J. Morris Chang

Orcid: 0000-0002-0660-7191

Affiliations:
  • University of South Florida, Department of Electrical Engineering, Tampa, FL, USA


According to our database1, J. Morris Chang authored at least 171 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Federated Learning for Distribution Skewed Data Using Sample Weights.
IEEE Trans. Artif. Intell., June, 2024

Synthetic Information Toward Maximum Posterior Ratio for Deep Learning on Imbalanced Data.
IEEE Trans. Artif. Intell., June, 2024

Exploring Threats, Defenses, and Privacy-Preserving Techniques in Federated Learning: A Survey.
Computer, April, 2024

IMUNet: Efficient Regression Architecture for Inertial IMU Navigation and Positioning.
IEEE Trans. Instrum. Meas., 2024

Synthetic Information towards Maximum Posterior Ratio for deep learning on Imbalanced Data.
CoRR, 2024

2023
MC-GEN: Multi-level clustering for private synthetic data generation.
Knowl. Based Syst., March, 2023

Protecting Sensitive Attributes by Adversarial Training Through Class-Overlapping Techniques.
IEEE Trans. Inf. Forensics Secur., 2023

IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond.
IT Prof., 2023

Epi-Curriculum: Episodic Curriculum Learning for Low-Resource Domain Adaptation in Neural Machine Translation.
CoRR, 2023

Towards Implementing Energy-aware Data-driven Intelligence for Smart Health Applications on Mobile Platforms.
CoRR, 2023

2022
Generating Black-Box Adversarial Examples in Sparse Domain.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

CSNAS: Contrastive Self-Supervised Learning Neural Architecture Search Via Sequential Model-Based Optimization.
IEEE Trans. Artif. Intell., 2022

CS-AF: A cost-sensitive multi-classifier active fusion framework for skin lesion classification.
Neurocomputing, 2022

Discriminative adversarial domain generalization with meta-learning based cross-domain validation.
Neurocomputing, 2022

IMUNet: Efficient Regression Architecture for IMU Navigation and Positioning.
CoRR, 2022

SuperCon: Supervised Contrastive Learning for Imbalanced Skin Lesion Classification.
CoRR, 2022

Locally Differentially Private Distributed Deep Learning via Knowledge Distillation.
CoRR, 2022

2021
DynaMo: Dynamic Community Detection by Incrementally Maximizing Modularity.
IEEE Trans. Knowl. Data Eng., 2021

Security and Privacy Implications on Database Systems in Big Data Era: A Survey.
IEEE Trans. Knowl. Data Eng., 2021

Privacy-Preserving Boosting in the Local Setting.
IEEE Trans. Inf. Forensics Secur., 2021

A new preprocessing approach to improve the performance of CNN-based skin lesion classification.
Medical Biol. Eng. Comput., 2021

Complementary Ensemble Learning.
CoRR, 2021

COVID-19 Pneumonia Severity Prediction using Hybrid Convolution-Attention Neural Architectures.
CoRR, 2021

SEC-NoSQL: Towards Implementing High Performance Security-as-a-Service for NoSQL Databases.
CoRR, 2021

ESAI: Efficient Split Artificial Intelligence via Early Exiting Using Neural Architecture Search.
CoRR, 2021

Contrastive Self-supervised Neural Architecture Search.
CoRR, 2021

Generating Black-Box Adversarial Examples in Sparse Domain.
CoRR, 2021

2020
AutoGAN-based dimension reduction for privacy preservation.
Neurocomputing, 2020

Utility-aware Privacy-preserving Data Releasing.
CoRR, 2020

SAIA: Split Artificial Intelligence Architecture for Mobile Healthcare System.
CoRR, 2020

Privacy-Preserving Image Classification in the Local Setting.
CoRR, 2020

Naive Bayes Classification under Local Differential Privacy.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

Prediction-Based Joint Energy Optimization for Virtualized Data Centers.
Proceedings of the 2020 ACM Southeast Conference, 2020

2019
Performance-Aware Energy Saving for Data Center Networks.
IEEE Trans. Netw. Serv. Manag., 2019

Enhanced PeerHunter: Detecting Peer-to-Peer Botnets Through Network-Flow Level Community Behavior Analysis.
IEEE Trans. Inf. Forensics Secur., 2019

Privacy-Preserving Machine Learning: Threats and Solutions.
IEEE Secur. Priv., 2019

Locally Differentially Private Naive Bayes Classification.
CoRR, 2019

Network-aware energy saving multi-objective optimization in virtualized data centers.
Clust. Comput., 2019

Profitable and Energy-Efficient Resource Optimization for Heterogeneous Cloud-Based Radio Access Networks.
IEEE Access, 2019

2018
QoS-Aware Energy-Efficient Association and Resource Scheduling for HetNets.
IEEE Trans. Veh. Technol., 2018

Fair Demand Response With Electric Vehicles for the Cloud Based Energy Management Service.
IEEE Trans. Smart Grid, 2018

Cyberthreats and Security.
IT Prof., 2018

Differentially Private Principal Component Analysis Over Horizontally Partitioned Data.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Fault-Tolerant Small Cells Locations Planning in 4G/5G Heterogeneous Wireless Networks.
IEEE Trans. Veh. Technol., 2017

Spectrum-Energy Efficiency Optimization for Downlink LTE-A for Heterogeneous Networks.
IEEE Trans. Mob. Comput., 2017

Enhanced Power Saving Mechanism for Large-Scale 802.11ah Wireless Sensor Networks.
IEEE Trans. Green Commun. Netw., 2017

Collaborative PCA/DCA Learning Methods for Compressive Privacy.
ACM Trans. Embed. Comput. Syst., 2017

Cost-Effective Kernel Ridge Regression Implementation for Keystroke-Based Active Authentication System.
IEEE Trans. Cybern., 2017

An Energy-Efficient Java Virtual Machine.
IEEE Trans. Cloud Comput., 2017

Differential mutual information forward search for multi-kernel discriminant-component selection with an application to privacy-preserving classification.
Proceedings of the 27th IEEE International Workshop on Machine Learning for Signal Processing, 2017

A compressive multi-kernel method for privacy-preserving machine learning.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

FRiPAL: Face recognition in privacy abstraction layer.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

PeerHunter: Detecting peer-to-peer botnets through community behavior analysis.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Design and analysis of high performance crypt-NoSQL.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Privacy-preserving PCA on horizontally-partitioned data.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2016

Cybersecurity or Privacy [Guest editors' introduction].
IT Prof., 2016

Discriminant-component eigenfaces for privacy-preserving face recognition.
Proceedings of the 26th IEEE International Workshop on Machine Learning for Signal Processing, 2016

Joint optimization for cell configuration and offloading in heterogeneous networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Message from the MOWU Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
EMaaS: Cloud-Based Energy Management Service for Distributed Renewable Energy Integration.
IEEE Trans. Smart Grid, 2015

Joint Spectral Efficiency and Power Allocation Optimization in IEEE 802.16m.
IEEE Trans. Mob. Comput., 2015

IT Security [Guest editors' introduction].
IT Prof., 2015

APN model construction for malicious email detection.
Expert Syst. Appl., 2015

Message from MOWU Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Design and Analysis of a Method for Synoptic Level Network Intrusion Detection.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Cool Cloud: A Practical Dynamic Virtual Machine Placement Framework for Energy Aware Data Centers.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Optimizing Spectrum-Energy Efficiency in Downlink Cellular Networks.
IEEE Trans. Mob. Comput., 2014

QoS Provisioning for Wireless LANs With Multi-Beam Access Point.
IEEE Trans. Mob. Comput., 2014

A Cool Scheduler for Multi-Core Systems Exploiting Program Phases.
IEEE Trans. Computers, 2014

Mobile Commerce.
IT Prof., 2014

Securing BYOD.
IT Prof., 2014

A layered approach to cognitive radio network security: A survey.
Comput. Networks, 2014

Downlink spectrum allocation in 5G HetNets.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Cost-effective kernel ridge regression implementation for keystroke-based active authentication system.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Group-Based Medium Access Control for IEEE 802.11n Wireless LANs.
IEEE Trans. Mob. Comput., 2013

Special issue on embedded systems for interactive multimedia services (ES-IMS).
ACM Trans. Embed. Comput. Syst., 2013

QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing Systems.
IEEE Trans. Cloud Comput., 2013

Embedded multicore systems: Architecture, performance and application.
Microprocess. Microsystems, 2013

Capturing Cognitive Fingerprints from Keystroke Dynamics.
IT Prof., 2013

New Trends in Cybersecurity.
IT Prof., 2013

Efficiency-driven selection of bandwidth request mechanism in broadband wireless access networks.
Comput. Networks, 2013

2012
Enhanced Fast Base Station Switching.
IEEE Trans. Mob. Comput., 2012

The New Mobile Computing Landscape.
IT Prof., 2012

An Unbound Network Coding for Extended IEEE 802.16j Multihop Relay Network.
Int. J. Distributed Sens. Networks, 2012

