Ding-Chau Wang

ORCID: 0000-0003-4706-4856
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed systems and fault tolerance
  • Network Security and Intrusion Detection
  • Security in Wireless Sensor Networks
  • Petri Nets in System Modeling
  • Mobile Agent-Based Network Management
  • Energy Efficient Wireless Sensor Networks
  • Industrial Vision Systems and Defect Detection
  • IPv6, Mobility, Handover, Networks, Security
  • Wireless Networks and Protocols
  • Mobile Ad Hoc Networks
  • Impact of Technology on Adolescents
  • IoT and Edge/Fog Computing
  • Mobile Learning in Education
  • Food Supply Chain Traceability
  • Smart Agriculture and AI
  • Opportunistic and Delay-Tolerant Networks
  • Service-Oriented Architecture and Web Services
  • Smart Grid Security and Resilience
  • Distributed Sensor Networks and Detection Algorithms
  • Educational Games and Gamification
  • Image Processing and 3D Reconstruction
  • Digital Marketing and Social Media
  • Advanced Wireless Network Optimization
  • Wireless Communication Networks Research
  • Cloud Computing and Resource Management

Southern Taiwan University of Science and Technology
2014-2024

National Pingtung University of Science and Technology
2019

National Cheng Kung University
2000-2013

National Taiwan University
2007-2012

We propose and analyze a 3-tier cloud-cloudlet-device hierarchical trust-based service management protocol called IoT-HiTrust for large-scale mobile cloud Internet of Things (IoT) systems. Our allows an IoT customer to report its experiences query subjective trust score toward provider following scalable report-and-query design. conduct formal scalability analysis along with ns-3 simulation performance demonstrating that not only achieves without compromising accuracy, convergence,...

10.1109/tnsm.2018.2886379 article EN IEEE Transactions on Network and Service Management 2018-12-12

In the production process from green beans to coffee bean packages, defective removal (or in short, defect removal) is one of most labor-consuming stages, and many companies investigate automation this stage for minimizing human efforts. paper, we propose a deep-learning-based inspection scheme (DL-DBIS), together with GAN (generative-adversarial network)-structured automated labeled data augmentation method (GALDAM) enhancing proposed scheme, so that degree robotic arms can be further...

10.3390/app9194166 article EN cc-by Applied Sciences 2019-10-04

In this paper, we develop a methodology to capture and analyze the interplay of attack-defense strategies for intrusion detection in an autonomous distributed Internet Things (IoT) system. our formulation, every node must participate lightweight neighbor target node. Consequently, good would play set defense faithfully defend system while bad attack achieving their own goals. We analytical model based on Stochastic Petri Net (SPN) modeling techniques. Our allows optimal be played by nodes...

10.1109/access.2020.3023616 article EN cc-by IEEE Access 2020-01-01

We propose and analyze a trust-based data fusion scheme against spectrum sensing falsification attacks in distributed cognitive radio network. Our is based on mechanism design theory to motivate users report authentic so as improve the success rate. Further, we decouple erroneous reports due low capabilities from false attacks, thus avoiding unnecessary punishments benign users. conduct theoretical analysis validated with extensive simulation identify optimal parameter settings under which...

10.1109/cqr.2016.7501424 article EN 2016-05-01

Dynamic voting is considered a promising technique for achieving high availability in distributed systems with data replication. To date, stochastic analysis of dynamic algorithms restricted to either site or link Markov models, but not both, possibly because the difficulty specifying state-space which grows exponentially as number sites increases. Furthermore, reduce state-space, assumption "frequent updates" was normally made, results an overestimation availability. In this paper, we...

10.1109/reldis.1996.559695 article EN 2002-12-23

In this article we develop an intrusion detection attack-defense game for Internet of Things (IoT) systems which autonomous IoT devices collaboratively solve a problem. We analytical model to determine the conditions under malicious nodes have no incentives perform attack in game. also stochastic Petri net analyze effect behaviors on system reliability, given definition failure as input. The performance evaluation results demonstrate that our (IDS) design greatly improves reliability over...

10.1109/tr.2020.2983610 article EN IEEE Transactions on Reliability 2020-05-12

In this paper, we propose a novel Hough circle-assisting deep-network inspection scheme (HCADIS), aiming at identifying defects in dense coffee beans. The proposed HCADIS plays critical role camera-based defect removal system to collect defective bean positions for picking all off. idea of the is mix intermediate data from deep network and feature engineering method call circle transform utilizing advantages both methods inspecting adopted because it performs quite stable shapes are highly...

10.1109/smc.2019.8914175 article EN 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2019-10-01

Social-Media-based Lifelong Learning (SMLL) have come under the spotlight nowadays because they allow people to realise lifelong learning in their quotidian existence. However, factors that determine SMLL received little scholarly attention, hence our poor understanding this regard. To remedy deficiency, a research model was developed through Maslow's need hierarchy theory address issue. The findings show (1) safety needs play an initial role drives users gradually towards belongingness and...

10.1080/0144929x.2024.2324056 article EN Behaviour and Information Technology 2024-03-05

Coffee beans are one of most valuable agricultural products in the world, and defective bean removal plays a critical role to produce high-quality coffee products. In this work, we propose novel labor-efficient deep learning-based model generation scheme, aiming at providing an effective with less human labeling effort. The key idea is iteratively generate new training images containing various locations by using generative-adversarial network framework, these incur low successful detection...

10.1109/coase.2019.8843259 article EN 2022 IEEE 18th International Conference on Automation Science and Engineering (CASE) 2019-08-01

In the rapid development of information technology age, many travelers search for travel articles through Internet. These include experience and knowledge traveler, which can be used as a reference tourism planning attraction selection. At present, most is available in online reviews (OTR). OTR eWOM (electronic word-of-mouth) contain lot consumers travelers. Many often look content virtual communities, blogs, engine, but results cause overload problems. addition, engines, an still requires...

10.3390/app9235097 article EN cc-by Applied Sciences 2019-11-25

We propose and analyze a scalable efficient region-based group key management protocol for secure communications in mobile ad hoc networks. For scalability dynamic reconfigurability, we take approach by which members are broken into subgroups leaders securely communicate with each other to agree on response membership change member mobility events. show that the secrecy requirement communication is satisfied. Further, there exists an optimal regional size minimizes total network cost as...

10.1109/sutc.2006.103 article EN Sensor Networks, Ubiquitous, and Trustworthy Computing 2006-06-05

Investment is always an interesting and important issue for people since the international financial crises are hard to predict government's policy may have influence on economic activities. In past, many researches been proposed portfolio issues. some of these studies, th e group stock (GSP) utilized provide various alternative stocks investor. The diverse (DGSP) optimization approach has then designed because diversity industries within a can affect performance final GSP. However,...

10.3233/jifs-179354 article EN Journal of Intelligent & Fuzzy Systems 2019-08-13

Flipped civic education has attracted many educators' attention, because it can be employed to increase students' interest in learning literacy. However, very few researches investigated continuance intention participate flipped education. It is a truly important issue since more effectively applied and developed if the factors behind identified. Therefore, order identify these key factors, this study adopted social cognitive theory devise research model. The findings showed that interaction...

10.1080/10494820.2021.2005104 article EN Interactive Learning Environments 2021-11-24
Coming Soon ...