Privacy-preserving machine learning: Threats and solutions M Al-Rubaie, JM Chang IEEE Security & Privacy 17 (2), 49-58, 2019 | 484 | 2019 |
WiMAX: The emergence of wireless broadband Z Abichar, Y Peng, JM Chang IT Professional Magazine 8 (4), 44, 2006 | 201 | 2006 |
QoS-aware data replication for data-intensive applications in cloud computing systems JW Lin, CH Chen, JM Chang IEEE Transactions on Cloud Computing 1 (1), 101-115, 2013 | 155 | 2013 |
Roadside-aided routing (RAR) in vehicular networks Y Peng, Z Abichar, JM Chang 2006 IEEE international conference on communications 8, 3602-3607, 2006 | 148 | 2006 |
WiMAX or LTE: Who will lead the broadband mobile Internet? MJ Chang, Z Abichar, CY Hsu IT professional 12 (3), 26-32, 2010 | 122 | 2010 |
A high performance memory allocator for object-oriented systems JM Chang, EF Gehringer IEEE Transactions on Computers 45 (3), 357-366, 1996 | 113 | 1996 |
Block-based reversible data embedding JY Hsiao, KF Chan, JM Chang Signal Processing 89 (4), 556-569, 2009 | 110 | 2009 |
DynaMo: Dynamic community detection by incrementally maximizing modularity D Zhuang, JM Chang, M Li IEEE Transactions on Knowledge and Data Engineering 33 (5), 1934-1945, 2019 | 98 | 2019 |
Fair demand response with electric vehicles for the cloud based energy management service YW Chen, JM Chang IEEE Transactions on Smart Grid 9 (1), 458-468, 2016 | 82 | 2016 |
EMaaS: Cloud-based energy management service for distributed renewable energy integration YW Chen, JM Chang IEEE Transactions on Smart Grid 6 (6), 2816-2824, 2015 | 79 | 2015 |
A layered approach to cognitive radio network security: A survey D Hlavacek, JM Chang Computer Networks 75, 414-436, 2014 | 73 | 2014 |
Reconstruction attacks against mobile-based continuous authentication systems in the cloud M Al-Rubaie, JM Chang IEEE Transactions on Information Forensics and Security 11 (12), 2648-2663, 2016 | 72 | 2016 |
Security and privacy implications on database systems in big data era: A survey GD Samaraweera, JM Chang IEEE Transactions on Knowledge and Data Engineering 33 (1), 239-258, 2019 | 67 | 2019 |
Responding to security issues in WiMAX networks CT Huang, JM Chang IT Professional 10 (5), 15-21, 2008 | 63 | 2008 |
Cost-effective kernel ridge regression implementation for keystroke-based active authentication system PY Wu, CC Fang, JM Chang, SY Kung IEEE transactions on cybernetics 47 (11), 3916-3927, 2016 | 57 | 2016 |
Multithreading in Java: Performance and scalability on multicore systems KY Chen, JM Chang, TW Hou IEEE Transactions on Computers 60 (11), 1521-1534, 2010 | 56 | 2010 |
A new preprocessing approach to improve the performance of CNN-based skin lesion classification H Zanddizari, N Nguyen, B Zeinali, JM Chang Medical & Biological Engineering & Computing 59 (5), 1123-1131, 2021 | 54 | 2021 |
Capturing cognitive fingerprints from keystroke dynamics JM Chang, CC Fang, KH Ho, N Kelly, PY Wu, Y Ding, C Chu, S Gilbert, ... IT Professional 15 (4), 24-28, 2013 | 54* | 2013 |
A comprehensive analysis of bandwidth request mechanisms in IEEE 802.16 networks D Chuck, KY Chen, JM Chang IEEE transactions on vehicular technology 59 (4), 2046-2056, 2010 | 51 | 2010 |
Securing byod JM Chang, PC Ho, TC Chang It Professional 16 (5), 9-11, 2014 | 47 | 2014 |