Publication Lists

Book Chapters

  1. Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang, "Chapter 1: On regular reliability models," Systems and Bayesian Reliability, Eds. Y. Hayakawa, T. Irony and M. Xie, World Scientific, March 2002. (ISBN 981-02-4865-2) (NSC91-2213-E-159-007-)
  2. Jen-Chun Chang and Frank K. Hwang, "Chapter 3: Reliabilities of consecutive-k systems," Handbook of Reliability Engineering, Ed. H. Pham, Springer, April 2003. (ISBN 1-85233-453-3) (NSC92-2213-E-415-006-)
  3. Jen-Chun Chang and Kai-Chiun Hwang, "Chapter 4: 串流加密法的發展現況," 資通安全專輯之十九:最新密碼學研究發展現況, 主編:曾文貴、官大智, 國家實驗研究院科技政策研究與資訊中心(原國科會科學技術資料中心), June 2005. (ISBN 957-619-121-1) (NSC93-2213-E-305-003-)
  4. Jen-Chun Chang, Chun-I Fan, and Ruei-Hau Hsu, "Chapter 22: Security Attacks of Vehicular Networks," Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications, Ed. Chung-Ming Huang and Yuh-Shyan Chen, IGI Global, December 2009. (ISBN 978-1-60566-840-6) (NSC96-2628-E-305-002-MY3)

Journal Papers Published

  1. Hsin-Lung Wu, Jen-Chun Chang, "Constructing constant composition codes via distance-increasing mappings," SIAM Journal on Discrete Mathematics, Vol. 26, March 2012, pp. 375-383. (SCI)
  2. Jyh-Shyan Lin, Jen-Chun Chang, Rong-Jaye Chen, Torleiv Klove, "Distance-preserving and distance-increasing mappings from ternary vectors to permutations," IEEE Transactions on Information Theory, Vol. 54, March 2008, pp. 1334-1339. (SCI) (IF=3.793) (NSC96-2628-E-305-002-MY3)
  3. Jen-Chun Chang, "Distance-increasing mappings from binary vectors to permutations that increase Hamming distances by at least two," IEEE Transactions on Information TheoryVol. 52, April 2006, pp. 1683-1689. (SCI) (IF=2.183) (NSC94-2213-E-305-003-)
  4. Jen-Chun Chang, "Distance-increasing mappings from binary vectors to permutations," IEEE Transactions on Information Theory, Vol. 51, Jan. 2005, pp. 359-363. (SCI) (IF=2.029) (NSC93-2213-E-305-003-)
  5. Jen-Chun Chang, Rong-Jaye Chen, T. Klove and Shi-Chun Tsai, "Distance-preserving mappings from binary vectors to permutations," IEEE Transactions on Information Theory, Vol. 49, April 2003, pp. 1054-1059. (SCI) (IF=2.245) (NSC91-2213-E-159-007-)
  6. Jen-Chun Chang, "New algorithms of distance-increasing mappings from binary vectors to permutations by swaps," Designs, Codes and Cryptography, Vol. 39, No. 3, June 2006, pp. 335-345. (SCI) (NSC93-2213-E-305-003-)
  7. Jen-Chun Chang, "New constructions of distance-increasing mappings and permutation arrays," Journal of Information Science and Engineering, Vol. 23, No. 4, July 2007, pp. 1127-1239. (SCI) (NSC93-2213-E-305-003-)
  8. Jyh-Shyan Lin, Jen-Chun Chang and Rong-Jaye Chen, "New simple constructions of distance-increasing mappings from binary vectors to permutations," Information Processing Letters, Vol. 100, Issue 2, Oct. 2006, pp. 83-89. (SCI) (NSC93-2213-E-305-003-)
  9. Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang, "An efficient algorithm for the reliability of consecutive-k-n networks," Journal of Information Science and Engineering, Vol. 19, 2003, pp. 159-166. (SCI) (NSC91-2213-E-159-007-)
  10. Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang, "A minimal-automaton-based algorithm for the reliability of Con(d, k, n) systems," Methodology and Computing in Applied Probability, Vol. 3, 2001, pp. 379-386. (SCI)
  11. Yen-Ting Liu, Chung-Pin Wu and Jen-Chun Chang, "Design and implementation of a telnet-attached security protocol," Journal of Ming Hsin Institute of Technology, Vol. 24, 2000, pp. 89-98.
  12. Frank K. Hwang, Lirong Cui, Jen-Chun Chang and Wen-Dar Lin, "Comments on reliability and component importance of a consecutive-k-out-of-n system by Zuo," Microelectronic Reliability, Vol. 40, 2000, pp. 1061-1063. (SCI)
  13. Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang, "A fast reliability algorithm for the circular consecutive-weighted-k-out-of-n:F system," IEEE Transactions on Reliability, Vol. 47, Dec. 1998, pp. 472-474. (SCI)

Journal Papers Submitted

  1. Jen-Chun Chang, Hsin-Lung Wu, "Distance-Increasing Mappings from Binary Vectors to Constant Composition Vectors," submitted to IEEE Transactions on Information Theory. (SCI)
  2. Jen-Chun Chang, Hsin-Lung Wu, "Rotation-based distance-increasing mappings from q-ary vectors to permutations," submitted to IEEE Transactions on Information Theory. (SCI)
  3. Jen-Chun Chang, "Boolean functions with high nonlinearity and propagation characteristics," submitted to IEEE Transactions on Information Theory. (SCI)
  4. Jen-Chun Chang, "A construction of Boolean functions with propagation characteristics and resilient properties," submitted to IEEE Transactions on Information Theory. (SCI)
  5. Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang, "Efficient algorithms to compute the reliabilities of f-or-consecutive-k-out-of-n:F systems," submitted to Computer Modeling in Engineering and Science. (SCI)
  6. Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang, "Job assignment on parallel machines with minimum makespan," submitted to Information Processing Letters. (SCI)

Conference Papers

  1. Jen-Chun Chang, Hsin-Lung Wu, "Distance-Increasing Mappings from Binary Vectors to Constant Composition Vectors," 2009 IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, June 28 - July 3, 2009. (NSC96-2628-E-305-002-MY3)
  2. Jen-Chun Chang, Hsin-Lung Wu, "A Hybrid RFID Protocol against Tracking Attacks," The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), Kyoto, Japan, Sep.12-14, 2009. (NSC96-2628-E-305-002-MY3)
  3. Wei-Chin Kuo and Jen-Chun Chang, "A linear-time decoding algorithm for permutation codes generated from distance-increasing mappings," Information Security Conference, June 2007. (NSC95-2213-E-305-002-)
  4. 陳江陽、詹景裕、劉萬榮、張仁俊,"串流加解密FPGA實作",第五屆微電子技術發展與應用研討會,May 2007. (NSC95-2213-E-305-002-)
  5. Jen-Chun Chang, Shiao-Fan Chang, "Constructions of Distance-Almost-Increasing Mappings from Binary Vectors to Permutations," International Computer Symposium, Dec 2004. (NSC93-2213-E-305-003-)
  6. Han-Chang Liang, Jen-Chun Chang, Rong-Jaye Chen, "New Efficient Constructions of Binary Asymmetric Error-Correcting Codes," International Computer Symposium, Dec 2004. (NSC93-2213-E-305-003-)
  7. Kai-Chiun Hwang, Jen-Chun Chang, Rong-Jaye Chen, "A new construction of resilient functions over GF(p) with good cryptographic properties," International Computer Symposium, Dec 2004. (NSC93-2213-E-305-003-)
  8. Jen-Chun Chang, Rong-Jaye Chen, T. Klove and Shi-Chun Tsai, "Distance preserving mappings from binary vectors to permutations," IEEE International Symposium on Information Theory (ISIT 2003), Session: Coding Theory I, paper #9, 2003, pp. 14-15. (NSC92-2213-E-415-006-)
  9. 羅世帆、張仁俊,"安全的FTP 檔案傳輸協定的設計與實作",第一屆流通與全球運籌論文研討會,Oct 2003。(NSC92-2213-E-415-006-)
  10. 鄭凱仁、邱楷雯、張仁俊,"PDA電子郵件安全收發系統之設計與實作",第四屆產業資訊管理學術暨新興科技實務研討會,Nov 2003。(中華民國資訊管理學會主辦) (NSC92-2213-E-415-006-)
  11. Jen-Chun Chang, Shi-Chun Tsai and Rong-Jaye Chen, "A Space-efficient Godel Numbering with Chinese Remainder Theorem," Proceedings of the 19th Workshop on Combinatorial Mathmatics and Computation Theory, Mar 2002, pp. 192-195.
  12. Jen-Chun Chang, Wei-Chao Hsu and Rong-Jaye Chen, "An efficient oblivious transfer scheme with optimal base," Proceedings of the 11th National Conference on Information Security, May 2001, pp. 241-248.
  13. Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang, "Efficient algorithms for the reliabilities of (n, f, k) systems," The 17th Workshop on Combinatorial Mathematics and Computation Theory, Apr 2000, pp. 91-96.
  14. Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang, "The Birnbaum importance and the optimal replacement for the consecutive-k-out-of-n:F system," International Computer Symposium - Workshop on Algorithms, Dec 1998, pp. 51-54.

Technical Reports

  1. 計畫報告:"資訊戰基礎研究IV子計畫三─建構一個網路安全防護之雛形系統", 中山科學院研究計畫,執行期間2001/01/01~2001/12/31。
  2. 計畫報告:"先進加密法之研究及其在網路安全防護上之應用", 明新科技大學研究計畫,執行期間2002/01/01~2002/11/30。
  3. 計畫報告:"理論密碼學與應用(子計畫一)─串流加密法的理論與實作(1/3)", 國科會研究計畫,執行期間2002/08/01~2003/07/31。(NSC91-2213-E-159-007-)
  4. 計畫報告:"理論密碼學與應用(子計畫一)─串流加密法的理論與實作(2/3)", 國科會研究計畫,執行期間2003/08/01~2004/07/31。(NSC92-2213-E-415-006-)
  5. 計畫報告:"理論密碼學與應用(子計畫一)─串流加密法的理論與實作(3/3)", 國科會研究計畫,執行期間2004/08/01~2005/07/31。(NSC93-2213-E-305-003-)
  6. 計畫報告:"運用編碼理論與技術於串流密碼建構與破解之研究:理論與實作(1/3)",國科會研究計畫,執行期間2005/08/01~2006/07/31。(NSC94-2213-E-305-003-)
  7. 計畫報告:"專屬無線都會網路(WiMax 802.16)密碼模組及密鑰管理安全機制研究",國科會研究計畫,執行期間2006/08/01~2007/07/31。(NSC95-2623-7-305-001-D)
  8. 計畫報告:"運用編碼理論與技術於串流密碼建構與破解之研究:理論與實作(2/3)",國科會研究計畫,執行期間2006/08/01~2007/07/31。(NSC95-2213-E-305-002-)
  9. 計畫報告:"運用編碼理論與技術於串流密碼建構與破解之研究:理論與實作(3/3)",國科會研究計畫,執行期間2007/08/01~2008/07/31。(NSC96-2221-E-305-006-)
  10. 計畫報告:"保距(或增距)對應與排列編碼建構演算法之研究(1/3)",國科會研究計畫,執行期間2007/08/01~2008/07/31。 (NSC96-2628-E-305-002-MY3)
  11. 計畫報告:"保距(或增距)對應與排列編碼建構演算法之研究(2/3)",國科會研究計畫,執行期間2008/08/01~2009/07/31。 (NSC96-2628-E-305-002-MY3)
  12. 計畫報告:"保距(或增距)對應與排列編碼建構演算法之研究(3/3)",國科會研究計畫,執行期間2009/08/01~2010/07/31。 (NSC96-2628-E-305-002-MY3)
  13. 技術報告:J.-S. Lin, Jen-Chun Chang, R.-J. Chen, and T. Klove, "Distance-preserving mappings from ternary vectors to permutations", arXiv: 704.1358v1, April 2007, [cs.DM]. (NSC96-2221-E-305-006-)

專書章節著作


Jen-Chun Chang and Frank K. Hwang, "Chapter 3: Reliabilities of consecutive-k systems," Handbook of Reliability Engineering, Ed. H. Pham, Springer, April 2003. (ISBN 1-85233-453-3)

Handbook of Reliability Engineering在2003年由Springer出版,Editor是H. Pham。本書大部分的chapters均是由IEEE Transactions on Reliability,IEEE Transactions on Quality and Reliability,International Journal of Reliability,Quality and Safety Engineering等期刊的Editors撰寫。我們的研究成果被收錄在Chapter 3,主要是探討各種連續k系統及其相關系統的可靠度分析理論,其中也收集了我們為此主題所做的文獻整理。




Jen-Chun Chang, Rong-Jaye Chen and Frank K. Hwang, "Chapter 1: On regular reliability models," Systems and Bayesian Reliability, Eds. Y. Hayakawa, T. Irony and M. Xie, World Scientific, March 2002. (ISBN 981-02-4865-2)

System and Bayesian Reliability是World Scientific在R. E. Barlow教授70歲時出版的論文集。Barlow是Reliability Theory的先驅,除了一般的論文著作外,他的專書著作有些後來又被SIAM重新出版並收錄到SIAM Classics中。Barlow也得過許多數學界的大獎,包括Von Neumann Prize Award等。本書三位Editors都是Barlow的學生,當時他們也是IEEE Transactions on Reliability的Editors。本書對外徵求論文時,我們覺得以前的可靠度分析演算法都是針對單一系統而設計,學術上實在很需要一個能夠描述各種系統的計算模型,以便能夠系統化的推導出高效率的可靠度分析演算法,因此以計算理論中的Regular Expressions、Automata與機率理論中的Heterogeneous Markov Chain為基礎提出了Regular Reliability Models,後來被收錄為Chapter 1。