Melody Moh's Publications
Last Update: March
2020
On
DBLP:
https://dblp.uni-trier.de/pers/hd/m/Moh:Melody
On
Google Scholar:
https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Melody+Moh&btnG=
Recent
Publications
(Since
2010)
(A) Refereed Journal Papers and Book Chapters (* - SJSU Students)
1.
M.
Moh, D. Nguyen*, T.-S. Moh, and B. Khieu*, Blockchain
for Efficient Public Key Infrastructure and Fault-Tolerant Distributed
Consensus. Chapter in Blockchain Cybersecurity, Trust, and Privacy,
edited by Choo, Kim-Kwang Raymond, Dehghantanha, Ali,
and Parizi, Reza, published by Springer, pp. 69-97,
Mar. 2020.
2.
B. T. Khieu* and M. Moh, Neural Networks Applications
in Hate Speech Detection. Chapter in Neural Networks for Natural Language
Processing, edited by Sumathi S. and Janani M., published by IGI Global,
pp. 188-204, Nov. 2019.
3.
D.
Pathinga Rajendiran*, Y.
Tan*, and M. Moh, Dynamic Cache Management of Cloud RAN and Multi-Access Edge
Computing for 5G Networks. Chapter in Fundamental and Supportive
Technologies for 5G Mobile Networks, edited by Sherine
Mohamed Abd El- and Hanan Hussein, published
by IGI Global, pp. 126-158, Nov. 2019.
4.
M.
Moh and D. Pathinga Rajendiran*,
On Efficient Cache Management of Cloud Radio Access Networks for 5G Mobile
Networks. Chapter in Chapter in Fundamental and Supportive Technologies for
5G Mobile Networks, edited by Sherine
Mohamed Abd El- and Hanan Hussein, published
by IGI Global, pp. 159-186, Nov. 2019.
5.
T.
Kammara* and M. Moh, Identifying IoT-based Botnets.
Chapter in Botnets: Architectures, Countermeasures, and Challenges,
edited by Georgios Kambourakis, Marios
Anagnostopoulos, Weizhi
Meng, Peng Zhou, published by CRC Press, Oct. 2019.
6.
B.
Khieu* and M. Moh, Cloud-Centric Blockchain Public
Key Infrastructure for Big Data Applications. Chapter in Security, Privacy,
and Forensics Issues in Big Data, edited by Ramesh C. Joshi and Brij B.
Gupta, published by IGI Global, Aug. 2019, pp. 125-140.
7.
Heemany
Shekhar* and M. Moh. Cracking Audio CAPTCHA with
Machine Learning and Deep Learning Models. Chapter in Machine Learning and Cognitive Science
Applications in Cyber Security, edited by Mohamed Amine Ferrag and Ahmed Ahmim, published
by IGI Global, May 2019.
8.
S.
Yen* and M. Moh. Intelligent Log Analysis Using Machine and Deep Learning.
Chapter in Machine Learning and
Cognitive Science Applications in Cyber Security, ed. M. A. Ferrag and A. Ahmim, published by
IGI Global, May 2019.
9.
N.
Mani* and M. Moh, Adversarial Attacks and Defense on Deep Learning Models for
Big Data and IoT, chapter in Handbook of Research on Cloud Computing and Big
Data Applications in IoT, edited by B. B. Gupta and D. P Agrawal, published
by IGI Global, Apr. 2019, pp. 39-66.
10.
R.
Raju*, M. Moh, and T.-S. Moh, Compression of Wearable and Implantable Body
Sensor Network (WIBN) Data, chapter in Smart Data: State-of-the-Art
Perspectives in Computing and Applications, 1st ed., edited by
K. Li, B. Ei Martino, L. T. Yang, and Q. Zhang,
published by Chapman and Hall/CRC, Mar. 2019, pp. 215-242.
11.
M.
Moh, Online Learning and Heuristic Algorithms for 5G Cloud-RAN Load Balance,
chapter in Next-Generation Wireless Networks Meet Advanced Machine Learning
Applications, edited by I-S Comsa and R. Trestian, published by IGI Global, Jan. 2019, pp. 199-234.
12.
R.
Raju* and M. Moh, Using Machine Learning for Protecting the Security and
Privacy of Internet-of-Things (IoT) Systems, chapter in Fog and Edge
Computing: Principles and Paradigms, edited by R. Buyya
and S. N. Srirama, published by Wiley, Jan. 2019, pp.
223-253.
13.
B.
Shahriari* and M. Moh, Intelligent Mobile Messaging
for Smart Cities, chapter in Handbook of Smart Cities, Software Services and
Cyber Infrastructure, edited by M. Maheswaran and
E. Badidi, published by Springer, Nov. 2018, pp.
227-253.
14. M. Moh, T.-S. Moh, Y.
Peng*, and L. Wu*. On Adverse Drug Event Extractions Using Twitter Sentiment
Analysis. Network Modeling Analysis in Health Informatics and
Bioinformatics. Published by Springer, Sept 2017.
15. M. Munoz* and M. Moh.
Authentication of Smart Grid - the Case for Using Merkle Trees. Chapter in Security Solutions and Applied Cryptography
in Smart Grid Communications, edited by Mohamed Amine Ferrag
and Ahmed Ahmim, published by IGI Global, Nov. 2016.
16. M. Moh, L. Ho*, and
Z. Walker*. Prototype on RFID and Sensor Networks for Elder Health Care.
Chapter in Sensor Networks for
Sustainable Development, edited by M. Ilyas, S S.
Alwakeel, M. M. Alwakeel,
and H. M. Aggoune, published by CRC Press, Sept 2015.
17. R. Wong*, T.-S. Moh, and M. Moh.
Semi-Supervised Learning BitTorrent Traffic
Detection. Invited chapter in Distributed Network Intelligence, Security and
Applications, ed. by Qurban A. Memon, CRC Press - Taylor & Francis Group, USA, Apr
2013.
18. J. Huang*, K. Wu*, L. Leong*, S. Ma*,
and M. Moh. A Tunable Workflow Scheduling Algorithm Based on Particle Swarm
Optimization for Cloud Computing. International Journal of Soft Computing
and Software Engineering [JSCSE], Vol. 3, No. 3, pp. 351-358, 2013.
19. K. Isaacs*, J. Hsieh*, and M. Moh.
Extending OSPF for MANET Routing. Chapter in Mobile Ad hoc Networks: Current
Status and Future Trends, edited by S. Khan, J. Lloret,
J. Ortiz, and J. Loo, published by CRC Press: Taylor and Francis,
Auerbach-Publications, 2011.
20. M. Moh, P. Jangyodsuk*,
P. Huynh*. Cross-layer handover for mobile WiMAX networks. Chapter in Emerging
Wireless Networks: Concepts, Techniques and Applications, edited by C. Makaya and S. Pierre, published by CRC Press: Taylor and
Francis, Auerbach-Publications, Nov 2011.
21. M. Moh, X. Lin*, and S. Dhar.
Energy-efficient, scalable, self-organizing routing for wireless mobile
networks. Chapter in Recent Advances in Broadband Integrated Network
Operations and Services Management, edited by Debashis
Saha and Varadharajan
Sridhar, published by IGI Global, May 2011.
22. M. Moh, B. Chellappan*,
T.-S. Moh, and S. Venugopal*, “Handoff mechanisms
for IEEE 802.16 networks supporting intelligent transportation systems,†chapter in Wireless Technologies for Intelligent
Transportation Systems, edited by Ming-Tuo Zhou, Yang
Zhang, and Lawrence Yang, published by Nova Science Pub., 2010.
23. Moh, M. and J. Li*, “A
survey of reputation and trust systems for mobile ad-hoc network routing,†chapter in Handbook of Information and
Communication Security, edited by P. Stavroulakis and
M. Stamp, Springer, 2010.
(B) Refereed Conference Papers (* - SJSU Student)
1.
D.
Wang*, M. Moh, and T.-S. Moh. Using Deep Learning to Solve Google reCAPTCHA v2’s Image Challenges. Proc. of 2020 14th International
Conference on Ubiquitous Information Management and Communication (IMCOM), IEEE
Press, Taichung, Taiwan, Jan. 2020.
2.
M. Moh,
and T.-S. Moh, B. Khieu*. No "Love" Lost:
Defending Hate Speech Detection Models Against Adversaries. Proc. of 2020 14th
International Conference on Ubiquitous Information Management and Communication
(IMCOM), IEEE Press, Taichung, Taiwan, Jan. 2020.
3.
S. Yen*,
M. Moh, and T.-S. Moh. Semi-Supervised Log Anomaly Detection Through Sequence
Modeling. Proc. of IEEE 18th International Conference on Machine Learning
and Applications (ICMLA 2019), Boca Raton, USA, Dec. 2019.
4.
H. Shekhar*, M. Moh, and T.-S. Moh. Exploring Adversaries to
Defend Audio CAPTCHA. Proc.s of IEEE 18th
International Conference on Machine Learning and Applications (ICMLA 2019),
Boca Raton, USA, Dec. 2019.
5.
N.
Mani*, M. Moh, and T.-S. Moh. Towards Robust Ensemble Defense Against
Adversarial Attacks on Deep Learning Models. Proc. of the IEEE GLOBECOM 2019,
Waikoloa, Hawaii, USA, Dec. 2019.
6.
Y. Tang*
and M. Moh, "Cache Management for Cloud RAN and Multi-Access Edge
Computing with Dynamic Input." Proc. of the 17th Int. Conf. on High
Performance Comp. and Simulation (HPCS), Dublin, Ireland, July 2019,
pp. 185-192.
7.
Sui Kun Guan* Melody Moh, and Teng-Sheng Moh,
"Context-based Multi-stage Offline Handwritten Mathematical Symbol
Recognition using Deep Learning." Proc. of the 17th International
Conference on High Performance Computing and Simulation (HPCS), Dublin,
Ireland, July 2019, pp. 185-192.
8.
B. Khieu* and M. Moh. CBPKI: Cloud Blockchain-based Public Key
Infrastructure. Proc. of 2019 Annual ACM Southeast Conference, Kennesaw,
GA, USA, April 2019.
9.
(Received Best
Paper Runner-Up Award) Z. Zhang* and M. Moh. Randomized Load Balancing for Cloud
Computing using Bacterial Foraging Optimization. Proc. of 2019 Annual ACM Southeast Conference, Kennesaw,
GA, USA, April 2019.
10. D. Pathinga Rajendiran*
and M. Moh. Adaptive Hierarchical Cache Management for Cloud RAN and
Multi-Access Edge Computing in 5G Networks. Proc. of International
Conference on Ubiquitous Information Management and Communication (IMCOM),
Phuket, Thailand, Jan 2019.
11. S. Pawar*, M. Moh, and T.-S. Moh.
Micro-Expression Recognition Using Motion Magnification and Spatiotemporal
Texture Map. Proc. of International Conference on Ubiquitous Information
Management and Communication (IMCOM), Phuket, Thailand, Jan 2019.
12. A. Sridharan*, M. Moh, and T.-S. Moh.
Similarity Estimation for Indian Classical Music. Proc. of IEEE 17th
International Conference on Machine Learning and Applications (ICMLA 2018),
Orlando, USA, Dec. 2018.
13. S. Gaikwad*, M. Moh, and D. Anastasiu.
Data Structure for Efficient Line of Sight Queries. In Proc. of 2018 ACM
International Conference on Information and Knowledge Management, Turin,
Italy, Oct. 2018.
14.
Moh, M. and R. Raju*. (Invited
Paper) Machine learning techniques for security of Internet of Things (IoT) and
fog computing systems. Proc. of IEEE International Conference on High
Performance Computing and Simulation, Orleans, France, July 2018.
15.
Gao, L.* and M. Moh. Joint Computation Offloading and Prioritized
Scheduling in Mobile Edge Comput*ing.
Proc. of IEEE International Conference on High Performance Computing and
Simulation, Orleans, France, July 2018.
16.
R. Raju*, M. Moh, and T.-S. Moh. Compression of Wearable Body Sensor
Network Data Using Improved Two-Threshold-Two-Divisor Data Chunking Algorithms.
Proc. of IEEE International Conference on High Performance Computing and
Simulation, Orleans, France, July 2018.
17.
K. Ross*, M. Moh, T-S. Moh, and J. Yao. Multi-source data analysis and
evaluation of machine learning techniques for SQL injection detection. Proc.
of 2018 Annual ACM Southeast Conference, Richmond, KY, March 2018.
18.
G. Kaur* and M. Moh. Cloud Computing Meets 5G Networks: Efficient Cache
Management in Cloud Radio Access Networks. Proc. of 2018 Annual ACM
Southeast Conference, Richmond, KY, March 2018.
19.
T. Choudhari*, M. Moh, and T.-S. Moh.
Prioritized Task Scheduling in Fog Computing. Proc. of 2018 Annual ACM
Southeast Conference, Richmond, KY, March 2018.
20.
(Honorable/Best Paper Award) C. Tsai* and M. Moh. Cache Management for
5G Cloud Radio Access Networks. Proc. of 12th ACM International Conference
on Ubiquitous Information Management and Communication (IMCOM), Langkawi,
Malaysia, January 2018.
21.
G. Su* and M. Moh. Improving Energy Efficiency and Scalability for IoT
Communications in 5G Networks. Proc. of the 12th ACM International
Conference on Ubiquitous Information Management and Communication (IMCOM),
Langkawi, Malaysia, January 2018.
22. C. Tsai* and M. Moh. Load
Balancing in 5G Cloud Radio Access Networks Supporting IoT Communications for
Smart Communities. Proc. of 2017 IEEE International Symposium on Signal
Processing and Information Technology (ISSPIT), Bilbao, Spain, Dec 2017.
23. C. Tsai* and M. Moh, Abstract: Cache Management and
Load Balancing for 5G Cloud Radio Access Networks, ACM Symposium on Cloud
Computing, Santa Clara, USA, Sept 2017.
24. C.-Tsai* and M. Moh. Abstract: Cache Management and Load Balancing for 5G
Cloud Radio Access Networks. Proc. Of ACM Symposium on Cloud Computing.
Santa Clara, USA, Sept 2017.
25. V. Karneyenka*, K. Mohta*,
and M. Moh. Location and Mobility Aware Resource Management for 5G Cloud Radio
Access Networks. Proc. of the International Conference on High Performance
Computing and Simulation (HPCS), Genoa, Italy, July 2017.
26.
B. Shahriari*,
M. Moh, and T.-S. Moh. Generic Online Learning for Partial Visible Dynamic
Environment with Delayed Feedback - Online Learning for 5G C-RAN Load-Balancer.
Proc. of the International Conference on High Performance Computing
and Simulation (HPCS), Genoa, Italy, July 2017.
27. Kevin Ross*,
Melody Moh, Teng-Sheng Moh, and Jason Yao. Poster: Multi-source data analysis
for SQL injection detection. 38th IEEE Symposium on Security and Privacy,
San Jose, USA, May 2017.
28. E. Zheng*, M. Moh, and T.-S. Moh. Music Genre
Classification: A N-gram based Musicological Approach. Proc. of 7th IEEE International Advance Computing Conference
(IACC-2017), Hyderabad, India, Jan 5-7, 2017.
29. S. Natarajan* and M. Moh. Recommending News Based on Hybrid
User Profile, Popularity, Trends, and Location. Proc. of the 17th IEEE Int. Conf. on Collaboration
Technologies and Systems (CTS 2016), Orlando, FL, Oct 31 – Nov 4, 2016.
