1989 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Research Interests

Cryptography, Information Security, Network Security, Computational Complexity

Experience

1. Professor and Chairman, Department of Computer Science, NCTU, 2009-2013
2. Professor and Director of Department of Computer Science, Institute of Information Science and Engineering, NCTU, 2005-2009
3. Professor and Associate Director, Department/Institute of Computer Information and Science, NCTU, 2004-2005
4. Professor, Department/Institute of Computer Information and Science, NCTU, 2001-2005
5. Associate Professor, Department of Computer Information and Science, NCTU,1991-2001

Education/Academic qualification

PhD, State University of New York at Stony Brook

External positions

Fingerprint Dive into the research topics where Wen-Guey Tzeng is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects

Detection and Protection of Cyber Attacks by Using Reinforcement Learning

Tzeng, W.

1/08/1931/12/20

Project: Government MinistryMinistry of Science and Technology

Detection and Protection of Cyber Attacks by Using Reinforcement Learning

Tzeng, W.

1/08/1831/12/19

Project: Government MinistryMinistry of Science and Technology

Information Scurity and Malware Analysis Based on Machine

Tzeng, W.

1/08/1731/08/18

Project: Government MinistryMinistry of Science and Technology

Information Scurity and Malware Analysis Based on Machine

Tzeng, W.

1/08/1631/08/17

Project: Government MinistryMinistry of Science and Technology

Information Scurity and Malware Analysis Based on Machine

Tzeng, W.

1/08/1531/08/16

Project: Government MinistryMinistry of Science and Technology

Research Output

A cooperative game-theoretic model in cloud storage auditing

Lin, C. Y. & Tzeng, W. G., Jan 2020, In : Journal of Information Science and Engineering. 36, 1, p. 127-143 17 p.

Research output: Contribution to journalArticle

  • A light-weight bit commitment protocol based on unpredictable channel noise

    Guan, A. & Tzeng, W-G., 10 Jan 2019, In : Theoretical Computer Science. 755, p. 29-37 9 p.

    Research output: Contribution to journalArticle

  • A Robust intrusion detection network using thresholdless trust management system with incentive design

    Rezapour, A. & Tzeng, W-G., 1 Jan 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Chang, B., Li, Y., Beyah, R. & Zhu, S. (eds.). Springer Verlag, p. 139-154 16 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 255).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Effective Botnet Detection Through Neural Networks on Convolutional Features

    Chen, S. C., Chen, Y. R. & Tzeng, W-G., 5 Sep 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 372-378 7 p. 8455930. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 9 Scopus citations

    Monsieur poirot: Detecting botnets using re-identification algorithm and nontrivial feature selection technique

    Lee, W. M., Rezapour, A. & Tzeng, W-G., 27 Jul 2018, 2018 IEEE International Conference on Communications, ICC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8422081. (IEEE International Conference on Communications; vol. 2018-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2 Scopus citations