Tieming Chen

ORCID: 0000-0003-1667-7924
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Opportunistic and Delay-Tolerant Networks
  • Energy Efficient Wireless Sensor Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Privacy-Preserving Technologies in Data
  • Infrared Target Detection Methodologies
  • Target Tracking and Data Fusion in Sensor Networks
  • Software System Performance and Reliability
  • Recommender Systems and Techniques
  • Security in Wireless Sensor Networks
  • Privacy, Security, and Data Protection
  • Neural Networks and Applications
  • IoT and Edge/Fog Computing
  • Anomaly Detection Techniques and Applications
  • Mobile Ad Hoc Networks
  • Blockchain Technology Applications and Security

Zhejiang University of Technology
2010-2025

Friend recommendation is important and inevitable in social network. However, many strategies of networks are not necessarily consistent with user's interests. In order to avoid the randomness unreliability friend network, this paper proposed a safe efficient scheme based on privacy-preserving protocol. Target users send request for friends Center Authority (CA), CA selects candidates from all system tag matching basis choose among filtered by CA. What more, algorithm selected an appropriate...

10.1109/access.2018.2872494 article EN cc-by-nc-nd IEEE Access 2018-01-01

Range query processing is a common edge computing and service in the Internet of things, which can extract user-interest information from distributed devices. How to design lightweight privacy-preserving range methods remains challenging task. Existing secure approaches suffer both high communication cost long response time, makes them unsuitable for over resource-constrained In this article, we propose two privacy-aware fuzzy schemes based on theory. Linguistic variables, overlap...

10.1109/tfuzz.2021.3059952 article EN IEEE Transactions on Fuzzy Systems 2021-02-17

Implementation performance and key randomness are two issues for stream cipher systems. In this paper, a lightweight with good of is firstly proposed. It utilizes novel proposed model named tree parity machine to generate streams. The most superiority our scheme that 128 bits could be generated based on one time state rotation, it passes the full ENT test. Then, implementation wireless sensor networks, Tiny Stream, presented. Stream TinySec protocols, just costs 65024 bytes ROM 1659184 RAM...

10.1109/cis.2010.121 article EN 2010-12-01

Vehicular Ad Hoc Networks (VANETs) hold the opportunity to help improve safe driving and road efficiency. There are great uncertainty unpredictability in VANETs due rapid vehicle movement changeable conditions, which makes designing a Quality of Service (QoS) aware data forwarding protocol for remain significant challenge. In this paper, A novel fuzzy decision based scheme is proposed meet QoS requirements high reliability low latency. Unlike existing routing methods, information instead raw...

10.1109/wowmom57956.2023.00032 article EN 2023-06-01

Recently, APT attacks have frequently happened, which are increasingly complicated and more challenging for traditional security detection models. The system logs vital cyber analysis mainly due to their effective reconstruction ability of behavior. existing log collection tools built on ETW Windows suffer from working shortages, including data loss, high overhead, weak real-time performance. Therefore, It is still very difficult apply ETW-based analyze attack scenarios. To address these...

10.48550/arxiv.2207.11530 preprint EN other-oa arXiv (Cornell University) 2022-01-01
Coming Soon ...