30. P. Mehetrey*, B. Shahriari*, and M. Moh. Collaborative Ensemble-Learning
based Intrusion Detection Systems for Clouds. Proc. of the 17th IEEE Int. Conf. on Collaboration
Technologies and Systems (CTS 2016), Orlando, FL, Oct 31 – Nov 4, 2016.
31. P. Nair*, M. Moh, and T. –S. Moh. Using Social Media Presence for Alleviating Cold Start
Problems in Privacy
Protection. Proc. of the 17th
IEEE Int. Conf. on Collaboration Technologies and Systems (CTS 2016),
Orlando, FL, Oct 31 – Nov 4, 2016.
32. B. Shahriari* and M. Moh. Intelligent
Mobile Messaging for Urban Networks. Proceedings
of The 12th IEEE Int. Conf. on Wireless and Mobile Computing, Networking and
Communications (WiMob ꁦ羾2016),
New York, October 17-19, 2016.
33. Y. Peng*, M. Moh,
and T.-S. Moh. Efficient Adverse Drug Event Extraction Using Twitter Sentiment
Analysis. Proceedings of the 8th IEEE/ACM Int. Conf. on Advances in Social
Networks Analysis and Mining (ASONAM), San Francisco, California, August
2016, pp. 1101-1018.
34. S. Sathyanarayana* and M. Moh. Joint Route-Server Load
Balancing in Software Defined Networks using Ant Colony Optimization. Proceedings of the International Conference
on High Performance Computing and Simulation (HPCS), Innsbruck, Austria,
July 2016.
35. V. R. Reguri*, S. Kogatam*, and M. Moh.
Energy Efficient Traffic-Aware Virtual Machine Migration in Green Cloud Data
Centers. Proc. The 2nd IEEE International Conference on High Performance and
Smart Computing (IEEE HPSC 2016), New York, Apr 2016.
36. V. Zhao*, M. Moh, and
T.-S. Moh. Weighted Switching Hybrid Contextual-Aware (W-SHCA) Recommender
System for Cold-Start Problems. Proc. IEEE International Conference on
Intelligent Data and Security (IEEE IDS 2016), New York, Apr 2016.
37. F. Yu*, M. Moh, and
T.-S. Moh. Towards Extracting Drug-Effect Relation from Twitter: A
Supervised Learning Approach. Proc. IEEE International Conference on
Intelligent Data and Security (IEEE IDS 2016), New York, Apr 2016.
38. M. Moh, S. Pininti*, S. Daddapaneni*, and
T.-S. Moh. Detecting Web Attacks Using Multi-Stage Log Analysis. Proc. of 6th
IEEE International Advance Computing Conference (IACC-2016), Bhimavaram, India, Feb 2016.
39. M. Moh, A. Gajjala*, S. Gangireddy*, and
T.-S. Moh. On Multi-Tier Sentiment Analysis using Supervised Machine Learning.
Proc. IEEE/WIC/ACM Web Intelligence Conference,” Singapore, Dec. 2015.
40. M. Talitsu*, T.-S. Moh, and M. Moh. Gossip-based Spectral
Clustering of Distributed Data Streams. Proceedings of 2015 International
Conference on High-Performance Computing and Simulation, Amsterdam, the
Netherland, July 2015.
41. A. Kapoor* and M.
Moh. Implementation and Evaluation of the DFF Protocol for Advanced Metering
Infrastructure (AMI) Networks. Proceedings of 11th IEEE International
Conference on Design of Reliable Communication Networks, Kansas City, MO, March
2015.
42. M. Munoz*, M. Moh,
and T.-S. Moh, “Improving Smart Grid Authentication using Merkle Trees,” Proc.
IEEE International Conference on Parallel and Distributed Systems, Hsin-Chu, Taiwan, Dec. 2014.
43. M. Munoz*, M. Moh,
and T.-S. Moh, “Improving Smart Grid Security using Merkle Trees,” Proc. IEEE
International Conference on Communications and Network Security, San Francisco,
CA, Oct. 2014.
44. J. Huang*, K. Wu*, and M. Moh, Dynamic
Virtual Machine Migration Algorithms Using Enhanced Energy Consumption Model
for Green Cloud Data Centers, accepted for presentation at the 2014 High
Performance Computing and Simulation Conference (HPCS 2014), to be held July 21
- July 25, 2014, in Bologna, Italy,
45. S. Gaur*, M. Moh, and M. Balakrishnan,
Hiding behind the Clouds: Efficient, Privacy-Preserving Queries via Cloud
Proxies, Proc. of International Workshop on Cloud Computing Systems, Networks,
and Applications, in conjunction with the IEEE Globecom
(Global Communications Conference), held in Atlanta, GA., Dec. 2013.
46. M. Moh and R. Alvare-Horine*,
A Successful Graduate Cloud Computing Class with Hands-on Labs, Proc. of IEEE
Frontiers in Education, held in Oaklohoma City, OK.,
Oct 2013.
47. Z.-Y. Xie,
T.-S. Moh, and M. Moh, ASAP: Ad-hoc Streaming Adaptive Protocol for Supporting
P2P Streaming over Vehicular Ad-hoc Networks. Proc. of 51st ACM Southeast
Conference, held in Savannah, GA., Apr 2013.
48. J. Huang*, K. Wu*, L. Leong*, S. Ma*,
and M. Moh, A Tunable Workflow Scheduling Algorithm Based on Particle Swarm
Optimization for Cloud Computing, Proc. of the International Conference on Soft
Computing and Software Engineering, held in San Francisco, CA., March 2013.
49. M.Moh, R. Alvarez-Jorine*, S. Chandawale*, and S. Mogarkar*, A
Successful Interdisciplinary Course Integrating Teaching and Research, Proc. of
IEEE International Conf. on Interdisciplinary Engineering Design Education,
held in Santa Clara, CA., March 2013.
50. R. Alvarez-Horine*
and M. Moh, “Experimental Evaluation of Linux TCP
for Adaptive Video Streaming over the Cloud,†Proc.
of the 1st IEEE Int. workshop on Management and Security technologies for Cloud
Computing, with the IEEE Globecom (Global
Communications Conference), Anaheim, CA, Dec. 2012.
51. R. Wong*, T.-S. Moh, and M. Moh, “Efficient Semi-supervised Learning BitTorrent
Traffic Detection with Deep Packet and Deep Flow Inspections,â€
in Proc. of 6th International Conference on Information Systems, Technology,
and Management, ICISTM 2012, held in Grenoble, France, March 28-30, 2012; and
Communications in Computer and Information Science 285, Springer, 2012
52. R. Wong*, T.-S. Moh, and M. Moh, “Efficient Semi-Supervised Learning BitTorrent
Traffic Detection: An Extended Summary,†in Proc. of
13th Int. Conf on Distributed Computing and
Networking – ICDCN 2012, held in Hong Kong, China, January 3-6, 2012; and
Lecture Notes in Computer Science 7129, Springer 2012.
53. L. Yang* and M. Moh, “Dual Trust Secure Protocol for Cluster-Based Wireless
Sensor Networks,†in Proc. IEEE 45th Asilomar
Conference on Signals, Systems and Computers, held in Pacific Grove, CA, Nov.
2011.
54. Moh, M. T.-S. Moh, and K. Chen*, “Error-sensitive adaptive frame aggregation in 802.11n WLAN,†Proc. of the 8th International Conference on Wired/Wireless
Internet Communications, Lecture Notes in Computer Science 6074 Springer 2010,
held in Lulea, Sweden, Jun 1 – 3, 2010.
55.
P.
Huynh*, P. Jangyodsuk*, and M. Moh, “Supporting video streaming over WiMAX networks by
enhanced FMIPv6-based handover,†Proc. of the 4th
International Conference on Information Systems, Technology and Management,
Bangkok, Thailand, March 10-12, 2010.