Year |
Citation |
Score |
2020 |
Wang D, Chen I, Al-Hamadi H. Reliability of Autonomous Internet of Things Systems With Intrusion Detection Attack-Defense Game Design Ieee Transactions On Reliability. 1-12. DOI: 10.1109/Tr.2020.2983610 |
0.31 |
|
2020 |
Choudhary G, Astillo PV, You I, Yim K, Chen I, Cho J. Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems Ieee Transactions On Network and Service Management. 1-1. DOI: 10.1109/Tnsm.2020.3007535 |
0.52 |
|
2020 |
Al-Hamadi H, Saoud M, Chen I, Cho J. Optimizing the Lifetime of IoT-Based Star and Mesh Networks Ieee Access. 8: 63090-63105. DOI: 10.1109/Access.2020.2983873 |
0.636 |
|
2019 |
Moore TJ, Cho J, Chen I. Network Adaptations Under Cascading Failures for Mission-Oriented Networks Ieee Transactions On Network and Service Management. 16: 1184-1198. DOI: 10.1109/Tnsm.2019.2917934 |
0.62 |
|
2019 |
Chen I, Guo J, Wang D, Tsai JJP, Al-Hamadi H, You I. Trust-Based Service Management for Mobile Cloud IoT Systems Ieee Transactions On Network and Service Management. 16: 246-263. DOI: 10.1109/Tnsm.2018.2886379 |
0.504 |
|
2019 |
Cho J, Al-Hamadi H, Chen I. COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks Ieee Access. 7: 92296-92313. DOI: 10.1109/Access.2019.2927729 |
0.58 |
|
2019 |
Sharma V, You I, Yim K, Chen I, Cho J. BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems Ieee Access. 7: 118556-118580. DOI: 10.1109/Access.2019.2917135 |
0.587 |
|
2019 |
Al-Hamadi H, Chen I, Cho J. Trust Management of Smart Service Communities Ieee Access. 7: 26362-26378. DOI: 10.1109/Access.2019.2901023 |
0.598 |
|
2019 |
Guo J, Chen I, Wang D, Tsai JJP, Al-Hamadi H. Trust-Based IoT Cloud Participatory Sensing of Air Quality Wireless Personal Communications. 105: 1461-1474. DOI: 10.1007/S11277-019-06154-Y |
0.343 |
|
2018 |
Wang Y, Chen I, Cho J, Swami A, Lu Y, Lu C, Tsai JJP. CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks Ieee Transactions On Services Computing. 11: 908-921. DOI: 10.1109/Tsc.2016.2587259 |
0.655 |
|
2018 |
Cho J, Chen I. PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks Ieee Transactions On Dependable and Secure Computing. 15: 151-165. DOI: 10.1109/Tdsc.2016.2530705 |
0.652 |
|
2018 |
Wang J, Chen I, Tsai JJP, Wang D. Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks Computer Communications. 116: 90-100. DOI: 10.1016/J.Comcom.2017.11.010 |
0.357 |
|
2017 |
Wang Y, Chen I, Cho J, Swami A, Chan KS. Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks Ieee Transactions On Services Computing. 10: 660-672. DOI: 10.1109/Tsc.2015.2491285 |
0.66 |
|
2017 |
Wang Y, Chen I, Cho J, Tsai JJP. Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks Ieee Transactions On Network and Service Management. 14: 217-232. DOI: 10.1109/Tnsm.2016.2636454 |
0.672 |
|
2017 |
Cho J, Wang Y, Chen I, Chan KS, Swami A. A Survey on Modeling and Optimizing Multi-Objective Systems Ieee Communications Surveys and Tutorials. 19: 1867-1901. DOI: 10.1109/Comst.2017.2698366 |
0.544 |
|
2017 |
Guo J, Chen I, Tsai JJP. A survey of trust computation models for service management in internet of things systems Computer Communications. 97: 1-14. DOI: 10.1016/J.Comcom.2016.10.012 |
0.433 |
|
2016 |
Chen IR, Guo J, Bao F. Trust Management for SOA-Based IoT and Its Application to Service Composition Ieee Transactions On Services Computing. 9: 482-495. DOI: 10.1109/Tsc.2014.2365797 |
0.651 |
|
2016 |
Chen I, Bao F, Guo J. Trust-Based Service Management for Social Internet of Things Systems Ieee Transactions On Dependable and Secure Computing. 13: 684-696. DOI: 10.1109/Tdsc.2015.2420552 |
0.572 |
|
2016 |
Zhao L, Hua T, Lu CT, Chen IR. A topic-focused trust model for Twitter Computer Communications. 76: 1-11. DOI: 10.1016/J.Comcom.2015.08.001 |
0.323 |
|
2015 |
Mitchell R, Chen IR. Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems Ieee Transactions On Reliability. DOI: 10.1109/Tr.2015.2406860 |
0.303 |
|
2015 |
Al-Hamadi H, Chen IR. Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks Ieee Transactions On Network and Service Management. 12: 451-466. DOI: 10.1109/Tnsm.2015.2441059 |
0.422 |
|
2015 |
Wang Y, Chen IR, Wang DC. A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges Wireless Personal Communications. 80: 1607-1623. DOI: 10.1007/S11277-014-2102-7 |
0.324 |
|
2014 |
Chen I, Bao F, Chang M, Cho J. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing Ieee Transactions On Parallel and Distributed Systems. 25: 1200-1210. DOI: 10.1109/Tpds.2013.116 |
0.721 |
|
2014 |
Mitchell R, Chen I. Review: A survey of intrusion detection in wireless network applications Computer Communications. 42: 1-23. DOI: 10.1016/J.Comcom.2014.01.012 |
0.443 |
|
2013 |
Mitchell R, Chen I. Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications Ieee Transactions On Smart Grid. 4: 1254-1263. DOI: 10.1109/Tsg.2013.2258948 |
0.344 |
|
2013 |
Mitchell R, Chen I. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Ieee Transactions On Reliability. 62: 199-210. DOI: 10.1109/Tr.2013.2240891 |
0.323 |
|
2013 |
Al-Hamadi H, Chen I. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks Ieee Transactions On Network and Service Management. 10: 189-203. DOI: 10.1109/Tnsm.2013.043013.120282 |
0.485 |
|
2013 |
Li Y, Chen I. Hierarchical agent-based secure and reliable multicast in wireless mesh networks Computer Communications. 36: 1515-1526. DOI: 10.1016/J.Comcom.2013.07.006 |
0.558 |
|
2013 |
Wang D, He W, Chen I. Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems Wireless Personal Communications. 69: 449-469. DOI: 10.1007/S11277-012-0583-9 |
0.674 |
|
2013 |
Mitchell R, Chen I. On Survivability of Mobile Cyber Physical Systems with Intrusion Detection Wireless Personal Communications. 68: 1377-1391. DOI: 10.1007/S11277-012-0528-3 |
0.377 |
|
2012 |
Li Y, Chen I. Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding Ieee Transactions On Network and Service Management. 9: 226-239. DOI: 10.1109/Tnsm.2012.051712.100101 |
0.523 |
|
2012 |
Bao F, Chen I, Chang M, Cho J. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Ieee Transactions On Network and Service Management. 9: 169-183. DOI: 10.1109/Tcomm.2012.031912.110179 |
0.713 |
|
2012 |
Chen I, Wang Y. Reliability Analysis of Wireless Sensor Networks with Distributed Code Attestation Ieee Communications Letters. 16: 1640-1643. DOI: 10.1109/Lcomm.2012.091212.121454 |
0.334 |
|
2012 |
Cho J, Swami A, Chen I. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks Journal of Network and Computer Applications. 35: 1001-1012. DOI: 10.1016/J.Jnca.2011.03.016 |
0.648 |
|
2012 |
Chen I, Bao F, Chang M, Cho J. Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks Wireless Personal Communications. 66: 443-459. DOI: 10.1007/S11277-011-0351-2 |
0.711 |
|
2012 |
He W, Chen I, Wang D. DMAP-FR: Dynamic Mobility Anchor Points for Mobility, Service and Failure Recovery Management in Mobile IPv6 Systems Wireless Personal Communications. 62: 479-496. DOI: 10.1007/S11277-010-0065-X |
0.659 |
|
2011 |
Li Y, Chen I. Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks Ieee Transactions On Mobile Computing. 10: 349-361. DOI: 10.1109/Tmc.2010.166 |
0.511 |
|
2011 |
Chen IR, Speer AP, Eltoweissy M. Adaptive fault-tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks Ieee Transactions On Dependable and Secure Computing. 8: 161-176. DOI: 10.1109/Tdsc.2009.54 |
0.382 |
|
2011 |
Cho J, Swami A, Chen I. A Survey on Trust Management for Mobile Ad Hoc Networks Ieee Communications Surveys and Tutorials. 13: 562-583. DOI: 10.1109/Surv.2011.092110.00088 |
0.646 |
|
2011 |
Cho J, Chen I. Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks Performance Evaluation. 68: 58-75. DOI: 10.1016/J.Peva.2010.09.005 |
0.662 |
|
2011 |
Li Y, Chen I. Adaptive per-user per-object cache consistency management for mobile data access in wireless mesh networks Journal of Parallel and Distributed Computing. 71: 1034-1046. DOI: 10.1016/J.Jpdc.2011.03.001 |
0.482 |
|
2011 |
Cho J, Chen I. Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems Wireless Personal Communications. 60: 725-750. DOI: 10.1007/S11277-010-9971-1 |
0.633 |
|
2010 |
Cho J, Chen I, Feng P. Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks Ieee Transactions On Reliability. 59: 231-241. DOI: 10.1109/Tr.2010.2040534 |
0.633 |
|
2010 |
Chen I, Wang Y, Wang D. Reliability of wireless sensors with code attestation for intrusion detection Information Processing Letters. 110: 778-786. DOI: 10.1016/J.Ipl.2010.06.007 |
0.335 |
|
2010 |
Chen I, Wang D. Regional Registration-Based Mobile Multicast Service Management in Mobile IP Networks Wireless Personal Communications. 54: 635-649. DOI: 10.1007/S11277-009-9745-9 |
0.533 |
|
2010 |
Yilmaz O, Chen I, Kulczycki G, Frakes WB. Performance Analysis of Spillover-Partitioning Call Admission Control in Mobile Wireless Networks Wireless Personal Communications. 53: 111-131. DOI: 10.1007/S11277-009-9673-8 |
0.646 |
|
2010 |
Cho J, Chen I. Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks Wireless Networks. 16: 1157-1173. DOI: 10.1007/S11276-009-0194-X |
0.633 |
|
2009 |
Wilson JW, Chen I. Performance characteristics of location‐based group membership and data consistency algorithms in mobile ad hoc networks International Journal of Pervasive Computing and Communications. 5: 497-516. DOI: 10.1108/17427370911008866 |
0.454 |
|
2009 |
He W, Chen I. A proxy-based integrated cache consistency and mobility management scheme for client-server applications in Mobile IP systems Journal of Parallel and Distributed Computing. 69: 559-572. DOI: 10.1016/J.Jpdc.2009.02.003 |
0.671 |
|
2009 |
Yilmaz O, Chen I. Elastic threshold-based admission control for QoS satisfaction with reward optimization for servicing multiple priority classes in wireless networks Information Processing Letters. 109: 868-875. DOI: 10.1016/J.Ipl.2009.04.013 |
0.645 |
|
2009 |
Yilmaz O, Chen I. Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks Computer Communications. 32: 317-323. DOI: 10.1016/J.Comcom.2008.11.001 |
0.636 |
|
2008 |
Cho J, Chen I, Wang D. Performance optimization of region-based group key management in mobile ad hoc networks Performance Evaluation. 65: 319-344. DOI: 10.1016/J.Peva.2007.07.002 |
0.632 |
|
2008 |
He W, Chen I. Proxy-based hybrid cache management in Mobile IP systems Information Processing Letters. 106: 26-32. DOI: 10.1016/J.Ipl.2007.09.010 |
0.666 |
|
2008 |
Cho JH, Chen IR, Eltoweissy M. On optimal batch rekeying for secure group communications in wireless networks Wireless Networks. 14: 915-927. DOI: 10.1007/S11276-007-0032-Y |
0.632 |
|
2008 |
George SE, Chen I. Movement-based checkpointing and logging for failure recovery of database applications in mobile environments Distributed and Parallel Databases. 23: 189-205. DOI: 10.1007/S10619-008-7026-3 |
0.385 |
|
2007 |
Chen I, He W, Gu B. Proxy-based Regional Registration for Integrated Mobility and Service Management in Mobile IP Systems The Computer Journal. 50: 281-293. DOI: 10.1093/Comjnl/Bxl083 |
0.757 |
|
2007 |
Chen I, He W, Gu B. DMAP: integrated mobility and service management in mobile IPv6 systems Wireless Personal Communications. 43: 711-723. DOI: 10.1007/S11277-007-9276-1 |
0.757 |
|
2007 |
Speer AP, Chen I. Effect of redundancy on the mean time to failure of wireless sensor networks Concurrency and Computation: Practice and Experience. 19: 1119-1128. DOI: 10.1002/Cpe.1162 |
0.349 |
|
2006 |
Cheng S, Wang C, Chen I. Filtering strategies for TFC selection schemes in 3GPP W-CDMA systems Ieee Transactions On Wireless Communications. 5: 1023-1032. DOI: 10.1109/Twc.2006.1633355 |
0.334 |
|
2006 |
Chen IR, Cukic B. High asssurance software systems Computer Journal. 49: 507-508. DOI: 10.1093/Comjnl/Bxl040 |
0.401 |
|
2006 |
Hao W, Fu J, He J, Yen I, Bastani F, Chen I. Extending Proxy Caching Capability: Issues and Performance World Wide Web. 9: 253-275. DOI: 10.1007/S11280-006-8556-0 |
0.404 |
|
2006 |
Chen IR, Yilmaz O, Yen IL. Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks Wireless Personal Communications. 38: 357-376. DOI: 10.1007/S11277-006-9037-6 |
0.637 |
|
2005 |
Chen IR, Phan NA, Yen IL. Update propagation algorithms for supporting disconnected write in mobile wireless systems with data broadcasting capability Wireless Personal Communications. 34: 227-253. DOI: 10.1007/S11277-005-2845-2 |
0.403 |
|
2005 |
Chen IR, Li ST, Yen IL. Adaptive QoS control based on benefit optimization for video servers providing differentiated services Multimedia Tools and Applications. 25: 167-185. DOI: 10.1007/S11042-005-5604-1 |
0.437 |
|
2005 |
Gu B, Chen I. Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems Mobile Networks and Applications. 10: 453-463. DOI: 10.1007/S11036-005-1557-X |
0.679 |
|
2004 |
Li S, Chen I, Hsieh H, Huang I. The Development of Web-based KTV Services over Campus Broadband Networks Journal of Internet Technology. 5: 213-219. DOI: 10.6138/Jit.2004.5.3.06 |
0.465 |
|
2004 |
Wang D, Chen I, Chu C, Yen I. Replicated Object Management with Periodic Maintenance in Mobile Wireless Systems Wireless Personal Communications. 28: 17-33. DOI: 10.1023/B:Wire.0000015418.21396.0A |
0.349 |
|
2004 |
Chen I, Wang D, Chu C. Analyzing reconfigurable algorithms for managing replicated data Journal of Systems and Software. 72: 417-430. DOI: 10.1016/S0164-1212(03)00097-9 |
0.343 |
|
2003 |
Chen I, Verma N. A Cost-Based Admission Control Algorithm for Digital Library Multimedia Systems Storing Heterogeneous Objects The Computer Journal. 46: 645-659. DOI: 10.1093/Comjnl/46.6.645 |
0.411 |
|
2003 |
Chen I, Wang D, Chu C. Analyzing User-Perceived Dependability and Performance Characteristics of Voting Algorithms for Managing Replicated Data Distributed and Parallel Databases. 14: 199-219. DOI: 10.1023/A:1025540831715 |
0.373 |
|
2003 |
Cheng S, Chen C, Chen I. Performance evaluation of an admission control algorithm: dynamic threshold with negotiation Performance Evaluation. 52: 1-13. DOI: 10.1016/S0166-5316(02)00128-1 |
0.401 |
|
2002 |
Chen IR, Phan NA, Yen IL. Algorithms for supporting disconnected write operations for wireless web access in mobile client-server environments Ieee Transactions On Mobile Computing. 1: 46-58. DOI: 10.1109/Tmc.2002.1011058 |
0.435 |
|
2002 |
Chen IR, Gu B. A comparative cost analysis of degradable location management algorithms in wireless networks Computer Journal. 45: 304-319. DOI: 10.1093/Comjnl/45.3.304 |
0.639 |
|
2002 |
Cheng S, Chen I. A self-adjusting quality of service control scheme Information Processing Letters. 83: 337-344. DOI: 10.1016/S0020-0190(02)00212-0 |
0.427 |
|
2001 |
Yen IL, Dai L, Chen B, Chen IR. A nonblocking atomic transaction processing algorithm with real-time property International Journal of Reliability, Quality and Safety Engineering. 8: 391-408. DOI: 10.1142/S0218539301000578 |
0.355 |
|
2000 |
Chen I, Chen T, Lee C. Analysis and Comparison of Location Strategies for Reducing RegistrationCost in PCS Networks Wireless Personal Communications. 12: 117-136. DOI: 10.1023/A:1008882011422 |
0.475 |
|
2000 |
Chen I, Wang D, Chu C. Response time behavior of distributed voting algorithms for managing replicated data Information Processing Letters. 75: 247-253. DOI: 10.1016/S0020-0190(00)00111-3 |
0.34 |
|
2000 |
Cheng S, Chen C, Chen I. Dynamic quota-based admission control with sub-rating in multimedia servers Multimedia Systems. 8: 83-91. DOI: 10.1007/S005300050152 |
0.402 |
|
1998 |
Chen I, Hsi T. Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers Performance Evaluation. 33: 89-112. DOI: 10.1016/S0166-5316(98)00002-9 |
0.398 |
|
1996 |
Chen I, Wang D. Analysis of replicated data with repair dependency The Computer Journal. 39: 767-779. DOI: 10.1093/Comjnl/39.9.767 |
0.377 |
|
1996 |
Chen I, Chen C. Threshold-Based Admission Control Policies for Multimedia Servers The Computer Journal. 39: 757-766. DOI: 10.1093/Comjnl/39.9.757 |
0.428 |
|
1995 |
Chen IR, Tsao T. A Reliability Model for Real-Time Rule-Based Expert Systems Ieee Transactions On Reliability. 44: 54-62. DOI: 10.1109/24.376522 |
0.318 |
|
1995 |
Chen I. Stochastic Petri Net Analysis of Deadlock Detection Algorithms in Transaction Database Systems with Dynamic Locking The Computer Journal. 38: 717-733. DOI: 10.1093/Comjnl/38.9.717 |
0.345 |
|
1995 |
Chen I, Yen I. Analysis of probabilistic error checking procedures on storage systems The Computer Journal. 38: 348-354. DOI: 10.1093/Comjnl/38.5.348 |
0.339 |
|
1994 |
Chen I, Poole BL. Performance evaluation of rule grouping on a real-time expert system architecture Ieee Transactions On Knowledge and Data Engineering. 6: 883-891. DOI: 10.1109/69.334879 |
0.342 |
|
1993 |
Chen I, Banawan SA. Modeling and analysis of concurrent maintenance policies for data structures using pointers Ieee Transactions On Software Engineering. 19: 902-911. DOI: 10.1109/32.241772 |
0.344 |
|
Show low-probability matches. |