JOURNAL PUBLICATIONS

·         Chuanyi Ji, Yun Wei, and H. Vincent Poor, “Resilience of Energy Infrastructure and Services: Modeling, Data Analytics and Metrics.” Accepted with minor revisions, Proceedings of the IEEE. http://arxiv.org/abs/1611.06914

 

·         Chuanyi Ji, Yun Wei, Henry Mei, Jorge Calzada, Matthew Carey, Steve Church, Timothy Hayes, Brian Nugent, Gregory Stella, Matthew Wallace, Joe White, & Robert Wilcox. “Large-Scale Data Analysis of Power Grid Resilience across Multiple US Service Regions.” Nature Energy, May 2016. DOI: http://dx.doi.org/10.1038/nenergy.2016.52 (Cover-page article)

 

·         Y. Wei, C. Ji, F. Galvan, S. Couvillon, G. Orellana, J. Momoh, “Non-Stationary Random Process for Large-Scale Failure-Recovery and Resilience of Power Distribution,” Applied Mathematics, Vol.7, No.3, March. 2016.

 

·         Y. Wei, C. Ji, F. Galvan, S. Couvillon, G. Orellana, J. Momoh, “Learning Geo-Temporal Non-Stationary Failure and Recovery of Power Distribution,” Special issue on Learning in Non-stationary and Evolving Environments, IEEE Trans. on Neural Networks, Vol.25, No.1, 229-240, Jan. 2014.

 

(An article about this work at IEEE Spectrum by Tekla Perry) 

 

·         S. Erjongmanee and C. Ji, “Large-Scale Network Service Disruptions: Dependencies and External Factors,” IEEE Trans. on Network and Service Management, Vol. 8, No. 4, 375-386, Dec. 2011.

 

·         S. Jeon and C. Ji, “Randomized and Distributed Self-Configuration of Wireless Networks: Two-Layer Markov Random Fields and Near-Optimality,” IEEE Trans. Sig. Proc. Vol. 58, No.9, pp. 4859-4870, Sept. 2010.

 

·         R. Narasimha, S. Dihidar, C. Ji and S. McLaughlin, “Scalable Diagnosis in IP Networks Using Path-Based Measurement and Inference: A Learning Approach,” Special Issue  on  Network Technologies for Emerging Broadband Multimedia Services, Elsevier Journal of Visual Communication and Image Representation, Vol. 21, No. 2, 175-191, Feb. 2010.

·         Z. Chen and C. Ji, “An Information-Theoretical View of Network-Aware Attacks,”  IEEE Trans. Information Forensics and Security, Vol. 4, No. 3, pp. 530-541, Sept. 2009.

·         G. Liu and C. Ji, “Scalability of Network-Failure Resilience: Analysis Using Multi-Layer Probabilistic Graphical Models,” IEEE/ACM Trans. Networking, Vol. 17, No. 1, pp. 319-331, Feb. 2009.

·         G. Liu and C. Ji, “Resilience of All Optical Networks Under In-Band Cross-Talk Attacks: A Probabilistic Graphical Model Approach,” IEEE Journal of Selected Area of Communications (JSAC), Part Supplement, Vol.25, No. 3,  pp. 2-17, April 2007. (Also US patent US Patent # 7903790, “Optical Network Evaluation Systems and Methods,” March. 2011)

·         Z. Chen and C. Ji, “Optimal Worm Scanning Method using Vulnerable Host Distributions,”  International Journal of Network Security, Special Issue on Computer and Network Security, Vol. 2, No. 1-2, pp. 71-80, 2007.

·         Z. Chen and C. Ji, “Spatial Temporal Modeling of Malware Propagation in Networks,” Special Issue of Adaptive Learning Systems in Networking,  IEEE Trans Neural Networks, Vol. 16, No.5, pp. 1291-1303, Sept. 2005.

·         G. Liu, C. Ji and V. Chan, “On the Scalability of Network Management Information for Inter-Domain Light Path Assessment,” IEEE/ACM Trans. Networking, Vol. 13, No. 1, pp. 160-172, Feb. 2005.

·         M. Thottan and C. Ji, “Anomaly Detection in IP Networks,” Special Issue of Signal Processing in Networking, IEEE Trans. Signal Processing, vol. 51, No. 8, pp. 2191-2204, Aug. 2003

·         C. Ji and A. Elwalid, “Measurement-Based Network Monitoring and Inference: Scalability and Missing Information,” Special Issue on Recent Advances in Fundamentals of Network Management, IEEE Journal of Selected Areas of Communications (JSAC), Vol. 20, No. 4, pp. 714-725, May 2002

·         S. Ma and C. Ji, “Modeling Heterogeneous Network Traffic in Wavelet Domain,” IEEE/ACM Trans. Networking, Vol.9, No. 5, pp. 634-649, Oct. 2001

·         X. Tian and C. Ji, “Bounding the Performance of Dynamic Channel Allocation with QoS Provisioning for Distributed Admission Control in Wireless Networks,” IEEE Trans. Vehicular Technology, Vol. 50, Issue 2, pp. 388-397, March, 2001

·         M. Thottan and C. Ji, “Using Network Fault Prediction to Enable IP Traffic Management,” Journal of Network Management, Vol. 9, No. 3, pp. 327-346, 2001.

·         S. Ma and C. Ji, “Modeling Network Traffic in Wavelet Domain,” Special issue on network traffic and chaos, International Journal of Chaos Theory and Applications. Vol. 6, No. 4, 2001.

·         S. Ma and C. Ji, “Performance and Efficiency: Recent Advances in Supervised Learning,” Proceedings of The IEEE, Vol. 87, No. 9, pp. 1519-1535, Sept/Oct, 1999.

·         M. Thottan and C.Ji, “Statistical Detection of Enterprise Network Problems,” Journal of Network and Systems Management, 7(1): pp. 27-45, March, 1999.

·         M. Thottan and C. Ji, “Proactive Anomaly Detection Using Distributed Intelligent Agents,” IEEE Network, Special Issue on Network Management, Vol. 12, No. 7, pp. 21-27, Sept ./Oct. 1998.

·         S. Ma and C. Ji, “Modeling of Video Traffic Using Wavelets,” IEEE Communications Letters, Vol. 2, No. 4, pp. 100-103, April 1998.

·         C. Hood and C. Ji, “Intelligent Agents for Proactive Network Fault Detection,” IEEE Internet Computing, Vol. 2, No.2, p. 65-72, March/April, 1998.

·         S. Ma and C. Ji, “A Unified Approach on Fast Training of Feedforward and Recurrent Networks Using EM Algorithm,” IEEE Trans. Signal Processing, Vol .46, No. 8,  pp. 2270-2274, Aug., 1998.

·         S. Ma and C. Ji, “Fasting Training of Recurrent Networks Based on the EM-Algorithm,” IEEE Trans. Neural Networks, Vol. 9, No.1, pp. 11-26, Jan. 1998.

·         C. Ji and D. Psaltis, The Capacity of Two Layer Feedforward Neural Networks with Binary Weights,” IEEE Trans. Information Theory, Vol. 44, No.1, pp. 256-268, Jan. 1998.

·         C. Hood and C. Ji, “Proactive Network Fault Detection,” IEEE Trans. Reliability, Vol. 46, No.3, pp. 333-341, Sept. 1997.

·         C. Ji and D. Psaltis, “Network Synthesis Through Data-Driven Growth and Decay,’’ Neural Networks, Vol. 10, No.6the , pp. 1133-1141, Aug. 1997.

·         A. Atiya and C. Ji, “How Initial Conditions Affect Generalization Performance in Large Networks,’’ IEEE Trans. Neural Networks, Vol. 8, No.2, pp. 448-451, Mar. 1997.

·         S. Ma, C. Ji and J. Farmer, “An Efficient EM-based Training Algorithms for Feedforward Neural Networks,” Neural Networks, Vol. 10(2), pp. 243-256, Mar. 1997.

·         C. Ji and S. Ma, “Combinations of Weak Classifiers,” IEEE Trans. Neural Networks, Special Issue on Neural Networks and Pattern Recognition, Vol. 8, No.1, pp. 32-42, Jan. 1997.

·         C. Ji, S.A. Kassam and R.T. Hoctor, “Aperture Synthesis for Imaging Systems Using Rectangular Boundary Arrays,” Journal of Acoustical Society of America, Vol. 89, No.2, pp. 799-810, 1991.

·         C. Ji, R. Snapp and D. Psaltis, “Generalizing Smoothness Constraints from Discrete Samples,’’ Neural Computation, Vol. 2,  No.2, pp. 188-197, 1990.

·         C. Ji, R.R. Hoctor and S.A. Kassam, “Elliptical Boundary Arrays for Coherent and Incoherent Imaging,’’ IEE Series F: Radar, Communications and Sig. Proc., Vol. 136, No.5, pp. 210-220, Oct. 1989.

           Some Preprints

·         S. Jeon and C. Ji, “Joint Estimation of Information and Distributed Link-Scheduling in Wireless Networks: Mean-Field Approximation and Graphical Models,” preprint at arxiv.org.

 

BOOK CHAPTERS and SPRINGERS

·         C. Ji, S. Li, D. Leytchipayia, P. Barford, “Community Networks for Information Sharing,” NATO Science for Peace and Security Series - E: Human and Societal Dynamics, edited by E. Duman and A. Atiya, May 2011, pp. 247 – 255.

 

·         S. Erjongmanee, C. Ji, J. Stokely, N. Hightower, “Large-Scale Inference of Network Service Disruption upon Natural Disasters,” In Knowledge Discovery from Sensor Data, Springer Berlin, April 2010, Vol. 5840, pp. 134-153.

 

·         M Thottan, G. Liu and C. Ji, “Anomaly Detection Approaches for Communication Networks,” in Algorithms for Next Generation Networks, edited by G. Cormode and M. Thottan, Springer London, Feb. 2010, Part 2, 239-261.       

 

·         S. Jeon and C. Ji, “Nearly-Optimal Algorithm for Self-Configuration of Ad-hoc Wireless Networks,’’ Lecture Notes of Computer Science, Springer, 2005, Vol. 3516, pp. 279-283.  

·         S. Ma and C. Ji, “Combinations of Weak Classifiers for Supervised Learning: A Survey,’’ in Pattern Recognition and String Matching edited by D. Chen and X. Cheng, Kluwer Academic Publisher, July 2002, pp. 379-388.

·         C. Hood and C. Ji, “Intelligent Monitoring for Network Fault Management,” in Computational Intelligence in Telecommunications Networks edited by W. Pedrcyz and A. Vasilakos, CRC Press, September 2000, pp. 363-382. 

·         C. Ji and S.A. Kassam, “Convex Boundary Arrays for Coherent and Incoherent Imaging,” in Apodization-Coherent Optical Systems (Milestone Papers), J. P. Mills and B. Thompson, Eds., Vol. MS 119, SPIE Optical Engineering Press, 1996.

EDITORIALS 

·         A. Parlos, C. Ji, T. Parisini, A. Atiya, M. Bagliettigo and KC Claffy, Guest Editorial at Special Issue on “Intelligent Systems in Computer Networks, Telecommunication and Internet Technologies,” IEEE Trans. Neural Networks, Vol. 16, No. 5, pp. 1013-1018, Sept. 2005.

·         V. Chan, A. Elwalid, C. Ji and Y. Yemini, Guest Editorial in Special Issue on “Recent Advances in Fundamentals of Network Management,” IEEE Journal of Selected Areas of Communication, Vol. 20, No. 4, pp. 653-654, May 2002.

            OTHER

·         Z. Chen and C. Ji, “Intelligent Worms: Searching for Preys,” National Mathematics Awareness Month on Internet Security (invited), 2006

CONFERENCE PAPERS

·         C. Ji and Y. Wei, “Dynamic Resilience for Power Distribution and Customers,” In Smart Grid Communications (SmartGridComm), IEEE International Conference on SmartGrid Comm, Miami, Oct. 2015.

·         Y. Wei, C. Ji, F. Galvan, S. Couvillon, G. Orellana, “Dynamic Modeling and Resilience for Power Distribution,” In Smart Grid Communications (SmartGridComm), 2013 IEEE International Conference on, pp. 85-90. IEEE, 2013, Vancouver, Oct. 2013.

·         A. Kuh, C. Ji, and Y. Wei. "Stochastic Queuing Models For Distributed PV Energy,” In Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012 Asia-Pacific, pp. 1-6. IEEE, LA, Dec. 2012.

·         S. Erjongmanee, C. Ji, and J. Momoh, “Inferring Network-Power Cascading Disruptions and Sustainability,” Proc. of International Conf. of Neural Network, Special Session on Computational Intelligence for Smart Grid and Energy Applications, San Jose, Aug., 2011.

·         S. Erjongmanee and C. Ji, “Large-Scale Network Service Disruption Upon Natural Disaster ,” Proc. of Sensor-KDD Workshop, Las Vegas, Aug. 2008. (Extended version as Book Chapter 6)

·         Z. Chen, C. Ji, and P. Barford, “Spatial Temporal Characteristics of Internet Malicious Sources,” INFOCOM  Mini-Conference, Phoenix, AZ, April 2008, pp. 2306-2314.

·         Z. Chen and C. Ji, “Vulnerable Host Distribution and Malware Scanning,  INFOCOM, Alaska, May 2007, pp. 116-124.

·         Z. Chen, C. Chen, and C. Ji, “Understanding Localized-Scanning Worms,” Proceeding of IEEE International Conference of Performance, Computing, and Communications, New Orleans, April 2007, pp. 186-193.

·         R. Narasimha, S. Dihidar, C. Ji and S. W. McLaughlin, “Scalable Fault Detection in IP Networks using Graphical Models: A Variational Inference Approach,” Proceeding of International Conference Communication, Glasgow, June 2007, pp. 147-152.

·         R. Narasimha, S. Dihidar, C. Ji and S. W. McLaughlin, “A Scalable Probe-Based Approach for Congestion Detection Using Message Passing,” ICC, Istanbul, June 2006, pp. 640-645. 2006.

·         G. Liu and C. Ji, “Resilient Architecture of All-Optical Networks: Probabilistic Graphical  Models for Crosstalk Attack Propagation,”  IEEE International Symposium of Information Theory (ISIT), Seattle, July 2006, pp. 2914-2918.

·         R. Narasimha, S. Dihidar, C. Ji and S. McLaughlin, “A Scalable Approach to Congestion Localization using Coding Theory,” Allerton Conference, September  2005.

·         Z. Chen and C. Ji, “A Self-Learning Worm Using Importance Scanning,” Proceedings of the ACM Workshop on Rapid Malcode (WORM), Fairfox, VA, Oct. 2005, pp. 22-29.

·         S. Jeon and C. Ji, “Nearly Optimal Distributed Configuration Management Using Probabilistic Graphical Models,” Proceeding of  IEEE International on Mobile Ad hoc and Sensor Systems, Washington DC, Nov. 2005, pp. 219-226.

·         Z. Chen and C. Ji, “Importance Scanning Worm Using Vulnerable-Host Distribution,” Proceedings of IEEE International Conference GLOBECOM 2005, pp. 1779-1784. 

·         S. Jeon and C. Ji, “Role of Machine Leaning in Self-Configuration of Ad-hoc Wireless Networks,” Proceedings of ACM SIGCOMM Workshop Mining Network Data (MineNet), Philadelphia, Aug. 2005, pp. 223-224.

·         S. Jeon and C. Ji, “Nearly-Optimal Algorithm for Self-Configuration of Ad-hoc Wireless Networks,’’ The Second International Workshop on Active and Programmable Grids Architectures and Components, Atlanta, May 2005. (*Published as Book Chapter 4).  

·         S. Jeon and C. Ji, “Nearly Optimal Distributed Configuration Management Using Probabilistic Graphical Models,” Proceeding of IEEE International Conference on Mobile Ad hoc and Sensor Systems Conference, Washington DC, 2005, Vol. 8, pp. 219-226.

·         G. Liu and C. Ji, “Probabilistic Graphical Models for All-Optical Networks Under Cross-Talk Attacks,” Optical Fiber Communication Conference, March, 2005, Vol. 1, pp. 3.

·         G. Liu, C. Ji and V. Chan, “Network Management Informtion for Light Path Accessment: Trade-off between Performance and Complexity,” Proceedings of INFOCOM, San Francisco, April  2003, Vol.2, pp.1362-1372.

·         G. Liu, C. Ji and V. Chan, “On Network Management Information for Light-Path Assessment,” in Proceedings of the 40th Allerton Conference of Communication and Computing, Allerton Illinois (invited), 2003.

·         C. Ji, V. Chen and G. Liu, “Network Management Information for Light-Path Assessment,” Proceeding of International Symposium of Information Theory, Lausanne, Switzerland, July, 2002, pp. 126.

·         X. Tian, J. Wu and C. Ji, “A Unified Framework For Understanding Network Traffic Using Independent Wavelet Models,” Proceeding of INFOCOM, New York, June 2002, Vol. 1, pp. 446 – 454. 

·         D. Shen and C Ji, ““Outage Evaluation under Traffic Heterogeneity in CDMA Networks,’’ Proceedings of GLOBECOM, San Antonio, 2001, Vol. 6, pp. 3709 –3713.

·         D. Shen and C. Ji, “CDMA Network Capacity over Shadowing Channels,’’ Proceeding of 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, San Diego, Sept. 2001, Vol. 1, pp. 149 –153.

·         D. Shen and C. Ji, “Capacity-Based Admission Control for Broadband CDMA Networks,’’ Proceedings of Vehicular Technology Conference, Atlantic City, Fall, 2001, Vol. 1, 2001,  pp. 202 –206.

·         D. Shen and C. Ji, “Capacity Trade-offs for Heterogeneous Traffic over Large scale Fading Channels in CDMA Networks,’’ Proceeding of IEEE International Conference on Communications, Helsinki, 2001, Vol. 6, pp. 1718-1722.

·         C. Ji and A. Elwalid, “Measurement-Based Network Monitoring: Missing Data Formulation and Scalability Analysis,” Proceedings of International Symposium of Information Theory, Italy, June 2000, pp. 78.

·         X. Tian, S. Ma and C. Ji, “Comparison of the Independent Wavelet Models to Network Traffic,” Proceeding of GLOBECOM 2000, Vol. 3, 2000, Vol. 3, pp. 1448 –1452.

·         M. Thottan and C. Ji, “Properties of Network Faults’’, Proceeding of IEEE/IFIP Network Operations and Management Symposium (NOMS), Honolulu, 2000, pp. 941-942.

·         D. Shen and C. Ji,  Admission Control of Multimedia Traffic for Third Generation CDMA Network,” Proceeding of INFOCOM, Israel, March 2000,  Vol. 3, pp. 1077-1086.

·         M. Thottan and C. Ji, “Fault Prediction at Network Layer Using Intelligent Agents,’’ Proceeding of  IEEE/IFIP Conference on Integrated Network Management (IM),  Boston, MA, May 1999, pp. 745-759.

·         X. Tian and C. Ji, “Bounding The Performance of Dynamic Channel Allocation with QoS Provisioning for Distributed Admission Control in Wireless Networks,” Proc. IEEE INFOCOM, New York, 1999, Vol.3, pp. 1356-1363. 

·         C. Ji, S. Ma, and X. Tian, “Approximation Capability of Independent Wavelet Models to Heterogeneous Network Traffic,” Proc. IEEE INFOCOM, New York, NY, 1999, Vol. 1, pp. 170 – 177.

·         S. Ma and C. Ji, ''Wavelet Domain Modeling of VBR Video Traffic,” Proceedings of IEEE INFOCOM, San Francisco, California, Mar. 1998, Vol. 1, 201-208.

·         M. Thottan, and C. Ji, “Adaptive Thresholding for Proactive Network Problem Detection,” Proceedings of the IEEE Third International Workshop on Systems Management (IM), Rhode Island, 1998, pp. 108 – 116. 

·         X. Tian and C. Ji, “QoS Provisioning with Distributed Call Admission Control in Wireless Networks,” Proceedings of IEEE International Conference of Communications, June 1998, Vol. 2, 797-801.

·         S. Ma and C. Ji, “Wavelet Models for Video Time Series,” Proceedings of Neural Information Processing Systems: Natural and Synthetic (NIPS), Denver, Colorado, Nov. 1997, pp. 915-921.

·         C. Hood and C. Ji,  “Proactive Network Fault Detection,” Proceedings of IEEE INFOCOM, Kobe, Japan, Mar. 1997, pp. 1149-1157.

·         C. Hood and C. Ji, “Beyond Thresholds: An Alternative Method for Extracting Information from Network Measurements,” Proceedings of IEEE GLOBECOM, Phoenix, Arizona, Oct. 1997, Vol.1, 487-491.

·         C. Hood and C. Ji, “Automated Proactive Anomaly Detection,” Proceedings of 5th IFIP/IEEE International Symposium of Integrated Network Management, San Diego, California, May 1997, pp. 688-699.

·         S. Ma and C. Ji, “Modeling Video Traffic Using Wavelets,’’ Proceedings of Allerton Conference of Communication Control and Computing, Allerton, Illinois, Sept. 1997, Vol. 35, pp.138-146.

·         C. Ji and S. Ma, “Combinations of Weak Classifiers,” Proceedings of Neural Information Processing Systems: Natural and Synthetic (NIPS), Denver, Colorado, 1996, pp. 494-500.

·         C. Hood and C. Ji, “Probabilistic Network Fault Detection,” Proceedings of IEEE GLOBECOM, London, Nov. 1996, Vol.3, pp. 1872-1876.

·         C. Hood and C. Ji “An Intelligent Monitoring Hierarchy for Network Management,” Proceedings of International Workshop on Applications of Neural Networks to Telecommunications, Stockholm, Sweden, May 1995, pp. 250-257.

·         S. Ma and C. Ji, “An EM-Based Algorithm for Recurrent Neural Network,” Proceedings of IEEE International Symposium of Information Theory, Whistler, Canada, 1995, pp. 175.

·         S. Ma and C. Ji, “An Algorithm for Recurrent Networks Based on EM-Algorithm,” Proceedings of IEEE World Congress of Neural Networks, Washington DC, 1995.

·         T. Demiral, S. Ma and C. Ji, “Combined Power of Weak Classifiers,’’ Proceedings of IEEE World Congress of Neural Networks, Washington DC, 1995, pp.591-595.

·         C. Ji, “Combined Power of Weak Classifiers - A Case Analysis,” Proceedings of the 30th Allerton Conference of Communication and Computing, Allerton, Illinois, 1995, pp. 545-551.

·         C. Hood and C. Ji,  “Intelligent Network Monitoring,” Proceedings of IEEE Workshop of Neural Network in Signal Processing, Boston, Sept. 1995, pp. 521-530.

·         C. Ji, “Generalization Error and The Expected Network Complexity,” Proceedings of Neural Information Processing Systems: Natural and Synthetic (NIPS), Denver, Colorado, 1993, pp. 367-374.

·         C. Ji and D. Psaltis, “Capacity of Two-Layer Networks with Binary Weights,” Proceedings of IEEE International Symposium on Information Theory, San Antonio, Texas, 1993,  pp. 434.

·         C. Ji, “Is The Distribution-Free Sample Bound for Generalization Tight?” Proceeding of IEEE International Joint Conference on Neural Network, Washington DC, 1992, Vol. 3, pp. 954-959.

·         C. Ji and D. Psaltis, “The Information Capacity and the Universal Sample Bound for Generalization,” Proceedings of Neural Information Processing Systems: Natural and Synthetic (NIPS), Denver, Colorado, 1991, 928-935.

·         C. Ji and D. Psaltis, “The VC-Dimension vs. the Statistical Capacity for Two Layer Network with Binary Weights,” Proceedings of the Fourth Workshop on Computational Learning Theory, Santa Cruz, California, 1991, pp. 250-256.

·         C. Ji and D. Psaltis, “Capacity of a Two-Layer Network with Binary Weights,” Proceedings of IEEE International Joint Conference on Neural Network, Seattle, Washington, 1991, pp. 127-132.

·         A. Sideris, A. Yamamura, C. Ji and D. Psaltis, “Neural Network Control of a Two-Link Manipulator,’’ Proceedings of the 29th IEEE Conference on Decision and Control, Honolulu, 1990, Vol. 6, pp. 3265.

·         C. Ji and S. A. Kassam, “Convex Boundary Arrays for Coherent and Incoherent Imaging,” Proceeding of IEEE International Conference Acoustic Speech Signal Processing, 1988, Vol.2, pp. 1220-1223.

·         C. Ji and S.A. Kassam, “Low-Sidelobe Pattern Synthesis for Imaging Systems Using Two-Dimensional Boundary Arrays,” Digest IEEE International Symposium Antenna and Propagation, Philadelphia, 1986, Vol. 24, pp. 327-330.