Cyclic reference counting by typed reference fields.
Comput. Lang. Syst. Struct., 2012

2011
A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention.
IEEE Trans. Mob. Comput., 2011

Multithreading in Java: Performance and Scalability on Multicore Systems.
IEEE Trans. Computers, 2011

Real-Time Location Systems and RFID.
IT Prof., 2011

Analyzing Software Updates: Should You Build a Dynamic Updating Infrastructure?
Proceedings of the Fundamental Approaches to Software Engineering, 2011

2010
A Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks.
IEEE Trans. Veh. Technol., 2010

Bandwidth Recycling in IEEE 802.16 Networks.
IEEE Trans. Mob. Comput., 2010

Upper Bounds for Dynamic Memory Allocation.
IEEE Trans. Computers, 2010

A Novel Mobility Management Scheme for Integration of Vehicular Ad Hoc Networks and Fixed IP Networks.
Mob. Networks Appl., 2010

Hot Topics in Cloud Computing.
IT Prof., 2010

WiMAX or LTE: Who will Lead the Broadband Mobile Internet?
IT Prof., 2010

Planning of Relay Station Locations in IEEE 802.16 (WiMAX) Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Analysis and Enhancement of Bandwidth Request Strategies in IEEE 802.16 Networks.
Proceedings of IEEE International Conference on Communications, 2010

Secure online banking on untrusted computers.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Block-based reversible data embedding.
Signal Process., 2009

Guest Editors' Introduction: Data Center Design.
IT Prof., 2009

Enhanced high-performance distributed coordination function for IEEE 802.11 multi-rate LANs.
Int. J. Commun. Syst., 2009

Delay constrained uplink scheduling policy for rtPS/ertPS service in IEEE 802.16e BWA systems.
Int. J. Commun. Syst., 2009

An Effective Method for Combating Malicious Scripts Clickbots.
Proceedings of the Computer Security, 2009

Grouping-Based Dynamic Power Management for Multi-threaded Programs in Chip-Multiprocessors.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Responding to Security Issues in WiMAX Networks.
IT Prof., 2008

Wireless Broadband Technologies: Access, Security, and Applications.
IT Prof., 2008

Turning Hidden Nodes into Helper Nodes in IEEE 802.11 Wireless LAN Networks.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

High Performance Distributed Coordination Function for Wireless LANs.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
FPGA-based reconfigurable computing III.
Microprocess. Microsystems, 2007

FPGA-based reconfigurable computing II.
Microprocess. Microsystems, 2007

Coping with API Evolution for Running, Mission-Critical Applications Using Virtual Execution Environment.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

Foundry Future: Challenges in the 21st Century.
Proceedings of the 2007 IEEE International Solid-State Circuits Conference, 2007

2006
FPGA-based reconfigurable computing.
Microprocess. Microsystems, 2006

A tunable hybrid memory allocator.
J. Syst. Softw., 2006

WiMax: The Emergence of Wireless Broadband.
IT Prof., 2006

Group-Based Medium Access for Next-GenerationWireless LANs.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Roadside-Aided Routing (RAR) in Vehicular Networks.
Proceedings of IEEE International Conference on Communications, 2006

2005
A study of best-fit memory allocators.
Comput. Lang. Syst. Struct., 2005

On designing a low-power garbage collector for java embedded devices: a case study.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

System level perspective on object locality.
Proceedings of the Companion to the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

CONTI: Constant-Time Contention Resolution for WLAN Access.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Towards Pairing Java Applications on SMT Processors.
Proceedings of the 13th International Symposium on Modeling, 2005

An energy efficient garbage collector for java embedded devices.
Proceedings of the 2005 ACM SIGPLAN/SIGBED Conference on Languages, 2005

Performance Characterization of Java Applications on SMT Processors.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2005

Transition time bounded low-power clock tree construction.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Using Scratchpad to Exploit Object Locality in Java.
Proceedings of the 23rd International Conference on Computer Design (ICCD 2005), 2005

2004
The design and analysis of a quantitative simulator for dynamic memory management
J. Syst. Softw., 2004

Software in the New Millennium: A Virtual Roundtable.
IT Prof., 2004

A garbage collection policy based on empirical behavior.
Inf. Sci., 2004

Quality of service support in IEEE 802.11 wireless ad hoc networks.
Ad Hoc Networks, 2004

A simple distributed access control scheme for supporting QoS in IEEE 802.11 wireless LANs.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Dynamic pretenuring schemes for generational garbage collection.
Proceedings of the 2004 IEEE International Symposium on Performance Analysis of Systems and Software, 2004

Object allocation and memory contention study of Java multithreaded applications.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

EPCF: a lightweight multi-priority PCF for QoS support in IEEE 802.11 wireless LANs.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

2003
Active Memory Processor: A Hardware Garbage Collector for Real-Time Java Embedded Devices.
IEEE Trans. Mob. Comput., 2003

An integrated dynamic memory tracing tool for C++.
Inf. Sci., 2003

An enhanced IEEE 802.11 retransmission scheme.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Reconfigurable Fast Memory Management System Design for Application Specific Processors.
Proceedings of the 2003 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2003), 2003

A hybrid allocator.
Proceedings of the 2003 IEEE International Symposium on Performance Analysis of Systems and Software, 2003

2002
Object resizing and reclamation through the use of hardware bit-maps.
Microprocess. Microsystems, 2002

A performance perspective on the Active Memory System.
Microprocess. Microsystems, 2002

Estimating internal memory fragmentation for Java programs.
J. Syst. Softw., 2002

DMMX: Dynamic memory management extensions.
J. Syst. Softw., 2002

A study of dynamic memory management in C++ programs.
Comput. Lang. Syst. Struct., 2002

The Object Behavior of Java Object-Oriented Database Management Systems.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

A Multithreaded Concurrent Garbage Collector Parallelizing the New Instruction in Java.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Performance Enhancements to the Active Memory System.
Proceedings of the 20th International Conference on Computer Design (ICCD 2002), 2002

2001
A study of page replacement performance in garbage collection heap.
J. Syst. Softw., 2001

A study of the allocation behavior of C++ programs.
J. Syst. Softw., 2001

Estimating internal memory fragmentation for java programs under the binary buddy policy.
Proceedings of the 2001 IEEE International Symposium on Performance Analysis of Systems and Software, 2001

Cycle accurate thread timer for linux environment.
Proceedings of the 2001 IEEE International Symposium on Performance Analysis of Systems and Software, 2001

A Performance Analysis of the Active Memory System.
Proceedings of the 19th International Conference on Computer Design (ICCD 2001), 2001

2000
An efficient data structure for dynamic memory management.
J. Syst. Softw., 2000

A hardware implementation of realloc function.
Integr., 2000

Do generational schemes improve the garbage collection efficiency?
Proceedings of the 2000 IEEE International Symposium on Performance Analysis of Systems and Software, 2000

A quantitative simulator for dynamic memory managers.
Proceedings of the 2000 IEEE International Symposium on Performance Analysis of Systems and Software, 2000

Java Bytecode Optimization with Advanced Instruction Folding Mechanism.
Proceedings of the High Performance Computing, Third International Symposium, 2000

An Advanced Instruction Folding Mechanism for a Stackless Java Processor.
Proceedings of the IEEE International Conference On Computer Design: VLSI In Computers & Processors, 2000

Architectural Support for Dynamic Memory Management.
Proceedings of the IEEE International Conference On Computer Design: VLSI In Computers & Processors, 2000

Scalable Hardware-Algorithm for Mark-Sweep Garbage Collection.
Proceedings of the 26th EUROMICRO 2000 Conference, 2000

Advanced POC Model-Based Java Instruction Folding Mechanism.
Proceedings of the 26th EUROMICRO 2000 Conference, 2000

1999
Reusable Internal Hardware Templates.
Proceedings of the Parallel and Distributed Processing, 1999

1997
Design and Evaluation of A Submesh Allocation Scheme for Two-Dimensional Mesh-Connected Parallel Computers.
Proceedings of the 1997 International Symposium on Parallel Architectures, 1997

1996
A High-Performance Memory Allocator for Object-Oriented Systems.
IEEE Trans. Computers, 1996

1993
Performance of object caching for object-oriented systems.
Proceedings of the VLSI 93, 1993

Evaluation of an Object-Caching Coprocessor Design for Object-Oriented Systems.
Proceedings of the Proceedings 1993 International Conference on Computer Design: VLSI in Computers & Processors, 1993

1991
Object-Caching for Performance in Object-Oriented Systems.
Proceedings of the Proceedings 1991 IEEE International Conference on Computer Design: VLSI in Computer & Processors, 1991

1990
A study of the optimization of DC parametric tests.
Proceedings of the Proceedings IEEE International Test Conference 1990, 1990

1988
Optimal Use of Timing Resources: A Crucial Step in Test Program Generation.
Proceedings of the Proceedings International Test Conference 1988, 1988


  Loading...