
Ing-Ray Chen
Person information
- affiliation: Virginia Tech, Blacksburg, Virginia, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j117]Zhen Guo
, Jin-Hee Cho
, Ing-Ray Chen
, Srijan Sengupta, Michin Hong
, Tanushree Mitra
:
Online Social Deception and Its Countermeasures: A Survey. IEEE Access 9: 1770-1806 (2021) - 2020
- [j116]Hamid Al-Hamadi
, Mohammad Saoud
, Ing-Ray Chen
, Jin-Hee Cho
:
Optimizing the Lifetime of IoT-Based Star and Mesh Networks. IEEE Access 8: 63090-63105 (2020) - [j115]Hamid Al-Hamadi
, Ing-Ray Chen
, Ding-Chau Wang
, Meshal Almashan
:
Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems. IEEE Access 8: 168994-169009 (2020) - [j114]Hamid Al-Hamadi, Ing-Ray Chen, Ding-Chau Wang
, Meshal Almashan
:
Corrections to "Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems". IEEE Access 8: 207181 (2020) - [j113]Jemish V. Maisuria, Saurabh N. Mehta, Ing-Ray Chen:
Bayesian-Based Spectrum Sensing and Optimal Channel Estimation for MAC Layer Protocol in Cognitive Radio Sensor Networks. Comput. J. 63(6): 942-957 (2020) - [j112]Gaurav Choudhary, Philip Virgil Astillo, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems. IEEE Trans. Netw. Serv. Manag. 17(4): 2496-2510 (2020) - [i4]Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra:
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey. CoRR abs/2004.07678 (2020) - [i3]Mengmeng Ge, Jin-Hee Cho, Dong Seong Kim, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception. CoRR abs/2005.04220 (2020) - [i2]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Ing-Ray Chen:
Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation. CoRR abs/2007.08469 (2020)
2010 – 2019
- 2019
- [j111]Hamid Al-Hamadi
, Ing-Ray Chen, Jin-Hee Cho:
Trust Management of Smart Service Communities. IEEE Access 7: 26362-26378 (2019) - [j110]Jin-Hee Cho
, Hamid Al-Hamadi
, Ing-Ray Chen:
COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks. IEEE Access 7: 92296-92313 (2019) - [j109]Vishal Sharma
, Ilsun You
, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems. IEEE Access 7: 118556-118580 (2019) - [j108]Ing-Ray Chen
, Jia Guo, Ding-Chau Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi
, Ilsun You
:
Trust-Based Service Management for Mobile Cloud IoT Systems. IEEE Trans. Netw. Serv. Manag. 16(1): 246-263 (2019) - [j107]Terrence J. Moore
, Jin-Hee Cho
, Ing-Ray Chen
:
Network Adaptations Under Cascading Failures for Mission-Oriented Networks. IEEE Trans. Netw. Serv. Manag. 16(3): 1184-1198 (2019) - [j106]Jia Guo, Ing-Ray Chen, Ding-Chau Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi:
Trust-Based IoT Cloud Participatory Sensing of Air Quality. Wirel. Pers. Commun. 105(4): 1461-1474 (2019) - [c96]Hamid Al-Hamadi, Ing-Ray Chen, Ding-Chau Wang:
Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems. ISADS 2019: 1-6 - 2018
- [j105]Ji Wang, Ing-Ray Chen, Jeffrey J. P. Tsai, Ding-Chau Wang:
Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks. Comput. Commun. 116: 90-100 (2018) - [j104]Jin-Hee Cho, Ing-Ray Chen:
PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks. IEEE Trans. Dependable Secur. Comput. 15(1): 151-165 (2018) - [j103]Victor Bahl, Barbara Carminati, James Caverlee, Ing-Ray Chen, Wynne Hsu, Toru Ishida, Valérie Issarny, Surya Nepal, Indrakshi Ray, Kui Ren, Shamik Sural, Mei-Ling Shyu:
Editorial. IEEE Trans. Serv. Comput. 11(1): 1-4 (2018) - [j102]Yating Wang, Ing-Ray Chen
, Jin-Hee Cho, Ananthram Swami, Yen-Cheng Lu, Chang-Tien Lu, Jeffrey J. P. Tsai:
CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks. IEEE Trans. Serv. Comput. 11(6): 908-921 (2018) - [c95]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems. CHASE 2018: 88-93 - [c94]Ing-Ray Chen, Jia Guo, Ding-Chao Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi, Ilsun You:
Trust as a Service for IoT Service Management in Smart Cities. HPCC/SmartCity/DSS 2018: 1358-1365 - [c93]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. IWCMC 2018: 560-565 - [c92]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
On IoT Misbehavior Detection in Cyber Physical Systems. PRDC 2018: 189-190 - [i1]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. CoRR abs/1807.00435 (2018) - 2017
- [j101]Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai:
A survey of trust computation models for service management in internet of things systems. Comput. Commun. 97: 1-14 (2017) - [j100]Jin-Hee Cho
, Yating Wang, Ing-Ray Chen, Kevin S. Chan, Ananthram Swami:
A Survey on Modeling and Optimizing Multi-Objective Systems. IEEE Commun. Surv. Tutorials 19(3): 1867-1901 (2017) - [j99]Hamid Al-Hamadi
, Ing-Ray Chen:
Trust-Based Decision Making for Health IoT Systems. IEEE Internet Things J. 4(5): 1408-1419 (2017) - [j98]Yating Wang, Ing-Ray Chen
, Jin-Hee Cho, Jeffrey J. P. Tsai:
Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks. IEEE Trans. Netw. Serv. Manag. 14(1): 217-232 (2017) - [j97]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Ananthram Swami, Kevin S. Chan:
Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks. IEEE Trans. Serv. Comput. 10(4): 660-672 (2017) - [c91]Jia Guo, Ing-Ray Chen, Ding-Chao Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi:
A Case Study of IoT Participatory Sensing of Hazardous Ozone Using Traces. FSDM 2017: 479-484 - [c90]Lijing Wang
, Jin-Hee Cho, Ing-Ray Chen, Jiangzhuo Chen:
PDGM: Percolation-based directed graph matching in social networks. ICC 2017: 1-7 - [c89]Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai:
A Mobile Cloud Hierarchical Trust Management Protocol for IoT Systems. MobileCloud 2017: 125-130 - 2016
- [j96]Jin-Hee Cho, Ing-Ray Chen, Kevin S. Chan:
Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Networks 44: 58-75 (2016) - [j95]Liang Zhao, Ting Hua, Chang-Tien Lu, Ing-Ray Chen:
A topic-focused trust model for Twitter. Comput. Commun. 76: 1-11 (2016) - [j94]Ing-Ray Chen, Fenye Bao, Jia Guo:
Trust-Based Service Management for Social Internet of Things Systems. IEEE Trans. Dependable Secur. Comput. 13(6): 684-696 (2016) - [j93]Robert Mitchell, Ing-Ray Chen:
Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems. IEEE Trans. Reliab. 65(1): 350-358 (2016) - [j92]Ing-Ray Chen, Jia Guo, Fenye Bao:
Trust Management for SOA-Based IoT and Its Application to Service Composition. IEEE Trans. Serv. Comput. 9(3): 482-495 (2016) - [c88]Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai, Hamid Al-Hamadi:
Trust-Based IoT Participatory Sensing for Hazard Detection and Response. ICSOC Workshops 2016: 79-84 - [c87]Nicholas Anderson, Robert Mitchell, Ing-Ray Chen:
Parameterizing Moving Target Defenses. NTMS 2016: 1-6 - [c86]Hamid Al-Hamadi, Ing-Ray Chen:
Trust-based decision making for environmental health community of interest IoT systems. WiMob 2016: 1-6 - 2015
- [j91]Ing-Ray Chen, Jia Guo:
Hierarchical trust management of community of interest groups in mobile ad hoc networks. Ad Hoc Networks 33: 154-167 (2015) - [j90]Robert Mitchell, Ing-Ray Chen:
Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems. IEEE Trans. Dependable Secur. Comput. 12(1): 16-30 (2015) - [j89]Hamid Al-Hamadi, Ing-Ray Chen:
Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 12(3): 451-466 (2015) - [j88]Hamid Al-Hamadi, Ing-Ray Chen:
Integrated Intrusion Detection and Tolerance in Homogeneous Clustered Sensor Networks. ACM Trans. Sens. Networks 11(3): 47:1-47:24 (2015) - [j87]Yating Wang, Ing-Ray Chen, Ding-Chau Wang:
A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges. Wirel. Pers. Commun. 80(4): 1607-1623 (2015) - [c85]Jia Guo, Ing-Ray Chen:
A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems. SCC 2015: 324-331 - [c84]Yating Wang, Ing-Ray Chen, Jin-Hee Cho:
Trust-Based Task Assignment in Autonomous Service-Oriented Ad Hoc Networks. ISADS 2015: 71-77 - [c83]Ing-Ray Chen, Robert Mitchell, Jin-Hee Cho:
On modeling of adversary behavior and defense for survivability of military MANET applications. MILCOM 2015: 629-634 - 2014
- [j86]Ing-Ray Chen, Jia Guo, Fenye Bao
, Jin-Hee Cho:
Trust management in mobile ad hoc networks for bias minimization and application performance maximization. Ad Hoc Networks 19: 59-74 (2014) - [j85]Ing-Ray Chen, Yinan Li, Robert Mitchell, Ding-Chau Wang:
Scalable and efficient dual-region based mobility management for ad hoc networks. Ad Hoc Networks 23: 52-64 (2014) - [j84]Robert Mitchell, Ing-Ray Chen:
A survey of intrusion detection in wireless network applications. Comput. Commun. 42: 1-23 (2014) - [j83]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing. IEEE Trans. Parallel Distributed Syst. 25(5): 1200-1210 (2014) - [j82]Robert Mitchell, Ing-Ray Chen:
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications. IEEE Trans. Syst. Man Cybern. Syst. 44(5): 593-604 (2014) - [c82]Ing-Ray Chen, Jia Guo:
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection. AINA 2014: 49-56 - [c81]Ji Wang, Ing-Ray Chen:
Trust-based data fusion mechanism design in cognitive radio networks. CNS 2014: 53-59 - [c80]Ing-Ray Chen, Jia Guo, Fenye Bao:
Trust management for service composition in SOA-based IoT systems. WCNC 2014: 3444-3449 - 2013
- [j81]Yinan Li, Ing-Ray Chen:
Dynamic agent-based hierarchical multicast for wireless mesh networks. Ad Hoc Networks 11(6): 1683-1698 (2013) - [j80]Jin-Hee Cho, Ing-Ray Chen:
On the tradeoff between altruism and selfishness in MANET trust management. Ad Hoc Networks 11(8): 2217-2234 (2013) - [j79]Yinan Li, Ing-Ray Chen:
Hierarchical agent-based secure and reliable multicast in wireless mesh networks. Comput. Commun. 36(14): 1515-1526 (2013) - [j78]Robert Mitchell, Ing-Ray Chen:
A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 46(4): 55:1-55:29 (2013) - [j77]Hamid Al-Hamadi, Ing-Ray Chen:
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 10(2): 189-203 (2013) - [j76]Robert Mitchell, Ing-Ray Chen:
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems. IEEE Trans. Reliab. 62(1): 199-210 (2013) - [j75]Robert Mitchell, Ing-Ray Chen:
Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications. IEEE Trans. Smart Grid 4(3): 1254-1263 (2013) - [j74]Robert Mitchell, Ing-Ray Chen:
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection. Wirel. Pers. Commun. 68(4): 1377-1391 (2013) - [j73]Ding-Chau Wang, Weiping He, Ing-Ray Chen:
Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems. Wirel. Pers. Commun. 69(1): 449-469 (2013) - [c79]Yunqi Ye, Liangliang Xiao, Yinzi Chen, I-Ling Yen, Farokh B. Bastani, Ing-Ray Chen:
Access Protocols in Data Partitioning Based Cloud Storage. IEEE CLOUD 2013: 398-405 - [c78]Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho:
Integrated social and quality of service trust management of mobile groups in ad hoc networks. ICICS 2013: 1-5 - [c77]Hamid Al-Hamadi, Ing-Ray Chen:
Adaptive network management for countering selective capture in wireless sensor networks. CNSM 2013: 203-210 - [c76]Jin-Hee Cho, Ing-Ray Chen, Yating Wang, Kevin S. Chan:
Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks. ICPADS 2013: 372-379 - [c75]Yinan Li, Ing-Ray Chen, Ding-Chau Wang:
Dual-Region Location Management for Mobile Ad Hoc Networks. ICPADS 2013: 388-395 - [c74]Hamid Al-Hamadi, Ing-Ray Chen:
Dynamic multisource multipath routing for intrusion tolerance and lifetime maximization of autonomous wireless sensor networks. ISADS 2013: 1-7 - [c73]Fenye Bao, Ing-Ray Chen, Jia Guo:
Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems. ISADS 2013: 1-7 - [c72]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Kevin S. Chan, Ananthram Swami:
Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives. MILCOM 2013: 1862-1867 - [c71]Jin-Hee Cho, Kevin S. Chan, Ing-Ray Chen:
Composite trust-based public key management in mobile ad hoc networks. SAC 2013: 1949-1956 - 2012
- [j72]Ing-Ray Chen, Yating Wang:
Reliability Analysis of Wireless Sensor Networks with Distributed Code Attestation. IEEE Commun. Lett. 16(10): 1640-1643 (2012) - [j71]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 35(3): 1001-1012 (2012) - [j70]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 9(2): 169-183 (2012) - [j69]Yinan Li, Ing-Ray Chen:
Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding. IEEE Trans. Netw. Serv. Manag. 9(3): 226-239 (2012) - [j68]Weiping He, Ing-Ray Chen, Ding-Chau Wang:
DMAP-FR: Dynamic Mobility Anchor Points for Mobility, Service and Failure Recovery Management in Mobile IPv6 Systems. Wirel. Pers. Commun. 62(3): 479-496 (2012) - [j67]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks. Wirel. Pers. Commun. 66(2): 443-459 (2012) - [c70]Bingsheng Wang, Haili Dong, Arnold P. Boedihardjo, Chang-Tien Lu, Harland Yu, Ing-Ray Chen, Jing Dai:
An integrated framework for spatio-temporal-textual search and mining. SIGSPATIAL/GIS 2012: 570-573 - [c69]Robert Mitchell, Ing-Ray Chen:
Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems. ICCCN 2012: 1-7 - [c68]Jin-Hee Cho, Moonjeong Chang, Ing-Ray Chen, Ananthram Swami:
A Provenance-Based Trust Model for Delay Tolerant Networks. IFIPTM 2012: 52-67 - [c67]Hamid Al-Hamadi, Ing-Ray Chen:
Energy vs. QoS Tradeoff Analysis of Multipath Routing Protocols for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. ISPA 2012: 387-394 - [c66]Fenye Bao, Ing-Ray Chen:
Trust management for the internet of things and its application to service composition. WOWMOM 2012: 1-6 - 2011
- [j66]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Commun. Surv. Tutorials 13(4): 562-583 (2011) - [j65]Yinan Li, Ing-Ray Chen:
Adaptive per-user per-object cache consistency management for mobile data access in wireless mesh networks. J. Parallel Distributed Comput. 71(7): 1034-1046 (2011) - [j64]Jin-Hee Cho, Ing-Ray Chen:
Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Perform. Evaluation 68(1): 58-75 (2011) - [j63]Ing-Ray Chen, Anh Phan Speer, Mohamed Eltoweissy:
Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(2): 161-176 (2011) - [j62]Yinan Li, Ing-Ray Chen:
Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks. IEEE Trans. Mob. Comput. 10(3): 349-361 (2011) - [j61]Jin-Hee Cho, Ing-Ray Chen:
Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems. Wirel. Pers. Commun. 60(4): 725-750 (2011) - [c65]Sumit Shah, Fenye Bao, Chang-Tien Lu, Ing-Ray Chen:
CROWDSAFE: crowd sourcing of crime incidents and safe routing on mobile devices. GIS 2011: 521-524 - [c64]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Trust-Based Intrusion Detection in Wireless Sensor Networks. ICC 2011: 1-6 - [c63]Yinan Li, Ing-Ray Chen:
Hierarchical Agent-Based Secure Multicast for Wireless Mesh Networks. ICC 2011: 1-6 - [c62]Moonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho:
Trust-Threshold Based Routing in Delay Tolerant Networks. IFIPTM 2011: 265-276 - [c61]Robert Mitchell, Ing-Ray Chen:
Survivability analysis of mobile cyber physical systems with voting-based intrusion detection. IWCMC 2011: 2256-2261 - [c60]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical trust management for wireless sensor networks and its application to trust-based routing. SAC 2011: 1732-1738 - [c59]Robert Mitchell, Ing-Ray Chen:
A hierarchical performance model for intrusion detection in cyber-physical systems. WCNC 2011: 2095-2100 - 2010
- [j60]Ing-Ray Chen, Yating Wang, Ding-Chau Wang:
Reliability of wireless sensors with code attestation for intrusion detection. Inf. Process. Lett. 110(17): 778-786 (2010) - [j59]Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks. IEEE Trans. Reliab. 59(1): 231-241 (2010) - [j58]Jin-Hee Cho, Ing-Ray Chen:
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Wirel. Networks 16(4): 1157-1173 (2010) - [j57]Okan Yilmaz, Ing-Ray Chen, Gregory Kulczycki, William B. Frakes:
Performance Analysis of Spillover-Partitioning Call Admission Control in Mobile Wireless Networks. Wirel. Pers. Commun. 53(1): 111-131 (2010) - [j56]Ing-Ray Chen, Ding-Chau Wang:
Regional Registration-Based Mobile Multicast Service Management in Mobile IP Networks. Wirel. Pers. Commun. 54(4): 635-649 (2010) - [c58]Ramy Eltarras, Mohamed Eltoweissy, Stephan Olariu, Ing-Ray Chen:
Towards trustworthy shared networked sensor-actuator systems. CSIIRW 2010: 43 - [c57]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Trust Management for Encounter-Based Routing in Delay Tolerant Networks. GLOBECOM 2010: 1-6 - [c56]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs. IFIPTM 2010: 141-156 - [c55]Yinan Li, Ing-Ray Chen:
APPCCM: Adaptive per-user per-object cache consistency management for mobile client-server applications in wireless mesh networks. LCN 2010: 128-135 - [c54]Weiping He, Ing-Ray Chen, Ding-Chau Wang:
Cross-layer integrated mobility and service management utilizing smart routers in mobile IPv6 systems. MoMM 2010: 140-147
2000 – 2009
- 2009
- [j55]Okan Yilmaz, Ing-Ray Chen:
Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks. Comput. Commun. 32(2): 317-323 (2009) - [j54]Jeffery W. Wilson, Ing-Ray Chen:
Performance characteristics of location-based group membership and data consistency algorithms in mobile ad hoc networks. Int. J. Pervasive Comput. Commun. 5(4): 497-516 (2009) - [j53]Okan Yilmaz, Ing-Ray Chen:
Elastic threshold-based admission control for QoS satisfaction with reward optimization for servicing multiple priority classes in wireless networks. Inf. Process. Lett. 109(15): 868-875 (2009) - [j52]Weiping He, Ing-Ray Chen:
A proxy-based integrated cache consistency and mobility management scheme for client-server applications in Mobile IP systems. J. Parallel Distributed Comput. 69(6): 559-572 (2009) - [c53]Okan Yilmaz, Ing-Ray Chen:
Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless Networks. AINA 2009: 463-470 - [c52]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. CSE (2) 2009: 641-650 - [c51]Ing-Ray Chen, Anh Ngoc Speer, Mohamed Eltoweissy:
Dynamic adaptive redundancy for quality-of-service control in wireless sensor networks. IPDPS 2009: 1-8 - [c50]Jin-Hee Cho, Ing-Ray Chen:
Performance analysis of distributed intrusion detection protocols for mobile group communication systems. IPDPS 2009: 1-8 - [c49]Ing-Ray Chen, Ding-Chau Wang:
On the Reliability of Wireless Sensors with Software-Based Attestation for Intrusion Detection. ISPAN 2009: 184-189 - [c48]Weiping He, Ing-Ray Chen:
DMAP-FR: Integrated Mobility and Service Management with Failure Recovery Support for Mobile IPv6 Systems. ITNG 2009: 1165-1170 - [c47]Robert Mitchell, Ing-Ray Chen, Mohamed Eltoweissy:
Signalprint-Based Intrusion Detection in Wireless Networks. SEWCN 2009: 77-88 - 2008
- [j51]Sapna E. George, Ing-Ray Chen:
Movement-based checkpointing and logging for failure recovery of database applications in mobile environments. Distributed Parallel Databases 23(3): 189-205 (2008) - [j50]Weiping He, Ing-Ray Chen:
Proxy-based hybrid cache management in Mobile IP systems. Inf. Process. Lett. 106(1): 26-32 (2008) - [j49]