Follow
Ying Chen
Title
Cited by
Cited by
Year
Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
K Hwang, M Cai, Y Chen, M Qin
Dependable and Secure Computing, IEEE Transactions on 4 (1), 41-55, 2007
2632007
GridSec: trusted grid computing with security binding and self-defense against network worms and DDoS attacks
K Hwang, YK Kwok, S Song, MCY Chen, Y Chen, R Zhou, X Lou
Computational Science–ICCS 2005, 187-195, 2005
412005
Defending distributed systems against malicious intrusions and network anomalies
K Hwang, Y Chen, H Liu
Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE …, 2005
332005
Senzip: An architecture for distributed en-route compression in wireless sensor networks
S Pattem, G Shen, Y Chen, B Krishnamachari, A Ortega
Workshop on Sensor Networks for Earth and Space Science Applications (ESSA …, 2009
242009
DHT-based security infrastructure for trusted internet and grid computing
K Hwang, M Cai, YK Kwok, S Song, Y Chen, Y Chen
International journal of critical infrastructures 2 (4), 412-433, 2006
182006
Multi-channel data collection for throughput maximization in wireless sensor networks
Y Chen, PH Gomes, B Krishnamachari
Mobile Ad Hoc and Sensor Systems (MASS), 2014 IEEE 11th International …, 2014
152014
Link scheduling in a single broadcast domain underwater networks
PH Huang, Y Chen, B Krishnamachari, A Kumar
Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2010 IEEE …, 2010
132010
Secure P2P Routing in Joining and Lookup Services from Byzantine Peer Attacks
Y Chen, KH Wang
IFIP Int’l Conf. on Network and Parallel Computing, 0
4*
Optimal scheduling of aperiodic jobs on cluster
L He, H Jin, Y Chen, Z Han
Euro-Par 2001 Parallel Processing, 764-772, 2001
32001
Joint Rate-Routing Control for Fair and Efficient Data Gathering in Wireless Sensor Networks.
Y Chen, B Krishnamachari
SNA, 128-135, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–10