Chuan‐Sheng Wang

ORCID: 0000-0002-0739-6891
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Ionosphere and magnetosphere dynamics
  • GNSS positioning and interference
  • Geophysics and Gravity Measurements
  • Blind Source Separation Techniques
  • Wireless Communication Security Techniques
  • Web Data Mining and Analysis
  • Spam and Phishing Detection
  • Internet Traffic Analysis and Secure E-voting
  • Caching and Content Delivery
  • Advanced Wireless Communication Techniques
  • Advanced Data Storage Technologies
  • Access Control and Trust
  • Advanced Frequency and Time Standards
  • Advanced Malware Detection Techniques
  • Wireless Communication Networks Research
  • Wireless Signal Modulation Classification

National Central University
2007-2020

Chunghwa Telecom (Taiwan)
2016-2020

National Taipei University
2014

Abstract Sensing of precipitable water vapor (PWV) using the Global Positioning System (GPS) has been intensively investigated in past 2 decades. However, it still remains a challenging task at high temporal resolution and real‐time mode. In this study accuracy zenith total delay (ZTD) PWV GPS precise point positioning (PPP) technique is investigated. observations 1 month period from 20 globally distributed stations are selected for testing. The derived ZTDs most agree well with tropospheric...

10.1002/2014jd021486 article EN Journal of Geophysical Research Atmospheres 2014-08-07

Although the topic of positioning precision Global Positioning System (GPS) has been studied extensively, it focuses mostly on error sources such as ionospheric effect, antenna phase center variation and tropospheric influence. This investigation addresses influence effect results height determination. Used data are obtained from GPS receivers a network co‐located surface meteorological instruments in 2003. Two approaches, parameter estimation external correction, utilized to correct zenith...

10.1029/2008gl035929 article EN Geophysical Research Letters 2008-12-01

Summary This paper proposes a passive user‐side solution, called Wi‐Fi legal access point (AP) finder (LAF), to the notorious evil twin problem, which in turn can result diverse security problems, such as fraud, identity theft, and man‐in‐the‐middle attacks. Due severe threats created by twins, many promising solutions have been proposed. However, majority of these are designed for administrators wireless networks, not users. Hence, they either too expensive or need some data that usually...

10.1002/dac.4460 article EN International Journal of Communication Systems 2020-06-25

AbstractGPS Radio Occultation (RO) is a space-based technique for sounding the Earth's atmosphere. This has demonstrated great potential improving numerical weather prediction and climate monitoring. investigation utilises FORMOSAT-3/COSMIC RO data to identify differences between results obtained using two different processing packages – Processing Package (ROPP) COSMIC Data Analysis Archive Center (CDAAC) software package. The introduced measurements are all from CDAAC dataset. study...

10.1080/08120099.2014.924555 article EN Australian Journal of Earth Sciences 2014-06-10

Today's smartphone app stores are full of apps with diverse features. Many developers use third-party libraries to reduce the development time and cost, but often ignore security problems libraries. A major problem introduced by is that a library has same permissions as apps, called <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">host-apps</i> hereafter, it. According previous research, having its host could have unauthorized access user...

10.1109/tdsc.2019.2937925 article EN IEEE Transactions on Dependable and Secure Computing 2019-08-27

Abstract The reputation system is used to display the of entities based on ratings or appraisals given by users who have purchased those entities. Web service providers supply various systems for their users. However, these promising face some challenges. First, even though different persons preference and values (values are a person's beliefs about what things good bad), still give same rating entity all Second, they may be greatly influenced Sybil attacks. In this paper, we propose system,...

10.1002/sec.1704 article EN Security and Communication Networks 2016-11-27

We investigate block-coded QAM constructed by multilevel coding for the noncoherent generalized likelihood ratio test (GLRT) detector. For AWGN channel, we derive a new GLRT detector and corresponding distance. The minimum distance of is derived two construction (NBC-QAM) are proposed accordingly. In NBC-QAM scheme, error performance can be optimized adjusting constellation. superior performances verified simulation results.

10.1109/icc.2007.147 article EN IEEE International Conference on Communications 2007-06-01
Coming Soon ...