default search action
Thomas M. Chen
Person information
- affiliation: City University of London, Department of Electrical & Electronic Engineering, UK
- affiliation: Swansea University, College of Engineering, UK
- affiliation: Southern Methodist University, Dallas, TX, USA
- affiliation: GTE Laboratories, Waltham, MA, USA
- affiliation (PhD 1990): University of California, Berkeley, CA, USA
Other persons with the same name
- Tom Chen — disambiguation page
- Tom Chen 0001 (aka: Thomas Chen 0001, Tom W. Chen, Thomas W. Chen) — Colorado State University, Department of Electrical and Computer Engineering, Fort Collins, CO, USA
- Tom Chen 0002 (aka: Thomas W. Y. Chen, Thomas Wen-Yao Chen) — Taiwan Semiconductor Manufacturing Company, Hsin-Chu, Taiwan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]S. Krishnaveni, Thomas M. Chen, Mithileysh Sathiyanarayanan, B. Amutha:
CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems. Clust. Comput. 27(6): 7273-7306 (2024) - 2023
- [j48]Mohamed Chahine Ghanem, Thomas M. Chen, Mohamed Amine Ferrag, Mohyi E. Kettouche:
ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance. IEEE Access 11: 129840-129853 (2023) - [j47]Mohamed Chahine Ghanem, Thomas M. Chen, Erivelton G. Nepomuceno:
Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks. J. Intell. Inf. Syst. 60(2): 281-303 (2023) - [c25]S. Pravinth Raja, Shaleen Bhatnagar, Ruchi Vyas, Thomas M. Chen, Mithileysh Sathiyanarayanan:
Malicious Bot Detection in Large Scale IoT Network Using Unsupervised Machine Learning Technique. FICTA (1) 2023: 605-614 - [i6]Mohamed Chahine Ghanem, Thomas M. Chen, Mohamed Amine Ferrag, Mohyi E. Kettouche:
ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance. CoRR abs/2307.10967 (2023) - 2022
- [j46]Jamal F. Hwaidi, Thomas M. Chen:
Classification of Motor Imagery EEG Signals Based on Deep Autoencoder and Convolutional Neural Network Approach. IEEE Access 10: 48071-48081 (2022) - [j45]Pu Gong, Thomas M. Chen, Peng Xu:
Resource-Conserving Protection against Energy Draining (RCPED) Routing Protocol for Wireless Sensor Networks. Network 2(1): 83-105 (2022) - [i5]Riad Ibadulla, Thomas M. Chen, Constantino Carlos Reyes-Aldasoro:
FatNet: High Resolution Kernels for Classification Using Fully Convolutional Optical Neural Networks. CoRR abs/2210.16914 (2022) - 2021
- [c24]Jamal F. Hwaidi, Thomas M. Chen:
A Novel KOSFS Feature Selection Algorithm for EEG Signals. EUROCON 2021: 265-268 - [c23]Jamal F. Hwaidi, Thomas M. Chen:
A Noise Removal Approach from EEG Recordings Based on Variational Autoencoders. ICCAE 2021: 19-23 - [c22]Ali Hussein Raheem, Rand Raheem, Thomas M. Chen, Ahmed Alkhayyat:
Estimation of Ransomware Payments in Bitcoin Ecosystem. ISPA/BDCloud/SocialCom/SustainCom 2021: 1667-1674 - 2020
- [j44]Mohamed Chahine Ghanem, Thomas M. Chen:
Reinforcement Learning for Efficient Network Penetration Testing. Inf. 11(1): 6 (2020)
2010 – 2019
- 2019
- [c21]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect. SSR 2019: 35-44 - [p3]Jorge Blasco, Thomas M. Chen, Harsh Kupwade Patil, Daniel Wolff:
Wearables Security and Privacy. Mission-Oriented Sensor Networks and Systems (2) 2019: 351-380 - [p2]Thomas M. Chen, Jorge Blasco, Harsh Kupwade Patil:
Cryptography in WSNs. Mission-Oriented Sensor Networks and Systems (1) 2019: 783-820 - [i4]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect. CoRR abs/1901.08960 (2019) - 2018
- [j43]Ruben Martinez-Sandoval, Antonio-Javier García-Sánchez, Joan García-Haro, Thomas M. Chen:
Optimal Policy Derivation for Transmission Duty-Cycle Constrained LPWAN. IEEE Internet Things J. 5(4): 3114-3125 (2018) - [j42]Jorge Blasco, Thomas M. Chen, Igor Muttik, Markus Roggenbach:
Detection of app collusion potential using logic programming. J. Netw. Comput. Appl. 105: 88-104 (2018) - [j41]Jorge Blasco, Thomas M. Chen:
Automated generation of colluding apps for experimental research. J. Comput. Virol. Hacking Tech. 14(2): 127-138 (2018) - [c20]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
Mitigating CSRF attacks on OAuth 2.0 Systems. PST 2018: 1-5 - [c19]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. Security Protocols Workshop 2018: 24-41 - [i3]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect. CoRR abs/1801.07983 (2018) - 2017
- [j40]Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Thomas M. Chen, Yogachandran Rahulamathavan:
PIndroid: A novel Android malware detection system using ensemble learning methods. Comput. Secur. 68: 36-46 (2017) - [c18]Fauzia Idrees Abro, Muttukrishnan Rajarajan, Thomas M. Chen, Yogachandran Rahulamathavan:
Android Application Collusion Demystified. FNSS 2017: 176-187 - [i2]Jorge Blasco, Thomas M. Chen, Igor Muttik, Markus Roggenbach:
Detection of App Collusion Potential Using Logic Programming. CoRR abs/1706.02387 (2017) - 2016
- [j39]Jorge Blasco, Thomas M. Chen, Juan E. Tapiador, Pedro Peris-Lopez:
A Survey of Wearable Biometric Recognition Systems. ACM Comput. Surv. 49(3): 43:1-43:35 (2016) - [j38]Jameel Qadri, Thomas M. Chen, Jorge Blasco:
A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices. Int. J. Cyber Situational Aware. 1(1): 210-230 (2016) - [j37]Omar A. Alzubi, Thomas M. Chen, Jafar Ahmad Abed Alzubi, Hasan Rashaideh, Nijad Al-Najdawi:
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves. J. Univers. Comput. Sci. 22(4): 552-566 (2016) - [c17]Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Towards Automated Android App Collusion Detection. IMPS@ESSoS 2016: 29-37 - [i1]Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Towards Automated Android App Collusion Detection. CoRR abs/1603.02308 (2016) - 2015
- [j36]Pu Gong, Thomas M. Chen, Quan Xu:
ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks. J. Sensors 2015: 469793:1-469793:10 (2015) - 2014
- [j35]Quan Xu, Thomas M. Chen, Yupeng Hu, Pu Gong:
Write Pattern Format Algorithm for Reliable NAND-Based SSDs. IEEE Trans. Circuits Syst. II Express Briefs 61-II(7): 516-520 (2014) - [j34]Shancang Li, George C. Oikonomou, Theo Tryfonas, Thomas M. Chen, Li Da Xu:
A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things. IEEE Trans. Ind. Informatics 10(2): 1461-1468 (2014) - [c16]Quan Xu, Pu Gong, Thomas M. Chen:
Concatenated LDPC-TCM coding for reliable storage in multi-level flash memories. CSNDSP 2014: 166-170 - [c15]Pu Gong, Quan Xu, Thomas M. Chen:
Energy Harvesting Aware routing protocol for wireless sensor networks. CSNDSP 2014: 171-176 - 2013
- [j33]Wenyang Guan, Jianhua He, Zuoyin Tang, Thomas M. Chen:
Design and Evaluation of a Framework for Cooperative and Adaptive QoS Control of DSRC Network for Road Safety Applications. Int. J. Distributed Sens. Networks 9 (2013) - [j32]Alina Olteanu, Yang Xiao, Jing Liu, Thomas M. Chen, C. L. Philip Chen:
Nonintrusive tracing in the Internet. Secur. Commun. Networks 6(7): 833-843 (2013) - 2012
- [j31]Thomas M. Chen, Xuemin Shen:
Editor's note. IEEE Netw. 26(1): 2 (2012) - 2011
- [j30]Thomas M. Chen, Saeed Abu-Nimeh:
Lessons from Stuxnet. Computer 44(4): 91-93 (2011) - [j29]Saeed Abu-Nimeh, Thomas M. Chen, Omar A. Alzubi:
Malicious and Spam Posts in Online Social Networks. Computer 44(9): 23-28 (2011) - [j28]Thomas M. Chen:
How networks changed the world. IEEE Netw. 25(6): 2-3 (2011) - [j27]Thomas M. Chen, Juan Carlos Sánchez-Aarnoutse, John F. Buford:
Petri Net Modeling of Cyber-Physical Attacks on Smart Grid. IEEE Trans. Smart Grid 2(4): 741-749 (2011) - [j26]Jianhua He, Zuoyin Tang, Timothy O'Farrell, Thomas M. Chen:
Performance analysis of DSRC priority mechanism for road safety applications in vehicular networks. Wirel. Commun. Mob. Comput. 11(7): 980-990 (2011) - 2010
- [j25]Thomas M. Chen, Victoria Wang:
Web Filtering and Censoring. Computer 43(3): 94-97 (2010) - [j24]Jianhua He, Hsiao-Hwa Chen, Thomas M. Chen, Wenqing Cheng:
Adaptive congestion control for DSRC vehicle networks. IEEE Commun. Lett. 14(2): 127-129 (2010) - [j23]Saeed Abu-Nimeh, Thomas M. Chen:
Proliferation and Detection of Blog Spam. IEEE Secur. Priv. 8(5): 42-47 (2010) - [c14]Alina Olteanu, Yang Xiao, Jing Liu, Thomas M. Chen:
Studying Non-intrusive Tracing in the Internet. QSHINE 2010: 58-74 - [p1]Thomas M. Chen:
Identity Theft through the Web. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 379-395
2000 – 2009
- 2009
- [j22]Yi Zeng, Thomas M. Chen:
Classification of Traffic Flows into QoS Classes by Unsupervised Learning and KNN Clustering. KSII Trans. Internet Inf. Syst. 3(2): 134-146 (2009) - [j21]Thomas M. Chen, Zhi Fu, Liwen He, Tim Strayer:
Recent developments in network intrusion detection [guest editorial]. IEEE Netw. 23(1): 4-5 (2009) - [c13]Nasir Jamil, Thomas M. Chen:
A Mathematical View of Network-Based Suppressions of Worm Epidemics. ICC 2009: 1-5 - [c12]Thomas M. Chen, John F. Buford:
Design considerations for a honeypot for SQL injection Attacks. LCN 2009: 915-921 - 2008
- [r1]Thomas M. Chen, Nhut Nguyen:
Authentication and Privacy. Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- [c11]Nasir Jamil, Thomas M. Chen:
A Web-Based Network Worm Simulator. ICC 2007: 1461-1465 - 2006
- [c10]Nasir Jamil, Thomas M. Chen:
Effectiveness of Rate Control in Slowing Down Worm Epidemics. GLOBECOM 2006 - [c9]Jungwon Ko, Thomas M. Chen:
A Decision Theoretic Approach to Measurement-based Admission Control. ICC 2006: 742-747 - [c8]Thomas M. Chen, Nasir Jamil:
Effectiveness of Quarantine in Worm Epidemics. ICC 2006: 2142-2147 - [c7]Karim Mohammed Rezaul, Algirdas Pakstas, R. Gilchrist, Thomas M. Chen:
HEAF: A Novel Estimator for Long-Range Dependent Self-similar Network Traffic. NEW2AN 2006: 34-45 - 2005
- [j20]Thomas M. Chen, Varadharajan Venkataramanan:
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks. IEEE Internet Comput. 9(6): 35-41 (2005) - 2004
- [j19]Thomas M. Chen, Jean-Marc Robert:
Worm Epidemics in High-Speed Networks. Computer 37(6): 48-53 (2004) - [c6]Yi Zeng, Thomas M. Chen:
Measurement-based real-time traffic model classification. ICC 2004: 1857-1861 - [c5]Hanem A. ElAdly, Thomas M. Chen:
An overlay algorithm to improve the support of multi-hopping in the IEEE 802.11 WLANs. ICC 2004: 3817-3821 - [c4]Hanem A. ElAdly, Thomas M. Chen:
Enhancing the support of multihopping in an IEEE 802.11 ad-hoc network. ISCC 2004: 158-163 - 2003
- [c3]Nayera M. Sadek, Alireza Khotanzad, Thomas M. Chen:
ATM dynamic bandwidth allocation using F-ARIMA prediction model. ICCCN 2003: 359-363 - 2002
- [j18]Thomas M. Chen:
Perspectives - internet computing as a utility. IEEE Commun. Mag. 40(5): 10 (2002) - [j17]Naoaki Yamanaka, Thomas M. Chen, Heinrich J. Stüttgen:
Guest editorial - trends in high-performance switching and routing technologies. IEEE Commun. Mag. 40(11): 36-37 (2002) - [j16]Thomas M. Chen, Steve S. Liu:
A model and evaluation of distributed network management approaches. IEEE J. Sel. Areas Commun. 20(4): 850-857 (2002) - [j15]Thomas M. Chen, Lucia Hu:
Internet performance monitoring. Proc. IEEE 90(9): 1592-1603 (2002) - 2001
- [j14]Thomas M. Chen:
Increasing the observability of Internet behavior. Commun. ACM 44(1): 93-98 (2001) - [c2]Yuhang Zhu, Thomas M. Chen, Steve S. Liu:
Models and Analysis of Trade-offs in Distributed Network Management Approaches. Integrated Network Management 2001: 391-404 - 2000
- [j13]Thomas M. Chen:
Evolution to the programmable Internet. IEEE Commun. Mag. 38(3): 124-128 (2000) - [j12]Thomas M. Chen:
Network traffic measurements and experiments [Guest Editorial]. IEEE Commun. Mag. 38(5): 120 (2000) - [j11]Thomas M. Chen, Roch H. Glitho, Makoto Yoshida:
Guest editorial recent advances in network management and operations. IEEE J. Sel. Areas Commun. 18(5): 641-643 (2000) - [c1]Tae H. Oh, Thomas M. Chen, Jeffery L. Kennington:
Fault restoration and spare capacity allocation with QoS constraints for MPLS networks. GLOBECOM 2000: 1731-1735
1990 – 1999
- 1998
- [j10]Ioannis Stavrakakis, Thomas M. Chen:
Editorial - Wireless LANs. Mob. Networks Appl. 3(3): 235-236 (1998) - [j9]Thomas M. Chen, Steve S. Liu, Michael J. Procanik, David C. Wang, D. Dean Casey:
INQIRE: a software approach to monitoring QoS in ATM networks. IEEE Netw. 12(2): 32-37 (1998) - 1997
- [j8]Tom Chen:
Network And Internet Security (Guest Editorial). IEEE Netw. 11(3): 11 (1997) - 1996
- [j7]Thomas M. Chen, Steve S. Liu, Vijay K. Samalam:
The available bit rate service for data in ATM networks. IEEE Commun. Mag. 34(5): 56-58 (1996) - [j6]Thomas M. Chen, Steven S. Liu, David Wang, Vijay K. Samalam, Michael J. Procanik, Dinyar Kavouspour:
Monitoring and control of ATM networks using special cells. IEEE Netw. 10(5): 28-38 (1996) - 1995
- [b1]Thomas M. Chen, Steve S. Liu:
ATM switching systems. Artech House 1995, ISBN 978-0-89006-682-9, pp. I-XVII, 1-261 - [j5]Thomas M. Chen, Vijay K. Samalam:
Time-Dependent Behavior of Fluid Buffer Models with Markov Input and Constant Output Rates. SIAM J. Appl. Math. 55(3): 784-799 (1995) - 1994
- [j4]Thomas M. Chen, Steven S. Liu:
Management and control functions in ATM switching systems. IEEE Netw. 8(4): 27-40 (1994) - [j3]Thomas M. Chen, Jean C. Walrand, David G. Messerschmitt:
Parameter estimation for partially observed queues. IEEE Trans. Commun. 42(9): 2730-2739 (1994)
1980 – 1989
- 1989
- [j2]Thomas M. Chen, Jean C. Walrand, David G. Messerschmitt:
Dynamic priority protocols for packet voice. IEEE J. Sel. Areas Commun. 7(5): 632-643 (1989) - 1988
- [j1]Thomas M. Chen, David G. Messerschmitt:
Integrated voice/data switching. IEEE Commun. Mag. 26(6): 16-26 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint