A changeable personal identification number‐based keystroke dynamics authentication system on smart phones TY Chang, CJ Tsai, WJ Tsai, CC Peng, HS Wu Security and Communication Networks 9 (15), 2674-2685, 2016 | 25 | 2016 |
Adaptive nonmonotone conjugate gradient training algorithm for recurrent neural networks CC Peng, GD Magoulas 19th IEEE International Conference on Tools with Artificial Intelligence …, 2007 | 24 | 2007 |
A personalized rhythm click‐based authentication system TY Chang, YJ Yang, CC Peng Information Management & Computer Security 18 (2), 72-85, 2010 | 16 | 2010 |
Advanced adaptive nonmonotone conjugate gradient training algorithm for recurrent neural networks CC Peng, GD Magoulas International Journal on Artificial Intelligence Tools 17 (05), 963-984, 2008 | 15 | 2008 |
Nonmonotone BFGS-trained recurrent neural networks for temporal sequence processing CC Peng, GD Magoulas Applied mathematics and computation 217 (12), 5421-5441, 2011 | 13 | 2011 |
Adaptive self-scaling non-monotone BFGS training algorithm for recurrent neural networks CC Peng, GD Magoulas Artificial Neural Networks–ICANN 2007: 17th International Conference, Porto …, 2007 | 13 | 2007 |
Nonmonotone Levenberg–Marquardt training of recurrent neural architectures for processing symbolic sequences CC Peng, GD Magoulas Neural Computing and Applications 20, 897-908, 2011 | 12 | 2011 |
A secure mutual authentication scheme with non‐repudiation for vehicular ad hoc networks CL Chen, ML Chiang, CC Peng, CH Chang, QR Sui International Journal of Communication Systems 30 (6), e3081, 2017 | 10 | 2017 |
Multiple Functional Neural Fuzzy Networks Fusion Using Fuzzy Integral. CJ Lin, SS Kuo, CC Peng International Journal of Fuzzy Systems 14 (3), 2012 | 9 | 2012 |
Work in progress: A new approach of changeable password for keystroke dynamics authentication system on smart phones CJ Tsai, CC Peng, ML Chiang, TY Chang, WJ Tsai, HS Wu 9th International Conference on Communications and Networking in China, 353-356, 2014 | 8 | 2014 |
Identification and prediction using neuro-fuzzy networks with symbiotic adaptive particle swarm optimization CJ Lin, CC Peng, CY Lee Informatica 35 (1), 2011 | 8 | 2011 |
New soft biometrics for limited resource in keystroke dynamics authentication TY Chang, CJ Tsai, JY Yeh, CC Peng, PH Chen Multimedia Tools and Applications 79, 23295-23324, 2020 | 7 | 2020 |
Chord recognition using neural networks based on particle swarm optimization CJ Lin, CC Peng Cybernetics and Systems: An International Journal 42 (4), 264-282, 2011 | 7 | 2011 |
Personalized rhythm click based authentication system improvement using a statistical classifier T Chang, C Peng, C Tsai, Y Chen, P Cheng Proceedings of 2nd International Conference on Information Communication and …, 2012 | 5 | 2012 |
A new approach to generate diversified clusters for small data sets CC Peng, CJ Tsai, TY Chang, JY Yeh, PW Hua Applied Soft Computing 95, 106564, 2020 | 4 | 2020 |
A Fast and Noise Tolerable Binarization Method for Automatic License Plate Recognition in the Open Environment in Taiwan CC Peng, CJ Tsai, TY Chang, JY Yeh, H Dai, MH Tsai Symmetry 12 (8), 1374, 2020 | 4 | 2020 |
Meaningful share generation for (2, 2)-multiple visual secret sharing scheme without pixel expansion CL Liu, WJ Tsai, TY Chang, CC Peng, PS Wong The Computer Journal 58 (7), 1598-1606, 2015 | 4 | 2015 |
An Effective Integration of Smart Phone's APPs for Bicycle Riders YM Lin, CJ Lin, JS Taur, CC Peng Advanced Science Letters 19 (7), 1823-1829, 2013 | 4 | 2013 |
Sequence processing with recurrent neural networks CC Peng, GD Magoulas Encyclopedia of Artificial Intelligence, 1411-1417, 2009 | 4 | 2009 |
Novel heterogeneous grouping method based on magic square CC Peng, CJ Tsai, TY Chang, JY Yeh, MC Lee Information Sciences 517, 340-360, 2020 | 3 | 2020 |