default search action
Bo-Chao Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Van-Linh Nguyen, Ren-Hung Hwang, Bo-Chao Cheng, Ying-Dar Lin, Trung Q. Duong:
Understanding Privacy Risks of High-Accuracy Radio Positioning and Sensing in Wireless Networks. IEEE Commun. Mag. 62(5): 104-111 (2024) - 2021
- [j23]Shih-Hung Chang, Huan Chen, Bo-Chao Cheng:
Time-predictable routing algorithm for Time-Sensitive Networking: Schedulable guarantee of Time-Triggered streams. Comput. Commun. 172: 183-195 (2021) - [j22]Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin:
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges. IEEE Commun. Surv. Tutorials 23(4): 2384-2428 (2021) - [c21]Jun-Wei Chang, Huan Chen, Krishna Kambhampaty, Bo-Chao Cheng:
An Automatic Indoor Positioning Robot System Using Panorama Feature Matching. DMSVIVA 2021: 63-69 - [i1]Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin:
Security and privacy for 6G: A survey on prospective technologies and challenges. CoRR abs/2108.11861 (2021) - 2020
- [c20]Tzu-Hsiu Chen, Chung-Hsun Huang, Yuan-Sun Chu, Bo-Chao Cheng:
Towards Efficient Neural Network on Edge Devices via Statistical Weight Pruning. GCCE 2020: 192-193
2010 – 2019
- 2018
- [c19]Kai-Tse Cheng, Chung-Hsun Huang, Yuan-Sun Chu, Bo-Chao Cheng, Pin-Sheng Cheng Chou:
Low Cost Super-Resolution Scaling for Images with Over-Exposed and Saturated Scenes. GCCE 2018: 545-546 - 2017
- [j21]Yu-Chun Cheng, Huan Chen, Bo-Chao Cheng:
Special point representations for reducing data space requirements of finger-vein recognition applications. Multim. Tools Appl. 76(9): 11251-11271 (2017) - [c18]Shih-Hung Chang, Timothy William, Wei-Zi Wu, Bo-Chao Cheng, Huan Chen, Ping-Hai Hsu:
Design of an authentication and key management system for a smart meter gateway in AMI. GCCE 2017: 1-2 - [c17]Huan Chen, Yao-Chung Fan, Bo-Chao Cheng, Hong-Zhou Huang:
Statistical learning based consumer electronic devices detection for smart grid. GCCE 2017: 1-2 - 2016
- [j20]Jong Hyuk Park, Stefanos Gritzalis, Bo-Chao Cheng, Ning Zhang:
Challenges and opportunities in next-generation cyberspace security. Secur. Commun. Networks 9(6): 455-456 (2016) - [c16]Hong-Kai Wang, Bo-Chao Cheng, Huan Chen, Ping-Hai Hsu:
User daily behavior disturbance model to preserve privacy for smart metering. GCCE 2016: 1-2 - 2015
- [j19]Bo-Chao Cheng, Guo-Tan Liao, Yuan-Fu Chen, Huan Chen:
E-Cube+ Routing Protocol for Wireless Sensor Networks in the Presence of Network Failures. Int. J. Distributed Sens. Networks 11: 231514:1-231514:11 (2015) - [c15]Pierre Pascal Lindenberg, Bo-Chao Cheng, Yu-Ling Hsueh:
Novel location privacy protection strategies for Location-Based Services. ICUFN 2015: 866-870 - 2014
- [j18]Bo-Chao Cheng, Guo-Tan Liao, Hsu-Chen Huang, Ping-Hai Hsu:
Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics. Ann. des Télécommunications 69(7-8): 379-389 (2014) - [j17]Huan Chen, Bo-Chao Cheng, Guo-Tan Liao, Ting-Chun Kuo:
Hybrid classification engine for cardiac arrhythmia cloud service in elderly healthcare management. J. Vis. Lang. Comput. 25(6): 745-753 (2014) - [j16]Ya-Chi Hsu, Bo-Chao Cheng, Huan Chen, Yuan-Sun Chu:
Athena: capacity enhancement of reversible data hiding with consideration of the adaptive embedding level. J. Vis. Lang. Comput. 25(6): 782-790 (2014) - [c14]Huan Chen, Bo-Chao Cheng, Guo-Tan Liao, Min-Sheng Chien, Ting-Chun Kuo:
Hybrid Classification Engine for Cardiac Arrhythmia Cloud Service in Elderly Healthcare Management. DMS 2014: 128-134 - [c13]Ya-Chi Hsu, Bo-Chao Cheng, Huan Chen, Yuan-Sun Chu:
Athena: Capacity Enhancement of Reversible Data Hiding with Consideration of the Adaptive Embedding Level. DMS 2014: 168-174 - [c12]Huan Chen, Guo-Tan Liao, Yao-Chung Fan, Bo-Chao Cheng, Cheng-Min Chen, Ting-Chun Kuo:
Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology. SAC 2014: 33-35 - 2012
- [j15]Bo-Chao Cheng, Guo-Tan Liao, Ryh-Yuh Tseng, Ping-Hai Hsu:
Network lifetime bounds for hierarchical wireless sensor networks in the presence of energy constraints. Comput. Networks 56(2): 820-831 (2012) - [c11]Ya-Ling Chen, Hsueh-Lin Chen, Chia-I Lin, Bo-Chao Cheng, Guo-Tan Liao, Ting-Chun Yin, Kuo-Yang Hung:
iPAT: Intelligent privacy-preserving administration tool for IRB applications. Healthcom 2012: 494-497 - [c10]Bo-Chao Cheng, Guo-Tan Liao, Chun-Yu Chen, Huan Chen:
A Multi-level Fuzzy Comprehensive Evaluation Approach for Message Verification in VANETs. MUSIC 2012: 176-181 - [c9]Bo-Chao Cheng, Guo-Tan Liao, Ching-Kai Lin, Shih-Chun Hsu, Ping-Hai Hsu, Jong Hyuk Park:
MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis. NPC 2012: 101-109 - 2011
- [j14]Bo-Chao Cheng, Ryh-Yuh Tseng:
A Context Adaptive Intrusion Detection System for MANET. Comput. Commun. 34(3): 310-318 (2011) - [j13]Bo-Chao Cheng, Guo-Tan Liao, Chu-Chun Huang, Ming-Tse Yu:
A Novel Probabilistic Matching Algorithm for Multi-Stage Attack Forecasts. IEEE J. Sel. Areas Commun. 29(7): 1438-1448 (2011) - [j12]Bo-Chao Cheng, Hsi-Hsun Yeh, Ping-Hai Hsu:
Schedulability Analysis for Hard Network Lifetime Wireless Sensor Networks With High Energy First Clustering. IEEE Trans. Reliab. 60(3): 675-688 (2011) - 2010
- [j11]Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng:
Quality assurance evidence collection model for MSN forensics. J. Intell. Manuf. 21(5): 613-622 (2010) - [j10]Bo-Chao Cheng, Yi-An Tsai, Guo-Tan Liao, Eui-Seok Byeon:
HMM machine learning and inference for Activities of Daily Living recognition. J. Supercomput. 54(1): 29-42 (2010)
2000 – 2009
- 2009
- [j9]Huan Chen, Bo-Chao Cheng, Po-Kai Tseng:
Cognitive Shortest Path Tree Restoration (CSPTR) for MANET Using Cost-Sensitivity Analysis. IEICE Trans. Commun. 92-B(3): 717-727 (2009) - [j8]Bo-Chao Cheng, Huan Chen, Guo-Tan Liao:
FBT: an efficient traceback scheme in hierarchical wireless sensor network. Secur. Commun. Networks 2(2): 133-144 (2009) - [c8]Ming-Jen Chen, Kuan-Ping Chien, Chia-Ying Huang, Bo-Chao Cheng, Yuan-Sun Chu:
An ASIC for SMTP Intrusion Prevention System. ISCAS 2009: 1847-1850 - 2008
- [j7]Bo-Chao Cheng, Huan Chen, Yi-Jean Li, Ryh-Yuh Tseng:
A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks. Comput. Commun. 31(18): 4352-4359 (2008) - [j6]Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng:
A Good IDS Response Protocol of MANET Containment Strategies. IEICE Trans. Commun. 91-B(11): 3657-3666 (2008) - [c7]Bo-Chao Cheng, Huan Chen, Guo-Tan Liao:
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. Inscrypt 2008: 265-274 - 2007
- [j5]Huan Chen, Hui-Kai Su, Bo-Chao Cheng:
An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks. Comput. Commun. 30(16): 3055-3062 (2007) - [c6]Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng:
A Theoretical Security Model for Access Control and Security Assurance. IAS 2007: 137-142 - [c5]Bo-Chao Cheng, Ming-Jen Chen, Yuan-Sun Chu, Andrew Chen, Sujadi Yap, Kuo-Pao Fan:
SIPS: A Stateful and Flow-Based Intrusion Prevention System for Email Applications. NPC 2007: 334-343 - 2006
- [c4]Bo-Chao Cheng, Huan Chen:
Quality Assurance for Evidence Collection in Network Forensics. WISA 2006: 121-132 - 2005
- [c3]Bo-Chao Cheng, Ching-Fu Huang, Wei-Chi Chang, Cheng-Shong Wu:
Developing and Implementing IHPM on IXP 425 Network Processor Platforms. WISA 2005: 218-231 - 2001
- [j4]Bo-Chao Cheng, Alexander D. Stoyen, Thomas J. Marlowe, Sanjoy K. Baruah:
Bounds on tardiness in scheduling of precedence-constrained unit real-time task systems. Comput. Electr. Eng. 27(4): 345-354 (2001)
1990 – 1999
- 1997
- [j3]Bo-Chao Cheng, Alexander D. Stoyenko, Thomas J. Marlowe, Sanjoy K. Baruah:
LSTF: A new scheduling policy for complex real-time tasks in multiple processor systems. Autom. 33(5): 921-926 (1997) - [j2]Tsong-Ho Wu, Ibrahim Korpeoglu, Bo-Chao Cheng:
Distributed interactive video system design and analysis. IEEE Commun. Mag. 35(3): 100-108 (1997) - [c2]Deh-phone Hsing, Bo-Chao Cheng, Goksel Goncu, Latha A. Kant:
A Restoration Methodology Based on Pre-Planned Source Routing in ATM Networks. ICC (1) 1997: 277-282 - 1996
- [c1]Bo-Chao Cheng, Thomas J. Marlowe, Alexander D. Stoyenko, Sanjoy K. Baruah:
The Allocation and Scheduling Precedence and Timing-Constrained Tasks with communication Delays. ICECCS 1996: 91-94 - 1994
- [j1]Alexander D. Stoyenko, Lonnie R. Welch, Bo-Chao Cheng:
Response time prediction in object-based, parallel embedded systems. Microprocess. Microprogramming 40(2-3): 135-150 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint