default search action
Chia-Mei Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Chia-Mei Chen, Ze-Yu Lin, Ya-Hui Ou, Jiunn-Wu Lin:
A hybrid malware analysis approach for identifying process-injection malware based on machine learning. Int. J. Secur. Networks 19(1): 20-30 (2024) - [j28]Boyi Lee, Jhao-Yin Jhang, Lo-Yao Yeh, Ming-Yi Chang, Chia-Mei Chen, Chih-Ya Shen:
Detecting Targets of Graph Adversarial Attacks With Edge and Feature Perturbations. IEEE Trans. Comput. Soc. Syst. 11(3): 3218-3231 (2024) - [c41]Chia-Mei Chen, Chi-Hsuen Hsu, Zheng-Xun Cai, Gu-Hsin Lai, Ya-Hui Ou:
Improving the Performance of IIoT Intrusion Detection System Using Hybrid Synthetic Data. AsiaJCIS 2024: 62-68 - 2023
- [c40]Chia-Mei Chen, Fang-Hsuan Hsu, Jenq-Neng Hwang:
Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning. EICC 2023: 42-46 - 2022
- [j27]Chia-Mei Chen, Zheng-Xun Cai, Dan-Wei (Marian) Wen:
Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents. J. Glob. Inf. Manag. 30(2): 1-19 (2022) - [j26]Albert Guan, Chia-Mei Chen:
A Novel Verification Scheme to Resist Online Password Guessing Attacks. IEEE Trans. Dependable Secur. Comput. 19(6): 4285-4293 (2022) - [c39]Chia-Mei Chen, Yu-Xuan Wang, Zheng-Xun Cai, Boyi Lee, Gu-Hsin Lai:
Automatic Summarization of Critical Threat Intelligence Using Transfer Learning. ICS 2022: 343-348 - [c38]Chih-Che Chang, Chia-Mei Chen, Han-Wei Hsiao:
Applying an IoT Analytics Framework in East Asia Area. ICS 2022: 421-433 - 2021
- [j25]Chia-Mei Chen, Gu Hsin Lai, Zheng-Xun Cai, Tzu-Ching Chang, Boyi Lee:
Detecting PE infection-based malware. Int. J. Secur. Networks 16(3): 191-199 (2021) - [c37]Albert Guan, Chia-Mei Chen:
A Novel Verification scheme for Resisting Password Guessing Attacks. DSC 2021: 1-2 - 2020
- [j24]Chia-Mei Chen, Yi-Hung Liu, Zheng-Xun Cai, Gu Hsin Lai:
A Power-Efficient Approach to Detect Mobile Threats on the Emergent Network Environment. IEEE Access 8: 199840-199851 (2020) - [j23]Jun-Chou Chuang, Yu-Chen Hu, Chia-Mei Chen, Zhaoxia Yin:
Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding. Multim. Tools Appl. 79(37-38): 28189-28205 (2020) - [c36]Chia-Mei Chen, Tien-Ho Chang, Gu Hsin Lai:
The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units. AsiaJCIS 2020: 115-120
2010 – 2019
- 2019
- [j22]Jun-Chou Chuang, Yu-Chen Hu, Chia-Mei Chen, Yu-Hsiu Lin, Yu Chen:
Joint index coding and reversible data hiding methods for color image quantization. Multim. Tools Appl. 78(24): 35537-35558 (2019) - [c35]Chia-Mei Chen, Dan-Wei Marian Wen, Jun-Jie Fang, Gu Hsin Lai, Yi-Hung Liu:
A Study on Security Trend based on News Analysis. iCAST 2019: 1-4 - [c34]Chia-Mei Chen, Shi-Hao Wang, Dan-Wei (Marian) Wen, Gu Hsin Lai, Ming-Kung Sun:
Applying Convolutional Neural Network for Malware Detection. iCAST 2019: 1-5 - 2018
- [j21]Chia-Mei Chen, Shi-Hao Wang:
Advancing Malware Classification With an Evolving Clustering Method. Int. J. Appl. Metaheuristic Comput. 9(3): 1-12 (2018) - [c33]Tien-Ho Chang, Jiunn-Wu Lin, Chia-Mei Chen, Gu Hsin Lai:
The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual? DSC 2018: 1-4 - [c32]Chia-Mei Chen, Wen-Ling Lo, Gu-Hsin Lai, Yu-Chen Hu:
Network Anomaly Detection Based on Artificial Intelligence. IIH-MSP (2) 2018: 191-195 - [c31]Yu-Chen Hu, Pei-Jung Wu, Chia-Mei Chen, Yi-Hung Liu:
A Novel Tamper Detection and Image Recovery Technique for Color Image Demosaicking. IIH-MSP (1) 2018: 217-224 - [c30]Chia-Mei Chen, Gu Hsin Lai, Dan-Wei (Marian) Wen:
Evolution of Advanced Persistent Threat (APT) Attacks and Actors. ICS 2018: 76-81 - 2017
- [c29]Chia-Mei Chen, Gu Hsin Lai, Je-Ming Lin:
Identifying Threat Patterns of Android Applications. AsiaJCIS 2017: 69-74 - [c28]Chia-Mei Chen, Gu Hsin Lai, Yen-Chih Kuo, Tan-Ho Chang:
Improving Alert Accuracy for Smart Vehicles. NSS 2017: 623-631 - 2016
- [c27]Chia-Mei Chen, Gu Hsin Lai, Pong-Yu Young:
Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection. AsiaJCIS 2016: 74-79 - [c26]Shi-Hao Wang, Chia-Mei Chen, Gu-Shin Lai:
Exploring Cross-Site Scripting Botnet Detection and simulation. PACIS 2016: 63 - 2015
- [j20]Chia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou:
Efficient suspicious URL filtering based on reputation. J. Inf. Secur. Appl. 20: 26-36 (2015) - [j19]Chia-Mei Chen, Hsiao-Chung Lin:
Detecting botnet by anomalous traffic. J. Inf. Secur. Appl. 21: 42-51 (2015) - [c25]Chia-Mei Chen, Tien-Ho Chang:
The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, an Advanced and Efficient Method. AsiaJCIS 2015: 37-41 - [c24]Chia-Mei Chen, Sung-Chien Hsu, Gu Hsin Lai:
Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks. ICGEC (1) 2015: 319-326 - 2014
- [j18]Chia-Mei Chen, D. J. Guan, Qun-Kai Su:
Feature set identification for detecting suspicious URLs using Bayesian classification in social networks. Inf. Sci. 289: 133-147 (2014) - [j17]Chia-Mei Chen, Ming-Zong Huang, Ya-Hui Ou:
Detecting Hybrid Botnets with Web Command and Control Servers or Fast Flux Domain. J. Inf. Hiding Multim. Signal Process. 5(2): 263-274 (2014) - [c23]Chia-Mei Chen, Peng-Yu Yang, Ya-Hui Ou, Han-Wei Hsiao:
Targeted Attack Prevention at Early Stage. AINA Workshops 2014: 866-870 - [c22]Chia-Mei Chen, Gu Hsin Lai:
An efficient honeypot based malware classification system. ICS 2014: 925-933 - [c21]Chia-Mei Chen, Je-Ming Lin, Gu Hsin Lai:
Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code. TSA 2014: 1-6 - 2013
- [j16]Chia-Mei Chen, Sheng-Tzong Cheng, Ruei-Yu Zeng:
A proactive approach to intrusion detection and malware collection. Secur. Commun. Networks 6(7): 844-853 (2013) - [c20]Chia-Mei Chen, Han-Wei Hsiao, Peng-Yu Yang, Ya-Hui Ou:
Defending malicious attacks in Cyber Physical Systems. CPSNA 2013: 13-18 - [c19]Chia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou:
Detecting Web Attacks Based on Domain Statistics. PAISI 2013: 97-106 - 2012
- [c18]Chia-Mei Chen, D. J. Guan, Yu-Zhi Huang, Ya-Hui Ou:
Attack Sequence Detection in Cloud Using Hidden Markov Model. AsiaJCIS 2012: 100-103 - [c17]Chia-Mei Chen, Sheng-Tzong Cheng, Ju-Hsien Chou, Ya-Hui Ou:
Formulistic Detection of Malicious Fast-Flux Domains. PAAP 2012: 72-79 - 2011
- [j15]Gu Hsin Lai, Chen-Sen Ouyang, Chia-Mei Chen:
A Group-Based Deployment for Wormhole Prevention in Sensor Networks. J. Inf. Sci. Eng. 27(1): 79-93 (2011) - [j14]Bingchiang Jeng, Dowming Yeh, Deron Wang, Shu-Lan Chu, Chia-Mei Chen:
A Specific Effort Estimation Method Using Function Point. J. Inf. Sci. Eng. 27(4): 1363-1376 (2011) - [c16]Chia-Mei Chen, Ya-Hui Ou:
Secure Mechanism for Mobile Web Browsing. ICPADS 2011: 924-928 - 2010
- [j13]Chia-Mei Chen, Ya-Lin Chen, Hsiao-Chung Lin:
An efficient network intrusion detection. Comput. Commun. 33(4): 477-484 (2010) - [j12]Yung-Tsung Hou, Yimeng Chang, Tsuhan Chen, Chi-Sung Laih, Chia-Mei Chen:
Malicious web content detection by machine learning. Expert Syst. Appl. 37(1): 55-60 (2010) - [j11]Jenn-Long Liu, Chao-Wei Chou, Chia-Mei Chen:
Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm. Int. J. Bus. Intell. Data Min. 5(1): 19-42 (2010) - [j10]Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng:
An optimal new-node placement to enhance the coverage of wireless sensor networks. Wirel. Networks 16(4): 1033-1043 (2010)
2000 – 2009
- 2009
- [j9]Tian-Fu Lee, Jenn-Long Liu, Mei-Jiun Sung, Shiueng-Bien Yang, Chia-Mei Chen:
Communication-efficient three-party protocols for authentication and key agreement. Comput. Math. Appl. 58(4): 641-648 (2009) - [j8]Gu Hsin Lai, Chia-Mei Chen, Chi-Sung Laih, Tsuhan Chen:
A collaborative anti-spam system. Expert Syst. Appl. 36(3): 6645-6653 (2009) - [c15]Chia-Mei Chen, Wan-Yi Tsai, Hsiao-Chung Lin:
Anomaly Behavior Analysis for Web Page Inspection. NetCoM 2009: 358-363 - [p1]Gu Hsin Lai, Chao-Wei Chou, Chia-Mei Chen, Ya-Hua Ou:
Anti-spam Filter Based on Data Mining and Statistical Test. Computer and Information Science 2009: 179-192 - 2008
- [j7]Gu Hsin Lai, Chia-Mei Chen, Bingchiang Jeng, Willams Chao:
Ant-based IP traceback. Expert Syst. Appl. 34(4): 3071-3080 (2008) - [c14]Sheng-Tzong Cheng, Szu-Yun Li, Chia-Mei Chen:
Distributed Detection in Wireless Sensor Networks. ACIS-ICIS 2008: 401-406 - [c13]Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen:
Defending On-Line Web Application Security with User-Behavior Surveillance. ARES 2008: 410-415 - [c12]Shih-Fen Lin, Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng, Chi-Sung Laih:
Malicious Webpage Detection by Semantics-Aware Reasoning. ISDA (1) 2008: 115-120 - 2007
- [c11]Yu-Fen Chiu, Chia-Mei Chen, Bingchiang Jeng, Hsiao-Chung Lin:
An Alliance-Based Anti-spam Approach. ICNC (4) 2007: 203-207 - [c10]Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng:
Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks. IIH-MSP 2007: 639-642 - [c9]Wei-Yu Lai, Chia-Mei Chen, Bingchiang Jeng, Gu Hsin Lai, Hsiao-Chung Lin:
Information Exchange Mechanism Based on Reputation in Mobile P2P Networks. IIH-MSP 2007: 643-646 - [c8]Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng:
A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept. NBiS 2007: 137-146 - [c7]Sheng-Tzong Cheng, Chun-Yen Wang, Mingzoo Wu, Wan-Ting Ho, Chia-Mei Chen:
Dynamic Service Composition for Virtual UPnP Device Creation in Home Network Environment. WEBIST (1) 2007: 349-352 - 2006
- [c6]Sheng-Tzong Cheng, Chun-Yen Wang, Chia-Mei Chen:
Optimal Tree-based Adaptive Broadcasting for Mobile Web Services. AINA (2) 2006: 121-125 - [c5]Chia-Mei Chen, Bingchiang Jeng, Chia Ru Yang, Gu Hsin Lai:
Tracing Denial of Service Origin: Ant Colony Approach. EvoWorkshops 2006: 286-295 - [c4]Yung-Tsung Hou, Tzu-Chen Lee, Chia-Mei Chen, Bingchiang Jeng:
Node Placement for Optimal Coverage in Sensor Networks. SUTC (1) 2006: 352-357 - [c3]Sheng-Tzong Cheng, Chun-Yen Wang, Chia-Mei Chen:
An Adaptive Data Broadcasting Scheme for Wireless Access. Wireless and Optical Communications 2006 - 2005
- [j6]Huey-Min Sun, Chia-Mei Chen, LihChyun Shu:
Object-Based Multimedia Scheduling Based on Bipartite Graphs. IEICE Trans. Commun. 88-B(1): 372-383 (2005) - 2004
- [j5]Chia-Mei Chen, Huey-Min Sun, LihChyun Shu:
Optimizing Object-based Multimedia Delivery Across Bandwidth Constrained Networks. Comput. J. 47(5): 579-590 (2004) - 2002
- [j4]Sheng-Tzong Cheng, C. Chen, C. Li, Chia-Mei Chen:
Network topology management in a mobile-switch ATM network: dynamic partition algorithms. Int. J. Netw. Manag. 12(2): 99-115 (2002) - 2000
- [j3]Sheng-Tzong Cheng, Chia-Mei Chen:
Dynamic Round-based Resource Management for On-demand Multimedia Servers. Comput. J. 43(5): 386-395 (2000) - [j2]Sheng-Tzong Cheng, Chia-Mei Chen, Satish K. Tripathi:
A Fault-Tolerance Model for Multiprocessor Real-Time Systems. J. Comput. Syst. Sci. 61(3): 457-477 (2000)
1990 – 1999
- 1998
- [j1]Sheng-Tzong Cheng, Chia-Mei Chen, Jing-Wen Hwang:
Low-Power Design for Real-Time Systems. Real Time Syst. 15(2): 131-148 (1998) - 1996
- [c2]Sheng-Tzong Cheng, Chia-Mei Chen:
A Cyclic Scheduling for Relative Timing Requirements. ICECCS 1996: 160-163 - 1994
- [c1]Chia-Mei Chen, Satish K. Tripathi, Alex Blackmore:
A Resource Synchronization Protocol for Multiprocessor Real-Time Systems. ICPP (3) 1994: 159-162
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint