default search action
Wei-Tsung Su
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c23]Wei-Tsung Su:
Optimizing Transaction Fee for Different Decentralized Applications in Ethereum. ICCE-Taiwan 2023: 763-764 - 2021
- [j6]Wei-Tsung Su, Lin-Yi Jiang, Tang-Hsuan O, Yu-Chuan Lin, Min-Hsiung Hung, Chao-Chun Chen:
AIoT-Cloud-Integrated Smart Livestock Surveillance via Assembling Deep Networks with Considering Robustness and Semantics Availability. IEEE Robotics Autom. Lett. 6(4): 6140-6147 (2021) - [c22]Lin-Yi Jiang, Cheng-Ju Kuo, Yu-Hsin Wang, Mu-En Wu, Wei-Tsung Su, Ding-Chau Wang, Tang-Hsuan O, Chi-Luen Fu, Chao-Chun Chen:
A Transparently-Secure and Robust Stock Data Supply Framework for Financial-Technology Applications. ACIIDS 2021: 616-629 - [c21]Chia-Chun Lien, Wei-Tsung Su:
A QoS-driven Customizable Forecasting Framework for Blockchain Transaction Fee Recommendation. SmartIoT 2021: 348-349 - 2020
- [c20]Shi-Syun Kuo, Wei-Tsung Su:
A Blockchain-Indexed Storage supporting Scalable Data Integrity in Supply Chain Traceability. SmartIoT 2020: 348-349
2010 – 2019
- 2019
- [c19]Cheng-Ju Kuo, Chao-Chun Chen, Tzu-Ting Chen, Zhi-Jing Tsai, Min-Hsiung Hung, Yu-Chuan Lin, Yi-Chung Chen, Ding-Chau Wang, Gwo-Jiun Homg, Wei-Tsung Su:
A Labor-Efficient GAN-based Model Generation Scheme for Deep-Learning Defect Inspection among Dense Beans in Coffee Industry. CASE 2019: 263-270 - [c18]Wei-Tsung Su, Wei-Cheng Chen, Chao-Chun Chen:
An Extensible and Transparent Thing-to-Thing Security Enhancement for MQTT Protocol in IoT Environment. GIoTS 2019: 1-4 - 2018
- [j5]Chao-Chun Chen, Wei-Tsung Su, Min-Hsiung Hung, Zhong-Hui Lin:
Map-Reduce-Style Job Offloading Using Historical Manufacturing Behavior for Edge Devices in Smart Factory. IEEE Robotics Autom. Lett. 3(4): 2918-2925 (2018) - [c17]Ching-Sheng Wang, Wei-Tsung Su:
An Efficient Mobile AR Navigation System Using Polygon Approximation Based Data Acquisition. WICON 2018: 215-224 - 2017
- [c16]Wei-Tsung Su, Cheng-Yi Dai:
QoS-aware distributed cloud storage service based on erasure code in multi-cloud environment. CCNC 2017: 365-368 - [c15]Wei-Tsung Su, Chao-Yi Kao:
EstiTO: An Efficient Task Offloading Approach Based on Node Capability Estimation in a Cloudlet. WCNC 2017: 1-6 - 2015
- [c14]Wei-Tsung Su, Yung-Hsiang Lu, Ahmed S. Kaseb:
Harvest the Information from Multimedia Big Data in Global Camera Networks. BigMM 2015: 184-191 - [c13]Everett Berry, Yung-Hsiang Lu, Wei-Tsung Su:
Using Global Camera Networks to Create Multimedia Content. CCBD 2015: 231-234 - [c12]Wei-Tsung Su, Wo-Chen Liu, Chao-Lieh Chen, Tsung-Pao Chen:
Cloud access control in multi-layer cloud networks. ICCE-TW 2015: 364-365 - [c11]Wei-Tsung Su, Kyle McNulty, Yung-Hsiang Lu:
Teaching large-scale image processing over worldwide network cameras. DSP 2015: 726-729 - [c10]Win-Bin Huang, Wei-Tsung Su:
Identity-based access control for digital content based on ciphertext-policy attribute-based encryption. ICOIN 2015: 87-91 - [c9]I-Hsun Chuang, Yu-Ting Huang, Wei-Tsung Su, Tung-Sheng Lin, Yau-Hwang Kuo:
S4: An SLA-aware Short-Secret-Sharing cloud storage system. ICUFN 2015: 401-406 - [c8]Win-Bin Huang, Wei-Tsung Su, Chiang-Sheng Liang:
A threshold-based key generation approach for ciphertext-policy attribute-based encryption. ICUFN 2015: 908-913 - 2014
- [c7]Wei-Tsung Su, Chiang-Sheng Liang, Cheng-Yi Dai:
Secure computation offloading based on social trust in mobile networks. ICUFN 2014: 75-80 - [c6]Wen-Hao Tsai, Wo-Chen Liu, Kuan-Rong Lee, Wei-Tsung Su, Pei-Yin Chen, Yau-Hwang Kuo:
Development of Graphical Editor for Supervisory Control and Data Acquisition System in Agriculture Greenhouse. ICS 2014: 561-571 - 2012
- [c5]Wei-Tsung Su, Sun-Ming Wu:
Node capability aware resource provisioning in a heterogeneous cloud. ICCC 2012: 46-50 - [c4]I-Hsun Chuang, Wei-Tsung Su, Yau-Hwang Kuo:
Secure dynamic routing protocols based on Cross-Layer Network Security Evaluation. PIMRC 2012: 303-308 - 2011
- [c3]Wei-Tsung Su, Wei-Fan Pan:
An Adaptive Task Allocation Approach for MapReduce in a Heterogeneous Cloud. CICSyN 2011: 287-291
2000 – 2009
- 2008
- [j4]Wei-Tsung Su, Yau-Hwang Kuo, Po-Cheng Huang:
A QoS-driven approach for service-oriented device anycasting in ubiquitous environments. Comput. Networks 52(18): 3342-3357 (2008) - [j3]Chao-Lieh Chen, Jeng-Wei Lee, Wei-Tsung Su, Mong-Fong Horng, Yau-Hwang Kuo:
Noise-Referred Energy-Proportional Routing with Packet Length Adaptation for clustered sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 3(4): 224-235 (2008) - [c2]Wei-Tsung Su, Ing-Hsiu Liao, Kuan-Rong Lee, Yau-Hwang Kuo:
Service-Oriented Device Composition in Resource Constrained Ubiquitous Environments. WCNC 2008: 3110-3115 - 2007
- [j2]Wei-Tsung Su, Ko-Ming Chang, Yau-Hwang Kuo:
eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. Comput. Networks 51(4): 1151-1168 (2007) - [c1]I-Hsun Chuang, Wei-Tsung Su, Chun-Yi Wu, Jang-Pong Hsu, Yau-Hwang Kuo:
Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks. WCNC 2007: 4145-4150 - 2006
- [j1]Po-Cheng Huang, Kuan-Rong Lee, Wei-Tsung Su, Yau-Hwang Kuo, Mong-Fong Horng, Chien-Chou Lin, Yu-Chang Chen:
Control Component Development of Information Appliances on Networks. J. Inf. Sci. Eng. 22(4): 771-784 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint