default search action
Chih-Hung Hsieh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Sheng-Tsung Tu, Louis Y. Y. Lu, Chih-Hung Hsieh, Chia-Yu Wu:
A study of internet public opinion leaders with COVID-19 pandemic in Taiwan as a case. Int. J. Soc. Humanist. Comput. 4(2): 111-130 (2024) - 2021
- [c17]Sheng-Tsung Tu, Chia-Yu Wu, Louis Y. Y. Lu, Chih-Hung Hsieh:
Opinion Leaders in Internet Public Opinion: A Case Study on the Controversy of U.S. Pork Containing Ractopamine. ICCE-TW 2021: 1-2
2010 – 2019
- 2017
- [j7]Chiun-How Kao, Chih-Hung Hsieh, Yu-Feng Chu, Yu-Ting Kuang, Chuan-Kai Yang:
Using data visualization technique to detect sensitive information re-identification problem of real open dataset. J. Syst. Archit. 80: 85-91 (2017) - [j6]Kuo-Chan Lee, Chih-Hung Hsieh, Li-Jia Wei, Ching-Hao Mao, Jyun-Han Dai, Yu-Ting Kuang:
Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation. Soft Comput. 21(11): 2883-2896 (2017) - 2016
- [c16]Jain-Shing Wu, Yuh-Jye Lee, Te-En Wei, Chih-Hung Hsieh, Chia-Min Lai:
ChainSpot: Mining Service Logs for Cyber Security Threat Detection. Trustcom/BigDataSE/ISPA 2016: 1867-1874 - 2015
- [c15]Chih-Hung Hsieh, Kuo-Chen Lee, Ching-Hao Mao, Chia-Min Lai, Chiun-How Kao, Jyun-Han Dai:
Sec-Buzzers: a Web Service for Exploring Cyber Security Emerging Topics based on Social Network Mining. ASE BD&SI 2015: 27:1-27:6 - [c14]Chih-Hung Hsieh, Yu-Siang Shen, Chao-Wen Li, Jain-Shing Wu:
iF2: An Interpretable Fuzzy Rule Filter for Web Log Post-Compromised Malicious Activity Monitoring. AsiaJCIS 2015: 130-137 - [c13]Chih-Hung Hsieh, Wei-Chieh Chao, Pei-Wen Liu, Chao-Wen Li:
Cyber security risk assessment using an interpretable evolutionary fuzzy scoring system. ICCST 2015: 153-158 - [c12]Chih-Hung Hsieh, Chia-Min Lai, Ching-Hao Mao, Tien-Cheu Kao, Kuo-Chen Lee:
AD2: Anomaly detection on active directory log data for insider threat monitoring. ICCST 2015: 287-292 - 2014
- [j5]Yung-Kuei Chiang, Neng-Chung Wang, Chih-Hung Hsieh:
A Cycle-Based Data Aggregation Scheme for Grid-Based Wireless Sensor Networks. Sensors 14(5): 8447-8464 (2014) - [c11]Neng-Chung Wang, Yung-Kuei Chiang, Young-Long Chen, Chih-Hung Hsieh:
A Dual-Path-Based Data Aggregation Scheme for Grid-Based Wireless Sensor Networks. IMIS 2014: 477-482 - [c10]Chih-Hung Hsieh, Hsin-Mu Tsai, Shao-Wen Yang, Shou-De Lin:
Predict Scooter's Stopping Event Using Smartphone as the Sensing Device. iThings/GreenCom/CPSCom 2014: 17-23 - [c9]Dmitry Lagun, Chih-Hung Hsieh, Dale Webster, Vidhya Navalpakkam:
Towards better measurement of attention and satisfaction in mobile search. SIGIR 2014: 113-122 - [c8]Kuan-Wen Chen, Hsin-Mu Tsai, Chih-Hung Hsieh, Shou-De Lin, Chieh-Chih Wang, Shao-Wen Yang, Shao-Yi Chien, Chia-Han Lee, Yu-Chi Su, Chun-Ting Chou, Yuh-Jye Lee, Hsing-Kuo Pao, Ruey-Shan Guo, Chung-Jen Chen, Ming-Hsuan Yang, Bing-Yu Chen, Yi-Ping Hung:
Connected vehicle safety science, system, and framework. WF-IoT 2014: 235-240 - 2013
- [c7]Yung-Kuei Chiang, Neng-Chung Wang, Chih-Hung Hsieh:
Cycle-Based Data Aggregation for Grid-Based Wireless Sensor Networks. IMIS 2013: 348-353 - 2010
- [j4]Chih-Hung Hsieh, Darby Tien-Hao Chang, Cheng-Hao Hsueh, Chi-Yeh Wu, Yen-Jen Oyang:
Predicting microRNA precursors with a generalized Gaussian components based density estimation algorithm. BMC Bioinform. 11(S-1): 52 (2010) - [j3]Darby Tien-Hao Chang, Jung-Hsin Lin, Chih-Hung Hsieh, Yen-Jen Oyang:
On the Design of Optimization Algorithms for Prediction of Molecular Interactions. Int. J. Artif. Intell. Tools 19(3): 267-280 (2010) - [c6]Hsing-Shao Liu, Ching-Chia Hsieh, Hsin-Chun Chen, Chih-Hung Hsieh, Wanjiun Liao, Po-Cheng Chu, Chia-Hui Wang:
Exploiting Multi-Link SCTP for Live TV Broadcasting Service. VTC Spring 2010: 1-6
2000 – 2009
- 2009
- [c5]Darby Tien-Hao Chang, Jung-Hsin Lin, Chih-Hung Hsieh, Yen-Jen Oyang:
On the Design of Optimization Algorithms for Prediction of Molecular Interactions. BIBE 2009: 208-215 - [c4]Chih-Hung Hsieh, Darby Tien-Hao Chang, Yen-Jen Oyang:
Data classification with a generalized Gaussian components based density estimation algorithm. IJCNN 2009: 1259-1266 - 2007
- [j2]Shinn-Ying Ho, Chih-Hung Hsieh, Fu-Chieh Yu, Hui-Ling Huang:
An Intelligent Two-Stage Evolutionary Algorithm for Dynamic Pathway Identification From Gene Expression Profiles. IEEE ACM Trans. Comput. Biol. Bioinform. 4(4): 648-704 (2007) - 2006
- [j1]Shiuh-Nan Hwang, Chi-Tsung Yu, Chih-Hung Hsieh, Benjamin Yuan:
The STIM Synergy of Non-profit Market Research Organization inTaiwan. Int. J. Electron. Bus. Manag. 4(3): 220-229 (2006) - [c3]Shinn-Ying Ho, Chih-Hung Hsieh, Kuan-Wei Chen, Hui-Ling Huang, Hung-Ming Chen, Shinn-Jang Ho:
Scoring Method for Tumor Prediction from Microarray Data Using an Evolutionary Fuzzy Classifier. PAKDD 2006: 520-529 - 2005
- [c2]Shinn-Ying Ho, Chih-Hung Hsieh, Fu-Chieh Yu, Hui-Ling Huang:
Evolutionary divide-and-conquer approach to inferring S-system models of genetic networks. Congress on Evolutionary Computation 2005: 691-698 - [c1]Shinn-Ying Ho, Chih-Hung Hsieh, Fu-Chieh Yu:
Inference of S-system Models for Large-Scale Genetic Networks. ICDE Workshops 2005: 1155
1990 – 1999
- 1992
- [b1]Chih-Hung Hsieh:
Typing Higher-Order Functions with Dynamic Dispatching. New York University, USA, 1992
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint