Ph.D. Dissertation

Book Chapter

  1. Internet Epidemics: Attacks, Detection and Defenses, and Trends
    Zesheng Chen and Chao Chen
    in the book under the working title "Intrusion Detection Systems" edited by Pawel Skrobanek
    published by INTECH, ISBN: 978-953-307-167-1, March 2011

Referred Journal Publications

  1. A Systematic Study of Adversarial Attacks Against Network Intrusion Detection Systems
    Sanidhya Sharma and Zesheng Chen
    MDPI Electronics 2024, 13(24), 5030
    Special Issue Advancing Security and Privacy in the Internet of Things
    https://doi.org/10.3390/electronics13245030 (registering DOI)
    (Impact Factor: 2.6)

  2. Ensemble Adversarial Defenses and Attacks in Speaker Verification Systems
    Zesheng Chen, Jack Li, and Chao Chen
    IEEE Internet of Things Journal, vol. 11, no. 20, Oct. 2024
    DOI: 10.1109/JIOT.2024.3430102
    (Impact Factor (JCR'22): 10.6)

  3. On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems
    Zesheng Chen
    IEEE Internet of Things Journal, vol. 10, no. 18, Sept. 2023
    DOI: 10.1109/JIOT.2023.3267619
    (Impact Factor (JCR'22): 10.6)
    The early draft of this work has been posted at arXiv: arXiv:2202.05725.
    The part of source code used in this paper can be found from GitHub Repository: Detection of FAKEBOB (MEH-FEST).

  4. Defending Against FakeBob Adversarial Attacks in Speaker Verification SystemsWith Noise-Adding
    Zesheng Chen, Li-Chi Chang, Chao Chen, Guoping Wang, and Zhuming Bi
    MDPI Algorithms, Special Issue "Commemorative Special Issue: Adversarial and Federated Machine Learning: State of the Art and New Perspectives", August 2022
    (Impact Factor (JCR'22): 2.3)
    The part of source code used in this paper can be found from GitHub Repository: defense_FakeBob

  5. Characterising Spatial Dependence on Epidemic Thresholds in Networks
    Zesheng Chen
    International Journal of Security and Networks (IJSN), vol. 15, no. 1, April 2020, pp. 1 - 14

  6. An Efficient Spectral Selection of M Giants Using XGBoost
    Zhenping Yi, Zesheng Chen, Jingchang Pan, Lili Yue, Yuxiang Lu, Jia Li, and A-Li Luo
    The Astrophysical Journal, vol. 887, no. 2, Dec. 2019
    (2018 journal impact factor: 5.580)

  7. Discrete-Time vs. Continuous-Time Epidemic Models in Networks
    Zesheng Chen
    IEEE Access, vol. 7, Sept. 2019, pp. 127669 - 127677
    (2018 journal impact factor: 4.098)

  8. Implementing a Test Bed for Space Exploration Using Internet of Things
    Urvi Joshi and Zesheng Chen
    Investigations: The Journal of Student Research @ Purdue Fort Wayne, March 2019

  9. Self-Stopping Strategies for Tractable Information Dissemination in Dense Mobile Sensor Networks
    Chao Chen and Zesheng Chen
    International Journal of Sensor Networks (IJSNet), vol. 29, no. 2, 2019

  10. Designing and Implementing an Affordable and Accessible Smart Home Based on Internet of Things
    Urvi Joshi, Aaron Dills, Eric Biazo, Cameron Cook, Zesheng Chen, and Guoping Wang
    Investigations: The Journal of Student Research @ IPFW, June 2018

  11. Characterising Heterogeneity in Vulnerable Hosts on Worm Propagation
    Zesheng Chen and Chao Chen
    International Journal of Security and Networks (IJSN), vol. 11, no. 4, 2016

  12. Adaptive Energy-Efficient Spectrum Probing in Cognitive Radio Networks
    Zesheng Chen and Chao Chen
    Ad Hoc Networks Journal, Feb. 2014

  13. On the Characteristics of the Worm Infection Family Tree
    Qian Wang, Zesheng Chen, and Chao Chen
    IEEE Transactions on Information Forensics & Security (T-IFS), Oct. 2012
    (An initial version can be found at arXiv:1001.1195)

  14. Darknet-Based Inference of Internet Worm Temporal Characteristics
    Qian Wang, Zesheng Chen, and Chao Chen
    IEEE Transactions on Information Forensics & Security (T-IFS), vol. 6, no. 4, Dec. 2011
    (A more complete version can be found at arXiv:1007.2217)

  15. Characterizing and Defending Against Divide-Conquer-Scanning Worms
    Chao Chen, Zesheng Chen, and Yubin Li
    Computer Networks, vol. 54, no. 18, Dec. 2010

  16. On the Scalability of Delay-Tolerant Botnets
    Zesheng Chen, Chao Chen, and Qian Wang
    International Journal of Security and Networks (IJSN), vol. 5, no. 4, 2010

  17. Enhancing Intrusion Detection System with Proximity Information
    Zhenyun Zhuang, Ying Li, and Zesheng Chen
    International Journal of Security and Networks (IJSN), vol. 5, no. 4, 2010

  18. Towards A Routing Framework in Ad Hoc Space Networks
    Chao Chen and Zesheng Chen
    International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), vol. 5, no. 1, 2009

  19. Exploiting Contact Spatial Dependency for Opportunistic Message Forwarding
    Chao Chen and Zesheng Chen
    IEEE Transactions on Mobile Computing (TMC), vol. 8, no. 10, Oct. 2009

  20. An Information-Theoretic View of Network-Aware Malware Attacks
    Zesheng Chen and Chuanyi Ji
    IEEE Transactions on Information Forensics & Security (T-IFS), vol. 4, no. 3, Sept. 2009
    (A more complete version can be found at arXiv:0805.0802)

  21. Deriving a Closed-Form Expression for Worm-Scanning Strategies
    Zesheng Chen, Chao Chen, and Yubin Li
    International Journal of Security and Networks (IJSN), vol. 4, no. 3, 2009

  22. Optimal Worm-Scanning Method Using Vulnerable-Host Distributions
    Zesheng Chen and Chuanyi Ji
    International Journal of Security and Networks (IJSN): Special Issue on Computer and Network Security, vol. 2, no. 1/2, 2007

  23. Comments on "Modeling TCP Reno Performance: A Simple Model and Its Empirical Validation"
    Zesheng Chen, Tian Bu, Mostafa Ammar, and Don Towsley
    IEEE/ACM Transactions on Networking (TON), vol. 14, no. 2, April, 2006

  24. Spatial-Temporal Modeling of Malware Propagation in Networks
    Zesheng Chen and Chuanyi Ji
    IEEE Transactions on Neural Networks (TNN): Special Issue on Adaptive Learning Systems in Communication Networks, vol. 16, no. 5, Sept. 2005

Referred Conference and Workshop Publications

  1. MEH-FEST-NA: An Ensemble Defense System Against Adversarial Attacks in Speaker Verification Systems
    Zesheng Chen, Jack Li, and Chao Chen
    The 6th IEEE International Conference on Artificial Intelligence Testing (AITest 2024), July 2024, Shanghai, China
    (Acceptance ratio: 31% = 10/32)

  2. Detecting IoT Botnets on IoT Edge Devices
    Meghana Raghavendra and Zesheng Chen
    IEEE Fourth International Workshop on Data Driven Intelligence for Networks and Systems (DDINS), in conjunction with IEEE ICC 2022

  3. Defending Against Adversarial Attacks in Speaker Verification Systems (presentation slides)
    Li-Chi Chang, Zesheng Chen, Chao Chen, Guoping Wang, and Zhuming Bi
    Proceedings of 40th IEEE International Performance Computing and Communications Conference (IPCCC 2021), October 2021
    (Acceptance ratio: 28.4% = 40/141)

  4. Identifying Key Factors Affecting Harmful Algal Blooms in Western Lake Erie from the Perspective of Machine Learning
    Jimmy Nguyen, Zesheng Chen, Veronika Meyer, and Dong Chen
    World Environmental & Water Resources Congress 2021

  5. Applying Slack to Help Teach Computer Science and Computer Engineering Courses
    Chao Chen and Zesheng Chen
    2020 ASEE Annual Conference & Exposition

  6. Epidemic Thresholds in Networks: Impact of Heterogeneous Infection Rates and Recovery Rates (presentation slides)
    Zesheng Chen
    IEEE ICC 2018

  7. Modeling the Spread of Influence for Independent Cascade Diffusion Process in Social Networks (presentation slides)
    Zesheng Chen and Kurtis Taylor
    The 9th International Workshop on Hot Topics in Planet-Scale Mobile Computing and Online Social Networking (HotPOST'17), in conjunction with IEEE ICDCS'17

  8. Applying Scrum to Manage a Senior Capstone Project (presentation slides)
    Zesheng Chen
    2017 ASEE Annual Conference & Exposition

  9. Self-Stopping Epidemic Routing in Cooperative Wireless Mobile Sensor Networks (presentation slides)
    Zesheng Chen and Chao Chen
    The Ninth IEEE International Workshop on Selected Topics in Wireless and Mobile computing (STWiMob 2016), in conjunction with IEEE WiMoB 2016

  10. Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks (initial submission version) (presentation slides)
    Zesheng Chen
    Workshop on Social Influence 2016, in conjunction with IEEE/ACM ASONAM 2016

  11. Heterogeneity in Vulnerable Hosts Slows Down Worm Propagation
    Zesheng Chen and Chao Chen
    IEEE Globecom 2012 (Acceptance ratio: 37.7%=966/2560)

  12. Adaptive Energy-Efficient Spectrum Probing in Cognitive Radio Networks
    Zesheng Chen and Chao Chen
    IEEE SECON 2011 (Acceptance ratio: 27%=65/241)

  13. Characterizing Internet Worm Infection Structure
    Qian Wang, Zesheng Chen, and Chao Chen
    4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2011)

  14. On the Robustness of the Botnet Topology Formed by Worm Infection
    Qian Wang, Zesheng Chen, Chao Chen, and Niki Pissinou
    IEEE Globecom 2010 (Acceptance ratio: 35.4%)

  15. On Spectrum Probing in Cognitive Radio Networks: Does Randomization Matter?
    Chao Chen, Zesheng Chen, Todor Cooklev, and Carlos Pomalaza-Raez
    IEEE ICC 2010 (Acceptance ratio: 39.5%)

  16. Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks
    Zesheng Chen, Todor Cooklev, Chao Chen, and Carlos Pomalaza-Raez
    IEEE IPCCC 2009 (Acceptance ratio: 29.7%=43/145)

  17. Packet-mode Asynchronous Scheduling Algorithm for Partially Buffered Crossbar Switches
    Masoumeh Karimi, Zhuo Sun, Deng Pan, and Zesheng Chen
    IEEE Globecom 2009 (Acceptance ratio: 34.8%)

  18. Delay-Tolerant Botnets
    Zesheng Chen, Chao Chen, and Qian Wang
    SecureCPN 2009, in conjunction with ICCCN 2009

  19. PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms
    Zhenyun Zhuang, Ying Li, and Zesheng Chen
    COMPSAC 2009 (Full paper. Acceptance ratio: 20%)

  20. A GreenLite System: An Efficient Solar Energy Solution Using a Sun Tracker Panel and a Light Harvesting Control Panel
    Zesheng Chen, Erik Pazos, Darian Garcia, Dayron Garcia, and Julio Duharte
    ASEE Annual Conference & Exposition 2009

  21. Understanding Divide-Conquer-Scanning Worms (Slides)
    Yubin Li, Zesheng Chen, and Chao Chen
    IEEE IPCCC 2008 (Acceptance ratio: 32.6%=46/141) Best Paper Award

  22. Inferring Internet Worm Temporal Characteristics (Slides)
    Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou, and Chao Chen
    IEEE GLOBECOM 2008 (Acceptance ratio: 36.8%=1051/2854)

  23. A Closed-Form Expression for Static Worm-Scanning Strategies (Slides)
    Zesheng Chen and Chao Chen
    IEEE ICC 2008 (Acceptance ratio: 35%=1102/3135)

  24. Spatial-Temporal Characteristics of Internet Malicious Sources (Slides)
    Zesheng Chen, Chuanyi Ji, and Paul Barford
    IEEE INFOCOM 2008 Mini-Conference (Acceptance ratio: 27%=(236+75)/1152)

  25. Routing Different Traffic in Deep Space Networks
    Chao Chen and Zesheng Chen
    International Workshop on Satellite and Space Communications (IWSSC 2007)

  26. Misleading and Defeating Importance-Scanning Malware Propagation
    Guofei Gu, Zesheng Chen, Phillip Porras, and Wenke Lee
    SecureComm 2007 (Acceptance ratio: 26% = 31/119)

  27. Evaluating Contacts for Routing in Highly Partitioned Mobile Networks
    Chao Chen and Zesheng Chen
    ACM/SIGMOBILE MobiOpp 2007 (Acceptance ratio: 28.5% = 10/35)

  28. Measuring Network-Aware Worm Spreading Ability
    Zesheng Chen and Chuanyi Ji
    IEEE INFOCOM 2007 (Acceptance ratio: 18% = 252/1400)

  29. Understanding Localized-Scanning Worms
    Zesheng Chen, Chao Chen, and Chuanyi Ji
    IEEE IPCCC 2007 (Acceptance ratio: 37% = 44/119)

  30. A Self-Learning Worm Using Importance Scanning (Slides)
    Zesheng Chen and Chuanyi Ji
    ACM CCS Workshop on Rapid Malcode (WORM 2005), 2005 (Acceptance ratio: 24.3% = 9/37)

  31. Importance-Scanning Worm Using Vulnerable-Host Distribution
    Zesheng Chen and Chuanyi Ji
    IEEE GLOBECOM 2005 (Acceptance ratio: 47.7% = 770/1638)

  32. Modeling the Spread of Active Worms
    Zesheng Chen, Lixin Gao, and Kevin Kwiat
    IEEE INFOCOM 2003 (Acceptance ratio: 20.8% = 224/1078)

Other

  1. Adversarial Attacks of Speaker Verification Systems
    Li-Chi Chang (Faculty Advisor: Zesheng Chen)
    Poster at Purdue Fort Wayne Student Research and Creative Endeavor Symposium, March 26, 2021

  2. Detection of IoT Botnet Using Decision Trees
    Meghana Raghavendra (Faculty Advisor: Zesheng Chen)
    Poster at Purdue Fort Wayne Student Research and Creative Endeavor Symposium, March 26, 2021

  3. Deep Learning Sandbox
    Jimmy Nguyen, Vinamra Munot, Rodney McQuain, and Jacob Mills (Faculty Advisor: Zesheng Chen)
    Poster at Purdue Fort Wayne Student Research and Creative Endeavor Symposium, March 26, 2021

  4. Using On-site and Remote sensing data to Understand Key Factors Affecting Harmful Algal Blooms in Western Lake Erie
    Jimmy Nguyen, Zesheng Chen, Dong Chen, and Veronika Meyer
    Poster at Purdue Fort Wayne Student Research and Creative Endeavor Symposium, April, 2020

  5. Amazon Retail Reporting System
    Urvi Joshi, Joel Stauffer, Aneesh Raman, Matthew Hunt, and Asfand Surhio (Faculty Advisor: Zesheng Chen)
    Poster at Purdue Fort Wayne Student Research and Creative Endeavor Symposium, April, 2019

  6. Building an Affordable Smart Home Based on the Internet of Things
    Urvi Joshi, Aaron Dills, Eric Biazo, and Cameron Cook (Faculty Advisor: Zesheng Chen, Project Sponsor: Guoping Wang)
    Poster at IPFW Student Research and Creative Endeavor Symposium, March, 2018
    Won the Second Place

  7. Space Exploration Using the Internet of Things
    Urvi Joshi (Faculty Advisor: Zesheng Chen)
    Poster at IPFW Student Research and Creative Endeavor Symposium, March, 2018

  8. A Water Kiosk System Based on Internet of Things
    Aaron Dills, Eric Biazo, and Cameron Cook (Faculty Advisor: Zesheng Chen)
    Poster at IPFW Student Research and Creative Endeavor Symposium, March, 2018

  9. Your House Just Ordered Groceries
    Designing and implementing a smart home based on the Internet of Things
    Guoping Wang and Zesheng Chen
    IPFW Connect, Winter 2018, Vol. 4

  10. Redundant Failover Seamless IP Stack
    Brice Aldrich, Devin Aspy, and Zach Pratt (Faculty Advisor: Zesheng Chen)
    received Student Application Paper Implementing Industry Standards Grant by IEEE Standards Education Committee
    published at IEEE Standards University website, 2017

  11. Modeling the Spread of Influence in Social Networks
    Kurtis Taylor (Faculty Advisor: Zesheng Chen)
    Poster at IPFW Student Research and Creative Endeavor Symposium, March, 2017

  12. Audio Reading Service Listener Web and Mobile Interface
    Daniel Brewer, Aaron Lilley, Simon Sharudin, (Faculty Advisor: Zesheng Chen)
    received Student Application Paper Implementing Industry Standards Grant by IEEE Standards Education Committee
    published at IEEE Standards University website, 2016
    This paper was also selected to publish at IEEE eMagazine, vol. 7, no. 2, June, 2017.

  13. Intelligent Worms: Searching for Preys
    Zesheng Chen and Chuanyi Ji
    Mathematics Awareness Month: Mathematics and Internet Security Theme Essays, 2006

  14. Worm Propagation Models
    Zesheng Chen
    Mathematics Awareness Month: Mathematics and Internet Security Theme Essays, 2006

  15. On Effectiveness of Defense Systems against Active Worms
    Zesheng Chen, Lixin Gao, and Chuanyi Ji
    Technical Report 2003