Guiran Chang

According to our database1, Guiran Chang authored at least 75 papers between 2001 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Integration of P4P and IMS-based IPTV.
Int. J. Wirel. Mob. Comput., 2014

Modelling, analysis and containment of passive worms in P2P networks.
Int. J. Internet Protoc. Technol., 2014

2013
Analyzing, modeling and evaluating dynamic adaptive fault tolerance strategies in cloud computing environments.
J. Supercomput., 2013

Analysing and evaluating malicious trust in cloud computing environments from a statistical perspective.
Int. J. Wirel. Mob. Comput., 2013

Traffic classification combining flow correlation and ensemble classifier.
Int. J. Wirel. Mob. Comput., 2013

2012
Modeling a Dynamic Data Replication Strategy to Increase System Availability in Cloud Computing Environments.
J. Comput. Sci. Technol., 2012

AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems.
KSII Trans. Internet Inf. Syst., 2012

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems.
KSII Trans. Internet Inf. Syst., 2012

Lightweight key management scheme to enhance the security of internet of things.
Int. J. Wirel. Mob. Comput., 2012

Modelling and evaluating a high serviceability fault tolerance strategy in cloud computing environments.
Int. J. Secur. Networks, 2012

Research on hierarchical routing protocol based on optimal clustering head for wireless sensor networks.
Int. J. Model. Identif. Control., 2012

Modelling, evaluating, designing and maximising resource allocation revenue by an auction mechanism in cloud computing environments.
Int. J. Comput. Appl. Technol., 2012

Cooperative game-based routing approach for wireless sensor network.
Int. J. Comput. Appl. Technol., 2012

Modeling access control for cyber-physical systems using reputation.
Comput. Electr. Eng., 2012

A Lightweight Group-Key Management Protocol for Ad Hoc Networks.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

A Four-Party Password-Based Authentication Key Exchange Protocol.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Building a High Serviceability Model by Checkpointing and Replication Strategy in Cloud Computing Environments.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

nPAKE: An Improved Group PAKE Protocol.
Proceedings of the Ninth Web Information Systems and Applications Conference, 2012

2011
Stability Analysis of P2P Worm Propagation Model with Dynamic Quarantine Defense.
J. Networks, 2011

A Novel P2P Based Grid Resource Discovery Model.
J. Networks, 2011

Modelling, evaluating and designing virtual machine scheduling by a clustering mechanism in cloud computing environments.
Int. J. Wirel. Mob. Comput., 2011

TRM-IoT: A trust management model based on fuzzy reputation for internet of things.
Comput. Sci. Inf. Syst., 2011

A Load Balanced Routing Protocol Based on Ant Colony Algorithm for Wireless Mesh Networks.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

A Novel Cooperation Mechanism to Enforce Security in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

Improved Particle Swarm Optimization for Fuzzy Neural Network Traning.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

A Novel Secure Architecture for the Internet of Things.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
The Design of Serial ATA Bus Control Chip.
J. Comput., 2010

Find the maximum k-disjoint coverage sets in WSN using genetic algorithm.
Int. J. Model. Identif. Control., 2010

K-BRiR: An Efficient and Self-organized Routing Mechanism for Structured Peer-to-Peer Service Networks.
Proceedings of the E-business Technology and Strategy - International Conference, 2010

2009
Multi-objective optimization for coverage control in wireless sensor network with adjustable sensing radius.
Comput. Math. Appl., 2009

Energy efficient coverage control in wireless sensor networks based on multi-objective genetic algorithm.
Comput. Math. Appl., 2009

An Improvement to the Chord-Based P2P Routing Algorithm.
Proceedings of the Fifth International Conference on Semantics, Knowledge and Grid, 2009

A Cold-Start Recommendation Algorithm Based on New User's Implicit Information and Multi-attribute Rating Matrix.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Research on the Epidemic Model in P2P File-Sharing System.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A User Motivation Model for Web Search Engine.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

An EPG Recommender Framework with Information Exchange between Users.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

An Improved Peer-to-Peer Routing Algorithm K-CSSP Based on Communication History Clustered by K-means.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A P2P Overlay Network Routing Algorithm Based on Group-Average Agglomerative Clustering Topology.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A P2P Network Topology Optimized Algorithm Based on Minimum Maximum K-Means Principle.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

The Improved Research of Chord Based on File-Partition Replication Strategy.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Research on the Discovery of Blind Spots in Wireless Sensor Networks Based on Voronoi Diagram.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Sleep Scheduling Based on Probabilistic Detection Model for Wireless Sensor Networks.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Restoration of coverage blind spots in wireless sensor networks based on ant colony algorithm.
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, 2009

2008
Research on Active Defense Strategy of Counter DDoS Attacks Based on Differential Games Model.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

DG-Based Active Defense Strategy to Defend against DDoS.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

High Speed Serial Interface & Some Key Technology Research.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

The Design and Implementation of Zero-Copy for Linux.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Recommender Handoff Framework for a Mobile Device.
Proceedings of the Mobile Multimedia Processing: Fundamentals, 2008

Developing Mobile Applications on the Android Platform.
Proceedings of the Mobile Multimedia Processing: Fundamentals, 2008

A Color Visualization Method to the Isochores of DNA Sequences.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A Model for Resource Discovery among Grids.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

DG-Based DDoS Detection Using Hybrid Strategy.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Research on Counter Http DDoS Attacks based on Weighted Queue Random Early Drop .
Proceedings of the Security in Information Systems, 2007

The study for protecting mobile agents based on time checking technology.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

A Method for Making Three-Party Password-Based Key Exchange Resilient to Server Compromise.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Data and Time Checking Technology.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Research on Counter Bandwidth Depletion DDoS Attacks Based on Genetic Algorithm.
Proceedings of the Third International Conference on Natural Computation, 2007

A Framework for Traffic Information Service Grid.
Proceedings of the Grid and Cooperative Computing, 2007

A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Control Flow and Time Checking Technology.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Algorithm of Signal De-noising by Using Wavelet Analysis.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Research and Implementation of Zero-Copy Technology Based on Device Driver in Linux.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A New Method of TOE Architecture Based on the ML403 Development Board in Linux.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Implementing a SIP-based Device Communication Middleware for OSGi Framework with Extension to Wireless Networks.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Utility-Based Replication Strategies in Data Grids.
Proceedings of the Grid and Cooperative Computing, 2006

2005
Mobile Agent Implemented Grid Resource Reservation.
Proceedings of the Self-Organization and Autonomic Informatics (I), 2005

G-RSVPM: A Grid Resource Reservation Model.
Proceedings of the 2005 International Conference on Semantics, 2005

2004
Replica Location Mechanism Based on DHT and the Small-World Theory.
Proceedings of the Grid and Cooperative Computing, 2004

The Consistency between the Attribute Relationships and Time-Serial Count Operators.
Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems (CBMS 2004), 2004

2003
A QoS Model for Grid Computing Based on DiffServ Protocol.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Research on the Financial Information Grid.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Some Views on Building Computational Grids Infrastructure.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2001
An autonomous system-based distribution system for web search.
Proceedings of the IEEE International Conference on Systems, 2001


  Loading...