Hsing-Chung Chen

Orcid: 0000-0002-5266-9975

Affiliations:
  • Asia University, Taichung, Wufeng, Taiwan


According to our database1, Hsing-Chung Chen authored at least 154 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Sentiment Analysis of Short Texts Using SVMs and VSMs-Based Multiclass Semantic Classification.
Appl. Artif. Intell., December, 2024

Outage behavior of the downlink reconfigurable intelligent surfaces-aided cooperative non-orthogonal multiple access network over Nakagami-m fading channels.
Wirel. Networks, August, 2024

An optimization NPUSCH uplink scheduling approach for NB-IoT application via the feasible combinations of link adaptation, Resource assignment and energy efficiency.
Comput. Commun., 2024

Corrections to "A Review on the Application of Internet of Medical Things in Wearable Personal Health Monitoring: A Cloud-Edge Artificial Intelligence Approach".
IEEE Access, 2024

A Review on the Application of Internet of Medical Things in Wearable Personal Health Monitoring: A Cloud-Edge Artificial Intelligence Approach.
IEEE Access, 2024

Intelligent Information Transmission Model with Distributed Task Queue Functionality Based on the MQTT Transmission Protocol.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024

Using Scrum to Build Tourism Information Mobile Application.
Proceedings of the Advanced Information Networking and Applications, 2024

Research on Screw Detection Using Artificial Intelligence Technology.
Proceedings of the Advanced Information Networking and Applications, 2024

The Home-Delivery Analysis of Prescription Drugs for Chronic Diseases in the Post-Pandemic Era-An Example of Local Community Pharmacy.
Proceedings of the Advanced Information Networking and Applications, 2024

A Survey and Planning Advice of Blockchain-Based Used Car Bidding Platform.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
A Blockchain and IPFS-Based Anticounterfeit Traceable Functionality of Car Insurance Claims System.
Sensors, December, 2023

Attacks and Threats Verification Based on 4G/5G Security Architecture.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

An AOI-Based Surface Painting Equipment.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

The Implement of a Reconfigurable Intelligence Trust Chain Platform with Anti-counterfeit Traceable Version Function for the Customized System-Module-IC.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

A Music Therapy Model Based on Consortium Blockchain Platform with Evidence and Tracking Efficacy of Hypertension Treatment.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

2022
Reconfigurable Intelligent Surface-Aided Cooperative NOMA with p-CSI Fading Channel toward 6G-Based IoT System.
Sensors, 2022

An Implementation of Trust Chain Framework with Hierarchical Content Identifier Mechanism by Using Blockchain Technology.
Sensors, 2022

Deep active reinforcement learning for privacy preserve data mining in 5G environments.
J. Intell. Fuzzy Syst., 2022

Pulse-line intersection method with unboxed artificial intelligence for hesitant pulse wave classification.
Inf. Process. Manag., 2022

Intelligent deep fusion network for urban traffic flow anomaly identification.
Comput. Commun., 2022

Generating Multi-Issued Session Key by Using Semi Quantum Key Distribution With Time-Constraint.
IEEE Access, 2022

An AOI-Based Surface Defect Detection Approach Applied to Woven Fabric Production Process.
Proceedings of the Advances in Network-Based Information Systems, 2022

Application of Artificial Intelligence Technology in the Design of Hand Training and Intelligence Training for Patients with Dementia.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

Mask-Wearing Behavior Analysis by Using Expert Knowledge Acquisition Approach Under Covid-19 Situation.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

2021
Federated Compressed Learning Edge Computing Framework with Ensuring Data Privacy for PM2.5 Prediction in Smart City Sensing Applications.
Sensors, 2021

Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019).
Sensors, 2021

Estimation of Various Walking Intensities Based on Wearable Plantar Pressure Sensors Using Artificial Neural Networks.
Sensors, 2021

A Novel Prediction Approach for Exploring PM2.5 Spatiotemporal Propagation Based on Convolutional Recursive Neural Networks.
CoRR, 2021

An online cognitive authentication and trust evaluation application programming interface for cognitive security gateway based on distributed massive Internet of Things network.
Concurr. Comput. Pract. Exp., 2021

Enabling NOMA in Backscatter Reconfigurable Intelligent Surfaces-Aided Systems.
IEEE Access, 2021

Secure Cloud Storage Using Color Code in DNA Computing.
Proceedings of the Advances in Networked-Based Information Systems, 2021

Antilock Braking System (ABS) Based Control Type Regulator Implemented by Neural Network in Various Road Conditions.
Proceedings of the Advances in Networked-Based Information Systems, 2021

Automatic Control System for Venetian Blind in Home Based on Fuzzy Sugeno Method.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Learning Performance Prediction with Imbalanced Virtual Learning Environment Students' Interactions Data.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Heart Rate Monitoring System Using Feature Extraction in Electrocardiogram Signal by Convolutional Neural Network.
Proceedings of the Twelfth International Conference on Ubiquitous and Future Networks, 2021

Detection and Prevention of Cross-site Scripting Attack with Combined Approaches.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

Using Deep Learning Methods to Predict Walking Intensity from Plantar Pressure Images.
Proceedings of the Advances in Physical, Social & Occupational Ergonomics, 2021

2020
Updating high average-utility itemsets with pre-large concept.
J. Intell. Fuzzy Syst., 2020

A secure electronic medical record authorization system for smart device application in cloud computing environments.
Hum. centric Comput. Inf. Sci., 2020

A spatiotemporal data compression approach with low transmission cost and high data fidelity for an air quality monitoring system.
Future Gener. Comput. Syst., 2020

IEEE 802.11ba Wake-Up Radio: Performance Evaluation and Practical Designs.
IEEE Access, 2020

A Performance Evaluating Simulation for PSO Algorithm by Applying Traceroute Feature.
Proceedings of the Advances in Networked-Based Information Systems, 2020

A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN Logic.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Blockchain Technology Benefit in Tackling Online Shopping Transaction Revocation Issue.
Proceedings of the ICFET 2020, 2020

2019
Guest Editorial: Soft Computing Applications for Novel and Upcoming Distributed and Parallel Systems From Cloud Computing and Beyond.
IEEE Trans. Ind. Informatics, 2019

Enhanced channel estimation in OFDM systems with neural network technologies.
Soft Comput., 2019

Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application.
Mob. Networks Appl., 2019

A Bi-LSTM mention hypergraph model with encoding schema for mention extraction.
Eng. Appl. Artif. Intell., 2019

IEEE Access Special Section Editorial: Recent Advances on Radio Access and Security Methods in 5G Networks.
IEEE Access, 2019

A Smart Contract to Facilitate Goods Purchasing Based on Online Haggle.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

The Hot Security Topics Analysis for the Announcements in ICANN Website by Using Web Crawler and Association Rule Technology.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Long-Term Care (LTC) Monitoring System for Caregivers Based on Wireless Sensing Technology.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
Design of a secure and effective medical cyber-physical system for ubiquitous telemonitoring pregnancy.
Concurr. Comput. Pract. Exp., 2018

Intelligent approaches for security technologies.
Concurr. Comput. Pract. Exp., 2018

A Trust Evaluation Gateway for Distributed Blockchain IoT Network.
Proceedings of the Wireless Internet - 11th EAI International Conference, 2018

DoS Attack Pattern Mining Based on Association Rule Approach for Web Server.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

A Cooperative Evaluation Approach Based on Blockchain Technology for IoT Application.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Performance of Transmission Latency in Software Defined Vehicle Networks.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Feature Recognition Method for Hand-Written Signature Image.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Secure OTT Service Scheme Based on Blockchain Technology.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Performance of a novel evolutionary genetic-based multi-user detector for multi-carrier CDMA communication systems.
Soft Comput., 2017

TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks.
IEEE Syst. J., 2017

Topological dynamics of comparison-based fault identification in ad hoc networks.
Pervasive Mob. Comput., 2017

Driver behaviour detection and vehicle rating using multi-UAV coordinated vehicular networks.
J. Comput. Syst. Sci., 2017

A negotiation-based cooperative RBAC scheme.
Int. J. Web Grid Serv., 2017

CBR-based negotiation RBAC model for enhancing ubiquitous resources management.
Int. J. Inf. Manag., 2017

A fusion approach based on infrared finger vein transmitting model by using multi-light-intensity imaging.
Hum. centric Comput. Inf. Sci., 2017

Enhanced TKTOFT protocol for ternary based distributed group key management in cognitive radio networks.
Comput. Syst. Sci. Eng., 2017

Performance of Sub-optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

A Frame-Based Approach to Generating Insider Threat Test Suite on Cloud File-Sharing.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

Fuzzy-Based Protocol for Secure Remote Diagnosis of IoT Devices in 5G Networks.
Proceedings of the IoT as a Service - Third International Conference, 2017

A Cooperative RBAC-Based IoTs Server with Trust Evaluation Mechanism.
Proceedings of the IoT as a Service - Third International Conference, 2017

IP-based seamless handover scheme using ANDSF in an untrusted environment.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Performance of Power Allocation of Relay Stations for Cognitive Radio Based Cooperative Communication Systems.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

A 3D encryption with shifting mapping substitution mechanism.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Implement of agent with role-based hierarchy access control for secure grouping IoTs.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Study of the Patterns of Automatic Car Washing in the Era of Internet of Things.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Channel estimation in OFDM systems using neural network technology combined with a genetic algorithm.
Soft Comput., 2016

A trusted user-to-role and role-to-key access control scheme.
Soft Comput., 2016

A Distinguishing Arterial Pulse Waves Approach by Using Image Processing and Feature Extraction Technique.
J. Medical Syst., 2016

PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks.
J. Internet Serv. Inf. Secur., 2016

Localization scheme based on multistatic radar systems.
J. Ambient Intell. Humaniz. Comput., 2016

A secure group-based mobile chat protocol.
J. Ambient Intell. Humaniz. Comput., 2016

A localized fault detection algorithm for mobility management in the strongly <i>t</i>-diagnosable wireless ad hoc network under the comparison model.
EURASIP J. Wirel. Commun. Netw., 2016

The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs.
Comput. Stand. Interfaces, 2016

A security gateway application for End-to-End M2M communications.
Comput. Stand. Interfaces, 2016

A Generalized Data Inconsistency Detection Model for Wireless Sensor Networks.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

Performance on Clustering Routing for Naturally Deployed Wireless Sensor Networks.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

A Secure Color-Code Key Exchange Protocol for Mobile Chat Application.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

Random Cladding with Feedback Mechanism for encrypting mobile messages.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Security Awareness Investigation for Mobile User Examined by Using Association Rule Mining Method.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Intelligent Management Model Based on CBR-SDA Approach - An Example of Smart Life Recommendation System for Choosing Clothes and Accessories.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Smart Card-Based Three-Party Quantum Key Distribution Protocol.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Toward the fault identification method for diagnosing strongly t-diagnosable systems under the PMC model.
Int. J. Commun. Networks Distributed Syst., 2015

Design Monitoring Systems for Multi-channel Technology in Wireless Sensor Networks.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless Networks.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

A Patient-Driven Mobile Medical Information System Applying to Physician Clinical Care.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A Mobile Nursing App Applying to the Wound Care and Drug Administration of Patients.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Context-Aware Applications in Mobile Sink of Wireless Sensor Networks.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Double K-Folds in SVM.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A Secure Multicast Key Agreement Scheme.
Proceedings of the Information and Communication Technology, 2015

A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC Scheme.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Neural Network-Based Estimation for OFDM Channels.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
A multi-issued tag key agreement with time constraint for homeland defense sub-department in NFC environment.
J. Netw. Comput. Appl., 2014

A Cooperative Trust Bit-Map Routing Protocol Using the GA Algorithm for Reducing the Damages from the InTs in WANETs.
J. Internet Serv. Inf. Secur., 2014

The performance analysis of direct/cooperative transmission to support QoS in WLANs.
Comput. Sci. Inf. Syst., 2014

An approach for selecting candidates in soft-handover procedure using multi-generating procedure and second grey relational analysis.
Comput. Sci. Inf. Syst., 2014

A secure e-mail protocol using ID-based FNS multicast mechanism.
Comput. Sci. Inf. Syst., 2014

QoS Based Performance Evaluation for the Cooperative Communication Systems in Decode-and-Forward Mode.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Role-Based RSA Key Management Approach in a Hierarchy Scheme.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

The Performance Analysis of Direct/Cooperative Transmission with TXOP Scheme in WLANs.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Localization Scheme of Multistatic Radars System Based on the Information of Measured Signal.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

A Secure End-to-End Mobile Chat Scheme.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

A Rotation Session Key-Based Transposition Cryptosystem Scheme Applied to Mobile Text Chatting.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Contract RBAC in cloud computing.
J. Supercomput., 2013

Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy.
Secur. Commun. Networks, 2013

A cognitive RBAC model with handover functions in small heterogeneous networks.
Math. Comput. Model., 2013

Cognitive RBAC in mobile heterogeneous networks.
Comput. Sci. Inf. Syst., 2013

Multi-generating Procedure and Second Grey Relational Analysis.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Secure Multicast Key Protocol for E-Mail System Using Factorial Number Structure.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

An Approach for Detecting Flooding Attack Based on Integrated Entropy Measurement in E-Mail Server.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

A Cooperative Bit-Map Routing Protocol in Ad Hoc Networks.
Proceedings of the Seventh International Conference on Complex, 2013

The Accuracy Enhancement of GPS Track in Google Map.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Trust-Based Cooperation Bit-Map Routing Protocol for Ad Hoc Networks.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2012
A mobile location-based with time-constraint RBAC associated database management model.
Comput. Syst. Sci. Eng., 2012

An adaptive capacity enhancement strategy for sector-based cellular systems.
Comput. Math. Appl., 2012

A New Approach for Detecting SMTPFA Based on Entropy Measurement.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Identifying Restricted-Faults in Multiprocessor Meshes under the PMC Diagnostic Model.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Cognitive RBAC in Small Heterogeneous Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Secure E-Voting System Based on RSA Time-Lock Puzzle Mechanism.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

A Grey Prediction Based Hard Handover Hysteresis Algorithm for 3GPP LTE System.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc Networks.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Flexible architecture of relay-based wireless network for network lifetime extension with hop-count constraint.
Int. J. Parallel Emergent Distributed Syst., 2011

Performance of Energy Efficient Relay and Minimum Distance Clustering for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Role-Oriented Routing Algorithm Applied for Wireless Heterogeneous Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Generalized Associated Temporal and Spatial Role-Based Access Control Model for Wireless Heterogeneous Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Performance of Adaptive Parallel Interference Cancellation for OFDM Mobile Communication Systems.
Proceedings of the 2011 International Conference on Broadband, 2011

A Time Constraint Three-Party Encrypted Key Exchange Protocol.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
A Secure Destination-Sequenced Distance-Vector Routing Protocol for Ad Hoc Networks.
J. Networks, 2010

Performance of Adaptive Hysteresis Vertical Handoff Scheme for Heterogeneous Mobile Communication Networks.
J. Networks, 2010

A Generalized Temporal and Spatial Role-Based Access Control Model.
J. Networks, 2010

Guest Editorial.
J. Networks, 2010

On the faulty sensor identification algorithm of wireless sensor networks under the PMC diagnosis model.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Performance of an MMSE based indoor localization with wireless sensor networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

An enhanced Three-party Encrypted Key Exchange protocol using digital time-stamp.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Dynamic Forensics System with Intrusion Tolerance Based on Hierarchical Coloured Petri-nets.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
A Secure DSDV Routing Protocol for Ad Hoc Mobile Networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Performance of Adaptive Vertical Handoff in Heterogeneous Networks of WLAN and WCDMA Systems.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Temporal and Location-Based RBAC Model.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

2008
Flexible Key Assignment for a Time-Token Constraint in a Hierarchy.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

2007
Packet construction for secure conference call request in ad hoc network systems.
Inf. Sci., 2007


  Loading...