Ing-Ray Chen - Publications

Affiliations: 
Computer Science and Applications Virginia Polytechnic Institute and State University, Blacksburg, VA, United States 
Area:
Computer Science, Computer Engineering, Information Technology

86 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Wang D, Chen I, Al-Hamadi H. Reliability of Autonomous Internet of Things Systems With Intrusion Detection Attack-Defense Game Design Ieee Transactions On Reliability. 1-12. DOI: 10.1109/Tr.2020.2983610  0.31
2020 Choudhary G, Astillo PV, You I, Yim K, Chen I, Cho J. Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems Ieee Transactions On Network and Service Management. 1-1. DOI: 10.1109/Tnsm.2020.3007535  0.52
2020 Al-Hamadi H, Saoud M, Chen I, Cho J. Optimizing the Lifetime of IoT-Based Star and Mesh Networks Ieee Access. 8: 63090-63105. DOI: 10.1109/Access.2020.2983873  0.636
2019 Moore TJ, Cho J, Chen I. Network Adaptations Under Cascading Failures for Mission-Oriented Networks Ieee Transactions On Network and Service Management. 16: 1184-1198. DOI: 10.1109/Tnsm.2019.2917934  0.62
2019 Chen I, Guo J, Wang D, Tsai JJP, Al-Hamadi H, You I. Trust-Based Service Management for Mobile Cloud IoT Systems Ieee Transactions On Network and Service Management. 16: 246-263. DOI: 10.1109/Tnsm.2018.2886379  0.504
2019 Cho J, Al-Hamadi H, Chen I. COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks Ieee Access. 7: 92296-92313. DOI: 10.1109/Access.2019.2927729  0.58
2019 Sharma V, You I, Yim K, Chen I, Cho J. BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems Ieee Access. 7: 118556-118580. DOI: 10.1109/Access.2019.2917135  0.587
2019 Al-Hamadi H, Chen I, Cho J. Trust Management of Smart Service Communities Ieee Access. 7: 26362-26378. DOI: 10.1109/Access.2019.2901023  0.598
2019 Guo J, Chen I, Wang D, Tsai JJP, Al-Hamadi H. Trust-Based IoT Cloud Participatory Sensing of Air Quality Wireless Personal Communications. 105: 1461-1474. DOI: 10.1007/S11277-019-06154-Y  0.343
2018 Wang Y, Chen I, Cho J, Swami A, Lu Y, Lu C, Tsai JJP. CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks Ieee Transactions On Services Computing. 11: 908-921. DOI: 10.1109/Tsc.2016.2587259  0.655
2018 Cho J, Chen I. PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks Ieee Transactions On Dependable and Secure Computing. 15: 151-165. DOI: 10.1109/Tdsc.2016.2530705  0.652
2018 Wang J, Chen I, Tsai JJP, Wang D. Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks Computer Communications. 116: 90-100. DOI: 10.1016/J.Comcom.2017.11.010  0.357
2017 Wang Y, Chen I, Cho J, Swami A, Chan KS. Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks Ieee Transactions On Services Computing. 10: 660-672. DOI: 10.1109/Tsc.2015.2491285  0.66
2017 Wang Y, Chen I, Cho J, Tsai JJP. Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks Ieee Transactions On Network and Service Management. 14: 217-232. DOI: 10.1109/Tnsm.2016.2636454  0.672
2017 Cho J, Wang Y, Chen I, Chan KS, Swami A. A Survey on Modeling and Optimizing Multi-Objective Systems Ieee Communications Surveys and Tutorials. 19: 1867-1901. DOI: 10.1109/Comst.2017.2698366  0.544
2017 Guo J, Chen I, Tsai JJP. A survey of trust computation models for service management in internet of things systems Computer Communications. 97: 1-14. DOI: 10.1016/J.Comcom.2016.10.012  0.433
2016 Chen IR, Guo J, Bao F. Trust Management for SOA-Based IoT and Its Application to Service Composition Ieee Transactions On Services Computing. 9: 482-495. DOI: 10.1109/Tsc.2014.2365797  0.651
2016 Chen I, Bao F, Guo J. Trust-Based Service Management for Social Internet of Things Systems Ieee Transactions On Dependable and Secure Computing. 13: 684-696. DOI: 10.1109/Tdsc.2015.2420552  0.572
2016 Zhao L, Hua T, Lu CT, Chen IR. A topic-focused trust model for Twitter Computer Communications. 76: 1-11. DOI: 10.1016/J.Comcom.2015.08.001  0.323
2015 Mitchell R, Chen IR. Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems Ieee Transactions On Reliability. DOI: 10.1109/Tr.2015.2406860  0.303
2015 Al-Hamadi H, Chen IR. Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks Ieee Transactions On Network and Service Management. 12: 451-466. DOI: 10.1109/Tnsm.2015.2441059  0.422
