default search action
Binbin Chen 0001
Person information
- affiliation: Singapore University of Technology and Design, Singapore
Other persons with the same name
- Binbin Chen — disambiguation page
- Binbin Chen 0002 — Stanford University, Stanford, CA, USA
- Binbin Chen 0003 — Qiannan Normal University for Nationalities, Duyun, China
- Binbin Chen 0004 — Zhejiang University, Hangzhou, China
- Binbin Chen 0005 — Tsinghua University, Beijing, China
- Binbin Chen 0006 — Vivo AI Lab, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Mao V. Ngo, Nguyen-Bao-Long Tran, Hyun-Min Yoo, Yong-Hao Pua, Thanh-Long Le, Xian-Loong Liang, Binbin Chen, Een-Kee Hong, Tony Q. S. Quek:
RAN Intelligent Controller (RIC): From open-source implementation to real-world validation. ICT Express 10(3): 680-691 (2024) - [j28]Hengye Zhu, Mengxiang Liu, Binbin Chen, Xin Che, Peng Cheng, Ruilong Deng:
HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing. IEEE Trans. Inf. Forensics Secur. 19: 6028-6043 (2024) - [j27]Ziming Zhao, Zhaoxuan Li, Jiongchi Yu, Fan Zhang, Xiaofei Xie, Haitao Xu, Binbin Chen:
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains. IEEE Trans. Mob. Comput. 23(5): 5589-5603 (2024) - [j26]Ziming Zhao, Zhaoxuan Li, Xiaofei Xie, Jiongchi Yu, Fan Zhang, Rui Zhang, Binbin Chen, Xiangyang Luo, Ming Hu, Wenrui Ma:
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic. IEEE/ACM Trans. Netw. 32(5): 3945-3960 (2024) - [j25]Suman Sourav, Binbin Chen:
Exposing Hidden Attackers in Industrial Control Systems Using Micro-Distortions. IEEE Trans. Smart Grid 15(2): 2089-2101 (2024) - [j24]Mengqiu Tian, Changle Li, Yilong Hui, Binbin Chen, Wenwei Yue, Yuchuan Fu, Zhu Han:
An Intelligent Coexistence Strategy for eMBB/URLLC Traffic in Multi-UAV Relay Networks via Deep Reinforcement Learning. IEEE Trans. Wirel. Commun. 23(10): 13424-13439 (2024) - [c72]Xi Ling, Jiongchi Yu, Ziming Zhao, Zhihao Zhou, Haitao Xu, Binbin Chen, Fan Zhang:
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining. ACNS (2) 2024: 283-309 - [c71]Vishal Choudhary, Peng Wang, Suman Sourav, Binbin Chen:
Enhancing Data Processing Throughput in IoT-Edge-Cloud Systems Using Optimized Task Placement. ICDCS 2024: 1474-1475 - [c70]Nguyen-Bao-Long Tran, Mao V. Ngo, Yong-Hao Pua, Thanh-Long Le, Binbin Chen, Tony Q. S. Quek:
AI-Driven rApps for Reducing Radio Access Network Interference in Real-World 5G Deployment. INFOCOM (Workshops) 2024: 1-2 - [c69]Ziming Zhao, Zhaoxuan Li, Zhuoxue Song, Fan Zhang, Binbin Chen:
RIDS: Towards Advanced IDS via RNN Model and Programmable Switches Co-Designed Approaches. INFOCOM 2024: 591-600 - [c68]En Low, Carmen Cheh, Binbin Chen:
Repairing Infrastructure-as-Code using Large Language Models. SecDev 2024: 20-27 - 2023
- [j23]William G. Temple, Yue Wu, Carmen Cheh, Yuan Li, Binbin Chen, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol:
CyberSAGE: The cyber security argument graph evaluation tool. Empir. Softw. Eng. 28(1): 18 (2023) - [j22]Ertem Esiner, Utku Tefek, Daisuke Mashima, Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol:
Message Authentication and Provenance Verification for Industrial Control Systems. ACM Trans. Cyber Phys. Syst. 7(4): 24:1-24:28 (2023) - [j21]Fan Zhang, Qianmei Wu, Bohan Xuan, Yuqi Chen, Wei Lin, Christopher M. Poskitt, Jun Sun, Binbin Chen:
Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing. IEEE Trans. Software Eng. 49(11): 4829-4845 (2023) - [c67]Wei Lin, Heng Chuan Tan, Binbin Chen, Fan Zhang:
DNAttest: Digital-twin-based Non-intrusive Attestation under Transient Uncertainty. DSN 2023: 376-388 - [c66]Suman Sourav, Partha P. Biswas, Vyshnavi Mohanraj, Binbin Chen, Daisuke Mashima:
Machine Learning Assisted Bad Data Detection for High-Throughput Substation Communication. ICC 2023: 4131-4137 - [c65]Peng Wang, Suman Sourav, Hongyan Li, Binbin Chen:
One Pass is Sufficient: A Solver for Minimizing Data Delivery Time over Time-varying Networks. INFOCOM 2023: 1-10 - [c64]Wei Lin, Muhammad Ramadan Saifuddin, Binbin Chen:
The Design and Implementation of a Cyber Exercise on EPIC Microgrid Testbed. SmartGridComm 2023: 1-7 - [i11]Suman Sourav, Partha P. Biswas, Vyshnavi Mohanraj, Binbin Chen, Daisuke Mashima:
Machine Learning Assisted Bad Data Detection for High-throughput Substation Communication. CoRR abs/2302.05949 (2023) - [i10]Zhonghao Yang, Shuhao Zhang, Binbin Chen:
TransNFV: Integrating Transactional Semantics for Efficient State Management in Virtual Network Functions. CoRR abs/2307.10732 (2023) - [i9]Suman Sourav, Binbin Chen:
Exposing Hidden Attackers in Industrial Control Systems using Micro-distortions. CoRR abs/2307.15926 (2023) - [i8]Utku Tefek, Ertem Esiner, Daisuke Mashima, Binbin Chen, Yih-Chun Hu:
Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems. CoRR abs/2308.04034 (2023) - 2022
- [j20]Ertem Esiner, Utku Tefek, Hasan S. M. Erol, Daisuke Mashima, Binbin Chen, Yih-Chun Hu, Zbigniew Kalbarczyk, David M. Nicol:
LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems. IEEE Trans. Smart Grid 13(4): 3214-3226 (2022) - [j19]Peng Wang, Hongyan Li, Binbin Chen, Shun Zhang:
Enhancing Earth Observation Throughput Using Inter-Satellite Communication. IEEE Trans. Wirel. Commun. 21(10): 7990-8006 (2022) - [c63]Carmen Cheh, Nicholas Tay, Binbin Chen:
From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery. ACSAC 2022: 400-411 - [c62]Balachandar Gowrisankar, Daisuke Mashima, Wen Shei Ong, Quanqi Ye, Ertem Esiner, Binbin Chen, Zbigniew Kalbarczyk:
GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone. CNS 2022: 100-108 - [c61]Muhammad Ramadan Saifuddin, Lin Wei, Heng Chuan Tan, Binbin Chen:
Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 26-45 - [c60]Peng Wang, Hongyan Li, Binbin Chen:
FL-Task-aware Routing and Resource Reservation over Satellite Networks. GLOBECOM 2022: 2382-2387 - [c59]Heng Chuan Tan, Carmen Cheh, Binbin Chen:
CoToRu: Automatic Generation of Network Intrusion Detection Rules from Code. INFOCOM 2022: 720-729 - [c58]Utku Tefek, Ertem Esiner, Daisuke Mashima, Binbin Chen, Yih-Chun Hu:
Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems. INFOCOM 2022: 1039-1048 - [c57]Carmen Cheh, Nicholas Tay, Binbin Chen:
Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery. SecDev 2022: 91-99 - [c56]Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima:
Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning. SmartGridComm 2022: 360-366 - [i7]Suman Sourav, Binbin Chen:
Distort to Detect, not Affect: Detecting Stealthy Sensor Attacks with Micro-distortion. CoRR abs/2203.12249 (2022) - [i6]Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima:
Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning. CoRR abs/2210.05226 (2022) - 2021
- [j18]Steffen Bondorf, Binbin Chen, Jonathan Scarlett, Haifeng Yu, Yuda Zhao:
Sublinear-Time Non-Adaptive Group Testing With O(k log n) Tests via Bit-Mixing Coding. IEEE Trans. Inf. Theory 67(3): 1559-1570 (2021) - [c55]Nils Ole Tippenhauer, Binbin Chen, Daisuke Mashima, David M. Nicol:
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation. CPSIOTSEC@CCS 2021: 3-14 - [c54]Vincent Tan, Carmen Cheh, Binbin Chen:
From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector. ISSRE Workshops 2021: 69-76 - [c53]Carmen Cheh, Binbin Chen:
Analyzing OpenAPI Specifications for Security Design Issues. SecDev 2021: 15-22 - [c52]Heng Chuan Tan, Vyshnavi Mohanraj, Binbin Chen, Daisuke Mashima, Shing Kham Shing Nan, Aobo Yang:
An IEC 61850 MMS Traffic Parser for Customizable and Efficient Intrusion Detection. SmartGridComm 2021: 194-200 - [c51]Suman Sourav, Binbin Chen:
Distort to Detect, not Affect: Detecting Stealthy Sensor Attacks with Micro-distortion. SmartGridComm 2021: 412-418 - 2020
- [j17]Hongyun Cai, Thanh Tung Nguyen, Yan Li, Vincent W. Zheng, Binbin Chen, Gao Cong, Xiaoli Li:
Modeling Marked Temporal Point Process Using Multi-relation Structure RNN. Cogn. Comput. 12(3): 499-512 (2020) - [j16]Hoon Wei Lim, William G. Temple, Bao Anh N. Tran, Binbin Chen, Zbigniew Kalbarczyk, Jianying Zhou:
Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems. ACM Trans. Cyber Phys. Syst. 4(1): 7:1-7:26 (2020) - [j15]Carmen Cheh, Binbin Chen, William G. Temple, William H. Sanders:
Modeling Adversarial Physical Movement in a Railway Station: Classification and Metrics. ACM Trans. Cyber Phys. Syst. 4(1): 11:1-11:25 (2020) - [j14]Partha P. Biswas, Hongyun Cai, Bin Zhou, Binbin Chen, Daisuke Mashima, Vincent W. Zheng:
Electricity Theft Pinpointing Through Correlation Analysis of Master and Individual Meter Readings. IEEE Trans. Smart Grid 11(4): 3031-3042 (2020) - [c50]Ying Yang, Xin Lou, Binbin Chen, Marianne Winslett, Zbigniew Kalbarczyk:
Identifying Failing Point Machines from Sensor-Free Train System Logs. IEEE BigData 2020: 1424-1429 - [c49]Partha P. Biswas, Yuan Li, Heng Chuan Tan, Daisuke Mashima, Binbin Chen:
An Attack-Trace Generating Toolchain for Cybersecurity Study of IEC61850 based Substations. SmartGridComm 2020: 1-7 - [c48]ChongAih Hau, Binbin Chen, Ziling Zhou, William G. Temple:
Accurate Disaggregation of Chiller Plant Loads Using Noisy Magnetic Field Measurements. SmartGridComm 2020: 1-7
2010 – 2019
- 2019
- [j13]Carmen Cheh, Uttam Thakore, Ahmed M. Fawaz, Binbin Chen, William G. Temple, William H. Sanders:
Data-driven Model-based Detection of Malicious Insiders via Physical Access Logs. ACM Trans. Model. Comput. Simul. 29(4): 26:1-26:25 (2019) - [j12]Daisuke Mashima, Prageeth Gunathilaka, Binbin Chen:
Artificial Command Delaying for Secure Substation Remote Control: Design and Implementation. IEEE Trans. Smart Grid 10(1): 471-482 (2019) - [j11]Yongdong Wu, Binbin Chen, Jian Weng, Zhuo Wei, Xin Li, Bo Qiu, Niekie Liu:
False Load Attack to Smart Meters by Synchronously Switching Power Circuits. IEEE Trans. Smart Grid 10(3): 2641-2649 (2019) - [c47]Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng, Binbin Chen, Weizhi Meng, Hui Li:
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. AsiaCCS 2019: 241-246 - [c46]Carmen Cheh, Uttam Thakore, Binbin Chen, William G. Temple, William H. Sanders:
Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions. EDCC 2019: 127-132 - [c45]Daisuke Mashima, Yuan Li, Binbin Chen:
Who's Scanning Our Smart Grid? Empirical Study on Honeypot Data. GLOBECOM 2019: 1-6 - [c44]Steffen Bondorf, Binbin Chen, Jonathan Scarlett, Haifeng Yu, Yuda Zhao:
Cross-sender bit-mixing coding. IPSN 2019: 205-216 - [c43]Partha P. Biswas, Heng Chuan Tan, Qingbo Zhu, Yuan Li, Daisuke Mashima, Binbin Chen:
A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation. SmartGridComm 2019: 1-7 - [c42]Ertem Esiner, Daisuke Mashima, Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol:
F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid. SmartGridComm 2019: 1-7 - [i5]Steffen Bondorf, Binbin Chen, Jonathan Scarlett, Haifeng Yu, Yuda Zhao:
Sublinear-Time Non-Adaptive Group Testing with O(k log n) Tests via Bit-Mixing Coding. CoRR abs/1904.10102 (2019) - 2018
- [j10]Daisuke Mashima, Aidana Serikova, Yao Cheng, Binbin Chen:
Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing. ICT Express 4(1): 35-41 (2018) - [j9]Yongdong Wu, Binbin Chen, Zhigang Zhao, Yao Cheng:
Attack and Countermeasure on Interlock-Based Device Pairing Schemes. IEEE Trans. Inf. Forensics Secur. 13(3): 745-757 (2018) - [c41]Ahnaf Siddiqi, Nils Ole Tippenhauer, Daisuke Mashima, Binbin Chen:
On Practical Threat Scenario Testing in an Electric Power ICS Testbed. CPSS@AsiaCCS 2018: 15-21 - [c40]Binbin Chen, Yuan Li, Daisuke Mashima:
Analysis and enhancement of RPL under packet drop attacks. COMSNETS 2018: 167-174 - [c39]Ziling Zhou, Binbin Chen:
RFID Counting over Time-Varying Channels. INFOCOM 2018: 1142-1150 - [c38]Carmen Cheh, Ahmed M. Fawaz, Mohammad A. Noureddine, Binbin Chen, William G. Temple, William H. Sanders:
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems. PRDC 2018: 125-134 - [c37]Daisuke Mashima, Binbin Chen, Toby Zhou, Ramkumar Rajendran, Biplab Sikdar:
Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics. SmartGridComm 2018: 1-7 - [i4]Steffen Bondorf, Binbin Chen, Jonathan Scarlett, Haifeng Yu, Yuda Zhao:
Cross-Sender Bit-Mixing Coding. CoRR abs/1807.04449 (2018) - 2017
- [j8]Girisha De Silva, Bin Bin Chen, Mun Choon Chan:
Collaborative cellular tail energy reduction: Feasibility and fairness. Pervasive Mob. Comput. 36: 115-133 (2017) - [j7]Xiangfa Guo, Bin Bin Chen, Mun Choon Chan:
Analysis and Design of Low-Duty Protocol for Smartphone Neighbor Discovery. IEEE Trans. Mob. Comput. 16(12): 3294-3307 (2017) - [c36]Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng:
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. ACSAC 2017: 425-436 - [c35]Carmen Cheh, Ken Keefe, Brett Feddersen, Binbin Chen, William G. Temple, William H. Sanders:
Developing Models for Physical Attacks in Cyber-Physical Systems. CPS-SPC@CCS 2017: 49-55 - [c34]Yan Li, Binbin Chen, Vincent W. Zheng, William G. Temple, Zbigniew Kalbarczyk, Yue Wu:
Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation Log. DSN Workshops 2017: 133-136 - [c33]William G. Temple, Bao Anh N. Tran, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders:
On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure. PRDC 2017: 274-283 - [c32]Carmen Cheh, Binbin Chen, William G. Temple, William H. Sanders:
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs. QEST 2017: 275-291 - [c31]William G. Temple, Yue Wu, Binbin Chen, Zbigniew Kalbarczyk:
Systems-Theoretic Likelihood and Severity Analysis for Safety and Security Co-engineering. RSSRail 2017: 51-67 - [c30]William G. Temple, Yue Wu, Binbin Chen, Zbigniew Kalbarczyk:
Reconciling Systems-Theoretic and Component-Centric Methods for Safety and Security Co-analysis. SAFECOMP Workshops 2017: 87-93 - [c29]Daisuke Mashima, Binbin Chen, Prageeth Gunathilaka, Edwin Lesmana Tjiong:
Towards a grid-wide, high-fidelity electrical substation honeynet. SmartGridComm 2017: 89-95 - [i3]Hoon Wei Lim, William G. Temple, Bao Anh N. Tran, Binbin Chen, Zbigniew Kalbarczyk, Jianying Zhou:
Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems. CoRR abs/1709.05935 (2017) - 2016
- [j6]Yuda Zhao, Haifeng Yu, Binbin Chen:
Near-optimal communication-time tradeoff in fault-tolerant computation of aggregate functions. Distributed Comput. 29(1): 17-38 (2016) - [j5]Ziling Zhou, Binbin Chen, Haifeng Yu:
Understanding RFID Counting Protocols. IEEE/ACM Trans. Netw. 24(1): 312-327 (2016) - [c28]Prageeth Gunathilaka, Daisuke Mashima, Binbin Chen:
SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions. CPS-SPC@CCS 2016: 113-124 - [c27]William G. Temple, Yuan Li, Bao Anh N. Tran, Yan Liu, Binbin Chen:
Railway System Failure Scenario Analysis. CRITIS 2016: 213-225 - [c26]Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol:
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment. GraMSec@CSF 2016: 39-61 - [c25]Girisha De Silva, Bin Bin Chen, Mun Choon Chan:
Collaborative cellular tail energy reduction: feasibility and fairness. ICDCN 2016: 25:1-25:10 - [c24]Daisuke Mashima, Prageeth Gunathilaka, Binbin Chen:
An active command mediation approach for securing remote control interface of substations. SmartGridComm 2016: 147-153 - [c23]Xinshu Dong, Sumeet Jauhar, Binbin Chen:
SwapGuard: A software-only solution for attesting hot-swappable devices in power grids. SmartGridComm 2016: 357-363 - 2015
- [c22]Sumeet Jauhar, Binbin Chen, William G. Temple, Xinshu Dong, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol:
Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios. PRDC 2015: 319-324 - [c21]Binbin Chen, Christoph Schmittner, Zhendong Ma, William G. Temple, Xinshu Dong, Douglas L. Jones, William H. Sanders:
Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective. SAFECOMP Workshops 2015: 277-290 - 2014
- [j4]Binbin Chen, Haifeng Yu, Yuda Zhao, Phillip B. Gibbons:
The Cost of Fault Tolerance in Multi-Party Communication Complexity. J. ACM 61(3): 19:1-19:64 (2014) - [c20]Binbin Chen, Kian Hoong Kwan, Rui Tan:
Battery capacity planning for grid-connected solar photovoltaic systems. APSIPA 2014: 1-5 - [c19]Yuda Zhao, Haifeng Yu, Binbin Chen:
Near-optimal communication-time tradeoff in fault-tolerant computation of aggregate functions. PODC 2014: 416-426 - [c18]Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. PRDC 2014: 33-42 - [c17]An Hoa Vu, Nils Ole Tippenhauer, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk:
CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems. QEST 2014: 384-387 - [i2]Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. CoRR abs/1405.7475 (2014) - 2013
- [j3]Xin Lou, David K. Y. Yau, Hoang Hai Nguyen, Binbin Chen:
Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids. IEEE Trans. Smart Grid 4(3): 1411-1420 (2013) - [c16]Binbin Chen, Ziling Zhou, Haifeng Yu:
Understanding RFID counting protocols. MobiCom 2013: 291-302 - [c15]Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K. Y. Yau:
Go with the flow: toward workflow-oriented security assessment. NSPW 2013: 65-76 - [c14]William G. Temple, Binbin Chen, Nils Ole Tippenhauer:
Delay makes a difference: Smart grid resilience under remote meter disconnect attack. SmartGridComm 2013: 462-467 - 2012
- [j2]Binbin Chen, Ziling Zhou, Yuda Zhao, Haifeng Yu:
Efficient Error Estimating Coding: Feasibility and Applications. IEEE/ACM Trans. Netw. 20(1): 29-44 (2012) - [c13]Jerry T. Chiang, Tianzhu Zhang, Binbin Chen, Yih-Chun Hu:
Load disaggregation using harmonic analysis and regularized optimization. APSIPA 2012: 1-4 - [c12]Binbin Chen, Haifeng Yu, Yuda Zhao, Phillip B. Gibbons:
The cost of fault tolerance in multi-party communication complexity. PODC 2012: 57-66 - [c11]Deokwoo Jung, Hoang Hai Nguyen, Sreejaya Viswanathan, Binbin Chen, David K. Y. Yau:
Scalable load disaggregation system using distributed electrical signature detection. BuildSys@SenSys 2012: 193-194 - [c10]Sreejaya Viswanathan, Binbin Chen, Hoang Hai Nguyen, Jerry T. Chiang, Deokwoo Jung, David K. Y. Yau:
Using anisotropic magnetoresistive (AMR) sensor arrays for electric sub-metering. SenSys 2012: 357-358 - 2011
- [c9]Binbin Chen, Haifeng Yu:
Secure Aggregation with Malicious Node Revocation in Sensor Networks. ICDCS 2011: 581-592 - 2010
- [c8]Bin Bin Chen, Mun Choon Chan:
MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network. INFOCOM 2010: 875-883 - [c7]Binbin Chen, Ziling Zhou, Yuda Zhao, Haifeng Yu:
Efficient error estimating coding: feasibility and applications. SIGCOMM 2010: 3-14
2000 – 2009
- 2009
- [j1]Sebastien Soudan, Bin Bin Chen, Pascale Vicat-Blanc Primet:
Flow scheduling and endpoint rate control in GridNetworks. Future Gener. Comput. Syst. 25(8): 904-911 (2009) - [c6]Bin Bin Chen, Mun Choon Chan:
MobTorrent: A Framework for Mobile Internet Access from Vehicles. INFOCOM 2009: 1404-1412 - [c5]Bin Bin Chen, Shuai Hao, Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda:
DEAL: Discover and Exploit Asymmetric Links in Dense Wireless Sensor Networks. SECON 2009: 1-9 - 2007
- [c4]Bin Bin Chen, Pascale Vicat-Blanc Primet:
Scheduling deadline-constrained bulk data transfers to minimize network congestion. CCGRID 2007: 410-417 - [c3]Bin Bin Chen, Pascale Vicat-Blanc Primet:
Supporting Bulk Data Transfers of High-End Applications with Guaranteed Completion Time. ICC 2007: 575-580 - 2006
- [c2]Bin Bin Chen, Mun Choon Chan:
Resource management in heterogenous wireless networks with overlapping coverage. COMSWARE 2006: 1-10 - [c1]Bin Bin Chen, Mun Choon Chan:
Proportional Fairness for Overlapping Cells in Wireless Networks. VTC Fall 2006: 1-5 - [i1]Bin Bin Chen, Pascale Primet:
A Flexible Bandwidth Reservation Framework for Bulk Data Transfers in Grid Networks. CoRR abs/cs/0606076 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint