洪西進 (Shi-Jinn Horng)
洪西進 (Shi-Jinn Horng)
國立台灣科技大學 資訊工程系
Verified email at mail.ntust.edu.tw
Title
Cited by
Cited by
Year
A novel intrusion detection system based on hierarchical clustering and support vector machines
SJ Horng, MY Su, YH Chen, TW Kao, RJ Chen, JL Lai, CD Perkasa
Expert systems with Applications 38 (1), 306-313, 2011
4872011
An efficient watermarking method based on significant difference of wavelet coefficient quantization
WH Lin, SJ Horng, TW Kao, P Fan, CL Lee, Y Pan
IEEE Transactions on Multimedia 10 (5), 746-757, 2008
2472008
Performance evaluation of score level fusion in multimodal biometric systems
M He, SJ Horng, P Fan, RS Run, RJ Chen, JL Lai, MK Khan, KO Sentosa
Pattern Recognition 43 (5), 1789-1800, 2010
2382010
An improved method for forecasting enrollments based on fuzzy time series and particle swarm optimization
IH Kuo, SJ Horng, TW Kao, TL Lin, CL Lee, Y Pan
Expert Systems with applications 36 (3), 6108-6117, 2009
2362009
An efficient job-shop scheduling algorithm based on particle swarm optimization
TL Lin, SJ Horng, TW Kao, YH Chen, RS Run, RJ Chen, JL Lai, IH Kuo
Expert Systems with Applications 37 (3), 2629-2636, 2010
2222010
An improved SVD-based watermarking technique for copyright protection
RS Run, SJ Horng, JL Lai, TW Kao, RJ Chen
Expert Systems with applications 39 (1), 673-689, 2012
1912012
A blind watermarking method using maximum wavelet coefficient quantization
WH Lin, YR Wang, SJ Horng, TW Kao, Y Pan
Expert Systems with Applications 36 (9), 11509-11516, 2009
1692009
b-SPECS+: Batch verification for secure pseudonymous authentication in VANET
SJ Horng, SF Tzeng, Y Pan, P Fan, X Wang, T Li, MK Khan
IEEE Transactions on Information Forensics and Security 8 (11), 1860-1875, 2013
1612013
An efficient phishing webpage detector
M He, SJ Horng, P Fan, MK Khan, RS Run, JL Lai, RJ Chen, A Sutanto
Expert systems with applications 38 (10), 12018-12027, 2011
1382011
A decision-theoretic rough set approach for dynamic data mining
H Chen, T Li, C Luo, SJ Horng, G Wang
IEEE Transactions on fuzzy Systems 23 (6), 1958-1970, 2015
1312015
An efficient flow-shop scheduling algorithm based on a hybrid particle swarm optimization model
IH Kuo, SJ Horng, TW Kao, TL Lin, CL Lee, T Terano, Y Pan
Expert systems with applications 36 (3), 7027-7032, 2009
1302009
A novel anti-collision algorithm in RFID systems for identifying passive tags
YH Chen, SJ Horng, RS Run, JL Lai, RJ Chen, WC Chen, Y Pan, T Takao
IEEE Transactions on Industrial Informatics 6 (1), 105-121, 2009
1252009
Forecasting TAIFEX based on fuzzy time series and particle swarm optimization
IH Kuo, SJ Horng, YH Chen, RS Run, TW Kao, RJ Chen, JL Lai, TL Lin
Expert Systems with Applications 37 (2), 1494-1502, 2010
1232010
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
SJ Horng, SF Tzeng, PH Huang, X Wang, T Li, MK Khan
Information Sciences 317, 48-66, 2015
1062015
Temperature prediction and TAIFEX forecasting based on fuzzy relationships and MTPSO techniques
LY Hsu, SJ Horng, TW Kao, YH Chen, RS Run, RJ Chen, JL Lai, IH Kuo
Expert Systems with Applications 37 (4), 2756-2770, 2010
992010
A wavelet-tree-based watermarking method using distance vector of binary cluster
WH Lin, YR Wang, SJ Horng
Expert Systems with Applications 36 (6), 9869-9878, 2009
972009
A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization
YL Huang, SJ Horng, M He, P Fan, TW Kao, MK Khan, JL Lai, IH Kuo
Expert Systems with Applications 38 (7), 8014-8023, 2011
862011
A blind reversible method for watermarking relational databases based on a time-stamping protocol
ME Farfoura, SJ Horng, JL Lai, RS Run, RJ Chen, MK Khan
Expert Systems with Applications 39 (3), 3185-3196, 2012
852012
Copyright protection for e-government document images
D Rosiyadi, SJ Horng, P Fan, X Wang, MK Khan, Y Pan
IEEE MultiMedia 19 (3), 62-73, 2011
842011
Applying an online game-based formative assessment in a flowchart-based intelligent tutoring system for improving problem-solving skills
D Hooshyar, RB Ahmad, M Yousefi, M Fathi, SJ Horng, H Lim
Computers & Education 94, 18-36, 2016
832016
The system can't perform the operation now. Try again later.
Articles 1–20