Ph.D. Dissertation
Book Chapter
- Internet Epidemics: Attacks, Detection and Defenses, and Trends
Zesheng Chen and Chao Chen
in the book under the working title "Intrusion Detection Systems" edited by Pawel Skrobanek
published by INTECH, ISBN: 978-953-307-167-1, March 2011
Referred Journal Publications
- A Systematic Study of Adversarial Attacks Against Network Intrusion Detection Systems
Sanidhya Sharma and Zesheng Chen
MDPI Electronics 2024, 13(24), 5030
Special Issue Advancing Security and Privacy in the Internet of Things
https://doi.org/10.3390/electronics13245030 (registering DOI)
(Impact Factor: 2.6)
- Ensemble Adversarial Defenses and Attacks in Speaker Verification Systems
Zesheng Chen, Jack Li, and Chao Chen
IEEE Internet of Things Journal, vol. 11, no. 20, Oct. 2024
DOI: 10.1109/JIOT.2024.3430102
(Impact Factor (JCR'22): 10.6)
- On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems
Zesheng Chen
IEEE Internet of Things Journal, vol. 10, no. 18, Sept. 2023
DOI: 10.1109/JIOT.2023.3267619
(Impact Factor (JCR'22): 10.6)
The early draft of this work has been posted at arXiv: arXiv:2202.05725.
The part of source code used in this paper can be found from GitHub Repository: Detection of FAKEBOB (MEH-FEST).
- Defending Against FakeBob Adversarial Attacks in Speaker Verification SystemsWith Noise-Adding
Zesheng Chen, Li-Chi Chang, Chao Chen, Guoping Wang, and Zhuming Bi
MDPI Algorithms, Special Issue "Commemorative Special Issue: Adversarial and Federated Machine Learning: State of the Art and New Perspectives", August 2022
(Impact Factor (JCR'22): 2.3)
The part of source code used in this paper can be found from GitHub Repository: defense_FakeBob
- Characterising Spatial Dependence on Epidemic Thresholds in Networks
Zesheng Chen
International Journal of Security and Networks (IJSN), vol. 15, no. 1, April 2020, pp. 1 - 14
- An Efficient Spectral Selection of M Giants Using XGBoost
Zhenping Yi, Zesheng Chen, Jingchang Pan, Lili Yue, Yuxiang Lu, Jia Li, and A-Li Luo
The Astrophysical Journal, vol. 887, no. 2, Dec. 2019
(2018 journal impact factor: 5.580)
- Discrete-Time vs. Continuous-Time Epidemic Models in Networks
Zesheng Chen
IEEE Access, vol. 7, Sept. 2019, pp. 127669 - 127677
(2018 journal impact factor: 4.098)
- Implementing a Test Bed for Space Exploration Using Internet of Things
Urvi Joshi and Zesheng Chen
Investigations: The Journal of Student Research @ Purdue Fort Wayne, March 2019
- Self-Stopping Strategies for Tractable Information Dissemination in Dense Mobile Sensor Networks
Chao Chen and Zesheng Chen
International Journal of Sensor Networks (IJSNet), vol. 29, no. 2, 2019
- Designing and Implementing an Affordable and Accessible Smart Home Based on Internet of Things
Urvi Joshi, Aaron Dills, Eric Biazo, Cameron Cook, Zesheng Chen, and Guoping Wang
Investigations: The Journal of Student Research @ IPFW, June 2018
- Characterising Heterogeneity in Vulnerable Hosts on Worm Propagation
Zesheng Chen and Chao Chen
International Journal of Security and Networks (IJSN), vol. 11, no. 4, 2016
- Adaptive Energy-Efficient Spectrum Probing in Cognitive Radio Networks
Zesheng Chen and Chao Chen
Ad Hoc Networks Journal, Feb. 2014
- On the Characteristics of the Worm Infection Family Tree
Qian Wang, Zesheng Chen, and Chao Chen
IEEE Transactions on Information Forensics & Security (T-IFS), Oct. 2012
(An initial version can be found at arXiv:1001.1195)
- Darknet-Based Inference of Internet Worm Temporal Characteristics
Qian Wang, Zesheng Chen, and Chao Chen
IEEE Transactions on Information Forensics & Security (T-IFS), vol. 6, no. 4, Dec. 2011
(A more complete version can be found at arXiv:1007.2217)
- Characterizing and Defending Against Divide-Conquer-Scanning Worms
Chao Chen, Zesheng Chen, and Yubin Li
Computer Networks, vol. 54, no. 18, Dec. 2010
- On the Scalability of Delay-Tolerant Botnets
Zesheng Chen, Chao Chen, and Qian Wang
International Journal of Security and Networks (IJSN), vol. 5, no. 4, 2010
- Enhancing Intrusion Detection System with Proximity Information
Zhenyun Zhuang, Ying Li, and Zesheng Chen
International Journal of Security and Networks (IJSN), vol. 5, no. 4, 2010
- Towards A Routing Framework in Ad Hoc Space Networks
Chao Chen and Zesheng Chen
