Melody Moh's Publications

 

Last Update: March 2020

 

On DBLP:

https://dblp.uni-trier.de/pers/hd/m/Moh:Melody

On Google Scholar:

https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Melody+Moh&btnG=

 

 

Recent Publications

(Since 2010)


(A) Refereed Journal Papers and Book Chapters (* - SJSU Students)
 

 

1.     M. Moh, D. Nguyen*, T.-S. Moh, and B. Khieu*, Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus. Chapter in Blockchain Cybersecurity, Trust, and Privacy, edited by Choo, Kim-Kwang Raymond, Dehghantanha, Ali, and Parizi, Reza, published by Springer, pp. 69-97, Mar. 2020.

2.     B. T. Khieu* and M. Moh, Neural Networks Applications in Hate Speech Detection. Chapter in Neural Networks for Natural Language Processing, edited by Sumathi S. and Janani M., published by IGI Global, pp. 188-204, Nov. 2019.

3.     D. Pathinga Rajendiran*, Y. Tan*, and M. Moh, Dynamic Cache Management of Cloud RAN and Multi-Access Edge Computing for 5G Networks. Chapter in Fundamental and Supportive Technologies for 5G Mobile Networks, edited by Sherine Mohamed Abd El- and Hanan Hussein, published by IGI Global, pp. 126-158, Nov. 2019.

4.     M. Moh and D. Pathinga Rajendiran*, On Efficient Cache Management of Cloud Radio Access Networks for 5G Mobile Networks. Chapter in Chapter in Fundamental and Supportive Technologies for 5G Mobile Networks, edited by Sherine Mohamed Abd El- and Hanan Hussein, published by IGI Global, pp. 159-186, Nov. 2019.

5.     T. Kammara* and M. Moh, Identifying IoT-based Botnets. Chapter in Botnets: Architectures, Countermeasures, and Challenges, edited by Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou, published by CRC Press, Oct. 2019.

6.     B. Khieu* and M. Moh, Cloud-Centric Blockchain Public Key Infrastructure for Big Data Applications. Chapter in Security, Privacy, and Forensics Issues in Big Data, edited by Ramesh C. Joshi and Brij B. Gupta, published by IGI Global, Aug. 2019, pp. 125-140.

7.     Heemany Shekhar* and M. Moh. Cracking Audio CAPTCHA with Machine Learning and Deep Learning Models. Chapter in Machine Learning and Cognitive Science Applications in Cyber Security, edited by Mohamed Amine Ferrag and Ahmed Ahmim, published by IGI Global, May 2019.

8.     S. Yen* and M. Moh. Intelligent Log Analysis Using Machine and Deep Learning. Chapter in Machine Learning and Cognitive Science Applications in Cyber Security, ed. M. A. Ferrag and A. Ahmim, published by IGI Global, May 2019.

9.     N. Mani* and M. Moh, Adversarial Attacks and Defense on Deep Learning Models for Big Data and IoT, chapter in Handbook of Research on Cloud Computing and Big Data Applications in IoT, edited by B. B. Gupta and D. P Agrawal, published by IGI Global, Apr. 2019, pp. 39-66.

10.  R. Raju*, M. Moh, and T.-S. Moh, Compression of Wearable and Implantable Body Sensor Network (WIBN) Data, chapter in Smart Data: State-of-the-Art Perspectives in Computing and Applications, 1st ed., edited by K. Li, B. Ei Martino, L. T. Yang, and Q. Zhang, published by Chapman and Hall/CRC, Mar. 2019, pp. 215-242.

11.  M. Moh, Online Learning and Heuristic Algorithms for 5G Cloud-RAN Load Balance, chapter in Next-Generation Wireless Networks Meet Advanced Machine Learning Applications, edited by I-S Comsa and R. Trestian, published by IGI Global, Jan. 2019, pp. 199-234.

12.  R. Raju* and M. Moh, Using Machine Learning for Protecting the Security and Privacy of Internet-of-Things (IoT) Systems, chapter in Fog and Edge Computing: Principles and Paradigms, edited by R. Buyya and S. N. Srirama, published by Wiley, Jan. 2019, pp. 223-253.

13.  B. Shahriari* and M. Moh, Intelligent Mobile Messaging for Smart Cities, chapter in Handbook of Smart Cities, Software Services and Cyber Infrastructure, edited by M. Maheswaran and E. Badidi, published by Springer, Nov. 2018, pp. 227-253.

14.  M. Moh, T.-S. Moh, Y. Peng*, and L. Wu*. On Adverse Drug Event Extractions Using Twitter Sentiment Analysis. Network Modeling Analysis in Health Informatics and Bioinformatics. Published by Springer, Sept 2017.

15.  M. Munoz* and M. Moh. Authentication of Smart Grid - the Case for Using Merkle Trees. Chapter in Security Solutions and Applied Cryptography in Smart Grid Communications, edited by Mohamed Amine Ferrag and Ahmed Ahmim, published by IGI Global, Nov. 2016.

16.  M. Moh, L. Ho*, and Z. Walker*. Prototype on RFID and Sensor Networks for Elder Health Care. Chapter in Sensor Networks for Sustainable Development, edited by M. Ilyas, S S. Alwakeel, M. M. Alwakeel, and H. M. Aggoune, published by CRC Press, Sept 2015.

17.  R. Wong*, T.-S. Moh, and M. Moh. Semi-Supervised Learning BitTorrent Traffic Detection. Invited chapter in Distributed Network Intelligence, Security and Applications, ed. by Qurban A. Memon, CRC Press - Taylor & Francis Group, USA, Apr 2013.

18.  J. Huang*, K. Wu*, L. Leong*, S. Ma*, and M. Moh. A Tunable Workflow Scheduling Algorithm Based on Particle Swarm Optimization for Cloud Computing. International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, pp. 351-358, 2013.

19.  K. Isaacs*, J. Hsieh*, and M. Moh. Extending OSPF for MANET Routing. Chapter in Mobile Ad hoc Networks: Current Status and Future Trends, edited by S. Khan, J. Lloret, J. Ortiz, and J. Loo, published by CRC Press: Taylor and Francis, Auerbach-Publications, 2011.

20.  M. Moh, P. Jangyodsuk*, P. Huynh*. Cross-layer handover for mobile WiMAX networks. Chapter in Emerging Wireless Networks: Concepts, Techniques and Applications, edited by C. Makaya and S. Pierre, published by CRC Press: Taylor and Francis, Auerbach-Publications, Nov 2011.

21.  M. Moh, X. Lin*, and S. Dhar. Energy-efficient, scalable, self-organizing routing for wireless mobile networks. Chapter in Recent Advances in Broadband Integrated Network Operations and Services Management, edited by Debashis Saha and Varadharajan Sridhar, published by IGI Global, May 2011.

22.  M. Moh, B. Chellappan*, T.-S. Moh, and S. Venugopal*, “Handoff mechanisms for IEEE 802.16 networks supporting intelligent transportation systems,†chapter in Wireless Technologies for Intelligent Transportation Systems, edited by Ming-Tuo Zhou, Yang Zhang, and Lawrence Yang, published by Nova Science Pub., 2010.

23.  Moh, M. and J. Li*, “A survey of reputation and trust systems for mobile ad-hoc network routing,†chapter in Handbook of Information and Communication Security, edited by P. Stavroulakis and M. Stamp, Springer, 2010.


(B) Refereed Conference Papers (* - SJSU Student)

1.     D. Wang*, M. Moh, and T.-S. Moh. Using Deep Learning to Solve Google reCAPTCHA v2’s Image Challenges. Proc. of 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM), IEEE Press, Taichung, Taiwan, Jan. 2020.

2.     M. Moh, and T.-S. Moh, B. Khieu*. No "Love" Lost: Defending Hate Speech Detection Models Against Adversaries. Proc. of 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM), IEEE Press, Taichung, Taiwan, Jan. 2020.

3.     S. Yen*, M. Moh, and T.-S. Moh. Semi-Supervised Log Anomaly Detection Through Sequence Modeling. Proc. of IEEE 18th International Conference on Machine Learning and Applications (ICMLA 2019), Boca Raton, USA, Dec. 2019.

4.     H. Shekhar*, M. Moh, and T.-S. Moh. Exploring Adversaries to Defend Audio CAPTCHA. Proc.s of IEEE 18th International Conference on Machine Learning and Applications (ICMLA 2019), Boca Raton, USA, Dec. 2019.

5.     N. Mani*, M. Moh, and T.-S. Moh. Towards Robust Ensemble Defense Against Adversarial Attacks on Deep Learning Models. Proc. of the IEEE GLOBECOM 2019, Waikoloa, Hawaii, USA, Dec. 2019.

6.     Y. Tang* and M. Moh, "Cache Management for Cloud RAN and Multi-Access Edge Computing with Dynamic Input." Proc. of the 17th Int. Conf. on High Performance Comp. and Simulation (HPCS), Dublin, Ireland, July 2019, pp. 185-192.

7.     Sui Kun Guan* Melody Moh, and Teng-Sheng Moh, "Context-based Multi-stage Offline Handwritten Mathematical Symbol Recognition using Deep Learning." Proc. of the 17th International Conference on High Performance Computing and Simulation (HPCS), Dublin, Ireland, July 2019, pp. 185-192.

8.     B. Khieu* and M. Moh. CBPKI: Cloud Blockchain-based Public Key Infrastructure. Proc. of 2019 Annual ACM Southeast Conference, Kennesaw, GA, USA, April 2019.

9.     (Received Best Paper Runner-Up Award) Z. Zhang* and M. Moh. Randomized Load Balancing for Cloud Computing using Bacterial Foraging Optimization. Proc. of 2019 Annual ACM Southeast Conference, Kennesaw, GA, USA, April 2019.

10.  D. Pathinga Rajendiran* and M. Moh. Adaptive Hierarchical Cache Management for Cloud RAN and Multi-Access Edge Computing in 5G Networks. Proc. of International Conference on Ubiquitous Information Management and Communication (IMCOM), Phuket, Thailand, Jan 2019.

11.  S. Pawar*, M. Moh, and T.-S. Moh. Micro-Expression Recognition Using Motion Magnification and Spatiotemporal Texture Map. Proc. of International Conference on Ubiquitous Information Management and Communication (IMCOM), Phuket, Thailand, Jan 2019.

12.  A. Sridharan*, M. Moh, and T.-S. Moh. Similarity Estimation for Indian Classical Music. Proc. of IEEE 17th International Conference on Machine Learning and Applications (ICMLA 2018), Orlando, USA, Dec. 2018.

13.  S. Gaikwad*, M. Moh, and D. Anastasiu. Data Structure for Efficient Line of Sight Queries. In Proc. of 2018 ACM International Conference on Information and Knowledge Management, Turin, Italy, Oct. 2018.

14.  Moh, M. and R. Raju*.  (Invited Paper) Machine learning techniques for security of Internet of Things (IoT) and fog computing systems. Proc. of IEEE International Conference on High Performance Computing and Simulation, Orleans, France, July 2018.

15.  Gao, L.* and M. Moh. Joint Computation Offloading and Prioritized Scheduling in Mobile Edge Comput*ing. Proc. of IEEE International Conference on High Performance Computing and Simulation, Orleans, France, July 2018.

16.  R. Raju*, M. Moh, and T.-S. Moh. Compression of Wearable Body Sensor Network Data Using Improved Two-Threshold-Two-Divisor Data Chunking Algorithms. Proc. of IEEE International Conference on High Performance Computing and Simulation, Orleans, France, July 2018.

17.  K. Ross*, M. Moh, T-S. Moh, and J. Yao. Multi-source data analysis and evaluation of machine learning techniques for SQL injection detection. Proc. of 2018 Annual ACM Southeast Conference, Richmond, KY, March 2018.

18.  G. Kaur* and M. Moh. Cloud Computing Meets 5G Networks: Efficient Cache Management in Cloud Radio Access Networks. Proc. of 2018 Annual ACM Southeast Conference, Richmond, KY, March 2018.

19.  T. Choudhari*, M. Moh, and T.-S. Moh. Prioritized Task Scheduling in Fog Computing. Proc. of 2018 Annual ACM Southeast Conference, Richmond, KY, March 2018.

20.  (Honorable/Best Paper Award) C. Tsai* and M. Moh. Cache Management for 5G Cloud Radio Access Networks. Proc. of 12th ACM International Conference on Ubiquitous Information Management and Communication (IMCOM), Langkawi, Malaysia, January 2018.

21.  G. Su* and M. Moh. Improving Energy Efficiency and Scalability for IoT Communications in 5G Networks. Proc. of the 12th ACM International Conference on Ubiquitous Information Management and Communication (IMCOM), Langkawi, Malaysia, January 2018.

22.  C. Tsai* and M. Moh. Load Balancing in 5G Cloud Radio Access Networks Supporting IoT Communications for Smart Communities. Proc. of 2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Bilbao, Spain, Dec 2017.

23.  C. Tsai* and M. Moh, Abstract: Cache Management and Load Balancing for 5G Cloud Radio Access Networks, ACM Symposium on Cloud Computing, Santa Clara, USA, Sept 2017.

24.  C.-Tsai* and M. Moh. Abstract: Cache Management and Load Balancing for 5G Cloud Radio Access Networks. Proc. Of ACM Symposium on Cloud Computing. Santa Clara, USA, Sept 2017.

25.  V. Karneyenka*, K. Mohta*, and M. Moh. Location and Mobility Aware Resource Management for 5G Cloud Radio Access Networks. Proc. of the International Conference on High Performance Computing and Simulation (HPCS), Genoa, Italy, July 2017.

26.  B. Shahriari*, M. Moh, and T.-S. Moh. Generic Online Learning for Partial Visible Dynamic Environment with Delayed Feedback - Online Learning for 5G C-RAN Load-Balancer. Proc. of the International Conference on High Performance Computing and Simulation (HPCS), Genoa, Italy, July 2017.

27.  Kevin Ross*, Melody Moh, Teng-Sheng Moh, and Jason Yao. Poster: Multi-source data analysis for SQL injection detection. 38th IEEE Symposium on Security and Privacy, San Jose, USA, May 2017.

28.  E. Zheng*, M. Moh, and T.-S. Moh. Music Genre Classification: A N-gram based Musicological Approach. Proc. of 7th IEEE International Advance Computing Conference (IACC-2017), Hyderabad, India, Jan 5-7, 2017.

29.  S. Natarajan* and M. Moh. Recommending News Based on Hybrid User Profile, Popularity, Trends, and Location. Proc. of the 17th IEEE Int. Conf. on Collaboration Technologies and Systems (CTS 2016), Orlando, FL, Oct 31 – Nov 4, 2016.

30.  P. Mehetrey*, B. Shahriari*, and M. Moh. Collaborative Ensemble-Learning based Intrusion Detection Systems for Clouds. Proc. of the 17th IEEE Int. Conf. on Collaboration Technologies and Systems (CTS 2016), Orlando, FL, Oct 31 – Nov 4, 2016.

31.  P. Nair*, M. Moh, and T. –S. Moh. Using Social Media Presence for Alleviating Cold Start Problems in Privacy Protection. Proc. of the 17th IEEE Int. Conf. on Collaboration Technologies and Systems (CTS 2016), Orlando, FL, Oct 31 – Nov 4, 2016.

32.  B. Shahriari* and M. Moh. Intelligent Mobile Messaging for Urban Networks. Proceedings of The 12th IEEE Int. Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob 2016), New York, October 17-19, 2016.

33.  Y. Peng*, M. Moh, and T.-S. Moh. Efficient Adverse Drug Event Extraction Using Twitter Sentiment Analysis. Proceedings of the 8th IEEE/ACM Int. Conf. on Advances in Social Networks Analysis and Mining (ASONAM), San Francisco, California, August 2016, pp. 1101-1018.

34.  S. Sathyanarayana* and M. Moh. Joint Route-Server Load Balancing in Software Defined Networks using Ant Colony Optimization. Proceedings of the International Conference on High Performance Computing and Simulation (HPCS), Innsbruck, Austria, July 2016.

35.  V. R. Reguri*, S. Kogatam*, and M. Moh. Energy Efficient Traffic-Aware Virtual Machine Migration in Green Cloud Data Centers. Proc. The 2nd IEEE International Conference on High Performance and Smart Computing (IEEE HPSC 2016), New York, Apr 2016.

36.  V. Zhao*, M. Moh, and T.-S. Moh. Weighted Switching Hybrid Contextual-Aware (W-SHCA) Recommender System for Cold-Start Problems. Proc. IEEE International Conference on Intelligent Data and Security (IEEE IDS 2016), New York, Apr 2016.

37.  F. Yu*, M. Moh, and T.-S. Moh. Towards Extracting Drug-Effect Relation from Twitter:  A Supervised Learning Approach. Proc. IEEE International Conference on Intelligent Data and Security (IEEE IDS 2016), New York, Apr 2016.

38.  M. Moh, S. Pininti*, S. Daddapaneni*, and T.-S. Moh. Detecting Web Attacks Using Multi-Stage Log Analysis. Proc. of 6th IEEE International Advance Computing Conference (IACC-2016), Bhimavaram, India, Feb 2016.

39.  M. Moh, A. Gajjala*, S. Gangireddy*, and T.-S. Moh. On Multi-Tier Sentiment Analysis using Supervised Machine Learning. Proc. IEEE/WIC/ACM Web Intelligence Conference,” Singapore, Dec. 2015.

40.  M. Talitsu*, T.-S. Moh, and M. Moh. Gossip-based Spectral Clustering of Distributed Data Streams. Proceedings of 2015 International Conference on High-Performance Computing and Simulation, Amsterdam, the Netherland, July 2015.

41.  A. Kapoor* and M. Moh. Implementation and Evaluation of the DFF Protocol for Advanced Metering Infrastructure (AMI) Networks. Proceedings of 11th IEEE International Conference on Design of Reliable Communication Networks, Kansas City, MO, March 2015.

42.  M. Munoz*, M. Moh, and T.-S. Moh, “Improving Smart Grid Authentication using Merkle Trees,” Proc. IEEE International Conference on Parallel and Distributed Systems, Hsin-Chu, Taiwan, Dec. 2014.

43.  M. Munoz*, M. Moh, and T.-S. Moh, “Improving Smart Grid Security using Merkle Trees,” Proc. IEEE International Conference on Communications and Network Security, San Francisco, CA, Oct. 2014.

44.  J. Huang*, K. Wu*, and M. Moh, Dynamic Virtual Machine Migration Algorithms Using Enhanced Energy Consumption Model for Green Cloud Data Centers, accepted for presentation at the 2014 High Performance Computing and Simulation Conference (HPCS 2014), to be held July 21 - July 25, 2014, in Bologna, Italy,

45.  S. Gaur*, M. Moh, and M. Balakrishnan, Hiding behind the Clouds: Efficient, Privacy-Preserving Queries via Cloud Proxies, Proc. of International Workshop on Cloud Computing Systems, Networks, and Applications, in conjunction with the IEEE Globecom (Global Communications Conference), held in Atlanta, GA., Dec. 2013.

46.  M. Moh and R. Alvare-Horine*, A Successful Graduate Cloud Computing Class with Hands-on Labs, Proc. of IEEE Frontiers in Education, held in Oaklohoma City, OK., Oct 2013.

47.  Z.-Y. Xie, T.-S. Moh, and M. Moh, ASAP: Ad-hoc Streaming Adaptive Protocol for Supporting P2P Streaming over Vehicular Ad-hoc Networks. Proc. of 51st ACM Southeast Conference, held in Savannah, GA., Apr 2013.

48.  J. Huang*, K. Wu*, L. Leong*, S. Ma*, and M. Moh, A Tunable Workflow Scheduling Algorithm Based on Particle Swarm Optimization for Cloud Computing, Proc. of the International Conference on Soft Computing and Software Engineering, held in San Francisco, CA., March 2013.

49.  M.Moh, R. Alvarez-Jorine*, S. Chandawale*, and S. Mogarkar*, A Successful Interdisciplinary Course Integrating Teaching and Research, Proc. of IEEE International Conf. on Interdisciplinary Engineering Design Education, held in Santa Clara, CA., March 2013.

50.  R. Alvarez-Horine* and M. Moh, “Experimental Evaluation of Linux TCP for Adaptive Video Streaming over the Cloud,†Proc. of the 1st IEEE Int. workshop on Management and Security technologies for Cloud Computing, with the IEEE Globecom (Global Communications Conference), Anaheim, CA, Dec. 2012.

51.  R. Wong*, T.-S. Moh, and M. Moh, “Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow Inspections,†in Proc. of 6th International Conference on Information Systems, Technology, and Management, ICISTM 2012, held in Grenoble, France, March 28-30, 2012; and Communications in Computer and Information Science 285, Springer, 2012

52.  R. Wong*, T.-S. Moh, and M. Moh, “Efficient Semi-Supervised Learning BitTorrent Traffic Detection: An Extended Summary,†in Proc. of 13th Int. Conf on Distributed Computing and Networking – ICDCN 2012, held in Hong Kong, China, January 3-6, 2012; and Lecture Notes in Computer Science 7129, Springer 2012.

53.  L. Yang* and M. Moh, “Dual Trust Secure Protocol for Cluster-Based Wireless Sensor Networks,†in Proc. IEEE 45th Asilomar Conference on Signals, Systems and Computers, held in Pacific Grove, CA, Nov. 2011.

54.  Moh, M. T.-S. Moh, and K. Chen*, “Error-sensitive adaptive frame aggregation in 802.11n WLAN,†Proc. of the 8th International Conference on Wired/Wireless Internet Communications, Lecture Notes in Computer Science 6074 Springer 2010, held in Lulea, Sweden, Jun 1 – 3, 2010.

55.  P. Huynh*, P. Jangyodsuk*, and M. Moh, “Supporting video streaming over WiMAX networks by enhanced FMIPv6-based handover,†Proc. of the 4th International Conference on Information Systems, Technology and Management, Bangkok, Thailand, March 10-12, 2010.