default search action
Chao-Hsien Chu
Person information
- affiliation: Pennsylvania State University, University Park, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j38]Xiaodan Wu, Ruichang Li, Chao-Hsien Chu, Richard Amoasi, Shan Liu:
Managing pharmaceuticals delivery service using a hybrid particle swarm intelligence approach. Ann. Oper. Res. 308(1): 653-684 (2022) - [j37]Xiaodan Wu, Yumeng Zheng, Chao-Hsien Chu, Lingyu Cheng, Jungyoon Kim:
Applying deep learning technology for automatic fall detection using mobile sensors. Biomed. Signal Process. Control. 72(Part): 103355 (2022) - 2020
- [j36]Xiaodan Wu, Yumeng Zheng, Chao-Hsien Chu, Zhen He:
Extracting deep features from short ECG signals for early atrial fibrillation detection. Artif. Intell. Medicine 109: 101896 (2020) - [j35]Ying Lin, Ling-Yan Bao, Ze-Minghui Li, Shu-Zheng Si, Chao-Hsien Chu:
Differential privacy protection over deep learning: An investigation of its impacted factors. Comput. Secur. 99: 102061 (2020) - 2019
- [j34]Xiaodan Wu, Juan Li, Chao-Hsien Chu:
Modeling multi-stage healthcare systems with service interactions under blocking for bed allocation. Eur. J. Oper. Res. 278(3): 927-941 (2019) - [j33]Weijie Liu, Anpeng Huang, Ping Wang, Chao-Hsien Chu:
PbFG: Physique-based fuzzy granular modeling for non-invasive blood glucose monitoring. Inf. Sci. 497: 56-76 (2019) - [j32]Norbert Stoll, Matthias Weippert, Chao-Hsien Chu, Mohit Kumar, Hamid Aghajan:
Special Issue on Human-autonomous Devices for Rehabilitation and Assistance. J. Ambient Intell. Smart Environ. 11(6): 553-554 (2019) - 2018
- [j31]Meng Ma, Ping Wang, Chao-Hsien Chu:
Redundant Reader Elimination in Large-Scale Distributed RFID Networks. IEEE Internet Things J. 5(2): 884-894 (2018) - [j30]Ping Wang, Meng Ma, Chao-Hsien Chu:
Long-Term Event Processing over Data Streams in Cyber-Physical Systems. ACM Trans. Cyber Phys. Syst. 2(2): 14:1-14:23 (2018) - [j29]Ping Wang, Jing Liu, Jinlong Lin, Chao-Hsien Chu:
Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems. J. Signal Process. Syst. 90(8-9): 1191-1204 (2018) - 2017
- [j28]Rachida Parks, Heng Xu, Chao-Hsien Chu, Paul Benjamin Lowry:
Examining the intended and unintended consequences of organisational privacy safeguards. Eur. J. Inf. Syst. 26(1): 37-65 (2017) - 2015
- [j27]Bing Liu, Chao-Hsien Chu:
Relationship-based federated access control model for EPC Discovery Service. Comput. Secur. 55: 251-270 (2015) - [j26]Meng Ma, Ping Wang, Chao-Hsien Chu, Ling Liu:
Efficient Multipattern Event Processing Over High-Speed Train Data Streams. IEEE Internet Things J. 2(4): 295-309 (2015) - [j25]Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu:
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. IEEE Trans. Dependable Secur. Comput. 12(4): 428-442 (2015) - 2014
- [j24]Zang Li, Chao-Hsien Chu, Wen Yao:
A semantic authorization model for pervasive healthcare. J. Netw. Comput. Appl. 38: 76-87 (2014) - 2013
- [j23]Akhil Kumar, Wen Yao, Chao-Hsien Chu:
Flexible Process Compliance with Semantic Constraints Using Mixed-Integer Programming. INFORMS J. Comput. 25(3): 543-559 (2013) - [j22]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. IEEE Trans. Inf. Forensics Secur. 8(6): 888-900 (2013) - 2012
- [j21]Shandan Zhou, Chao-Hsien Chu, Zhiwen Yu, Jungyoon Kim:
