Publications

Journal Papers

  1. Y. Mao, T. Chen, Y. Zhang, T. Wang, S. Zhong. Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Transactions on Information Forensics & Security, 12 (6): 1483-1493, June 2017.

  2. D. Pal, P. Khethavath, T. Chen, Y. Zhang , Mobile Payments in Global Markets using Biometrics and Cloud, International Journal of Communication Systems, 14 FEB 2017, DOI: 10.1002/dac.3293.

  3. S. Ji, T. Chen: Incentive Mechanisms for Discretized Mobile Crowdsensing, IEEE Transactions on Wireless Communications, 15(1):146-161, Jan. 2017.

  4. T. Chen, S. Zhong: An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing. IEEE Transactions on Vehicular Technology 63(9):4476-4491(2014).

  5. S. Ji, T. Chen, S. Zhong, Wormhole Attack Detection Algorithms in Wireless Network Coding Systems, accepted, to appear, IEEE Transactions on Mobile Computing, 2014.

  6. A. T. Boloorchi, M.H. Samadzadeh, T. Chen, Symmetric Threshold Multipath (STM): An online symmetric key management scheme, Information Sciences, Volume 268, June, 2014, Pages: 489-504.

  7. D. Pal, T. Chen, S. Zhong, P. Khethavath, Designing an Algorithm to Preserve Privacy for Medical Record Linkage With Error-Prone Data, in press, JMIR Medical Informatics, 2014.

  8. T. Chen, S. Zhong. Truthful Auctions for Continuous Spectrum with Variable Bandwidths, IEEE Transactions on Wireless Communications 13(2), 1116-1128, 2014.

  9. F. Wu, T. Chen, S. Zhong, C. Qiao, G. Chen. A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks, IEEE Transactions on Wireless Communications, 12(4), 1573-1583, 2013.

  10. T. Chen, F. Wu, S. Zhong. On Designing Protocols for Non-cooperative, Multi-Radio Channel Assignment in Multiple Collision Domains, IEEE Transactions on Computers, 62(7), 1403-1416, 2013.

  11. T. Chen, F. Wu, S. Zhong. FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad-Hoc Networks, IEEE Transactions on Computers, Volume 60, Issue 7, July 2011, Page(s):1045 - 1056.

  12. S. Zhong, T. Chen. An Efficient, Identity-based Protocol for Private Matching, International Journal of Communication Systems, Volume 24, Issue 4, Apr. 2011. Page(s): 543-552.

  13. T. Chen, L. Zhu, F. Wu, S. Zhong. Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach, IEEE Transactions on Vehicular Technology, Volume 60, Issue 2, Feb. 2011, Page(s):566 - 579.

  14. T. Chen, S. Zhong. Privacy Preserving Back-Propagation Neural Network Learning, IEEE Transactions on Neural Networks, Volume 20, Issue 10, Oct. 2009, Page(s):1554 - 1564.

  15. A. Bansal, T. Chen, S. Zhong. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data, Neural Computing & Applications, Volume 20, Number 1, Feb. 2011, Pages 1058-1061.

  16. S. Zhong, Z. Yang, T. Chen, k-Anonymous Data Collection, Information Sciences, Volume 179, Issue 17, Aug. 2009, Pages 2948-2963.

  17. T. Chen, S. Zhong. Perfectly Fair Channel Assignment in Non-cooperative Multi-radio Multi-channel Wireless Networks, Computer Communications, Volume 32, Number 6, Pages 1058-1061, 2009.

  18. T. Chen, A. Bansal and S. Zhong, A Reputation System for Wireless Mesh Networks Using Network Coding, Journal of Network and Computer Applications, Volume 34, Number 2, Mar. 2011, Pages 1058-1061.

  19. T. Chen and S. Zhong, Privacy-Preserving Models for Comparing Survival Curves Using the Logrank Test, Computer Methods and Programs in Biomedicine, 104(2): 249-253, 2011.

  20. T. Chen, S. Zhong. Emergency Access Authorization for Personally Controlled Online Health Care Data, Journal of Medical Systems, 36(1): 291-300, 2012.

  21. T. Chen, A. Bansal, S. Zhong and X. Chen, Protecting Data Privacy in Growing Neural Gas, Neural Computing & Applications, 21(6): 1255-1262, 2012.

Conference Papers

  1. E. Rothberg, T. Chen, L. Jie, J. Hao, Localized Adversarial Training for Increased Accuracy and Robustness in Image Classification, 1st Workshop on Adversarial Learning Methods for Machine Learning and Data Mining, co-located with KDD 2019.

  2. E. Rothberg, T. Chen, J. Hao, Towards Better Accuracy and Robustness with Localized Adversarial Training, in the proceeding of AAAI-19, student poster, Honolulu, Hawaii, Jan. 2019.

  3. A. Poon, S. Jankly, T. Chen, Privacy Preserving Fisher’s Exact Test on Genomic Data, 5th National Symposium for NSF REU Research in Data Science, Systems, and Security, collocated with 2018 IEEE Big Data, Seattle, Dec. 10th, 2018.

  4. S. Jankly, A. Schmidt, T. Chen, Genomic Data Privacy Protection Based on GPU-Accelerated Encryption, 2018 American Medical Informatics Association (AMIA) Annual Symposium (poster), San Francisco, November 2018.

  5. S. Ji, T. Chen, On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing Systems, Proceedings of IEEE Trustcom, Sydney, Australia, August, 2017.

  6. Y. Zhang, S. Tang, T. Chen, S. Zhong, Competitive Auctions for Cost-aware Cellular Traffic Offloading with Optimized Capacity Gain. Proceedings of the 35th International Conference on Computer Communications (IEEE INFOCOM), San Francisco, May, 2016.

  7. S. Ji, T. Chen, F. Wu, “Crowdsourcing with Trembles: Incentive Mechanisms for Mobile Phones with Uncertain Sensing Time”, Proceedings of International Conference on Communications (IEEE ICC), London, UK, June, 2015.

  8. Y. Mao, T. Chen, Y. Zhang, T. Wang, and S. Zhong. Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks, in Proceedings of The 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, (MSWIM 2015), Cancun, Mexico, Nov., 2015.

  9. D. Pal, T. Chen, J. Thomas. Privacy Preserving Sequential Pattern Mining Across Multiple Medical Sites, in Proceedings of the 2015 American Medical Informatics Association (AMIA) Annual Symposium (poster), San Francisco, November 2015.

  10. D. Pal, P. Khethavath, J. Thomas, and T. Chen. Multilevel Threshold Secret Sharing in Distributed Cloud, in Proceedings of the Third International Symposium on Security in Computing and Communications, August, 2015, pp 13-23.

  11. D. Pal, P. Khethavath, J. Thomas, and T. Chen. Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique, in Proceedings of the Third International Symposium on Security in Computing and Communications, August, 2015, pp 146-156.

  12. S. Ji, T. Chen, S. Zhong, S. Kak. DAWN: Defending Against Wormhole Attacks in Wireless Network Coding Systems, in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Toronto, Canada, April, 2014.

  13. S. Ji, T. Chen, F. Wu. Crowdsourcing with Trembles: Incentive Mechanisms for Mobile Phones with Uncertain Sensing Time, in Proceedings of International Conference on Communications, (IEEE ICC), London, UK, June, 2015.

  14. S. Ji, T. Chen. Crowdsensing Incentive Mechanisms for Mobile Systems with Finite Precisions, in Proceedings of International Conference on Communications, (IEEE ICC), Sydney, Australia, June, 2014.

  15. T. Chen, S. Zhong. On Designing Truthful Spectrum Auctions for Variable Bandwidths, in Proceedings of International Conference on Communications, (IEEE ICC), June, 2013.

  16. J. Yuan, T. Ward, S. Honarvar, T. Chen, J. Thomas, HMM-driven Smart White-space-aware Frame Control Protocol for Coexistence of ZigBee and WiFi, in IEEE International Conference on Pervasive Computing and Communications (PerCom) 2013, WIP track, (Corresponding Author).

  17. E. Chan-Tin, T. Chen and S. Kak. A Comprehensive Security Model for New Challenges in Networking Applications, in Proceedings of Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST) 2012, collocated with ICCCN 2012.

  18. F. Wu, T. Chen, S. Zhong, C. Qiao and G. Chen. A Bargaining-Based Approach for Incentive-Compatible Message Forwarding in Opportunistic Networks, in Proceedings of International Conference on Communications, Ottawa, Canada, 2012.

  19. T. Chen and S. Zhong. An Efficient Privacy Preserving Method for Matching Patient Data Across Different Providers, in Proceedings of the 2010 American Medical Informatics Association (AMIA) Annual Symposium (poster), Washington, DC, November 2010.

  20. T. Chen and S. Zhong. INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding, in Proceedings of the 29th IEEE International Conference on Computer Communications, INFOCOM 2010.

  21. F. Wu, T. Chen, S. Zhong, L. (Erran) Li, Y. R. Yang, Incentive-compatible opportunistic routing for wireless networks, in Proceedings of The Fourteenth Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2008), San Francisco, CA, USA, Sep. 14-19, 2008.

  22. T. Chen, S. Zhong, Enhancing Privacy of Released Database, in Proceedings of 2007 IEEE International Conference on Granular Computing (GrC 2007), San Jose, California, USA, 2-4 November 2007. (Invited Paper).

Teaching

I am a teaching instructor for the following courses at Cal Poly Pomona:

CS1300 Discrete Structures

CS3110 Formal Language and Automata

CS3650 Computer Architecture

CS4600 Secure Communications

CS4990 Wireless Network Security

CS5990 Game Theory and its Applications in Communication Networks

I used to teach CS4243/5243 Algorithms and Processes in Computer Security, and CS5813 Principles of Wireless Networks, from 2011 to 2014 in Oklahoma State University.

Professional Service

Co-chair for The First International Workshop on Machine Learning Security and Privacy: Experiences and Applications, collocated with IEEE MASS 2019.

IoT Track Chair for 27th IEEE International Conference on Computer Communications and Networks (ICCCN 2018).

Poster Chair for 36th IEEE International Performance Computing and Communications Conference (IPCCC 2017).

Lead Guest Editor for the Special Issue”Big Data Management and Analytics for Mobile Crowdsensing” in Mobile Information Systems, 2016.

Publication Co-chair for 34th IEEE International Performance Computing and Communications Conference (IPCCC 2015).

Workshop Chair for 30th IEEE International Performance Computing and Communications Conference (IPCCC 2011).

Proposal Reviewer for U.S. Food and Drug Administration, 2010

Technical Program Committee Member for The IEEE INFOCOM 2014-2020, IEEE Healthcom 2015, IEEE CCNC 2014, The BodyNets 2013,The 2013 International Workshop on Security in Cloud Computing, co-located with ASIACCS, The 6th International Conference on Network and System Security (NSS 2012), The 12th IEEE International Conference on Scalable Computing and Communications (ScalCom 2012), International Conference on Computer Communications and Networks (ICCCN 2013, 2011), International Conference on u- and e- Service, Science and Technology (UNESST 2012, 2011), The Second International Symposium on Data, Privacy, & E-Commerce (ISDPE 2010) and The IEEE International Performance Computing and Communications Conference (IPCCC 2017, 2012, 2011, 2009).

Paper reviewer for journals: IEEE Transactions on Vehicular Technology, IEEE Journal on Selected Areas in Communications, Information Sciences (Elsevier), IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Neural Networks, Journal of Network and Computer Applications (Elsevier), Medical & Biological Engineering & Computing (Springer), Ad Hoc Networks (Elsevier), IEEE Transactions on Information Forensics & Security, IEEE Transactions on Mobile Computing, Wireless Networks(Springer), IEEE Transactions on Information Technology in Biomedicine, International Journal of Security and Networks(Inderscience), Information Systems Frontiers(Springer).

Contact

  • 909 869 4842
  • Building 8 Room 9, 3801 W. Temple Ave., Pomona, California, 91768, USA
  • MWF 9:30 to 10:00, 12:00 to 12:30
    Otherwise email to book an appointment