Expert Radar
Dr. Sheng Chen, PhD
Associate, Exponent, Inc. (Farmington Hills, MI)
Bachelor of Science, Beijing Jiaotong University
Dr. Sheng Chen has specialized experience in the fields of Engineering & Mechanics: Biomechanics, Engineering & Mechanics: Mechanical Engineering. They earned their BS in Mechanical Engineering and MS in Mechanical Engineering from Beijing Jiaotong University, PhD in Mechanical Engineering from Michigan State University. Formerly, they held roles such as Research Associate at Michigan State University. Currently, they work as an Associate at Exponent, Inc.
s*********@e*****.com
(248) ***-****
Farmington Hills, Michigan
Get a FREE Demo of Dr. Sheng Chen, PhD's Radar Profile
Review this expert's litigation history, supporting legal docs, publications, professional background, and more.
Comprehensive data on expert witnesses: Access detailed litigation history and performance metrics.
Swift assessment: Quickly evaluate an expert's track record.
Informed decisions: Make better choices when selecting or challenging expert witnesses in any case.
Expert Witness Activity
Plaintiff Cases
Defense Cases
Expert Challenges
Deposition Transcripts
Publications
Media & News
26
Social Media Mentions
Expert Institute operates independently and objectively as an expert witness data provider. Expert Institute does not employ, endorse, or have an affiliation with any expert witnesses for which data is provided.
Case Name | Role | Filed Date |
---|
Defense
Plaintiff
0
25
50
75
100
2000
0
2002
0
2004
0
2006
0
2008
0
2010
0
0
25
50
75
100
Radar found 26 records
Title | Description |
---|---|
[Hacking 101]Elk on Sesame Street - Cybersecurity Analysis in Action with ELK and BERT | [Hacking 101] Elk on Sesame Street - Cybersecurity Analysis in Action with ELK and BERT Cyber Threat Intelligence (CTI) encompasses relevant data regarding various cybersecurity incidents on the internet, used to understand threat actors' behavior patterns, attack techniques, tools, etc., to identify potential future threats and safeguard organizational assets proactively. However, the surge of massive intelligence data has led to challenges analyzing cybersecurity incidents. To address this, we will utilize Elastic Stack (ELK) to simulate real-world data collection, analysis, and visualization environments. Furthermore, participants will be guided to develop their own intelligence integration programs to connect with open-source threat intelligence platforms. Additionally, with the explosive growth of AI, machine learning, and deep learning methods, they are widely used in various information analyses. In this course, we will employ BERT to analyze this intelligence data, enabling rapid comprehension of intelligence contents and formulation of corresponding defense strategies. The course consists of 6 practical experiments, making it suitable for AI beginners and students interested in accumulating knowledge in cybersecurity topics. Starting from scratch, we will cover the entire research process, including organizing data in ELK, collecting open-source threat intelligence, building a threat intelligence platform, and training deep learning models. Participants must bring their laptops and embark on an exciting journey into AI Security. Prerequisite Basic Python chatGPT。Familiarity with chatGPT Participants are required to bring their laptops and install VMware Workstation Player or VMware Workstation Pro. It is recommended to have at least 20 GB of available disk space A Google account is necessary as AI model training will occur on Colab. If participants have a graphics card on their laptops, they can train on their machines Sheng-Shan Chen Sean S. Chen is a Ph.D. student in the Department of Computer Science and Information Engineering at the National Taipei University of Technology. He also serves as a cybersecurity researcher intern at Cycraft. His primary research focus is on using AI for threat intelligence analysis. Sean has previously achieved a silver medal in the National Skills Competition for Network Security and has received the Best Project Award for two consecutive editions of AIS3. Yuki Hung After graduating from university, Yuki worked as a Cybersecurity consultant. Currently, Yuki is pursuing a Master's degree in Information Security at National Tsing Hua University, with a primary research focus on data leaks on the internet. Yuki participated in AIS3 and received the Best Project Award. He also completed an internship involving the study of news manipulation. Motivated by his love for detective novels, Yuki entered the field of cybersecurity, aiming to leverage computer technology to improve the societal environment. |
ACM MobiSys 2024 • Accepted Posters | Jun 4, 2024 ----- Authors: Chenyan Wang (School of Information Engineering , Minzu ... Yuanyuan Wu, Sheng Chen , Xuanqi Meng, XinyuTong, Xiulong Liu, Xin ... |
65 Fellows Elected into American Academy of Microbiology | Feb 15, 2024 ----- Sheng Chen , Ph.D., The Hong Kong Polytechnic University. Ankur Dalia ... D., MSPH, University of Michigan . Scott Franzblau, Ph.D ... |
Radar scours thousands of media and news sources across the internet 24/7.
Access interviews, webinars, TV appearances, blog posts, columns, whitepapers, PDFs, profressional profiles, and more.
Institution | Degree Type |
---|---|
Beijing Jiaotong University | Bachelor of Science |
Title | Employer |
---|---|
Associate | Exponent, Inc. (Farmington Hills, MI) |
Research Associate | Michigan State University (East Lansing, MI) |
Access detailed litigation history and performance metrics.
Access your Radar profile through Expert iQ, our secure, cloud-based platform that hosts AI-driven insights.
Delivered in 5–7 business days
Receive your profile swiftly, with Radar gathering intelligence from thousands of data points.
24/7 monitoring for 12 months
Stay informed with continuous monitoring and live alerts, ensuring your profile is always up-to-date.