A context-aware reminder system for elders based on fuzzy linguistic approach. Expert Syst. Appl. 39(10): 9411-9419 (2012) - [j20]Wen Yao, Chao-Hsien Chu, Zang Li:
The Adoption and Implementation of RFID Technologies in Healthcare: A Literature Review. J. Medical Syst. 36(6): 3507-3525 (2012) - [j19]Yong Deng, D. Frank Hsu, Zhonghai Wu, Chao-Hsien Chu:
Combining Multiple Sensor Features for stress Detection using Combinatorial Fusion. J. Interconnect. Networks 13(3-4) (2012) - 2011
- [j18]Wen Yao, Chao-Hsien Chu, Zang Li:
Leveraging complex event processing for smart hospitals using RFID. J. Netw. Comput. Appl. 34(3): 799-810 (2011) - 2010
- [j17]Shuihua Han, Chao-Hsien Chu:
Content-based image authentication: current status, issues, and challenges. Int. J. Inf. Sec. 9(1): 19-32 (2010) - 2009
- [j16]Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu:
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services. IEEE Trans. Dependable Secur. Comput. 6(3): 188-201 (2009) - 2007
- [j15]Qijun Gu, Peng Liu, Chao-Hsien Chu:
Analysis of area-congestion-based DDoS attacks in ad hoc networks. Ad Hoc Networks 5(5): 613-625 (2007) - [j14]Xiaodan Wu, Chao-Hsien Chu, Yunfeng Wang, Dianmin Yue:
Genetic algorithms for integrating cell formation with machine layout and scheduling. Comput. Ind. Eng. 53(2): 277-289 (2007) - [j13]Xiaodan Wu, Chao-Hsien Chu, Yunfeng Wang, Weili Yan:
A genetic algorithm for cellular manufacturing design and layout. Eur. J. Oper. Res. 181(1): 156-167 (2007) - [j12]Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu:
Defence against packet injection in ad hoc networks. Int. J. Secur. Networks 2(1/2): 154-169 (2007) - 2006
- [j11]Yiling Chen, Tracy Mullen, Chao-Hsien Chu:
An in-depth analysis of information markets with aggregate uncertainty. Electron. Commer. Res. 6(2): 201-221 (2006) - [j10]Ya Zhang, Hongyuan Zha, Chao-Hsien Chu, Xiang Ji:
Towards Inferring Protein Interactions: Challenges and Solutions. EURASIP J. Adv. Signal Process. 2006 (2006) - [j9]Ya Zhang, Chao-Hsien Chu, Yixin Chen, Hongyuan Zha, Xiang Ji:
Splice site prediction using support vector machines with a Bayes kernel. Expert Syst. Appl. 30(1): 73-81 (2006) - [j8]Chao-Hsien Chu, Hsin-Hui Lin:
Factors influencing the adoption of wireless technologies on campus. Int. J. Mob. Commun. 4(3): 291-308 (2006) - 2004
- [j7]Ya Zhang, Chao-Hsien Chu, Xiang Ji, Hongyuan Zha:
Correlating summarization of multi-source news with k-way graph bi-clustering. SIGKDD Explor. 6(2): 34-42 (2004) - 2001
- [j6]Dan Zhu, G. Premkumar, Xiaoning Zhang, Chao-Hsien Chu:
Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods. Decis. Sci. 32(4): 635-660 (2001) - [j5]Hsinghua Chou, G. Premkumar, Chao-Hsien Chu:
Genetic algorithms for communications network design - an empirical study of the factors that influence performance. IEEE Trans. Evol. Comput. 5(3): 236-249 (2001) - 2000
- [j4]G. Premkumar, Chao-Hsien Chu, Hsinghua Chou:
Telecommunications Network Design - Comparison of Alternative Approaches. Decis. Sci. 31(2): 483-506 (2000) - [j3]Chao-Hsien Chu, G. Premkumar, Hsinghua Chou:
Digital data networks design using genetic algorithms. Eur. J. Oper. Res. 127(1): 140-158 (2000) - 1997
- [j2]Chao-Hsien Chu:
An improved neural network for manufacturing cell formation. Decis. Support Syst. 20(4): 279-295 (1997) - 1994
- [j1]Chao-Hsien Chu, Djohan Widjaja:
Neural network system for forecasting method selection. Decis. Support Syst. 12(1): 13-24 (1994)
Conference and Workshop Papers
- 2021
- [c40]Haibo Cheng, Wenting Li, Ping Wang, Chao-Hsien Chu, Kaitai Liang:
Incrementally Updateable Honey Password Vaults. USENIX Security Symposium 2021: 857-874 - 2020
- [c39]Shen-Hang Huang, Wen-Yueh Shih, Jing-You Lu, Hao-Han Chang, Chao-Hsien Chu, Jun-Zhe Wang, Jiun-Long Huang, Tian-Shyr Dai:
Online Structural Break Detection for Pairs Trading Using Wavelet Transform and Hybrid Deep Learning Model. BigComp 2020: 209-216 - 2019
- [c38]Xiaodan Wu, Lingyu Cheng, Chao-Hsien Chu, Jungyoon Kim:
Using Deep Learning and Smartphone for Automatic Detection of Fall and Daily Activities. ICSH 2019: 61-74 - [c37]Xiaodan Wu, Zeyu Sui, Chao-Hsien Chu, Guanjie Huang:
Detection of Atrial Fibrillation from Short ECG Signals Using a Hybrid Deep Learning Model. ICSH 2019: 269-282 - [c36]Haibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang, Chao-Hsien Chu:
Probability Model Transforming Encoders Against Encoding Attacks. USENIX Security Symposium 2019: 1573-1590 - 2018
- [c35]Guanjie Huang, Chao-Hsien Chu, Xiaodan Wu:
A Deep Learning-Based Method for Sleep Stage Classification Using Physiological Signal. ICSH 2018: 249-260 - 2017
- [c34]Jing Liu, Ping Wang, Jinlong Lin, Chao-Hsien Chu:
Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems. BigDataSecurity/HPSC/IDS 2017: 219-224 - [c33]Jing Liu, Ping Wang, Jinlong Lin, Chao-Hsien Chu:
A Controller/Architecture Co-design Framework for Wireless Cyber-Physical Systems. iThings/GreenCom/CPSCom/SmartData 2017: 76-84 - 2015
- [c32]Meng Ma, Ping Wang, Chao-Hsien Chu:
LTCEP: Efficient Long-Term Event Processing for Internet of Things Data Streams. DSDIS 2015: 548-555 - 2014
- [c31]Jungyoon Kim, Chao-Hsien Chu:
ETD: An extended time delay algorithm for ventricular fibrillation detection. EMBC 2014: 6479-6482 - [c30]Meng Ma, Ping Wang, Chao-Hsien Chu:
Ontology-Based Semantic Modeling and Evaluation for Internet of Things Applications. iThings/GreenCom/CPSCom 2014: 24-30 - 2013
- [c29]Meng Ma, Ping Wang, Chao-Hsien Chu:
Data Management for Internet of Things: Challenges, Approaches and Opportunities. GreenCom/iThings/CPScom 2013: 1144-1151 - [c28]Meng Ma, Ping Wang, Chao-Hsien Chu:
A novel distributed algorithm for redundant reader elimination in RFID networks. RFID-TA 2013: 1-6 - 2012
- [c27]Meng Ma, Yu Huang, Chao-Hsien Chu, Ping Wang:
User-driven cloud transportation system for smart driving. CloudCom 2012: 658-665 - [c26]Yong Deng, Zhonghai Wu, Chao-Hsien Chu, Tao Yang:
Evaluating feature selection for stress identification. IRI 2012: 584-591 - 2011
- [c25]Rachida Parks, Chao-Hsien Chu, Heng Xu:
Healthcare Information Privacy Research: Iusses, Gaps and What Next? AMCIS 2011 - 2010
- [c24]Heng Xu, Rachida Parks, Chao-Hsien Chu, Xiaolong (Luke) Zhang:
Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding. AMCIS 2010: 503 - [c23]Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu:
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping. INFOCOM 2010: 2820-2828 - [c22]Akhil Kumar, Wen Yao, Chao-Hsien Chu, Zang Li:
Ensuring Compliance with Semantic Constraints in Process Adaptation with Rule-Based Event Processing. RuleML 2010: 50-65 - [c21]Zang Li, Chao-Hsien Chu, Wen Yao, Richard A. Behr:
Ontology-Driven Event Detection and Indexing in Smart Spaces. ICSC 2010: 285-292 - 2009
- [c20]Rachida Parks, Wen Yao, Chao-Hsien Chu:
RFID Privacy Concerns: A Conceptual Analysis in the Healthcare Sector. AMCIS 2009: 253 - 2008
- [c19]Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squicciarini, Dongwon Lee, Chao-Hsien Chu:
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. CollaborateCom 2008: 100-112 - [c18]Jie Li, Chao-Hsien Chu, Yunfeng Wang:
An In-depth Analysis of Fuzzy C-Means Clustering for Cellular Manufacturing. FSKD (1) 2008: 42-46 - 2007
- [c17]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Automaton segmentation: a new approach to preserve privacy in xml information brokering. CCS 2007: 508-518 - [c16]Xiaodan Wu, Chao-Hsien Chu, Yunfeng Wang, Fengli Liu, Dianmin Yue:
Privacy Preserving Data Mining Research: Current Status and Key Issues. International Conference on Computational Science (3) 2007: 762-772 - [c15]Shuihua Han, Chao-Hsien Chu, Shuangyuan Yang:
Content-based Image Authentication: Current Status, Issues, and Challenges. ICSC 2007: 630-636 - 2006
- [c14]Qijun Gu, Kun Bai, Hai Wang, Peng Liu, Chao-Hsien Chu:
Modeling of pollution in p2p file sharing systems. CCNC 2006: 1033-1037 - [c13]Xiaodan Wu, Yunfeng Wang, Chao-Hsien Chu, Fengli Liu, Ping Chen, Dianmin Yue:
A Close Look at Privacy Preserving Data Mining Methods. PACIS 2006: 32 - [c12]Chang-Chun Tsai, Chao-Hsien Chu, Xiaodan Wu:
An Evolutionary Fuzzy Multi-objective Approach to Cell Formation. SEAL 2006: 377-383 - [c11]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu:
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. SUTC (1) 2006: 252-259 - 2005
- [c10]Ya Zhang, Hongyuan Zha, Chao-Hsien Chu, Xiang Ji:
Protein Interaction Inference as a MAX-SAT Problem. CVPR Workshops 2005: 146 - [c9]Qijun Gu, Peng Liu, Sencun Zhu, Chao-Hsien Chu:
Defending against packet injection attacks unreliable ad hoc networks. GLOBECOM 2005: 5 - [c8]Ya Zhang, Hongyuan Zha, Chao-Hsien Chu:
A Time-Series Biclustering Algorithm for Revealing Co-Regulated Genes. ITCC (1) 2005: 32-37 - [c7]Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu:
KTR: an Efficient Key Management Scheme For Air Access Control. MobiQuitous 2005: 499-501 - [c6]Yiling Chen, Chao-Hsien Chu, Tracy Mullen, David M. Pennock:
Information markets vs. opinion pools: an empirical comparison. EC 2005: 58-67 - 2002
- [c5]Chao-Hsien Chu, Junhua Gu, Xiangdan Hou, Qijun Gu:
A heuristic ant algorithm for solving QoS multicast routing problem. IEEE Congress on Evolutionary Computation 2002: 1630-1635 - [c4]Xiaodan Wu, Chao-Hsien Chu, Yunfeng Wang, Weli Yan:
A genetic algorithm for integrated cell formation and layout decisions. IEEE Congress on Evolutionary Computation 2002: 1866-1871 - [c3]Jie Li, Chao-Hsien Chu, Yunfeng Wang, Weili Yan:
An improved fuzzy c-means algorithm for manufacturing cell formation. FUZZ-IEEE 2002: 1505-1510 - 2001
- [c2]Chao-Hsien Chu, Chang-Chun Tsai:
A heuristic genetic algorithm for grouping manufacturing cells. CEC 2001: 310-317 - 1999
- [c1]Chao-Hsien Chu, G. Premkumar, Carey Chou, Jianzhong Sun:
Dynamic Degree Constrained Network Design: A Genetic Algorithm Approach. GECCO 1999: 141-148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint