Tzeng, Wen-Guey
287  results:
Search for persons X
?
1

RL-Shield: Mitigating Target Link-Flooding Attacks Using SD..:

Rezapour, Amir ; Tzeng, Wen-Guey
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  6 - p. 4052-4067 , 2022
 
?
2

A Black-Box Adversarial Attack via Deep Reinforcement Learn..:

, In: 2021 IEEE Conference on Dependable and Secure Computing (DSC),
 
?
 
?
5

Effective Botnet Detection Through Neural Networks on Convo..:

, In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE),
 
?
9

Permutation Arrays Under the Chebyshev Distance:

Klove, Torleiv ; Lin, Te-Tsung ; Tsai, Shi-Chun.
IEEE Transactions on Information Theory.  56 (2010)  6 - p. 2611-2617 , 2010
 
?
10

Optimal resilient threshold GQ signatures:

Chu, Cheng-Kang ; Tzeng, Wen-Guey
Information Sciences.  177 (2007)  8 - p. 1834-1851 , 2007
 
?
11

A secure system for data access based on anonymous authenti..:

, In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security,
Tzeng, Wen-Guey - p. 223-230 , 2006
 
?
12

A Public-Key Traitor Tracing Scheme with Revocation Using D..:

Tzeng, Wen-Guey ; Tzeng, Zhi-Jia
Designs, Codes and Cryptography.  35 (2005)  1 - p. 47-61 , 2005
 
?
 
?
14

Common modulus and chosen-message attacks on public-key sch..:

Tzeng, Wen-Guey
Information Processing Letters.  70 (1999)  3 - p. 153-156 , 1999
 
?
15

On-line algorithms for the dominating set problem:

King, Gow-Hsing ; Tzeng, Wen-Guey
Information Processing Letters.  61 (1997)  1 - p. 11-14 , 1997
 
1-15