Big data analytics: a survey CW Tsai, CF Lai, HC Chao, AV Vasilakos Journal of Big data 2, 1-32, 2015 | 1189 | 2015 |
Multimedia traffic security architecture for the internet of things L Zhou, HC Chao IEEE Network 25 (3), 35-40, 2011 | 441 | 2011 |
A survey of black hole attacks in wireless mobile ad hoc networks FH Tseng, LD Chou, HC Chao Human-centric Computing and Information Sciences 1, 1-16, 2011 | 389* | 2011 |
Management and applications of trust in Wireless Sensor Networks: A survey G Han, J Jiang, L Shu, J Niu, HC Chao Journal of Computer and System Sciences 80 (3), 602-617, 2014 | 355 | 2014 |
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks YM Huang, MY Hsieh, HC Chao, SH Hung, JH Park IEEE journal on selected areas in communications 27 (4), 400-411, 2009 | 348 | 2009 |
Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing JS Fu, Y Liu, HC Chao, BK Bhargava, ZJ Zhang IEEE Transactions on Industrial Informatics 14 (10), 4519-4528, 2018 | 319 | 2018 |
A survey of utility-oriented pattern mining W Gan, JCW Lin, P Fournier-Viger, HC Chao, VS Tseng, SY Philip IEEE Transactions on Knowledge and Data Engineering 33 (4), 1306-1327, 2019 | 305 | 2019 |
A survey of parallel sequential pattern mining W Gan, JCW Lin, P Fournier-Viger, HC Chao, PS Yu ACM Transactions on Knowledge Discovery from Data (TKDD) 13 (3), 1-34, 2019 | 288 | 2019 |
Blockchain-based systems and applications: a survey J Zhang, S Zhong, T Wang, HC Chao, J Wang Journal of Internet Technology 21 (1), 1-14, 2020 | 275 | 2020 |
Cooperative fog computing for dealing with big data in the internet of vehicles: Architecture and hierarchical resource management W Zhang, Z Zhang, HC Chao IEEE Communications Magazine 55 (12), 60-67, 2017 | 271 | 2017 |
Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach JM Chang, PC Tsou, I Woungang, HC Chao, CF Lai IEEE systems journal 9 (1), 65-75, 2014 | 244 | 2014 |
Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs YS Yen, HC Chao, RS Chang, A Vasilakos Mathematical and Computer Modelling 53 (11-12), 2238-2250, 2011 | 243 | 2011 |
Dynamic resource prediction and allocation for cloud data center using the multiobjective genetic algorithm FH Tseng, X Wang, LD Chou, HC Chao, VCM Leung IEEE Systems Journal 12 (2), 1688-1699, 2017 | 228 | 2017 |
Metaverse in education: Vision, opportunities, and challenges H Lin, S Wan, W Gan, J Chen, HC Chao 2022 IEEE International Conference on Big Data (Big Data), 2857-2866, 2022 | 222 | 2022 |
Integration of SDR and SDN for 5G HH Cho, CF Lai, TK Shih, HC Chao Ieee Access 2, 1196-1204, 2014 | 207 | 2014 |
Indoor smartphone localization via fingerprint crowdsourcing: Challenges and approaches B Wang, Q Chen, LT Yang, HC Chao IEEE Wireless Communications 23 (3), 82-89, 2016 | 197 | 2016 |
Detection of cognitive injured body region using multiple triaxial accelerometers for elderly falling CF Lai, SY Chang, HC Chao, YM Huang IEEE Sensors Journal 11 (3), 763-770, 2010 | 179 | 2010 |
Data mining in distributed environment: a survey W Gan, JCW Lin, HC Chao, J Zhan Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 7 (6 …, 2017 | 173 | 2017 |
A survey of incremental high‐utility itemset mining W Gan, JCW Lin, P Fournier‐Viger, HC Chao, TP Hong, H Fujita Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 8 (2 …, 2018 | 169 | 2018 |
HUOPM: High-utility occupancy pattern mining W Gan, JCW Lin, P Fournier-Viger, HC Chao, SY Philip IEEE transactions on cybernetics 50 (3), 1195-1208, 2019 | 161 | 2019 |