Fu-Ching Tsai

According to our database1, Fu-Ching Tsai authored at least 24 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Systematic Literature Review of Law Enforcement Image Recognition Methods based on Generative Adversarial Networks Framework.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

A Systematic Review of Detecting Illicit Bitcoin Transactions.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

A Systematic Review of Internet Public Opinion Manipulation.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
The Application of Blockchain of Custody in Criminal Investigation Process.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

2020
An AutoTriage B-CoC model in digital forensic investigation.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Exponential Random Graph Modeling of Co-Offender Drug Crimes.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

A Triage Triangle Strategy for Law Enforcement to Reduce Digital Forensic Backlogs.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Forensic Artifacts of Network Traffic on WeChat Calls.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Tool Mark Identification of Skype Traffic.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Hacking Tool Identification in Penetration Testing.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
Exploring drug-related crimes with social network analysis.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Drone Forensic Investigation: DJI Spark Drone as A Case Study.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

The Governance of Digital Forensic Investigation in Law Enforcement Agencies.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
WhatsApp network forensics: Discovering the communication payloads behind cybercriminals.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

Forensic analysis of network packets from penetration test toolkits.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2013
A fuzzy conceptualization model for text mining with application in opinion polarity classification.
Knowl. Based Syst., 2013

2011
Noise control in document classification based on fuzzy formal concept analysis.
Proceedings of the FUZZ-IEEE 2011, 2011

2010
An intelligent decision-support model using FSOM and rule extraction for crime prevention.
Expert Syst. Appl., 2010

Constructing tree-based knowledge structures from text corpus.
Appl. Intell., 2010

2009
Concept-Guided Query Expansion for Knowledge Management with Semi-Automatic Knowledge Capturing.
J. Comput. Inf. Syst., 2009

Heuristic-Based Approach for Constructing Hierarchical Knowledge Structures.
Proceedings of the Next-Generation Applied Intelligence, 2009

2006
A Knowledge Discovery Approach to Supporting Crime Prevention.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006


  Loading...