


default search action
Chinyang Henry Tseng
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Chinyang Henry Tseng
, Woei-Jiunn Tsaur
, Yueh-Mao Shen:
Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection. Future Internet 16(1): 25 (2024) - 2023
- [j6]Chinyang Henry Tseng, Ya-Ting Chang
:
EBDM: Ensemble binary detection models for multi-class wireless intrusion detection based on deep neural network. Comput. Secur. 133: 103419 (2023) - [j5]Chinyang Henry Tseng
, Woei-Jiunn Tsaur
:
FFK: Fourier-Transform Fuzzy-c-means Kalman-Filter Based RSSI Filtering Mechanism for Indoor Positioning. Sensors 23(19): 8274 (2023)
2010 – 2019
- 2017
- [j4]Chinyang Henry Tseng, Jing-Shyang Yen:
Enhanced Gaussian mixture model of RSSI purification for indoor positioning. J. Syst. Archit. 81: 1-6 (2017) - 2016
- [j3]Chinyang Henry Tseng
:
Multipath Load Balancing Routing for Internet of Things. J. Sensors 2016: 4250746:1-4250746:8 (2016) - 2015
- [j2]Hsiao-Ching Lin, Chinyang Henry Tseng, Hui-Tang Lin:
MoTIVE: mobile two-hop integrity validation for emergency vehicle routing. Secur. Commun. Networks 8(9): 1717-1724 (2015) - [j1]Chinyang Henry Tseng, Shiau-Huey Wang, Woei-Jiunn Tsaur:
Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection. IEEE Trans. Reliab. 64(3): 1078-1085 (2015) - 2012
- [c8]Hsiao-Ching Lin, Ming-Kung Sun, Han-Wei Huang, Chinyang Henry Tseng, Hui-Tang Lin:
A Specification-Based Intrusion Detection Model for Wireless Ad Hoc Networks. IBICA 2012: 252-257
2000 – 2009
- 2007
- [c7]Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt:
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. AsiaCCS 2007: 395-397 - [c6]Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop:
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. RAID 2007: 127-145 - 2006
- [c5]Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt:
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. RAID 2006: 249-271 - 2005
- [c4]Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt:
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. Formal Aspects in Security and Trust 2005: 16-33 - [c3]Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chinyang Henry Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe:
A General Cooperative Intrusion Detection Architecture for MANETs. IWIA 2005: 57-70 - [c2]Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt:
A Specification-Based Intrusion Detection Model for OLSR. RAID 2005: 330-350 - 2003
- [c1]Chinyang Henry Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt:
A specification-based intrusion detection system for AODV. SASN 2003: 125-134
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint