Items where City Author is "Chen, Tom"
Article
    Peng, A. Y., Liu, F. & Chen, T.  ORCID: 0000-0003-2450-277X  (2024).
    Co-constructing a gender-state entanglement in canonical Three Kingdoms fandom: A discourse-historical approach.
    Asian Studies Review, 48(2),
    
    
     pp. 410-429.
    doi: 10.1080/10357823.2023.2245130
ORCID: 0000-0003-2450-277X  (2024).
    Co-constructing a gender-state entanglement in canonical Three Kingdoms fandom: A discourse-historical approach.
    Asian Studies Review, 48(2),
    
    
     pp. 410-429.
    doi: 10.1080/10357823.2023.2245130
  
    Ghanem, M. C., Chen, T.  ORCID: 0000-0001-8037-1685 & Nepomuceno, E. G.  (2023).
    Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks.
    Journal of Intelligent Information Systems, 60(2),
    
    
     pp. 281-303.
    doi: 10.1007/s10844-022-00738-0
ORCID: 0000-0001-8037-1685 & Nepomuceno, E. G.  (2023).
    Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks.
    Journal of Intelligent Information Systems, 60(2),
    
    
     pp. 281-303.
    doi: 10.1007/s10844-022-00738-0
  
    Gong, P., Chen, T.  ORCID: 0000-0001-8037-1685, Xu, P.  & Chen, Q. (2022).
    DS-SWIPT: Secure Communication with Wireless Power Transfer for Internet of Things.
    Security and Communication Networks, 2022,
    pp. 1-11.
    
    
    doi: 10.1155/2022/2650474
ORCID: 0000-0001-8037-1685, Xu, P.  & Chen, Q. (2022).
    DS-SWIPT: Secure Communication with Wireless Power Transfer for Internet of Things.
    Security and Communication Networks, 2022,
    pp. 1-11.
    
    
    doi: 10.1155/2022/2650474
  
    Hwaidi, J. F. & Chen, T.  ORCID: 0000-0001-8037-1685 (2022).
    Classification of Motor Imagery EEG Signals Based on Deep Autoencoder and Convolutional Neural Network Approach.
    IEEE Access, 10,
    
    
     pp. 48071-48081.
    doi: 10.1109/access.2022.3171906
ORCID: 0000-0001-8037-1685 (2022).
    Classification of Motor Imagery EEG Signals Based on Deep Autoencoder and Convolutional Neural Network Approach.
    IEEE Access, 10,
    
    
     pp. 48071-48081.
    doi: 10.1109/access.2022.3171906
  
    Ghanem, M. & Chen, T.  ORCID: 0000-0001-8037-1685 (2020).
    Reinforcement learning for efficient network penetration testing.
    Information, 11(1),
    
    article number 6.
    
    doi: 10.3390/info11010006
ORCID: 0000-0001-8037-1685 (2020).
    Reinforcement learning for efficient network penetration testing.
    Information, 11(1),
    
    article number 6.
    
    doi: 10.3390/info11010006
  
    Fernando, D. W., Komninos, N.  ORCID: 0000-0003-2776-1283 & Chen, T.
ORCID: 0000-0003-2776-1283 & Chen, T.  ORCID: 0000-0001-8037-1685  (2020).
    A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques.
    IoT, 1(2),
    
    
     pp. 551-604.
    doi: 10.3390/iot1020030
ORCID: 0000-0001-8037-1685  (2020).
    A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques.
    IoT, 1(2),
    
    
     pp. 551-604.
    doi: 10.3390/iot1020030
  
    Sandoval, R. M., Garcia-Sanchez, A-J., Garcia-Haro, J.  & Chen, T.  ORCID: 0000-0001-8037-1685 (2018).
    Optimal Policy Derivation for Transmission Duty-Cycle Constrained LPWAN.
    IEEE Internet of Things Journal, 5(4),
    
    
     pp. 3114-3125.
    doi: 10.1109/jiot.2018.2833289
ORCID: 0000-0001-8037-1685 (2018).
    Optimal Policy Derivation for Transmission Duty-Cycle Constrained LPWAN.
    IEEE Internet of Things Journal, 5(4),
    
    
     pp. 3114-3125.
    doi: 10.1109/jiot.2018.2833289
  
    Blasco, J. & Chen, T.  ORCID: 0000-0001-8037-1685 (2018).
    Automated generation of colluding apps for experimental research.
    Journal of Computer Virology and Hacking Techniques, 14(2),
    
    
     pp. 127-138.
    doi: 10.1007/s11416-017-0296-4
ORCID: 0000-0001-8037-1685 (2018).
    Automated generation of colluding apps for experimental research.
    Journal of Computer Virology and Hacking Techniques, 14(2),
    
    
     pp. 127-138.
    doi: 10.1007/s11416-017-0296-4
  
    Blasco, J., Chen, T.  ORCID: 0000-0001-8037-1685, Muttik, I.  & Roggenbach, M. (2018).
    Detection of app collusion potential using logic programming.
    Journal of Network and Computer Applications, 105,
    
    
     pp. 88-104.
    doi: 10.1016/j.jnca.2017.12.008
ORCID: 0000-0001-8037-1685, Muttik, I.  & Roggenbach, M. (2018).
    Detection of app collusion potential using logic programming.
    Journal of Network and Computer Applications, 105,
    
    
     pp. 88-104.
    doi: 10.1016/j.jnca.2017.12.008
  
    Al Azwani, N. & Chen, T.  ORCID: 0000-0001-8037-1685 (2018).
    Cyber Deterrence by Punishment: Role of Different Perceptions.
    Cyberpolitik Journal, 3(5),
    
    
     pp. 62-75.
ORCID: 0000-0001-8037-1685 (2018).
    Cyber Deterrence by Punishment: Role of Different Perceptions.
    Cyberpolitik Journal, 3(5),
    
    
     pp. 62-75.
    
  
Abro, F. I., Rajarajan, M., Chen, T. & Rahulamathavan, Y. (2017). Android application collusion demystified. Communications in Computer and Information Science, 759, pp. 176-187. doi: 10.1007/978-3-319-65548-2_14
Idrees, F., Rajarajan, M., Conti, M. , Chen, T. & Rahulamathavan, Y. (2017). PIndroid: A novel Android malware detection system using ensemble learning methods. Computers and Security, 68, pp. 36-46. doi: 10.1016/j.cose.2017.03.011
    Blasco, J., Chen, T.  ORCID: 0000-0001-8037-1685, Tapiador, J.  & Peris-Lopez, P. (2016).
    A Survey of Wearable Biometric Recognition Systems.
    ACM Computing Surveys, 49(3),
    pp. 1-35.
    
    
    doi: 10.1145/2968215
ORCID: 0000-0001-8037-1685, Tapiador, J.  & Peris-Lopez, P. (2016).
    A Survey of Wearable Biometric Recognition Systems.
    ACM Computing Surveys, 49(3),
    pp. 1-35.
    
    
    doi: 10.1145/2968215
  
Xu, Q., Gong, P., Chen, T. , Michael, J. & Li, S. (2015). Modelling and characterization of NAND flash memory channels. Measurement, 70, pp. 225-231. doi: 10.1016/j.measurement.2015.04.003
Gong, P., Chen, T. & Xu, Q. (2015). ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks. Journal of Sensors, 2015, pp. 1-10. doi: 10.1155/2015/469793
Xu, Q., Gong, P. & Chen, T. (2014). Concatenated LDPC-TCM coding for reliable storage in multi-level flash memories. 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 166-170. doi: 10.1109/CSNDSP.2014.6923818
Gong, P., Xu, Q. & Chen, T. (2014). Energy Harvesting Aware routing protocol for wireless sensor networks. 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 171-176. doi: 10.1109/CSNDSP.2014.6923819
Xu, Q., Chen, T., Hu, Y. & Gong, P. (2014). Write Pattern Format Algorithm for Reliable NAND-Based SSDs. IEEE Transactions on Circuits and Systems II: Express Briefs, 61(7), pp. 516-520. doi: 10.1109/tcsii.2014.2327332
Li, S., Oikonomou, G., Tryfonas, T. , Chen, T. & Xu, L. D. (2014). A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things. IEEE Transactions on Industrial Informatics, 10(2), pp. 1461-1468. doi: 10.1109/tii.2014.2306331
Guan, W., He, J., Tang, Z. & Chen, T. (2013). Design and Evaluation of a Framework for Cooperative and Adaptive QoS Control of DSRC Network for Road Safety Applications. International Journal of Distributed Sensor Networks, 9(11), pp. 1-10. doi: 10.1155/2013/946931
Olteanu Raimond, A. M., Xiao, Y., Liu, J. , Chen, T. & Chen, C. L. P. (2013). Nonintrusive tracing in the Internet. Security and Communication Networks, 6(7), pp. 833-843. doi: 10.1002/sec.616
Chen, T., Sanchez-Aarnoutse, J. C. & Buford, J. (2011). Petri net modeling of cyber-physical attacks on smart grid. IEEE Transactions on Smart Grid, 2(4), pp. 741-749. doi: 10.1109/tsg.2011.2160000
Abu-Nimeh, S., Chen, T. & Alzubi, O. (2011). Malicious and spam posts in online social networks. Computer, 44(9), pp. 23-28. doi: 10.1109/mc.2011.222
Chen, T. & Abu-Nimeh, S. (2011). Lessons from Stuxnet. Computer, 44(4), pp. 91-93. doi: 10.1109/mc.2011.115
He, J., Tang, Z., O'Farrell, T. & Chen, T. (2011). Performance analysis of DSRC priority mechanism for road safety applications in vehicular networks. Wireless Communications and Mobile Computing, 11(7), pp. 980-990. doi: 10.1002/wcm.821
Chen, T. (2010). Web filtering and censoring. IEEE Computer, 43(3), pp. 94-97. doi: 10.1109/mc.2010.84
Chen, T. & Zeng, Y. (2009). Classification of traffic flows into QoS classes by unsupervised learning and KNN clustering. KSII Trans. on Internet and Information Systems, 3(2), pp. 134-146. doi: 10.3837/tiis.2009.02.001
Conference or Workshop Item
    
    
      
        
        Li, W., Mitchell, C. J. & Chen, T.  ORCID: 0000-0001-8037-1685  (2018).
        
        Mitigating CSRF attacks on OAuth 2.0 Systems.
        
        In: 
        
        2018 16th Annual Conference on Privacy, Security and Trust (PST).
        
        
        
        16th Annual Conference on Provacy, Security and Trust (PST), 28-30 August 2018, Belfast, Northern Ireland, United Kingdom.
      
      
    
    doi: 10.1109/PST.2018.8514180
ORCID: 0000-0001-8037-1685  (2018).
        
        Mitigating CSRF attacks on OAuth 2.0 Systems.
        
        In: 
        
        2018 16th Annual Conference on Privacy, Security and Trust (PST).
        
        
        
        16th Annual Conference on Provacy, Security and Trust (PST), 28-30 August 2018, Belfast, Northern Ireland, United Kingdom.
      
      
    
    doi: 10.1109/PST.2018.8514180
  
    
    
      
        
        Li, W., Mitchell, C. J. & Chen, T.  ORCID: 0000-0001-8037-1685  (2018).
        
        Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations.
        
        In: 
        
        Security Protocols XXVI. Security Protocols 2018.
        
        
        
        
      
      
    
    doi: 10.1007/978-3-030-03251-7_3
ORCID: 0000-0001-8037-1685  (2018).
        
        Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations.
        
        In: 
        
        Security Protocols XXVI. Security Protocols 2018.
        
        
        
        
      
      
    
    doi: 10.1007/978-3-030-03251-7_3
  
 
               
              ![[up]](/style/images/multi_up.png) Up a level
 Up a level