Follow
Han-Chieh Chao
Han-Chieh Chao
Professor of Artificial Intelligence, Tamkang University
Verified email at o365.tku.edu.tw
Title
Cited by
Cited by
Year
Big data analytics: a survey
CW Tsai, CF Lai, HC Chao, AV Vasilakos
Journal of Big data 2, 1-32, 2015
11832015
Multimedia traffic security architecture for the internet of things
L Zhou, HC Chao
IEEE Network 25 (3), 35-40, 2011
4402011
A survey of black hole attacks in wireless mobile ad hoc networks
FH Tseng, LD Chou, HC Chao
Human-centric Computing and Information Sciences 1, 1-16, 2011
390*2011
Management and applications of trust in Wireless Sensor Networks: A survey
G Han, J Jiang, L Shu, J Niu, HC Chao
Journal of Computer and System Sciences 80 (3), 602-617, 2014
3542014
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
YM Huang, MY Hsieh, HC Chao, SH Hung, JH Park
IEEE journal on selected areas in communications 27 (4), 400-411, 2009
3482009
Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing
JS Fu, Y Liu, HC Chao, BK Bhargava, ZJ Zhang
IEEE Transactions on Industrial Informatics 14 (10), 4519-4528, 2018
3182018
A survey of utility-oriented pattern mining
W Gan, JCW Lin, P Fournier-Viger, HC Chao, VS Tseng, SY Philip
IEEE Transactions on Knowledge and Data Engineering 33 (4), 1306-1327, 2019
3022019
A survey of parallel sequential pattern mining
W Gan, JCW Lin, P Fournier-Viger, HC Chao, PS Yu
ACM Transactions on Knowledge Discovery from Data (TKDD) 13 (3), 1-34, 2019
2882019
Blockchain-based systems and applications: a survey
J Zhang, S Zhong, T Wang, HC Chao, J Wang
Journal of Internet Technology 21 (1), 1-14, 2020
2722020
Cooperative fog computing for dealing with big data in the internet of vehicles: Architecture and hierarchical resource management
W Zhang, Z Zhang, HC Chao
IEEE Communications Magazine 55 (12), 60-67, 2017
2712017
Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach
JM Chang, PC Tsou, I Woungang, HC Chao, CF Lai
IEEE systems journal 9 (1), 65-75, 2014
2442014
Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs
YS Yen, HC Chao, RS Chang, A Vasilakos
Mathematical and Computer Modelling 53 (11-12), 2238-2250, 2011
2432011
Dynamic resource prediction and allocation for cloud data center using the multiobjective genetic algorithm
FH Tseng, X Wang, LD Chou, HC Chao, VCM Leung
IEEE Systems Journal 12 (2), 1688-1699, 2017
2262017
Metaverse in education: Vision, opportunities, and challenges
H Lin, S Wan, W Gan, J Chen, HC Chao
2022 IEEE International Conference on Big Data (Big Data), 2857-2866, 2022
2122022
Integration of SDR and SDN for 5G
HH Cho, CF Lai, TK Shih, HC Chao
Ieee Access 2, 1196-1204, 2014
2062014
Indoor smartphone localization via fingerprint crowdsourcing: Challenges and approaches
B Wang, Q Chen, LT Yang, HC Chao
IEEE Wireless Communications 23 (3), 82-89, 2016
1942016
Detection of cognitive injured body region using multiple triaxial accelerometers for elderly falling
CF Lai, SY Chang, HC Chao, YM Huang
IEEE Sensors Journal 11 (3), 763-770, 2010
1782010
Data mining in distributed environment: a survey
W Gan, JCW Lin, HC Chao, J Zhan
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 7 (6 …, 2017
1732017
A survey of incremental high‐utility itemset mining
W Gan, JCW Lin, P Fournier‐Viger, HC Chao, TP Hong, H Fujita
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 8 (2 …, 2018
1692018
HUOPM: High-utility occupancy pattern mining
W Gan, JCW Lin, P Fournier-Viger, HC Chao, SY Philip
IEEE transactions on cybernetics 50 (3), 1195-1208, 2019
1602019
The system can't perform the operation now. Try again later.
Articles 1–20