, 2011.
  • H. Chen and Y. Chen, “A Comparison Study of Collaborative Strategies for Distributed Defense against Internet Worms based on Small-World Modeling,” the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, Illinois, USA, Oct. 9 – 12, 2010.
  • J. Feng, Y. Chen, W.-S. Ku, and P. Liu, "Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms," the 2nd International Workshop on Security in Cloud Computing (SCC 2010), held in conjunction with the 39th International Conference on Parallel Processing (ICPP 2010), San Diego, California, USA, Sept. 13, 2010.
  • J. Feng, Y. Chen, W.-S. Ku, and Z. Su, “D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-of-order keystream Generation”, the 2010 IEEE International Conference on Communications - Communication and Information System Security Symposium (ICC'10 CISS), Cape Town, South Africa, May 23 - 27, 2010.
  • J. Feng, Y. Chen, D. Summerville, "EEO: an Efficient MDS-like RAID-6 Code for Parallel Implementation," the 33rd IEEE Sarnoff Symposium, Princeton, NJ, USA, Apr. 12-14, 2010.
  • P. Gasti and Y. Chen, “Breaking and Fixing the Self-Encryption Scheme for Data Security in Mobile Devices”, the 18th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2010) – Special Session “Security in Networked and Distributed Systems” (SNDS 2010), Pisa, Italy, February 17 - 19, 2010.
  • J. Feng, Y. Chen and P. Liu, “Bridging the Missing Link of Cloud Data Storage Security in AWS”, the 7th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’10), Las Vegas, Nevada, USA, January 9 - 12, 2010.
  • Y. Chen W.-S. Ku, K. Sakai, and C. DeCruze, “A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages”, the 7th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’10), Las Vegas, Nevada, USA, January 9 - 12, 2010.
  • H. Chen, D. Summerville, and Y. Chen, “Two-Stage Decomposition of SNORT Rules towards Efficient Hardware Implementation,” the 7th International Workshop on Design of Reliable Communication Networks (DRCN 2009), Washington, D.C., USA, October 25 – 28, 2009.
  • Z. Su, Z. Zhang, and Y. Chen, “Performance Evaluation of a Novel Caching Algorithm for Scalable Image Contents,” the 2nd International Symposium on Intelligent Informatics (ISII 2009), Qinhuangdao, China, September 13 – 15, 2009.
  • I. M. Atakli, Y. Chen, Q. Wu, and S. Craver, “BLINK: Pixel-Domain Encryption for Secure Document Management”, the 11th ACM Workshop on Multimedia and Security (MMSEC 2009), Princeton, New Jersey, USA, September 7 - 8, 2009.
  • Y. Chen and W.-S. Ku, “Self-Encryption Scheme for Data Security in Mobile Devices”, the 6th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’09), Las Vegas, Nevada, USA, January 10 - 13, 2009.
  • S. Craver, Y. Chen, H. Chen, J. Yu, and I. M. Atakli, “BLINK: Securing Information to the Last Connection”, the 6th IEEE Consumer Communications and Networking Conference (CCNC’09), Las Vegas, Nevada, USA, January 10 - 13, 2009.
  • Z. Su, J. Katto, Y. Yasuda, and Y. Chen, “Consistency Control for Dynamic Contents in Mobile Overlay Network,” the 3rd International Conference on Communications and Networking in China (ChinaCom’08), Hangzhou, China, August 25 – 27, 2008. [Best Paper Award]
  • Z. Su, Z. Zhang, and Y. Chen, “Retrieve Scalable Image Contents over Image Contents Network by Efficient Caching Algorithms,” the 3rd International Conference of Innovative Computing, Information and Control (ICICIC 2008), Dalian, China, June 18 – 20, 2008.
  • H. Chen and Y. Chen, “A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks,” the 2008 IEEE International Conference on Networking, Architecture, and Storage (NAS’08), Chongqing, China, June 12 – 14, 2008.
  • Y. Chen, J. Bao, W.-S. Ku, and J.-L. Huang, “Cache Management Techniques for Privacy Protected Location-based Services,” the 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS’08), in conjunction with the 9th International Conference on Mobile Data Management (MDM’08), Beijing, China, April 27, 2008.
  • I. Atakli, H. Hu, Y. Chen, W.-S. Ku, and Z. Su, “Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation,” invited paper, the ACM/SIGSIM Symposium on Simulation of System Security (SSSS’08), Ottawa, Canada, April 14 – 17, 2008.
  • Y. Chen, “NeuroNet: Towards an Intelligent Internet Infrastructure”, the 5th IEEE Consumer Communications and Networking Conference (CCNC’08), Las Vegas, Nevada, USA, January 10 - 12, 2008.
  • Y. Chen, K. Hwang, and W.-S. Ku, “Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed”, DETER Community Workshop on Cyber Security Experimentation and Test, in conjunction with USENIX Security Symposium (Security’07), Boston, MA., USA, August 6-7, 2007.
  • Y. Chen and K. Hwang, “Spectral Analysis of TCP Flows for Defense against Reduction-of-Quality Attacks,” the 2007 IEEE International Conference on Communications (ICC’07), Glasgow, Scotland, June 24-28, 2007.
  • Y. Chen and K. Hwang, “Collaborative Change Detection of DDoS Attacks on Community and ISP Networks,” the 2006 IEEE International Symposium on Collaborative Technologies and Systems (CTS’06), Las Vegas, Nevada, USA, May. 15-17, 2006.
  • Y. Chen, K. Hwang, and Y.-K. Kwok, “Filtering of Shrew DDoS Attacks in Frequency Domain,” the First IEEE LCN Workshop on Network Security (WoNS), in conjunction with the LCN 2005, Sydney, Australia, Nov. 15-17, 2005.
  • Y.-K. Kwok, R. Tripathi, Y. Chen, and K. Hwang, “HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DoS Attacks,” the 2005 International Conference on Computer Networks and Mobile Computing (ICCNMC’05), Zhangjiajie, China, Aug. 2-4, 2005.
  • Y. Chen, Y.-K. Kwok, and K. Hwang, “MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks,” the 2nd International Workshop on Security in Distributed Computing Systems (SDCS’05), in conjunction with ICDCS 2005, Columbus, OH, USA, June 6-10, 2005.
  • K. Hwang, Y.-K. Kwok, S. Song, M. Cai, Yu Chen, R. Zhou, Ying Chen, and X. Lou, “GridSec: Trusted Grid Computing with Security Binding and Self-Defense against Network Worms and DDoS Attacks,” in Proceedings of International Workshop on Grid Computing Security and Resource Management (GSRM-2005), in conjunction with the ICCS-2005, Atlanta, GA, May 22-24, 2005.
  • Yu Chen Journals

  • H. Chen, T. Gaska, Y. Chen, and D. Summerville, “An Optimal Reconfigurable Power Spectral Density Converter for Real-Time Shrew DDoS Attacks Detection,” Computers and Electrical Engineering, Elsevier, accepted to appear in 2013.
  • J. Feng, Y. Chen, and D. Summerville, “A Survey on XOR-based Erasure Codes for Canonical Storage Systems,” the International Journal of Information, Intelligence and Knowledge (JIIK), Vol. 4, Issue 2, 2012.
  • J. Feng and Y. Chen, “A Fair Non-Repudiation Framework for Data Integrity in Cloud Storage Services,” International Journal of Cloud Computing, Vol. 1, No. 4, 2012.
  • H. Chen, Y. Chen, and D. Summerville, “A Survey on the Application of FPGAs for Network Infrastructure Security,” the IEEE Communications Surveys and Tutorial, Vol. 13, Issue 4, 2011.
  • H. Hu, Y. Chen, W.-S. Ku, Z. Su, and C.-H. Chen, “Weighted Trust Evaluation Based Malicious Node Detection for Wireless Sensor Networks”, the International Journal of Information and Computer Security, special issue on Simulation of System Security, Vol. 3, No. 2, 2009.
  • Y. Chen and H. Chen, “NeuroNet: An Adaptive Infrastructure for Network Security,” International Journal of Information, Intelligence and Knowledge, Vol.1, No.2, 2009.
  • W.S. Ku, Y. Chen, and R. Zimmermann, “Privacy Protected Spatial Query Processing for Advanced Location Based Services”, Journal of Wireless Personal Communications, special issue on Information Security and Data Protection in Future Generation Communication and Networking, Vol. 47, October, 2008.
  • Y. Chen, K. Hwang, and W.-S. Ku, “Collaborative Detection of DDoS Attacks over Multiple Network Domains”, IEEE Transaction on Parallel and Distributed Systems, Vol. 18, No. 12, December 2007.
  • Y. Chen and K. Hwang, “Collaborative Detection and Filtering of Shrew DDoS Attacks using Spectral Analysis,” Journal of Parallel and Distributed Computing, special issue on Security in Grids and Distributed Systems, Vol. 66. No. 9, September 2006.
  • K. Hwang, M. Cai, Y.-K. Kwok, S. Song, Yu Chen, and Ying Chen, “DHT-based security infrastructure for trusted internet and grid computing,” International Journal on Critical Infrastructures, Vol.2, No. 4, 2006.
  • M. Cai, K. Hwang, Y.-K. Kwok, S. Song, and Y. Chen, “Collaborative Internet Worm Containment”, IEEE Security and Privacy Magazine, May/June 2005.