2015 Wang Y, Chen IR, Wang DC. A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges Wireless Personal Communications. 80: 1607-1623. DOI: 10.1007/S11277-014-2102-7  0.324
2014 Chen I, Bao F, Chang M, Cho J. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing Ieee Transactions On Parallel and Distributed Systems. 25: 1200-1210. DOI: 10.1109/Tpds.2013.116  0.721
2014 Mitchell R, Chen I. Review: A survey of intrusion detection in wireless network applications Computer Communications. 42: 1-23. DOI: 10.1016/J.Comcom.2014.01.012  0.443
2013 Mitchell R, Chen I. Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications Ieee Transactions On Smart Grid. 4: 1254-1263. DOI: 10.1109/Tsg.2013.2258948  0.344
2013 Mitchell R, Chen I. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Ieee Transactions On Reliability. 62: 199-210. DOI: 10.1109/Tr.2013.2240891  0.323
2013 Al-Hamadi H, Chen I. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks Ieee Transactions On Network and Service Management. 10: 189-203. DOI: 10.1109/Tnsm.2013.043013.120282  0.485
2013 Li Y, Chen I. Hierarchical agent-based secure and reliable multicast in wireless mesh networks Computer Communications. 36: 1515-1526. DOI: 10.1016/J.Comcom.2013.07.006  0.558
2013 Wang D, He W, Chen I. Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems Wireless Personal Communications. 69: 449-469. DOI: 10.1007/S11277-012-0583-9  0.674
2013 Mitchell R, Chen I. On Survivability of Mobile Cyber Physical Systems with Intrusion Detection Wireless Personal Communications. 68: 1377-1391. DOI: 10.1007/S11277-012-0528-3  0.377
2012 Li Y, Chen I. Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding Ieee Transactions On Network and Service Management. 9: 226-239. DOI: 10.1109/Tnsm.2012.051712.100101  0.523
2012 Bao F, Chen I, Chang M, Cho J. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Ieee Transactions On Network and Service Management. 9: 169-183. DOI: 10.1109/Tcomm.2012.031912.110179  0.713
2012 Chen I, Wang Y. Reliability Analysis of Wireless Sensor Networks with Distributed Code Attestation Ieee Communications Letters. 16: 1640-1643. DOI: 10.1109/Lcomm.2012.091212.121454  0.334
2012 Cho J, Swami A, Chen I. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks Journal of Network and Computer Applications. 35: 1001-1012. DOI: 10.1016/J.Jnca.2011.03.016  0.648
2012 Chen I, Bao F, Chang M, Cho J. Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks Wireless Personal Communications. 66: 443-459. DOI: 10.1007/S11277-011-0351-2  0.711
2012 He W, Chen I, Wang D. DMAP-FR: Dynamic Mobility Anchor Points for Mobility, Service and Failure Recovery Management in Mobile IPv6 Systems Wireless Personal Communications. 62: 479-496. DOI: 10.1007/S11277-010-0065-X  0.659
2011 Li Y, Chen I. Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks Ieee Transactions On Mobile Computing. 10: 349-361. DOI: 10.1109/Tmc.2010.166  0.511
2011 Chen IR, Speer AP, Eltoweissy M. Adaptive fault-tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks Ieee Transactions On Dependable and Secure Computing. 8: 161-176. DOI: 10.1109/Tdsc.2009.54  0.382
2011 Cho J, Swami A, Chen I. A Survey on Trust Management for Mobile Ad Hoc Networks Ieee Communications Surveys and Tutorials. 13: 562-583. DOI: 10.1109/Surv.2011.092110.00088  0.646
2011 Cho J, Chen I. Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks Performance Evaluation. 68: 58-75. DOI: 10.1016/J.Peva.2010.09.005  0.662
2011 Li Y, Chen I. Adaptive per-user per-object cache consistency management for mobile data access in wireless mesh networks Journal of Parallel and Distributed Computing. 71: 1034-1046. DOI: 10.1016/J.Jpdc.2011.03.001  0.482
2011 Cho J, Chen I. Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems Wireless Personal Communications. 60: 725-750. DOI: 10.1007/S11277-010-9971-1  0.633
2010 Cho J, Chen I, Feng P. Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks Ieee Transactions On Reliability. 59: 231-241. DOI: 10.1109/Tr.2010.2040534  0.633
2010 Chen I, Wang Y, Wang D. Reliability of wireless sensors with code attestation for intrusion detection Information Processing Letters. 110: 778-786. DOI: 10.1016/J.Ipl.2010.06.007  0.335
2010 Chen I, Wang D. Regional Registration-Based Mobile Multicast Service Management in Mobile IP Networks Wireless Personal Communications. 54: 635-649. DOI: 10.1007/S11277-009-9745-9  0.533
2010 Yilmaz O, Chen I, Kulczycki G, Frakes WB. Performance Analysis of Spillover-Partitioning Call Admission Control in Mobile Wireless Networks Wireless Personal Communications. 53: 111-131. DOI: 10.1007/S11277-009-9673-8  0.646
2010 Cho J, Chen I. Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks Wireless Networks. 16: 1157-1173. DOI: 10.1007/S11276-009-0194-X  0.633
2009 Wilson JW, Chen I. Performance characteristics of location‐based group membership and data consistency algorithms in mobile ad hoc networks International Journal of Pervasive Computing and Communications. 5: 497-516. DOI: 10.1108/17427370911008866  0.454
2009 He W, Chen I. A proxy-based integrated cache consistency and mobility management scheme for client-server applications in Mobile IP systems Journal of Parallel and Distributed Computing. 69: 559-572. DOI: 10.1016/J.Jpdc.2009.02.003  0.671
2009 Yilmaz O, Chen I. Elastic threshold-based admission control for QoS satisfaction with reward optimization for servicing multiple priority classes in wireless networks Information Processing Letters. 109: 868-875. DOI: 10.1016/J.Ipl.2009.04.013  0.645
2009 Yilmaz O, Chen I. Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks Computer Communications. 32: 317-323. DOI: 10.1016/J.Comcom.2008.11.001  0.636
2008 Cho J, Chen I, Wang D. Performance optimization of region-based group key management in mobile ad hoc networks Performance Evaluation. 65: 319-344. DOI: 10.1016/J.Peva.2007.07.002  0.632
2008 He W, Chen I. Proxy-based hybrid cache management in Mobile IP systems Information Processing Letters. 106: 26-32. DOI: 10.1016/J.Ipl.2007.09.010  0.666
2008 Cho JH, Chen IR, Eltoweissy M. On optimal batch rekeying for secure group communications in wireless networks Wireless Networks. 14: 915-927. DOI: 10.1007/S11276-007-0032-Y  0.632
2008 George SE, Chen I. Movement-based checkpointing and logging for failure recovery of database applications in mobile environments Distributed and Parallel Databases. 23: 189-205. DOI: 10.1007/S10619-008-7026-3  0.385
2007 Chen I, He W, Gu B. Proxy-based Regional Registration for Integrated Mobility and Service Management in Mobile IP Systems The Computer Journal. 50: 281-293. DOI: 10.1093/Comjnl/Bxl083  0.757
2007 Chen I, He W, Gu B. DMAP: integrated mobility and service management in mobile IPv6 systems Wireless Personal Communications. 43: 711-723. DOI: 10.1007/S11277-007-9276-1  0.757
2007 Speer AP, Chen I. Effect of redundancy on the mean time to failure of wireless sensor networks Concurrency and Computation: Practice and Experience. 19: 1119-1128. DOI: 10.1002/Cpe.1162  0.349
2006 Cheng S, Wang C, Chen I. Filtering strategies for TFC selection schemes in 3GPP W-CDMA systems Ieee Transactions On Wireless Communications. 5: 1023-1032. DOI: 10.1109/Twc.2006.1633355  0.334
2006 Chen IR, Cukic B. High asssurance software systems Computer Journal. 49: 507-508. DOI: 10.1093/Comjnl/Bxl040  0.401
2006 Hao W, Fu J, He J, Yen I, Bastani F, Chen I. Extending Proxy Caching Capability: Issues and Performance World Wide Web. 9: 253-275. DOI: 10.1007/S11280-006-8556-0  0.404
2006 Chen IR, Yilmaz O, Yen IL. Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks Wireless Personal Communications. 38: 357-376. DOI: 10.1007/S11277-006-9037-6  0.637
2005 Chen IR, Phan NA, Yen IL. Update propagation algorithms for supporting disconnected write in mobile wireless systems with data broadcasting capability Wireless Personal Communications. 34: 227-253. DOI: 10.1007/S11277-005-2845-2  0.403
2005 Chen IR, Li ST, Yen IL. Adaptive QoS control based on benefit optimization for video servers providing differentiated services Multimedia Tools and Applications. 25: 167-185. DOI: 10.1007/S11042-005-5604-1  0.437
2005 Gu B, Chen I. Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems Mobile Networks and Applications. 10: 453-463. DOI: 10.1007/S11036-005-1557-X  0.679
2004 Li S, Chen I, Hsieh H, Huang I. The Development of Web-based KTV Services over Campus Broadband Networks Journal of Internet Technology. 5: 213-219. DOI: 10.6138/Jit.2004.5.3.06  0.465
2004 Wang D, Chen I, Chu C, Yen I. Replicated Object Management with Periodic Maintenance in Mobile Wireless Systems Wireless Personal Communications. 28: 17-33. DOI: 10.1023/B:Wire.0000015418.21396.0A  0.349
2004 Chen I, Wang D, Chu C. Analyzing reconfigurable algorithms for managing replicated data Journal of Systems and Software. 72: 417-430. DOI: 10.1016/S0164-1212(03)00097-9  0.343
2003 Chen I, Verma N. A Cost-Based Admission Control Algorithm for Digital Library Multimedia Systems Storing Heterogeneous Objects The Computer Journal. 46: 645-659. DOI: 10.1093/Comjnl/46.6.645  0.411
2003 Chen I, Wang D, Chu C. Analyzing User-Perceived Dependability and Performance Characteristics of Voting Algorithms for Managing Replicated Data Distributed and Parallel Databases. 14: 199-219. DOI: 10.1023/A:1025540831715  0.373
2003 Cheng S, Chen C, Chen I. Performance evaluation of an admission control algorithm: dynamic threshold with negotiation Performance Evaluation. 52: 1-13. DOI: 10.1016/S0166-5316(02)00128-1  0.401
2002 Chen IR, Phan NA, Yen IL. Algorithms for supporting disconnected write operations for wireless web access in mobile client-server environments Ieee Transactions On Mobile Computing. 1: 46-58. DOI: 10.1109/Tmc.2002.1011058  0.435
2002 Chen IR, Gu B. A comparative cost analysis of degradable location management algorithms in wireless networks Computer Journal. 45: 304-319. DOI: 10.1093/Comjnl/45.3.304  0.639
2002 Cheng S, Chen I. A self-adjusting quality of service control scheme Information Processing Letters. 83: 337-344. DOI: 10.1016/S0020-0190(02)00212-0  0.427
2001 Yen IL, Dai L, Chen B, Chen IR. A nonblocking atomic transaction processing algorithm with real-time property International Journal of Reliability, Quality and Safety Engineering. 8: 391-408. DOI: 10.1142/S0218539301000578  0.355
2000 Chen I, Chen T, Lee C. Analysis and Comparison of Location Strategies for Reducing RegistrationCost in PCS Networks Wireless Personal Communications. 12: 117-136. DOI: 10.1023/A:1008882011422  0.475
2000 Chen I, Wang D, Chu C. Response time behavior of distributed voting algorithms for managing replicated data Information Processing Letters. 75: 247-253. DOI: 10.1016/S0020-0190(00)00111-3  0.34
2000 Cheng S, Chen C, Chen I. Dynamic quota-based admission control with sub-rating in multimedia servers Multimedia Systems. 8: 83-91. DOI: 10.1007/S005300050152  0.402
1998 Chen I, Hsi T. Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers Performance Evaluation. 33: 89-112. DOI: 10.1016/S0166-5316(98)00002-9  0.398
1996 Chen I, Wang D. Analysis of replicated data with repair dependency The Computer Journal. 39: 767-779. DOI: 10.1093/Comjnl/39.9.767  0.377
1996 Chen I, Chen C. Threshold-Based Admission Control Policies for Multimedia Servers The Computer Journal. 39: 757-766. DOI: 10.1093/Comjnl/39.9.757  0.428
1995 Chen IR, Tsao T. A Reliability Model for Real-Time Rule-Based Expert Systems Ieee Transactions On Reliability. 44: 54-62. DOI: 10.1109/24.376522  0.318
1995 Chen I. Stochastic Petri Net Analysis of Deadlock Detection Algorithms in Transaction Database Systems with Dynamic Locking The Computer Journal. 38: 717-733. DOI: 10.1093/Comjnl/38.9.717  0.345
1995 Chen I, Yen I. Analysis of probabilistic error checking procedures on storage systems The Computer Journal. 38: 348-354. DOI: 10.1093/Comjnl/38.5.348  0.339
1994 Chen I, Poole BL. Performance evaluation of rule grouping on a real-time expert system architecture Ieee Transactions On Knowledge and Data Engineering. 6: 883-891. DOI: 10.1109/69.334879  0.342
1993 Chen I, Banawan SA. Modeling and analysis of concurrent maintenance policies for data structures using pointers Ieee Transactions On Software Engineering. 19: 902-911. DOI: 10.1109/32.241772  0.344
Show low-probability matches.