Journal Paper

1.          Chinyang Henry Tseng, Woei-Jiunn Tsaur*, “FFK: Fourier-Transform Fuzzy-c-means Kalman-Filter Based RSSI Filtering Mechanism for Indoor Positioning”, Sensors, Vol. 23, No. 19, 8274, 2023. SCI Q1

2.          Chinyang Henry Tseng*, Ya-Ting Chang, “EBDM: Ensemble binary detection models for multi-class wireless intrusion detection based on deep neural network”, Computers & Security, Vol. 133, 103419, 2023. SCI Q2

3.          Chinyang Henry Tseng, Ray-Jade Chen, Shang-Yu Tsai, Tsung-Ren Wu, Woei-Jiunn Tsaur, Hung-Wen Chiu, Yu-Sheng Lo*, “Exploring the COVID-19 Pandemic as a Catalyst for PHR App User Behavior Change in Taiwan: A Development and Usability Study”, Journal of Medical Internet Research, Vol. 24, No. 1, e33399, 2022. SCI Q1

4.          Woei-Jiunn Tsaur, Chinyang Henry Tseng, Chin-Ling Chen*, “Effective Bots’ Detection for Online Smartphone Game Using Multilayer Perceptron Neural Networks”, Security and Communication Networks, Vol. 2022, Article ID 9429475, 2022. SCI Q3

5.          Chinyang Henry Tseng*, J. S. Yen, “Enhanced Gaussian mixture model of RSSI purification for indoor positioning,” Journal of Systems Architecture, 81, pp. 1-6, 2017. SCI Q1

6.          Chinyang Henry Tseng*, C.W Lai, and T. Y. Juang, “Automatic web-log filtering mechanism for web attack digital forensics”, Journal of Internet Technology, Vol. 18, No. 6, pp. 1451-1459, 2017. SCI Q3

7.          Chinyang Henry Tseng*, “LBMR: Load-Balanced Multipath Routing for Wireless Data-Intensive Transmission in Real-Time Medical Monitoring,” International Journal of Environmental Research and Public Health, Vol. 13, No. 6, 547, 2016. SCI Q2

8.          Chinyang Henry Tseng*, “Multipath Load Balancing Routing for Internet of Things, ” Journal of Sensors, Vol. 2016, Article ID 4250746. SCI Q2

9.          Chinyang Henry Tseng*, Shiau-Huey Wang, Woei-Jiunn Tsaur, “Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection, ” IEEE Transactions on Reliability, Vol. 64, No.3, pp. 1078-1085, 2015. SCI Q1

10.      Hsiao-Ching Lin, Chinyang Henry Tseng*, Hui-Tang Lin, “MoTIVE: mobile two-hop integrity validation for emergency vehicle routing, ” Security and Communication Networks, Vol. 8, No. 9, pp. 1717-1724, 2015. SCI Q2

11.      Chinyang Henry Tseng*, “Coordinator Traffic Diffusion for Data-Intensive Zigbee Transmission in Real-time Electrocardiography Monitoring, ” IEEE Transactions on Biomedical Engineering, Vol. 60, No.12, pp. 3340 - 3346, 2013.  SCI Q1

12.      Ying-Dar Lin, Ren-Hung Hwang*, Raghavendra Kulkarni, Chinyang Henry Tseng, Chun-Hung Hsu, “On Campus IPv6 Beta Site: Requirements, Solutions, and Product Defect Evaluation,” Journal of Internet Technology, Vol. 17 No. 1, P.1189-1200, 2015. SCI Q2

13.      Henry Chin-Yang Tseng*, Bernard Chia, Tong-Ying Juang, “Web Forensic Evidence of SQL Injection Analysis ”, International Journal of Science and Engineering, Vol. 5, No. 1, pp. 157 – 162, 2015.

14.      Henry Chin-Yang Tseng*, Shin-Yun Chang, Tong-Ying Juang, “An Efficient Web Log Filter Scheme for Web Abnormal Behaviors ”, International Journal of Science and Engineering, Vol. 4, No.4, pp. 25 -31, 2014.

15.      Chinyang Henry Tseng*, ShiauHuey Wang, Bor-Shing Lin, Tong-Ying Junag, Xiao-Ru Ji, “CDTS: Coordinator Data Traffic Shunt model for Zigbee networks,Smart Innovation, Systems and Technologies, Vol. 1, pp. 501 - 510, 2012.

16.      Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, ”Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks,” Lecture Notes in Computer Science 4637, pp. 127 – 145, 2007.

17.      Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levit, “DEMEM: Distributed Event-driven Message Exchange intrusion detection Model for MANET,” Lecture Notes in Computer Science 4219, pp. 249 – 271,2006.

18.      Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt“A Specification-based Intrusion Detection Model for OLSR,” Lecture Notes in Computer Science 3858, pp. 330 – 350, 2006.

19.      Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt, “Formal Reasoning about a Specification-based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad hoc Networks,” Lecture Notes in Computer Science 3866, pp. 16 – 33, 2006.

20.      林孝青*, 曾俊元, 張威威, 莊東穎, 林輝堂, “植基於AODV繞徑協定之車載隨意網路弱點分析,” 資訊安全通訊, 17, 1, 16~36, 2011.

 

Conference Paper

 

1.          曾俊元,林奇諺,“基於 LSTM-Pearson DDoS 檢測的最大攻擊頻率指示器”,全國資訊安全會議, 2023.

2.          曾俊元,程相,“用於無線網路入侵偵測之深度學習分類輸出改進機制”,全國資訊安全會議, 2022.

3.          曾俊元,蔣君逸,“用於惡意域名生成檢測之多重集成深度學習模型”,全國資訊安全會議, 2022.

4.          Zhijie Yu and Chinyang Henry Tseng, “A Data-to-image mechanism based on feature correlation for wireless intrusion detection”, Cryptology and Information Security Conference (CISC), 2022.

5.          Chinyang Henry Tseng, Woei-Jiunn Tsaur and Mujiono, Fuzzy C-Means based Feature Selection Mechanism for Wireless Intrusion Detection, International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA), Taichung, Taiwan, Nov 18-20, 2021.

6.          Chinyang Henry Tseng, Woei Jiunn Tsaur and Wai Lok Leung, “Constructing a Highly Secure Syndicated Loans System Using Blockchain”, Cryptology and Information Security Conference (CISC), 2021.

7.          Chinyang Henry Tseng, Lin,Ren Jie, and Woei Jiunn Tsaur, “Improving Step Length Estimation of Pedestrian DeadReckoning Based on Adaptive Kalman Filtering”, Taiwan Academia Conference (TANET), 2020.

8.          Chinyang Henry Tseng, Woei-Jiunn Tsaur and Wei-Tsen Yeh, “Secure Attribute-based Searchable Encryption Mechanism for Medical Data over Blockchain”, Cryptology and Information Security Conference (CISC), 2020.

9.          Woei-Jiunn Tsaur, Chinyang Henry Tseng, and Chin-Ling Chen, “Deep Neural Networks for Online Game Bot Detection”, 21st International Conference on Artificial Intelligence (ICAI'19), pp. 252-258, USA, July 29 - August 1, 2019.  

10.      Chinyang Henry Tseng and Shin-Fu Tsai, “RSSI Purification Model Based on Time and Frequency Domain Filtering”, National Computer Symposium (NCS), 2017. 

11.      Chinyang Henry Tseng and Poting Liu, “RWMR: RSSI-Based WIFI Mesh Routing for Reliable Industrial IoT”, Automation 2017.

12.      Chinyang Henry Tseng and Dmitrii Matveichev, “Comprehensive Client-Side Rogue AP Attack Detection”, Wireless, Ad Hoc and Sensor Networks, 2017.

13.      Chinyang Henry Tseng and J. S. Yen, “Enhanced Gaussian Mixture Model for Indoor Positioning Accuracy”, International Computer Symposium (ICS), 2016. 

14.      Chinyang Henry Tseng, Yao-Cing Shih, Tong-Ying Juang “Bluetooth reliable multi-hop transmission model based on received signal strength for industrial wireless communications,” Wireless, Ad Hoc and Sensor Networks, 2016.

15.      Chinyang Henry Tseng, Che-Wei Chang, Tong-Ying Juang Evaluation Mechanism of Reference Point Accuracy for Indoor Positioning”, Wireless, Ad Hoc and Sensor Networks, 2016.

16.      Chinyang Henry Tseng, Ching-Yao Hsiao, Tong-Ying Juang, “Adaptive Wi-Fi multi-hop transmission model based on received signal strength for industrial long distance wireless communications,” Mobile Computing Workshop, 2016.

17.      Chinyang Henry Tseng, Hang Cheng , Tong-Ying Juang,A model of improving indoor positioning signal accuracy based on clustering algorithm analysis,” Mobile Computing Workshop, 2016.

18.      Chinyang Henry Tseng, Chun-Wei Lai, Tong-Ying Juang, “Automatic Web-log Filtering mechanism for web attack digital forensic,” Taiwan Academia Conference, (TANET), 2015, Best Paper Award.

19.      Chinyang Henry Tseng, Kai-Siang Zhang, Tong-Ying Juang, Po-Ting Liu, “Detection Game Bots Based on K-means and Bayesian Belief Networks,” Mobile Computing Workshop, 2015.

20.      Chinyang Henry Tseng, Sheng-Shan Wang, Yue-Shan Chang, Tong-Ying Juang, Hsin-Fu Tsai, “Adaptive Multihop Transmission for Wireless Sensor Network Based on Received Signal Strength, ” Mobile Computing Workshop, 2015.

21.      Chinyang Henry Tseng, Bernard Chia, Tong-Ying Juang, “Web Forensic Evidence of SQL Injection Analysis, ” Mobile Computing Workshop, 2014.

22.      Chinyang Henry Tseng, Jing-Hung Lin, Tong-Ying Juang , “A lexical identification model for detecting malicious domain names without vowels,” Mobile Computing Workshop, 2014.

23.      Chinyang Henry Tseng, Li-Hsin Peng, Tong-Ying Juang, “Adaptive Pipelining Transmission mechanism for ZigBee Networks,” Wireless, Ad Hoc and Sensor Networks, 2014.

24.      Chinyang Henry Tseng, Shin-Yun Chang, Tong-Ying Juang, “An Efficient Web Log Filter Scheme for Web Abnormal Behaviors, ” Mobile Computing Workshop, 2014.

25.      Chinyang Henry Tseng, Shiahuey Wang, Sheng-Chao Wang, Tong-Ying Juang, “Proactive Malware Collection and Classification System: How to collect and classify useful malware samples?,International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), 2014.

26.      曾俊元, 林家宏, 莊東穎, 針對無母音惡意域名之語彙特徵辨識模型”, 全國資訊安全會議 (CISC), 2014.

27.      Chinyang Henry Tseng, Wei-Yun Hsiao, Woei-Jiunn Tsaur, Tong-Ying Juang, “A Novel Scheme for DKOM Rootkit Detection based on Windows driver deep scanning,” National Computer Symposium (NCS), 2013.

28.      Chinyang Henry Tseng, ShiauHuey Wang, Bor-Shing Lin, Tong-Ying Junag, Xiao-Ru Ji, “CDTS: Coordinator Data Traffic Shunt model for Zigbee networks,” International Computer Symposium (ICS), 2012, Best paper candidate.

29.      Hsiao-Ching Lin, Ming-Kung Sun, Han-Wei Huang, Hui-Tang Lin, Chinyang Henry Tseng, “A Specification-based Intrusion Detection Model for Wireless Ad Hoc Networks,” International Conference on Innovations in Bio-Inspired Computing and Applications, 2012.

30.      Chinyang Tseng, Shaiuhuey Wang, Xiao-Ru Ji, Bor-Shing Lin, Tong-Ying Juang, “Data Flow Diffluence Model for Zigbee Networks. The 8th Workshop on Wireless, Ad Hoc and Sensor Networks,” Wireless, Ad Hoc and Sensor Networks, 2012.

31.      Woei-Jiunn Tsaur, Chinyang Tseng, Shaiuhuey Wang, Wen-Long Lee, Tong-Ying Juang, “Hierarchical Cluster based Dynamic Key Management Model for Mobile Ad hoc Networks,” Wireless, Ad Hoc and Sensor Networks, 2012.

32.      Chin-yang Tseng, Shiau-huey Wang, Jiajun Chen, “Designing questionnaire Model with Binary Decision Trees, Analytic Hierarchy Process (AHP), and Image-based Presentations,” Asian Conference on Psychology & the Behavioral Sciences (ACP), 2012.

33.      Chin-yang Tseng, Shiau-huey Wang, Sheng-hsin Huang, “Scenario based questionnaires using multimedia and virtual characters,” Asian Conference on Psychology & the Behavioral Sciences (ACP), 2012.

34.      Chin-yang Tseng, Shiau-huey Wang, Chiao-Ying Hsu, “Applying the Holland’s theory and Multiple Intelligences to online consumer behavior for better recommendation”, Asian Conference on Psychology & the Behavioral Sciences (ACP), 2012.

35.      曾俊元, 朱彥曦, “惡意程式樣本資料庫暨分析之平台建置,” 台灣網際網路研討會 (TANET), 2012. 最佳論文候選.

36.      曾俊元, 張乙元, “問卷回應結果評分機制應用於網路問卷設 計之研究:以科技接受模式探討, 海峽兩岸資訊管理發展與策略學術研討會 (CSIM), 2012.

37.      曾俊元, 王筱惠, 周俊彥, 曹偉駿, “應用多特徵與倒傳遞類神經網路於網路廣告機器人之偵測”, 無線、隨意及感測網路研討會 (WASN), 2012.

38.      曾俊元, 王筱惠, 蔡勇, “基於語彙分析的Botnet惡意域名辨識”, 臺灣商管與資訊研討會 (TBI), 2012.

39.      曾俊元, 王筱惠, 蔡勇, “辨識Botnet惡意域名的語彙特徵探討”,資訊安全會議 (CISC), 2012.

40.      曾俊元, 周俊, “以類神經網路為基礎偵測惡意Web Robot”, 資訊科技與管理研討會, 2012.

41.      Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matthew Bishop, “Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks,” International Symposium on Recent Advances in Intrusion Detection (RAID),2007.

42.      Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt, “DRETA: Distributed Routing Evidence Tracing and Authentication intrusion detection Model for MANET,” ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2007.

43.      Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt, “DEMEM: Distributed Event-driven Message Exchange intrusion detection Model for MANET,” International Symposium on Recent Advances in Intrusion Detection (RAID), 2006.

44.      Shiau-Huey Wang, Chinyang Henry Tseng, Calvin Ko, Michael Gertz, Karl N. Levitt, “A General Automatic Response Model for MANET,” IEEE International Workshop on Next Generation Wireless Networks (WoNGeN), 2005.

45.      Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, “A Specification-based Intrusion Detection Model for OLSR,” International Symposium on Recent Advances in Intrusion Detection (RAID), 2005.

46.      Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt, “Formal Reasoning about a Specification-based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad hoc Networks,” International Workshop on Formal Aspects in Security and Trust (FAST), 2005.

47.      Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt, “A Specification-based Intrusion Detection system for AODV,” ACM Workshop on Security of ad hoc and Sensor Networks (SASN), 2003.