Journal Paper
1.
Chinyang Henry Tseng, Woei-Jiunn Tsaur*,
“FFK: Fourier-Transform Fuzzy-c-means Kalman-Filter Based RSSI Filtering
Mechanism for Indoor Positioning”, Sensors, Vol. 23, No. 19, 8274, 2023. SCI Q1
2. Chinyang Henry Tseng*, Ya-Ting Chang, “EBDM: Ensemble binary detection models for multi-class wireless intrusion detection based on deep neural network”, Computers & Security, Vol. 133, 103419, 2023. SCI Q2
3.
Chinyang Henry Tseng, Ray-Jade Chen, Shang-Yu Tsai, Tsung-Ren Wu, Woei-Jiunn
Tsaur, Hung-Wen Chiu, Yu-Sheng Lo*, “Exploring the
COVID-19 Pandemic as a Catalyst for PHR App User Behavior Change in Taiwan: A
Development and Usability Study”, Journal of Medical Internet Research,
Vol. 24, No. 1, e33399, 2022. SCI Q1
4.
Woei-Jiunn Tsaur, Chinyang Henry Tseng, Chin-Ling Chen*,
“Effective Bots’ Detection for Online Smartphone Game Using Multilayer
Perceptron Neural Networks”, Security and Communication Networks, Vol. 2022,
Article ID 9429475, 2022. SCI Q3
5.
Chinyang Henry Tseng*, J. S. Yen, “Enhanced
Gaussian mixture model of RSSI purification for indoor positioning,” Journal of Systems Architecture, 81, pp.
1-6, 2017. SCI Q1
6.
Chinyang Henry Tseng*,
C.W Lai, and T. Y. Juang, “Automatic web-log
filtering mechanism for web attack digital forensics”, Journal of Internet Technology, Vol. 18, No. 6, pp. 1451-1459,
2017. SCI Q3
7.
Chinyang Henry Tseng*, “LBMR: Load-Balanced Multipath Routing for
Wireless Data-Intensive Transmission in Real-Time Medical Monitoring,” International Journal of Environmental
Research and Public Health, Vol. 13, No. 6, 547, 2016. SCI Q2
8.
Chinyang Henry Tseng*, “Multipath Load
Balancing Routing for Internet of Things, ” Journal of
Sensors, Vol. 2016, Article ID 4250746. SCI
Q2
9.
Chinyang Henry Tseng*, Shiau-Huey Wang, Woei-Jiunn Tsaur, “Hierarchical and Dynamic Elliptic Curve
Cryptosystem Based Self-Certified Public Key Scheme for Medical Data
Protection, ” IEEE Transactions on
Reliability, Vol. 64, No.3, pp. 1078-1085, 2015. SCI Q1
10. Hsiao-Ching Lin, Chinyang Henry Tseng*, Hui-Tang Lin, “MoTIVE: mobile two-hop integrity validation for emergency
vehicle routing, ” Security and
Communication Networks, Vol. 8, No. 9, pp. 1717-1724, 2015. SCI Q2
11. Chinyang Henry Tseng*, “Coordinator
Traffic Diffusion for Data-Intensive Zigbee Transmission in Real-time
Electrocardiography Monitoring, ” IEEE
Transactions on Biomedical Engineering, Vol. 60, No.12, pp. 3340 - 3346,
2013. SCI Q1
12. Ying-Dar Lin,
Ren-Hung Hwang*, Raghavendra Kulkarni, Chinyang Henry Tseng,
Chun-Hung Hsu, “On Campus IPv6 Beta Site: Requirements, Solutions, and Product
Defect Evaluation,”
Journal of Internet Technology, Vol. 17 No. 1,
P.1189-1200, 2015. SCI Q2
13.
Henry Chin-Yang
Tseng*, Bernard Chia, Tong-Ying Juang, “Web
Forensic Evidence of SQL Injection Analysis ”, International Journal of Science and Engineering, Vol. 5, No. 1,
pp. 157 – 162, 2015.
14.
Henry Chin-Yang
Tseng*, Shin-Yun
Chang, Tong-Ying Juang,
“An Efficient Web Log Filter Scheme for Web Abnormal Behaviors ”, International Journal of Science and
Engineering, Vol. 4, No.4, pp. 25 -31, 2014.
15. Chinyang Henry Tseng*, ShiauHuey Wang, Bor-Shing Lin, Tong-Ying Junag,
Xiao-Ru Ji, “CDTS: Coordinator Data Traffic Shunt
model for Zigbee networks,” Smart Innovation, Systems and Technologies, Vol. 1, pp. 501 -
510, 2012.
16. Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, ”Cost-Sensitive Intrusion Responses
for Mobile Ad Hoc Networks,” Lecture
Notes in Computer Science 4637, pp. 127 – 145, 2007.
17. Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levit,
“DEMEM: Distributed Event-driven Message Exchange intrusion detection Model for
MANET,” Lecture Notes in Computer Science
4219, pp. 249 – 271,2006.
18. Chinyang Henry Tseng, Tao Song,
Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt﹐“A Specification-based Intrusion Detection
Model for OLSR,” Lecture Notes in
Computer Science 3858, pp. 330 – 350, 2006.
19. Tao Song, Calvin
Ko, Chinyang Henry Tseng, Poornima
Balasubramanyam, Anant Chaudhary, Karl N. Levitt, “Formal Reasoning about a
Specification-based Intrusion Detection for Dynamic Auto-configuration
Protocols in Ad hoc Networks,” Lecture
Notes in Computer Science 3866, pp. 16 – 33, 2006.
20. 林孝青*, 曾俊元, 張威威, 莊東穎, 林輝堂, “植基於AODV繞徑協定之車載隨意網路弱點分析,” 資訊安全通訊, 第17卷, 第1期, 第16~36頁, 2011.
Conference Paper
1.
曾俊元,林奇諺,“基於 LSTM-Pearson 的 DDoS 檢測的最大攻擊頻率指示器”,全國資訊安全會議, 2023.
2.
曾俊元,程相諺,“用於無線網路入侵偵測之深度學習分類輸出改進機制”,全國資訊安全會議, 2022.
3.
曾俊元,蔣君逸,“用於惡意域名生成檢測之多重集成深度學習模型”,全國資訊安全會議, 2022.
4.
Zhijie Yu and Chinyang Henry Tseng, “A Data-to-image
mechanism based on feature correlation for wireless intrusion detection”, Cryptology
and Information Security Conference (CISC), 2022.
5.
Chinyang Henry Tseng, Woei-Jiunn
Tsaur and Mujiono, “Fuzzy
C-Means based Feature Selection Mechanism for Wireless Intrusion Detection”, International
Conference on Security and Information Technologies with AI, Internet Computing
and Big-data Applications (SITAIBA), Taichung, Taiwan, Nov
18-20, 2021.
6.
Chinyang Henry Tseng, Woei
Jiunn Tsaur and Wai Lok
Leung, “Constructing a Highly Secure Syndicated Loans System Using Blockchain”,
Cryptology and Information Security
Conference (CISC), 2021.
7.
Chinyang Henry Tseng, Lin,Ren
Jie, and Woei
Jiunn Tsaur, “Improving Step Length Estimation of Pedestrian DeadReckoning
Based on Adaptive Kalman Filtering”, Taiwan Academia Conference (TANET), 2020.
8.
Chinyang Henry Tseng, Woei-Jiunn Tsaur and Wei-Tsen Yeh, “Secure
Attribute-based Searchable Encryption Mechanism for Medical Data over
Blockchain”, Cryptology and Information Security Conference
(CISC), 2020.
9.
Woei-Jiunn Tsaur, Chinyang Henry Tseng, and Chin-Ling Chen, “Deep Neural Networks for Online
Game Bot Detection”, 21st International
Conference on Artificial Intelligence (ICAI'19), pp. 252-258, USA, July 29
- August 1, 2019.
10. Chinyang Henry Tseng and Shin-Fu Tsai, “RSSI Purification Model Based on Time and
Frequency Domain Filtering”, National
Computer Symposium (NCS), 2017.
11. Chinyang Henry Tseng and Poting Liu, “RWMR: RSSI-Based WIFI Mesh Routing for
Reliable Industrial IoT”, Automation 2017.
12. Chinyang Henry Tseng and Dmitrii Matveichev, “Comprehensive
Client-Side Rogue AP Attack Detection”, Wireless,
Ad Hoc and Sensor Networks, 2017.
13.
Chinyang Henry Tseng and J. S. Yen, “Enhanced Gaussian Mixture
Model for Indoor Positioning Accuracy”, International
Computer Symposium (ICS), 2016.
14.
Chinyang Henry Tseng, Yao-Cing Shih,
Tong-Ying Juang “Bluetooth reliable multi-hop
transmission model based on received signal strength for industrial wireless
communications,” Wireless, Ad Hoc and Sensor
Networks, 2016.
15.
Chinyang Henry Tseng, Che-Wei Chang, Tong-Ying Juang
Evaluation Mechanism of Reference Point Accuracy for Indoor Positioning”,
Wireless, Ad Hoc and Sensor Networks, 2016.
16.
Chinyang Henry Tseng, Ching-Yao Hsiao, Tong-Ying Juang,
“Adaptive Wi-Fi multi-hop transmission model based on received signal strength
for industrial long distance wireless communications,”
Mobile Computing Workshop, 2016.
17.
Chinyang
Henry Tseng, Hang Cheng ,
Tong-Ying Juang, “A model of improving indoor positioning signal
accuracy based on clustering algorithm analysis,” Mobile
Computing Workshop,
2016.
18.
Chinyang Henry Tseng, Chun-Wei Lai, Tong-Ying Juang,
“Automatic Web-log Filtering mechanism for web attack digital forensic,” Taiwan
Academia Conference, (TANET), 2015, Best
Paper Award.
19.
Chinyang
Henry Tseng,
Kai-Siang Zhang, Tong-Ying Juang, Po-Ting Liu,
“Detection Game Bots Based on K-means and Bayesian Belief Networks,” Mobile Computing Workshop, 2015.
20.
Chinyang
Henry Tseng,
Sheng-Shan Wang, Yue-Shan Chang, Tong-Ying Juang, Hsin-Fu Tsai, “Adaptive Multihop
Transmission for Wireless Sensor Network Based on Received Signal Strength, ” Mobile Computing
Workshop, 2015.
21.
Chinyang
Henry Tseng,
Bernard Chia, Tong-Ying Juang, “Web Forensic Evidence
of SQL Injection Analysis, ” Mobile Computing Workshop, 2014.
22.
Chinyang
Henry Tseng, Jing-Hung Lin, Tong-Ying Juang ,
“A lexical identification model for detecting malicious domain names without
vowels,” Mobile Computing Workshop,
2014.
23.
Chinyang
Henry Tseng, Li-Hsin
Peng, Tong-Ying Juang, “Adaptive Pipelining
Transmission mechanism for ZigBee Networks,” Wireless, Ad Hoc and Sensor Networks, 2014.
24.
Chinyang
Henry Tseng,
Shin-Yun Chang, Tong-Ying Juang, “An Efficient Web Log
Filter Scheme for Web Abnormal Behaviors, ” Mobile Computing Workshop, 2014.
25.
Chinyang
Henry Tseng,
Shiahuey Wang, Sheng-Chao Wang, Tong-Ying Juang, “Proactive Malware Collection and Classification
System: How to collect and classify useful malware samples?,”
International Conference on Information
Science, Electronics and Electrical Engineering (ISEEE), 2014.
26.
曾俊元, 林家宏, 莊東穎, ”針對無母音惡意域名之語彙特徵辨識模型”, 全國資訊安全會議 (CISC),
2014.
27.
Chinyang
Henry Tseng,
Wei-Yun Hsiao, Woei-Jiunn Tsaur,
Tong-Ying Juang, “A Novel Scheme for DKOM Rootkit
Detection based on Windows driver deep scanning,” National Computer Symposium (NCS),
2013.
28.
Chinyang
Henry Tseng,
ShiauHuey Wang, Bor-Shing Lin, Tong-Ying Junag,
Xiao-Ru Ji, “CDTS: Coordinator Data Traffic Shunt model for Zigbee networks,”
International Computer Symposium (ICS), 2012, Best paper candidate.
29.
Hsiao-Ching
Lin, Ming-Kung Sun, Han-Wei Huang, Hui-Tang Lin, Chinyang Henry Tseng, “A Specification-based Intrusion Detection Model for
Wireless Ad Hoc Networks,” International
Conference on Innovations in Bio-Inspired Computing and Applications, 2012.
30.
Chinyang
Tseng, Shaiuhuey Wang, Xiao-Ru Ji, Bor-Shing
Lin, Tong-Ying Juang, “Data Flow Diffluence Model for
Zigbee Networks. The 8th Workshop on Wireless, Ad Hoc and Sensor Networks,” Wireless, Ad Hoc and Sensor Networks,
2012.
31.
Woei-Jiunn Tsaur,
Chinyang Tseng, Shaiuhuey
Wang, Wen-Long Lee, Tong-Ying Juang, “Hierarchical
Cluster based Dynamic Key Management Model for Mobile Ad hoc Networks,” Wireless, Ad Hoc and Sensor Networks,
2012.
32.
Chin-yang Tseng, Shiau-huey
Wang, Jiajun Chen, “Designing questionnaire Model
with Binary Decision Trees, Analytic Hierarchy Process (AHP), and Image-based
Presentations,” Asian Conference on
Psychology & the Behavioral Sciences (ACP), 2012.
33.
Chin-yang Tseng, Shiau-huey
Wang, Sheng-hsin Huang, “Scenario based
questionnaires using multimedia and virtual characters,” Asian Conference on Psychology & the Behavioral Sciences (ACP),
2012.
34.
Chin-yang Tseng, Shiau-huey
Wang, Chiao-Ying Hsu, “Applying the Holland’s theory
and Multiple Intelligences to online consumer behavior for better
recommendation”, Asian Conference on
Psychology & the Behavioral Sciences (ACP), 2012.
35.
曾俊元, 朱彥曦, “惡意程式樣本資料庫暨分析之平台建置,” 台灣網際網路研討會 (TANET), 2012. 最佳論文候選.
36.
曾俊元, 張乙元, “問卷回應結果評分機制應用於網路問卷設 計之研究:以科技接受模式探討,” 海峽兩岸資訊管理發展與策略學術研討會 (CSIM), 2012.
37.
曾俊元, 王筱惠, 周俊彥, 曹偉駿, “應用多特徵與倒傳遞類神經網路於網路廣告機器人之偵測”, 無線、隨意及感測網路研討會 (WASN), 2012.
38.
曾俊元, 王筱惠, 蔡勇嶢, “基於語彙分析的Botnet惡意域名辨識”, 臺灣商管與資訊研討會 (TBI), 2012.
39. 曾俊元, 王筱惠, 蔡勇嶢, “辨識Botnet惡意域名的語彙特徵探討”,資訊安全會議 (CISC), 2012.
40.
曾俊元, 周俊諺, “以類神經網路為基礎偵測惡意Web Robot”, 資訊科技與管理研討會, 2012.
41.
Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matthew
Bishop, “Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks,” International Symposium on Recent Advances
in Intrusion Detection (RAID),2007.
42.
Chinyang
Henry Tseng,
Shiau-Huey Wang, Karl N. Levitt, “DRETA: Distributed
Routing Evidence Tracing and Authentication intrusion detection Model for
MANET,” ACM Symposium on Information,
Computer and Communications Security (ASIACCS), 2007.
43.
Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt, “DEMEM: Distributed Event-driven
Message Exchange intrusion detection Model for MANET,” International Symposium on Recent Advances in Intrusion Detection
(RAID), 2006.
44.
Shiau-Huey Wang, Chinyang Henry Tseng, Calvin Ko, Michael Gertz,
Karl N. Levitt, “A General Automatic Response Model for MANET,” IEEE International Workshop on Next
Generation Wireless Networks (WoNGeN), 2005.
45.
Chinyang
Henry Tseng,
Tao Song, Poornima Balasubramanyam, Calvin Ko, “A Specification-based Intrusion
Detection Model for OLSR,” International
Symposium on Recent Advances in Intrusion Detection (RAID), 2005.
46.
Tao
Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt, “Formal
Reasoning about a Specification-based Intrusion Detection for Dynamic
Auto-configuration Protocols in Ad hoc Networks,” International Workshop on Formal Aspects in Security and Trust (FAST),
2005.
47.
Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon
Limprasittiporn, Jeff Rowe, Karl N. Levitt, “A
Specification-based Intrusion Detection system for AODV,” ACM Workshop on Security of ad hoc and Sensor Networks (SASN), 2003.