Part of the Computer Sciences Commons

Works by Lei Chen in Computer Sciences

2021

Text Classification of Digital Forensic Data, Chrisitan Sunday Nwankwo, Hayden Wimmer, Lei Chen, Jongyeop Kim
Hayden Wimmer

A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring, Lei Chen, Ming Yang, Hayden Wimmer, Brittany Wilbert
Hayden Wimmer

2020

Text Classification of Digital Forensic Data, Chrisitan Sunday Nwankwo, Hayden Wimmer, Lei Chen, Jongyeop Kim
Department of Information Technology Faculty Publications

A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring, Lei Chen, Ming Yang, Hayden Wimmer, Brittany Wilbert
Department of Information Technology Faculty Publications

A New Framework for Securing, Extracting and Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
Hayden Wimmer

Exposing The Tor Failures On Mobile Devices Using Paraben’s E3:Ds Technology, Ton H. Don, Hayden Wimmer, Lei Chen, Queen E. Booker
Hayden Wimmer

Ontologies and the Semantic Web for Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Tom Narock
Hayden Wimmer

2019

A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing, Isaac C. Cushman, Md Baitul Al Sadi, Lei Chen, Rami Haddad
Rami Haddad

A Digital Forensic Tool for Mobile Devices: Paraben, Hitesh Sachdev, Hayden Wimmer, Lei Chen
Hayden Wimmer

Security, Privacy, and Digital Forensics in the Cloud, Lei Chen, Hassan Takabi, Nhien-An Le-Khac
Department of Information Technology Faculty Bookshelf

2018

A New Framework for Securing, Extracting and Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
Department of Information Technology Faculty Publications

PDF

A Digital Forensic Tool for Mobile Devices: Paraben, Hitesh Sachdev, Hayden Wimmer, Lei Chen
Department of Information Technology Faculty Publications

Improving Real-Time Data Streaming Security to Promote Patient and Physician Socialization, Hitesh Sachdev, Hayden Wimmer, Lei Chen
Hayden Wimmer

Improving the Efficiency of Big Forensic Data Analysis Using NoSQL, Md Baitul Al Sadi, Hayden Wimmer, Lei Chen, Kai Wang
Hayden Wimmer

Real Time Video Stitching by Exploring Temporal and Spatial Features, Shaoen Wu, Kelly Blair, Junhong Xu, Hanqing Guo, Kai Wang, Lei Chen
Kai Wang

Improving the Efficiency of Big Forensic Data Analysis Using NoSQL, Md Baitul Al Sadi, Hayden Wimmer, Lei Chen, Kai Wang
Kai Wang

Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring, Joshua Regenold, Kai Wang, Gary Smith, Quingzhong Liu, Lei Chen
Kai Wang

Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform, Rakesh Malik, Narasimha Shashidhar, Lei Chen
Lei Chen

Adaptive Threshold-Based RF Spectrum Scanning Through Joint Energy and Bandwidth Detection with USRPs in Cognitive Sensor Networks for ROAR Architecture, Isaac Cushman, Ashraf Younis, Danda Rawat, Lei Chen
Lei Chen

A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing, Isaac C. Cushman, Md Baitul Al Sadi, Lei Chen, Rami Haddad
Lei Chen

Cloud Storage Client Application Evidence Analysis on UNIX/Linux, Rakesh Malik, Narasimha Shashidhar, Lei Chen
Lei Chen

A Routing Algorithm with Path Randomization for Enhanced Security and Balanced Energy Consumption, David C. Yuan, Lei Chen
Lei Chen

Improving the Efficiency of Big Forensic Data Analysis Using NoSQL, Md Baitul Al Sadi, Hayden Wimmer, Lei Chen, Kai Wang
Lei Chen

Smart and Private Social Activity Invitation Framework Based on Historical Data from Smart Devices, Weitian Tong, Scott Buglass, Jeffery Li, Lei Chen, Chunyu Ai
Lei Chen

IPv6 Security and Forensics, Vincent Nicolls, Nhien-An Le-Khac, Lei Chen, Mark Scanlon
Lei Chen

Real Time Video Stitching by Exploring Temporal and Spatial Features, Shaoen Wu, Kelly Blair, Junhong Xu, Hanqing Guo, Kai Wang, Lei Chen
Lei Chen

Improving Real-Time Data Streaming Security to Promote Patient and Physician Socialization, Hitesh Sachdev, Hayden Wimmer, Lei Chen
Lei Chen

Detecting Unprotected SIP-Based Voice over IP Traffic, Leonardo Carvajal, Lei Chen, Cihan Varol, Danda Rawat
Lei Chen

Enhancing the Security of IoT Enabled Robotics: Protecting TurtleBot File System and Communication, Michael Horton, Lei Chen, Biswanath Samanta
Lei Chen

Performance Evaluation of Vehicular Ad Hoc Networks for Rapid Response Traffic Information Delivery, Isaac J. Cushman, Danda B. Rawat, Lei Chen, Qing Yang
Lei Chen

Framework and Challenges: H.265/HEVC Rate Control in Real-Time Transmission over 5G Mobile Networks, Lei Chen, Ming Yang, Luguo Hao, Danda Rawat
Lei Chen

Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy, Isaac Cushman, Lei Chen, Danda Rawat, Nhien-An Le-Khac
Lei Chen

Investigating the Security and Digital Forensics of Video Games and Gaming Systems: a Study of PC Games and PS4 Console, Lei Chen, Narasimha Shashidhar, Danda Rawat, Ming Yang, Christopher A. Kadlec
Lei Chen

Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring, Joshua Regenold, Kai Wang, Gary Smith, Quingzhong Liu, Lei Chen
Lei Chen

Cooperative Adaptive Cruise Control of Connected and Autonomous Vehicles Subject to Input Saturation, Weinan Gao, Fernando Rios-Gutierrez, Weitian Tong, Lei Chen
Weinan Gao

Exposing The Tor Failures On Mobile Devices Using Paraben’s E3:Ds Technology, Ton H. Don, Hayden Wimmer, Lei Chen, Queen E. Booker
Department of Information Technology Faculty Publications

Ontologies and the Semantic Web for Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Tom Narock
Department of Information Technology Faculty Publications

PDF

2017

Smart and Private Social Activity Invitation Framework Based on Historical Data from Smart Devices, Weitian Tong, Scott Buglass, Jeffery Li, Lei Chen, Chunyu Ai
Department of Computer Science Faculty Publications

Cloud Storage Client Application Analysis, Rakesh Malik, Narasimha Shashidhar, Lei Chen
Lei Chen

An Advanced Private Social Activity Invitation Framework with Friendship Protection, Weitian Tong, Lei Chen, Scott Buglass, Weinan Gao
Lei Chen

A Method to Detect AAC Audio Forgery, Qingzhong Liu, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing Zhang
Lei Chen

In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes, Robert J. McDown, Cihan Varol, Leonardo Carvajal, Lei Chen
Lei Chen

An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy, Narasimha Shashidhar, Lei Chen
Lei Chen

Secure P2P Patch Dissemination in a Race Against Topological Worms, Narasimha Shashidhar, Lei Chen
Lei Chen

On the Security of Information Dissemination in the Internet-of-Vehicles, Danda B. Rawat, Moses Garuba, Lei Chen, Qing Yang
Lei Chen

An Advanced Private Social Activity Invitation Framework with Friendship Protection, Weitian Tong, Lei Chen, Scott Buglass, Weinan Gao
Weinan Gao

An Advanced Private Social Activity Invitation Framework with Friendship Protection, Weitian Tong, Lei Chen, Scott Buglass, Weinan Gao
Department of Information Technology Faculty Publications

PDF

On the Security of Information Dissemination in the Internet-of-Vehicles, Danda B. Rawat, Moses Garuba, Lei Chen, Qing Yang
Department of Information Technology Faculty Publications

PDF

Real Time Video Stitching by Exploring Temporal and Spatial Features, Shaoen Wu, Kelly Blair, Junhong Xu, Hanqing Guo, Kai Wang, Lei Chen
Department of Computer Science Faculty Publications

Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring, Joshua Regenold, Kai Wang, Gary Smith, Quingzhong Liu, Lei Chen
Department of Information Technology Faculty Publications

Improving the Efficiency of Big Forensic Data Analysis Using NoSQL, Md Baitul Al Sadi, Hayden Wimmer, Lei Chen, Kai Wang
Department of Information Technology Faculty Publications

A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing, Isaac J. Cushman, Md Baitul Al Sadi, Lei Chen, Rami Haddad
Department of Information Technology Faculty Publications

