Publication



Journal Papers and Magazines

[J19] P.-Y. Chen, S.-M. Cheng, and H.-Y. Hsu, “Analysis of Information Delivery Dynamics in Cognitive Sensor Networks Using Epidemic Models,”  IEEE Internet of Things Journal (special issue on Cognitive Internet of Things), accepted for publication

[J18] P.-Y. Chen and A. O. Hero, Multilayer Spectral Graph Clustering via Convex Layer Aggregation: Theory and Algorithms,” IEEE Transactions on Signal and Information Processing over Networks (joint special issue on graph signal processing for J-STSP and T-SIPN), vol. 3, no. 3, pp. 553-567, Sep. 2017

[J17] P.-Y. Chen and S. Liu, Bias-Variance Tradeoff of Graph Laplacian Regularizer,” IEEE Signal Processing Letters vol. 24, no. 8, pp. 1118-1122, Aug. 2017

[J16] S.-M. Cheng, P.-Y. Chen, C.-C. Lin, and H.-C. Hsiao, Traffic-aware Patching for Cyber Security in Mobile IoT,” IEEE Communications Magazine, vol. 55, no 7, pp. 29-35, Jul. 2017

[J15] P.-Y. Chen, C.-C. Lin, S.-M. Cheng, C.-Y. Huang, and H.-C. Hsiao, “Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack,” IEEE Communications Magazine, vol. 54, no. 6, pp. 75-81, Jun. 2016

[J14P.-Y. Chen and A. O. Hero, Deep Community Detection,” IEEE Transactions on Signal Processingvol. 63, no. 21, pp. 5706-5719, Nov. 2015

[J13P.-Y. Chen, S.-M. Cheng, P.-S. Ting, C.-W. Lien, and F.-J Chu, “When Crowdsourcing Meets Mobile Sensing: A Social Network Perspective,” IEEE Communications Magazine, vol. 53, no. 10, pp. 157-163, Oct. 2015

[J12P.-Y. Chen and A. O. Hero, Phase Transitions in Spectral Community Detection,” IEEE Transactions on Signal Processing, vol. 63, no. 16, pp. 4339-4347, Aug. 2015

[J11P.-Y. Chen and A. O. Hero, “Universal Phase Transition in Community Detectability under a Stochastic Block Model,” Physical Review E, vol. 91, no. 3, pp. 032804, Mar. 2015

[J10P.-Y. Chen and S.-M. Cheng, “Sequential Defense against Random and Intentional Attacks in Complex Networks,” Physical Review E, vol. 91, no. 2, pp. 022805, Feb. 2015

[J9P.-Y. Chen and A. O. Hero, “Assessing and Safeguarding Network Resilience to Centrality Attacks,” IEEE Communications Magazine, vol. 52, no. 11, pp. 138-143, Nov. 2014 
[Supplementary File] [Correction: For ego centrality, I means the matrix of ones]

[J8P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, “Information Fusion to Defend Intentional Attack in Internet of Things,” IEEE Internet of Things Journal, vol. 1, no. 4, pp. 337-348, Aug. 2014

[J7P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, “Optimal Control of Epidemic Information Dissemination over Networks,” IEEE Transactions on Cybernetics, vol. 44, no. 12, pp. 2316-2328, Dec. 2014

[J6] S.-M. Cheng, V. Karyotis, P.-Y. Chen, K.-C. Chen, and S. Papavassiliou, “Diffusion Models for Information Dissemination Dynamics in Wireless Complex Networks,” Journal of Complex Systems, 2013.

[J5] P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, “Smart Attacks in Smart Grid Communication Networks,” IEEE Communications Magazine, vol. 50, no. 8, pp. 24–29, Aug. 2012. 

[J4] W. C. Ao, P.-Y. Chen, and K.-C. Chen, “Rate-Reliability-Delay Trade-off of Multipath Transmission Using Network Coding,” IEEE Transactions on Vehicular Technology, vol.61, no.5, pp.2336-2342, Jun 2012

[J3] P.-Y. Chen, W. C. Ao, and K.-C. Chen, “Rate-Delay Enhanced Multipath Transmission Schem via Network Coding in Multihop Networks,” IEEE Communications Letters, vol.16, no.3, pp.281-283, March 2012

[J2] S.-M. Cheng, P.-Y. Chen, and K.-C. Chen, “Ecology of Cognitive Radio Ad Hoc Networks,” IEEE Communications Letters, vol.15, no.7, pp.764-766, July 2011

[J1] S.-M. Cheng, W. C. Ao, P.-Y. Chen, and K.-C. Chen, “On Modeling Malware Propagation in Generalized Social Networks,” IEEE Communications Letters, vol.15, no.1, pp.25-27, Jan. 2011



Book Chapters

[B5P.-Y. Chen, “Attack, Defense, and Network Robustness of Internet of Things,” book chapter in Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, CRC Press, 2016 <Amazon link>

[B4S.-M. Cheng, P.-Y. Chen, and K.-C. Chen, “Malware Propagation and Control in Internet of Things,” book chapter in Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, CRC Press, 2016 <Amazon link>

[B3P.-Y. Chen, S.-M. Cheng, W. C. Ao, H.-Y. Hsu, and K.-C. Chen, “Delay Models for Epidemic-like Routing in Multihop Secondary Networks,” book chapter in Introduction to Cognitive Radio Networks and Applications, CRC Press, 2016 <Amazon link>

[B2P.-Y. Chen, “Network Coding at the Source: Exploiting Multipath Transmission for Rate-Delay Adaptation,” book chapter in Network Coding and Data Compression: Theory, Applications, and Challenges, Nova Science Publishers, 2015 <Amazon link>

[B1P.-Y. Chen, “A Game-theoretic Attack and Defense Model for Smart Grid,” book chapter in Smart Grids: Technologies, Applications and Management Systems, Nova Science Publishers, 2014 <Amazon link>



Conference Papers

[C26P.-Y. Chen*, Y. Sharma*, H. Zhang, J. Yi, and C-.J. Hsieh, EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples, AAAI Conference on Artificial Intelligence (AAAI), 2018 (*equal contribution) <EAD_code><cleverhans>

[C25P.-Y. Chen*, H. Zhang*, Y. Sharma, J. Yi, and C.-J. Hsieh, ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models,” ACM Conference on Computer and Communications Security (CCSWorkshop on Artificial Intelligence and Security (AISec), Nov. 2017 (*equal contribution) <ZOO_code(nominated for best paper award)

[C24] W. Liu, P.-Y. ChenS. Yeung, T. Suzumura and L. Chen, Principled Multilayer Network Embedding,” IEEE Conference on Data Mining (ICDM) Workshop on Data Mining in Networks, Nov., 2017

[C23] P.-Y. Chen and L. Wu, Revisiting Spectral Graph Clustering with Generative Community Models,IEEE Conference on Data Mining (ICDM), Nov., 2017
(9.25 % regular paper acceptance rate)

[C22] W. Liu, P.-Y. Chen, H. Cooper, M.-H. Oh, S. Yeung, and T. Suzumura, Can GAN Learn Topological Features of a Graph?International Conference on Machine Learning (ICML) Workshop on Implicit Generative Models, Aug., 2017

[C21] P.-S. Ting, C.-C. Tu, P.-Y. Chen, Y-.Y. Luo, and S.-M. Cheng, FEAST: An Automated Feature Selection Framework for Compilation Tasks, 31-st IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 1138-1145, Mar. 2017 <slides><slides+audio>

[C20] P.-Y. Chen, T. Gensollen, and A. O. Hero, “AMOS: An Automated Model Order Selection Algorithm for Spectral Graph Clustering,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6448--6452, Mar. 2017 <AMOS code><slides>
(selected for oral presentation)

[C19] S. Liu, P.-Y. Chen, and A. O. Hero, “Distributed Optimization for Evolving Networks of Growing Connectivity,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4079--4083, Mar. 2017
(selected for oral presentation)

[C18] P.-Y. Chen and A. O. Hero, Multilayer Spectral Graph Clustering via Convex Layer Aggregation,” IEEE Global Conference on Signal and Information Processing (GlobalSIP),  pp. 317-321, Dec. 2016 <slides>
(selected for oral presentation; awarded IEEE GlobalSIP Student Travel Grant)

[C17P.-Y. Chen, B. Zhang, M. Hasan, and A. O. Hero, “Incremental Method for Spectral Clustering of Increasing Orders,” ACM SIGKDD International Conference on Knowledge Discovery and Data Mining  (KDD) workshop on Mining and Learning with Graphs (MLG), 2016 <slides><poster><video>
(selected for contributed talk; awarded ACM KDD Student Travel Award)

[C16] S.-M. Cheng and P.-Y. Chen, “Ecology-based DoS Attack in Cognitive Radio Networks,” IEEE Symposium on Security and Privacy (S&P) workshop on Bio-inspired Security, Trust, Assurance, and Resilience (BioSTAR), pp. 104-110, May 2016 
(awarded IEEE S&P Student Travel Grant)

[C15] P.-Y. Chen, S. Choudhury, and A. O. Hero, “Multi-Centrality Graph Spectral Decompositions and Their Application to Cyber Intrusion Detection,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4553-4556, Mar. 2016 <slides><poster><video>

[C14] P.-Y. Chen, C.-W. Lien, F.-J. Chu, P.-S. Ting, and S.-M. Cheng, “Supervised Collective Classification for Crowdsourcing,” IEEE Global Communications Conference (GLOBECOM) Workshop on Networking and Collaboration Issues for the Internet of Everything, pp. 1-6, Dec. 2015

[C13] S. Choudhury, P.-Y. Chen, L. Rodriguez, D. Curtis, P. Nordquist, I. Ray, and K. Oler “Action Recommendation for Cyber Resilience,” ACM Conference on Computer and Communications Security (CCS) Workshop on Automated Decision Making for Active Cyber Defense, pp. 3-8, Oct. 2015 (acceptance rate 8/27)
(Covered by PNNL research highlight <Link>)
[Demo Video: Defending Real-Time Attacks on Amazon Cloud]

[C12] P.-Y. Chen, Z. Qi, Y. Pan, and S.-M. Cheng, “Multivariate and Categorical Analysis of Gaming Statistics,” 18th International Conference on Network-Based Information Systems (NBiS), pp. 286-293, Sep. 2015

[C11] P.-Y. Chen, and A. O. Hero, “Phase Transitions in Spectral Community Detection of Large Noisy Networks,“ IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3402-3406, Apr. 2015
(selected for Oral Presentation <Link>; awarded SPS Travel Grant)

[C10] P.-Y. Chen, and A. O. Hero, “Local Fiedler Vector Centrality for Detection of Deep and Overlapping Communities in Networks,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1120-1124, May 2014
(awarded NSF Travel Grant)  <poster>

[C9] P.-Y. Chen, H.-F. Lin,K.-H. Hsu, and S.-M. Cheng, “Modeling Dynamics of Malware with Incubation Period from the View of Individual,” IEEE Vehicular Technology Conference (VTC), pp. 1-5, May 2014 

[C8] P.-Y. Chen, and A. O. Hero, “Node Removal Vulnerability of the Largest Component of a Network”, IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 587-590. Dec. 2013 <poster>

[C7] S.-Y. Lien, H.-H. Lee, S.-Y. Shih, P.-Y. Chen, and K.-C. Chen, “Network Synchronization among Femtocells,” IEEE Global Communications Conference (GLOBECOM) Workshops, pp.248-252, Dec. 2011

[C6] P.-Y. Chen, W. C. Ao, S.-C. Lin, and K.-C. Chen, “Reciprocal Spectrum Sharing Game and Mechanism in Cellular Systems with Cognitive Radio Users,” IEEE Global Communications Conference (GLOBECOM) Workshops, pp.981-985, Dec. 2011 

[C5] P.-Y. Chen, and K.-C. Chen, “Optimal Control of Epidemic Information Dissemination in Mobile Ad Hoc Networks," IEEE Global Communications Conference (GLOBECOM), pp. 1–5. Dec. 2011

[C4] P.-Y. Chen, and K.-C. Chen, “Intentional Attack and Fusion-based Defense Strategy in Complex Networks," IEEE Global Communications Conference (GLOBECOM), pp. 1–5. Dec. 2011

[C3] P.-Y. Chen, V. Karyotis, S. Papavassiliou, and K.-C. Chen, “Topology Control in Multi-channel Cognitive Radio Networks with Non-uniform Node Arrangements," IEEE Symposium on Computers and Communications (ISCC), pp.1033-1037, June 2011

[C2] P.-Y. Chen, S.-M. Cheng, W. C. Ao, and K.-C. Chen, “Multi-path Routing with End-to-end Statistical QoS Provisioning in Underlay Cognitive Radio Networks,” IEEE International Conference on Computer Communications (INFOCOM) Workshops, pp.7-12, April 2011

[C1] P.-Y. Chen, and K.-C. Chen, “Information Epidemics in Complex Networks with Opportunistic Links and Dynamic Topology," IEEE Global Communications Conference (GLOBECOM), pp.1-6, Dec. 2010
(Received GOLD Best Paper Award <Link>)
 

  • Demos
[D1] L. Rodriguez, D. Curtis, S. Choudhury, K. Oler, P. Nordquist, P.-Y. Chen, and I. Ray, “DEMO: Action Recommendation for Cyber Resilience,” ACM Conference on Computer and Communications Security (CCS), pp. 1620-1622, Oct. 2015 (acceptance rate 27/47)
(Covered by PNNL research highlight <Link>)
[Demo Video: Defending Real-Time Attacks on Amazon Cloud]

  • Journal and Conference Rankings (from Google Scholar on Dec. 2016)
  1. Signal Processing
  2. Data Mining and Analysis
  3. Computer Networks and Wireless Communications
  4. Physics and Mathematics (general)
  5. Computer Security and Cryptography
  6. Artificial Intelligence