Follow
洪西進 (Shi-Jinn Horng)
洪西進 (Shi-Jinn Horng)
亞洲大學 資訊工程系
Verified email at mail.ntust.edu.tw
Title
Cited by
Cited by
Year
A novel intrusion detection system based on hierarchical clustering and support vector machines
SJ Horng, MY Su, YH Chen, TW Kao, RJ Chen, JL Lai, CD Perkasa
Expert systems with Applications 38 (1), 306-313, 2011
6792011
Multivariate time series forecasting via attention-based encoder–decoder framework
S Du, T Li, Y Yang, SJ Horng
Neurocomputing 388, 269-279, 2020
4252020
Deep air quality forecasting using hybrid deep learning framework
S Du, T Li, Y Yang, SJ Horng
IEEE Transactions on Knowledge and Data Engineering 33 (6), 2412-2424, 2019
4162019
An improved method for forecasting enrollments based on fuzzy time series and particle swarm optimization
IH Kuo, SJ Horng, TW Kao, TL Lin, CL Lee, Y Pan
Expert systems with applications 36 (3), 6108-6117, 2009
3222009
b-SPECS+: Batch verification for secure pseudonymous authentication in VANET
SJ Horng, SF Tzeng, Y Pan, P Fan, X Wang, T Li, MK Khan
IEEE transactions on information forensics and security 8 (11), 1860-1875, 2013
3112013
Performance evaluation of score level fusion in multimodal biometric systems
M He, SJ Horng, P Fan, RS Run, RJ Chen, JL Lai, MK Khan, KO Sentosa
Pattern Recognition 43 (5), 1789-1800, 2010
3042010
An efficient job-shop scheduling algorithm based on particle swarm optimization
TL Lin, SJ Horng, TW Kao, YH Chen, RS Run, RJ Chen, JL Lai, IH Kuo
Expert Systems with Applications 37 (3), 2629-2636, 2010
3012010
An efficient watermarking method based on significant difference of wavelet coefficient quantization
WH Lin, SJ Horng, TW Kao, P Fan, CL Lee, Y Pan
IEEE Transactions on Multimedia 10 (5), 746-757, 2008
2852008
Enhancing security and privacy for identity-based batch verification scheme in VANETs
SF Tzeng, SJ Horng, T Li, X Wang, PH Huang, MK Khan
IEEE Transactions on Vehicular Technology 66 (4), 3235-3248, 2015
2712015
An improved SVD-based watermarking technique for copyright protection
RS Run, SJ Horng, JL Lai, TW Kao, RJ Chen
Expert Systems with applications 39 (1), 673-689, 2012
2582012
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
SJ Horng, SF Tzeng, PH Huang, X Wang, T Li, MK Khan
Information Sciences 317, 48-66, 2015
2422015
A hybrid method for traffic flow forecasting using multimodal deep learning
S Du, T Li, X Gong, SJ Horng
International journal of computational intelligence systems 13 (1), 85-97, 2020
2012020
A decision-theoretic rough set approach for dynamic data mining
H Chen, T Li, C Luo, SJ Horng, G Wang
IEEE Transactions on fuzzy Systems 23 (6), 1958-1970, 2015
1882015
An efficient phishing webpage detector
M He, SJ Horng, P Fan, MK Khan, RS Run, JL Lai, RJ Chen, A Sutanto
Expert systems with applications 38 (10), 12018-12027, 2011
1882011
A blind watermarking method using maximum wavelet coefficient quantization
WH Lin, YR Wang, SJ Horng, TW Kao, Y Pan
Expert Systems with Applications 36 (9), 11509-11516, 2009
1862009
Forecasting TAIFEX based on fuzzy time series and particle swarm optimization
IH Kuo, SJ Horng, YH Chen, RS Run, TW Kao, RJ Chen, JL Lai, TL Lin
Expert Systems with Applications 37 (2), 1494-1502, 2010
1752010
Applying an online game-based formative assessment in a flowchart-based intelligent tutoring system for improving problem-solving skills
D Hooshyar, RB Ahmad, M Yousefi, M Fathi, SJ Horng, H Lim
Computers & Education 94, 18-36, 2016
1592016
A static malware detection system using data mining methods
U Baldangombo, N Jambaljav, SJ Horng
arXiv preprint arXiv:1308.2831, 2013
1512013
An efficient flow-shop scheduling algorithm based on a hybrid particle swarm optimization model
IH Kuo, SJ Horng, TW Kao, TL Lin, CL Lee, T Terano, Y Pan
Expert systems with applications 36 (3), 7027-7032, 2009
1482009
A novel anti-collision algorithm in RFID systems for identifying passive tags
YH Chen, SJ Horng, RS Run, JL Lai, RJ Chen, WC Chen, Y Pan, T Takao
IEEE Transactions on Industrial Informatics 6 (1), 105-121, 2009
1442009
The system can't perform the operation now. Try again later.
Articles 1–20