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), vol. 5, no. 1, 2009
- Exploiting Contact Spatial Dependency for Opportunistic Message Forwarding
Chao Chen and Zesheng Chen
IEEE Transactions on Mobile Computing (TMC), vol. 8, no. 10, Oct. 2009
- An Information-Theoretic View of Network-Aware Malware Attacks
Zesheng Chen and Chuanyi Ji
IEEE Transactions on Information Forensics & Security (T-IFS), vol. 4, no. 3, Sept. 2009
(A more complete version can be found at arXiv:0805.0802)
- Deriving a Closed-Form Expression for Worm-Scanning Strategies
Zesheng Chen, Chao Chen, and Yubin Li
International Journal of Security and Networks (IJSN), vol. 4, no. 3, 2009
- Optimal Worm-Scanning Method Using Vulnerable-Host Distributions
Zesheng Chen and Chuanyi Ji
International Journal of Security and Networks (IJSN): Special Issue on Computer and Network Security, vol. 2, no. 1/2, 2007
- Comments on "Modeling TCP Reno Performance: A Simple Model and Its Empirical Validation"
Zesheng Chen, Tian Bu, Mostafa Ammar, and Don Towsley
IEEE/ACM Transactions on Networking (TON), vol. 14, no. 2, April, 2006
- Spatial-Temporal Modeling of Malware Propagation in Networks
Zesheng Chen and Chuanyi Ji
IEEE Transactions on Neural Networks (TNN): Special Issue on Adaptive Learning Systems in Communication Networks, vol. 16, no. 5, Sept. 2005
Referred Conference and Workshop Publications
- MEH-FEST-NA: An Ensemble Defense System Against Adversarial Attacks in Speaker Verification Systems
Zesheng Chen, Jack Li, and Chao Chen
The 6th IEEE International Conference on Artificial Intelligence Testing (AITest 2024), July 2024, Shanghai, China
(Acceptance ratio: 31% = 10/32)
- Detecting IoT Botnets on IoT Edge Devices
Meghana Raghavendra and Zesheng Chen
IEEE Fourth International Workshop on Data Driven Intelligence for Networks and Systems (DDINS), in conjunction with IEEE ICC 2022
- Defending Against Adversarial Attacks in Speaker Verification Systems (presentation slides)
Li-Chi Chang, Zesheng Chen, Chao Chen, Guoping Wang, and Zhuming Bi
Proceedings of 40th IEEE International Performance Computing and Communications Conference (IPCCC 2021), October 2021
(Acceptance ratio: 28.4% = 40/141)
- Identifying Key Factors Affecting Harmful Algal Blooms in Western Lake Erie from the Perspective of Machine Learning
Jimmy Nguyen, Zesheng Chen, Veronika Meyer, and Dong Chen
World Environmental & Water Resources Congress 2021
- Applying Slack to Help Teach Computer Science and Computer Engineering Courses
Chao Chen and Zesheng Chen
2020 ASEE Annual Conference & Exposition
- Epidemic Thresholds in Networks: Impact of Heterogeneous Infection Rates and Recovery Rates (presentation slides)
Zesheng Chen
IEEE ICC 2018
- Modeling the Spread of Influence for Independent Cascade Diffusion Process in Social Networks (presentation slides)
Zesheng Chen and Kurtis Taylor
The 9th International Workshop on Hot Topics in Planet-Scale Mobile Computing and Online Social Networking (HotPOST'17), in conjunction with IEEE ICDCS'17
- Applying Scrum to Manage a Senior Capstone Project (presentation slides)
Zesheng Chen
2017 ASEE Annual Conference & Exposition
- Self-Stopping Epidemic Routing in Cooperative Wireless Mobile Sensor Networks (presentation slides)
Zesheng Chen and Chao Chen
The Ninth IEEE International Workshop on Selected Topics in Wireless and Mobile computing (STWiMob 2016), in conjunction with IEEE WiMoB 2016
- Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks (initial submission version) (presentation slides)
Zesheng Chen
Workshop on Social Influence 2016, in conjunction with IEEE/ACM ASONAM 2016
- Heterogeneity in Vulnerable Hosts Slows Down Worm Propagation
Zesheng Chen and Chao Chen
IEEE Globecom 2012 (Acceptance ratio: 37.7%=966/2560)
- Adaptive Energy-Efficient Spectrum Probing in Cognitive Radio Networks
Zesheng Chen and Chao Chen
IEEE SECON 2011 (Acceptance ratio: 27%=65/241)
- Characterizing Internet Worm Infection Structure
Qian Wang, Zesheng Chen, and Chao Chen
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2011)
- On the Robustness of the Botnet Topology Formed by Worm Infection
Qian Wang, Zesheng Chen, Chao Chen, and Niki Pissinou
IEEE Globecom 2010 (Acceptance ratio: 35.4%)
- On Spectrum Probing in Cognitive Radio Networks: Does Randomization Matter?
Chao Chen, Zesheng Chen, Todor Cooklev, and Carlos Pomalaza-Raez
IEEE ICC 2010 (Acceptance ratio: 39.5%)
- Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks
Zesheng Chen, Todor Cooklev, Chao Chen, and Carlos Pomalaza-Raez
IEEE IPCCC 2009 (Acceptance ratio: 29.7%=43/145)
- Packet-mode Asynchronous Scheduling Algorithm for Partially Buffered Crossbar Switches
Masoumeh Karimi, Zhuo Sun, Deng Pan, and Zesheng Chen
IEEE Globecom 2009 (Acceptance ratio: 34.8%)
- Delay-Tolerant Botnets
Zesheng Chen, Chao Chen, and Qian Wang
SecureCPN 2009, in conjunction with ICCCN 2009
- PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms
Zhenyun Zhuang, Ying Li, and Zesheng Chen
COMPSAC 2009 (Full paper. Acceptance ratio: 20%)
- A GreenLite System: An Efficient Solar Energy Solution Using a Sun Tracker Panel and a Light Harvesting Control Panel
Zesheng Chen, Erik Pazos, Darian Garcia, Dayron Garcia, and Julio Duharte
ASEE Annual Conference & Exposition 2009
- Understanding Divide-Conquer-Scanning Worms (Slides)
Yubin Li, Zesheng Chen, and Chao Chen
IEEE IPCCC 2008 (Acceptance ratio: 32.6%=46/141) Best Paper Award
- Inferring Internet Worm Temporal Characteristics (Slides)
Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou, and Chao Chen
IEEE GLOBECOM 2008 (Acceptance ratio: 36.8%=1051/2854)
- A Closed-Form Expression for Static Worm-Scanning Strategies (Slides)
Zesheng Chen and Chao Chen
IEEE ICC 2008 (Acceptance ratio: 35%=1102/3135)
- Spatial-Temporal Characteristics of Internet Malicious Sources (Slides)
Zesheng Chen, Chuanyi Ji, and Paul Barford
IEEE INFOCOM 2008 Mini-Conference (Acceptance ratio: 27%=(236+75)/1152)
- Routing Different Traffic in Deep Space Networks
Chao Chen and Zesheng Chen
International Workshop on Satellite and Space Communications (IWSSC 2007)
- Misleading and Defeating Importance-Scanning Malware Propagation
Guofei Gu, Zesheng Chen, Phillip Porras, and Wenke Lee
SecureComm 2007 (Acceptance ratio: 26% = 31/119)
- Evaluating Contacts for Routing in Highly Partitioned Mobile Networks
Chao Chen and Zesheng Chen
ACM/SIGMOBILE MobiOpp 2007 (Acceptance ratio: 28.5% = 10/35)
- Measuring Network-Aware Worm Spreading Ability
Zesheng Chen and Chuanyi Ji
IEEE INFOCOM 2007 (Acceptance ratio: 18% = 252/1400)
- Understanding Localized-Scanning Worms
Zesheng Chen, Chao Chen, and Chuanyi Ji
IEEE IPCCC 2007 (Acceptance ratio: 37% = 44/119)
- A Self-Learning Worm Using Importance Scanning (Slides)
Zesheng Chen and Chuanyi Ji
ACM CCS Workshop on Rapid Malcode (WORM 2005), 2005 (Acceptance ratio: 24.3% = 9/37)
- Importance-Scanning Worm Using Vulnerable-Host Distribution
Zesheng Chen and Chuanyi Ji
IEEE GLOBECOM 2005 (Acceptance ratio: 47.7% = 770/1638)
- Modeling the Spread of Active Worms
Zesheng Chen, Lixin Gao, and Kevin Kwiat
IEEE INFOCOM 2003 (Acceptance ratio: 20.8% = 224/1078)
Other
- Adversarial Attacks of Speaker Verification Systems
Li-Chi Chang (Faculty Advisor: Zesheng Chen)
Poster at Purdue Fort Wayne Student Research and Creative Endeavor Symposium, March 26, 2021
- Detection of IoT Botnet Using Decision Trees
Meghana Raghavendra (Faculty Advisor: Zesheng Chen)
Poster at Purdue Fort Wayne Student Research and Creative Endeavor Symposium, March 26, 2021
- Deep Learning Sandbox
Jimmy Nguyen, Vinamra Munot, Rodney McQuain, and Jacob Mills (Faculty Advisor: Zesheng Chen)
Poster at Purdue Fort Wayne Student Research and Creative Endeavor Symposium, March 26, 2021
- Using On-site and Remote sensing data to Understand Key Factors Affecting Harmful Algal Blooms in Western Lake Erie
Jimmy Nguyen, Zesheng Chen, Dong Chen, and Veronika Meyer
Poster at Purdue Fort Wayne Student Research and Creative Endeavor Symposium, April, 2020
- Amazon Retail Reporting System
Urvi Joshi, Joel Stauffer, Aneesh Raman, Matthew Hunt, and Asfand Surhio (Faculty Advisor: Zesheng Chen)
Poster at Purdue Fort Wayne Student Research and Creative Endeavor Symposium, April, 2019
- Building an Affordable Smart Home Based on the Internet of Things
Urvi Joshi, Aaron Dills, Eric Biazo, and Cameron Cook (Faculty Advisor: Zesheng Chen, Project Sponsor: Guoping Wang)
Poster at IPFW Student Research and Creative Endeavor Symposium, March, 2018
Won the Second Place
- Space Exploration Using the Internet of Things
Urvi Joshi (Faculty Advisor: Zesheng Chen)
Poster at IPFW Student Research and Creative Endeavor Symposium, March, 2018
- A Water Kiosk System Based on Internet of Things
Aaron Dills, Eric Biazo, and Cameron Cook (Faculty Advisor: Zesheng Chen)
Poster at IPFW Student Research and Creative Endeavor Symposium, March, 2018
- Your House Just Ordered Groceries
Designing and implementing a smart home based on the Internet of Things
Guoping Wang and Zesheng Chen
IPFW Connect, Winter 2018, Vol. 4
- Redundant Failover Seamless IP Stack
Brice Aldrich, Devin Aspy, and Zach Pratt (Faculty Advisor: Zesheng Chen)
received Student Application Paper Implementing Industry Standards Grant by IEEE Standards Education Committee
published at IEEE Standards University website, 2017
- Modeling the Spread of Influence in Social Networks
Kurtis Taylor (Faculty Advisor: Zesheng Chen)
Poster at IPFW Student Research and Creative Endeavor Symposium, March, 2017
- Audio Reading Service Listener Web and Mobile Interface
Daniel Brewer, Aaron Lilley, Simon Sharudin, (Faculty Advisor: Zesheng Chen)
received Student Application Paper Implementing Industry Standards Grant by IEEE Standards Education Committee
published at IEEE Standards University website, 2016
This paper was also selected to publish at IEEE eMagazine, vol. 7, no. 2, June, 2017.
- Intelligent Worms: Searching for Preys
Zesheng Chen and Chuanyi Ji
Mathematics Awareness Month: Mathematics and Internet Security Theme Essays, 2006
- Worm Propagation Models
Zesheng Chen
Mathematics Awareness Month: Mathematics and Internet Security Theme Essays, 2006
- On Effectiveness of Defense Systems against Active Worms
Zesheng Chen, Lixin Gao, and Chuanyi Ji
Technical Report 2003