default search action
Yi-Ming Chen 0008
Person information
- affiliation: National Central University, Department of Information Management, Jung-Li, Taiwan
Other persons with the same name
- Yiming Chen (aka: Yi-Ming Chen) — disambiguation page
- Yiming Chen 0009 (aka: Yi-Ming Chen 0009) — Yanshan University, College of Sciences, Qinhuangdao, China (and 1 more)
- Yiming Chen 0001 — Alibaba AI Labs, Hangzhou, China (and 2 more)
- Yiming Chen 0002 — National University of Defence and Technology, School of Computer, Changsha, China (and 1 more)
- Yiming Chen 0003 — Alibaba Group, Hangzhou, China
- Yiming Chen 0004 — Western Digital Corporation, Irvine, CA, USA (and 1 more)
- Yiming Chen 0005 — Tsinghua University, Department of Automation, Beijing, China
- Yiming Chen 0006 — Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China
- Yiming Chen 0007 — Beijing Normal University, State Key Laboratory of Remote Sensing Science, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Tzung-Han Jeng, Chien-Chih Chen, Yu-Lung Tsai, Yi-Ming Chen:
Comparison of Interaction Profiling Bipartite Graph Mining and Graph Neural Network for Malware-Control Domain Detection. I-DO 2024 - 2022
- [c35]Tzung-Han Jeng, Ying-Ching Chang, Hui-Hsuan Yang, Li-Kai Chen, Yi-Ming Chen:
A Novel Deep Learning Based Attention Mechanism for Android Malware Detection and Explanation. ICCCM 2022: 226-232 - [c34]Wen-Ting Chang, Yi-Ming Chen, Hui-Hsuan Yang:
Android Malware Classifier Combining Permissions and API Features to Face Model Drifting. ICS 2022: 434-446 - 2021
- [j16]Tzung-Han Jeng, Wen-Yang Luo, Chuan-Chiang Huang, Chien-Chih Chen, Kuang-Hung Chang, Yi-Ming Chen:
Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration. Int. J. Grid High Perform. Comput. 13(3): 12-29 (2021) - [c33]Yi-Ming Chen, Chun-Hsien Yang, Guo-Chung Chen:
Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection. DSC 2021: 1-8 - 2020
- [j15]Tzung-Han Jeng, Yi-Ming Chen, Chien-Chih Chen, Chuan-Chiang Huang:
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection. Secur. Commun. Networks 2020: 8841544:1-8841544:20 (2020) - [c32]Che-Chun Hu, Tzung-Han Jeng, Yi-Ming Chen:
Dynamic Android Malware Analysis with De-Identification of Personal Identifiable Information. ICCBD 2020: 30-36 - [c31]Yi-Ming Chen, An-Chi He, Guo-Chung Chen, Yu-Chi Liu:
Android malware detection system integrating block feature extraction and multi-head attention mechanism. ICS 2020: 408-413
2010 – 2019
- 2019
- [c30]Tzung-Han Jeng, Wei-Ming Chan, Wen-Yang Luo, Chuan-Chiang Huang, Chien-Chih Chen, Yi-Ming Chen:
NetFlowTotal: A Cloud Service Integration Platform for Malicious Traffic Analysis and Collaboration. ICCBD 2019: 154-160 - 2018
- [c29]Tzung-Han Jeng, Yi-Ming Chen, Chien-Chih Chen, Chuan-Chiang Huang, Kuo-Sen Chou:
CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection. DSC 2018: 1-8 - 2017
- [j14]Jyun-Yan Yang, Li-Der Chou, Li-Ming Tseng, Yi-Ming Chen:
Autonomic Navigation System Based on Predicted Traffic and VANETs. Wirel. Pers. Commun. 92(2): 515-546 (2017) - 2015
- [j13]David Chunhu Li, Li-Der Chou, Li-Ming Tseng, Yi-Ming Chen:
Energy Efficient Min Delay-based Geocast Routing Protocol for the Internet of Vehicles. J. Inf. Sci. Eng. 31(6): 1903-1918 (2015) - [j12]David Chunhu Li, Li-Der Chou, Li-Ming Tseng, Yi-Ming Chen, Kai-Wei Kuo:
A Bipolar Traffic Density Awareness Routing Protocol for Vehicular Ad Hoc Networks. Mob. Inf. Syst. 2015: 401518:1-401518:12 (2015) - [c28]Yen-Wei Kuo, Li-Der Chou, Yi-Ming Chen:
Adaptive Smart Power Control Algorithm for LTE downlink cross-tier interference avoidance. QSHINE 2015: 24-30 - 2014
- [j11]Wei-Chen Wu, Yi-Ming Chen:
Improving the Authentication Scheme and Access Control Protocol for VANETs. Entropy 16(11): 6152-6165 (2014) - [j10]Yi-Ming Chen, Wei-Chen Wu:
An anonymous DRM scheme for sharing multimedia files in P2P networks. Multim. Tools Appl. 69(3): 1041-1065 (2014) - [c27]Yu-Chih Wei, Yi-Ming Chen:
Adaptive decision making for improving trust establishment in VANET. APNOMS 2014: 1-4 - 2013
- [j9]Yi-Ming Chen, Yu-Chih Wei:
A beacon-based trust management system for enhancing user centric location privacy in VANETs. J. Commun. Networks 15(2): 153-163 (2013) - [c26]Shun-Te Liu, Yi-Ming Chen, Shiou-Jing Lin:
A Novel Search Engine to Uncover Potential Victims for APT Investigations. NPC 2013: 405-416 - 2012
- [j8]Zeng-Yuan Yang, Yi-Ming Chen, Li-Ming Tseng:
A Seamless Broadcasting Scheme with Live Video Support. Int. J. Digit. Multim. Broadcast. 2012: 373459:1-373459:8 (2012) - [j7]Shun-Te Liu, Yi-Ming Chen:
MalPEFinder: fast and retrospective assessment of data breaches in malware attacks. Secur. Commun. Networks 5(8): 899-915 (2012) - [j6]Yi-Ming Chen, Yu-Chih Wei:
SafeAnon: a safe location privacy scheme for vehicular networks. Telecommun. Syst. 50(4): 339-354 (2012) - [c25]Yu-Chih Wei, Yi-Ming Chen:
Evaluation of collusion resistance on trust management systems for VANETs. ITST 2012: 356-360 - [c24]Yu-Chih Wei, Yi-Ming Chen:
An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs. TrustCom 2012: 393-400 - [c23]Shun-Te Liu, Yi-Ming Chen, Hui-Ching Hung:
N-Victims: An Approach to Determine N-Victims for APT Investigations. WISA 2012: 226-240 - [c22]Yu-Chih Wei, Yi-Ming Chen:
Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs. WISA 2012: 328-344 - 2011
- [j5]Shun-Te Liu, Yi-Ming Chen:
Retrospective detection of malware attacks by cloud computing. Int. J. Inf. Technol. Commun. Convergence 1(3): 280-296 (2011) - [c21]Shun-Te Liu, Shiou-Jing Lin, Yi-Ming Chen:
Combining density-based clustering and wavelet methods for internal systems anomaly detection. APNOMS 2011: 1-8 - [c20]Yu-Chih Wei, Yi-Ming Chen, Hwai-Ling Shan:
Beacon-based trust management for location privacy enhancement VANETs. APNOMS 2011: 1-8 - [c19]Yi-Ming Chen, Cheng-En Chuang, Hsu-Che Liu, Cheng-Yi Ni, Chun-Tang Wang:
Using Agent in Virtual Machine for Interactive Security Training. FGIT-SecTech 2011: 65-74 - [c18]Shun-Te Liu, Hui-Ching Huang, Yi-Ming Chen:
A System Call Analysis Method with MapReduce for Malware Detection. ICPADS 2011: 631-637 - 2010
- [c17]Yu-Chih Wei, Yi-Ming Chen:
Safe Distance Based Location Privacy in Vehicular Networks. VTC Spring 2010: 1-5 - [p1]Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu:
A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems. Security Informatics 2010: 117-133
2000 – 2009
- 2009
- [c16]Wei-Chen Wu, Yi-Ming Chen:
TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks. IIH-MSP 2009: 873-876 - [c15]Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu:
A game theory approach for the reallocation of security forces against terrorist diversionary attacks. ISI 2009: 89-94 - [c14]Yu-Chih Wei, Yi-Ming Chen, Hwai-Ling Shan:
RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks. SEWCN 2009: 39-51 - 2008
- [c13]Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu:
A game theory approach for an emergency management security advisory system. ISI 2008: 116-121 - 2007
- [c12]Yi-Ming Chen, Chih-Lun Su:
Meeting QoS Requirements of Mobile Computing by Dual-Level Congestion Control. GPC 2007: 241-251 - [c11]Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu:
A Game Theoretic Approach for Deploying Intrusion Detection Agent. PRIMA 2007: 446-451 - 2006
- [j4]Hsiang-Fu Yu, Hung-Chang Yang, Pin-Han Ho, Yi-Ming Chen, Li-Ming Tseng:
A smooth broadcasting scheme for VBR-encoded hot videos. Comput. Commun. 29(15): 2904-2916 (2006) - [c10]Yi-Ming Chen, Yung-Wei Kao:
Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. IWSEC 2006: 389-404 - [c9]Hung-Chang Yang, Hsiang-Fu Yu, Zeng-Yuan Yang, Li-Ming Tseng, Yi-Ming Chen:
A Live Harmonic Broadcasting Scheme for VBR-Encoded Hot Videos. WWIC 2006: 236-246 - 2005
- [j3]Hsiang-Fu Yu, Hung-Chang Yang, Li-Ming Tseng, Yi-Ming Chen:
The enhanced staircase broadcasting for VBR videos. Comput. Commun. 28(17): 1903-1909 (2005) - [c8]Hung-Chang Yang, Hsiang-Fu Yu, Li-Ming Tseng, Yi-Ming Chen:
An efficient staircase-harmonic scheme for broadcasting popular videos. CCNC 2005: 122-127 - [c7]Hung-Chang Yang, Hsiang-Fu Yu, Li-Ming Tseng, Yi-Ming Chen:
Short-Delay Video Streaming with Restricted Supplying Peer Bandwidth. MMNS 2005: 362-370 - 2004
- [j2]Hsiang-Fu Yu, Yi-Ming Chen, Li-Ming Tseng:
Archive knowledge discovery by proxy cache. Internet Res. 14(1): 34-47 (2004) - [c6]Hsiang-Fu Yu, Hung-Chang Yang, Li-Ming Tseng, Yi-Ming Chen:
Simple VBR staircase broadcasting (SVSB). CCNC 2004: 128-133 - [c5]Hsiang-Fu Yu, Hung-Chang Yang, Yi-Ming Chen, Li-Ming Tseng:
A Smooth Recursive Frequency-Splitting Scheme for Broadcasting VBR-Encoded Hot Videos. HSNMC 2004: 950-960 - [c4]Hung-Chang Yang, Hsiang-Fu Yu, Li-Ming Tseng, Yi-Ming Chen:
Interleaving Staircase Broadcasting and Receiving Scheme with Loss-Anticipation Delivery. International Conference on Internet Computing 2004: 352-355 - [c3]Hung-Chang Yang, Hsiang-Fu Yu, Li-Ming Tseng, Yi-Ming Chen:
Fast and lossless broadcasting schemes for VBR-encoded hot videos. ICON 2004: 165-169 - [c2]Hung-Chang Yang, Hsiang-Fu Yu, Li-Ming Tseng, Yi-Ming Chen:
Interleaving harmonic broadcasting and receiving scheme with loss-anticipation delivery. ISCC 2004: 600-605 - [c1]Hsiang-Fu Yu, Hung-Chang Yang, Yi-Ming Chen, Li-Ming Tseng, Chen-Yi Kuo:
Smooth Fast Broadcasting (SFB) for Compressed Videos. WWIC 2004: 272-283 - 2003
- [j1]Hsiang-Fu Yu, Yi-Ming Chen, Shih-Yong Wang, Li-Ming Tseng:
Improving Internet archive service through proxy cache. Internet Res. 13(1): 61-71 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint