Permutation arrays under the Chebyshev distance T Klove, TT Lin, SC Tsai, WG Tzeng IEEE Transactions on Information Theory 56 (6), 2611-2617, 2010 | 132 | 2010 |
Compiler optimization on instruction scheduling for low power C Lee, JK Lee, TT Hwang Proceedings 13th International Symposium on System Synthesis, 55-60, 2000 | 130 | 2000 |
RL-routing: An SDN routing algorithm based on deep reinforcement learning YR Chen, A Rezapour, WG Tzeng, SC Tsai IEEE Transactions on Network Science and Engineering 7 (4), 3185-3199, 2020 | 100 | 2020 |
Compiler optimization on VLIW instruction scheduling for low power C Lee, JK Lee, T Hwang, SC Tsai ACM Transactions on Design Automation of Electronic Systems (TODAES) 8 (2 …, 2003 | 97 | 2003 |
Distance-preserving mappings from binary vectors to permutations JC Chang, RJ Chen, T Klove, SC Tsai IEEE Transactions on Information Theory 49 (4), 1054-1059, 2003 | 75 | 2003 |
An optimal data hiding scheme with tree-based parity check CL Hou, CC Lu, SC Tsai, WG Tzeng IEEE Transactions on Image Processing 20 (3), 880-886, 2010 | 52 | 2010 |
Detecting p2p botnet in software defined networks SC Su, YR Chen, SC Tsai, YB Lin Security and Communication Networks 2018, 1-13, 2018 | 43 | 2018 |
Lower Bounds on Representing Boolean Functions as Polynomials in SC Tsai SIAM Journal on Discrete Mathematics 9 (1), 55-62, 1996 | 43 | 1996 |
Detecting amplification attacks with software defined networking CC Chen, YR Chen, WC Lu, SC Tsai, MC Yang 2017 IEEE conference on dependable and secure computing, 195-201, 2017 | 39 | 2017 |
Decoding frequency permutation arrays under Chebyshev distance MZ Shieh, SC Tsai IEEE transactions on information theory 56 (11), 5730-5737, 2010 | 37 | 2010 |
On the fairness and complexity of generalized k-in-a-row games MY Hsieh, SC Tsai Theoretical Computer Science 385 (1-3), 88-100, 2007 | 25 | 2007 |
On the complexity of hardness amplification CJ Lu, SC Tsai, HL Wu 20th Annual IEEE Conference on Computational Complexity (CCC'05), 170-182, 2005 | 24 | 2005 |
Extracting randomness from multiple independent sources CJ Lee, CJ Lu, SC Tsai, WG Tzeng IEEE Transactions on Information Theory 51 (6), 2224-2227, 2005 | 24 | 2005 |
JGAP: a Java‐based graph algorithms platform DY Chen, TR Chuang, SC Tsai Software: Practice and Experience 31 (7), 615-635, 2001 | 23 | 2001 |
On the inapproximability of maximum intersection problems MZ Shieh, SC Tsai, MC Yang Information Processing Letters 112 (19), 723-727, 2012 | 21 | 2012 |
Efficient encoding and decoding with permutation arrays TT Lin, SC Tsai, WG Tzeng 2008 IEEE International Symposium on Information Theory, 211-214, 2008 | 21 | 2008 |
Key establishment schemes against storage-bounded adversaries in wireless sensor networks SC Tsai, WG Tzeng, KY Zhou IEEE Transactions on Wireless Communications 8 (3), 1218-1222, 2009 | 20 | 2009 |
Network security management with traffic pattern clustering TW Chiou, SC Tsai, YB Lin Soft Computing 18, 1757-1770, 2014 | 18 | 2014 |
Enhancing 5G/IoT transport security through content permutation YB Lin, TJ Huang, SC Tsai IEEE Access 7, 94293-94299, 2019 | 16 | 2019 |
On the Jensen-Shannon divergence and variational distance SC Tsai, WG Tzeng, HL Wu IEEE transactions on information theory 51 (9), 3333-3336, 2005 | 16 | 2005 |