default search action
Qian Chen 0019
Person information
- affiliation: University of Texas at San Antonio, Department of Electrical and Computer Engineering, San Antonio, TX, USA
- affiliation (2014 - 2017): Savannah State University, Engineering Technology Department, Savannah, GA, USA
- affiliation (PhD 2014): Mississippi State University, Department of Electrical and Computer Engineering, Starkville, MS, USA
Other persons with the same name
- Qian Chen — disambiguation page
- Qian Chen 0001 — Wakayama University, Faculty of Systems Engineering, Wakayama City, Japan (and 2 more)
- Qian Chen 0002 — Nanjing University of Science and Technology, School of Electronic and Optical Engineering, Nanjing, China (and 1 more)
- Qian Chen 0003 — Alibaba Group, DAMO Academy, Speech Lab, China (and 1 more)
- Qian Chen 0004 — Jiangsu University, School of Electrical and Information Engineering, Zhenjiang, China
- Qian Chen 0005 — Alibaba Group, Hangzhou, China (and 2 more)
- Qian Chen 0006 — Shanghai University, Shanghai Institute for Advanced Communication and Data Science, Shanghai, China
- Qian Chen 0007 — North China Electric Power University, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Source, Beijing, China
- Qian Chen 0008 — Xinjiang University, Engineering Research Center of Education Ministry for Renewable Energy Power Generation and Grid-connected Control, Urumqi, China
- Qian Chen 0009 — Brown University, Warren Alpert Medical School, Department of Orthopaedics, Providence, RI, USA
- Qian Chen 0010 — China University of Petroleum, National Engineering Laboratory for Pipeline Safety, Beijing Key Laboratory of Urban Oil and Gas Distribution Technology, Beijing, China
- Qian Chen 0011 — South China University of Technology, School of Automation Science and Engineering, Guangzhou, China
- Qian Chen 0012 — Harbin Institute of Technology, School of Electronics and Information Engineering, Harbin, China
- Qian Chen 0013 — Shenzhen University, Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen, China
- Qian Chen 0014 — Chinese University of Hong Kong, Department of Information Engineering, Hong Kong
- Qian Chen 0015 — Hefei University of Technology, School of Management, Hefei, China (and 1 more)
- Qian Chen 0016 — Tongji University, Department of Management Science and Engineering, Shanghai, China
- Qian Chen 0017 — Hohai University, College of Energy and Electrical Engineering, Nanjing, China
- Qian Chen 0018 — University of Sydney, Discipline of Operations Management and Econometrics, Sydney, Australia
- Qian Chen 0020 — Hong Kong Baptist University, Department of Computer Science, Hong Kong
- Qian Chen 0021 — National University of Singapore, Department of Electrical and Computer Engineering, Singapore
- Qian Chen 0022 — University of Southern California, Integrated Media Systems Center, Los Angeles, CA, USA
- Qian Chen 0023 — Shanxi University, School of Computer and Information Technology, Key Laboratory of Computational Intelligence and Chinese Information Processing, Taiyuan, China (and 1 more)
- Qian Chen 0024 — Dolby Labs, Sunnyvale, CA, USA (and 2 more)
- Qian Chen 0025 — Universidade do Algarve, Center of Electronics, Optoelectronics and Telecommunications, Faro, Portugal
- Qian Chen 0026 (aka: Qian (Victoria) Chen) — Ohio State University, Department of FABE, Columbus, OH, USA
- Qian Chen 0027 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
- Qian Chen 0028 — Harbin Institute of Technology, Department of Computer Science and Technology, Shenzhen, China
- Qian Chen 0029 — Shenyang Ligong University, School of Information Science and Engineering, Shenyang, China
- Qian Chen 0030 — Huazhong Agricultural University, Wuhan, Hubei, China (and 1 more)
- Qian Chen 0031 — Intel Corporation, Software and Service Group, Shanghai, China
- Qian Chen 0032 — Xidian University, State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, China
- Qian Chen 0033 — Hainan University, School of Cyberspace Security, School of Cryptology, Haikou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Krishna Chandra Roy, Guenevere Chen:
GraphCH: A Deep Framework for Assessing Cyber-Human Aspects in Insider Threat Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 4495-4509 (2024) - [j13]Zhen Li, Shasha Zhao, Chen Chen, Qian Chen:
Reducing the Impact of Time Evolution on Source Code Authorship Attribution via Domain Adaptation. ACM Trans. Softw. Eng. Methodol. 33(6): 159 (2024) - [c21]Ningbin Yang, Chunming Tang, Zehui Xiong, Qian Chen, Jiawen Kang, Debiao He:
SG-FCB: A Stackelberg Game-Driven Fair Committee-Based Blockchain Consensus Protocol. ICDCS 2024: 403-414 - 2023
- [j12]Zhen Li, Xiang Huang, Yangrui Li, Guenevere Chen:
A comparative study of adversarial training methods for neural models of source code. Future Gener. Comput. Syst. 142: 165-181 (2023) - [c20]Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad-Reza Sadeghi:
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks. ACSAC 2023: 647-661 - [i7]Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad-Reza Sadeghi:
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks. CoRR abs/2310.02113 (2023) - 2022
- [j11]Songlin He, Eric Ficke, Mir Mehedi Ahsan Pritom, Huashan Chen, Qiang Tang, Qian Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
Blockchain-based automated and robust cyber security management. J. Parallel Distributed Comput. 163: 62-82 (2022) - [c19]Zhen Li, Qian (Guenevere) Chen, Chen Chen, Yayi Zou, Shouhuai Xu:
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. ICSE 2022: 1906-1918 - [c18]Jorge Castillo, Kevin Barba, Qian Chen:
ChainSCAN: A Blockchain-Based Supply Chain Alerting Framework for Food Safety. SciSec 2022: 3-20 - [i6]Zhen Li, Guenevere Chen, Chen Chen, Yayi Zou, Shouhuai Xu:
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. CoRR abs/2202.06043 (2022) - [i5]Andong Deng, Taojiannan Yang, Chen Chen, Qian Chen, Leslie Neely, Sakiko Oyama:
Problem Behaviors Recognition in Videos using Language-Assisted Deep Learning Model for Children with Autism. CoRR abs/2211.09310 (2022) - 2021
- [j10]Weizhi Meng, Daniel Xiapu Luo, Chunhua Su, Debiao He, Marios Anagnostopoulos, Qian Chen:
Editorial for special issue on "security and privacy protection in the era of IoT devices". Digit. Commun. Networks 7(2): 245-246 (2021) - [j9]Sreenivas Sudarshan Seshadri, David Rodriguez, Mukunda Subedi, Kim-Kwang Raymond Choo, Sara Ahmed, Qian Chen, Junghee Lee:
IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems. IEEE Internet Things J. 8(5): 3346-3359 (2021) - [j8]Qian Chen, Paul Romanowich, Jorge Castillo, Krishna Chandra Roy, Gustavo Chavez, Shouhuai Xu:
ExHPD: Exploiting Human, Physical, and Driving Behaviors to Detect Vehicle Cyber Attacks. IEEE Internet Things J. 8(18): 14355-14371 (2021) - [j7]Krishna Chandra Roy, Qian Chen:
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification. Inf. Syst. Frontiers 23(2): 299-315 (2021) - [i4]Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin:
Towards Making Deep Learning-based Vulnerability Detectors Robust. CoRR abs/2108.00669 (2021) - 2020
- [j6]Robert A. Bridges, Tarrah R. Glass-Vanderlan, Michael D. Iannacone, Maria S. Vincent, Qian (Guenevere) Chen:
A Survey of Intrusion Detection Systems Leveraging Host Data. ACM Comput. Surv. 52(6): 128:1-128:35 (2020)
2010 – 2019
- 2019
- [j5]Qian Chen:
Chapter Three - Toward realizing self-protecting healthcare information systems: Design and security challenges. Adv. Comput. 114: 113-149 (2019) - [c17]Qian (Guenevere) Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges:
Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection. SciSec 2019: 199-214 - [c16]Toshifusa Sekizawa, Qian Chen, Taiju Mikoshi:
Recursive Gateway Allocation Combined with Self-localization and Model Checking in Mobile Ad-hoc Networks. SoICT 2019: 441-448 - [i3]Qian (Guenevere) Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges:
Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection. CoRR abs/1910.06469 (2019) - 2018
- [c15]Qian Chen, Azizeh Khaled Sowan, Shouhuai Xu:
A safety and security architecture for reducing accidents in intelligent transportation systems. ICCAD 2018: 95 - [c14]Mandrita Banerjee, Junghee Lee, Qian Chen, Kim-Kwang Raymond Choo:
Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design. ICCCN 2018: 1-6 - [c13]Toshifusa Sekizawa, Taiju Mikoshi, Masataka Nagura, Ryo Watanabe, Qian Chen:
Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT Devices. ICCCN 2018: 1-7 - [i2]Tarrah R. Glass-Vanderlan, Michael D. Iannacone, Maria S. Vincent, Qian (Guenevere) Chen, Robert A. Bridges:
A Survey of Intrusion Detection Systems Leveraging Host Data. CoRR abs/1805.06070 (2018) - 2017
- [j4]Chen Lin, Zhidong Shen, Qian Chen, Frederick T. Sheldon:
A data integrity verification scheme in mobile cloud computing. J. Netw. Comput. Appl. 77: 146-151 (2017) - [c12]Qian Chen, Hisham A. Kholidy, Sherif Abdelwahed, John Hamilton:
Towards Realizing a Distributed Event and Intrusion Detection System. FNSS 2017: 70-83 - [c11]Jarilyn Hernández Jiménez, Qian (Guenevere) Chen, Jeffrey Nichols, Chelsea Calhoun, Summer Sykes:
Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring. HICSS 2017: 1-7 - [c10]Qian (Guenevere) Chen, Robert A. Bridges:
Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware. ICMLA 2017: 454-460 - [i1]Qian (Guenevere) Chen, Robert A. Bridges:
Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware. CoRR abs/1709.08753 (2017) - 2016
- [j3]Qian Chen, Madhulika Trivedi, Sherif Abdelwahed, Thomas H. Morris, Frederick T. Sheldon:
Model-based autonomic security management for cyber-physical infrastructures. Int. J. Crit. Infrastructures 12(4): 273-294 (2016) - [c9]Qian Chen, Jonathan Lambright, Sherif Abdelwahed:
Towards Autonomic Security Management of Healthcare Information Systems. CHASE 2016: 113-118 - [c8]Qian Chen, Jonathan Lambright:
Towards Realizing a Self-Protecting Healthcare Information System. COMPSAC 2016: 687-690 - [c7]Stefano Iannucci, Qian Chen, Sherif Abdelwahed:
High-Performance Intrusion Response Planning on Many-Core Architectures. ICCCN 2016: 1-6 - [c6]Lei Li, Kai Qian, Qian Chen, Ragib Hasan, Guifeng Shao:
Developing Hands-on Labware for Emerging Database Security. SIGITE 2016: 60-64 - [c5]Lei Li, Kai Qian, Ragib Hasan, Qian Chen, Dalei Wu, Yong Shi:
An Open and Portable Platform for Learning Data Security in Mobile Cloud Computing. SIGITE 2016: 108 - 2015
- [j2]Qian Chen, Robert K. Abercrombie, Frederick T. Sheldon:
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC). J. Artif. Intell. Soft Comput. Res. 5(3): 205 (2015) - 2014
- [j1]Qian Chen, Sherif Abdelwahed, Abdelkarim Erradi:
A Model-Based Validated Autonomic Approach to Self-Protect Computing Systems. IEEE Internet Things J. 1(5): 446-460 (2014) - [c4]Qian Chen, Sherif Abdelwahed:
Towards realizing self-protecting SCADA systems. CISR 2014: 105-108 - [c3]Qian Chen, Sherif Abdelwahed:
A Model-based Approach to Self-Protection in SCADA Systems. Feedback Computing 2014 - 2013
- [c2]Qian Chen, Sherif Abdelwahed, Abdelkarim Erradi:
A model-based approach to self-protection in computing system. CAC 2013: 16:1-16:10 - [c1]Qian Chen, Sherif Abdelwahed, Weston Monceaux:
Towards automatic security management: a model-based approach. CSIIRW 2013: 56
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint