Journal Papers and Magazines

[J25] Sijia Liu, Haiming Chen, Scott Ronquist, Laura Seaman, Nicholas Ceglia, Walter Meixner, Pin-Yu Chen, Gerald Higgins, Pierre Baldi, Steve Smale, Alfred Hero, Lindsey Muir, Indika Rajapakse, “Genome Architecture Mediates Transcriptional Control of Human Myogenic Reprogramming,” iScience, 2018

[J24] Pin-Yu Chen, Chun-Chen Tu, Paishun Ting, Ya-Yun Luo, Danai Koutra, and Alfred Hero, “Identifying Influential Links for Event Propagation on Twitter: A Network of Networks Approach,” IEEE Transactions on Signal and Information Processing over Networks, 2018

[J23] Pin-Yu Chen, Meng-Hsuan Sung, and Shin-Ming Cheng, “Analysis of Data Dissemination and Control in Social Internet of Vehicles,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2467-2477, Aug. 2018

[J22] Pin-Yu Chen and Alfred Hero, “Phase Transitions and a Model Order Selection Algorithm for Spectral Graph Clustering,” IEEE Transactions on Signal Processing, vol. 66, no. 13, pp. 3407-3420, Jul. 2018 <AMOS code><slides>

[J21] Sijia Liu, Pin-Yu Chen, and Alfred Hero, “Accelerated Distributed Dual Averaging over Evolving Networks of Growing Connectivity,” IEEE Transactions on Signal Processing, vol. 66, no. 7, pp. 1845-1859, Apr. 2018

[J20] Pin-Yu Chen, Baichuan Zhang, and Mohammad Al Hasan, “Incremental Eigenpair Computation for Graph Laplacian Matrices: Theory and Applications,” Social Network Analysis and Mining, vol. 8, no. 1, Jan. 2018

[J19] P.-Y. Chen, S.-M. Cheng, and H.-Y. Hsu, “Analysis of Information Delivery Dynamics in Cognitive Sensor Networks Using Epidemic Models,” IEEE Internet of Things Journal (special issue on Cognitive Internet of Things), vol. 5, no. 4, pp. 2333-2342, Aug. 2018

[J18] P.-Y. Chen and A. O. Hero, “Multilayer Spectral Graph Clustering via Convex Layer Aggregation: Theory and Algorithms,” IEEE Transactions on Signal and Information Processing over Networks (joint special issue on graph signal processing for J-STSP and T-SIPN), vol. 3, no. 3, pp. 553-567, Sep. 2017

[J17] P.-Y. Chen and S. Liu, “Bias-Variance Tradeoff of Graph Laplacian Regularizer,” IEEE Signal Processing Letters, vol. 24, no. 8, pp. 1118-1122, Aug. 2017

[J16] S.-M. Cheng, P.-Y. Chen, C.-C. Lin, and H.-C. Hsiao, “Traffic-aware Patching for Cyber Security in Mobile IoT,” IEEE Communications Magazine, vol. 55, no 7, pp. 29-35, Jul. 2017 (highlighted by IEEE Xplore Spotlight, Dec. 2017)

[J15] P.-Y. Chen, C.-C. Lin, S.-M. Cheng, C.-Y. Huang, and H.-C. Hsiao, “Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack,” IEEE Communications Magazine, vol. 54, no. 6, pp. 75-81, Jun. 2016

[J14] P.-Y. Chen and A. O. Hero, “Deep Community Detection,” IEEE Transactions on Signal Processing, vol. 63, no. 21, pp. 5706-5719, Nov. 2015 <DCD_code>

[J13] P.-Y. Chen, S.-M. Cheng, P.-S. Ting, C.-W. Lien, and F.-J Chu, “When Crowdsourcing Meets Mobile Sensing: A Social Network Perspective,” IEEE Communications Magazine, vol. 53, no. 10, pp. 157-163, Oct. 2015

[J12] P.-Y. Chen and A. O. Hero, “Phase Transitions in Spectral Community Detection,” IEEE Transactions on Signal Processing, vol. 63, no. 16, pp. 4339-4347, Aug. 2015

[J11] P.-Y. Chen and A. O. Hero, “Universal Phase Transition in Community Detectability under a Stochastic Block Model,” Physical Review E, vol. 91, no. 3, pp. 032804, Mar. 2015

[J10] P.-Y. Chen and S.-M. Cheng, “Sequential Defense against Random and Intentional Attacks in Complex Networks,” Physical Review E, vol. 91, no. 2, pp. 022805, Feb. 2015

[J9] P.-Y. Chen and A. O. Hero, “Assessing and Safeguarding Network Resilience to Centrality Attacks,” IEEE Communications Magazine, vol. 52, no. 11, pp. 138-143, Nov. 2014 [Supplementary File] [Correction: For ego centrality, I means the matrix of ones]

[J8] P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, “Information Fusion to Defend Intentional Attack in Internet of Things,” IEEE Internet of Things Journal, vol. 1, no. 4, pp. 337-348, Aug. 2014

[J7] P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, “Optimal Control of Epidemic Information Dissemination over Networks,” IEEE Transactions on Cybernetics, vol. 44, no. 12, pp. 2316-2328, Dec. 2014

[J6] S.-M. Cheng, V. Karyotis, P.-Y. Chen, K.-C. Chen, and S. Papavassiliou, “Diffusion Models for Information Dissemination Dynamics in Wireless Complex Networks,” Journal of Complex Systems, 2013

[J5] P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, “Smart Attacks in Smart Grid Communication Networks,” IEEE Communications Magazine, vol. 50, no. 8, pp. 24–29, Aug. 2012 (highlighted by IEEE COMSOC Technology News, Sep. 2012)

[J4] W. C. Ao, P.-Y. Chen, and K.-C. Chen, “Rate-Reliability-Delay Trade-off of Multipath Transmission Using Network Coding,” IEEE Transactions on Vehicular Technology, vol.61, no.5, pp.2336-2342, Jun 2012

[J3] P.-Y. Chen, W. C. Ao, and K.-C. Chen, “Rate-Delay Enhanced Multipath Transmission Schem via Network Coding in Multihop Networks,” IEEE Communications Letters, vol.16, no.3, pp.281-283, March 2012

[J2] S.-M. Cheng, P.-Y. Chen, and K.-C. Chen, “Ecology of Cognitive Radio Ad Hoc Networks,” IEEE Communications Letters, vol.15, no.7, pp.764-766, July 2011

[J1] S.-M. Cheng, W. C. Ao, P.-Y. Chen, and K.-C. Chen, “On Modeling Malware Propagation in Generalized Social Networks,” IEEE Communications Letters, vol.15, no.1, pp.25-27, Jan. 2011

Book Chapters

[B5] P.-Y. Chen, “Attack, Defense, and Network Robustness of Internet of Things,” book chapter in Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, CRC Press, 2016 <Amazon link>

[B4] S.-M. Cheng, P.-Y. Chen, and K.-C. Chen, “Malware Propagation and Control in Internet of Things,” book chapter in Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, CRC Press, 2016 <Amazon link>

[B3] P.-Y. Chen, S.-M. Cheng, W. C. Ao, H.-Y. Hsu, and K.-C. Chen, “Delay Models for Epidemic-like Routing in Multihop Secondary Networks,” book chapter in Introduction to Cognitive Radio Networks and Applications, CRC Press, 2016 <Amazon link>

[B2] P.-Y. Chen, “Network Coding at the Source: Exploiting Multipath Transmission for Rate-Delay Adaptation,” book chapter in Network Coding and Data Compression: Theory, Applications, and Challenges, Nova Science Publishers, 2015 <Amazon link>

[B1] P.-Y. Chen, “A Game-theoretic Attack and Defense Model for Smart Grid,” book chapter in Smart Grids: Technologies, Applications and Management Systems, Nova Science Publishers, 2014 <Amazon link>

Conference and Workshop Papers

[C44] Amit Dhurandhar*, Pin-Yu Chen*, Ronny Luss, Chun-Chen Tu, Paishun Ting, Karthikeyan Shanmugam, and Payel Das, “Explanations based on the Missing: Towards Contrastive Explanations with Pertinent Negatives,” Neural Information Processing Systems (NIPS), 2018 (*equal contribution) <CEM_code> <Forbes_coverage><The_Weekly_Observer_coverage>

[C43] Huan Zhang*, Tsui-Wei Weng*, Pin-Yu Chen, Cho-Jui Hsieh, and Luca Daniel, “Efficient Neural Network Robustness Certification with General Activation Functions,” Neural Information Processing Systems (NIPS), 2018 (*equal contribution)

[C42] Sijia Liu, Bhavya Kailkhura, Pin-Yu Chen, Pai-Shun Ting, Shiyu Chang, and Lisa Amini, “Zeroth-Order Stochastic Variance Reduction for Nonconvex Optimization,” Neural Information Processing Systems (NIPS), 2018

[C41] Pin-Yu Chen*, Bhanukiran Vinzamuri*, and Sijia Liu, “Is Ordered Weighted $\ell_1$ Regularized Regression Robust to Adversarial Perturbation? A Case Study on OSCAR,” IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2018 (*equal contribution) <CLEVER_code> <IBM_Research_Blog> <SiliconANGLE_news><MIT_IBM_Medium>

[C40] Tsui-Wei Weng*, Huan Zhang*, Pin-Yu Chen, Aurelie Lozano, Cho-Jui Hsieh, and Luca Daniel, “On Extensions of CLEVER: a Neural Network Robustness Evaluation Algorithm,” IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2018 (*equal contribution)

[C39] Sijia Liu, Xingguo Li, Pin-Yu Chen, Jarvis Haupt, and Lisa Amini, “Zeroth-Order Stochastic Projected Gradient Descent for Nonconvex Optimization,” IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2018

[C38] Chia-Yi Hsu, Pei-Hsuan Lu, Pin-Yu Chen, and Chia-Mu Yu, “On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces,” IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2018

[C37] Dong Su*, Huan Zhang*, Hongge Chen, Jinfeng Yi, Pin-Yu Chen, and Yupeng Gao, “Is Robustness the Cost of Accuracy? A Comprehensive Study on the Robustness of 18 Deep Image Classification Models,” European Conference on Computer Vision (ECCV) 2018 (*equal contribution) <Code><slides>

[C36] Lingfei Wu, Pin-Yu Chen, Ian En-Hsu Yen, Fangli Xu, Yinglong Xia, and Charu Aggarwal, “Scalable Spectral Clustering Using Random Binning Features,” ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) 2018 (oral presentation) <IBM_Research_Blog> <poster> <slides> <SC-RB_Code>

[C35] Hongge Chen*, Huan Zhang*, Pin-Yu Chen, Jinfeng Yi, and Cho-Jui Hsieh, “Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning,” Annual Meeting of the Association for Computational Linguistics (ACL) 2018 (*equal contribution) <ShowAndFool_code> <poster>

[C34] Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, and Chia-Mu Yu, “On the Limitation of MagNet Defense against $L_1$ based Adversarial Examples,” IEEE/IFIP International Conference on Dependable and Systems and Networks (DSN) 2018, Workshop on Dependable and Secure Machine Learning

[C33] Pei-Hsuan Lu, Pin-Yu Chen, and Chia-Mu Yu, “On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples,” International Conference on Learning Representations (ICLR) 2018 Workshop <poster>

[C32] Yash Sharma and Pin-Yu Chen, “Attacking the Madry Defense Model with $L_1$-based Adversarial Examples,” International Conference on Learning Representations (ICLR) 2018 Workshop <poster>

[C31] Tsui-Wei Weng*, Huan Zhang*, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Guo, Cho-Jui Hsieh, and Luca Daniel, “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach,” International Conference on Learning Representations (ICLR) 2018 (*equal contribution) <CLEVER_code> <IBM_Research_Blog><SiliconANGLE_news><MIT_IBM_Medium>

[C30] Pin-Yu Chen* and Dennis Wei*, “On the Supermodularity of Active Graph-based Semi-supervised Learning with Stieltjes Matrix Regularization,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018 (*equal contribution) <poster>

[C29] Sijia Liu, Pin-Yu Chen, Indika Rajapakse, and Alfred Hero, “First-order Bifurcation Detection for Dynamic Complex Networks,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018

[C28] Jie Chen, Sijia Liu, and Pin-Yu Chen, “Zeroth-order Diffusion Adaptation over Networks,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018

[C27] Sijia Liu, Jie Chen, Pin-Yu Chen, and Alfred Hero, “Zeroth-Order Online Alternating Direction Method of Multipliers: Convergence Analysis and Applications,” International Conference on Artificial Intelligence and Statistics (AISTATS), 2018

Also presented at NIPS 2017 Optimization for Machine Learning Workshop <poster>

[C26] P.-Y. Chen*, Y. Sharma*, H. Zhang, J. Yi, and C-.J. Hsieh, “EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples,” AAAI Conference on Artificial Intelligence (AAAI), 2018 (*equal contribution) <EAD_code><cleverhans><slides>

[C25] P.-Y. Chen*, H. Zhang*, Y. Sharma, J. Yi, and C.-J. Hsieh, “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models,” ACM Conference on Computer and Communications Security (CCS) Workshop on Artificial Intelligence and Security (AISec), Nov. 2017 (*equal contribution) <ZOO_code><slides> (best paper award finalist)

Also presented at NIPS 2017 Machine Learning and Computer Security Workshop

[C24] W. Liu, P.-Y. Chen, S. Yeung, T. Suzumura and L. Chen, “Principled Multilayer Network Embedding,” IEEE Conference on Data Mining (ICDM) Workshop on Data Mining in Networks, pp. 134-141, Nov., 2017

[C23] P.-Y. Chen and L. Wu, “Revisiting Spectral Graph Clustering with Generative Community Models,” IEEE Conference on Data Mining (ICDM), pp. 51-60, Nov., 2017 <slides> (9.25 % regular paper acceptance rate)

[C22] W. Liu, P.-Y. Chen, H. Cooper, M.-H. Oh, S. Yeung, and T. Suzumura, “Can GAN Learn Topological Features of a Graph?” International Conference on Machine Learning (ICML) Workshop on Implicit Generative Models, Aug., 2017

[C21] P.-S. Ting, C.-C. Tu, P.-Y. Chen, Y-.Y. Luo, and S.-M. Cheng, “FEAST: An Automated Feature Selection Framework for Compilation Tasks,” 31-st IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 1138-1145, Mar. 2017 <slides><slides+audio>

[C20] P.-Y. Chen, T. Gensollen, and A. O. Hero, “AMOS: An Automated Model Order Selection Algorithm for Spectral Graph Clustering,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6448--6452, Mar. 2017 (oral presentation) <AMOS code><slides>

[C19] S. Liu, P.-Y. Chen, and A. O. Hero, “Distributed Optimization for Evolving Networks of Growing Connectivity,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4079--4083, Mar. 2017 (oral presentation)

[C18] P.-Y. Chen and A. O. Hero, “Multilayer Spectral Graph Clustering via Convex Layer Aggregation,” IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 317-321, Dec. 2016 <slides> (oral presentation; awarded IEEE GlobalSIP Student Travel Grant)

[C17] P.-Y. Chen, B. Zhang, M. Hasan, and A. O. Hero, “Incremental Method for Spectral Clustering of Increasing Orders,” ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) workshop on Mining and Learning with Graphs (MLG), 2016 <slides><poster><video> (contributed talk; awarded ACM KDD Student Travel Award)

[C16] S.-M. Cheng and P.-Y. Chen, “Ecology-based DoS Attack in Cognitive Radio Networks,” IEEE Symposium on Security and Privacy (S&P) workshop on Bio-inspired Security, Trust, Assurance, and Resilience (BioSTAR), pp. 104-110, May 2016 (awarded IEEE S&P Student Travel Grant)

[C15] P.-Y. Chen, S. Choudhury, and A. O. Hero, “Multi-Centrality Graph Spectral Decompositions and Their Application to Cyber Intrusion Detection,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4553-4556, Mar. 2016 <slides><poster><video>

[C14] P.-Y. Chen, C.-W. Lien, F.-J. Chu, P.-S. Ting, and S.-M. Cheng, “Supervised Collective Classification for Crowdsourcing,” IEEE Global Communications Conference (GLOBECOM) Workshop on Networking and Collaboration Issues for the Internet of Everything, pp. 1-6, Dec. 2015

[C13] S. Choudhury, P.-Y. Chen, L. Rodriguez, D. Curtis, P. Nordquist, I. Ray, and K. Oler “Action Recommendation for Cyber Resilience,” ACM Conference on Computer and Communications Security (CCS) Workshop on Automated Decision Making for Active Cyber Defense, pp. 3-8, Oct. 2015 (acceptance rate 8/27 (Covered by PNNL research highlight <Link>)

[Demo Video: Defending Real-Time Attacks on Amazon Cloud]

[C12] P.-Y. Chen, Z. Qi, Y. Pan, and S.-M. Cheng, “Multivariate and Categorical Analysis of Gaming Statistics,” 18th International Conference on Network-Based Information Systems (NBiS), pp. 286-293, Sep. 2015

[C11] P.-Y. Chen, and A. O. Hero, “Phase Transitions in Spectral Community Detection of Large Noisy Networks,“ IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3402-3406, Apr. 2015 (Oral Presentation <Link>; awarded SPS Travel Grant)

[C10] P.-Y. Chen, and A. O. Hero, “Local Fiedler Vector Centrality for Detection of Deep and Overlapping Communities in Networks,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1120-1124, May 2014 (awarded NSF Travel Grant) <LFVC_code><poster>

[C9] P.-Y. Chen, H.-F. Lin,K.-H. Hsu, and S.-M. Cheng, “Modeling Dynamics of Malware with Incubation Period from the View of Individual,” IEEE Vehicular Technology Conference (VTC), pp. 1-5, May 2014

[C8] P.-Y. Chen, and A. O. Hero, “Node Removal Vulnerability of the Largest Component of a Network”, IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 587-590. Dec. 2013 <poster>

[C7] S.-Y. Lien, H.-H. Lee, S.-Y. Shih, P.-Y. Chen, and K.-C. Chen, “Network Synchronization among Femtocells,” IEEE Global Communications Conference (GLOBECOM) Workshops, pp.248-252, Dec. 2011

[C6] P.-Y. Chen, W. C. Ao, S.-C. Lin, and K.-C. Chen, “Reciprocal Spectrum Sharing Game and Mechanism in Cellular Systems with Cognitive Radio Users,” IEEE Global Communications Conference (GLOBECOM) Workshops, pp.981-985, Dec. 2011

[C5] P.-Y. Chen, and K.-C. Chen, “Optimal Control of Epidemic Information Dissemination in Mobile Ad Hoc Networks," IEEE Global Communications Conference (GLOBECOM), pp. 1–5. Dec. 2011

[C4] P.-Y. Chen, and K.-C. Chen, “Intentional Attack and Fusion-based Defense Strategy in Complex Networks," IEEE Global Communications Conference (GLOBECOM), pp. 1–5. Dec. 2011

[C3] P.-Y. Chen, V. Karyotis, S. Papavassiliou, and K.-C. Chen, “Topology Control in Multi-channel Cognitive Radio Networks with Non-uniform Node Arrangements," IEEE Symposium on Computers and Communications (ISCC), pp.1033-1037, June 2011

[C2] P.-Y. Chen, S.-M. Cheng, W. C. Ao, and K.-C. Chen, “Multi-path Routing with End-to-end Statistical QoS Provisioning in Underlay Cognitive Radio Networks,” IEEE International Conference on Computer Communications (INFOCOM) Workshops, pp.7-12, April 2011

[C1] P.-Y. Chen, and K.-C. Chen, “Information Epidemics in Complex Networks with Opportunistic Links and Dynamic Topology," IEEE Global Communications Conference (GLOBECOM), pp.1-6, Dec. 2010 (Received GOLD Best Paper Award <Link>)

Demos

[D1] L. Rodriguez, D. Curtis, S. Choudhury, K. Oler, P. Nordquist, P.-Y. Chen, and I. Ray, “DEMO: Action Recommendation for Cyber Resilience,” ACM Conference on Computer and Communications Security (CCS), pp. 1620-1622, Oct. 2015 (acceptance rate 27/47) (Covered by PNNL research highlight <Link>) [Demo Video: Defending Real-Time Attacks on Amazon Cloud]

Journal and Conference Rankings (from Google Scholar, updated in Aug. 2018)

  1. Signal Processing
  2. Data Mining and Analysis
  3. Computer Networks and Wireless Communications
  4. Physics and Mathematics (general)
  5. Computer Security and Cryptography
  6. Artificial Intelligence
  7. Natural Language Processing
  8. Computer Vision