default search action
Po-Jen Chuang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j36]Po-Jen Chuang, Pang-Yu Huang:
Enhancing network intrusion detection by lifelong active online learning. J. Supercomput. 80(11): 16428-16451 (2024) - 2023
- [j35]Po-Jen Chuang, Pang-Yu Huang:
B-VAE: a new dataset balancing approach using batched Variational AutoEncoders to enhance network intrusion detection. J. Supercomput. 79(12): 13262-13286 (2023) - 2021
- [j34]Po-Jen Chuang, Yun-Sheng Tu:
Pursuing efficient data stream mining by removing long patterns from summaries. Int. J. Data Min. Model. Manag. 13(4): 388-409 (2021) - [j33]Po-Jen Chuang, Kuan-Lin Wu:
Employing On-Line Training in SDN Intrusion Detection. J. Inf. Sci. Eng. 37(2): 483-496 (2021) - [j32]Po-Jen Chuang, Yen-Feng Tu:
Constructing effective lightweight privacy protection in RFID-based systems. J. Supercomput. 77(9): 9658-9688 (2021) - 2020
- [j31]Po-Jen Chuang, Yen-Chia Huang:
Live Save: An Efficient Snapshot Mechanism for Virtual Machines in Xen. J. Inf. Sci. Eng. 36(2): 423-440 (2020) - 2019
- [j30]Po-Jen Chuang, Han-Chun Chuang:
Effective Privacy Preservation in Third-Party Cloud Storage Auditing. J. Inf. Sci. Eng. 35(1): 125-135 (2019) - 2017
- [j29]Po-Jen Chuang, Wei-Ting Tsai:
SwitchTable: An efficient anti-collision algorithm for RFID networks. IET Commun. 11(14): 2221-2227 (2017) - [j28]Po-Jen Chuang, Chung-Hsing Wang:
An Efficient Group-based Data Backup and Recovery Scheme in Cloud Computing Systems. J. Inf. Sci. Eng. 33(1): 183-198 (2017) - 2015
- [j27]Po-Jen Chuang, Tzu-Lun Huang:
Efficient vehicular ad-hoc networks routing based on junctions. IET Commun. 9(4): 487-493 (2015) - 2014
- [j26]Po-Jen Chuang, Yi-Jun Jiang:
Effective neural network-based node localisation scheme for wireless sensor networks. IET Wirel. Sens. Syst. 4(2): 97-103 (2014) - [j25]Po-Jen Chuang, Teng-Tai Hu:
BHAR: a bidirectional hierarchy-based anycast routing protocol for wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 13(1): 1-24 (2014) - [j24]Po-Jen Chuang, Ming-Yu Ni:
On access control policy assignments and negotiation strategies in automated trust negotiation. Int. J. Secur. Networks 9(2): 104-113 (2014) - 2013
- [j23]Chih-Shin Lin, Po-Jen Chuang:
Energy-efficient two-hop extension protocol for wireless body area networks. IET Wirel. Sens. Syst. 3(1) (2013) - [j22]Bo-Yi Li, Po-Jen Chuang:
Geographic energy-aware non-interfering multipath routing for multimedia transmission in wireless sensor networks. Inf. Sci. 249: 24-37 (2013) - 2012
- [j21]Po-Jen Chuang, Ming-Chao Chiang, Chu-Sing Yang, Chun-Wei Tsai:
Social Networks-based Adaptive Pairing Strategy for Cooperative Learning. J. Educ. Technol. Soc. 15(3): 226-239 (2012) - 2011
- [j20]Po-Jen Chuang, Yu-Shian Chiu:
Efficient cache invalidation schemes for mobile data accesses. Inf. Sci. 181(22): 5084-5101 (2011) - [j19]Po-Jen Chuang, Jer-Sheng Deng, Chih-Shin Lin:
Location Privacy Protection Using Independent ID Update for WLANs. J. Inf. Sci. Eng. 27(2): 403-418 (2011) - [j18]Po-Jen Chuang, Cheng-Pei Wu:
Employing PSO to Enhance RSS Range-Based Node Localization for Wireless Sensor Networks. J. Inf. Sci. Eng. 27(5): 1597-1611 (2011) - 2010
- [j17]Po-Jen Chuang, Shao-Hsuan Chang, Chih-Shin Lin:
A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks. J. Inf. Sci. Eng. 26(5): 1859-1873 (2010) - [j16]Po-Jen Chuang, Chih-Shin Lin:
A-MAC: A MAC Protocol Using Alternative Wakeup Schedules to Achieve Energy Efficiency for Wireless Sensor Networks. J. Inf. Sci. Eng. 26(6): 2127-2141 (2010) - 2007
- [j15]Po-Jen Chuang, Yu-Shian Chiu:
A New Dispatching Mechanism - Using Value Classification and Indexing - for Value Predictors. J. Inf. Sci. Eng. 23(1): 147-166 (2007) - [j14]Po-Jen Chuang, Bo-Yi Li, Tun-Hao Chao:
Hypercube-based Data Gathering in Wireless Sensor Networks. J. Inf. Sci. Eng. 23(4): 1155-1170 (2007) - 2006
- [j13]Po-Jen Chuang, Yue-Tsuen Jiang:
Dynamic channel selection: an efficient strategy for balancing traffic in meshes. Int. J. Comput. Sci. Eng. 2(1/2): 3-22 (2006) - 2005
- [j12]Po-Jen Chuang, Li-Chiang Yao:
An efficient reconfiguration scheme for fault-tolerant meshes. Inf. Sci. 172(3-4): 309-333 (2005) - [j11]Po-Jen Chuang, Chia-Hsin Wei, Yu-Shian Chiu:
GAA: A New Optimization Technique for Task Matching and Scheduling in HCSs. J. Inf. Sci. Eng. 21(2): 287-308 (2005) - 2004
- [j10]Po-Jen Chuang, Shih-Yuan Chen, Juei-Tang Chen:
Constructing Fault-Tolerant Communication Trees in Hypercubes. J. Inf. Sci. Eng. 20(1): 39-55 (2004) - [j9]Po-Jen Chuang, Young-Tzong Hsiao, Yu-Shian Chiu:
An Efficient Value Predictor Dynamically Using Loop and Locality Properties. J. Supercomput. 30(1): 19-36 (2004) - 2002
- [j8]Po-Jen Chuang, Juei-Tang Chen, Yue-Tsuen Jiang:
Balancing Buffer Utilization in Meshes Using a 'Restricted Area' Concept. IEEE Trans. Parallel Distributed Syst. 13(8): 814-827 (2002) - 2000
- [j7]Po-Jen Chuang, Chih-Ming Wu:
An Efficient Recognition-Complete Processor Allocation Strategy for k-ary n-cube Multiprocessors. IEEE Trans. Parallel Distributed Syst. 11(5): 485-490 (2000) - 1999
- [j6]Po-Jen Chuang, Huey-Ming Hsu:
Effective Fault Diagnosis Approaches for Multiphath Networks. Comput. J. 42(5): 409-421 (1999) - 1996
- [j5]Po-Jen Chuang:
CGIN: A Fault Tolerant Modified Gamma Interconnection Network. IEEE Trans. Parallel Distributed Syst. 7(12): 1301-1306 (1996) - 1994
- [j4]Po-Jen Chuang, Nian-Feng Tzeng:
Allocating Precise Submeshes in Mesh Connected Systems. IEEE Trans. Parallel Distributed Syst. 5(2): 211-217 (1994) - [j3]Nian-Feng Tzeng, Po-Jen Chuang:
A Pairwise Substitutional Fault Tolerance Technique for the Cube-Connected Cycles Architecture. IEEE Trans. Parallel Distributed Syst. 5(4): 433-438 (1994) - 1993
- [j2]Nian-Feng Tzeng, Po-Jen Chuang, Chwan-Hwa John Wu:
Creating Disjoint Paths in Gamma Interconnection Networks. IEEE Trans. Computers 42(10): 1247-1252 (1993) - 1992
- [j1]Po-Jen Chuang, Nian-Feng Tzeng:
A Fast Recognition-Complete Processor Allocation Strategy for Hypercube Computers. IEEE Trans. Computers 41(4): 467-479 (1992)
Conference and Workshop Papers
- 2019
- [c46]Po-Jen Chuang, Dong-Ye Wu:
Applying Deep Learning to Balancing Network Intrusion Detection Datasets. ICAIT 2019: 213-217 - [c45]Po-Jen Chuang, Si-Han Li:
Network Intrusion Detection using Hybrid Machine Learning. iFUZZY 2019: 1-5 - 2017
- [c44]Po-Jen Chuang, Yen-Chia Huang:
Efficient Snapshot Mechanisms for Xen Virtual Machines. SOCA 2017: 112-115 - 2015
- [c43]Po-Jen Chuang, Ming-Chun Liu:
Advanced Junction-Based Routing in Vehicular Ad-Hoc Networks. FGCN 2015: 17-20 - 2014
- [c42]Po-Jen Chuang, Wei-Chin Wong:
Generating Snapshot Backups in Cloud Virtual Disks. CSE 2014: 1860-1863 - 2013
- [c41]Po-Jen Chuang, Ting-Yi Chu:
Efficient multicast routing in mobile ad-hoc networks. ISCE 2013: 149-150 - [c40]Po-Jen Chuang, Chu-Sing Yang:
The Originality of a Leader for Cooperative Learning. MUSIC 2013: 637-642 - 2012
- [c39]Po-Jen Chuang, Po-Hsun Yen, Ting-Yi Chu:
Efficient Route Discovery and Repair in Mobile Ad-hoc Networks. AINA 2012: 391-398 - [c38]Po-Jen Chuang, Yi-Ping Liao:
Efficient and Secure Cross-Realm Client-to-Client Password-Authenticated Key Exchange. AINA 2012: 701-708 - [c37]Po-Jen Chuang, Ming-Chao Chiang, Chun-Wei Tsai, Chu-Sing Yang:
A Context Awareness based prediction for remedy system. FSKD 2012: 2848-2852 - [c36]Chih-Shin Lin, Po-Jen Chuang:
Energy-efficient transmission in wireless body area networks. ISPACS 2012: 663-668 - [c35]Bo-Yi Li, Po-Jen Chuang:
Efficient multimedia transmission in wireless sensor networks. ISPACS 2012: 833-838 - [c34]Po-Jen Chuang, Ming-Yu Ni:
Efficient and Secure Trust Negotiation over the Internet. PAAP 2012: 19-24 - 2011
- [c33]Po-Jen Chuang, Chun-Wei Tsai, Ming-Chao Chiang, Chu-Sing Yang:
Lecture concepts based item classification for remedial. SMC 2011: 2227-2231 - 2010
- [c32]Po-Jen Chuang, Teng-Tai Hu:
A New and Efficient Hierarchy-Based Anycast Routing Protocol for Wireless Sensor Networks. ISPA 2010: 334-341 - 2009
- [c31]Po-Jen Chuang, Sheng-Hsiung Yang, Chih-Shin Lin:
Energy-Efficient Clustering in Wireless Sensor Networks. ICA3PP 2009: 112-120 - [c30]Po-Jen Chuang, Bo-Yi Li:
An Efficient Data Dissemination Scheme for Sensor Networks. ICA3PP 2009: 729-740 - 2008
- [c29]Po-Jen Chuang, Chu-Sing Yang, Ming-Chao Chiang:
A Remedial Supporting Based Learning Management System. ICIW 2008: 488-493 - [c28]Po-Jen Chuang, Cheng-Pei Wu:
An Effective PSO-Based Node Localization Scheme for Wireless Sensor Networks. PDCAT 2008: 187-194 - 2007
- [c27]Po-Jen Chuang, Shao-Hsuan Chang, Chih-Shin Lin:
A PKC-Based Node Revocation Scheme in Wireless Sensor Networks. FGCN (1) 2007: 256-261 - [c26]Po-Jen Chuang, Chih-Shin Lin:
Energy-Efficient Medium Access Control for Wireless Sensor Networks. ICESS 2007: 445-452 - [c25]Po-Jen Chuang, Chu-Sing Yang, Ming-Chao Chiang:
Distribution of Lecture Concepts and Relations in Digital Contents. NBiS 2007: 167-176 - [c24]Po-Jen Chuang, Yu-Shian Chiu:
Constructing Efficient Cache Invalidation Schemes in Mobile Environments. SITIS 2007: 281-288 - 2006
- [c23]Po-Jen Chuang, Tun-Hao Chao:
A Node Revocation Scheme for Sensor Networks. Wireless and Optical Communications 2006 - 2005
- [c22]Po-Jen Chuang, Shien-Da Chang:
Performance Analysis on Location Tracking in PCS Networks. AINA 2005: 576-582 - [c21]Po-Jen Chuang, Tun-Hao Chao, Bo-Yi Li:
A Scalable Grouping Random Key Predistribution Scheme for Large Scale Distributed Sensor Networks. ICITA (2) 2005: 535-540 - [c20]Po-Jen Chuang, Bo-Yi Li, Tun-Hao Chao:
Efficient Data Gathering Schemes for Wireless Sensor Networks. MSN 2005: 370-379 - 2004
- [c19]Po-Jen Chuang, Ching-Yueh Hsu:
An Efficient Cache Invalidation Strategy in Mobile Environments. AINA (2) 2004: 260-263 - [c18]Po-Jen Chuang, Shien-Da Chang, Tun-Hao Chao:
An Enhanced Caching Strategy for Location Tracking in PCS Networks. EUC 2004: 419-428 - 2003
- [c17]Po-Jen Chuang, Young-Tzong Hsiao, Yu-Shian Chiu:
Dynamic Value Prediction using Loop and Locality Properties. Applied Informatics 2003: 423-428 - [c16]Po-Jen Chuang, Yue-Tsuen Jiang:
Balancing Traffic in Meshes by Dynamic Channel Selection . ISPA 2003: 88-99 - 2002
- [c15]Po-Jen Chuang, Chia-Hsin Wei:
An Efficient Optimization Technique for Task Matching and Scheduling in Heterogeneous Computing Systems. ICPADS 2002: 419-424 - 2000
- [c14]Po-Jen Chuang:
An efficent new design of the optical ring network. CATA 2000: 80-83 - 1999
- [c13]Po-Jen Chuang, Juei-Tang Chen:
A "restricted area" concept for balancing buffer utilization in messes. CATA 1999: 264-268 - 1998
- [c12]Po-Jen Chuang, Huey-Ming Hsu:
Fault diagnosis in redundant path multistage interconnection networks. CATA 1998: 417-421 - 1997
- [c11]Po-Jen Chuang, Chih-Ming Wu:
Processor Allocation in k-ary n-cube Multiprocessors. ISPAN 1997: 211-214 - 1995
- [c10]Po-Jen Chuang:
Creating A Highly Reliable Modified Gamma Interconnection Network Using A Balance Approach. Parallel and Distributed Computing and Systems 1995: 119-124 - 1994
- [c9]Po-Jen Chuang:
CGIN: A Modified Gamman Interconnection Network with Multiple Disjoint Paths. ICPADS 1994: 366-372 - 1991
- [c8]Nian-Feng Tzeng, Po-Jen Chuang:
Fault-Tolerant Gamma Interconnection Networks. FTCS 1991: 282-291 - [c7]Po-Jen Chuang, Nian-Feng Tzeng:
An efficient submesh allocation strategy for mesh computer systems. ICDCS 1991: 256-263 - 1990
- [c6]Nian-Feng Tzeng, Hsing-Lung Chen, Po-Jen Chuang:
Embeddings in Incomplete Hypercubes. ICPP (3) 1990: 335-339 - [c5]Nian-Feng Tzeng, Sourav Bhattacharya, Po-Jen Chuang:
Fault-Tolerant Cube-Connected Cycles Structures Through Dimensional Substitution. ICPP (1) 1990: 433-440 - [c4]Po-Jen Chuang, Nian-Feng Tzeng:
Dynamic Processor Allocation in Hypercube Computers. ISCA 1990: 40-49 - 1989
- [c3]Po-Jen Chuang, Frederick N. Springsteel:
ERDDS - the Intelligent E-R-based Database System with Visual Semantics Knowledge Base Prototype. VDB 1989: 57-86 - 1988
- [c2]Po-Jen Chuang, Frederick N. Springsteel:
Intelligent logical design of relational databases. ACM Conference on Computer Science 1988: 724 - [c1]Frederick N. Springsteel, Po-Jen Chuang:
ERDDS: The Intelligent E-R-Based Database Design System. ER 1988: 349-368
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 22:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint