default search action
Shi-Chun Tsai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j48]Jing-You Lin, Shi-Chun Tsai:
A note on the k-restriction problem. Inf. Process. Lett. 187: 106515 (2025) - 2023
- [c28]Ting-Yu Kuo, Yu-Han Chen, Andrea Frosini, Sun-Yuan Hsieh, Shi-Chun Tsai, Mong-Jen Kao:
On Min-Max Graph Balancing with Strict Negative Correlation Constraints. ISAAC 2023: 50:1-50:15 - [c27]Meng-Tsung Tsai, Shi-Chun Tsai, Tsung-Ta Wu:
Dependent k-Set Packing on Polynomoids. MFCS 2023: 84:1-84:15 - 2022
- [j47]Bo-Ying Huang, Shi-Chun Tsai:
Solving hard-exploration problems with counting and replay approach. Eng. Appl. Artif. Intell. 110: 104701 (2022) - [j46]Da-Ren Chen, Min-Zheng Shieh, Shi-Chun Tsai:
The complexity of comparing optimal solutions. Inf. Process. Lett. 177: 106266 (2022) - 2021
- [c26]Chung-Hsuan Tsai, Shi-Chun Tsai, Shih-Kun Huang:
REST API Fuzzing by Coverage Level Guided Blackbox Testing. QRS 2021: 291-300 - [i6]Chung-Hsuan Tsai, Shi-Chun Tsai, Shih-Kun Huang:
REST API Fuzzing by Coverage Level Guided Blackbox Testing. CoRR abs/2112.15485 (2021) - 2020
- [j45]Yi-Chih Kao, Jui-Chun Liu, Yi-Quan Ke, Shi-Chun Tsai, Yi-Bing Lin:
Dual-Stack Network Management Through One-Time Authentication Mechanism. IEEE Access 8: 34706-34716 (2020) - [j44]I-Huan Chiang, Chung-Ming Huang, Nien-Hu Cheng, Hsin-Yu Liu, Shi-Chun Tsai:
Efficient Exploration in Side-Scrolling Video Games with Trajectory Replay. Comput. Games J. 9(3): 263-280 (2020) - [j43]Yi-Ren Chen, Amir Rezapour, Wen-Guey Tzeng, Shi-Chun Tsai:
RL-Routing: An SDN Routing Algorithm Based on Deep Reinforcement Learning. IEEE Trans. Netw. Sci. Eng. 7(4): 3185-3199 (2020) - [c25]Min-Zheng Shieh, Jui-Chun Liu, Yi-Chih Kao, Shi-Chun Tsai, Yi-Bing Lin:
OAuth-Based Access Control Framework for IoT Systems. SGIoT 2020: 208-219
2010 – 2019
- 2019
- [j42]Yi-Bing Lin, Tse-Jui Huang, Shi-Chun Tsai:
Enhancing 5G/IoT Transport Security Through Content Permutation. IEEE Access 7: 94293-94299 (2019) - [j41]Yi-Chih Kao, Jui-Chun Liu, You-Hong Wang, Yu-Huang Chu, Shi-Chun Tsai, Yi-Bing Lin:
Automatic Blocking Mechanism for Information Security with SDN. J. Internet Serv. Inf. Secur. 9(1): 60-73 (2019) - [j40]Jui-Chun Liu, Yi-Quan Ke, Yi-Chih Kao, Shi-Chun Tsai, Yi-Bing Lin:
A Dual-Stack Authentication Mechanism Through SNMP. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(4): 31-45 (2019) - [j39]Yi-Bing Lin, Ching-Chun Huang, Shi-Chun Tsai:
SDN Soft Computing Application for Detecting Heavy Hitters. IEEE Trans. Ind. Informatics 15(10): 5690-5699 (2019) - 2018
- [j38]Shi-Chun Tsai, Ming-Chuan Yang:
Representing Symmetric Boolean Functions with Polynomial over Composite Moduli. J. Inf. Sci. Eng. 34(1): 193-203 (2018) - [j37]Shang-Chiuan Su, Yi-Ren Chen, Shi-Chun Tsai, Yi-Bing Lin:
Detecting P2P Botnet in Software Defined Networks. Secur. Commun. Networks 2018: 4723862:1-4723862:13 (2018) - [c24]Young-Zhe Liao, Shi-Chun Tsai:
Fast Failover with Hierarchical Disjoint Paths in SDN. GLOBECOM 2018: 1-7 - [c23]Yen-Ting Chen, Meng-Tsung Tsai, Shi-Chun Tsai:
A Dichotomy Result for Cyclic-Order Traversing Games. ISAAC 2018: 29:1-29:13 - 2017
- [j36]Huai-Wen Hsu, Kuei-Li Huang, Yi-Chih Kao, Shi-Chun Tsai, Yi-Bing Lin:
Deploying WLAN service with OpenFlow technology. Int. J. Netw. Manag. 27(3) (2017) - [c22]Chih-Chieh Chen, Yi-Ren Chen, Shi-Chun Tsai, Ming-Chuan Yang:
Forwarding path discovery with software defined networking. APNOMS 2017: 299-302 - [c21]Jinlin Chen, Yi-Ren Chen, Shi-Chun Tsai, Yi-Bing Lin:
Implementing NFV system with OpenStack. DSC 2017: 188-194 - [c20]Chih-Chieh Chen, Yi-Ren Chen, Wei-Chih Lu, Shi-Chun Tsai, Ming-Chuan Yang:
Detecting amplification attacks with Software Defined Networking. DSC 2017: 195-201 - [c19]Shan-Jung Fu, Huai-Wen Hsu, Yi-Chih Kao, Shi-Chun Tsai, Chien-Chao Tseng:
An autoblocking mechanism for firewall service. DSC 2017: 531-532 - 2015
- [c18]Chia-Jung Lee, Satyanarayana V. Lokam, Shi-Chun Tsai, Ming-Chuan Yang:
Restrictions of nondegenerate Boolean functions and degree lower bounds over different rings. ISIT 2015: 501-505 - [i5]Chia-Jung Lee, Satya V. Lokam, Shi-Chun Tsai, Ming-Chuan Yang:
On Restricting No-Junta Boolean Function and Degree Lower Bounds by Polynomial Method. CoRR abs/1502.00357 (2015) - 2014
- [j35]Ting-Yu Lin, Shi-Chun Tsai, Wen-Nung Tsai, Jong-Chuang Tsay:
More on the one-dimensional sliding-coin puzzle. Discret. Appl. Math. 162: 32-41 (2014) - [j34]Tao-Wei Chiou, Shi-Chun Tsai, Yi-Bing Lin:
Network security management with traffic pattern clustering. Soft Comput. 18(9): 1757-1770 (2014) - [c17]Chia-Jung Lee, Shi-Chun Tsai, Ming-Chuan Yang:
Online Prediction Problems with Variation. COCOON 2014: 49-60 - 2012
- [j33]Min-Zheng Shieh, Shi-Chun Tsai, Ming-Chuan Yang:
On the inapproximability of maximum intersection problems. Inf. Process. Lett. 112(19): 723-727 (2012) - [j32]Min-Zheng Shieh, Shi-Chun Tsai:
Inapproximability Results for the Weight Problems of Subgroup Permutation Codes. IEEE Trans. Inf. Theory 58(11): 6907-6915 (2012) - 2011
- [j31]Chi-Jen Lu, Shi-Chun Tsai, Hsin-Lung Wu:
Complexity of Hard-Core Set Proofs. Comput. Complex. 20(1): 145-171 (2011) - [j30]Chia-Jung Lee, Te-Tsung Lin, Min-Zheng Shieh, Shi-Chun Tsai, Hsin-Lung Wu:
Decoding permutation arrays with ternary vectors. Des. Codes Cryptogr. 61(1): 1-9 (2011) - [j29]Chia-Jung Lee, Shi-Chun Tsai:
Alternating Runs of Geometrically Distributed Random Variables. J. Inf. Sci. Eng. 27(3): 1029-1044 (2011) - [j28]Min-Zheng Shieh, Shi-Chun Tsai:
Improved Bound on Approximating Jug Measuring Problem. J. Inf. Sci. Eng. 27(3): 1159-1163 (2011) - [j27]Li-Jui Chen, Jinn-Jy Lin, Min-Zheng Shieh, Shi-Chun Tsai:
More on the Magnus-Derek game. Theor. Comput. Sci. 412(4-5): 339-344 (2011) - [j26]Chung-Li Hou, Chang-Chun Lu, Shi-Chun Tsai, Wen-Guey Tzeng:
An Optimal Data Hiding Scheme With Tree-Based Parity Check. IEEE Trans. Image Process. 20(3): 880-886 (2011) - [j25]Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai:
Extracting Computational Entropy and Learning Noisy Linear Functions. IEEE Trans. Inf. Theory 57(8): 5485-5496 (2011) - [c16]Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai:
Computational Randomness from Generalized Hardcore Sets. FCT 2011: 78-89 - [c15]Min-Zheng Shieh, Shi-Chun Tsai:
Computing the ball size of frequency permutations under chebyshev distance. ISIT 2011: 2100-2104 - [i4]Min-Zheng Shieh, Shi-Chun Tsai:
Computing the Ball Size of Frequency Permutations under Chebyshev Distance. CoRR abs/1102.2799 (2011) - 2010
- [j24]Torleiv Kløve, Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng:
Permutation arrays under the Chebyshev distance. IEEE Trans. Inf. Theory 56(6): 2611-2617 (2010) - [j23]Min-Zheng Shieh, Shi-Chun Tsai:
Decoding Frequency Permutation Arrays Under Chebyshev Distance. IEEE Trans. Inf. Theory 56(11): 5730-5737 (2010) - [j22]Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai:
Deterministic Extractors for Independent-Symbol Sources. IEEE Trans. Inf. Theory 56(12): 6501-6512 (2010) - [c14]Min-Zheng Shieh, Shi-Chun Tsai:
On the minimum weight problem of permutation codes under Chebyshev distance. ISIT 2010: 1183-1187 - [i3]Min-Zheng Shieh, Shi-Chun Tsai:
On the minimum weight problem of permutation codes under Chebyshev distance. CoRR abs/1005.5591 (2010)
2000 – 2009
- 2009
- [j21]Shi-Chun Tsai, Wen-Guey Tzeng, Kun-Yi Zhou:
Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3): 1218-1222 (2009) - [c13]Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai:
Extracting Computational Entropy and Learning Noisy Linear Functions. COCOON 2009: 338-347 - [c12]Shi-Chun Tsai, Min-Zheng Shieh:
Decoding frequency permutation arrays under infinite norm. ISIT 2009: 2713-2717 - [i2]Min-Zheng Shieh, Shi-Chun Tsai:
Decoding Frequency Permutation Arrays under Infinite norm. CoRR abs/0901.1971 (2009) - [i1]Torleiv Kløve, Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng:
Permutation Arrays Under the Chebyshev Distance. CoRR abs/0907.2682 (2009) - 2008
- [j20]Min-Zheng Shieh, Shi-Chun Tsai:
Jug measuring: Algorithms and complexity. Theor. Comput. Sci. 396(1-3): 50-62 (2008) - [j19]Te-Tsung Lin, Shi-Chun Tsai, Hsin-Lung Wu:
Simple Distance-Preserving Mappings From Ternary Vectors to Permutations. IEEE Trans. Inf. Theory 54(7): 3251-3256 (2008) - [j18]Chi-Jen Lu, Shi-Chun Tsai, Hsin-Lung Wu:
On the Complexity of Hardness Amplification. IEEE Trans. Inf. Theory 54(10): 4575-4586 (2008) - [c11]Shiang-Ming Huang, Quincy Wu, Shi-Chun Tsai:
A Monte Carlo Method for Estimating the Extended All-Terminal Reliability. ICNS 2008: 122-127 - [c10]Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng:
Efficient encoding and decoding with permutation arrays. ISIT 2008: 211-214 - 2007
- [j17]Ying-Jie Liao, Min-Zheng Shieh, Shi-Chun Tsai:
Arranging Numbers on Circles to Reach Maximum Total Variations. Electron. J. Comb. 14(1) (2007) - [j16]Chi-Jen Lu, Shi-Chun Tsai, Hsin-Lung Wu:
Improved hardness amplification in NP. Theor. Comput. Sci. 370(1-3): 293-298 (2007) - [j15]Ming Yu Hsieh, Shi-Chun Tsai:
On the fairness and complexity of generalized k-in-a-row games. Theor. Comput. Sci. 385(1-3): 88-100 (2007) - [c9]Chi-Jen Lu, Shi-Chun Tsai, Hsin-Lung Wu:
Impossibility Results on Weakly Black-Box Hardness Amplification. FCT 2007: 400-411 - [c8]Chi-Jen Lu, Shi-Chun Tsai, Hsin-Lung Wu:
On the Complexity of Hard-Core Set Constructions. ICALP 2007: 183-194 - [c7]Jheng-Ru Ou, Shi-Chun Tsai, Wen-Guey Tzeng:
Efficient Large-Scale Distributed Key Generation against Burst Interruption. SECRYPT 2007: 197-203 - 2006
- [j14]Yen-Ying Huang, Shi-Chun Tsai, Hsin-Lung Wu:
On the Construction of Permutation Arrays via Mappings from Binary Vectors to Permutations. Des. Codes Cryptogr. 40(2): 139-155 (2006) - [c6]Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai:
Deterministic Extractors for Independent-Symbol Sources. ICALP (1) 2006: 84-95 - 2005
- [j13]Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai, Wen-Guey Tzeng:
Extracting randomness from multiple independent sources. IEEE Trans. Inf. Theory 51(6): 2224-2227 (2005) - [j12]Shi-Chun Tsai, Wen-Guey Tzeng, Hsin-Lung Wu:
On the Jensen-Shannon Divergence and Variational Distance. IEEE Trans. Inf. Theory 51(9): 3333-3336 (2005) - [c5]Chi-Jen Lu, Shi-Chun Tsai, Hsin-Lung Wu:
On the Complexity of Hardness Amplification. CCC 2005: 170-182 - 2003
- [j11]Chang-Chun Lu, Shi-Chun Tsai:
A note on unscrambling address lines. Inf. Process. Lett. 85(4): 185-189 (2003) - [j10]Jen-Chun Chang, Rong-Jaye Chen, Torleiv Kløve, Shi-Chun Tsai:
Distance-preserving mappings from binary vectors to permutations. IEEE Trans. Inf. Theory 49(4): 1054-1059 (2003) - [j9]Chingren Lee, Jenq Kuen Lee, TingTing Hwang, Shi-Chun Tsai:
Compiler optimization on VLIW instruction scheduling for low power. ACM Trans. Design Autom. Electr. Syst. 8(2): 252-268 (2003) - 2001
- [j8]Shi-Chun Tsai:
A Depth 3 Circuit Lower Bound for the Parity Function. J. Inf. Sci. Eng. 17(5): 857-860 (2001) - [j7]Chi-Jen Lu, Shi-Chun Tsai:
A Note on Iterating an alpha-ary Gray Code. SIAM J. Discret. Math. 14(2): 237-239 (2001) - [j6]Ding-Yi Chen, Tyng-Ruey Chuang, Shi-Chun Tsai:
JGAP: a Java-based graph algorithms platform. Softw. Pract. Exp. 31(7): 615-635 (2001) - 2000
- [j5]Katalin Friedl, Shi-Chun Tsai:
Two Results on the Bit Extraction Problem. Discret. Appl. Math. 99(1-3): 443-454 (2000) - [j4]Keh-Ning Chang, Shi-Chun Tsai:
Exact solution of a minimal recurrence. Inf. Process. Lett. 75(1-2): 61-64 (2000) - [j3]Janos Simon, Shi-Chun Tsai:
On the bottleneck counting argument. Theor. Comput. Sci. 237(1-2): 429-437 (2000) - [c4]Chingren Lee, Jenq Kuen Lee, TingTing Hwang, Shi-Chun Tsai:
Compiler Optimization on Instruction Scheduling for Low Power. ISSS 2000: 55-61
1990 – 1999
- 1997
- [c3]Janos Simon, Shi-Chun Tsai:
A Note on the Bottleneck Counting Argument. CCC 1997: 297-301 - 1996
- [j2]Katalin Friedl, Shi-Chun Tsai:
Recycling Random Bits in Parallel. Parallel Algorithms Appl. 8(1): 85-94 (1996) - [j1]Shi-Chun Tsai:
Lower Bounds on Representing Boolean Functions as Polynomials in Zm. SIAM J. Discret. Math. 9(1): 55-62 (1996) - 1995
- [c2]Katalin Friedl, Shi-Chun Tsai:
Recycling random bits in parallel. HICSS (2) 1995: 14-19 - 1993
- [c1]Shi-Chun Tsai:
Lower Bounds on Representing Boolean Functions as Polynomials in Zm. SCT 1993: 96-101
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint