Chao-Hsien Chu

Orcid: 0000-0001-6274-5153

Affiliations:
  • Pennsylvania State University, University Park, USA


According to our database1, Chao-Hsien Chu authored at least 77 papers between 1994 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Applying deep learning technology for automatic fall detection using mobile sensors.
Biomed. Signal Process. Control., 2022

Managing pharmaceuticals delivery service using a hybrid particle swarm intelligence approach.
Ann. Oper. Res., 2022

2021
Incrementally Updateable Honey Password Vaults.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Differential privacy protection over deep learning: An investigation of its impacted factors.
Comput. Secur., 2020

Extracting deep features from short ECG signals for early atrial fibrillation detection.
Artif. Intell. Medicine, 2020

Online Structural Break Detection for Pairs Trading Using Wavelet Transform and Hybrid Deep Learning Model.
Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020

2019
Special Issue on Human-autonomous Devices for Rehabilitation and Assistance.
J. Ambient Intell. Smart Environ., 2019

PbFG: Physique-based fuzzy granular modeling for non-invasive blood glucose monitoring.
Inf. Sci., 2019

Modeling multi-stage healthcare systems with service interactions under blocking for bed allocation.
Eur. J. Oper. Res., 2019

Probability Model Transforming Encoders Against Encoding Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Detection of Atrial Fibrillation from Short ECG Signals Using a Hybrid Deep Learning Model.
Proceedings of the Smart Health - International Conference, 2019

Using Deep Learning and Smartphone for Automatic Detection of Fall and Daily Activities.
Proceedings of the Smart Health - International Conference, 2019

2018
Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems.
J. Signal Process. Syst., 2018

Long-Term Event Processing over Data Streams in Cyber-Physical Systems.
ACM Trans. Cyber Phys. Syst., 2018

Redundant Reader Elimination in Large-Scale Distributed RFID Networks.
IEEE Internet Things J., 2018

A Deep Learning-Based Method for Sleep Stage Classification Using Physiological Signal.
Proceedings of the Smart Health - International Conference, 2018

2017
Examining the intended and unintended consequences of organisational privacy safeguards.
Eur. J. Inf. Syst., 2017

A Controller/Architecture Co-design Framework for Wireless Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Secur. Comput., 2015

Efficient Multipattern Event Processing Over High-Speed Train Data Streams.
IEEE Internet Things J., 2015

Relationship-based federated access control model for EPC Discovery Service.
Comput. Secur., 2015

LTCEP: Efficient Long-Term Event Processing for Internet of Things Data Streams.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

2014
A semantic authorization model for pervasive healthcare.
J. Netw. Comput. Appl., 2014

Ontology-Based Semantic Modeling and Evaluation for Internet of Things Applications.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

ETD: An extended time delay algorithm for ventricular fibrillation detection.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

2013
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
IEEE Trans. Inf. Forensics Secur., 2013

Flexible Process Compliance with Semantic Constraints Using Mixed-Integer Programming.
INFORMS J. Comput., 2013

A novel distributed algorithm for redundant reader elimination in RFID networks.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Data Management for Internet of Things: Challenges, Approaches and Opportunities.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Combining Multiple Sensor Features for stress Detection using Combinatorial Fusion.
J. Interconnect. Networks, 2012

The Adoption and Implementation of RFID Technologies in Healthcare: A Literature Review.
J. Medical Syst., 2012

A context-aware reminder system for elders based on fuzzy linguistic approach.
Expert Syst. Appl., 2012

Evaluating feature selection for stress identification.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

User-driven cloud transportation system for smart driving.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Leveraging complex event processing for smart hospitals using RFID.
J. Netw. Comput. Appl., 2011

Healthcare Information Privacy Research: Iusses, Gaps and What Next?
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Content-based image authentication: current status, issues, and challenges.
Int. J. Inf. Sec., 2010

Ontology-Driven Event Detection and Indexing in Smart Spaces.
Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), 2010

Ensuring Compliance with Semantic Constraints in Process Adaptation with Rule-Based Event Processing.
Proceedings of the Semantic Web Rules - International Symposium, 2010

A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services.
IEEE Trans. Dependable Secur. Comput., 2009

RFID Privacy Concerns: A Conceptual Analysis in the Healthcare Sector.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
An In-depth Analysis of Fuzzy C-Means Clustering for Cellular Manufacturing.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Defence against packet injection in ad hoc networks.
Int. J. Secur. Networks, 2007

A genetic algorithm for cellular manufacturing design and layout.
Eur. J. Oper. Res., 2007

Genetic algorithms for integrating cell formation with machine layout and scheduling.
Comput. Ind. Eng., 2007

Analysis of area-congestion-based DDoS attacks in ad hoc networks.
Ad Hoc Networks, 2007

Content-based Image Authentication: Current Status, Issues, and Challenges.
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007

Privacy Preserving Data Mining Research: Current Status and Key Issues.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Factors influencing the adoption of wireless technologies on campus.
Int. J. Mob. Commun., 2006

Splice site prediction using support vector machines with a Bayes kernel.
Expert Syst. Appl., 2006

Towards Inferring Protein Interactions: Challenges and Solutions.
EURASIP J. Adv. Signal Process., 2006

An in-depth analysis of information markets with aggregate uncertainty.
Electron. Commer. Res., 2006

In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

An Evolutionary Fuzzy Multi-objective Approach to Cell Formation.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

A Close Look at Privacy Preserving Data Mining Methods.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

Modeling of pollution in p2p file sharing systems.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Information markets vs. opinion pools: an empirical comparison.
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005

KTR: an Efficient Key Management Scheme For Air Access Control.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

A Time-Series Biclustering Algorithm for Revealing Co-Regulated Genes.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Defending against packet injection attacks unreliable ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Protein Interaction Inference as a MAX-SAT Problem.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2005

2004
Correlating summarization of multi-source news with k-way graph bi-clustering.
SIGKDD Explor., 2004

2002
An improved fuzzy c-means algorithm for manufacturing cell formation.
Proceedings of the 2002 IEEE International Conference on Fuzzy Systems, 2002

A genetic algorithm for integrated cell formation and layout decisions.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

A heuristic ant algorithm for solving QoS multicast routing problem.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

2001
Genetic algorithms for communications network design - an empirical study of the factors that influence performance.
IEEE Trans. Evol. Comput., 2001

Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods.
Decis. Sci., 2001

A heuristic genetic algorithm for grouping manufacturing cells.
Proceedings of the 2001 Congress on Evolutionary Computation, 2001

2000
Digital data networks design using genetic algorithms.
Eur. J. Oper. Res., 2000

Telecommunications Network Design - Comparison of Alternative Approaches.
Decis. Sci., 2000

1999
Dynamic Degree Constrained Network Design: A Genetic Algorithm Approach.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 1999), 1999

1997
An improved neural network for manufacturing cell formation.
Decis. Support Syst., 1997

1994
Neural network system for forecasting method selection.
Decis. Support Syst., 1994


  Loading...