Binghamton University
          Yu Chen
Yu Chen, Ph.D.
Professor,Department of Electrical and Computer Engineering
Director, Ubiquitous Smart & Sustainable Computing (US2C) Lab
Associate Director, Center for Information Assurance and Cybersecurity (CIAC)
Thomas J. Watson College of Engineering and Applied Science
Binghamton University, State University of New York
Binghamton, NY 13902
Email: ychen AT Binghamton DOT edu
Google Scholar
ORCID


Biography(CV)

    Dr. Yu Chen is a Professor of Electrical and Computer Engineering at the Binghamton University - State University of New York (SUNY). He received a Ph.D. in Electrical Engineering from the University of Southern California (USC) in 2006. Leading the Ubiquitous Smart & Sustainable Computing (US2C) Lab, his research interest focuses on Trust, Security, and Privacy in Computer Networks, including Edge-Fog-Cloud Computing, the Internet of Things (IoT), and their applications in smart and connected environments. Dr. Chen's publications include over 200 papers in scholarly journals, conference proceedings, and books. His research has been funded by NSF, DoD, AFOSR, AFRL, New York State, and industrial partners. He has served as a reviewer for NSF panels, DoE Independent Review panel, and international journals, and on the Technical Program Committee (TPC) of prestigious conferences. He is a Senior Member of IEEE (Computer Society & Communication Society) and SPIE, and a member of ACM and SIGMA XI.

  
Research Areas

     Smart Cities, Intelligent Surveillance
     Edge-Fog-Cloud Computing, Internet of Things (IoTs)
     Trust, Security, and Privacy


Teaching

    EECE 658         Hardware-based Security
    EECE 657         Network Security
    EECE 453/553   Computer Network Architecture
    EECE 452/552   Computer Design
    EECE 507         Mathematical Methods in Computer Engineering
    EECE 352         Computer Architecture


Publications

Book Chapters:

  1. D. Nagothu, N. Poredi, and Y. Chen, "Evolution of Attacks on Intelligent Surveillance Systems and Effective Detection Techniques," Intelligent Video Surveillance - New Perspectives, edited by P. L. Mazzeo, IntechOpen, 978-1-80356-342-8, 2022.
  2. R. Xu, D. Nagothu, and Y. Chen, "ECOM: Epoch Randomness-based Consensus Committee Configuration for IoT-Blockchains," Principles and Practice of Blockchains, edited by K. Daimi, I. Dionysiou, and N. El Madhoun, Springer, ISBN 978-3-031-10506-7, October 2022.
  3. R. Xu, Y. Chen, and E. Blasch, "Microchain: a Light Hierarchical Consensus Protocol for IoT System, " Blockchain Applications in IoT: Principles and Practices, edited by T. Choudhury, A. Khanna, T. T. Toe, M. Khurana, and N. G. Nhu, EAI/Springer, ISBN 978-3-030-65690-4, e-ISBN 978-3-030-65691-1, July 2021.
  4. D. Nagothu, S. Y. Nikouei, R. Xu, X. Zhao, and Y. Chen, "Smart Surveillance for Public Safety enabled by Edge Computing," Edge Computing: Models, Technologies and Applications, edited by J. Taheri and S. Deng, The Institution of Engineering and Technology (IET), ISBN 978-1-785-61940-3, e-ISBN 978-1785619410, August 2020.
  5. A. Fitwi, Z. Yang, Y. Chen, and X. Lin, "Smart Grids Enabled by Edge Computing," Edge Computing: Models, Technologies and Applications, edited by J. Taheri and S. Deng, The Institution of Engineering and Technology (IET), ISBN 978-1-785-61940-3, e-ISBN 978-1785619410, August 2020.
  6. R. Xu, Y. Chen, and E. Blasch, "Decentralized Security Solutions for IoT Leveraging the Blockchain and Smart Contract," Modeling and Design of Secure Internet of Things, edited by C. Kamhoua, L. Njilla, A. Kott, and S. Shetty, Wiley-IEEE Press, ISBN 978-1-119-59336-2, June 2020.
  7. S. Y. Nikouei, R. Xu, and Y. Chen, "Smart Surveillance Video Stream Processing at the Edge for Real-Time Human Objects Tracking," Fog and Edge Computing: Principles and Paradigms, edited by R. Buyya and S. Srirama, Springer, Print ISBN 978-1119524984, Online ISBN: 978-1119525080, Electronic ISBN: 978-1119525066, 2018.
  8. N. Chen and Y. Chen, "Smart City Surveillance using Fog Computing in IoT Era: Opportunities and Challenges," Smart Cities: Development and Governance Frameworks, edited by Z. Mahmood, Springer, ISBN 978-3-319-76668-3, 2018.
  9. N. Chen, Y. Chen, X. Ye, and H. Ling, "Smart City Surveillance in Fog Computing," Advances in Mobile Cloud Computing and Bid Data Under the 5G Era, edited by C. X. Mavromoustakis, G. Mastorakis, and C. Dobre, Springer, ISBN 978-3-319-45143-5, Nov. 2016.
  10. B. Liu and Y. Chen, "Auditing for Data Integrity and Reliability in Cloud Storage," Handbook on Data Centers, edited by S. U. Khan and A. Zomaya, Springer, ISBN 978-1-4939-2091-4, 2015.
  11. E. Blasch, Y. Chen, G. Chen, D. Shen, and R. Kohler, "Information Fusion in a Cloud-Enabled Environment, " High Performance Semantic Cloud Auditing, edited by B.-Y. Choi, K.-S. Han, and S. Song, Springer, ISBN 978-1-4614-3295-1, Jan. 2013.
  12. J. Feng, Y. Chen, D. Summerville, and K. Hwang, "Fair Multi-Party Non-Repudiation Framework for Storage Clouds, Part II," Could Computing for Enterprise Architectures, edited by Z. Mahmood and R. Hill, published in "Computer Communications and Networks" book series by Springer, ISBN 978-1-4471-2236-4, 2012.
  13. J. Feng, Y. Chen, D. Summerville, and K. Hwang, "Fair Multi-Party Non-Repudiation Framework for Storage Clouds, Part I," Could Computing for Enterprise Architectures, edited by Z. Mahmood and R. Hill, published in "Computer Communications and Networks" book series by Springer, ISBN 978-1-4471-2236-4, 2012.
  14. H. Chen and Y. Chen, "An Experimental Comparison of Collaborative Defense Strategies for Network Security," Pervasive Computing and Networking, edited by I. Woungang, published by John Wiley & Sons Limited, UK, ISBN-10: 0-470-74772-2, ISBN-13: 978-0-470-74772-8, June 2011.
  15. Y. Chen, J. Feng, W.-S. Ku, P. Liu, and Z. Su, "Secure Distributed Data Storage in Cloud Computing," Cloud Computing, edited by R. Buyya, J. Broberg, and A. Goscinski, published by Wiley, Inc. New York, USA, 2010. ISBN-10: 0470887990, ISBN-13: 978-0470887998.
  16. H. Chen, J. Feng, Y. Chen, and D. Summerville, "Securing Network Infrastructure using Reconfigurable Hardware Devices," Security Engineering Techniques and Solutions for Information Systems: Management and Implementations, edited by N. Boudriga and M. Hamdi, published by Idea Group, Inc., ISBN 1615208038, March 2010.
  17. Y. Chen, H. Chen, and W.-S. Ku, "Malicious Node Detection in Wireless Sensor Networks," Security in RFID and Sensor Networks, edited by Josh Y. Zhang and Paris Kitsos, published by Auerbach Publications, Taylor & Francis Group, ISBN 1420068393, 2009.
  18. Y. Chen and W.-S. Ku, "Distributed Data Aggregation Technology for Real-Time DDoS Attacks Detection," Encyclopedia of Data Warehousing and Mining, 2nd Edition, edited by John Wang, published by IGI Publishing, ISBN 1591405572, August 2008.

Journal/Magazine Papers:

  1. R. Xu, S. Wei, Y. Chen,G. Chen, E. Blasch, and K. Pham, "LightMAN: A Lightweight Microchained Fabric for Assurance and Resilience Oriented Urban Air Mobility Networks," MDPI Drones, December 2022, 6(12), 421.
  2. D. Nagothu, R. Xu, Y. Chen, E. Blasch, and A. Aved, "DeFakePro: Decentralized DeepFake Attacks Detection using ENF Authentication," the IEEE IT Professional, Vol. 24, Issue 5, pp. 46 - 52, November 30, 2022.
  3. R. Xu, Y. Chen, G. Chen, and E. Blasch, "SAUSA: Securing Access, Usage, and Storage of 3D Point Clouds Data by a Blockchain-based Authentication Network," MDPI Future Internet, November 2022, 14(12), 354.
  4. L. Haghnegahdar, Y. Wang, and Y. Chen, "Enhancing Dynamic Energy Network Management using a Multiagent Cloud-Fog Structure," Renewable and Sustainable Energy Reviews, Vol. 162, July 2022, 112439.
  5. R. Xu and Y. Chen, "uDFL: A Secure Microchained Decentralized Federated Learning Fabric atop IoT Networks," the IEEE Trans. on Network and Service Management (TNSM), Special Issue on Recent Advances in the Design and Management of Reliable Communication Networks, Vol. 19, Issue 3, pp. 2677 -2688. June 2022.
  6. D. Nagothu, N. Poredi, Y. Chen, E. Blasch, and A. Aved, "Deterring Deepfake Attacks with An Electrical Network Frequency Fingerprints Approach," MDPI Future Internet - Special Issue on 6G Wireless Channel Measurements and Models: Trends and Challenges, April 2022, 14(5), 125.
  7. N. Chen and Y. Chen, "Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service," the MDPI Future Internet - Special Issue on Security of IoT-Enabled Infrastructures in Smart Cities and Critical Systems, February 2022, 14(2), 54.
  8. A. Fitwi, Y. Chen, and S. Zhu, "Enforcing Privacy-Preservation on Edge Cameras using Lightweight Video Frame Scrambling," the IEEE Transactions on Services Computing, December 2021.
  9. Q. Qu, R. Xu, Y. Chen, E. Blasch, and A. Aved, "Fair Proof-of-Work (PoW) Consensus for IoT Blockchains Enabled by Miner Twins (MinT)," MDPI Future Internet, Special Issue on Security and Privacy in Blockchains and the IoT, November 2021.
  10. A. Fitwi, Y. Chen, and S. Zhu, "Lightweight Frame Scrambling Mechanisms for End-to-End Privacy in Edge Smart Surveillance," the IET Smart Cities, Special Issue on Smart Computing for Smart Cities, 2021.
  11. A. Fitwi, Y. Chen, H. Sun, and R. Harrod, "Estimating Interpersonal Distance and Crowd Density with a Single Edge Camera," the MDPI Computers, October 2021, Vol. 10, No. 11, 143.
  12. R. Xu, D. Nagothu, and Y. Chen, "EconLedger: A Proof-of-ENF Consensus based Lightweight Distributed Ledger for IoVT Networks," MDPI Future Internet, Special Issue on Blockchain: Applications, Challenges, and Solutions, September 2021, 13(10), 248.
  13. R. Xu, D. Nagothu, and Y. Chen, "Decentralized Video Input Authentication as an Edge Service for Smart Cities," the IEEE Consumer Electronics Magazine, Special Issue on Advances in Smart Cities, February 2021.
  14. X. Li and Y. Chen, "Lightweight 2D Imaging for Integrated Imaging and Communication Applications," the IEEE Signal Processing Letters, February 2021.
  15. D. Nagothu, Y. Chen,A. Aved, and E. Blasch, "Authenticating Video Feeds using Electric Network Frequency Estimation at the edge," the EAI Endorsed Transactions on Security and Safety, February 2021.
  16. A. Fitwi, Y. Chen, S. Zhu, E. Blasch, and G. Chen, "Privacy-Preserving Surveillance as an Edge Service based on Lightweight Video Protection Schemes using Face De-Identification and Window Masking," MDPI Electronics, Special Issue on 10th Anniversary of Electronics: Recent Advances in Computer Science & Engineering, 2021, Vol. 10, No. 3, 236.
  17. R. Xu, S. Y. Nikouei, D. Nagothu, A. Fitwi, and Y. Chen, "Blend-SPS: A BLockchain-ENabled Decentralized Smart Public Safety System", MDPI Smart Cities, September 2020.
  18. S. Y. Nikouei, Y. Chen, A. Aved, and E. Blasch, "I-ViSE: Interactive Video Surveillance as an Edge Service using Unsupervised Feature Queries," the IEEE Internet of Things Journal, Special Issue on Artificial Intelligence Powered Edge Computing for Internet of Things, 2020.
  19. A. Fitwi, M. Yuan, S. Y. Nikouei, and Y. Chen, "Minor Privacy Protection by Real-Time Children Identification and Face Scrambling at the Edge", the EAI Endorsed Transactions on Security and Safety, Vol. 7, No. 23. e3. ISSN 2032-9393, May 2020.
  20. D. Nagothu, Y. Chen, E. Blasch, A. Aved, and S. Zhu, "Detecting Malicious False Frame Injection Attacks on Surveillance Systems at Edge using Electrical Network Frequency Signals," Sensors 2019 19 (11), 2424, Special Issue on Intelligent Signal Processing, Data Science and the IoT World, MDPI, May 2019.
  21. S. Nikouei, Y. Chen, S. Song, B.-Y. Choi, and T. Faughnan, "Toward Intelligent Surveillance as an Edge Network Service (iSENSE) using Lightweight Detection and Tracking Algorithms," the IEEE Transactions on Services Computing (IEEE TSC), May 2019.
  22. Z. Yang, Yu Chen, N. Zhou, A. Polunchenko, and Y. Liu, "Data-Driven Online Distributed Disturbance Location for Large Scale Power Grids," IET Smart Grid, April 2019, Vol. 2, Issue 3, pp. 381-390.
  23. R. Xu, Y. Chen, E. Blasch, and G. Chen, "An Exploration of Blockchain Enabled Decentralized Capability-based Access Control Strategy for Space Situational Awareness," Opt. Eng. 58(4), 041609 (2019).
  24. H. Gebre-Amlak, A. M. A. Jabbari, Y. Chen, B.-Y. Choi, C.-T. Huang, and S. Song, "Agile Polymorphic Software-Defined Fog Computing Platform for Mobile Wireless Controllers and Sensors," Int. J. of Internet Technology and Secured Transactions (IJITST), Vol. 9, No. 4, Sept. 2019.
  25. T. Gao, F. Li, Y. Chen, and X. Zou, "Local Differential Privately Anonymizing Online Social Networks under HRG-based Model," the IEEE Transactions on Computational Social Systems, Vol. 5, Issue 4, November 2018.
  26. R. Xu, Y. Chen, E. Blasch, and G. Chen, "BlendCAC: A Smart Contract Enabled Decentralized Capability-based Access Control Mechanism for IoT," Computers 2018 7(3), Special Issue on Mobile Edge Computing, MDPI, July 2018 (MDPI Computers 2019 Best Paper Award).
  27. B. Liu and Y. Chen, "A Scalable Fine-Grained Analytic Model for Container based Cloud Data Centers," Int. J. of Internet Technology and Secured Transactions (IJITST), Jan. 2018.
  28. Q. Dong, Z. Yang, Y. Chen, X. Li, and K. Zeng, "Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs," EAI Endorsed Transactions on Security and Safety, Vol. 4, Issue 2, December 2017.
  29. H. Gebre-Amlak, A. M. A. Jabbari, Y. Chen, B.-Y. Choi, C.-T. Huang, and S. Song, "Agile Polymorphic Software-Defined Fog Computing Platform for Mobile Wireless Controllers and Sensors," Int. J. of Internet Technology and Secured Transactions (IJITST), Sept. 2017.
  30. R. Wu, B. Liu, Y. Chen, E. Blasch, H. Ling, and G. Chen, "A Container-based Elastic Cloud Architecture for Pseudo Real-time Exploitation of Wide Area Motion Imagery (WAMI) Stream," Special Issue: Dynamic Data Driven Application Systems (DDDAS) Concepts in Signal Processing, Journal of Signal Processing Systems, November 2016.
  31. T. Gaska, C. Watkins, and Y. Chen, "Integrated Modular Avionics (IMA) Past, Present, and Future," IEEE Aerospace and Electronic Systems, Special Issue on Avionics Systems, Vol. 30, No. 9, September 2015.
  32. D. Arnold, Q. Gui, Y. Chen, and Z. Jin, "Data Imputation in Patient Monitoring: An Exploration of Significance of Patient Demographics," the International Journal of Intelligent Information Processing (IJIIP), Vol. 5, No.3, 2015.
  33. Z. Jin and Y. Chen, "Telemedicine in Cloud Era: Prospect and Challenges," IEEE Pervasive Computing, January - March Issue, 2015.
  34. A. Carpenter and Y. Chen, "Hardware Security in the Dark," Special Issue on Information and System Security, International Journal of Software and Informatics (IJSI), Vol. 8, No. 2, 2014.
  35. A. Dolgikh, Z. Birnbaum, B. Liu, Y. Chen, and V. Skormin, " Cloud Security Auditing based on Behavioral Modeling," International Journal of Business Process Integration and Management, Vol. 7, No. 2, 2014.
  36. B. Liu, E. Blasch, Y. Chen, A. J. Aved, A. Hadiks, D. Shen, and G. Chen, "Information Fusion in Cloud Computing Era: A Systems-Level Perspective," IEEE Aerospace and Electronic Systems (AES) Magazine, Vol. 29, No. 10, pp.16-24, October 2014.
  37. X. Wang, Q. Gui, B. Liu, Z. Jin, and Y. Chen, "Enabling Smart Personalized Healthcare: a Hybrid Mobile-Cloud Approach for ECG Telemonitoring," IEEE Journal of Biomedical and Health Informatics (JBHI), Vol. 18, No. 3, May 2014.
  38. S. Tong, M. Tong, C. Twigg, Y. Chen, and O. Sadik, "Energy Efficient Control for Smart Wastewater Treatment Plants using Self-Powered Wireless Sensor Networks," Invited Paper, Sensor Letters, Special Issue on Wireless Sensor Networks Technologies and Applications for Smart Spaces, Vol. 11, 2013, pp. 1689-1694.
  39. H. Chen, T. Gaska, Y. Chen, and D. Summerville, "An Optimal Reconfigurable Power Spectral Density Converter for Real-Time Shrew DDoS Attacks Detection," Computers and Electrical Engineering, Elsevier, Vol. 39, Issue 2, Feb. 2013.
  40. J. Feng, Y. Chen, and D. Summerville, "A Survey on the Application of the XOR Erasure Code for Distributed Storage System," International Journal of Information, Intelligence and Knowledge, Vol.4, No. 2, 2012.
  41. J. Feng and Y. Chen, "A Fair Non-Repudiation Framework for Data Integrity in Cloud Storage Services," International Journal of Cloud Computing, Vol. 1, No. 4, 2012.
  42. H. Chen, Y. Chen, and D. Summerville, "A Survey on the Application of FPGAs for Network Infrastructure Security," the IEEE Communications Surveys and Tutorial, Vol. 13, No. 4, 2011 (pdf).
  43. H. Hu, Y. Chen, W.-S. Ku, and Z. Su, "Weighted Trust Evaluation Based Malicious Node Detection for Wireless Sensor Networks", International Journal of Information and Computer Security, special issue on Simulation of System Security, Vol. 3, No. 2, 2009.
  44. Y. Chen and H. Chen, "NeuroNet: An Adaptive Infrastructure for Network Security," International Journal of Information, Intelligence and Knowledge, Vol.1, No.2, 2009 (Link).
  45. W.-S. Ku, Y. Chen, and R. Zimmermann, "Privacy Protected Spatial Query Processing for Advanced Location Based Services", Journal of Wireless Personal Communications, special issue on Information Security and Data Protection in Future Generation Communication and Networking, Vol. 47, October 2008 (Link).
  46. Y. Chen, K. Hwang, and W.-S. Ku, "Collaborative Detection of DDoS Attacks over Multiple Network Domains," IEEE Transactions on Parallel and Distributed Systems, Vol. 18, No. 12, December 2007 (pdf).
  47. Y. Chen and K. Hwang, "Collaborative Detection and Filtering of Shrew DDoS Attacks using Spectral Analysis," Journal of Parallel and Distributed Computing, Special Issue on Security in Grids and Distributed Systems, Vol. 66, Issue 9, September 2006 (pdf).
  48. K. Hwang, M. Cai, Y.-K. Kwok, S. Song, Yu Chen, and Ying Chen, "DHT-based Security Infrastructure for Trusted Internet and Grid Computing," International Journal on Critical Infrastructures, December 2006 (pdf).
  49. M. Cai, K. Hwang, Y.-K. Kwok, S. Song, and Y. Chen, "Collaborative Internet Worm Containment," IEEE Security and Privacy Magazine, May/June 2005 (pdf).
  50. J. Thalken, Y. Chen, A.F.J. Levi, and S. Haas, "Adaptive Quantum Design of Atomic Clusters," Physical Review B, 69, 195410, 2004 (pdf).
  51. Y. Chen, R. Yu, W. Li, O. Nohadani, S. Haas, and A.F.J. Levi, "Adaptive Design of Nanoscale Dielectric Structures for Photonics," Journal of Applied Physics, 94, 6065-6069, 2003 (pdf).

Peer Reviewed Conference/Workshop Papers:

  1. R. Xu, S. Nikouei, Y. Chen, S. Song, A. Polunchenko, C. Deng, and T. Faughnan, "Real-Time Human Object Tracking for Smart Surveillance at The Edge," the IEEE International Conference on Communications, Selected Areas in Communications Symposium Smart Cities Track (ICC SmartCities 2018), Kansas City, MO, USA, May 20-24, 2018.
  2. Z. Yang, N. Chen, Y. Chen, and N. Zhou, "A Novel PMU Fog based Early Anomaly Detection for an Ef?cient Wide Area PMU Network," the 2nd IEEE International Conference on Fog and Edge Computing (ICFEC 2018), Washington DC, USA, May 1-4, 2018.
  3. R. Xu, Y. Chen, E. Blasch, and G. Chen, "A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)," the SPIE Defense & Commercial Sensing 2018 (DCS), Conference on Sensors and Systems for Space Applications, Orlando, FL, USA, April 15-19, 2018.
  4. J. Lu, N. Chen, X. Xiang, D. Shen, G. Chen, E. Blasch, K. Pham, and Y. Chen, "Artificial Intelligence based Directional Mesh Network Design for Spectrum Efficiency," the 39th IEEE Aerospace Conference, Big Sky, Montana, USA, March 3-10, 2018.
  5. N. Chen, Y. Chen, E. Blasch, H. Ling, Y. You, and X. Ye, "Enabling Smart Urban Surveillance at The Edge," the Second IEEE International Conference on Smart Cloud (SmartCloud 2017), New York, NY, USA, November 3-5, 2017.
  6. N. Alkassab, C.-T. Huang, Y. Chen, B.-Y. Choi, and S. Song, "Benefits and Schemes of Prefetching from Cloud to Fog Networks," the IEEE 6th International Conference on Cloud Networking (CloudNet 2017), Prague, Czech Republic, September 25-27, 2017.
  7. Z. Yang, M. Ghorbaniparvar, N. Zhou, and Y. Chen, "Enhancing Sustained Oscillation Detection by Data Pre-Processing Using SSA," the 49th North American Power Symposium (NAPS 2017), Morgantown, WV, USA, Sept. 17-19, 2017.
  8. Q. Dong, Z. Yang, Y. Chen, X. Li, and K. Zeng, "Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis," the 7th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2017), Warsaw, Poland, August 28-30, 2017. [Best Paper Award]
  9. T. Gao, F. Li, Y. Chen, and X. Zou, "Preserving Local Differential Privacy in Online Social Networks," the 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2017), Guilin, China, June 19-21, 2017.
  10. T. Gaska, Y. Chen, D. Summerville, and M. Gaska, "Model based Design for Advanced Integrated Modular Avionics - Focus and Challenges," the 73rd AHS International Annual Forum, Fort Worth, TX, USA, May 9-11, 2017.
  11. H. Gebre-Amlak, S. Lee, A. M. A. Jabbari, Y. Chen, B.-Y. Choi, C.-T. Huang, and S. Song, "MIST: Mobility-Inspired SofTware-Defined Fog System," the 2017 International Conference on Consumer Electronics (ICCE), Cloud Computing Track, Las Vegas, NV, USA, January 8 - 11, 2017.
  12. M. Dabaghchian, S. Liu, A. Alipour-Fanid, K. Zeng, X. Li, and Y. Chen, "Intelligence Measure of Cognitive Radio with Learning Capabilities," the IEEE GlobeCom 2016 - Symposium on Cognitive Radio and Networks, Washington, DC, USA, Dec. 4-8, 2016.
  13. P. Huang, B. Li, L. Guo, Z, Jin, and Y. Chen, "A Robust and Reusable ECG-based Authentication and Data Encryption Scheme for eHealth System," the IEEE GlobeCom 2016 - Symposium on Communication & Information System Security, Washington, DC, USA, Dec. 4-8, 2016.
  14. N. Chen, Y. Chen, S. Song, C. Huang, and X. Ye, "Smart Urban Surveillance using Fog Computing," the First IEEE/ACM Symposium on Edge Computing (SEC 2016), Poster, Washington DC, USA, Oct. 27-28, 2016.
  15. T. Gaska, Y. Chen, and D. Summerville, "Leveraging Driverless Car Investment in Next Generation Avionics IMA," the 35th IEEE Digital Avionics Systems Conference (DASC 2016), Sacramento, CA, USA, Sept. 25-29, 2016.
  16. B. Poland and Y. Chen, "AUSA Sensing and Commercial UAS Technology Trends," the Military Sensing Symposium, Washington, DC, USA, June 20-24, 2016.
  17. N. Chen, Y. Chen, Y. You, H. Ling, P. Liang, and R. Zimmermann, "Dynamic Urban Surveillance Video Stream Processing using Fog Computing," the 2nd IEEE International Conference on Multimedia Big Data (BigMM 2016), Invited paper, Taipei, Taiwan, April 20-22, 2016.
  18. Y. Chen, E. Blasch, N. Chen, A. Deng, H. Ling, and G. Chen, "Real-Time WAMI Streaming Target Tracking in Fog," the 2016 SPIE Defense, Security, and Sensing (DSS), Baltimore, Maryland, USA, April 17 - 21, 2016.
  19. B. Liu, Y. Lin, and Y. Chen, "A Quantitative Workload Analysis of Google Cluster Traces," the 1st IEEE Workshop on Big Data Sciences, technologies, and Applications (BDSTA 2016), in conjunction with IEEE INFOCOM, San Francisco, CA, USA, April 11, 2016.
  20. X. Li, Y. Chen, and K. Zeng, "Integration of Machine Learning and Human Learning for Training Optimization in Robust Linear Regression," the 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, China, March 2016.
  21. D. Summerville, K. Zach, and Y. Chen, "Ultra-Lightweight Deep Packet Anomaly Detection for Internet of Things Devices," the 34th IEEE International Performance Computing and Communications Conference (IPCCC), Nanjing, China, Dec. 14-16, 2015.
  22. Z. Yang, N. Zhou, A. S. Polunchenko, and Y. Chen, "Quick Online Detection of Start Time of Disturbance in Power Grid," the IEEE GlobeCom 2015 - Selected Areas in Communications Symposium: Smart Grid Communications Track, San Diego, CA, USA, Dec. 6-10, 2015.
  23. B. Poland, Y. Chen, and J. Powell, "Performance Comparison Experiment of Optimized TCP via Emulation and Live Flight on SUAS," the 34th IEEE Military Communication Conference (Milcom 2015), Tampa, FL, USA, Oct. 26 - 28, 2015.
  24. Wu, B. Liu, Y. Chen, E. Blasch, H. Ling, and G. Chen, "Pseudo-Real-Time Wide Area Motion Imagery (WAMI) Processing for Dynamic Feature Detection," The International Conference on Information Fusion (Fusion 2015) - Special Session on Dynamic Data Driven Application Systems for Sensor Data Problems, Washington DC, USA, July 6-9, 2015.
  25. R. Wu, A. Deng, Y. Chen, E. Blasch, and B. Liu, "Cloud Technology Applications for Area Surveillances," the 2015 National Aerospace & Electronics Conference (NAECON 15), Dayton, OH., USA, June 16 - 18, 2015.
  26. Q. Dong, Y. Chen, and S. Towfighian, "MEGA: an Energy Aware Algorithm for Self-Powered Wireless Sensor Networks in Sustainable Smart Infrastructure," the 2nd Workshop on Green Broadband Access: Energy Efficient Wireless and Wired Network Solutions - IEEE GlobeCom 2014, Austin, Texas, USA, Dec. 12, 2014.
  27. R. Wu, Y. Chen, E. Blasch, B. Liu, and G. Chen, "A Container-Based Elastic Information Fusion Cloud Architecture for Real-Time Full-Motion Video (FMV) Target Tracking," the 2014 IEEE Applied Imagery Pattern Recognition (AIPR) workshop, Washington DC, USA, October 14-16, 2014. [Best Student Poster Award]
  28. B. Poland, Y. Chen, M. Muccio, and D. Hague, "Context Aware TCP for Intelligence, Surveillance and Reconnaissance Mission on Autonomous Platforms," the Military Communications Conference (MILCOM), Baltimore, MD, USA, October 6-8, 2014.
  29. B. Liu,Y. Chen, D. Shen, G. Chen, K. Pham, E. Blasch, and B. Rubin, "An Adaptive Process based Cloud Infrastructure for Space Situational Awareness Applications," the 2014 SPIE Defense, Security, and Sensing (DSS), Baltimore, Maryland, USA, May 5 - May 9, 2014.
  30. A. Hadiks, Y. Chen, F. Li, and B. Liu, "A Study of Stealthy Denial-of-Service Attacks in Wi-Fi Direct Device-to-Device Networks," the 11th Annual IEEE Consumer Communication & Networking Conference, Work-in-Progress (CCNC 2014, WiP), Las Vegas, NV, USA, Jan. 10 - 13, 2014 (pdf).
  31. J. Hubbard, K. Weimer, and Y. Chen, "A Study of SSL Proxy Attacks on Android and iOS Mobile Applications," the 11th Annual IEEE Consumer Communication & Networking Conference (CCNC 2014), Las Vegas, NV, USA, Jan. 10 - 13, 2014 (pdf).
  32. R. Golatkar, Y. Chen, and W.-S. Ku, "LAVI: A Location Aware Virtual Infrastructure for VANETs," the 2nd International Conference on Connected Vehicles & Expo. (ICCVE 2013), Las Vegas, NV, USA, Dec. 2 - 6, 2013 (pdf).
  33. B. Liu, E. Blasch, Y. Chen, D. Shen, and G. Chen, "Scalable Sentiment Classification for Big Data Analysis Using Naive Bayes Classifier," Workshop on Scalable Machine Learning: Theory and Applications, in conjunction with the 2013 IEEE International Conference on Big Data (IEEE Big Data 2013), Santa Clara, CA, USA, October 6-9, 2013 (pdf).
  34. Q. Gui, B. Liu, X. Wang, Z. Jin, and Y. Chen, "Finding Needles in a Haystack: Reducing False Alarm Rate Using Telemedicine Mobile Cloud," the First Workshop on Mobile Cloud Computing in Healthcare (WMCCH), held in conjunction with IEEE International Conference on Healthcare Informatics (ICHI 2013), Philadelphia, USA, Sept. 9-11, 2013 (pdf).
  35. B. Liu, Y. Chen, D. Shen, G. Chen, E. Blasch, and Khanh Pham, "A Holistic Cloud-Enabled Robotics System for Real-Time Video Tracking Application," the International Workshop on Cloud Enhanced Information Fusion (CloudFusion 2013), in conjunction with 8th FutureTech Conference, Gwangju, Korea, September 4-6, 2013 (pdf).
  36. Z. Birnbaum, B. Liu, A. Dolgikh, Y. Chen, and V. Skormin, " Cloud Security Auditing based on Behavioral Modeling," the IEEE 2013 First International Workshop on Cloud Security Auditing (CSAW), Santa Clara Marriott, CA, USA, June 27 - July 2, 2013(pdf).
  37. A. Dolgikh, Z. Birnbaum, Y. Chen, and V. Skormin, "Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments," the 2013 International Workshop on Mobile Cloud Computing: Data, Management & Security (mCloud), in conjunction with the 14th IEEE International Conference on Mobile Data Management (IEEE MDM 2013), Milan, Italy, June 3 - 6, 2013 (pdf).
  38. B. Liu, Y. Chen, D. Shen, G. Chen, K. Pham, and E. Blasch, "A Cloud-based Space Situational Awareness: Initial Design and Evaluation," the 2013 SPIE Defense, Security, and Sensing (DSS), Baltimore, Maryland, USA, April 29 - May 3, 2013 (pdf).
  39. H. Chen, Y. Chen, D. H. Summerville, and Z. Su, "An Optimized Design of Reconfigurable PSD Accelerator for Online Shrew DDoS Attacks Detection," the 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 14 - 19, 2013 (pdf).
  40. X. Wang, Q. Gui, B. Liu, Y. Chen, and Z. Jin, "Leveraging Mobile Cloud for Telemedicine: A Performance Study in Medical Monitoring," the 39th Annual Northeast Bioengineering Conference, Syracuse, NY, April 5 - 7, 2013 (pdf).
  41. R. I. Ledesma Goyzueta and Y. Chen, "A Deterministic Loss Model based Analysis of CUBIC," the International Conference on Computing, Networking and Communications, Communication QoS and System Modeling Symposium (ICNC 13 - CQSM), San Diego, CA, USA, January 28 - 31, 2013 (pdf).
  42. B. Kerrigan and Y. Chen, "A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts," the 6th International Conference on Mathematical Methods, Models, and Architecture for Computer Network Security (MMM-ACNS-2012), St. Petersburg, Russia, October 17-20, 2012 (pdf).
  43. J. Feng, Y. Chen, D. Summerville, and Z. Su, "An Extension of RDP Code with Parallel Decoding Procedure," the 9th IEEE Consumer Communications and Networking Conference (CCNC 2012), Las Vegas, NV, USA, Jan. 14 - 17, 2012 (pdf).
  44. M. Xiang, Y. Chen, W.-S. Ku, and Z. Su, "Mitigating DDoS Attacks using Protection Nodes in Mobile Ad hoc Networks," the IEEE GlobeCom 2011- Communication & System Security Symposium, Huston, Texas, USA, Dec. 5 - 9, 2011 (pdf).
  45. Z. Su, P. Ren, and Y. Chen, "Consistency Control to Manage Dynamic Contents over Vehicular Communication Networks," the IEEE GlobeCom 2011- Communications QoS. Reliability, and Modeling Symposium, Huston, Texas, USA, Dec. 5 - 9, 2011 (pdf).
  46. S. Mazur, E. Blasch, Y. Chen, and V. Skormin, "Mitigating Cloud Computing Security using a Self-Monitoring Defense Scheme," the 2011 National Aerospace & Electronics Conference (NAECON 11), Dayton, OH., USA, July 20 - 22, 2011 (pdf).
  47. J. Feng, Y. Chen, and D. Summerville, "A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds," the 2011 International Conference on Collaboration Technologies and Systems (CTS 2011), Philadelphia, PA., USA, May 23 - 27, 2011 (pdf).
  48. Y. Chen, C. Twigg, O. Sadik, and S. Tong, "A Self-Powered Adaptive Wireless Sensor Network for Wastewater Treatment Plants", Work-in-Progress Workshop at the 9th Annual IEEE Conference on Pervasive Computing and Communications (PerCom 2011), Seattle, USA, March 21 - 25, 2011 (pdf).
  49. J. Feng, Y. Chen, D. Summerville, W.-S. Ku, and Z. Su, "Enhancing Cloud Storage Security against Roll-back Attacks with a New Fair Multi-Party Non-Repudiation Protocol", the 8th IEEE Consumer Communications and Networking Conference - Work-in-Progress Session (CCNC 11), Las Vegas, Nevada, USA, January 9 - 12, 2011 (pdf).
  50. Y. Chen, C.-J. Wang, W.-S. Ku, and Z. Su, "A Location Aware Virtual Infrastructure for VANETs", the 8th IEEE Consumer Communications and Networking Conference - Work-in-Progress Session (CCNC 11), Las Vegas, Nevada, USA, January 9 - 12, 2011 (pdf).
  51. H. Chen and Y. Chen, "A Comparison Study of Collaborative Strategies for Distributed Defense against Internet Worms based on Small-World Modeling," the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, Illinois, USA, Oct. 9 - 12, 2010 (pdf).
  52. J. Feng, Y. Chen, W.-S. Ku, and P. Liu, "Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms," the 2nd International Workshop on Security in Cloud Computing (SCC 2010), held in conjunction with the 39th International Conference on Parallel Processing (ICPP 2010), San Diego, California, USA, Sept. 13, 2010 (pdf).
  53. J. Feng, Y. Chen, W.-S. Ku, and Z. Su, "D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-of-order keystream Generation", the 2010 IEEE International Conference on Communications - Communication and Information System Security Symposium (ICC'10 CISS), Cape Town, South Africa, May 23 - 27, 2010 (pdf).
  54. J. Feng, Y. Chen, D. Summerville, "EEO: an Efficient MDS-like RAID-6 Code for Parallel Implementation," the 33rd IEEE Sarnoff Symposium, Apr. 12-14, 2010, Princeton, NJ, USA (pdf).
  55. P. Gasti and Y. Chen, "Breaking and Fixing the Self-Encryption Scheme for Data Security in Mobile Devices", the 18th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2010) - Special Session "Security in Networked and Distributed Systems" (SNDS 2010), Pisa, Italy, February 17 - 19, 2010 (pdf).
  56. J. Feng, Y. Chen, and P. Liu, "Bridging the Missing Link of Cloud Data Storage Security in AWS", the 7th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC 10, Short Position Paper), Las Vegas, Nevada, USA, January 9 - 12, 2010 (pdf).
  57. Y. Chen, W.-S. Ku, K. Sakai, and C. DeCruze, "A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages", the 7th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC 10), Las Vegas, Nevada, USA, January 9 - 12, 2010 (pdf).
  58. H. Chen, D. Summerville, and Y. Chen, "Two-Stage Decomposition of SNORT Rules towards Efficient Hardware Implementation," the 7th International Workshop on Design of Reliable Communication Networks (DRCN 2009), Washington, D.C., USA, October 25 - 28, 2009 (pdf).
  59. Z. Su, Z. Zhang, and Y. Chen, "Performance Evaluation of a Novel Caching Algorithm for Scalable Image Contents," the 2nd International Symposium on Intelligent Informatics (ISII 2009), Qinhuangdao, China, September 13 - 15, 2009.
  60. I. Atakli, Y. Chen, Q. Wu, and S. Craver, "BLINK: Pixel-Domain Encryption for Secure Document Management", the 11th ACM Workshop on Multimedia and Security (MMSEC 2009), Princeton, New Jersey, USA, September 7 - 8, 2009 (pdf).
  61. Y. Chen and W.-S. Ku, "Self-Encryption Scheme for Data Security in Mobile Devices", the 6th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC 09), Las Vegas, Nevada, USA, January 10 - 13, 2009 (pdf).
  62. S. Craver, Y. Chen, H. Chen, J. Yu, and I. M. Atakli, "BLINK: Securing Information to the Last Connection", the 6th IEEE Consumer Communications and Networking Conference (CCNC 09 Short Paper), Las Vegas, Nevada, USA, January 10 - 13, 2009 (pdf).
  63. Z. Su, J. Katto, Y. Yasuda, and Y. Chen, "Consistency Control for Dynamic Contents in Mobile Overlay Network," the 3rd International Conference on Communications and Networking in China (ChinaCom 08), Hangzhou, China, August 25 - 27, 2008 (pdf). [Best Paper Award]
  64. Z. Su, Z. Zhang, and Y. Chen, "Retrieve Scalable Image Contents over Image Contents Network by Efficient Caching Algorithms," the 3rd International Conference of Innovative Computing, Information and Control (ICICIC 2008), Dalian, China, June 18 - 20, 2008.
  65. H. Chen and Y. Chen, "A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks," the 2008 IEEE International Conference on Networking, Architecture, and Storage (NAS 08), Chongqing, China, June 12 - 14, 2008 (pdf).
  66. Y. Chen, J. Bao, W.-S. Ku, and J.-L. Huang, "Cache Management Techniques for Privacy Protected Location-based Services," the 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS'08), in conjunction with the 9th International Conference on Mobile Data Management (MDM 08), Beijing, China, April 27, 2008(pdf).
  67. I. Atakli, H. Hu, Y. Chen, W.-S. Ku, and Z. Su, "Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation," the ACM/SIGSIM Symposium on Simulation of System Security (SSSS'08), Ottawa, Canada, April 14-17, 2008 (pdf).
  68. Y. Chen, "NeuroNet: Towards an Intelligent Internet Infrastructure," the 5th IEEE Consumer Communications and Networking Conference (CCNC'08), Las Vegas, NV, January 10-12, 2008 (pdf).
  69. Y. Chen, W.-S. Ku, and K. Hwang, "Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed," DETER Community Workshop on Cyber Security Experimentation and Test, in conjunction with USENIX Security Symposium (Security 07), Boston, MA, August 6-7, 2007 (pdf).
  70. Y. Chen and K. Hwang, "Spectral Analysis of TCP Flows for Defense against Reduction-of-Quality Attacks," the 2007 IEEE International Conference on Communications (ICC'07), Glasgow, Scotland, June 24-28, 2007 (pdf).
  71. Y. Chen and K. Hwang, "Collaborative Change Detection of DDoS Attacks on Community and ISP Networks," the IEEE International Symposium on Collaborative Technologies and Systems (CTS'06), Las Vegas, NV., USA, May 15-17, 2006 (pdf).
  72. Y. Chen, K. Hwang, and Y.-K. Kwok, "Filtering of Shrew DDoS Attacks in Frequency Domain," the First IEEE LCN Workshop on Network Security (WoNS), held in conjunction with the 30th Annual IEEE Conference of Local Computer Networks (LCN 2005), Sydney, Australia, Nov. 15-17, 2005 (pdf).
  73. Y.-K. Kwok, R. Tripathi, Y. Chen, and K. Hwang, "HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DoS Attacks," the 2005 International Conference on Computer Networks and Mobile Computing (ICCNMC'05), Zhangjiajie, China, Aug. 2-4, 2005 (pdf).
  74. Y. Chen, Y.-K. Kwok, and K. Hwang, "MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks," in Proceedings of the 2nd International Workshop on Security in Distributed Computing Systems (SDCS'05), in conjunction with ICDCS 2005, Columbus, OH., USA, June 6-10, 2005 (pdf).
  75. K. Hwang, Y.-K. Kwok, S. Song, M. Cai, Yu Chen, R. Zhou, Ying Chen, and X. Lou, "GridSec: Trusted Grid Computing with Security Binding and Self-Defense against Network Worms and DDoS Attacks," in Proceedings of International Workshop on Grid Computing Security and Resource Management (GSRM-2005), in conjunction with the ICCS-2005. Atlanta, GA. May 22-24, 2005 (pdf).

Selected Other Publications:

  1. A. A. Cardenas, Y. Chen, A. Fuchs, W. Van Ginkel, D. Hiestand, S. Jani, A. Lane, R. Lu, P. K. Manadhata, J. Molina, P. Murthy, A. Roy, S. Sathyadevan, P. S. Subrahmanyam, and N. Sundaresan, "Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy," Cloud Security Alliance (CSA), Aug. 2016, edited by D. Mashima and S. P. Rajan, available at https://cloudsecurityalliance.org/download/big-data-security-and-privacy-handbook/.
  2. A. Bardhan, Y. Chen, A. Fuchs, A. Kapre, A. Lane, R. Lu, P. Manadhata, J. Molina, A. C. Mora, P. Murthy, A. Roy, S. Sathyadevan, and N. Shah, "Top Ten Big Data Security and Privacy Challenges," Cloud Security Alliance (CSA) Annual Congress 2012, Orlando, FL, USA, Nov. 7, 2012, organized by S. P. Rajan, W. van Ginkel, and N. Sundaresan, available at https://cloudsecurityalliance.org/download/expanded-top-ten-big-data-security-and-privacy-challenges/.
  3. Y. Chen, X. Zhong, S. Xiao, K. Li, "A MEMS CAD System Based on CORBA," International Symposium on Smart Structures and Microsystems (IS3M 2000), Hong Kong, OCt. 19-21, 2000.
  4. K. Li, X. Zhong, and Y. Chen, "Design for Micro Diffractive Lens for Imaging," International Symposium on Smart Structures and Microsystems (IS3M 2000), Hong Kong, OCt. 19-21, 2000.
  5. Y. Chen, X. Zhong, and K. Li, "A Distributed MEMS CAD Based on 3-Tier Structure," Journal of Micro-Nanometer Science & Technology, Vol. 5, No. 1, 2000, pp 78-81. (Chinese)
  6. K. Li, X. Zhong, and Y. Chen, "Compensation Network for Multiple Intensity Modulated Optical Fiber Sensors," International Conference on Sensors and Control Techniques (ICSC 2000), Wuhan, China, May 2000.
  7. Y. Chen, X. Zhong, and K. Li, "A Survey of Research Achievement of MEMS CAD," Journal of Optics and Precision Engineering, Vol. 17, No. 6, 1999, pp 1-5. (Chinese)
  8. Y. Chen, X. Zhong, D. Xu, and K. Li, "Micro-Mechanical Array Filter," Journal of Scientific Instrument, Vol. 20, No. 4, 1999, pp 200-203. (Chinese)
  9. K. Li, X. Zhong, and Y. Chen, "Status of Microsystem Technology in Blood Cell Detection and its Perspective," Journal of Scientific Instrument, Vol. 20, No. 4, 1999, pp 176-179. (Chinese)
  10. S. Xiao, X. Zhong, Y. Chen, and X. Miu, "Study on an Image Measurement for Irregular Rotary Objects," Journal of Optics and Precision Engineering, Vol. 15, No. 4, 1997, pp 99-103. (Chinese)
  11. G. Liu, X. Zhong, K. Li, and Y. Chen, "Characteristic Study of Light Intensity Modulation Methods for Fiber-Optic Vibration Sensor and Cantilaver," Journal of Transducer Technology, No. 3, 1995, pp 20-23. (Chinese)

Technical Presentations:

  1. the AFCEA Cyber and Information Challenges Conference, Marcy, NY, USA., June 2012.
  2. EITC'2011, Chicago, Illinois, USA, July 28-29, 2011.
  3. CCNC 10, Las Vegas, NV, January 2010
  4. DRCN'09, Washington DC, October 2009
  5. CCNC 09, Las Vegas, NV, January 2009
  6. IEEE NAS 08, Chongqing, China, June 2008
  7. SSSS 08, Ottawa, Canada, April 2008
  8. CCNC 08, Las Vegas, NV, January 2008
  9. DETER 07, Boston, MA, August 2007
  10. IEEE ICC 2007, Glasgow, Scotland, June 2007
  11. IEEE CTS 06, Las Vegas, NV, May 2006
  12. IEEE SDCS 2005, Columbus, OH, USA, June 2005
  13. SPIE Annual Meeting, Denver, CO, USA, August 2004
  
Graduated Alumni & First Employments:

PhD:

  • Seyed Yahya Nikouei, Ph.D. 2020, Kar Global, Chicago, IL.
  • Zekun Yang, Ph.D. 2019, Ping An Insurance US, San Francisco, CA.
  • Qi Dong, Ph.D. 2018, ByteDance, Beijing, China.
  • Bingwei Liu, Ph.D. 2015, Aetna Inc. Hartford, CT.
  • Hao Chen, Ph.D. 2015, Wenzhou University, Wenzhou, China.
  • Jun Feng, Ph.D. 2012, SK Hynix Memory Solution Inc. San Jose, CA.

    Masters:

  • Yang Huang, MSEE, 2013, Technician(T01),McFarland-Johnson, Inc., Binghamton, New York.
  • Tianruo Hu, MSEE, 2013, Logic Design Engineer, Marvell Semiconductor Inc. Santa Clara, California.
  • Mao Lin, MSEE, 2013, Microchip Technology Inc. Hauppauge, New York.
  • Alex Hoang, MSEE, 2013, Test Process Lead, Seagate, Longmont, Colorado.
  • Brendan Kerrigan, MSEE, 2012, Associate Computer Engineer, Assured Information Security Inc. Rome, New York.
  • Ken J. Chen, MSEE, 2012, zFirmware Engineer, IBM, Poughkeepsie, New York.
  • Eric Norris, MSEE, May 2012, Technical Consulting, New York City.
  • Rohan B. Golatkar, MSEE, 2011, Software Engineer, Rockwell Collins, Iowa.
  • Sushant Agrawal, MSEE, 2011, Software Test Engineer, Siemens Medical Solutions, Chicago, Illinois.
  • Christopher Hui, MSEE, 2011, IBM, California.
  • Robert Leiss, MSEE, 2011, Software Engineer, Rockwell Collins, Binghamton, New York.
  • Sean Xu, MSEE, 2011, BAE, Binghamton, New York.
  • Ziyad Rouhana, MSEE, 2011, Test Engineer, Diamond Visionics, Ithaca, New York .
  • Minda Xiang, MSEE, 2010, Localization Engineer, TransPerfect Translations, New York.
  • Jim Mash, MSEE, 2010, IT/Engineer, Telephonics Corporation, Long Island, New York.
  • Krunal G. Shah, MSEE, 2010, Sr. Business Analyst, CGI, Washington D.C.
  • Prerna Lele, MSEE, 2010, Intern, Siemens Healthcare, USA.
  • Jonah Roth, MEng, 2009, Defense & Aerospace Professional, Washington D.C.
  • Bharti Dadhich, MSEE, 2008, Systems Analyst, Siemens Medical, Malvern, PA.
  •   
    Professional Activities:

    Memberships:

  • ACM
  • IEEE, Computer Societym, Communication Society (Vice Chair, Binghamton Chapter, 2009 ~ present)
  • SPIE (International Society for Optics Engineering)

    Journal Editorial Board Memberships:

  • Associate Editor, the International Journal of Intelligent Information Processing (IJIIP)
  • Editorial Board Member, the International Journal of Computer Networks (IJCN)
  • Editorial Board Member, the International Journal on Adaptive Infrastructures (IJAIS)
  • Editorial Board Member, Journal of Universal Computer Science, Special Issue on Data Security and Privacy Protection in Pervasive Computing Environments, 2008

    Conference/Workshop Organizer:

  • The International Workshop on Advanced Technologies of Cloud Computing (WATCC 2013), Lyon, France, October 04, 2013.
  • The 8th FTRA International Conference on Future Information Technology (FutureTech 2013), Gwangju, Korea, September 4-6, 2013.
  • The 4th International Workshop on Security in Cloud Computing (CloudSec 2012), Pittsburgh, PA. USA, September 12, 2012.
  • The 2012 FTRA International Conference on Mobile, Ubiqitous and Intelligent Computing (MUSIC 2012), Vancouver, Canada, June 26 - 28, 2012.
  • The 3rd International Workshop on Security in Cloud Computing (CloudSec'2011), Taipei, Taiwan, Sept. 13-16, 2011.
  • The 2nd International Workshop on Security in Cloud Computing (SCC'2010), San Diego, CA, USA, Sept. 14, 2010.
  • IEEE WCNIS2010 Communication and Information Security Symposium, Beijing, China, June 25-27, 2010.
  • The International Workshop on Security in Cloud Computing (SCC'09), Chengdu, China, Dec. 12, 2009.
  • The 2009 International Workshop on Secure Multimedia Communication and Services (SECMCS 09), Wuhan, China, Nov. 18, 2009.
  • The 2009 International Conference on Multimedia Information NEtworking and Security (MINES 2009),Wuhan, China, Nov. 18-29, 2009.
  • ChinaCom'08 Workshop on MUltimedia Security In Communications (MUSIC'08), Hangzhou, China, Aug. 28, 2008.

    Conference/Workshop Chairs:

  • TPC Chair, CloudSec 2011.
  • Publicity Chair, F2GC 2010, F2GC 2011.
  • TPC Chair, SCC 2010.
  • Symposium Co-Chair, IEEE WCNIS2010 "Communication and Information Security Symposium".
  • Publicity Chair, MINES 2010.
  • Session Chair, IEEE CCNC 2010
  • General Chair, SCC 09.
  • Publicity Chair, SECMCS 09.
  • Publicity Chair, MINES 09.
  • Session Chair, IEEE CCNC 09
  • TPC Chair, MUSIC 08.
  • Session Chair, IEEE NAS 08
  • Session Chair, SCS & ACM/SIGSIM SSSS 08
  • Session Chair for FP1-S6 Security for Consumer Applications, IEEE CCNC 08

    Conference Technical Program Committee Memberships:

  • IEEE International Conference on Communications 2011, Communication and Information Systems Security Symposium (ICC 2011, CISS)
  • The ACM/SIGSIM/SCS 44nd Annual Simulation Symposium (ANSS 2011)
  • The 5th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011)
  • The Annual International Conference on Mobile Communications, Networking and Applications 2011 (MobiCONA 2011)
  • The 9th ACS/IEEE International Conference on Computer Systems and Applications (ICCSA 2011)
  • The 2011 International Conference on Communications and Mobile Computing (CMC 2011)
  • International Conference on Utility and Cloud Computing (UCC 2010)
  • the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2010)
  • IEEE International Conference on Communications 2010, Wireless and Mobile Networking Symposium (ICC 10, WNS)
  • IEEE GLOBECOM 2010 Communications & Information Systems Security Symposium (GC 10 CISS)
  • IEEE GLOBECOM 2010 Ad-hoc and Sensor Networking Symposium (GC 10 AHSN)
  • The 12th IEEE International Conference on High Performance Computing and Communications (HPCC 2010)
  • The 6th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010)
  • The 6th IEEE International Workshop on Wireless and Sensor Network Security (WSNS 2010)
  • The 7th IEEE Consumer Communications and Networking Conference, Track of Security for Consumer Electronic Communications (CCNC 2010)
  • The 4th International Workshop on Localized Algorithms and Protocols for Wireless Sensor Networks (LOCALGOS 2010)
  • The 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-2010)
  • The 2nd IEEE Workshop on Grid and P2P Systems and Applications (ICCCN 2010 - GridPeer 2010)
  • The 2010 International Workshop on Secure Multimedia Communication and Services (SECMCS2010)
  • CHINACOM 2010: Wireless Communications and Networking Symposium (CHINACOM 2010 WCN)
  • The FTRG 2010 International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-10)
  • The 2010 International Conference on Communications and Mobile Computing (CMC 2010)
  • The 7th European Conference on Wireless Sensor Networks (EWSN 2010)
  • The ACM/SIGSIM/SCS 43nd Annual Simulation Symposium (ANSS 2010)
  • The 2nd IEEE International Workshop on Information and Data Assurance (WIDA 09)
  • The FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09)
  • The 2nd IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPri_WiMob 2009)
  • IEEE International Conference on Communications 2009, Communication and Information Systems Security Symposium (ICC 09, CISS)
  • IEEE International Conference on Communications 2009, Wireless Network Symposium (ICC 09, WN)
  • IEEE Globecom 2009 Communication and Information Security Symposium (GC 09 CISS)
  • IEEE Conference on the Current Trends in Information Technology (CTIT2009)
  • IEEE Workshop on Grid and P2P Systems and Applications (GridPeer 2009, held with the 18th ICCCN, 2009)
  • The 6th IEEE Consumer Communications and Networking Conference, Track of Security for Consumer Electronic Communications (CCNC 09)
  • The 5th IEEE International Workshop on Wireless and Sensor Network Security (WSNS 09)
  • IEEE Workshop on Web Privacy and Trust, held with IEEE/WIC/ACM International Conference on Web Intelligence, 2009
  • The 3rd IFIP International Conference on New Technologies, Mobility and Security (NTMS 09)
  • The 4th International Symposium on Information Security (OTM IS 2009)
  • The 2009 IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-09)
  • The ACM/SIGSIM/SCS 42nd Annual Simulation Symposium (ANSS 09)
  • The Workshop on Advanced Wireless Broadband Networks (AWBN 09), held in conjunction with MobiQuitous 09
  • The 4th International Conference on Communications and Networking in China, Wireless Communication and Networking Symposium (ChinaCom2009 - WCN)
  • The International Conference on Security and Cryptography (SECRYPT 2009)
  • The 2009 International Conference on Frontier of Computer Science and technology (FCST 2009)
  • The 3rd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS 09)
  • The 2009 SCS Symposium on Simulation of System Security (SSSS 09)
  • The 1st International Conference on Network and Service Security (N2S 2009)
  • The 2009 International Conference on Communications and Mobile Computing (CMC 2009)
  • The 2nd IFIP International Conference on New Technologies, Mobility and Security (NTMS 08)
  • The 4th IEEE International Workshop on Wireless and Sensor Network Security (WSNS 08)
  • IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPri_WiMob 2008)
  • IEEE International Wireless Communications and Mobile Computing Conference 2008, Computer and Network Security Symposium, (IWCMC 08 CNS)
  • IEEE Globecom 2008 Computer and Communications Network Security Symposium (GC 08 CCNS)
  • IEEE International Conference on Communications 2008 (ICC 08)
  • The 5th IEEE Consumer Communications and Networking Conference, Theme 4 (CCNC 08 Theme 4)
  • Workshop on Radio Resource Management in Wireless Mesh Networks 2008 (RRMinMesh 08)

    Invited Reviewer:

  • IEEE Transactions on Wireless Communications
  • IEEE Transactions on Network and Service Management
  • IEEE Transactions on Parallel and Distributed Systems
  • IEEE Transactions on Mobile Computing
  • International Journal of Parallel and Distributed Computing, Elsevier
  • International Journal of Computer Communications, Elsevier
  • International Journal of Pervasive and Mobile Computing, Elsevier
  • International Journal of Grid Computing: Theory, Methods and Applications
  • International Journal of Computers & Electrical Engineering, Elsevier
  • International Journal of Future Generation Computer Systems, Elsevier
  • International Journal of Ad Hoc Networks, Elsevier
  • EURASIP Journal on Advances in Signal Processing
  • Book chapter review: Encyclopedia of Data Warehousing and Mining, 2nd Ed.,
  • IEEE 28th International Conference on Distributed Computing Systems, 2008 (ICDCS 08)
  • IEEE 14th International Symposium on High-Performance Computer Architecture, 2008 (HPCA 08)
  • IEEE Wireless Communications & Networking Conference 2006, 2007 (WCNC 06, 07)
  • ICC 2007 Computer and Communication Network Security Symposium (ICC2007)
  • The 4th European Conference on Wireless Sensor Networks 2007 (EWSN 2007)
  • The 2nd IEEE International Workshop on Security in Distributed Computing Systems (SDCS 2005)
  •