Framework and Challenges: H.265/HEVC Rate Control in Real-Time Transmission over 5G Mobile Networks, Lei Chen, Ming Yang, Luguo Hao, Danda Rawat
Department of Information Technology Faculty Publications

Enhancing the Security of IoT Enabled Robotics: Protecting TurtleBot File System and Communication, Michael Horton, Lei Chen, Biswanath Samanta
Department of Information Technology Faculty Publications

2016

Improving Real-Time Data Streaming Security to Promote Patient and Physician Socialization, Hitesh Sachdev, Hayden Wimmer, Lei Chen
Department of Information Technology Faculty Publications

Performance Evaluation of Vehicular Ad Hoc Networks for Rapid Response Traffic Information Delivery, Isaac J. Cushman, Danda B. Rawat, Lei Chen, Qing Yang
Department of Information Technology Faculty Publications

IPv6 Security and Forensics, Vincent Nicolls, Nhien-An Le-Khac, Lei Chen, Mark Scanlon
Department of Information Technology Faculty Publications

A Routing Algorithm with Path Randomization for Enhanced Security and Balanced Energy Consumption, David C. Yuan, Lei Chen
Department of Information Technology Faculty Publications

Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy, Isaac J. Cushman, Lei Chen, Danda Rawat, Nhien-An Le-Khac
Department of Information Technology Faculty Publications

Detecting Unprotected SIP-Based Voice over IP Traffic, Leonardo Carvajal, Lei Chen, Cihan Varol, Danda Rawat
Department of Information Technology Faculty Publications

Adaptive Threshold-Based RF Spectrum Scanning Through Joint Energy and Bandwidth Detection with USRPs in Cognitive Sensor Networks for ROAR Architecture, Isaac J. Cushman, Ashraf Younis, Danda Rawat, Lei Chen
Department of Information Technology Faculty Publications

Investigating the Security and Digital Forensics of Video Games and Gaming Systems: a Study of PC Games and PS4 Console, Lei Chen, Narasimha Shashidhar, Danda Rawat, Ming Yang, Christopher A. Kadlec
Department of Information Technology Faculty Publications

2015

In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes, Robert J. McDown, Cihan Varol, Leonardo Carvajal, Lei Chen
Department of Information Technology Faculty Publications

A Method to Detect AAC Audio Forgery, Qingzhong Liu, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing Zhang
Department of Information Technology Faculty Publications

PDF

A Method to Detect AAC Audio Forgery, Qingzhong Liu, Andrew H. Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing Zhang
Lei Chen

Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform, Rakesh Malik, Narasimha Shashidhar, Lei Chen
Department of Information Technology Faculty Publications

Cloud Storage Client Application Evidence Analysis on UNIX/Linux, Rakesh Malik, Narasimha Shashidhar, Lei Chen
Department of Information Technology Faculty Publications

An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy, Narasimha Shashidhar, Lei Chen
Department of Information Technology Faculty Publications

PDF

Cloud Storage Client Application Analysis, Rakesh Malik, Narasimha Shashidhar, Lei Chen
Department of Information Technology Faculty Publications

PDF

A Method to Detect AAC Audio Forgery, Qingzhong Liu, Andrew H. Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu
Lei Chen

Exposing Image Tampering with the Same Quantization Matrix, Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Lei Chen
Lei Chen

Digital Forensics in Social Networks and the Cloud: Process, Approaches, Methods, Tools, and Challenges, Lei Chen, Lanchuan Xu, Xiaohui Yuan, Narasimha Shashidhar
Lei Chen

Analysis of Facebook Steganographic Capabilities, Lei Chen, Nathaniel D. Amsden
Lei Chen

Digital Forensics in Social Networks and the Cloud: Process, Approaches, Methods, Tools, and Challenges, Lei Chen, Lanchuan Xu, Xiaohui Yuan, Narasimha Shashidhar
Lei Chen

Secure P2P Patch Dissemination in a Race Against Topological Worms, Narasimha Shashidhar, Lei Chen
Department of Information Technology Faculty Publications

2014

Comparison of File Integrity Monitoring (FIM) Techniques for Small Business Networks, Lei Chen
Lei Chen

Binary Biometric Template Generation Towards Security and Class Separability, Eslam Hamouda, Xiaohui Yuan, Osama Ouda, Taher Hamza, Lei Chen
Lei Chen

Transmitting Hidden Information Using Steganography via Facebook, Nathaniel D. Amsden, Lei Chen, Xiaohui Yuan
Lei Chen

Email Encryption: Discovering Reasons Behind its Lack of Acceptance, Kendal Stephens LaFleur, Lei Chen
Lei Chen

Biometric Authentication Systems: An Evaluation of Current Technologies and Study of Asus SmartLogon Face Recognition, Christopher Hale, Lei Chen
Lei Chen

Legal Concerns and Challenges in Cloud Computing, Sundar Krishnan, Lei Chen
Lei Chen

Curbing the Spread of Topological Worms - A Defense Topology for the P2P Cyberspace, Narasimha Shashidhar, Lei Chen
Lei Chen

Information Retrieval Using Rough Set Approximations, Bing Zhou, Lei Chen, Xiuyi Jia
Lei Chen

Compression/Transmission Power Allocation in Multimedia Wireless Sensor Networks, Ming Yang, Lei Chen, Weiqiang Xiong
Lei Chen

Emerging Cyberworld Attack Vectors: Modification, Customization, Secretive Communications, and Digital Forensics in PC Video Games, Michael Ebrahimi, Lei Chen
Lei Chen

Emerging Cyberworld Attack Vectors: Modification, Customization, Secretive Communications, and Digital Forensics in PC Video Games, Michael Ebrahimi, Lei Chen
Lei Chen

Location Security in Vehicular Wireless Networks, Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista, Lei Chen
Lei Chen

Security in Wireless Metropolitan Area Networks: WiMAX and LTE, Lei Chen, Cihan Varol, Qingzhong Liu, Bing Zhou
Lei Chen

2013

Network Security and Network Forensics, Lei Chen
Lei Chen

Spatial Trajectory Prediction Using a Matrix Representation, Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, Lei Chen
Lei Chen

Towards a Graduate Degree in USA, Lei Chen
Lei Chen

Tools for Collecting Volatile Data: A Survey Study, Leonardo Carvajal, Cihan Varol, Lei Chen
Lei Chen

A Novel Matrix Representation for Privacy-Preserving Spatial Trajectory Prediction, Wen-Chen Hu, Hung-Jen Yang, Naima Kaabouch, Lei Chen
Lei Chen

Network Security and Forensics: Past, Present, and Future, Lei Chen
Lei Chen

Preventing Cell Phone Intrusion and Theft Using Biometrics: Fingerprint Biometric Security Utilizing Dongle and Solid State Relay Technology, Donny Jacob Ohana, Lei Chen, Liza Phillips
Lei Chen

Wireless Network Security: Theories and Applications, Lei Chen, Jiahuang Ji, Zihong Zhang
Lei Chen

Handheld Usage Data Mining for Handheld Data Protection, Wen-Chen Hu, Naima Kaabouch, Lei Chen, Hung-Jen Yang
Lei Chen

Incremental Location Matching for Human Travel Route Anomaly Detection, Wen-Chen Hu, Naima Kaabouch, Lei Chen, Ming Yang
Lei Chen

Security in Bluetooth Networks and Communications, Lei Chen, Peter A. Cooper, Qingzhong Liu
Lei Chen

Security in Wireless Metropolitan Area Networks, Lei Chen, Narasimha Shashidhar, Shengli Yuan, Ming Yang
Lei Chen

Applications, Technologies, and Standards in Secure Wireless Networks and Communications, Lei Chen
Lei Chen

2012

Native and Detection-Specific Log Auditing for Small Network Environments, Lei Chen
Lei Chen

A New Villain: Investigating Steganography in Source Engine Based Video Games, Christopher Hale, Lei Chen, Qingzhong Liu
Lei Chen

Native and Detection-Specific Log Auditing for Small Network Environments, Brittany Wilbert, Lei Chen
Lei Chen

A New Villain: Investigating Steganography in Source Engine Based Video Games, Lei Chen
Lei Chen

Secure Last Acknowledged Packet Routing Algorithm (SLAPRA) for MANETs, Peter A. Cooper, Lei Chen, Chao Sun
Lei Chen

Secure Last Acknowledged Packet Routing Algorithm (SLAPRA) for MANETs, Lei Chen
Lei Chen

Minimizing Interchannel Attacks in WDM Optical Networks, Shengli Yuan, Lei Chen, Ming Yang
Lei Chen

Situation-Aware on Mobile Phone Using Co-Clustering: Algorithms and Extensions, Lei Chen
Lei Chen

Securing Your Containers: An Exercise in Secure High Performance Virtual Containers, Adam Miller, Lei Chen
Lei Chen

Peer to Peer File Sharing: Security Concerns, Unwanted Traffic Detection and Filtering, Leonardo Carvajal, Lei Chen
Lei Chen

Identifying Illegal Digital Images: An Image Watermark Approach to Preventing the Spread of Pornography, Mark Wilson, Qingzhong Liu, Lei Chen
Lei Chen

Securing Sensitive Data Stored on Smartphones: Using Face Recognition to Unlock Mobile Devices, Mark Wilson, Lei Chen
Lei Chen

The Human Element: Investigating the Insider Threat, Abner Mendoza, Lei Chen
Lei Chen

Securing Your Containers: An Exercise in Secure High Performance Virtual Containers, Adam Miller, Lei Chen
Lei Chen

Combating Social Engineering: A DoD Perspective, Nathaniel D. Amsden, Lei Chen
Lei Chen

Building a Defensible Virtual Environment, Shaun Walmsley, Lei Chen
Lei Chen

Log Management and Retention in Corporate Environment, Brittany Wilbert, Lei Chen
Lei Chen

Securing Sensitive Data Stored on Smartphones: Using Face Recognition to Unlock Mobile Devices, Mark Wilson, Lei Chen
Lei Chen

Identifying Illegal Digital Images: An Image Watermark Approach to Preventing the Spread of Pornography, Mark Wilson, Qingzhong Liu, Lei Chen
Lei Chen

Building a Defensible Virtual Environment, Lei Chen
Lei Chen

Peer to Peer File Sharing: Security Concerns, Unwanted Traffic Detection and Filtering, Leonardo Carvajal, Lei Chen
Lei Chen

Situation-Aware on Mobile Phone using Co-Clustering: Algorithms and Extensions, Hyuk Cho, Deepthi Mandava, Qingzhong Liu, Lei Chen, Sangoh Jeong, Doreen Cheng
Lei Chen

Identification of Smartphone-Image Source and Manipulation, Qingzhong Liu, Xiaodong Li, Lei Chen, Hyuk Cho, Peter A. Cooper, Zhongxue Chen, Mengyu Qiao, Andrew H. Sung
Lei Chen

A Linear Route Representation for Route Anomaly Discovery, Wen-Chen Hu, Naima Kaabouch, Liang Cheng, Lei Chen
Lei Chen

Scalable Secure MJPEG Video Streaming, Lei Chen, Narasimha Shashidhar, Qingzhong Liu
Lei Chen

Scalable Secure MJPEG Video Streaming, Lei Chen, Narasimha Shashidhar, Qingzhong Liu
Lei Chen

Essential Technologies for Location-Aware Mobile, Online Map Perfetching and Caching, Wen-Chen Hu, Naima Kaabouch, Lei Chen, Ming Yang
Lei Chen

2011

A Phishing Model and Its Applications to Evaluating Phishing Attacks, Narasimha Shashidhar, Lei Chen
Lei Chen

Secure Processing and Delivery of Medical Images for Patient Information Protection, Ming Yang, Lei Chen, Shengli Yuan, Wen-Chen Hu
Lei Chen

PPSAM: Proactive PowerShell Anti-Malware: Customizable Comprehensive Tool to Supplement Commercial AVs, Alejandro Villegas, Lei Chen
Lei Chen

Secure Common Web Server Session: Sharing Object Data Across Deployed Java Web Applications on the Same Web Server, Chad Cook, Lei Chen
Lei Chen

Hashing Smartphone Serial Numbers: An ASLR Approach to Preventing Malware Attacks, Mark Wilson, Lei Chen
Lei Chen

Secure Common Web Server Session: Sharing Object Data Across Deployed Java Web Applications on the Same Web Server, Chad Cook, Lei Chen
Lei Chen

PPSAM: Proactive PowerShell Anti-Malware: Customizable Comprehensive Tool to Supplement Commercial AVs, Alejandro Villegas, Lei Chen
Lei Chen

Secure Processing and Delivery of Medical Images for Patient Information Protection, Ming Yang, Lei Chen
Lei Chen

Hashing Smartphone Serial Numbers: An ASLR Approach to Preventing Malware Attacks, Lei Chen
Lei Chen

Incremental Location Searching for Route Anomaly Detection, Wen-Chen Hu, Naima Kaabouch, Lei Chen, Hung-Jen Yang
Lei Chen

Multimedia Information Security: Cryptography and Steganography, Ming Yang, Monica Trifas, Nikolaos Bourbakis, Lei Chen
Lei Chen

Security and Privacy Issues in Secure E-Mail Standards and Services, Lei Chen, Wen-Chen Hu, Ming Yang, Lei Zhang
Lei Chen

Multimedia Information Security and Privacy: Theory and Applications, Ming Yang, Monica Trifas, Guillermo Francia III, Lei Chen, Yongliang Hu
Lei Chen

Applied Cryptography in E-Mail Services and Web Services, Lei Chen, Wen-Chen Hu, Ming Yang, Lei Zhang
Lei Chen

2010

A Threat-Aware Routing Algorithm for Maximum Physical-Layer Path Survivability, Shengli Yuan, Balaji Raghavachari, Lei Chen
Lei Chen

A Threat-Aware Routing Algorithm for Maximum Physical-Layer Path Survivability, Lei Chen
Lei Chen

Digital Forensics and Information Security, Lei Chen
Lei Chen

An Optimization Neural Network for Smartphone Data Protection, Wen-Chen Hu, Yanjun Zuo, Naima Kaabouch, Lei Chen
Lei Chen

Dynamic Indoor Location Determination: Mechanisms and Robustness Evaluation, Yiming Ji, Lei Chen
Lei Chen

Dynamic Indoor Location Determination: Mechanisms and Robustness Evaluation, Yiming Ji, Lei Chen
Lei Chen

A Technological Perspective of Mobile and Electronic Commerce Systems, Wen-Chen Hu, Yanjun Zuo, Naima Kaabouch, Lei Chen
Lei Chen

Mobile and Handheld Security, Lei Chen, Shaoen Wu, Yiming Ji, Ming Yang
Lei Chen

2009

Location Security in Geographic Ad Hoc Routing for VANETs, Ziwei Ren, Wenfan Li, Shaoen Wu, Qing Yang, Lei Chen
Lei Chen

Location Security in Geographic Ad Hoc Routing for VANETs, Lei Chen
Lei Chen

Effects of Mobility and Redundancy on Video Streaming over MANETs, Lei Chen
Lei Chen

Web Content Adaptation for Internet-Enabled Mobile Handheld Devices, Wen-Chen Hu, Hung-Jen Yang, Lei Chen, Ruchitha Deshmukh
Lei Chen

Adaptive Mobile Web Browsing Using Web Mining Technologies, Wen-Chen Hu, Yanjun Zuo, Lei Chen, Chyuan-Huei Thomas Yang
Lei Chen

2008

Contemporary Technologies and Platforms for Electronic and Mobile Commerce System Construction, Wen-Chen Hu, Yanjun Zuo, Lei Chen, Anusha Gopalakrishnan
Lei Chen

The Effects of Mobility and Redundancy on Wireless Video Streaming Over MANETs, Lei Chen, Chung-wei Lee
Lei Chen

2007

On Secure Media Streaming with Path Diversity in MANETs, Lei Chen
Lei Chen

2006

Technical, Pedagogical, Cultural and Social Research Study of a Traditional and Distance Learning Information Technology Minor: An Auburn University Case Study, Daniela Marghitu, Lei Chen, Jody Burks
Lei Chen

Density-Based Multipath Secure Communication Over Mobile Ad Hoc Networks, Lei Chen, Chung-wei Lee, Jyh-haw Yeh
Lei Chen

Gene Intrusion on a Society of Hill-Climbers, Lei Chen, Chung-wei Lee, Wen-Chen Hu
Lei Chen

Gene Intrusion on a Society of Hill-Climbers, Lei Chen, Chung-wei Lee, Wen-Chen Hu
Lei Chen

Density-Based Multipath Secure Communication over Mobile Ad Hoc Networks, Lei Chen, Chung-wei Lee, Jyh-haw Yeh
Lei Chen

2005

Neighbor Stability Routing in MANETs, Lei Chen
Lei Chen

Neighbor Stability Routing in MANETs, Lei Chen, Chung-wei Lee
Lei Chen

Multi-Level Secure Video Streaming Over SRTP, Lei Chen, Chung-wei Lee
Lei Chen

Multi-Level Secure Video Streaming Over SRTP, Lei Chen, Chung-wei Lee
Lei Chen