default search action
Dong Chen 0010
Person information
- affiliation: Florida International University, School of Computing and Information Sciences, Miami, FL, USA
- affiliation (PhD 2018): University of Massachusetts, Amherst, MA, USA
- affiliation (PhD 2014): Northeastern University, School of Information Science and Engineering, Shenyang, China
Other persons with the same name
- Dong Chen — disambiguation page
- Dong Chen 0001 — University of Maryland, Department of Physics and Astronomy, Institute for Advanced Computer Studies, College Park, MD, USA
- Dong Chen 0002 — University of Maryland, Department of Geographical Sciences, College Park, MD, USA
- Dong Chen 0003 — Microsoft Research, Visual Computing Group, Beijing, China (and 1 more)
- Dong Chen 0004 — College of Information and Communication, Xi'an, China (and 2 more)
- Dong Chen 0005 — IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA
- Dong Chen 0006 — Chinese Academy of Sciences, Institute of Software, Beijing, China
- Dong Chen 0007 — Nanjing University, Jiangsu Provincial Key Laboratory of Geographic Information Science and Technology / School of Geographic and Oceanographic Sciences, China
- Dong Chen 0008 — Chongqing University, College of Automation / MOE Key Laboratory of Dependable Service Computing in Cyber Physical Society, China
- Dong Chen 0009 — Nanjing Forestry University, College of Civil Engineering, Nanjing, China (and 1 more)
- Dong Chen 0011 — Siemens, Corporate Technology, Munich, Germany (and 1 more)
- Dong Chen 0012 — Zhejiang Normal University, Department of Mathematics, Jinhua, China
- Dong Chen 0013 — Hunan University, Chang Sha, China
- Dong Chen 0014 — Guangxi Normal University, College of Computer Science & Information Engineering, Guilin, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c16]Md Hasan Shahriar, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Dong Chen:
iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems. CNS 2021: 200-208 - [c15]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Dong Chen, Hisham A. Kholidy:
BIoTA: Control-Aware Attack Analytics for Building Internet of Things. SECON 2021: 1-9 - [i1]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Dong Chen, Hisham A. Kholidy:
BIoTA Control-Aware Attack Analytics for Building Internet of Things. CoRR abs/2107.14136 (2021)
2010 – 2019
- 2019
- [c14]Noman Bashir, Dong Chen, David E. Irwin, Prashant J. Shenoy:
Solar-TK: A Data-Driven Toolkit for Solar PV Performance Modeling and Forecasting. MASS 2019: 456-466 - [c13]Noman Bashir, Dong Chen, David E. Irwin, Prashant J. Shenoy:
Solar-TK: A Solar Modeling and Forecasting Toolkit. BuildSys@SenSys 2019: 372 - 2018
- [j10]Bing Jia, Lifei Hao, Chuxuan Zhang, Dong Chen:
A Dynamic Estimation of Service Level Based on Fuzzy Logic for Robustness in the Internet of Things. Sensors 18(7): 2190 (2018) - [c12]Dong Chen, Phuthipong Bovornkeeratiroj, David E. Irwin, Prashant J. Shenoy:
Private Memoirs of IoT Devices: Safeguarding User Privacy in the IoT Era. ICDCS 2018: 1327-1336 - [c11]Dong Chen, Joseph Breda, David E. Irwin:
Staring at the sun: a physical black-box solar performance model. BuildSys@SenSys 2018: 53-62 - 2017
- [j9]Dong Chen, David E. Irwin:
Black-box Solar Performance Modeling: Comparing Physical, Machine Learning, and Hybrid Approaches. SIGMETRICS Perform. Evaluation Rev. 45(2): 79-84 (2017) - [c10]Dong Chen, David E. Irwin:
Weatherman: Exposing weather-based privacy threats in big energy data. IEEE BigData 2017: 1079-1086 - [c9]Dong Chen, David E. Irwin:
SunDance: Black-box Behind-the-Meter Solar Disaggregation. e-Energy 2017: 45-55 - 2016
- [c8]Dong Chen, Srinivasan Iyengar, David E. Irwin, Prashant J. Shenoy:
SunSpot: Exposing the Location of Anonymous Solar-powered Homes. BuildSys@SenSys 2016: 85-94 - [c7]Dong Chen, David E. Irwin, Prashant J. Shenoy:
SmartSim: A device-accurate smart home simulator for energy analytics. SmartGridComm 2016: 686-692 - 2015
- [j8]Dong Chen, Sandeep Kalra, David E. Irwin, Prashant J. Shenoy, Jeannie R. Albrecht:
Preventing Occupancy Detection From Smart Meters. IEEE Trans. Smart Grid 6(5): 2426-2434 (2015) - 2014
- [c6]Dong Chen, David E. Irwin, Prashant J. Shenoy, Jeannie R. Albrecht:
Combined heat and privacy: Preventing occupancy detection from smart meters. PerCom 2014: 208-215 - 2013
- [c5]Dong Chen, Sean Kenneth Barker, Adarsh Subbaswamy, David E. Irwin, Prashant J. Shenoy:
Non-Intrusive Occupancy Monitoring using Smart Meters. BuildSys@SenSys 2013: 9:1-9:8 - 2012
- [j7]Dong Chen, Guiran Chang, Dawei Sun, Jie Jia, Xingwei Wang:
Modeling access control for cyber-physical systems using reputation. Comput. Electr. Eng. 38(5): 1088-1101 (2012) - [j6]Dawei Sun, Guiran Chang, Dong Chen, Xingwei Wang:
Modelling, evaluating, designing and maximising resource allocation revenue by an auction mechanism in cloud computing environments. Int. J. Comput. Appl. Technol. 43(4): 385-392 (2012) - [j5]Dong Chen, Guiran Chang, Dawei Sun, Jie Jia, Xingwei Wang:
Lightweight key management scheme to enhance the security of internet of things. Int. J. Wirel. Mob. Comput. 5(2): 191-198 (2012) - [j4]Dong Chen, Guiran Chang:
A Survey on Security Issues of M2M Communications in Cyber-Physical Systems. KSII Trans. Internet Inf. Syst. 6(1): 24-45 (2012) - [j3]Dong Chen, Guiran Chang, Jie Jia:
AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems. KSII Trans. Internet Inf. Syst. 6(9): 2052-2072 (2012) - [c4]Changsheng Miao, Fengling Cao, Dong Chen, Guiran Chang:
A Lightweight Group-Key Management Protocol for Ad Hoc Networks. ICGEC 2012: 288-291 - 2011
- [j2]Dong Chen, Guiran Chang, Dawei Sun, Jiajia Li, Jie Jia, Xingwei Wang:
TRM-IoT: A trust management model based on fuzzy reputation for internet of things. Comput. Sci. Inf. Syst. 8(4): 1207-1228 (2011) - [j1]Dong Chen, Guiran Chang, Xiuying Zheng, Dawei Sun, Jiajia Li, Xingwei Wang:
A Novel P2P Based Grid Resource Discovery Model. J. Networks 6(10): 1390-1397 (2011) - [c3]Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng:
Research on Architecture, Cross-Layer MAC Protocol for Wireless Sensor Networks. ICGEC 2011: 291-294 - [c2]Dong Chen, Guiran Chang, Lizhong Jin, Xiaodong Ren, Jiajia Li, Fengyun Li:
A Novel Secure Architecture for the Internet of Things. ICGEC 2011: 311-314
2000 – 2009
- 2009
- [c1]Dong Chen, Zhenhua Tan, Guiran Chang, Xingwei Wang:
An Improvement to the Chord-Based P2P Routing Algorithm. SKG 2009: 266-269
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint