Weifeng Chen, Ph.D.

Dept. of Mathematics, Computer Science and Information Systems
California University of Pennsylvania
California, PA 15419
Phone: 724-938-5786 (Office)
Email:


RESEARCH INTEREST

EDUCATION

EMPLOYMENT HISTORY

HONORS and PATENTS

PUBLICATIONS

  1. Sang-Soo Yeo, Geyong Min, and Weifeng Chen. "Advances in Multimedia and Ubiquitous Technologies for the New Era". Multimedia Tools and Applications, Volume 63, Issue 1, Page 1-5, 2013.

  2. Shanshan Li, Shaoliang Peng, Weifeng Chen, and Xiaopei Lu. "INCOME: Practical land monitoring in precision agriculture with sensor networks". Computer Communications, Volume 36, Issue 4, Pages 459-467, 2013.

  3. Huan Li, Yanlei Liu, Weifeng Chen, Weijia Jia, Bing Li, and Junwu Xiong. "COCA: Constructing Optimal Clustering Architecture to Maximize Sensor Network Lifetime". Computer Communications, Volume 36, Issue 3, Pages 256-268, 2013.

  4. Seungmin Rho, Geyong Min, and Weifeng Chen. "Advanced Issues in Artificial Intelligence and Pattern Recognition for Intelligent Surveillance Systems in Smart Home Environment". Engineering Applications of Artificial Intelligence, Volume 25, Issue 7, Page 1299-1300, 2012.

  5. Changwang Zhang, Zhiping Cai, Weifeng Chen, Xiapu Luo, and Jianping Yin. "Flow Level Detection and Filtering of Low-Rate DDoS". Computer Networks, Volume 56, No. 15, Page 3417-3431, 2012.

  6. Robert Shullich, Jie Chu, Ping Ji, and Weifeng Chen. "A Survey of Research in Stepping-Stone Detection". International Journal of Electronic Commerce Studies, Volume 2, No. 2, Page 103-126, 2011.

  7. Lin Liao, Weifeng Chen, Chuanlin Zhang, Lizhuo Zhang, Dong Xuan, and Weijia Jia. "Two Birds with One Stone: Wireless Access Point Deployment for Both Coverage and Localization". IEEE Transactions on Vehicular Technology, Volume 60, Issue 5, Page 2239-2252, June 2011.

  8. Robert Shullich, Jie Chu, Ping Ji, and Weifeng Chen. "A Survey of Research in Stepping-Stone Detection". Proceedings of International Conference on Internet Studies (NETs2010), Taipei, Taiwan, November 25-27, 2010.

  9. Marti Ksionsk, Ping Ji, and Weifeng Chen. "Attacks on BitTorrent -- An Experimental Study". Proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (E-Forensics 2010), Shanghai, China, November 10-12, 2010.

  10. Jianchun Jiang and Weifeng Chen. "On Estimating Cyber Adversaries' Capabilities - A Bayesian Model Approach". (Poster) Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada, September 15-17, 2010.

  11. Weifeng Chen, Ye Sun and Anthony Pyzdrowski. "On the Security Cost of Interval Multicast". International Journal of Network Security, Vol.11, No.2, PP.51-59, September 2010.

  12. Lin Liao, Weifeng Chen, Chuanlin Zhang, Lizhuo Zhang, and Weijia Jia. "Wireless Access Point Deployment for Both Coverage and Localization". Proceedings of the Fifth IEEE International Conference on Networking, Architecture, and Storage (NAS 2010), Macau, China, July 15-17, 2010.

  13. Weifeng Chen, Jianchun Jiang, and Nancy Skocik. "On the Privacy Protection in Publish/Subscribe Systems". Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS2010), Beijing, China, June 25-27, 2010.

  14. Changwang Zhang, Jianping Yin, Zhiping Cai, and Weifeng Chen. "RRED: Robust RED Algorithm to Counter Low-rate Denial-of-Service Attacks". IEEE Communication Letters Vol.14, No.5, May 2010.

  15. Weifeng Chen and Ye Sun. "On the Security Cost of Interval Multicast". Proceedings of 2009 IEEE International Conference on Information and Automation (ICIA 2009), Zhuhai/Macau, China, June 22- 25, 2009.

  16. Michael Perelman, Ping Ji, and Weifeng Chen. "Traffic and Security Analysis on Sony PlayStation 3". Proceedings of 2009 Workshop on Cybercrime and Computer Forensics (in conjunction with the IEEE Intelligence and Security Informatics), Dallas, TX, June 8, 2009.

  17. Jessica Ho, Ping Ji, Weifeng Chen and Raymond Hsieh. "Identifying Google Talk Packets". Proceedings of 2009 Workshop on Cybercrime and Computer Forensics (in conjunction with the IEEE Intelligence and Security Informatics), Dallas, TX, June 8, 2009.

  18. Emmanuel Velasco, Weifeng Chen, Ping Ji and Raymond Hsieh. "Challenges of Location Tracking Techniques in Wireless Forensics". In Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2008), Harbin, China, August 15-17, 2008.

  19. Emmanuel Velasco, Weifeng Chen, Ping Ji and Raymond Hsieh. "Wireless Forensic: A New Radio Frequency based Locating System". In Proceedings of the 2008 Pacific Asia Workshop on Cybercrime and Computer Forensics, Taipei, Taiwan, June 17-20, 2008.

  20. Weifeng Chen and Huan Li. "Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks". In Proceedings of IEEE 2008 International Conference on Networking, Architecture and Storage, Chongqing, China, June 12-14, 2008.

  21. Weifeng Chen, Lakshminath Dondeti and Ye Sun. "Performance Comparison of Stateful and Stateless Group Rekeying Algorithms". International Journal of Computer Science and Network Security. Vol. 8, No. 3. pp. 186-195, 2008.

  22. Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley. "Analyzing Privacy in Enterprise Packet Trace Anonymization". Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008), San Diego, CA, February 10-13, 2008. (Acceptance ratio=17.8%)

  23. Weifeng Chen, Zhen Liu and Anton Riabov. "A Soft Constraint Privacy Model based on Identifiability". Proceedings of the Second IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2007), Beijing, China , July 23-27, 2007.

  24. Weifeng Chen, Zihui Ge, Jim Kurose and Don Towsley. "Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite Events". Proceedings of 13th IEEE International Conference on Network Protocols (ICNP 2005), November 2005. (Acceptance ratio=17%)

  25. Weifeng Chen, Y. Huang, B. F. Ribeiro, K. Suh, H. Zhang, E. Silva, J. Kurose, D. Towsley. "Exploiting the IPID Field to Infer Network Path and End-system Characteristics". Proceedings of Sixth Passive and Active Measurement workshop (PAM 2005), March 2005. (Acceptance ratio=28%)

  26. Weifeng Chen, Lori Clarke, Jim Kurose and Don Towsley. "Optimizing Cost-sensitive Trust-negotiation Protocols". Proceedings of 24th Conference of the IEEE communications Society (Infocom 2005), March 2005. (Acceptance ratio=17%)

  27. S. Su, J. Fortes, T. R. Kasad, M. Patil, A. Matsunaga, M. Tsugawa, V. Cavalli-Sforza, J. Carbonell, P. Jansen, W. Ward, R. Cole, D. Towsley, Weifeng Chen, A. I. Anton, Q. He, C. McSweeney, L.de Brens, J. Ventura, P. Taveras, R. Connolly, C. Ortega, B. Pineres, O. Brooks, G. A. Murillo, and M. Herrera. "Transnational Information Sharing, Event Notification, Rule Enforcement and Process Coordination". International Journal of Electronic Government Research (IJEGR), 1(2), pp.1-26, 2005.

  28. S. Su, J. Fortes, T.R. Kasad, M. Patil, A. Matsunaga, M. Tsugawa, V. Cavalli-Sforza, J. Carbonell, P. Jansen, W. Ward, R. Cole, D. Towsley, Weifeng Chen, A.I. Anton, Q. He, C. McSweeney, L. deBrens, J. Ventura, P. Taveras, R. Connolly, C. Ortega, B. Pineres, O. Brooks, M. Herrera. "A Prototype System for Transnational Information Sharing and Process Coordination". Proceedings of 2004 National Conference on Digital Government Research (dg.o 2004), May 2004.

  29. Weifeng Chen, Zihui Ge, Chun Zhang, Jim Kurose, and Don Towsley. "On Dynamic Subset Difference Revocation Scheme". Proceedings of IFIP TC6 Third Networking Conferences (Networking 2004), May 2004. (Acceptance ratio=19%)

  30. Weifeng Chen and Lakshminath Dondeti. "Recommendations in Using Group Key Management Algorithms". Proceedings of IEEE DARPA Information Survivability Conference and Exposition (DISCEX III), pp. 222-227, April 2003.

  31. Weifeng Chen and Lakshminath Dondeti. "Performance Comparison of Stateful and Stateless Group Rekeying Algorithms". Proceedings of ACM Fourth International Workshop on Networked Group Communication (NGC 2002), October 2002. (ranked 2nd out of 49 submissions)

  32. Jianchun Jiang, Weifeng Chen, Sihan Qing and Dengguo Feng. "A Defense Framework for Large-scale Computer Network System". Proceedings of IFIP TC11 15th Annual Working Conference on Information Security (SEC 2000), Vol. 1, pp.69-78, Beijing, China, August 22-24, 2000.

  33. Weifeng Chen, Jianchun Jiang, Sihan Qing and Dengguo Feng. "A Novel Authentication Protocol based on Smart-Cards". Proceedings of IFIP TC11 15th Annual Working Conference on Information Security (SEC 2000), Vol.2, pp.5-8, August 2000.

  34. Hengtai Ma, Jianchun Jiang, Weifeng Chen and Sihan Qing. "A Distributed Model of Intrusion Detecion System based on Agents". Journal of Software, 11(10), pp.1312-1319, 2000.

SERVICES


 
Weifeng Chen 05-04-2013