Published Papers
Journal papers:
- P.-H. Chiang, S.-C. Tsai, "Detection of malicious domains with concept drift using ensemble learning", accepted to appear, IEEE Transactions on Network and Service Management.
- C.-Y. Lin, S.-C. Tsai, A Note on the k-restriction problem, accepted to appear, Information Processing Letters.
- B.-Y. Huang, S.-C. Tsai,Solving Hard-Exploration Problems with Counting and Replay Approach, Engineering Applications of Artificial Intelligence, 110, April, 2022.
- D.-R. Chen, M.-Z. Shieh, S.-C. Tsai, The Complexity of Comparing Optimal Solutions, Information Processing Letters, 177 (August, 2022).
- C.-H. Hsieh, W.-K. Wang, C.-X. Wang, S.-C. Tsai, Y.-B., Lin Efficient Detection of Link-flooding Attacks with Deep Learning, Sustainability, 2021.
- Y.-R. Chen, A. Rezapour, W.-G. Tzeng and S.-C. Tsai, RL-Routing: An SDN Routing Algorithm Based on Deep Reinforcement Learning, IEEE Transactions on Network Science and Engineering, Vol. 7(4), pp. 3185-3199, 2020.
- I-Huan Chiang, Chung-Ming Huang, Nien-Hu Cheng, Hsin-Yu Liu and Shi-Chun Tsai, Efficient Exploration in Side-Scrolling Video Games with Trajectory Replay, The Computer Games Journal (2020) 9:263--280.
- Y.-B. Lin, C.-C. Huang and S.-C. Tsai,
SDN Soft Computing Application for Detecting Heavy Hitters,
IEEE Transactions on Industrial Informatics (SCIE), Vol. 15 (10), 2019, pp. 5690--5699.
- Y.-C. Kao, J.-C. liu, Y.-Q. Ke, S.-C. Tsai, Y.-B. Lin, Dual-stack Network Management Through One-time Authentication Mechanism, IEEE Access, Vol. 8(1), pp. 34706--34716, Dec. 2020.
- Y.-B. Lin, T.-J. Huang and S.-C. Tsai,
Enhancing 5G/IoT Transport Security through Content Permutation, IEEE Access (SCIE), Vol. 7(1), PP.94293--94299, 2019
- Y.-C. Kao, J.-C. Liu, Y.-H. Wang, Y.-H. Chu, S.-C. Tsai, and Y.-B. Lin,
Automatic Blocking Mechanism for Information Security with SDN, Journal of Internet Services and Information Security, Vol. 9 (1), 2019.
- S.-C. Tsai and M.-C. Yang, Representing Symmetric Boolean Functions with
Polynomial over Composite Moduli,
in Journal of Information Science and Engineering (SCI), Vol. 34 (1), pp. 193-203, 2018.
- S.-C. Su, Y.-R. Chen, S.-C. Tsai and Y.-B. Lin,
Detecting P2P Botnet in Software Defined Networks,
in
Security and Communication Networks (SCI), Volume 2018: 4723862:1-4723862:13 (2018).
- H.-W. Hsu, K.-L. Huang, Y.-C. Kao, S.-C. Tsai, Y.-B. Lin,
Deploying WLAN Service with OpenFlow Technologies,
International Journal of Network Management (SCI), 2017, Vol. 27 issue 3.
- T.-Y. Lin, S.-C. Tsai, W.-N. Tsai, J.-C. Tsay,
More on the One-dimensional Sliding-Coin Puzzle, in
Discrete Applied Mathematics (SCI), (162) pp. 32--41, 2014.
- T.W. Chiou, S.-C. Tsai and Y.-B. Lin, Network Security Management with Traffic Pattern Clustering,
in
Soft Computing (SCI), Volume 18, Issue 9 (2014), Pp. 1757-1770.
-
M.-Z. Shieh, S.-C. Tsai,
Inapproximable results for the weight problems of subgroup permutation codes,
IEEE Transactions on Information Theory (SCI), Vol. 58(11) pp. 6907- 6915, 2012.
-
M.-Z. Shieh, S.-C. Tsai,
Computing the Ball Size of Frequency Permutations under Chebyshev Distance,
Linear Algebra and its Applications (SCI), Volume 437, Issue 1, pp. 324--332, 2012.
- M.-Z. Shieh, S.-C. Tsai, M.-C. Yang,
On the Inapproximability of Maximum Intersection Problems,
Information Processing Letters (SCI), Vol. 112 (19), pp.723--727, 2012.
-
Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai,
Extracting Computational Entropy and Learning Noisy Linear Functions,
IEEE Transactions on Information Theory (SCI), Vol. 57(8) pp. 5485-5496, 2011.
- C.-J. Lee, T.-T. Lin, M.-Z. Shieh, S.-C. Tsai, H.-L. Wu, Decoding
Permutation Arrays with Ternary Vectors,
Designs, Codes
and Cryptography (SCI), Volume 61, Number 1, pp. 1-9, 2011.
pdf
- Chi-Jen Lu, Shi-Chun Tsai, Hsin-Lung Wu,
Complexity of Hard-Core Set Proofs,
Computational Complexity (SCI), 20(1), pp. 145--171, 2011.
- C.-J. Lee, S.-C. Tsai, Alternating Runs of Geometrically Distributed Random Variables,
Journal of Information Science and Engineering,
Vol. 27, No. 3, pp. 1029--1044, 2011.
- M.-Z. Shieh, S.-C. Tsai, Improved Bound on Approximating Jug Measuring
Problem,
Journal of Information Science and Engineering,
Vol. 27, No. 3, pp. 1159--1163, 2011.
- Chung-Li Hou, C.-C. Lu, S.-C. Tsai and W,-G. Tzeng,
An optimal data hiding scheme with tree-based parity check,
IEEE
Transactions on Image Processing (SCI), Vol 20 (3), pp. 880--886, 2011.
pdf
-
Li-Jui Chen, Jinn-Jy Lin, Min-Zheng Shieh, Shi-Chun Tsai,
More on the Magnus-Derek Game,
Theoretical Computer Science (SCI),
Vol 412(4-5), pp. 339-344, 2011. pdf
-
Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai,
Deterministic Extractors for Independent-Symbol Sources,
IEEE Transactions on Information Theory,
(SCI), Vol. 56(12), 6501--6512, 2010.
- Min-Zheng Shieh, Shi-Chun Tsai, Decoding Frequency Permutation
Arrays under Chebyshev distance,
IEEE Transactions on Information Theory
(SCI), Vol. 56(11), 5730--5737, 2010.
pdf
- T. Klove, T.-T. Lin, S.-C. Tsai and W,-G. Tzeng,
Permutation arrays under the Chebyshev distance,
IEEE Transactions on Information Theory (SCI), Vol. 56(6), 2611--2617,
2010. pdf
- S.-C. Tsai, W.-G. Tzeng, Kun-Yi Zhou,
Key Establishment Schemes Against Storage-Bounded Adversaries
in Wireless Sensor Networks,
IEEE Transactions on Wireless
Communications, Vol. 8, no. 3, 1218--1222, 2009.
- C.-J. Lu, S.-C. Tsai and H.-L. Wu,
On the Complexity of Hardness Amplification,
IEEE Transactions on
Information Theory (SCI), 54(10), 4575--4586, 2008.
- Te-Tsung Lin, S.-C. Tsai, H.-L. Wu, Simple Distance-Preserving Mappings
from Ternary Vectors to Permutations,
IEEE Transactions on
Information Theory (SCI), 54(7), 3251--3256, 2008. ps
- M.-Z. Shieh and S.-C. Tsai, Jug measuring: algorithms and complexity,
Theoretical Computer Science(SCI), Vol 396, pp. 50--62, 2008. pdf
- Ming Yu Hsieh and Shi-Chun Tsai,
On the Fairness and Complexity of Generalized k-in-a-row Games,
Theoretical Computer Science(SCI), Vol 385, pp. 88--100, 2007. ps
- Ying-Jie Liao, Min-Zheng Shieh and Shi-Chun Tsai,
Arranging Numbers on Circles to Reach Maximum Total Variations,
the
Electronic Journal of Combinatorics(SCI), R47: Volume 14(1), 2007.
- C.-J. Lu, S.-C. Tsai and H.-L. Wu, Improved hardness amplification
within NP,
Theoretical Computer Science(SCI), Vol 370, pp.293--298, 2007.
- Yen-Ying Huang, Shi-Chun Tsai and Hsin-Lung
Wu, On the construction of permutation arrays via mappings from binary
vectors to permutations,
Designs, Codes and Cryptography Designs (SCI),
40:2, pp. 139-155, August 2006.
- S.-C. Tsai, W.-G. Tzeng and H.-L. Wu, On the Jensen-Shannon Divergence and Variational
Distance,
IEEE Transactions on Information Theory (SCI), 51(9)
3333--3336, 2005.
- C.-J. Lee, C.-J. Lu, S.-C. Tsai and W.-G. Tzeng,
Extracting Randomness from Multiple Independent Sources,
IEEE Transactions on Information Theory (SCI), 51(6) 2224-2227, 2005.
- T.-T. Hwang, C.-J. Lee, J.-K.Lee and S.C. Tsai, Compiler Optimization on Instruction Scheduling for
Low Power,
ACM Transactions on Design Automation of Electronic Systems,
TODAES 8(2): 252-268, 2003.
- C.-C. Lu and S.-C. Tsai,
A note on unscrambling address lines,
Information
Processing Letters (SCI Expanded,EI), 85(4): 185--189, 2003.
- J.-C. Chang, R.-J. Chen, T. Klove and S.-C. Tsai, Distance preserving mappings from Binary vectors to permutations,
IEEE Transactions on Information Theory (SCI), 49(4): 1054--1059, 2003.
- C.-J. Lu and S.-C. Tsai, A note on iterating an alpha-ary gray code,
SIAM Journal on Discrete Mathematics (SCI), Vol 14 (2), pp. 237--239, 2001.
- D. Chen, T.-R. Chuang and S.C. Tsai, JGAP: A
Java-based Graph Algorithms Platform,
Software-- Practice and Experience,
pp. 615-635, 2001 (SCI)
- S.C. Tsai, A Depth 3 Circuit Lower Bound
for the Parity Function,
Journal of Information Science and Engineering, Vol 17 (5), pp. 857--860,
2001 (SCI Expanded).
- K.N. Chang and S.C. Tsai, Exact Solution of a
Minimal Recurrence,
Information Processing Letters
pp. 61--64, 2000 (EI, SCI Expanded).
- J. Simon and S.C. Tsai, On the
Bottleneck Counting Method, in the 12th Computational Complexity
Conference, Ulm, Germany, pp. 297--301, 1997, final version
in
Theoretical Computer Science (SCI), pp. 429--437, 2000.
- K. Friedl and S.C. Tsai, Two Results on the
Bit Extraction Problem, presented in the 8th SIAM Conference in
Discrete Mathematics, 1996, Baltimore, USA, final
version published in
Discrete Applied Mathematics (SCI),
Vol 99, pp. 443--454, 2000.
- K. Friedl and S.C. Tsai, Recycling Random
Bits in Parallel, HICSS-28 Proceedings, Jan. 1995, final
version published in
J. of Parallel Algorithms and Applications,
Vol. 8, pp. 85--94, 1996.
- S.C. Tsai, Lower Bounds on Representing
Boolean Functions as Polynomials in Z_m,
SIAM Journal
on Discrete Mathematics (SCI), 9(1), pp. 55--62, 1996.
Conference papers:
- Y.-H. Huang, W.-H. Chen and S.-C. Tsai, On the Sample Complexity of Privately Learning Half-spaces, The 16th Asian Conference on Machine Learning (ACML 2024),
Dec. 5--8, 2024, Hanoi, Vietnam.
- M.-T. Tsai, S.-C. Tsai, T.-T. Wu, Dependent k-Set Packing on Polynomoids,
48th International Symposium on Mathematical Foundations of Computer Science,
August 28-September 1, 2023, Bordeaux, France.
- I-Huan Chiang, Chung-Ming Huang, Nien-Hu Cheng, Hsin-Yu Liu and Shi-Chun Tsai, Efficient Exploration in Side-Scrolling Video Games with Trajectory Replay, The Thirty-sixth International Conference on Machine Learning (ICML 2019), Exploration in Reinforcement Learning Workshop, Long Beach, CA, USA, 10-15 June, 2019.
- J.-C. liu, Y.-Q. Ke, Y.-C. Kao, S.-C. Tsai, Y.-B. Lin, A Dual-Stack Authentication Mechanism Through SNMP, the 4th International Symposium on Mobile Internet Security (MobiSec 2019), Taichung, Taiwan, Oct. 17-19, 2019.
- Y.-T. Chen, M.-T. Tsai, S.-C. Tsai, A Dichotomy Result for Cyclic-Order Traversing Games, The 29th International Symposium on Algorithms and Computation (ISAAC 2018), Jiaoxi, Yilan County, Taiwan, December 17-19, 2018.
- Y.Z. Liao and S.-C. Tsai, Fast Failover with Hierarchical Disjoint Paths in SDN, IEEE Global Communications Conference (Globecom 2018), Abu Dhabi, UAE, 9-13 December 2018.
- Jinlin Chen, Yiren Chen, Shi-Chun Tsai, and Yi-Bing Lin,
Implementing NFV System with OpenStack,
2017 IEEE Conference on
Dependable and Secure Computing, Taipei, Taiwan, August 7-10, 2017.
- Chih-Chieh Chen, Yi-Ren Chen, Shi-Chun Tsai, and Ming-Chuan Yang,
Forwarding Path Discovery with Software Defined Networking,
19th Asia-Pacific Network Operations and Management Symposium (APNOMS 2017), Seoul, Korea, Sep. 27-29, 2017.
- Chih-Chieh Chen, Yi-Ren Chen, Wei-Chih Lu, Shi-Chun Tsai, and Ming-Chuan Yang,
Detecting Amplfication Attacks with Software Defined Networking,
2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 7-10, 2017.
-
Shan-Jung Fu, Huai-Wen Hsu, Yichih Kao, Shi-Chun Tsai, and Chien-Chao Tseng,
An Autoblocking Mechanism for Firewall Service,
2017 IEEE Conference on
Dependable and Secure Computing, Taipei, Taiwan, August 7-10, 2017.
-
Chia-Jung Lee, Satya V. Lokam, Shi-Chun Tsai, Ming-Chuan Yang,
On Restricting No-Junta Boolean Function and Degree Lower Bounds by Polynomial Method,
2015 IEEE International Symposium on Information Theory (ISIT 2015),
June 14-19, 2015 in Hong Kong.
- Chia-Jung Lee, Shi-Chun Tsai and Ming-Chuan Yang,
Online Prediction Problems with Variation,
20th International Computing and Combinatorics Conference (COCOON 2014), Atlanta, Georgia, USA,
August 4-6, 2014.
-
Chia-Jung Lee, Chi-Jen Lu and Shi-Chun Tsai. Computational Randomness from Generalized Hardcore Sets,
18th International Symposium on Fundamentals of Computation Theory, Oslo, NORWAY,
August 22-25, 2011.
- Min-Zheng Shieh, Shi-Chun Tsai,
Computing the Ball Size of Frequency Permutations under Chebyshev Distance,
2011 IEEE International Symposium on Information Theory (ISIT 2011),
July, 31 - August, 5, 2011, in Saint-Petersburg, Russia.
- Min-Zheng Shieh, Shi-Chun Tsai,
On the minimum weight problem of permutation codes under Chebyshev
distance,
2010 IEEE International Symposium on Information Theory (ISIT 2010),
June 13-18, 2010, in Austin, Texas, USA.
- Min-Zheng Shieh, Shi-Chun Tsai,
Decoding Frequency Permutation Arrays under Infinite norm,
2009 IEEE International Symposium on Information Theory (ISIT 2009),
June 28- July 3, 2009, Seoul, Korea.
- C.-J. Lee, C.-J. Lu, S.-C. Tsai, Extracting Computational Entropy
and Learning Noisy Linear Functions,
The 15th International Computing and Combinatorics Conference
(COCOON'2009) Niagara Falls, New York,
U.S.A., July 13--15, 2009.
- Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng,
Efficient Encoding and Decoding with Permutation Arrays,
2008 IEEE International Symposium on Information Theory (ISIT 2008),
July 6th- 11th, 2008, Toronto, Ontario, Canada.
- J.-R. Ou, S.-C. Tsai, W.-G. Tzeng. Efficient large-scale distributed key
generation against burst interruption,
International
Conference on Security and Cryptography (SECRYPT 2007) Barcelona, Spain,
28-31 July, 2007.
- Chi-Jen Lu, Shi-Chun Tsai and Hsin-Lung Wu,
Impossibility Results on Weakly Black-Box Hardness Amplification,
16th International Symposium on Fundamentals of Computation Theory.
Budapest, Hungary August 27-30, 2007.
- Chi-Jen Lu, Shi-Chun Tsai and Hsin-Lung Wu,
On the Complexity of Hard-Core Set Constructions,
34th International Colloquium on Automata, Languages and Programming
(ICALP 2007).
Wrocław, Poland, 9-13 July 2007.
- C.-J. Lee, C.-J. Lu, S.-C. Tsai
Deterministic Extractors for Independent-symbol Sources,
33rd International Colloquium on
Automata, Languages and Programming (ICALP 2006)
S. Servolo, Venice - Italy , July 9 - 16, 2006.
- C.-J. Lu, S.-C. Tsai and H.-L. Wu,
On the Complexity of Hardness Amplification,
20th IEEE Computational Complexity Conference (CCC 2005).
- Ming Yu-Hsieh, Min-Zheng Shieh, S.-C. Tsai
A greedy approach to the coin exchange problem, ICS 2004.
- T.-T. Hwang, C.-J. Lee, J.-K.Lee and S.C. Tsai, Compiler Optimization on Instruction Scheduling for
Low Power,
International Symposium on System Synthesis
(IEEE Computer Society Sponsor), Madrid, Spain, Sep. 2000.
- C.-J. Lu and S.-C. Tsai,
The Periodic Property of Binomial Coefficients Modulo $m$ and
Its Applications,
10th SIAM
Conference on Discrete Mathematics, 2000, Minneapolis, Minnesota, USA.
- J. Simon and S.C. Tsai, On the
Bottleneck Counting Method, in
the 12th Computational Complexity
Conference, Ulm, Germany, pp. 297--301, 1997.
- K. Friedl and S.C. Tsai, Two Results on the
Bit Extraction Problem, presented in
the 8th SIAM Conference in
Discrete Mathematics, Baltimore, USA, 1996.
- K. Friedl and S.C. Tsai, Recycling Random
Bits in Parallel, in
HICSS-28 Proceedings, USA, Jan. 1995.
- S.C. Tsai, Lower Bounds on Representing
Boolean Functions as Polynomials in Z_m, in
Structure in Complexity Theory Conference, San Diego, USA, pp. 96--101, 1993.
Back to Shi-Chun Tsai Main Page