default search action
Chun-Jen Chung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Luyao Luo, Gongming Zhao, Hongli Xu, Chun-Jen Chung, Liguang Xie:
SMART: Dual-channel Southbound Message Delivery in Clouds with Rate Estimation. IWQoS 2024: 1-10 - 2023
- [j15]Gongming Zhao, Luyao Luo, Hongli Xu, Chun-Jen Chung, Liguang Xie:
Southbound Message Delivery With Virtual Network Topology Awareness in Clouds. IEEE/ACM Trans. Netw. 31(1): 248-263 (2023) - 2022
- [j14]Zhen Zeng, Zhun Yang, Dijiang Huang, Chun-Jen Chung:
LICALITY - Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning. IEEE Trans. Netw. Serv. Manag. 19(2): 1746-1760 (2022) - [c13]Zhen Zeng, Chun-Jen Chung, Liguang Xie:
Security Challenges for Modern Data Centers with IoT: A Preliminary Study. WWW (Companion Volume) 2022: 555-562
2010 – 2019
- 2019
- [c12]Yuli Deng, Duo Lu, Dijiang Huang, Chun-Jen Chung, Fanjie Lin:
Knowledge Graph based Learning Guidance for Cybersecurity Hands-on Labs. CompEd 2019: 194-200 - [c11]Dijiang Huang, Chun-Jen Chung, Qiuxiang Dong, Jim Luo, Myong H. Kang:
Building private blockchains over public blockchains (PoP): an attribute-based access control approach. SAC 2019: 355-363 - 2018
- [c10]Yuli Deng, Duo Lu, Chun-Jen Chung, Dijiang Huang, Zhen Zeng:
Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education. FIE 2018: 1-8 - [c9]Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang, Chun-Jen Chung:
Improving student learning performance in a virtual hands-on lab system in cybersecurity education. FIE 2018: 1-5 - [c8]Zhen Zeng, Yuli Deng, Sharon I-Han Hsiao, Dijiang Huang, Chun-Jen Chung:
Conceptualizing Student Engagement in Virtual Hands-on Lab: Preliminary Findings from a Computer Network Security Course (Abstract Only). SIGCSE 2018: 1073 - 2017
- [j13]Jin B. Hong, Dong Seong Kim, Chun-Jen Chung, Dijiang Huang:
A survey on the usability and practical applications of Graphical Security Models. Comput. Sci. Rev. 26: 1-16 (2017) - [c7]Yuli Deng, Dijiang Huang, Chun-Jen Chung:
ThoTh Lab: A Personalized Learning Framework for CS Hands-on Projects (Abstract Only). SIGCSE 2017: 706 - 2015
- [j12]Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, Chun-Jen Chung:
Efficient Attribute-Based Comparable Data Access Control. IEEE Trans. Computers 64(12): 3430-3443 (2015) - [c6]Chun-Jen Chung, Tianyi Xing, Dijiang Huang, Deep Medhi, Kishor S. Trivedi:
SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment. DSN Workshops 2015: 4-11 - [c5]Jin B. Hong, Chun-Jen Chung, Dijiang Huang, Dong Seong Kim:
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. ICA3PP (Workshops and Symposiums) 2015: 582-592 - 2014
- [j11]Shingo Ata, Dijiang Huang, Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Chun-Jen Chung, Yasuhiro Sato, Deep Medhi:
SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet. Comput. Networks 63: 128-146 (2014) - 2013
- [j10]Chun-Jen Chung:
Investigating imperfect process and demand effects on inspection scheduling and supply chain replenishment policy. Comput. Ind. Eng. 64(1): 31-44 (2013) - [j9]Chun-Jen Chung, Hui-Ming Wee, Yi-Li Chen:
Retailer's replenishment policy for deteriorating item in response to future cost increase and incentive-dependent sale. Math. Comput. Model. 57(3-4): 536-550 (2013) - [j8]Chun-Jen Chung:
An easy method to derive the integrated vendor-buyer production-inventory model with backordering using cost-difference rate comparison approach. Math. Comput. Model. 57(3-4): 632-640 (2013) - [j7]Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, Dijiang Huang:
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. IEEE Trans. Dependable Secur. Comput. 10(4): 198-211 (2013) - [c4]Chun-Jen Chung, Jingsong Cui, Pankaj Khatkar, Dijiang Huang:
Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations. CollaborateCom 2013: 21-30 - [c3]Tianyi Xing, Dijiang Huang, Le Xu, Chun-Jen Chung, Pankaj Khatkar:
SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment. GREE 2013: 89-92 - 2012
- [j6]Chun-Jen Chung, Hui-Ming Wee:
Economic replenishment Plan with Imperfect Production Process and Business-Return Dependent Demand. Asia Pac. J. Oper. Res. 29(6) (2012) - [c2]Tianyi Xing, Xuan Liu, Chun-Jen Chung, Akira Wada, Shingo Ata, Dijiang Huang, Deep Medhi:
Constructing a virtual networking environment in a Geo-distributed programmable layer-2 networking environment (G-PLaNE). ICC 2012: 5879-5884 - 2010
- [j5]Chun-Jen Chung, Hui-Ming Wee:
Green-product-design value and information-technology investment on replenishment model with remanufacturing. Int. J. Comput. Integr. Manuf. 23(5): 466-485 (2010)
2000 – 2009
- 2009
- [j4]Hui-Ming Wee, Wan-Tsu Wang, Chun-Jen Chung:
A modified method to compute economic order quantities without derivatives by cost-difference comparisons. Eur. J. Oper. Res. 194(1): 336-338 (2009) - 2007
- [j3]Chun-Jen Chung, Hui-Ming Wee:
Optimal replenishment Policy for an Integrated Supplier-buyer deteriorating inventory Model Considering Multiple JIT Delivery and Other Cost Functions. Asia Pac. J. Oper. Res. 24(1): 125-145 (2007) - [j2]Hui-Ming Wee, Chun-Jen Chung:
A note on the economic lot size of the integrated vendor-buyer inventory system derived without derivatives. Eur. J. Oper. Res. 177(2): 1289-1293 (2007) - [j1]Chun-Jen Chung, Hui-Ming Wee:
Optimizing the economic lot size of a three-stage supply chain with backordering derived without derivatives. Eur. J. Oper. Res. 183(2): 933-943 (2007) - 2006
- [c1]Hui-Ming Wee, Chun-Jen Chung:
A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process. ICCSA (3) 2006: 862-874
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint