default search action
Ing-Ray Chen
Person information
- affiliation: Virginia Tech, Blacksburg, Virginia, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j124]Dian Chen, Qisheng Zhang, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
Energy-Adaptive and Robust Monitoring for Smart Farms Based on Solar-Powered Wireless Sensors. IEEE Internet Things J. 11(18): 29781-29797 (2024) - [c99]Dian Chen, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
eMTD: Energy-Aware Moving Target Defense for Sustainable Solar-powered Sensor-based Smart Farms. NOMS 2024: 1-7 - [i5]Dian Chen, Paul Yang, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
SusFL: Energy-Aware Federated Learning-based Monitoring for Sustainable Smart Farms. CoRR abs/2402.10280 (2024) - 2023
- [j123]Qisheng Zhang, Dian Chen, Yash Mahajan, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
Attack-Resistant, Energy-Adaptive Monitoring for Smart Farms: Uncertainty-Aware Deep Reinforcement Learning Approach. IEEE Internet Things J. 10(16): 14254-14268 (2023) - [j122]Jaber Valinejad, Zhen Guo, Jin-Hee Cho, Ing-Ray Chen:
Social media-based social-psychological community resilience analysis of five countries on COVID-19. J. Comput. Soc. Sci. 6(2): 1001-1032 (2023) - 2022
- [j121]Jaber Valinejad, Zhen Guo, Jin-Hee Cho, Ing-Ray Chen:
Measuring Community Resilience During the COVID-19 Based on Community Wellbeing and Resource Distribution. J. Soc. Comput. 3(4): 322-344 (2022) - [j120]Mengmeng Ge, Jin-Hee Cho, Dong Seong Kim, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception. ACM Trans. Internet Techn. 22(1): 24:1-24:31 (2022) - [c98]Qisheng Zhang, Yash Mahajan, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
An Attack-Resilient and Energy-Adaptive Monitoring System for Smart Farms. GLOBECOM 2022: 2776-2781 - [c97]Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra:
SAFER: Social Capital-Based Friend Recommendation to Defend against Phishing Attacks. ICWSM 2022: 241-252 - 2021
- [j119]Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra:
Online Social Deception and Its Countermeasures: A Survey. IEEE Access 9: 1770-1806 (2021) - [j118]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Ing-Ray Chen:
Vulnerability-Aware Resilient Networks: Software Diversity-Based Network Adaptation. IEEE Trans. Netw. Serv. Manag. 18(3): 3154-3169 (2021) - [j117]Ding-Chau Wang, Ing-Ray Chen, Hamid Al-Hamadi:
Reliability of Autonomous Internet of Things Systems With Intrusion Detection Attack-Defense Game Design. IEEE Trans. Reliab. 70(1): 188-199 (2021) - 2020
- [j116]Hamid Al-Hamadi, Mohammad Saoud, Ing-Ray Chen, Jin-Hee Cho:
Optimizing the Lifetime of IoT-Based Star and Mesh Networks. IEEE Access 8: 63090-63105 (2020) - [j115]Hamid Al-Hamadi, Ing-Ray Chen, Ding-Chau Wang, Meshal Almashan:
Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems. IEEE Access 8: 168994-169009 (2020) - [j114]Hamid Al-Hamadi, Ing-Ray Chen, Ding-Chau Wang, Meshal Almashan:
Corrections to "Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems". IEEE Access 8: 207181 (2020) - [j113]Jemish V. Maisuria, Saurabh N. Mehta, Ing-Ray Chen:
Bayesian-Based Spectrum Sensing and Optimal Channel Estimation for MAC Layer Protocol in Cognitive Radio Sensor Networks. Comput. J. 63(6): 942-957 (2020) - [j112]Gaurav Choudhary, Philip Virgil Astillo, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems. IEEE Trans. Netw. Serv. Manag. 17(4): 2496-2510 (2020) - [i4]Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra:
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey. CoRR abs/2004.07678 (2020) - [i3]Mengmeng Ge, Jin-Hee Cho, Dong Seong Kim, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception. CoRR abs/2005.04220 (2020) - [i2]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Ing-Ray Chen:
Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation. CoRR abs/2007.08469 (2020)
2010 – 2019
- 2019
- [j111]Hamid Al-Hamadi, Ing-Ray Chen, Jin-Hee Cho:
Trust Management of Smart Service Communities. IEEE Access 7: 26362-26378 (2019) - [j110]Jin-Hee Cho, Hamid Al-Hamadi, Ing-Ray Chen:
COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks. IEEE Access 7: 92296-92313 (2019) - [j109]Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems. IEEE Access 7: 118556-118580 (2019) - [j108]Ing-Ray Chen, Jia Guo, Ding-Chau Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi, Ilsun You:
Trust-Based Service Management for Mobile Cloud IoT Systems. IEEE Trans. Netw. Serv. Manag. 16(1): 246-263 (2019) - [j107]Terrence J. Moore, Jin-Hee Cho, Ing-Ray Chen:
Network Adaptations Under Cascading Failures for Mission-Oriented Networks. IEEE Trans. Netw. Serv. Manag. 16(3): 1184-1198 (2019) - [j106]Jia Guo, Ing-Ray Chen, Ding-Chau Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi:
Trust-Based IoT Cloud Participatory Sensing of Air Quality. Wirel. Pers. Commun. 105(4): 1461-1474 (2019) - [c96]Hamid Al-Hamadi, Ing-Ray Chen, Ding-Chau Wang:
Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems. ISADS 2019: 1-6 - 2018
- [j105]Ji Wang, Ing-Ray Chen, Jeffrey J. P. Tsai, Ding-Chau Wang:
Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks. Comput. Commun. 116: 90-100 (2018) - [j104]Jin-Hee Cho, Ing-Ray Chen:
PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks. IEEE Trans. Dependable Secur. Comput. 15(1): 151-165 (2018) - [j103]Victor Bahl, Barbara Carminati, James Caverlee, Ing-Ray Chen, Wynne Hsu, Toru Ishida, Valérie Issarny, Surya Nepal, Indrakshi Ray, Kui Ren, Shamik Sural, Mei-Ling Shyu:
Editorial. IEEE Trans. Serv. Comput. 11(1): 1-4 (2018) - [j102]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Ananthram Swami, Yen-Cheng Lu, Chang-Tien Lu, Jeffrey J. P. Tsai:
CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks. IEEE Trans. Serv. Comput. 11(6): 908-921 (2018) - [c95]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems. CHASE 2018: 88-93 - [c94]Ing-Ray Chen, Jia Guo, Ding-Chao Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi, Ilsun You:
Trust as a Service for IoT Service Management in Smart Cities. HPCC/SmartCity/DSS 2018: 1358-1365 - [c93]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. IWCMC 2018: 560-565 - [c92]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
On IoT Misbehavior Detection in Cyber Physical Systems. PRDC 2018: 189-190 - [i1]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. CoRR abs/1807.00435 (2018) - 2017
- [j101]Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai:
A survey of trust computation models for service management in internet of things systems. Comput. Commun. 97: 1-14 (2017) - [j100]Jin-Hee Cho, Yating Wang, Ing-Ray Chen, Kevin S. Chan, Ananthram Swami:
A Survey on Modeling and Optimizing Multi-Objective Systems. IEEE Commun. Surv. Tutorials 19(3): 1867-1901 (2017) - [j99]Hamid Al-Hamadi, Ing-Ray Chen:
Trust-Based Decision Making for Health IoT Systems. IEEE Internet Things J. 4(5): 1408-1419 (2017) - [j98]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Jeffrey J. P. Tsai:
Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks. IEEE Trans. Netw. Serv. Manag. 14(1): 217-232 (2017) - [j97]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Ananthram Swami, Kevin S. Chan:
Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks. IEEE Trans. Serv. Comput. 10(4): 660-672 (2017) - [c91]Jia Guo, Ing-Ray Chen, Ding-Chao Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi:
A Case Study of IoT Participatory Sensing of Hazardous Ozone Using Traces. FSDM 2017: 479-484 - [c90]Lijing Wang, Jin-Hee Cho, Ing-Ray Chen, Jiangzhuo Chen:
PDGM: Percolation-based directed graph matching in social networks. ICC 2017: 1-7 - [c89]Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai:
A Mobile Cloud Hierarchical Trust Management Protocol for IoT Systems. MobileCloud 2017: 125-130 - 2016
- [j96]Jin-Hee Cho, Ing-Ray Chen, Kevin S. Chan:
Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Networks 44: 58-75 (2016) - [j95]Liang Zhao, Ting Hua, Chang-Tien Lu, Ing-Ray Chen:
A topic-focused trust model for Twitter. Comput. Commun. 76: 1-11 (2016) - [j94]Ing-Ray Chen, Fenye Bao, Jia Guo:
Trust-Based Service Management for Social Internet of Things Systems. IEEE Trans. Dependable Secur. Comput. 13(6): 684-696 (2016) - [j93]Robert Mitchell, Ing-Ray Chen:
Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems. IEEE Trans. Reliab. 65(1): 350-358 (2016) - [j92]Ing-Ray Chen, Jia Guo, Fenye Bao:
Trust Management for SOA-Based IoT and Its Application to Service Composition. IEEE Trans. Serv. Comput. 9(3): 482-495 (2016) - [c88]Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai, Hamid Al-Hamadi:
Trust-Based IoT Participatory Sensing for Hazard Detection and Response. ICSOC Workshops 2016: 79-84 - [c87]Nicholas Anderson, Robert Mitchell, Ing-Ray Chen:
Parameterizing Moving Target Defenses. NTMS 2016: 1-6 - [c86]Hamid Al-Hamadi, Ing-Ray Chen:
Trust-based decision making for environmental health community of interest IoT systems. WiMob 2016: 1-6 - 2015
- [j91]Ing-Ray Chen, Jia Guo:
Hierarchical trust management of community of interest groups in mobile ad hoc networks. Ad Hoc Networks 33: 154-167 (2015) - [j90]Robert Mitchell, Ing-Ray Chen:
Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems. IEEE Trans. Dependable Secur. Comput. 12(1): 16-30 (2015) - [j89]Hamid Al-Hamadi, Ing-Ray Chen:
Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 12(3): 451-466 (2015) - [j88]Hamid Al-Hamadi, Ing-Ray Chen:
Integrated Intrusion Detection and Tolerance in Homogeneous Clustered Sensor Networks. ACM Trans. Sens. Networks 11(3): 47:1-47:24 (2015) - [j87]Yating Wang, Ing-Ray Chen, Ding-Chau Wang:
A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges. Wirel. Pers. Commun. 80(4): 1607-1623 (2015) - [c85]Jia Guo, Ing-Ray Chen:
A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems. SCC 2015: 324-331 - [c84]Yating Wang, Ing-Ray Chen, Jin-Hee Cho:
Trust-Based Task Assignment in Autonomous Service-Oriented Ad Hoc Networks. ISADS 2015: 71-77 - [c83]Ing-Ray Chen, Robert Mitchell, Jin-Hee Cho:
On modeling of adversary behavior and defense for survivability of military MANET applications. MILCOM 2015: 629-634 - 2014
- [j86]Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho:
Trust management in mobile ad hoc networks for bias minimization and application performance maximization. Ad Hoc Networks 19: 59-74 (2014) - [j85]Ing-Ray Chen, Yinan Li, Robert Mitchell, Ding-Chau Wang:
Scalable and efficient dual-region based mobility management for ad hoc networks. Ad Hoc Networks 23: 52-64 (2014) - [j84]Robert Mitchell, Ing-Ray Chen:
A survey of intrusion detection in wireless network applications. Comput. Commun. 42: 1-23 (2014) - [j83]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing. IEEE Trans. Parallel Distributed Syst. 25(5): 1200-1210 (2014) - [j82]Robert Mitchell, Ing-Ray Chen:
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications. IEEE Trans. Syst. Man Cybern. Syst. 44(5): 593-604 (2014) - [c82]Ing-Ray Chen, Jia Guo:
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection. AINA 2014: 49-56 - [c81]Ji Wang, Ing-Ray Chen:
Trust-based data fusion mechanism design in cognitive radio networks. CNS 2014: 53-59 - [c80]Ing-Ray Chen, Jia Guo, Fenye Bao:
Trust management for service composition in SOA-based IoT systems. WCNC 2014: 3444-3449 - 2013
- [j81]Yinan Li, Ing-Ray Chen:
Dynamic agent-based hierarchical multicast for wireless mesh networks. Ad Hoc Networks 11(6): 1683-1698 (2013) - [j80]Jin-Hee Cho, Ing-Ray Chen:
On the tradeoff between altruism and selfishness in MANET trust management. Ad Hoc Networks 11(8): 2217-2234 (2013) - [j79]Yinan Li, Ing-Ray Chen:
Hierarchical agent-based secure and reliable multicast in wireless mesh networks. Comput. Commun. 36(14): 1515-1526 (2013) - [j78]Robert Mitchell, Ing-Ray Chen:
A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 46(4): 55:1-55:29 (2013) - [j77]Hamid Al-Hamadi, Ing-Ray Chen:
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 10(2): 189-203 (2013) - [j76]Robert Mitchell, Ing-Ray Chen:
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems. IEEE Trans. Reliab. 62(1): 199-210 (2013) - [j75]Robert Mitchell, Ing-Ray Chen:
Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications. IEEE Trans. Smart Grid 4(3): 1254-1263 (2013) - [j74]Robert Mitchell, Ing-Ray Chen:
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection. Wirel. Pers. Commun. 68(4): 1377-1391 (2013) - [j73]Ding-Chau Wang, Weiping He, Ing-Ray Chen:
Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems. Wirel. Pers. Commun. 69(1): 449-469 (2013) - [c79]Yunqi Ye, Liangliang Xiao, Yinzi Chen, I-Ling Yen, Farokh B. Bastani, Ing-Ray Chen:
Access Protocols in Data Partitioning Based Cloud Storage. IEEE CLOUD 2013: 398-405 - [c78]Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho:
Integrated social and quality of service trust management of mobile groups in ad hoc networks. ICICS 2013: 1-5 - [c77]Hamid Al-Hamadi, Ing-Ray Chen:
Adaptive network management for countering selective capture in wireless sensor networks. CNSM 2013: 203-210 - [c76]Jin-Hee Cho, Ing-Ray Chen, Yating Wang, Kevin S. Chan:
Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks. ICPADS 2013: 372-379 - [c75]Yinan Li, Ing-Ray Chen, Ding-Chau Wang:
Dual-Region Location Management for Mobile Ad Hoc Networks. ICPADS 2013: 388-395 - [c74]Hamid Al-Hamadi, Ing-Ray Chen:
Dynamic multisource multipath routing for intrusion tolerance and lifetime maximization of autonomous wireless sensor networks. ISADS 2013: 1-7 - [c73]Fenye Bao, Ing-Ray Chen, Jia Guo:
Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems. ISADS 2013: 1-7 - [c72]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Kevin S. Chan, Ananthram Swami:
Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives. MILCOM 2013: 1862-1867 - [c71]Jin-Hee Cho, Kevin S. Chan, Ing-Ray Chen:
Composite trust-based public key management in mobile ad hoc networks. SAC 2013: 1949-1956 - 2012
- [j72]Ing-Ray Chen, Yating Wang:
Reliability Analysis of Wireless Sensor Networks with Distributed Code Attestation. IEEE Commun. Lett. 16(10): 1640-1643 (2012) - [j71]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 35(3): 1001-1012 (2012) - [j70]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 9(2): 169-183 (2012) - [j69]Yinan Li, Ing-Ray Chen:
Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding. IEEE Trans. Netw. Serv. Manag. 9(3): 226-239 (2012) - [j68]Weiping He, Ing-Ray Chen, Ding-Chau Wang:
DMAP-FR: Dynamic Mobility Anchor Points for Mobility, Service and Failure Recovery Management in Mobile IPv6 Systems. Wirel. Pers. Commun. 62(3): 479-496 (2012) - [j67]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks. Wirel. Pers. Commun. 66(2): 443-459 (2012) - [c70]Bingsheng Wang, Haili Dong, Arnold P. Boedihardjo, Chang-Tien Lu, Harland Yu, Ing-Ray Chen, Jing Dai:
An integrated framework for spatio-temporal-textual search and mining. SIGSPATIAL/GIS 2012: 570-573 - [c69]Robert Mitchell, Ing-Ray Chen:
Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems. ICCCN 2012: 1-7 - [c68]Jin-Hee Cho, Moonjeong Chang, Ing-Ray Chen, Ananthram Swami:
A Provenance-Based Trust Model for Delay Tolerant Networks. IFIPTM 2012: 52-67 - [c67]Hamid Al-Hamadi, Ing-Ray Chen:
Energy vs. QoS Tradeoff Analysis of Multipath Routing Protocols for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. ISPA 2012: 387-394 - [c66]Fenye Bao, Ing-Ray Chen:
Trust management for the internet of things and its application to service composition. WOWMOM 2012: 1-6 - 2011
- [j66]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Commun. Surv. Tutorials 13(4): 562-583 (2011) - [j65]Yinan Li, Ing-Ray Chen:
Adaptive per-user per-object cache consistency management for mobile data access in wireless mesh networks. J. Parallel Distributed Comput. 71(7): 1034-1046 (2011) - [j64]Jin-Hee Cho, Ing-Ray Chen:
Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Perform. Evaluation 68(1): 58-75 (2011) - [j63]Ing-Ray Chen, Anh Phan Speer, Mohamed Eltoweissy:
Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(2): 161-176 (2011) - [j62]Yinan Li, Ing-Ray Chen:
Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks. IEEE Trans. Mob. Comput. 10(3): 349-361 (2011) - [j61]Jin-Hee Cho, Ing-Ray Chen:
Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems. Wirel. Pers. Commun. 60(4): 725-750 (2011) - [c65]Sumit Shah, Fenye Bao, Chang-Tien Lu, Ing-Ray Chen:
CROWDSAFE: crowd sourcing of crime incidents and safe routing on mobile devices. GIS 2011: 521-524 - [c64]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Trust-Based Intrusion Detection in Wireless Sensor Networks. ICC 2011: 1-6 - [c63]Yinan Li, Ing-Ray Chen:
Hierarchical Agent-Based Secure Multicast for Wireless Mesh Networks. ICC 2011: 1-6 - [c62]Moonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho:
Trust-Threshold Based Routing in Delay Tolerant Networks. IFIPTM 2011: 265-276 - [c61]Robert Mitchell, Ing-Ray Chen:
Survivability analysis of mobile cyber physical systems with voting-based intrusion detection. IWCMC 2011: 2256-2261 - [c60]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical trust management for wireless sensor networks and its application to trust-based routing. SAC 2011: 1732-1738 - [c59]Robert Mitchell, Ing-Ray Chen:
A hierarchical performance model for intrusion detection in cyber-physical systems. WCNC 2011: 2095-2100 - 2010
- [j60]Ing-Ray Chen, Yating Wang, Ding-Chau Wang:
Reliability of wireless sensors with code attestation for intrusion detection. Inf. Process. Lett. 110(17): 778-786 (2010) - [j59]Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks. IEEE Trans. Reliab. 59(1): 231-241 (2010) - [j58]Jin-Hee Cho, Ing-Ray Chen:
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Wirel. Networks 16(4): 1157-1173 (2010) - [j57]