Dr. Weifeng Chen
- B.S.: Computer Science, Peking University
- B.A.: Economics, Minor in Law, Peking University
- M.S.: Computer Science, Institute of Software, Chinese Academy of Sciences
- M.S.: Computer Science, University of Massachusetts at Amherst
- Ph.D.: Computer Science, University of Massachusetts at Amherst
- Senior Project I and II
- Theory of Languages
- Analysis of Algorithms
- Web Programming
- Creating Webpages with HTML and XHTML
- Internet Concepts
- Personal Productivity Software
- Pennsylvania State System of Higher Education Faculty Professional Development Council Annual Grant Award (2007-2008, 2008-2009)
- 2007 John Jay College Research Assistance Program Award
- 2006-2007 Professional Staff Congress - City University of New York Research Award
- Weifeng Chen, Ye Sun, and Anthony Pyzdrowski. "On the Security Cost of Interval Multicast." International Journal of Network Security, Vol.11, No.2, PP.51-59, September 2010.
- Changwang Zhang, Jianping Yin, Zhiping Cai, and Weifeng Chen. "RRED: Robust RED Algorithm to Counter Low-rate Denial-of-Service Attacks." IEEE Communication Letters (Accepted)
- Michael Perelman, Ping Ji, and Weifeng Chen. "Traffic and Security Analysis on Sony PlayStation 3." Proceedings of 2009 Workshop on Cybercrime and Computer Forensics (in conjunction with the IEEE Intelligence and Security Informatics), Dallas, Texas, June 8, 2009.
- Jessica Ho, Ping Ji, Weifeng Chen, and Raymond Hsieh. "Identifying Google Talk Packets." Proceedings of 2009 Workshop on Cybercrime and Computer Forensics (in conjunction with the IEEE Intelligence and Security Informatics), Dallas, Texas, June 8, 2009.
- Emmanuel Velasco, Weifeng Chen, Ping Ji, and Raymond Hsieh. "Challenges of Location Tracking Techniques in Wireless Forensics." In Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2008), Harbin, China, Aug. 15-17, 2008.
- Emmanuel Velasco, Weifeng Chen, Ping Ji, and Raymond Hsieh. "Wireless Forensic: A New Radio Frequency based Locating System." In Proceedings of the 2008 Pacific Asia Workshop on Cybercrime and Computer Forensics, Taipei, Taiwan, June 17-20, 2008.
- Weifeng Chen and Huan Li. "Modeling Threshold Secret Sharing Schemes in Ad Hoc Networks." In Proceedings of IEEE 2008 International Conference on Networking, Architecture and Storage, Chongqing, China, June 12-14, 2008.
- Weifeng Chen, Lakshminath Dondeti and Ye Sun. "Performance Comparison of Stateful and Stateless Group Rekeying Algorithms." International Journal of Computer Science and Network Security. Vol. 8, No. 3. pp. 186-195, 2008.
- Bruno Ribeiro, Weifeng Chen, Gerome Miklau, and Don Towsley. "Analyzing Privacy in Enterprise Packet Trace Anonymization." Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008), San Diego, Calif., Feb. 10-13, 2008. (Acceptance ratio=17.8%)
- Weifeng Chen, Zhen Liu, and Anton Riabov. "A Soft Constraint Privacy Model based on Identifiability." Proceedings of the Second IEEE International Workshop on Security, Trust and Privacy for Software Applications (STPSA 2007), Beijing, China , July 23-27, 2007.
- Weifeng Chen, Zihui Ge, Jim Kurose, and Don Towsley. "Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite Events." Proceedings of 13th IEEE International Conference on Network Protocols (ICNP 2005), November 2005. (Acceptance ratio=17%)
- Weifeng Chen, Y. Huang, B.F. Ribeiro, K. Suh, H. Zhang, E. Silva, J. Kurose, and D. Towsley. "Exploiting the IPID Field to Infer Network Path and End-system Characteristics." Proceedings of Sixth Passive and Active Measurement Workshop (PAM 2005), March 2005. (Acceptance ratio=28%)
- Weifeng Chen, Lori Clarke, Jim Kurose, and Don Towsley. "Optimizing Cost-sensitive Trust-negotiation Protocols." Proceedings of 24th Conference of the IEEE Communications Society (Infocom 2005), March 2005. (Acceptance ratio=17%)
- Weifeng Chen, Zihui Ge, Chun Zhang, Jim Kurose, and Don Towsley. "On Dynamic Subset Difference Revocation Scheme." Proceedings of IFIP TC6 Third Networking Conferences (Networking 2004), May 2004. (Acceptance ratio=19%)
- Security and privacy - computer forensics, trust negotiation, privacy protection, key management, intrusion detection and authentication.
- Computer networking - Publish/subscribe systems, optimization, performance evaluation, measurement and traffic analysis.
In The Classroom
Dr. Chen tries to learn what students are interested in, what their career goals are and what is most difficult for them in the class. The learning environment is convenient for students, including flexible office hours and progressive teaching techniques.
- Department of Math, Computer Science and Information Systems
"The best part of my job is sharing knowledge and clinical expertise with the energetic and dedicated students of Cal U! It is a win-win opportunity for all of us as these students learn a profession that they will love, and someday they will make a difference in the people they help."