


default search action
Kevin S. Chan
Person information
- affiliation: U.S. Army Research Laboratory, Adelphi, MD, USA
- affiliation (PhD): Georgia Institute of Technology, Atlanta, GA, USA
Other persons with the same name
- Kevin Chan — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j48]Mustafa Abdallah
, Saurabh Bagchi
, Shaunak D. Bopardikar
, Kevin Chan
, Xing Gao
, Murat Kantarcioglu
, Congmiao Li
, Peng Liu
, Quanyan Zhu
:
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions. IEEE Secur. Priv. 23(1): 64-74 (2025) - [i39]Jake B. Perazzone, Shiqiang Wang, Mingyue Ji, Kevin S. Chan:
Communication-Efficient Device Scheduling for Federated Learning Using Lyapunov Optimization. CoRR abs/2503.00569 (2025) - 2024
- [j47]Benjamin A. Miller, Kevin S. Chan, Tina Eliassi-Rad:
Complex network effects on the robustness of graph convolutional networks. Appl. Netw. Sci. 9(1): 5 (2024) - [j46]Benjamin A. Miller
, Kevin S. Chan, Tina Eliassi-Rad:
Using overlapping methods to counter adversaries in community detection. J. Complex Networks 12(4) (2024) - [j45]William Shiao
, Benjamin A. Miller, Kevin Chan, Paul L. Yu, Tina Eliassi-Rad, Evangelos E. Papalexakis:
TenGAN: adversarially generating multiplex tensor graphs. Data Min. Knowl. Discov. 38(1): 1-21 (2024) - [c90]Abdulrahman Fahim, Shitong Zhu, Zhiyun Qian, Chengyu Song, Evangelos E. Papalexakis, Supriyo Chakraborty, Kevin S. Chan, Paul L. Yu, Trent Jaeger, Srikanth V. Krishnamurthy:
DNS Exfiltration Guided by Generative Adversarial Networks. EuroS&P 2024: 580-599 - [c89]Eric Graves, Jake B. Perazzone, Kevin S. Chan:
Optimal Update Policy for the Monitoring of Distributed Sources. ISIT 2024: 1385-1390 - [c88]Zhaofeng Zhang, Xuanli Lin, Guoliang Xue, Yanchao Zhang, Kevin S. Chan:
Joint Optimization of Task Offloading and Resource Allocation in Tactical Edge Networks. MILCOM 2024: 703-708 - [c87]Negar Erfaniantaghvayi, Zhongyuan Zhao, Kevin S. Chan, Gunjan Verma, Ananthram Swami, Santiago Segarra:
Ant Backpressure Routing for Wireless Multi-hop Networks with Mixed Traffic Patterns. MILCOM 2024: 1174-1179 - [i38]Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth:
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey. CoRR abs/2405.03636 (2024) - [i37]Eric Graves, Jake B. Perazzone, Kevin S. Chan:
Optimal Update Policy for the Monitoring of Distributed Sources. CoRR abs/2405.11089 (2024) - [i36]Negar Erfaniantaghvayi, Zhongyuan Zhao, Kevin S. Chan, Gunjan Verma, Ananthram Swami, Santiago Segarra:
Ant Backpressure Routing for Wireless Multi-hop Networks with Mixed Traffic Patterns. CoRR abs/2408.12702 (2024) - [i35]Yongsheng Mei, Liangqi Yuan, Dong-Jun Han, Kevin S. Chan, Christopher G. Brinton
, Tian Lan:
Using Diffusion Models as Generative Replay in Continual Federated Learning - What will Happen? CoRR abs/2411.06618 (2024) - [i34]Rostyslav Olshevskyi, Zhongyuan Zhao, Kevin S. Chan, Gunjan Verma, Ananthram Swami, Santiago Segarra:
Fully Distributed Online Training of Graph Neural Networks in Networked Systems. CoRR abs/2412.06105 (2024) - [i33]Zhongyuan Zhao, Jake B. Perazzone, Gunjan Verma, Kevin S. Chan, Ananthram Swami, Santiago Segarra:
Joint Task Offloading and Routing in Wireless Multi-hop Networks Using Biased Backpressure Algorithm. CoRR abs/2412.15385 (2024) - 2023
- [j44]Zheyu Chen
, Kin K. Leung
, Shiqiang Wang
, Leandros Tassiulas, Kevin S. Chan
, Don Towsley
:
Use Coupled LSTM Networks to Solve Constrained Optimization Problems. IEEE Trans. Cogn. Commun. Netw. 9(2): 304-316 (2023) - [j43]Pradipta Ghosh
, Jonathan Bunton, Dimitrios Pylorof
, Marcos A. M. Vieira
, Kevin Chan
, Ramesh Govindan, Gaurav S. Sukhatme
, Paulo Tabuada
, Gunjan Verma:
Synthesis of Large-Scale Instant IoT Networks. IEEE Trans. Mob. Comput. 22(3): 1810-1824 (2023) - [j42]Kristina Sorensen Wheatman
, Fidan Mehmeti
, Mark Mahon, Hang Qiu
, Kevin S. Chan
, Thomas F. La Porta
:
Optimal Resource Allocation for Crowdsourced Image Processing. IEEE Trans. Mob. Comput. 22(10): 6110-6125 (2023) - [c86]Zheyu Chen, Kin K. Leung, Shiqiang Wang, Leandros Tassiulas, Kevin S. Chan, Patrick J. Baker:
Reinforcement Learning for Resource Allocation with Periodic Traffic Patterns. ICC Workshops 2023: 752-757 - [c85]Shiqiang Wang, Jake B. Perazzone, Mingyue Ji, Kevin S. Chan:
Federated Learning with Flexible Control. INFOCOM 2023: 1-10 - [c84]Zheyu Chen, Kin K. Leung, Shiqiang Wang, Leandros Tassiulas, Kevin S. Chan, Patrick J. Baker:
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation. MILCOM 2023: 464-470 - [c83]Olena Tkachenko, Sean Harding, Cleon Anderson, Jake B. Perazzone, Matthew Dwyer, Kevin S. Chan:
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments. MILCOM 2023: 888-893 - [c82]Ravdeep S. Pasricha, Uday Singh Saini, Nicholas D. Sidiropoulos
, Fei Fang, Kevin Chan, Evangelos E. Papalexakis:
Harvester: Principled Factorization-based Temporal Tensor Granularity Estimation. SDM 2023: 82-90 - [c81]Yu Tsung Lee, Rahul George, Haining Chen, Kevin Chan, Trent Jaeger:
Triaging Android Systems Using Bayesian Attack Graphs. SecDev 2023: 171-183 - [i32]Benjamin A. Miller, Kevin S. Chan, Tina Eliassi-Rad:
Using Overlapping Methods to Counter Adversaries in Community Detection. CoRR abs/2308.03081 (2023) - [i31]Benjamin A. Miller, Kevin S. Chan, Tina Eliassi-Rad:
Complex Network Effects on the Robustness of Graph Convolutional Networks. CoRR abs/2308.05498 (2023) - [i30]Mustafa Abdallah, Saurabh Bagchi, Shaunak D. Bopardikar, Kevin Chan, Xing Gao, Murat Kantarcioglu, Congmiao Li, Peng Liu, Quanyan Zhu:
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions. CoRR abs/2309.01281 (2023) - 2022
- [j41]Kevin Chan, Peter Han Joo Chong, Nils Agne Nordbotten:
Series Editorial: Military Communications and Networks. IEEE Commun. Mag. 60(5): 58 (2022) - [j40]Gunjan Verma, Kelvin Marcus, Kevin S. Chan:
Optimizing the quality of information of networked machine learning agents. J. Netw. Comput. Appl. 197: 103243 (2022) - [j39]Hanlin Lu
, Ting He
, Shiqiang Wang
, Changchang Liu, Mehrdad Mahdavi
, Vijaykrishnan Narayanan
, Kevin S. Chan
, Stephen Pasteris:
Communication-Efficient $k$k-Means for Edge-Based Machine Learning. IEEE Trans. Parallel Distributed Syst. 33(10): 2509-2523 (2022) - [c80]Diego F. M. Oliveira, Kevin S. Chan, Peter J. Mucha:
The Effects of Message Sorting in the Diffusion of Information in Online Social Media. COMPLEX NETWORKS (1) 2022: 98-107 - [c79]Jake B. Perazzone, Shiqiang Wang, Mingyue Ji, Kevin S. Chan:
Communication-Efficient Device Scheduling for Federated Learning Using Stochastic Optimization. INFOCOM 2022: 1449-1458 - [c78]John Corcoran, Eric Graves, Bryan Dawson, Matthew Dwyer, Paul L. Yu, Kevin Chan:
Adaptive Monitoring for Analytics Placement in Tactical Networks. MILCOM 2022: 926-931 - [c77]Jake B. Perazzone, Matthew Dwyer, Kevin S. Chan, Cleon Anderson, Scott E. Brown:
Enabling Machine Learning on Resource-constrained Tactical Networks. MILCOM 2022: 932-937 - [i29]Jake B. Perazzone, Shiqiang Wang, Mingyue Ji, Kevin Chan:
Communication-Efficient Device Scheduling for Federated Learning Using Stochastic Optimization. CoRR abs/2201.07912 (2022) - [i28]Hanlin Lu, Changchang Liu, Shiqiang Wang, Ting He, Vijay Narayanan, Kevin S. Chan, Stephen Pasteris:
Joint Coreset Construction and Quantization for Distributed Machine Learning. CoRR abs/2204.06652 (2022) - [i27]Valentin Vie, Ryan Sheatsley, Sophia Beyda, Sushrut Shringarputale, Kevin S. Chan, Trent Jaeger, Patrick D. McDaniel:
Adversarial Plannning. CoRR abs/2205.00566 (2022) - [i26]Shiqiang Wang, Jake B. Perazzone, Mingyue Ji, Kevin S. Chan:
Federated Learning with Flexible Control. CoRR abs/2212.08496 (2022) - 2021
- [j38]Kevin Chan, Peter H. J. Chong
, Frank T. Johnsen:
Series Editorial: Military Communications and Networks. IEEE Commun. Mag. 59(2): 35 (2021) - [j37]Kevin Chan, Peter H. J. Chong, Frank T. Johnsen:
Series Editorial: Military Communications and Networks. IEEE Commun. Mag. 59(8): 64 (2021) - [j36]Leo Torres, Kevin S. Chan, Hanghang Tong, Tina Eliassi-Rad:
Nonbacktracking Eigenvalues under Node Removal: X-Centrality and Targeted Immunization. SIAM J. Math. Data Sci. 3(2): 656-675 (2021) - [j35]Pedro Cisneros-Velarde
, Kevin S. Chan
, Francesco Bullo
:
Polarization and Fluctuations in Signed Social Networks. IEEE Trans. Autom. Control. 66(8): 3789-3793 (2021) - [j34]Zongqing Lu
, Swati Rallapalli, Kevin Chan
, Shiliang Pu, Thomas La Porta
:
Augur: Modeling the Resource Requirements of ConvNets on Mobile Devices. IEEE Trans. Mob. Comput. 20(2): 352-365 (2021) - [j33]Noor Felemban
, Fidan Mehmeti
, Hana Khamfroush
, Zongqing Lu
, Swati Rallapalli, Kevin S. Chan
, Thomas La Porta
:
PicSys: Energy-Efficient Fast Image Search on Distributed Mobile Networks. IEEE Trans. Mob. Comput. 20(4): 1574-1589 (2021) - [j32]Vajiheh Farhadi
, Fidan Mehmeti, Ting He
, Thomas F. La Porta
, Hana Khamfroush
, Shiqiang Wang
, Kevin S. Chan
, Konstantinos Poularakis
:
Service Placement and Request Scheduling for Data-Intensive Applications in Edge Clouds. IEEE/ACM Trans. Netw. 29(2): 779-792 (2021) - [c76]Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy
, Zubair Shafiq, Yu Hao
, Guoren Li, Zheng Zhang, Xiaochen Zou:
Eluding ML-based Adblockers With Actionable Adversarial Examples. ACSAC 2021: 541-553 - [c75]Norman Jansen, Marco Manso
, Andrew Toth, Kevin S. Chan, Trude Hafsøe Bloebaum, Frank T. Johnsen:
NATO Core Services profiling for Hybrid Tactical Networks - Results and Recommendations. ICMCIS 2021: 1-8 - [c74]Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles A. Kamhoua, Nandi O. Leslie, Cho-Yu Jason Chiang, Vyas Sekar:
Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions. ICML 2021: 4523-4532 - [c73]Zheyu Chen, Kin K. Leung, Shiqiang Wang, Leandros Tassiulas, Kevin Chan:
Robust Solutions to Constrained Optimization Problems by LSTM Networks. MILCOM 2021: 503-508 - [i25]Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles A. Kamhoua, Nandi Leslie, Cho-Yu Jason Chiang, Vyas Sekar:
Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions. CoRR abs/2101.09113 (2021) - [i24]Hanlin Lu, Ting He, Shiqiang Wang, Changchang Liu, Mehrdad Mahdavi, Vijaykrishnan Narayanan, Kevin S. Chan, Stephen Pasteris:
Communication-efficient k-Means for Edge-based Machine Learning. CoRR abs/2102.04282 (2021) - 2020
- [j31]Kevin S. Chan, Frank T. Johnsen:
Military Communications and Networks. IEEE Commun. Mag. 58(2): 60 (2020) - [j30]Kevin S. Chan, Frank T. Johnsen:
Military Communications and Networks. IEEE Commun. Mag. 58(8): 13 (2020) - [j29]Leo Torres, Kevin S. Chan, Tina Eliassi-Rad:
GLEE: Geometric Laplacian Eigenmap Embedding. J. Complex Networks 8(2) (2020) - [j28]Dimitrios Pylorof
, Efstathios Bakolas
, Kevin S. Chan
:
Design of Robust Lyapunov-Based Observers for Nonlinear Systems With Sum-of-Squares Programming. IEEE Control. Syst. Lett. 4(2): 283-288 (2020) - [j27]Hanlin Lu
, Ming-Ju Li, Ting He
, Shiqiang Wang
, Vijaykrishnan Narayanan, Kevin S. Chan
:
Robust Coreset Construction for Distributed Machine Learning. IEEE J. Sel. Areas Commun. 38(10): 2400-2417 (2020) - [j26]Nitish K. Panigrahy, Prithwish Basu, Philippe Nain, Don Towsley
, Ananthram Swami, Kevin S. Chan, Kin K. Leung:
Resource Allocation in One-dimensional Distributed Service Networks with Applications. Perform. Evaluation 142: 102110 (2020) - [j25]Zongqing Lu
, Kevin Chan
, Rahul Urgaonkar, Shiliang Pu, Thomas La Porta
:
NetVision: On-Demand Video Processing in Wireless Networks. IEEE/ACM Trans. Netw. 28(1): 196-209 (2020) - [j24]Yilei Lin
, Ting He
, Shiqiang Wang
, Kevin Chan
, Stephen Pasteris:
Looking Glass of NFV: Inferring the Structure and State of NFV Network From External Observations. IEEE/ACM Trans. Netw. 28(4): 1477-1490 (2020) - [c72]Shitong Zhu, Shasha Li, Zhongjie Wang, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy
, Kevin S. Chan, Ananthram Swami:
You do (not) belong here: detecting DPI evasion attacks with context learning. CoNEXT 2020: 183-197 - [c71]Shasha Li, Shitong Zhu, Sudipta Paul, Amit K. Roy-Chowdhury, Chengyu Song
, Srikanth V. Krishnamurthy
, Ananthram Swami, Kevin S. Chan:
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. ECCV (23) 2020: 396-413 - [c70]Zheyuan Ryan Shi
, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang
:
Learning and Planning in the Feature Deception Problem. GameSec 2020: 23-44 - [c69]Stephanie Milani
, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang
:
Harnessing the Power of Deception in Attack Graph-Based Security Games. GameSec 2020: 147-167 - [c68]Yilei Lin, Ting He, Shiqiang Wang, Kevin S. Chan:
Waypoint-based Topology Inference. ICC 2020: 1-6 - [c67]Pradipta Ghosh, Jonathan Bunton, Dimitrios Pylorof
, Marcos Augusto M. Vieira, Kevin Chan, Ramesh Govindan, Gaurav S. Sukhatme, Paulo Tabuada
, Gunjan Verma:
Rapid Top-Down Synthesis of Large-Scale IoT Networks. ICCCN 2020: 1-9 - [c66]Hanlin Lu, Ting He, Shiqiang Wang, Changchang Liu, Mehrdad Mahdavi, Vijaykrishnan Narayanan
, Kevin S. Chan, Stephen Pasteris:
Communication-efficient k-Means for Edge-based Machine Learning. ICDCS 2020: 595-605 - [c65]Claudia Szabo, Vanja Radenovic, Gregory Judd, Dustin Craggs, Kin Leong Lee, Xiaoshan Chen, Kevin Chan:
Optimizing Communication Strategies in Contested and Dynamic Environments. ICECCS 2020: 197-205 - [c64]Prithwish Basu, Theodoros Salonidis, Brent Kraczek, Sayed M. Saghaian N. E., Ali Sydney, Bongjun Ko, Tom La Porta, Kevin S. Chan:
Decentralized placement of data and analytics in wireless networks for energy-efficient execution. INFOCOM 2020: 486-495 - [c63]Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun:
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. NDSS 2020 - [c62]Hanlin Lu, Changchang Liu, Shiqiang Wang, Ting He, Vijaykrishnan Narayanan, Kevin S. Chan, Stephen Pasteris:
Joint Coreset Construction and Quantization for Distributed Machine Learning. Networking 2020: 172-180 - [c61]Kristina Sorensen Wheatman, Fidan Mehmeti, Mark Mahon, Hang Qiu, Kevin S. Chan, Thomas F. La Porta:
Optimal Resource Allocation for Crowdsourced Image Processing. SECON 2020: 1-9 - [i23]Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq:
A4 : Evading Learning-based Adblockers. CoRR abs/2001.10999 (2020) - [i22]Pradipta Ghosh, Jonathan Bunton, Dimitrios Pylorof, Marcos Augusto M. Vieira, Kevin S. Chan, Ramesh Govindan, Gaurav S. Sukhatme, Paulo Tabuada, Gunjan Verma:
Rapid Top-Down Synthesis of Large-Scale IoT Networks. CoRR abs/2002.04244 (2020) - [i21]Leo Torres, Kevin S. Chan, Hanghang Tong, Tina Eliassi-Rad:
Node Immunization with Non-backtracking Eigenvalues. CoRR abs/2002.12309 (2020) - [i20]Benjamin A. Miller, Mustafa Çamurcu, Alexander J. Gomez, Kevin S. Chan, Tina Eliassi-Rad:
Topological Effects on Attacks Against Vertex Classification. CoRR abs/2003.05822 (2020) - [i19]Hanlin Lu, Changchang Liu, Ting He, Shiqiang Wang, Kevin S. Chan:
Sharing Models or Coresets: A Study based on Membership Inference Attack. CoRR abs/2007.02977 (2020) - [i18]Shasha Li, Shitong Zhu, Sudipta Paul, Amit K. Roy-Chowdhury, Chengyu Song
, Srikanth V. Krishnamurthy, Ananthram Swami, Kevin S. Chan:
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. CoRR abs/2007.09763 (2020) - [i17]Shitong Zhu, Shasha Li, Zhongjie Wang, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy, Kevin S. Chan, Ananthram Swami:
You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning. CoRR abs/2011.01514 (2020) - [i16]Nitish K. Panigrahy, Prithwish Basu, Philippe Nain, Don Towsley, Ananthram Swami, Kevin S. Chan, Kin K. Leung:
Resource Allocation in One-dimensional Distributed Service Networks with Applications. CoRR abs/2011.04893 (2020)
2010 – 2019
- 2019
- [j23]Frank T. Johnsen, Kevin S. Chan:
Military Communications and Networks. IEEE Commun. Mag. 57(8): 40 (2019) - [j22]Shiqiang Wang
, Tiffany Tuor, Theodoros Salonidis, Kin K. Leung, Christian Makaya, Ting He
, Kevin Chan
:
Adaptive Federated Learning in Resource Constrained Edge Computing Systems. IEEE J. Sel. Areas Commun. 37(6): 1205-1221 (2019) - [j21]Zongqing Lu
, Kevin S. Chan
, Shiliang Pu, Thomas La Porta
:
CrowdVision: A Computing Platform for Video Crowdprocessing Using Deep Learning. IEEE Trans. Mob. Comput. 18(7): 1513-1526 (2019) - [j20]Shiqiang Wang
, Rahul Urgaonkar, Murtaza Zafer, Ting He
, Kevin Chan
, Kin K. Leung:
Dynamic Service Migration in Mobile Edge Computing Based on Markov Decision Process. IEEE/ACM Trans. Netw. 27(3): 1272-1288 (2019) - [c60]Stephen Pasteris, Fabio Vitale, Kevin S. Chan, Shiqiang Wang, Mark Herbster:
MaxHedge: Maximizing a Maximum Online. AISTATS 2019: 1851-1859 - [c59]Hanlin Lu, Ming-Ju Li, Ting He, Shiqiang Wang, Vijaykrishnan Narayanan, Kevin S. Chan:
Robust Coreset Construction for Distributed Machine Learning. GLOBECOM 2019: 1-6 - [c58]Yilei Lin, Ting He, Shiqiang Wang, Kevin S. Chan, Stephen Pasteris:
Multicast-Based Weight Inference in General Network Topologies. ICC 2019: 1-6 - [c57]Anup K. Kalia, Nirav Ajmeri
, Kevin S. Chan, Jin-Hee Cho, Sibel Adali, Munindar P. Singh
:
The Interplay of Emotions and Norms in Multiagent Systems. IJCAI 2019: 371-377 - [c56]Vajiheh Farhadi, Fidan Mehmeti, Ting He, Tom La Porta, Hana Khamfroush, Shiqiang Wang, Kevin S. Chan:
Service Placement and Request Scheduling for Data-intensive Applications in Edge Clouds. INFOCOM 2019: 1279-1287 - [c55]Yilei Lin, Ting He, Shiqiang Wang, Kevin S. Chan, Stephen Pasteris:
Looking Glass of NFV: Inferring the Structure and State of NFV Network from External Observations. INFOCOM 2019: 1774-1782 - [c54]Nitish K. Panigrahy, Prithwish Basu, Philippe Nain, Don Towsley
, Ananthram Swami, Kevin S. Chan, Kin K. Leung:
Resource Allocation in One-Dimensional Distributed Service Networks. MASCOTS 2019: 14-26 - [c53]Jongdeog Lee, Suk Min Hwang, Tarek F. Abdelzaher, Kelvin Marcus, Kevin Chan:
Pub/Sub-Sum: A Content Summarization Pub/Sub Protocol for Information-Centric Networks. MILCOM 2019: 847-852 - [c52]Xiaochen Liu, Pradipta Ghosh, Oytun Ulutan, B. S. Manjunath, Kevin S. Chan, Ramesh Govindan:
Caesar: cross-camera complex activity recognition. SenSys 2019: 232-244 - [c51]Konstantinos Poularakis, Qiaofeng Qin, Kelvin M. Marcus, Kevin S. Chan, Kin K. Leung, Leandros Tassiulas:
Hybrid SDN Control in Mobile Ad Hoc Networks. SMARTCOMP 2019: 110-114 - [i15]Nitish K. Panigrahy, Prithwish Basu, Don Towsley, Ananthram Swami, Kevin S. Chan, Kin K. Leung:
A queueing-theoretic model for resource allocation in one-dimensional distributed service network. CoRR abs/1901.02414 (2019) - [i14]Pedro Cisneros-Velarde, Kevin S. Chan, Francesco Bullo:
Polarization and Fluctuations in Signed Social Networks. CoRR abs/1902.00658 (2019) - [i13]Hanlin Lu, Ming-Ju Li, Ting He, Shiqiang Wang, Vijay Narayanan, Kevin S. Chan:
Robust Coreset Construction for Distributed Machine Learning. CoRR abs/1904.05961 (2019) - [i12]Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Learning and Planning in Feature Deception Games. CoRR abs/1905.04833 (2019) - [i11]Leo Torres, Kevin S. Chan, Tina Eliassi-Rad:
Geometric Laplacian Eigenmap Embedding. CoRR abs/1905.09763 (2019) - 2018
- [j19]Frank Trethan Johnsen, Kevin S. Chan:
Military Communications. IEEE Commun. Mag. 56(10): 142 (2018) - [j18]Tao Zhao
, I-Hong Hou
, Shiqiang Wang
, Kevin Chan
:
Red/LeD: An Asymptotically Optimal and Scalable Online Algorithm for Service Caching at the Edge. IEEE J. Sel. Areas Commun. 36(8): 1857-1870 (2018) - [j17]Nitish K. Panigrahy, Prithwish Basu, Don Towsley
, Ananthram Swami, Kevin S. Chan, Kin K. Leung:
A queueing-theoretic model for resource allocation in one-dimensional distributed analytics network? SIGMETRICS Perform. Evaluation Rev. 46(2): 27-29 (2018) - [c50]Ashwin Bahulkar, Boleslaw K. Szymanski
, Kevin S. Chan, Omar Lizardo
:
Impact of Attributes on Group Formation. ASONAM 2018: 1250-1257 - [c49]Tiffany Tuor, Shiqiang Wang, Kin K. Leung, Kevin Chan:
Distributed Machine Learning in Coalition Environments: Overview of Techniques. FUSION 2018: 814-821 - [c48]Ertugrul N. Ciftcioglu, Rommie L. Hardy, Kevin S. Chan, Lisa Scott, Diego F. M. Oliveira, Gunjan Verma:
Chaff Allocation and Performance for Network Traffic Obfuscation. ICDCS 2018: 1565-1568 - [c47]Marco Manso
, Frank T. Johnsen, Ketil Lund, Kevin S. Chan:
Using MQTT to support mobile tactical force situational awareness. ICMCIS 2018: 1-6 - [c46]Shiqiang Wang, Tiffany Tuor, Theodoros Salonidis, Kin K. Leung, Christian Makaya, Ting He, Kevin Chan:
When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine Learning. INFOCOM 2018: 63-71 - [c45]Zongqing Lu, Kevin S. Chan, Thomas La Porta:
A Computing Platform for Video Crowdprocessing Using Deep Learning. INFOCOM 2018: 1430-1438 - [c44]Hang Qiu, Xiaochen Liu, Swati Rallapalli, Archith J. Bency, Kevin Chan, Rahul Urgaonkar, B. S. Manjunath, Ramesh Govindan
:
Kestrel: Video Analytics for Augmented Multi-Camera Vehicle Tracking. IoTDI 2018: 48-59 - [c43]Gérôme Bovet, Kevin S. Chan:
Reinforcement Learning for Quality of Experience Optimization in Tactical Networks. MILCOM 2018: 1-6 - [c42]Kelvin Marcus, Kevin S. Chan, Rommie L. Hardy, Paul L. Yu:
An Environment for Tactical SDN Experimentation. MILCOM 2018: 1-9 - [c41]Gunjan Verma, Ertugrul N. Ciftcioglu, Ryan Sheatsley, Kevin S. Chan, Lisa Scott:
Network Traffic Obfuscation: An Adversarial Machine Learning Approach. MILCOM 2018: 1-6 - [i10]Spyridon Mastorakis, Kevin Chan, Bongjun Ko, Alexander Afanasyev, Lixia Zhang:
Experimentation With Fuzzy Interest Forwarding in Named Data Networking. CoRR abs/1802.03072 (2018) - [i9]Shiqiang Wang, Tiffany Tuor, Theodoros Salonidis, Kin K. Leung, Christian Makaya, Ting He, Kevin Chan:
When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine Learning. CoRR abs/1804.05271 (2018) - [i8]Stephen Pasteris, Fabio Vitale, Kevin Chan, Shiqiang Wang:
MaxHedge: Maximising a Maximum Online with Theoretical Performance Guarantees. CoRR abs/1810.11843 (2018) - 2017
- [j16]Kevin S. Chan, Frank T. Johnsen:
Military Communications. IEEE Commun. Mag. 55(10): 10 (2017) - [j15]Ashwin Bahulkar
, Boleslaw K. Szymanski
, Nitesh V. Chawla
, Omar Lizardo
, Kevin S. Chan
:
Influence of Personal Preferences on Link Dynamics in Social Networks. Complex. 2017: 4543563:1-4543563:12 (2017) - [j14]Jin-Hee Cho
, Yating Wang, Ing-Ray Chen, Kevin S. Chan, Ananthram Swami:
A Survey on Modeling and Optimizing Multi-Objective Systems. IEEE Commun. Surv. Tutorials 19(3): 1867-1901 (2017) - [j13]Ertugrul Necdet Ciftcioglu
, Siddharth Pal, Kevin S. Chan, Derya H. Cansever, Ananthram Swami, Ambuj K. Singh, Prithwish Basu:
Topology Design Games and Dynamics in Adversarial Environments. IEEE J. Sel. Areas Commun. 35(3): 628-642 (2017) - [j12]Ting He
, Ertugrul Necdet Ciftcioglu
, Shiqiang Wang, Kevin S. Chan
:
Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach. IEEE J. Sel. Areas Commun. 35(11): 2625-2636 (2017) - [j11]Sameet Sreenivasan, Kevin S. Chan, Ananthram Swami, György Korniss
, Boleslaw K. Szymanski
:
Information Cascades in Feed-Based Networks of Users with Limited Attention. IEEE Trans. Netw. Sci. Eng. 4(2): 120-128 (2017) - [j10]Shiqiang Wang, Rahul Urgaonkar, Ting He, Kevin Chan, Murtaza Zafer, Kin K. Leung:
Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs. IEEE Trans. Parallel Distributed Syst. 28(4): 1002-1016 (2017) - [j9]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Ananthram Swami, Kevin S. Chan:
Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks. IEEE Trans. Serv. Comput. 10(4): 660-672 (2017) - [c40]Kevin Chan, Bongjun Ko, Spyridon Mastorakis, Alexander Afanasyev, Lixia Zhang:
Fuzzy Interest Forwarding. AINTEC 2017: 31-37 - [c39]Ting He, Ertugrul N. Ciftcioglu, Shiqiang Wang, Kevin S. Chan:
Location Privacy in Mobile Edge Clouds. ICDCS 2017: 2264-2269 - [c38]Zongqing Lu, Noor Felemban, Kevin S. Chan, Thomas La Porta:
On-demand Information Retrieval from Videos Using Deep Learning in Wireless Networks: Demo Abstract. IoTDI 2017: 279-280 - [c37]Ertugrul N. Ciftcioglu, Rommie L. Hardy, Lisa M. Scott, Kevin S. Chan:
Efficient chaff-aided obfuscation in resource constrained environments. MILCOM 2017: 97-102 - [c36]Zongqing Lu, Swati Rallapalli, Kevin S. Chan, Thomas La Porta:
Modeling the Resource Requirements of Convolutional Neural Networks on Mobile Devices. ACM Multimedia 2017: 1663-1671 - [c35]Siddharth Pal, Ertugrul N. Ciftcioglu, Prithwish Basu, Kevin S. Chan, Ananthram Swami:
Decentralized network protection games in adversarial environments. Networking 2017: 1-9 - [c34]Christopher Gibson, Pablo Bermell-Garcia, Kevin Chan, Bongjun Ko, Alexander Afanasyev
, Lixia Zhang:
Opportunities and challenges for named data networking to increase the agility of military coalitions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c33]Bongjun Ko, Brent Kraczek, Theodoros Salonidis, Prithwish Basu, Kevin S. Chan, Thomas La Porta, Andreas Martens:
Physics-inspired models for agile code and data in federated edges. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c32]Stephen Pasteris, Shiqiang Wang, Christian Makaya, Kevin Chan, Mark Herbster:
Data distribution and scheduling for distributed analytics tasks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [i7]Ting He, Ertugrul N. Ciftcioglu, Shiqiang Wang, Kevin S. Chan:
Location Privacy in Mobile Edge Clouds: A Chaff-based Approach. CoRR abs/1709.03133 (2017) - [i6]Ashwin Bahulkar, Boleslaw K. Szymanski, Nitesh V. Chawla, Omar Lizardo, Kevin S. Chan:
Influence of Personal Preferences on Link Dynamics in Social Networks. CoRR abs/1709.07401 (2017) - [i5]Zongqing Lu, Swati Rallapalli, Kevin S. Chan, Thomas La Porta:
Modeling the Resource Requirements of Convolutional Neural Networks on Mobile Devices. CoRR abs/1709.09503 (2017) - 2016
- [j8]Jin-Hee Cho, Ing-Ray Chen, Kevin S. Chan:
Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Networks 44: 58-75 (2016) - [c31]Benjamin D. Horne, Sibel Adali, Kevin S. Chan:
Impact of message sorting on access to novel information in networks. ASONAM 2016: 647-653 - [c30]Siddharth Pal, Prithwish Basu, Ertugrul N. Ciftcioglu, Kevin S. Chan, Ananthram Swami, Derya H. Cansever:
Editing network topologies by playing potential games. CDC 2016: 7030-7035 - [c29]Ashwin Bahulkar, Boleslaw K. Szymanski
, Kevin S. Chan, Omar Lizardo
:
Co-evolution of two networks representing different social relations in NetSense. COMPLEX NETWORKS 2016: 423-434 - [c28]Noor Felemban, Zongqing Lu, Thomas La Porta, Kevin S. Chan:
Video processing of complex activity detection in resource-constrained networks. GlobalSIP 2016: 1345-1348 - [c27]Zongqing Lu, Kevin S. Chan, Rahul Urgaonkar, Thomas La Porta:
On-demand video processing in wireless networks. ICNP 2016: 1-10 - [c26]Lisa M. Scott, Kelvin Marcus, Rommie L. Hardy, Kevin S. Chan:
Exploring dependencies of networks of multi-genre network experiments. MILCOM 2016: 576-581 - [c25]I-Hong Hou, Tao Zhao
, Shiqiang Wang, Kevin Chan:
Asymptotically optimal algorithm for online reconfiguration of edge-clouds. MobiHoc 2016: 291-300 - [c24]Ertugrul N. Ciftcioglu, Siddharth Pal, Kevin S. Chan, Derya H. Cansever, Ananthram Swami, Ambuj K. Singh, Prithwish Basu:
Topology design under adversarial dynamics. WiOpt 2016: 274-281 - 2015
- [j7]Sibel Adali, Kevin S. Chan, Jin-Hee Cho:
TANDEM: a trust-based agent framework for networked decision making. Comput. Math. Organ. Theory 21(4): 461-490 (2015) - [j6]Jin-Hee Cho, Kevin S. Chan, Sibel Adali:
A Survey on Trust Modeling. ACM Comput. Surv. 48(2): 28:1-28:40 (2015) - [j5]Rahul Urgaonkar, Shiqiang Wang, Ting He, Murtaza Zafer, Kevin S. Chan, Kin K. Leung:
Dynamic service migration and workload scheduling in edge-clouds. Perform. Evaluation 91: 205-228 (2015) - [c23]Kevin S. Chan, Kelvin Marcus, Lisa M. Scott, Rommie L. Hardy:
Quality of information approach to improving source selection in tactical networks. FUSION 2015: 566-573 - [c22]Shiqiang Wang, Rahul Urgaonkar, Kevin S. Chan, Ting He, Murtaza Zafer, Kin K. Leung:
Dynamic service placement for mobile micro-clouds with predicted future costs. ICC 2015: 5504-5510 - [c21]Marco Manso
, José Maria Alcaraz Calero
, Christoph Barz, Trude Hafsoe Bloebaum, Kevin Chan, Norman Jansen, Frank Trethan Johnsen, Garik Markarian
, Peter-Paul Meiler, Ian Owens
, Joanna Sliwa, Qi Wang:
SOA and Wireless Mobile Networks in the tactical domain: Results from experiments. MILCOM 2015: 593-598 - [c20]Kevin S. Chan, Jin-Hee Cho, Theron Trout, Jason Wampler, Andrew Toth, Brian Rivera:
trustd: Trust daemon experimental testbed for network emulation. MILCOM 2015: 641-646 - [c19]Shiqiang Wang, Kevin S. Chan, Rahul Urgaonkar, Ting He, Kin K. Leung:
Emulation-based study of dynamic service placement in mobile micro-clouds. MILCOM 2015: 1046-1051 - [c18]Ertugrul N. Ciftcioglu, Kevin S. Chan, Rahul Urgaonkar, Shiqiang Wang, Ting He:
Security-aware service migration for tactical mobile micro-clouds. MILCOM 2015: 1058-1063 - [c17]Ertugrul N. Ciftcioglu, Kevin S. Chan, Ananthram Swami, Derya H. Cansever, Prithwish Basu:
Topology control for time-varying contested environments. MILCOM 2015: 1397-1402 - [c16]Shiqiang Wang, Rahul Urgaonkar, Murtaza Zafer, Ting He, Kevin S. Chan, Kin K. Leung:
Dynamic service migration in mobile edge-clouds. Networking 2015: 1-9 - [i4]Shiqiang Wang, Rahul Urgaonkar, Kevin S. Chan, Ting He, Murtaza Zafer, Kin K. Leung:
Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs. CoRR abs/1503.02735 (2015) - [i3]Shiqiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin S. Chan, Kin K. Leung:
Mobility-Induced Service Migration in Mobile Micro-Clouds. CoRR abs/1503.05141 (2015) - [i2]Shiqiang Wang, Rahul Urgaonkar, Murtaza Zafer, Ting He, Kevin S. Chan, Kin K. Leung:
Dynamic Service Migration in Mobile Edge-Clouds. CoRR abs/1506.05261 (2015) - [i1]Sameet Sreenivasan, Kevin S. Chan, Ananthram Swami, György Korniss, Boleslaw K. Szymanski:
Information Cascades in Feed-based Networks of Users with Limited Attention. CoRR abs/1508.06950 (2015) - 2014
- [c15]Anup K. Kalia, Nirav Ajmeri, Kevin S. Chan, Jin-Hee Cho, Sibel Adali, Munindar P. Singh:
A Model of Trust, Moods, and Emotions in Multiagent Systems and its Empirical Evaluation. TRUST@AAMAS 2014: 1-11 - [c14]Sujoy Sikdar, Sibel Adali, Md. Tanvir Al Amin, Tarek F. Abdelzaher, Kevin S. Chan, Jin-Hee Cho, Byungkyu Kang, John O'Donovan:
Finding true and credible information on Twitter. FUSION 2014: 1-8 - [c13]Shiqiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin S. Chan, Kin K. Leung:
Mobility-Induced Service Migration in Mobile Micro-clouds. MILCOM 2014: 835-840 - [c12]Jin-Hee Cho, Kevin S. Chan, Dariusz G. Mikulski:
Trust-Based Information and Decision Fusion for Military Convoy Operations. MILCOM 2014: 1387-1392 - 2013
- [j4]Jin-Hee Cho, Kevin S. Chan:
Building Trust-Based Sustainable Networks. IEEE Technol. Soc. Mag. 32(2): 32-38 (2013) - [c11]Jin-Hee Cho, Ing-Ray Chen, Yating Wang, Kevin S. Chan:
Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks. ICPADS 2013: 372-379 - [c10]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Kevin S. Chan, Ananthram Swami:
Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives. MILCOM 2013: 1862-1867 - [c9]Xinlei Wang, Jin-Hee Cho, Kevin S. Chan, Moonjeong Chang, Ananthram Swami, Prasant Mohapatra:
Trust and independence aware decision fusion in distributed networks. PerCom Workshops 2013: 481-486 - [c8]Jin-Hee Cho, Kevin S. Chan, Ing-Ray Chen:
Composite trust-based public key management in mobile ad hoc networks. SAC 2013: 1949-1956 - 2012
- [c7]Kevin Chan, Sibel Adali:
An agent based model for trust and information sharing in networked systems. CogSIMA 2012: 88-95 - [c6]Gunjan Verma, Ananthram Swami, Kevin S. Chan:
The effect of zealotry in the naming game model of opinion dynamics. MILCOM 2012: 1-6 - [c5]Kevin S. Chan, Jin-Hee Cho, Sibel Adali:
Composite Trust Model for an Information Sharing Scenario. UIC/ATC 2012: 439-446
2000 – 2009
- 2009
- [j3]Hossein Pishro-Nik, Kevin Sean Chan, Faramarz Fekri
:
Connectivity properties of large-scale sensor networks. Wirel. Networks 15(7): 945-964 (2009) - 2008
- [b1]Kevin Sean Chan:
Towards securing networks of resource constrained devices: a study of cryptographic primitives and key distribution schemes. Georgia Institute of Technology, Atlanta, GA, USA, 2008 - [j2]Kevin Sean Chan, Faramarz Fekri
:
A Resiliency-Connectivity metric in wireless sensor networks with key predistribution schemes and node compromise attacks. Phys. Commun. 1(2): 134-145 (2008) - [c4]Ramanan Subramanian, Kevin S. Chan, Faramarz Fekri
:
Analysis of latency in secure wireless sensor networks with key predistribution. ACSCC 2008: 2120-2124 - 2006
- [c3]Farshid Delgosha, Erman Ayday, Kevin Sean Chan, Faramarz Fekri
:
Security Services in Wireless Sensor Networks Using Sparse Random Coding. SECON 2006: 40-49 - 2005
- [c2]Kevin Sean Chan, Hossein Pishro-Nik, Faramarz Fekri
:
Analysis of hierarchical algorithms for wireless sensor network routing protocols. WCNC 2005: 1830-1835 - 2004
- [j1]Kevin Sean Chan, Faramarz Fekri
:
A block cipher cryptosystem using wavelet transforms over finite fields. IEEE Trans. Signal Process. 52(10): 2975-2991 (2004) - [c1]Hossein Pishro-Nik, Kevin Sean Chan, Faramarz Fekri
:
On connectivity properties of large-scale sensor networks. SECON 2004: 498-507
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-15 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint