Bo-Chao Cheng

Orcid: 0000-0002-2029-0426

According to our database1, Bo-Chao Cheng authored at least 44 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Understanding Privacy Risks of High-Accuracy Radio Positioning and Sensing in Wireless Networks.
IEEE Commun. Mag., May, 2024

2021
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges.
IEEE Commun. Surv. Tutorials, 2021

Time-predictable routing algorithm for Time-Sensitive Networking: Schedulable guarantee of Time-Triggered streams.
Comput. Commun., 2021

An Automatic Indoor Positioning Robot System Using Panorama Feature Matching.
Proceedings of the 27th International DMS Conference on Visualization and Visual Languages, 2021

2020
Towards Efficient Neural Network on Edge Devices via Statistical Weight Pruning.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

2018
Low Cost Super-Resolution Scaling for Images with Over-Exposed and Saturated Scenes.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

2017
Special point representations for reducing data space requirements of finger-vein recognition applications.
Multim. Tools Appl., 2017

Statistical learning based consumer electronic devices detection for smart grid.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

Design of an authentication and key management system for a smart meter gateway in AMI.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

2016
Challenges and opportunities in next-generation cyberspace security.
Secur. Commun. Networks, 2016

User daily behavior disturbance model to preserve privacy for smart metering.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

2015
E-Cube<sup>+</sup> Routing Protocol for Wireless Sensor Networks in the Presence of Network Failures.
Int. J. Distributed Sens. Networks, 2015

Novel location privacy protection strategies for Location-Based Services.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

2014
Athena: capacity enhancement of reversible data hiding with consideration of the adaptive embedding level.
J. Vis. Lang. Comput., 2014

Hybrid classification engine for cardiac arrhythmia cloud service in elderly healthcare management.
J. Vis. Lang. Comput., 2014

Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics.
Ann. des Télécommunications, 2014

Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology.
Proceedings of the Symposium on Applied Computing, 2014

Hybrid Classification Engine for Cardiac Arrhythmia Cloud Service in Elderly Healthcare Management.
Proceedings of the 20th International Conference on Distributed Multimedia Systems: Research papers on distributed multimedia systems, 2014

2012
Network lifetime bounds for hierarchical wireless sensor networks in the presence of energy constraints.
Comput. Networks, 2012

MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

A Multi-level Fuzzy Comprehensive Evaluation Approach for Message Verification in VANETs.
Proceedings of the Third FTRA International Conference on Mobile, 2012

iPAT: Intelligent privacy-preserving administration tool for IRB applications.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
Schedulability Analysis for Hard Network Lifetime Wireless Sensor Networks With High Energy First Clustering.
IEEE Trans. Reliab., 2011

A Novel Probabilistic Matching Algorithm for Multi-Stage Attack Forecasts.
IEEE J. Sel. Areas Commun., 2011

A Context Adaptive Intrusion Detection System for MANET.
Comput. Commun., 2011

2010
HMM machine learning and inference for Activities of Daily Living recognition.
J. Supercomput., 2010

Quality assurance evidence collection model for MSN forensics.
J. Intell. Manuf., 2010

2009
FBT: an efficient traceback scheme in hierarchical wireless sensor network.
Secur. Commun. Networks, 2009

Cognitive Shortest Path Tree Restoration (CSPTR) for MANET Using Cost-Sensitivity Analysis.
IEICE Trans. Commun., 2009

An ASIC for SMTP Intrusion Prevention System.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

2008
A Good IDS Response Protocol of MANET Containment Strategies.
IEICE Trans. Commun., 2008

A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks.
Comput. Commun., 2008

A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks.
Comput. Commun., 2007

SIPS: A Stateful and Flow-Based Intrusion Prevention System for Email Applications.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

A Theoretical Security Model for Access Control and Security Assurance.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Quality Assurance for Evidence Collection in Network Forensics.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

2005
Developing and Implementing IHPM on IXP 425 Network Processor Platforms.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

2001
Bounds on tardiness in scheduling of precedence-constrained unit real-time task systems.
Comput. Electr. Eng., 2001

1997
Distributed interactive video system design and analysis.
IEEE Commun. Mag., 1997

LSTF: A new scheduling policy for complex real-time tasks in multiple processor systems.
Autom., 1997

A Restoration Methodology Based on Pre-Planned Source Routing in ATM Networks.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1996
The Allocation and Scheduling Precedence and Timing-Constrained Tasks with communication Delays.
Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 1996

1994
Response time prediction in object-based, parallel embedded systems.
Microprocess. Microprogramming, 1994


  Loading...