Follow
洪西進 (Shi-Jinn Horng)
洪西進 (Shi-Jinn Horng)
國立台灣科技大學 資訊工程系
Verified email at mail.ntust.edu.tw
Title
Cited by
Cited by
Year
A novel intrusion detection system based on hierarchical clustering and support vector machines
SJ Horng, MY Su, YH Chen, TW Kao, RJ Chen, JL Lai, CD Perkasa
Expert systems with Applications 38 (1), 306-313, 2011
6522011
Multivariate time series forecasting via attention-based encoder–decoder framework
S Du, T Li, Y Yang, SJ Horng
Neurocomputing 388, 269-279, 2020
3282020
An improved method for forecasting enrollments based on fuzzy time series and particle swarm optimization
IH Kuo, SJ Horng, TW Kao, TL Lin, CL Lee, Y Pan
Expert systems with applications 36 (3), 6108-6117, 2009
3082009
Deep air quality forecasting using hybrid deep learning framework
S Du, T Li, Y Yang, SJ Horng
IEEE Transactions on Knowledge and Data Engineering 33 (6), 2412-2424, 2019
3042019
Performance evaluation of score level fusion in multimodal biometric systems
M He, SJ Horng, P Fan, RS Run, RJ Chen, JL Lai, MK Khan, KO Sentosa
Pattern Recognition 43 (5), 1789-1800, 2010
2992010
b-SPECS+: Batch verification for secure pseudonymous authentication in VANET
SJ Horng, SF Tzeng, Y Pan, P Fan, X Wang, T Li, MK Khan
IEEE transactions on information forensics and security 8 (11), 1860-1875, 2013
2902013
An efficient job-shop scheduling algorithm based on particle swarm optimization
TL Lin, SJ Horng, TW Kao, YH Chen, RS Run, RJ Chen, JL Lai, IH Kuo
Expert Systems with Applications 37 (3), 2629-2636, 2010
2852010
An efficient watermarking method based on significant difference of wavelet coefficient quantization
WH Lin, SJ Horng, TW Kao, P Fan, CL Lee, Y Pan
IEEE Transactions on Multimedia 10 (5), 746-757, 2008
2762008
An improved SVD-based watermarking technique for copyright protection
RS Run, SJ Horng, JL Lai, TW Kao, RJ Chen
Expert Systems with applications 39 (1), 673-689, 2012
2492012
Enhancing security and privacy for identity-based batch verification scheme in VANETs
SF Tzeng, SJ Horng, T Li, X Wang, PH Huang, MK Khan
IEEE Transactions on Vehicular Technology 66 (4), 3235-3248, 2015
2342015
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
SJ Horng, SF Tzeng, PH Huang, X Wang, T Li, MK Khan
Information Sciences 317, 48-66, 2015
2272015
A blind watermarking method using maximum wavelet coefficient quantization
WH Lin, YR Wang, SJ Horng, TW Kao, Y Pan
Expert Systems with Applications 36 (9), 11509-11516, 2009
1812009
An efficient phishing webpage detector
M He, SJ Horng, P Fan, MK Khan, RS Run, JL Lai, RJ Chen, A Sutanto
Expert systems with applications 38 (10), 12018-12027, 2011
1802011
A decision-theoretic rough set approach for dynamic data mining
H Chen, T Li, C Luo, SJ Horng, G Wang
IEEE Transactions on fuzzy Systems 23 (6), 1958-1970, 2015
1752015
A hybrid method for traffic flow forecasting using multimodal deep learning
S Du, T Li, X Gong, SJ Horng
International journal of computational intelligence systems 13 (1), 85-97, 2020
1742020
Forecasting TAIFEX based on fuzzy time series and particle swarm optimization
IH Kuo, SJ Horng, YH Chen, RS Run, TW Kao, RJ Chen, JL Lai, TL Lin
Expert Systems with Applications 37 (2), 1494-1502, 2010
1642010
Applying an online game-based formative assessment in a flowchart-based intelligent tutoring system for improving problem-solving skills
D Hooshyar, RB Ahmad, M Yousefi, M Fathi, SJ Horng, H Lim
Computers & Education 94, 18-36, 2016
1452016
An efficient flow-shop scheduling algorithm based on a hybrid particle swarm optimization model
IH Kuo, SJ Horng, TW Kao, TL Lin, CL Lee, T Terano, Y Pan
Expert systems with applications 36 (3), 7027-7032, 2009
1442009
A static malware detection system using data mining methods
U Baldangombo, N Jambaljav, SJ Horng
arXiv preprint arXiv:1308.2831, 2013
1402013
A novel anti-collision algorithm in RFID systems for identifying passive tags
YH Chen, SJ Horng, RS Run, JL Lai, RJ Chen, WC Chen, Y Pan, T Takao
IEEE Transactions on Industrial Informatics 6 (1), 105-121, 2009
1382009
The system can't perform the operation now. Try again later.
Articles 1–20