Tingting Chen

Tingting Chen

Professor, Computer Science Department, College of Science

Journal and Conference Papers

Conference Papers

  1. D. Shah, R. Huang, T. Chen, and M. Jadliwala , "Rider Posture-based Continuous Authentication with Few-Shot learning for Mobility Scooters", AAAI-24 Student Poster, Vancouver, Canada, February 2024.
  2. R. Huang, M. Jara, and T. Chen, "Deep Learning based Driving Posture Stability Analysis for People with Mobility Challenges",  IEEE International Conference on Big Data (Big Data), Sorrento, Italy, December, 2023. 
  3. M. Cruz, and S. De Beleh, and R. Janairo and Y. Zhao and I. Raheja, and T. Chen, "Mobility Scooter User Driving Behavior Classification based on Deep Neural Networks" (Poster), 2022 IEEE International Conference on Big Data (Big Data), 2022.
  4. S. Oslund, C. Washington, A. So, T. Chen, H. Ji, Robust Adversarial Stickers for Arbitrary Objects in the Physical World, 4th workshop on Adversarial Learning Methods for Machine Learning and Data Mining, co-located with ACM KDD 2022, Aug. 2022.
  5. C. Washington*, M. Wilder-Smith, T. Chen, H. Ji, Robust Localized Physical Attacks on Deep Learning Classifiers for Objects with Arbitrary Surface, 3rd Workshop on Adversarial Learning Methods for Machine Learning and Data Mining, co-located with ACM KDD 2021, Aug. 2021.
  6. A. Xiong, M. Nguyen, A. So and T. Chen, "Privacy Preserving Inference with Convolutional Neural Network Ensemble," in 2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, 2020.
  7. Yao, T. Chen, H. Ji, Multiview-Robust 3D Adversarial Examples of Real-world Objects, CVPR 2020 Workshop on Adversarial Machine Learning in Computer Vision (poster), June, 2020.
  8. Yao, T. Chen, H. Ji, On Multiview Robustness of 3D Adversarial Attacks, in proceeding of ACM PEARC 2020, Practice & Experience in Advanced Research Computing, July, 2020.
  9. Rothberg, T. Chen, L. Jie, J. Hao, Localized Adversarial Training for Increased Accuracy and Robustness in Image Classification, 1st Workshop on Adversarial Learning Methods for Machine Learning and Data Mining, co-located with KDD 2019, Anchorage, Alaska, Aug. 2019.
  10. E. Rothberg, T. Chen, J. Hao, Towards Better Accuracy and Robustness with Localized Adversarial Training, in the proceeding of AAAI-19, student poster, Honolulu, Hawaii, Jan. 2019.
  11. A. Poon, S. Jankly, T. Chen, Privacy Preserving Fisher's Exact Test on Genomic Data, 5th National Symposium for NSF REU Research in Data Science, Systems, and Security, collocated with 2018 IEEE Big Data, Seattle, Dec. 10th, 2018.
  12. S. Jankly, A. Schmidt, T. Chen, Genomic Data Privacy Protection Based on GPU-Accelerated Encryption, 2018 American Medical Informatics Association (AMIA) Annual Symposium (poster), San Francisco, November 2018.
  13. S. Ji, T. Chen, On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing Systems, Proceedings of IEEE Trustcom, Sydney, Australia, August, 2017. 
  14. Y. Zhang, S. Tang, T. Chen, S. Zhong, Competitive Auctions for Cost-aware Cellular Traffic Offloading with Optimized Capacity Gain. Proceedings of the 35th International Conference on Computer Communications (IEEE INFOCOM), San Francisco, May, 2016.
  15. S. Ji,  T. Chen, F. Wu, “Crowdsourcing with Trembles: Incentive Mechanisms for Mobile Phones with Uncertain Sensing Time”, Proceedings of International Conference on Communications (IEEE ICC), London, UK, June, 2015.
  16. Y. Mao, T. Chen, Y. Zhang, T. Wang, and S. Zhong. Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks, in Proceedings of The 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, (MSWIM 2015), Cancun, Mexico, Nov., 2015.
  17. D. Pal,  T. Chen, J. Thomas. Privacy Preserving Sequential Pattern Mining Across Multiple Medical Sites, in Proceedings of the 2015 American Medical Informatics Association (AMIA) Annual Symposium (poster), San Francisco, November 2015. 
  18. D. Pal, P. Khethavath, J. Thomas, and  T. Chen. Multilevel Threshold Secret Sharing in Distributed Cloud, in Proceedings of the Third International Symposium on Security in Computing and Communications, August, 2015, pp 13-23. 
  19. D. Pal, P. Khethavath, J. Thomas, and  T. Chen. Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique, in Proceedings of the Third International Symposium on Security in Computing and Communications, August, 2015, pp 146-156. 
  20. S. Ji,  T. Chen, S. Zhong, S. Kak. DAWN: Defending Against Wormhole Attacks in Wireless Network Coding Systems, in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Toronto, Canada, April, 2014. 
  21. S. Ji,  T. Chen, F. Wu. Crowdsourcing with Trembles: Incentive Mechanisms for Mobile Phones with Uncertain Sensing Time, in Proceedings of International Conference on Communications, (IEEE ICC), London, UK, June, 2015. 
  22. S. Ji,  T. Chen. Crowdsensing Incentive Mechanisms for Mobile Systems with Finite Precisions, in Proceedings of International Conference on Communications, (IEEE ICC), Sydney, Australia, June, 2014. 
  23. T. Chen, S. Zhong. On Designing Truthful Spectrum Auctions for Variable Bandwidths, in Proceedings of International Conference on Communications, (IEEE ICC), June, 2013.
  24. J. Yuan, T. Ward, S. Honarvar,  T. Chen, J. Thomas, HMM-driven Smart White-space-aware Frame Control Protocol for Coexistence of ZigBee and WiFi, in IEEE International Conference on Pervasive Computing and Communications (PerCom) 2013, WIP track, (Corresponding Author). 
  25. E. Chan-Tin,   T. Chen and S. Kak. A Comprehensive Security Model for New Challenges in Networking Applications, in Proceedings of Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST) 2012, collocated with ICCCN 2012. 
  26. F. Wu,   T. Chen, S. Zhong, C. Qiao and G. Chen. A Bargaining-Based Approach for Incentive-Compatible Message Forwarding in Opportunistic Networks, in Proceedings of International Conference on Communications, Ottawa, Canada, 2012. 
  27. T. Chen and S. Zhong. An Efficient Privacy Preserving Method for Matching Patient Data Across Different Providers, in Proceedings of the 2010 American Medical Informatics Association (AMIA) Annual Symposium (poster), Washington, DC, November 2010. 
  28. T. Chen and S. Zhong. INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding, in Proceedings of the 29th IEEE International Conference on Computer Communications, INFOCOM 2010. 
  29. F. Wu,   T. Chen, S. Zhong, L. (Erran) Li, Y. R. Yang, Incentive-compatible opportunistic routing for wireless networks, in Proceedings of The Fourteenth Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2008), San Francisco, CA, USA, Sep. 14-19, 2008. 
  30. T. Chen, S. Zhong, Enhancing Privacy of Released Database, in Proceedings of 2007 IEEE International Conference on Granular Computing (GrC 2007), San Jose, California, USA, 2-4 November 2007. (Invited Paper)

 

Journal Papers

  1. Oslund*, C. Washington*, A. So*, T. Chen, H. Ji, Multiview Robust Adversarial Stickers for Arbitrary Objects in the Physical World. Journal of Computational and Cognitive Engineering, 1(4), 152-158, 2022. 
  2. Y. Mao, T. Chen, Y. Zhang, T. Wang, S. Zhong. Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Transactions on Information Forensics & Security, 12 (6): 1483-1493, June 2017. 
  3. D. Pal, P. Khethavath, T. Chen, Y. Zhang , Mobile Payments in Global Markets using Biometrics and Cloud,  International Journal of Communication Systems, 14 FEB 2017, DOI: 10.1002/dac.3293.
  4. S. Ji, T. Chen: Incentive Mechanisms for Discretized Mobile Crowdsensing, IEEE Transactions on Wireless Communications, 15(1):146-161, Jan. 2017.
  5. T. Chen, S. Zhong: An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing. IEEE Transactions on Vehicular Technology 63(9):4476-4491(2014).
  6. S. Ji, T. Chen, S. Zhong, Wormhole Attack Detection Algorithms in Wireless Network Coding Systems, accepted, to appear, IEEE Transactions on Mobile Computing, 2014.
  7. A. T. Boloorchi, M.H. Samadzadeh, T. Chen, Symmetric Threshold Multipath (STM): An online symmetric key management scheme, Information Sciences, Volume 268, June, 2014, Pages: 489-504.
  8. D. Pal, T. Chen, S. Zhong, P. Khethavath, Designing an Algorithm to Preserve Privacy for Medical Record Linkage With Error-Prone Data, in press, JMIR Medical Informatics, 2014. 
  9. T. Chen, S. Zhong. Truthful Auctions for Continuous Spectrum with Variable Bandwidths, IEEE Transactions on Wireless Communications 13(2), 1116-1128, 2014. 
  10. F. Wu, T. Chen, S. Zhong, C. Qiao, G. Chen. A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks, IEEE Transactions on Wireless Communications, 12(4), 1573-1583, 2013. 
  11. T. Chen, F. Wu, S. Zhong. On Designing Protocols for Non-cooperative, Multi-Radio Channel Assignment in Multiple Collision Domains, IEEE Transactions on Computers, 62(7), 1403-1416, 2013. 
  12. T. Chen, F. Wu, S. Zhong. FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad-Hoc Networks, IEEE Transactions on Computers, Volume 60, Issue 7, July 2011, Page(s):1045 - 1056. 
  13. S. Zhong, T. Chen. An Efficient, Identity-based Protocol for Private Matching, International Journal of Communication Systems, Volume 24, Issue 4, Apr. 2011. Page(s): 543-552. 
  14. T. Chen, L. Zhu, F. Wu, S. Zhong. Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach, IEEE Transactions on Vehicular Technology, Volume 60, Issue 2, Feb. 2011, Page(s):566 - 579. 
  15. T. Chen, S. Zhong. Privacy Preserving Back-Propagation Neural Network Learning, IEEE Transactions on Neural Networks, Volume 20, Issue 10, Oct. 2009, Page(s):1554 - 1564. 
  16. A. Bansal, T. Chen, S. Zhong. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data, Neural Computing & Applications, Volume 20, Number 1, Feb. 2011, Pages 1058-1061. 
  17. S. Zhong, Z. Yang, T. Chen, k-Anonymous Data Collection, Information Sciences, Volume 179, Issue 17, Aug. 2009, Pages 2948-2963. 
  18. T. Chen, S. Zhong. Perfectly Fair Channel Assignment in Non-cooperative Multi-radio Multi-channel Wireless Networks, Computer Communications, Volume 32, Number 6, Pages 1058-1061, 2009. 
  19. T. Chen, A. Bansal and S. Zhong, A Reputation System for Wireless Mesh Networks Using Network Coding, Journal of Network and Computer Applications, Volume 34, Number 2, Mar. 2011, Pages 1058-1061. 
  20. T. Chen and S. Zhong, Privacy-Preserving Models for Comparing Survival Curves Using the Logrank Test, Computer Methods and Programs in Biomedicine, 104(2): 249-253, 2011. 
  21. T. Chen, S. Zhong. Emergency Access Authorization for Personally Controlled Online Health Care Data, Journal of Medical Systems, 36(1): 291-300, 2012. 
  22. T. Chen, A. Bansal, S. Zhong and X. Chen, Protecting Data Privacy in Growing Neural Gas, Neural Computing & Applications, 21(6): 1255-1262, 2012.