Privacy-preserving machine learning: Threats and solutions M Al-Rubaie, JM Chang IEEE Security & Privacy 17 (2), 49-58, 2019 | 294 | 2019 |
WiMAX: The emergence of wireless broadband Z Abichar, Y Peng, JM Chang IT Professional Magazine 8 (4), 44, 2006 | 191 | 2006 |
QoS-aware data replication for data-intensive applications in cloud computing systems JW Lin, CH Chen, JM Chang IEEE Transactions on Cloud Computing 1 (1), 101-115, 2013 | 152 | 2013 |
Roadside-aided routing (RAR) in vehicular networks Y Peng, Z Abichar, JM Chang 2006 IEEE international conference on communications 8, 3602-3607, 2006 | 139 | 2006 |
WiMAX or LTE: Who will lead the broadband mobile Internet? MJ Chang, Z Abichar, CY Hsu IT professional 12 (3), 26-32, 2010 | 118 | 2010 |
A high performance memory allocator for object-oriented systems JM Chang, EF Gehringer IEEE Transactions on Computers 45 (3), 357-366, 1996 | 108 | 1996 |
Block-based reversible data embedding JY Hsiao, KF Chan, JM Chang Signal Processing 89 (4), 556-569, 2009 | 103 | 2009 |
EMaaS: Cloud-based energy management service for distributed renewable energy integration YW Chen, JM Chang IEEE Transactions on Smart Grid 6 (6), 2816-2824, 2015 | 71 | 2015 |
Fair demand response with electric vehicles for the cloud based energy management service YW Chen, JM Chang IEEE Transactions on Smart Grid 9 (1), 458-468, 2016 | 67 | 2016 |
A layered approach to cognitive radio network security: A survey D Hlavacek, JM Chang Computer Networks 75, 414-436, 2014 | 67 | 2014 |
Responding to security issues in WiMAX networks CT Huang, JM Chang IT Professional 10 (5), 15-21, 2008 | 66 | 2008 |
Reconstruction attacks against mobile-based continuous authentication systems in the cloud M Al-Rubaie, JM Chang IEEE Transactions on Information Forensics and Security 11 (12), 2648-2663, 2016 | 61 | 2016 |
DynaMo: Dynamic community detection by incrementally maximizing modularity D Zhuang, JM Chang, M Li IEEE Transactions on Knowledge and Data Engineering 33 (5), 1934-1945, 2019 | 60 | 2019 |
Multithreading in Java: Performance and scalability on multicore systems KY Chen, JM Chang, TW Hou IEEE Transactions on Computers 60 (11), 1521-1534, 2010 | 53 | 2010 |
A comprehensive analysis of bandwidth request mechanisms in IEEE 802.16 networks D Chuck, KY Chen, JM Chang IEEE transactions on vehicular technology 59 (4), 2046-2056, 2010 | 51 | 2010 |
Cost-effective kernel ridge regression implementation for keystroke-based active authentication system PY Wu, CC Fang, JM Chang, SY Kung IEEE transactions on cybernetics 47 (11), 3916-3927, 2016 | 50 | 2016 |
Capturing cognitive fingerprints from keystroke dynamics JM Chang, CC Fang, KH Ho, N Kelly, PY Wu, Y Ding, C Chu, S Gilbert, ... IT Professional 15 (4), 24-28, 2013 | 50* | 2013 |
Securing byod JM Chang, PC Ho, TC Chang It Professional 16 (5), 9-11, 2014 | 46 | 2014 |
Active memory processor: A hardware garbage collector for real-time java embedded devices W Srisa-an, CTD Lo, JM Chang IEEE Transactions on Mobile Computing 2 (2), 89-101, 2003 | 42 | 2003 |
Group-based medium access control for IEEE 802.11 n wireless LANs Z Abichar, JM Chang IEEE Transactions on Mobile Computing 12 (2), 304-317, 2011 | 40 | 2011 |