default search action
Tieming Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu:
CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters. Comput. Secur. 136: 103518 (2024) - [j31]Jingjie Xu, Ting Wang, Mingqi Lv, Tieming Chen, Tiantian Zhu, Baiyang Ji:
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs. Cybersecur. 7(1): 55 (2024) - [j30]Jie Ying, Tiantian Zhu, Qiang Liu, Chunlin Xiong, Zhengqiu Weng, Tieming Chen, Lei Fu, Mingqi Lv, Han Wu, Ting Wang, Yan Chen:
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy. IEEE Trans. Mob. Comput. 23(4): 2832-2848 (2024) - [c22]Tieming Chen, Xiaoyang Tian, Yinglong Li, Qingyan Jiang, Zechen Liu:
FuzzyFollow: A Novel Privacy-Aware Intelligent Vehicle-Following Scheme for Safe Driving on Risky Roads Using Fuzzy Sets. CSCWD 2024: 2484-2490 - [c21]Tieming Chen, Zechen Liu, Yinglong Li, Tinghao Chen, Qingyan Jiang, Jiahui Li:
A Novel Fuzzy Trust-Based Secure Vehicular Data Forwarding Scheme Using Incentive Consensus. FUZZ 2024: 1-6 - [c20]Zhiling Zhu, Tieming Chen, Haobin Kong, Yunjin Zhong, Qijie Song:
DocSecKG: A Systematic Approach for Building Knowledge Graph to Understand the Relationship Between Docker Image and Vulnerability. ICIC (13) 2024: 392-404 - [i7]Mingqi Lv, HongZhe Gao, Xuebo Qiu, Tieming Chen, Tiantian Zhu:
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning. CoRR abs/2402.15147 (2024) - [i6]Jie Ying, Tiantian Zhu, Wenrui Cheng, Qixuan Yuan, Mingjun Ma, Chunlin Xiong, Tieming Chen, Mingqi Lv, Yan Chen:
SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time. CoRR abs/2405.02629 (2024) - [i5]Tiantian Zhu, Jie Ying, Tieming Chen, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Aohan Zheng, Mingqi Lv, Yan Chen:
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports. CoRR abs/2405.02826 (2024) - 2023
- [j29]Tieming Chen, Chenbin Zheng, Tiantian Zhu, Chunlin Xiong, Jie Ying, Qixuan Yuan, Wenrui Cheng, Mingqi Lv:
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends. Comput. Secur. 135: 103485 (2023) - [j28]Haibo Jin, Ruoxi Chen, Haibin Zheng, Jinyin Chen, Yao Cheng, Yue Yu, Tieming Chen, Xianglong Liu:
Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons. Inf. Sci. 637: 118936 (2023) - [j27]Tiantian Zhu, Jinkai Yu, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Jie Ying, Tieming Chen, Jiabo Zhang, Mingqi Lv, Yan Chen, Ting Wang, Yuan Fan:
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts. IEEE Trans. Dependable Secur. Comput. 20(6): 5247-5264 (2023) - [j26]Simin Kou, Xuesong Yin, Yigang Wang, Songcan Chen, Tieming Chen, Zizhao Wu:
Structure-Aware Subspace Clustering. IEEE Trans. Knowl. Data Eng. 35(10): 10569-10582 (2023) - [c19]Yinglong Li, Zhiwei Huang, Tieming Chen, Xinchen Xu, Weiru Liu, Mingqi Lv:
TCFP: A Novel Privacy-Aware Edge Vehicular Trajectory Compression Scheme Using Fuzzy Markovian Prediction. SMC 2023: 1217-1223 - [c18]Yinglong Li, Dan Meng, Xinchen Xu, Tieming Chen, Yanjun Li, Ting Wang:
fuzzyForward: A Novel Multi-hop Data Forwarding Scheme Using Fuzzy Decision for Edge VANETs. WoWMoM 2023: 175-184 - 2022
- [j25]Yinglong Li, Weiru Liu, Yihua Zhu, Hong Chen, Hongbing Cheng, Tieming Chen, Ping Hu, Ruohong Huan:
Privacy-Aware Fuzzy Range Query Processing Over Distributed Edge Devices. IEEE Trans. Fuzzy Syst. 30(5): 1421-1435 (2022) - [j24]Tiantian Zhu, Zhengqiu Weng, Qijie Song, Yuan Chen, Qiang Liu, Yan Chen, Mingqi Lv, Tieming Chen:
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment. IEEE Trans. Mob. Comput. 21(2): 555-572 (2022) - [j23]Mingqi Lv, Dajian Zeng, Ling Chen, Tieming Chen, Tiantian Zhu, Shouling Ji:
Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network. IEEE Trans. Mob. Comput. 21(8): 2967-2977 (2022) - [i4]Tieming Chen, Qijie Song, Xuebo Qiu, Tiantian Zhu, Zhiling Zhu, Mingqi Lv:
Kellect: a Kernel-Based Efficient and Lossless Event Log Collector. CoRR abs/2207.11530 (2022) - 2021
- [j22]Mingqi Lv, Hao Zhang, Kang-Jun Zhu, Chao Huang, Tieming Chen:
A Domain-Specific Non-Factoid Question Answering System based on Terminology Mining and Siamese Neural Network. J. Inf. Sci. Eng. 37(4): 959-974 (2021) - [j21]Tiantian Zhu, Lei Fu, Qiang Liu, Zi Lin, Yan Chen, Tieming Chen:
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering. IEEE Trans. Inf. Forensics Secur. 16: 553-568 (2021) - [j20]Tiantian Zhu, Jiayu Wang, Linqi Ruan, Chunlin Xiong, Jinkai Yu, Yaosheng Li, Yan Chen, Mingqi Lv, Tieming Chen:
General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis. IEEE Trans. Inf. Forensics Secur. 16: 3312-3325 (2021) - [j19]Mingqi Lv, Zhaoxiong Hong, Ling Chen, Tieming Chen, Tiantian Zhu, Shouling Ji:
Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction. IEEE Trans. Intell. Transp. Syst. 22(6): 3337-3348 (2021) - [j18]Yinglong Li, Fan Liu, Jiaye Zhang, Tieming Chen, Hong Chen, Weiru Liu:
Privacy-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities. IEEE Trans. Veh. Technol. 70(10): 9775-9786 (2021) - [c17]Yinglong Li, Jiaye Zhang, Tieming Chen, Weiru Liu:
FuzzySkyline: QoS-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities. IWQoS 2021: 1-7 - [i3]Mingqi Lv, Chengyu Dong, Tieming Chen, Tiantian Zhu, Qijie Song, Yuan Fan:
A Heterogeneous Graph Learning Model for Cyber-Attack Detection. CoRR abs/2112.08986 (2021) - [i2]Tiantian Zhu, Jinkai Yu, Tieming Chen, Jiayu Wang, Jie Ying, Ye Tian, Mingqi Lv, Yan Chen, Yuan Fan, Ting Wang:
APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts. CoRR abs/2112.09008 (2021) - 2020
- [j17]Feng Lin, Rongrong Jiang, Dongxian Shi, Dong Ren, Mingqi Lv, Tieming Chen:
A Risk control Framework for Mortgaged Cars based on trajectory Mining. Int. J. Robotics Autom. 35(6) (2020) - [j16]Mingqi Lv, Chao Huang, Tieming Chen, Ting Wang:
A Collaborative Deep and Shallow Semisupervised Learning Framework for Mobile App Classification. Mob. Inf. Syst. 2020: 4521723:1-4521723:12 (2020) - [c16]Tieming Chen, Zhengqiu Weng, YunPeng Chen, Chenqiang Jin, Mingqi Lv, Tiantian Zhu, Jianhong Lin:
WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation. Inscrypt 2020: 193-201
2010 – 2019
- 2019
- [j15]Feng Lin, Mingqi Lv, Ting Wang, Tieming Chen:
Map matching based on Cell-ID localization for mobile phone users. Clust. Comput. 22(Supplement): 6231-6239 (2019) - [j14]Mingqi Lv, Wei Xu, Tieming Chen:
A hybrid deep convolutional and recurrent neural network for complex activity recognition using multimodal sensors. Neurocomputing 362: 33-40 (2019) - [j13]Mingqi Lv, Ling Chen, Tieming Chen, Dajian Zeng, Bin Cao:
Discovering individual movement patterns from cell-id trajectory data by exploiting handoff features. Inf. Sci. 474: 18-32 (2019) - [j12]Mingqi Lv, Yifan Li, Ling Chen, Tieming Chen:
Air quality estimation by exploiting terrain features and multi-view transfer semi-supervised regression. Inf. Sci. 483: 82-95 (2019) - [j11]Tieming Chen, Qingyu Mao, Mingqi Lv, Hongbing Cheng, Yinglong Li:
DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network. KSII Trans. Internet Inf. Syst. 13(4): 2180-2197 (2019) - [j10]Mingqi Lv, Yifan Li, Tieming Chen:
一种基于地形因素的空气质量空间估计方法 (Spatial Estimation Method of Air Quality Based on Terrain Factors LV Ming-qi LI Yi-fan CHEN Tie-ming). 计算机科学 46(1): 265-270 (2019) - [c15]Mingqi Lv, Dajian Zeng, Tieming Chen, Ling Chen:
A sequence-to-sequence model for cell-ID trajectory prediction. UbiComp/ISWC Adjunct 2019: 137-140 - 2018
- [j9]Hongbing Cheng, Manyun Qian, Qu Li, Yanbo Zhou, Tieming Chen:
An Efficient Privacy-Preserving Friend Recommendation Scheme for Social Network. IEEE Access 6: 56018-56028 (2018) - [j8]Ting Wang, Tieming Chen, Yang Liu, Ye Wang:
Anti-chain based algorithms for timed/probabilistic refinement checking. Sci. China Inf. Sci. 61(5): 052105:1-052105:17 (2018) - [j7]Mingqi Lv, Tieming Chen, Yifan Li, Yinglong Li:
Urban Traffic Congestion Index Estimation With Open Ubiquitous Data. J. Inf. Sci. Eng. 34(3): 781-799 (2018) - [j6]Tieming Chen, Qingyu Mao, Yimin Yang, Mingqi Lv, Jianming Zhu:
TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification. Mob. Inf. Syst. 2018: 4157156:1-4157156:9 (2018) - [j5]Mingqi Lv, Ling Chen, Tieming Chen, Gencai Chen:
Bi-View Semi-Supervised Learning Based Semantic Human Activity Recognition Using Accelerometers. IEEE Trans. Mob. Comput. 17(9): 1991-2001 (2018) - [c14]Guangyuan Fu, Yuan Li, Tieming Chen:
Collaborative Pursuing of Multiple Mobile Robots in Dynamic Environment. ICRAI 2018: 92-96 - 2017
- [c13]Ting Wang, Qi Su, Tieming Chen:
Formal Analysis of Security Properties of Cyber-Physical System Based on Timed Automata. DSC 2017: 534-540 - 2016
- [j4]Tieming Chen, Zhenbo Yu, Shijian Li, Bo Chen:
From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT. J. Sensors 2016: 8797568:1-8797568:11 (2016) - [j3]Songzheng Song, Jiexin Zhang, Yang Liu, Mikhail Auguston, Jun Sun, Jin Song Dong, Tieming Chen:
Formalizing and verifying stochastic system architectures using Monterey Phoenix. Softw. Syst. Model. 15(2): 453-471 (2016) - [c12]Guozhu Meng, Yinxing Xue, Mahinthan Chandramohan, Annamalai Narayanan, Yang Liu, Jie Zhang, Tieming Chen:
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools. AsiaCCS 2016: 365-376 - [c11]Mingqi Lv, Ling Chen, Tieming Chen, Gencai Chen:
Mining cell-id trajectory patterns by exploiting handoff features. UbiComp Adjunct 2016: 153-156 - 2015
- [c10]Songzheng Song, Yang Liu, Mikhail Auguston, Jun Sun, Jin Song Dong, Tieming Chen:
Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract). MoDELS 2015: 449 - 2014
- [j2]Tieming Chen, Xu Zhang, Shichao Jin, Okhee Kim:
Efficient classification using parallel and scalable compressed model and its application on intrusion detection. Expert Syst. Appl. 41(13): 5972-5983 (2014) - [i1]Tieming Chen, Xu Zhang, Shichao Jin, Okhee Kim:
Efficient classification using parallel and scalable compressed model and Its application on intrusion detection. CoRR abs/1405.3410 (2014) - 2013
- [c9]Shichao Jin, Okhee Kim, Tieming Chen:
Efficient Attack Detection Based on a Compressed Model. ISPEC 2013: 248-262 - 2011
- [c8]Rongrong Jiang, Tieming Chen:
A Bilinear Pairing-Based Key Management Scheme for Wireless Sensor Networks. CIS 2011: 670-673 - 2010
- [c7]Tieming Chen, Xiaoming Pan, Yiguang Xuan, Jixia Ma, Jie Jiang:
A Naive Feature Selection Method and Its Application in Network Intrusion Detection. CIS 2010: 416-420 - [c6]Tieming Chen, Liang Ge, Xiaohao Wang, Jiamei Cai:
TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor Networks. CIS 2010: 528-532
2000 – 2009
- 2008
- [j1]Rongsheng Gong, Samuel H. Huang, Tieming Chen:
Robust and Efficient Rule Extraction Through Data Summarization and Its Application in Welding Fault Diagnosis. IEEE Trans. Ind. Informatics 4(3): 198-206 (2008) - [c5]Tieming Chen, Samuel H. Huang:
Tree parity machine-based One-Time Password authentication schemes. IJCNN 2008: 257-261 - 2007
- [c4]Tieming Chen, Rongrong Jiang:
Designing Security Protocols Using Novel Neural Network Model. ICNC (1) 2007: 125-129 - 2005
- [c3]Tieming Chen, Jiamei Cai:
A Novel Remote User Authentication Scheme Using Interacting Neural Network. ICNC (1) 2005: 1117-1120 - [c2]Tieming Chen, Bo Chen, Jiamei Cai:
A Novel Identity-Based Key Issuing Scheme Based on Interacting Neural Network. ISNN (2) 2005: 637-642 - 2004
- [c1]Jiamei Cai, Tieming Chen, Liying Zhu:
A Structure Modeling Method for Multi-task Embedded Software Design. ICESS 2004: 576-581
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint