期刊論文 Journal Paper(共16篇)
Chinyang Henry Tseng*, J. S. Yen, “Enhanced Gaussian mixture model of RSSI purification for indoor positioning,” Journal of Systems Architecture, 81, pp. 1-6, 2017. SCI, IF=1.579
Chinyang Henry Tseng*, C.W Lai, and T. Y. Juang, “Automatic web-log filtering mechanism for web attack digital forensics”, Journal of Internet Technology, Vol. 18, No. 6, pp. 1451-1459, 2017. SCI, IF=0.715
Chinyang Henry Tseng*, “LBMR: Load-Balanced Multipath Routing for Wireless Data-Intensive Transmission in Real-Time Medical Monitoring,” International Journal of Environmental Research and Public Health, Vol. 13, No. 6, 547, 2016. SCIE, IF=2.035
Chinyang Henry Tseng*, “Multipath Load Balancing Routing for Internet of Things, ” Journal of Sensors, Vol. 2016, Article ID 4250746. SCIE, IF=0.712
Chinyang Henry Tseng*, Shiau-Huey Wang, Woei-Jiunn Tsaur, “Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection, ” IEEE Transactions on Reliability, Vol. 64, No.3, pp. 1078-1085, 2015. SCI, IF=2.287
Hsiao-Ching Lin, Chinyang Henry Tseng*, Hui-Tang Lin, “MoTIVE: mobile two-hop integrity validation for emergency vehicle routing, ” Security and Communication Networks, Vol. 8, No. 9, pp. 1717-1724, 2015. SCI, IF=0.806
Ying-Dar Lin, Ren-Hung Hwang*, Raghavendra Kulkarni, Chinyang Henry Tseng*, Chun-Hung Hsu, “On Campus IPv6 Beta Site: Requirements, Solutions, and Product Defect Evaluation,” Journal of Internet Technology, Vol. 17 No. 1, P.1189-1200, 2015. SCI, IF=0.533
Chinyang Henry Tseng*, “Coordinator Traffic Diffusion for Data-Intensive Zigbee Transmission in Real-time Electrocardiography Monitoring, ” IEEE Transactions on Biomedical Engineering, Vol. 60, No.12, pp. 3340 - 3346, 2013. SCI, IF=2.468
Henry Chin-Yang Tseng*, Bernard Chia, Tong-Ying Juang, “Web Forensic Evidence of SQL Injection Analysis ”, International Journal of Science and Engineering, Vol. 5, No. 1, pp. 157 – 162, 2015.
Henry Chin-Yang Tseng*, Shin-Yun Chang, Tong-Ying Juang, “An Efficient Web Log Filter Scheme for Web Abnormal Behaviors ”, International Journal of Science and Engineering, Vol. 4, No.4, pp. 25 -31, 2014.
Chinyang Henry Tseng*, ShiauHuey Wang, Bor-Shing Lin, Tong-Ying Junag, Xiao-Ru Ji, “CDTS: Coordinator Data Traffic Shunt model for Zigbee networks,” Smart Innovation, Systems and Technologies, Vol. 1, pp. 501 - 510, 2012.
Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, ”Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks,” Lecture Notes in Computer Science 4637, pp. 127 – 145, 2007.
Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levit, “DEMEM: Distributed Event-driven Message Exchange intrusion detection Model for MANET,” Lecture Notes in Computer Science 4219, pp. 249 – 271,2006.
Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt﹐“A Specification-based Intrusion Detection Model for OLSR,” Lecture Notes in Computer Science 3858, pp. 330 – 350, 2006.
Tao Song, Calvin Ko, Chinyang Henry Tseng*, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt, “Formal Reasoning about a Specification-based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad hoc Networks,” Lecture Notes in Computer Science 3866, pp. 16 – 33, 2006.
林孝青*, 曾俊元, 張威威, 莊東穎, 林輝堂, “植基於AODV繞徑協定之車載隨意網路弱點分析,” 資訊安全通訊, 第17卷, 第1期, 第16~36頁, 2011.

會議論文 Conference Paper(共41篇)
Chinyang Henry Tseng, Ren-Jie Lin, Woei-Jiunn Tsaur, “Improving Step Length Estimation of Pedestrian Dead Reckoning Based on Adaptive Kalman Filtering”, Taiwan Academia Conference, 2020.
Chinyang Henry Tseng, Woei-Jiunn Tsaur, Wei-Cen Ye, “Secure Attribute-based Searchable Encryption Mechanism for Medical Data over Blockchain”, Cryptology and Information Security Conference, 2020.
Woei-Jiunn Tsaur, Chinyang Henry Tseng, and Chin-Ling Chen, “Deep Neural Networks for Online Game Bot Detection”, 21st International Conference on Artificial Intelligence (ICAI'19), pp. 252-258, USA, July 29 - August 1, 2019.
Chinyang Henry Tseng and Shin-Fu Tsai, “RSSI Purification Model Based on Time and Frequency Domain Filtering”, National Computer Symposium (NCS), 2017.
Chinyang Henry Tseng and Poting Liu, “RWMR: RSSI-Based WIFI Mesh Routing for Reliable Industrial IoT”, Automation 2017.
Chinyang Henry Tseng and Dmitrii Matveichev, “Comprehensive Client-Side Rogue AP Attack Detection”, Wireless, Ad Hoc and Sensor Networks, 2017.
Chinyang Henry Tseng and J. S. Yen, “Enhanced Gaussian Mixture Model for Indoor Positioning Accuracy”, International Computer Symposium (ICS), 2016.
Chinyang Henry Tseng, Yao-Cing Shih, Tong-Ying Juang “Bluetooth reliable multi-hop transmission model based on received signal strength for industrial wireless communications,” Wireless, Ad Hoc and Sensor Networks, 2016.
Chinyang Henry Tseng, Che-Wei Chang, Tong-Ying Juang “Evaluation Mechanism of Reference Point Accuracy for Indoor Positioning, ” Wireless, Ad Hoc and Sensor Networks, 2016.
Chinyang Henry Tseng, Ching-Yao Hsiao, Tong-Ying Juang, “Adaptive Wi-Fi multi-hop transmission model based on received signal strength for industrial long distance wireless communications,” Mobile Computing Workshop, 2016.
Chinyang Henry Tseng, Hang Cheng , Tong-Ying Juang, “A model of improving indoor positioning signal accuracy based on clustering algorithm analysis,” Mobile Computing Workshop, 2016.
Chinyang Henry Tseng, Chun-Wei Lai, Tong-Ying Juang, “Automatic Web-log Filtering mechanism for web attack digital forensic,” Taiwan Academia Conference, (TANET), 2015, Best Paper Award.
Chinyang Henry Tseng, Kai-Siang Zhang, Tong-Ying Juang, Po-Ting Liu, “Detection Game Bots Based on K-means and Bayesian Belief Networks,” Mobile Computing Workshop, 2015.
Chinyang Henry Tseng, Sheng-Shan Wang, Yue-Shan Chang, Tong-Ying Juang, Hsin-Fu Tsai, “Adaptive Multihop Transmission for Wireless Sensor Network Based on Received Signal Strength, ” Mobile Computing Workshop, 2015.
Chinyang Henry Tseng, Bernard Chia, Tong-Ying Juang, “Web Forensic Evidence of SQL Injection Analysis, ” Mobile Computing Workshop, 2014.
Chinyang Henry Tseng, Jing-Hung Lin, Tong-Ying Juang , “A lexical identification model for detecting malicious domain names without vowels,” Mobile Computing Workshop, 2014.
Chinyang Henry Tseng, Li-Hsin Peng, Tong-Ying Juang, “Adaptive Pipelining Transmission mechanism for ZigBee Networks,” Wireless, Ad Hoc and Sensor Networks, 2014.
Chinyang Henry Tseng, Shin-Yun Chang, Tong-Ying Juang, “An Efficient Web Log Filter Scheme for Web Abnormal Behaviors, ” Mobile Computing Workshop, 2014.
Chinyang Henry Tseng, Shiahuey Wang, Sheng-Chao Wang, Tong-Ying Juang, “Proactive Malware Collection and Classification System: How to collect and classify useful malware samples?,” International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), 2014.
Chinyang Henry Tseng, Wei-Yun Hsiao, Woei-Jiunn Tsaur, Tong-Ying Juang, “A Novel Scheme for DKOM Rootkit Detection based on Windows driver deep scanning,” National Computer Symposium (NCS), 2013.
Chinyang Henry Tseng, ShiauHuey Wang, Bor-Shing Lin, Tong-Ying Junag, Xiao-Ru Ji, “CDTS: Coordinator Data Traffic Shunt model for Zigbee networks,” International Computer Symposium (ICS), 2012, Best paper candidate.
Hsiao-Ching Lin, Ming-Kung Sun, Han-Wei Huang, Hui-Tang Lin, Chinyang Henry Tseng, “A Specification-based Intrusion Detection Model for Wireless Ad Hoc Networks,” International Conference on Innovations in Bio-Inspired Computing and Applications, 2012.
Chinyang Henry Tseng, Shaiuhuey Wang, Xiao-Ru Ji, Bor-Shing Lin, Tong-Ying Juang, “Data Flow Diffluence Model for Zigbee Networks. The 8th Workshop on Wireless, Ad Hoc and Sensor Networks,” Wireless, Ad Hoc and Sensor Networks, 2012.
Woei-Jiunn Tsaur, Chinyang Henry Tseng, Shaiuhuey Wang, Wen-Long Lee, Tong-Ying Juang, “Hierarchical Cluster based Dynamic Key Management Model for Mobile Ad hoc Networks,” Wireless, Ad Hoc and Sensor Networks, 2012.
Chinyang Henry Tseng, Shiau-huey Wang, Jiajun Chen, “Designing questionnaire Model with Binary Decision Trees, Analytic Hierarchy Process (AHP), and Image-based Presentations,” Asian Conference on Psychology & the Behavioral Sciences (ACP), 2012.
Chinyang Henry Tseng, Shiau-huey Wang, Sheng-hsin Huang, “Scenario based questionnaires using multimedia and virtual characters,” Asian Conference on Psychology & the Behavioral Sciences (ACP), 2012.
Chinyang Henry Tseng, Shiau-huey Wang, Chiao-Ying Hsu, “Applying the Holland’s theory and Multiple Intelligences to online consumer behavior for better recommendation”, Asian Conference on Psychology & the Behavioral Sciences (ACP), 2012.
Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matthew Bishop, “Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks,” International Symposium on Recent Advances in Intrusion Detection (RAID),2007.
Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt, “DRETA: Distributed Routing Evidence Tracing and Authentication intrusion detection Model for MANET,” ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2007.
Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt, “DEMEM: Distributed Event-driven Message Exchange intrusion detection Model for MANET,” International Symposium on Recent Advances in Intrusion Detection (RAID), 2006.
Shiau-Huey Wang, Chinyang Henry Tseng, Calvin Ko, Michael Gertz, Karl N. Levitt, “A General Automatic Response Model for MANET,” IEEE International Workshop on Next Generation Wireless Networks (WoNGeN), 2005.
Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, “A Specification-based Intrusion Detection Model for OLSR,” International Symposium on Recent Advances in Intrusion Detection (RAID), 2005.
Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt, “Formal Reasoning about a Specification-based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad hoc Networks,” International Workshop on Formal Aspects in Security and Trust (FAST), 2005.
Chinyang Henry Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt, “A Specification-based Intrusion Detection system for AODV,” ACM Workshop on Security of ad hoc and Sensor Networks (SASN), 2003.
曾俊元, 林家宏, 莊東穎, ”針對無母音惡意域名之語彙特徵辨識模型”, 全國資訊安全會議 (CISC), 2014.
曾俊元, 朱彥曦, “惡意程式樣本資料庫暨分析之平台建置,” 台灣網際網路研討會 (TANET), 2012. 最佳論文候選.
曾俊元, 張乙元, “問卷回應結果評分機制應用於網路問卷設 計之研究:以科技接受模式探討,” 海峽兩岸資訊管理發展與策略學術研討會 (CSIM), 2012.
曾俊元, 王筱惠, 周俊彥, 曹偉駿, “應用多特徵與倒傳遞類神經網路於網路廣告機器人之偵測”, 無線、隨意及感測網路研討會 (WASN), 2012.
曾俊元, 王筱惠, 蔡勇嶢, “基於語彙分析的Botnet惡意域名辨識”, 臺灣商管與資訊研討會 (TBI), 2012.
曾俊元, 王筱惠, 蔡勇嶢, “辨識Botnet惡意域名的語彙特徵探討”,資訊安全會議 (CISC), 2012.
曾俊元, 周俊諺, “以類神經網路為基礎偵測惡意Web Robot”, 資訊科技與管理研討會, 2012.