default search action
C. Jason Chiang
Person information
- affiliation: Applied Communications Sciences, Basking Ridge, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c37]Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles A. Kamhoua, Nandi O. Leslie, Cho-Yu Jason Chiang, Vyas Sekar:
Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions. ICML 2021: 4523-4532 - [i3]Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles A. Kamhoua, Nandi Leslie, Cho-Yu Jason Chiang, Vyas Sekar:
Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions. CoRR abs/2101.09113 (2021) - 2020
- [c36]Luan Huy Pham, Massimiliano Albanese, Ritu Chadha, Cho-Yu Jason Chiang, Sridhar Venkatesan, Charles A. Kamhoua, Nandi Leslie:
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses. CNS 2020: 1-9 - [p1]Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha:
A Framework for Studying Autonomic Computing Models in Cyber Deception. Adaptive Autonomous Secure Cyber Systems 2020: 89-107
2010 – 2019
- 2019
- [c35]Sridhar Venkatesan, E. Allison Newcomb, Blaine Hoffman, Norbou Buchler, Jason A. Youzwak, Shridatt Sugrim, Cho-Yu Jason Chiang, Alexander Poylisher, Matthew Witkowski, Gary Walther, Michelle Wolberg, Ritu Chadha:
VulnerVAN: A Vulnerable Network Generation Tool. MILCOM 2019: 1-6 - 2018
- [j5]Sridhar Venkatesan, Massimiliano Albanese, Cho-Yu Jason Chiang, Angelo Sapello, Ritu Chadha:
DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets. Secur. Priv. 1(6) (2018) - [c34]Shridatt Sugrim, Sridhar Venkatesan, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese, Hasan Cam:
Measuring the Effectiveness of Network Deception. ISI 2018: 142-147 - [c33]Cho-Yu Jason Chiang, Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Ritu Chadha, Edward I. Colbert, Hasan Cam, Massimiliano Albanese:
On Defensive Cyber Deception: A Case Study Using SDN. MILCOM 2018: 110-115 - [c32]Todd P. Huster, Cho-Yu Jason Chiang, Ritu Chadha, Ananthram Swami:
Towards the Development of Robust Deep Neural Networks in Adversarial Settings. MILCOM 2018: 419-424 - [c31]Sridhar Venkatesan, Shridatt Sugrim, Rauf Izmailov, Cho-Yu Jason Chiang, Ritu Chadha, Bharat Doshi, Blaine Hoffman, E. Allison Newcomb, Norbou Buchler:
On Detecting Manifestation of Adversary Characteristics. MILCOM 2018: 431-437 - [c30]Todd Huster, Cho-Yu Jason Chiang, Ritu Chadha:
Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples. Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML 2018: 16-29 - [i2]Todd Huster, Cho-Yu Jason Chiang, Ritu Chadha:
Limitations of the Lipschitz constant as a defense against adversarial examples. CoRR abs/1807.09705 (2018) - 2017
- [c29]Angelo Sapello, C. Jason Chiang, Jesse Elwell, Abhrajit Ghosh, Ayumu Kubota, Takashi Matsunaka:
ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System. CLOSER 2017: 191-200 - 2016
- [c28]Tom Bowen, Alexander Poylisher, Constantin Serban, Ritu Chadha, Cho-Yu Jason Chiang, Lisa M. Marvel:
Enabling reproducible cyber research - four labeled datasets. MILCOM 2016: 539-544 - [c27]Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Shridatt James Sugrim, Ritu Chadha, Constantin Serban, Alexander Poylisher, Lisa M. Marvel, Jonathan Santos:
ACyDS: An adaptive cyber deception system. MILCOM 2016: 800-805 - [c26]Ritu Chadha, Thomas Bowen, Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Alexander Poylisher, Angelo Sapello, Constantin Serban, Shridatt Sugrim, Gary Walther, Lisa M. Marvel, E. Allison Newcomb, Jonathan Santos:
CyberVAN: A Cyber Security Virtual Assured Network testbed. MILCOM 2016: 1125-1130 - 2015
- [c25]Constantin Serban, Alexander Poylisher, Angelo Sapello, Yitzchak M. Gottlieb, C. Jason Chiang, Ritu Chadha:
Testing android devices for tactical networks: A hybrid emulation testbed approach. MILCOM 2015: 489-494 - 2014
- [j4]Konstantine Arkoudas, Ritu Chadha, C. Jason Chiang:
Sophisticated Access Control via SMT and Logical Frameworks. ACM Trans. Inf. Syst. Secur. 16(4): 17 (2014) - [c24]Abhrajit Ghosh, Angelo Sapello, Alexander Poylisher, C. Jason Chiang, Ayumu Kubota, Takashi Matsunaka:
On the Feasibility of Deploying Software Attestation in Cloud Environments. IEEE CLOUD 2014: 128-135 - 2013
- [j3]Jason Perry, Konstantine Arkoudas, C. Jason Chiang, Ritu Chadha, Daniel Apgar, Keith Whittaker:
Modular natural language interfaces to logic-based policy frameworks. Comput. Stand. Interfaces 35(5): 417-427 (2013) - 2012
- [c23]Jeffrey Boksiner, Yuriy Posherstnik, Howard McDonald, Konstantine Arkoudas, Ritu Chadha, C. Jason Chiang, Apurva N. Mody, Matthew Sherman:
Policy-based spectrum management architecture. MILCOM 2012: 1-6 - [c22]Alexander Poylisher, Yitzchak M. Gottlieb, Constantin Serban, Keith Whittaker, James H. Nguyen, Chris Scilla, John Lee, Florin Sultan, Ritu Chadha, Cho-Yu Jason Chiang:
Building an operation support system for a fast reconfigurable network experimentation testbed. MILCOM 2012: 1-6 - [c21]Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Abhrajit Ghosh, Yitzchak M. Gottlieb, Michael Kaplan, Kathleen Kurachik, Gary Levin, Yow-Jia Lin, Alexander Poylisher, Angelo Sapello, Florin Sultan, Akshay Vashist, Michelle Wolberg, Kimberly Moeltner:
TITAN: Integrated network management in tactical mobile ad hoc networks. MILCOM 2012: 1-6 - [c20]Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Yitzchak M. Gottlieb, Angelo Sapello, Kaustubh Sinkar, Kimberly Moeltner:
A GNU-based packet radio for network management field testing. MILCOM 2012: 1-6 - [c19]Florin Sultan, Alexander Poylisher, Constantin Serban, John Lee, Ritu Chadha, C. Jason Chiang:
TimeSync: Virtual time for scalable, high-fidelity hybrid network emulation. MILCOM 2012: 1-6 - [c18]Florin Sultan, Alexander Poylisher, John Lee, Constantin Serban, C. Jason Chiang, Ritu Chadha, Keith Whittaker, Chris Scilla, Syeed E. Ali:
TimeSync: enabling scalable, high-fidelity hybrid network emulation. MSWiM 2012: 185-194 - [c17]Akshay Vashist, Rauf Izmailov, Kyriakos Manousakis, Ritu Chadha, C. Jason Chiang, Constantin Serban, Syeed E. Ali:
Towards network invariant fault diagnosis in MANETs via statistical modeling: The global strength of local weak decisions. NOMS 2012: 981-987 - [c16]Konstantine Arkoudas, Shoshana Loeb, Ritu Chadha, C. Jason Chiang, Keith Whittaker:
Automated Policy Analysis. POLICY 2012: 1-8 - 2011
- [c15]Siun-Chuon Mau, Akshay Vashist, Alexander Poylisher, Ritu Chadha, Cho-Yu Jason Chiang:
Criticality avoidance: A new paradigm for congestion control based on science of phase transition. CNSM 2011: 1-6 - [c14]Konstantine Arkoudas, Ritu Chadha, C. Jason Chiang:
An Application of Formal Methods to Cognitive Radios. DIFTS@FMCAD 2011 - [c13]Feng Ge, Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Ritu Chadha:
GNU Radio-Based Digital Communications: Computational Analysis of a GMSK Transceiver. GLOBECOM 2011: 1-6 - [c12]Michelle Wolberg, Ritu Chadha, C. Jason Chiang, Kathleen Kurachik, Marcus Pang, Gregory Hadynski:
Using an adaptive management plane for policy-based network management traffic in MANETs. MILCOM 2011: 1133-1138 - [c11]Latha A. Kant, Anthony J. McAuley, Kyriakos Manousakis, Ritu Chadha, C. Jason Chiang, Yitzchak M. Gottlieb, Charles Graff, Mitesh P. Patel, J. Bowcock, Kimberly Moeltner, David Yee:
On the application of cognitive network design to MANET Network Management. MILCOM 2011: 1428-1433 - [c10]Kyriakos Manousakis, Yitzchak M. Gottlieb, Ritu Chadha, C. Jason Chiang, Kimberly Moeltner:
Mission-driven tactical network management. MILCOM 2011: 1466-1471 - [c9]Alexander Poylisher, Florin Sultan, Abhrajit Ghosh, Shiwei Li, C. Jason Chiang, Ritu Chadha, Kimberly Moeltner, Kimberly Jakubowski:
QAM: A comprehensive QoS-aware Middleware suite for tactical communications. MILCOM 2011: 1586-1591 - [c8]Chang-Han Jong, Pin-Jung Chiang, Taichuan Lu, Cho-Yu Jason Chiang:
Storage Deduplication and Management for Application Testing over a Virtual Network Testbed. TRIDENTCOM 2011: 193-207 - 2010
- [j2]Alexander Poylisher, Constantin Serban, John Lee, Taichuan Lu, Ritu Chadha, Cho-Yu Jason Chiang, Robert Orlando, Kimberly Jakubowski:
A virtual ad hoc network testbed. Int. J. Commun. Networks Distributed Syst. 5(1/2): 5-24 (2010) - [c7]Chang-Han Jong, Cho-Yu Jason Chiang, Taichuan Lu, Alexander Poylisher, Constantin Serban:
Storage deduplication for Virtual Ad Hoc Network testbed by File-level Block Sharing. HPDC 2010: 699-706 - [c6]Constantin Serban, Alexander Poylisher, Cho-Yu Jason Chiang:
Virtual ad hoc network testbeds for network-aware applications. NOMS 2010: 432-439 - [i1]Yibei Ling, Shigang Chen, Cho-Yu Jason Chiang:
On Optimal Deadlock Detection Scheduling. CoRR abs/1008.0451 (2010)
2000 – 2009
- 2009
- [c5]Cho-Yu Jason Chiang, Gary Levin, Shihwei Li, Constantin Serban, Michelle Wolberg, Ritu Chadha, Gregory Hadynski, Lee LaBarre:
Enabling Distributed Management for Dynamic Airborne Networks. POLICY 2009: 102-105 - [c4]Pratik K. Biswas, Constantin Serban, Alexander Poylisher, John Lee, Siun-Chuon Mau, Ritu Chadha, Cho-Yu Jason Chiang, Robert Orlando, Kimberly Jakubowski:
An integrated testbed for Virtual Ad Hoc Networks. TRIDENTCOM 2009: 1-10 - 2008
- [c3]Ritu Chadha, Cho-Yu Jason Chiang:
DRAMA: Distributed Policy Management for MANETs. POLICY 2008: 235-237 - 2007
- [c2]Cho-Yu Jason Chiang, Gary Levin, Yitzchak M. Gottlieb, Ritu Chadha, Shihwei Li, Alexander Poylisher, Scott Newman, Richard Lo:
On Automated Policy Generation for Mobile Ad Hoc Networks. POLICY 2007: 256-260 - 2006
- [j1]Yibei Ling, Shigang Chen, Cho-Yu Jason Chiang:
On Optimal Deadlock Detection Scheduling. IEEE Trans. Computers 55(9): 1178-1187 (2006) - 2004
- [c1]Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Jason Chiang, A. Ghetie, Gary Levin, Harshad Tanna:
Policy-Based Mobile Ad Hoc Network Management. POLICY 2004: 35-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint