scispace - formally typeset
S

Shi-Jinn Horng

Researcher at Southwest Jiaotong University

Publications -  21
Citations -  1028

Shi-Jinn Horng is an academic researcher from Southwest Jiaotong University. The author has contributed to research in topics: Rough set & Watermark. The author has an hindex of 16, co-authored 21 publications receiving 853 citations. Previous affiliations of Shi-Jinn Horng include National United University.

Papers
More filters
Journal ArticleDOI

b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET

TL;DR: A secure scheme that can achieve the security and privacy requirements, and overcome the weaknesses of SPECS is provided, and the efficiency merits of the scheme are shown through performance evaluations in terms of verification delay and transmission overhead.
Journal ArticleDOI

A Decision-Theoretic Rough Set Approach for Dynamic Data Mining

TL;DR: This paper presents an approach for dynamic maintenance of approximations w.r.t. objects and attributes added simultaneously under the framework of decision-theoretic rough set (DTRS) using equivalence feature vector and matrix and extensive experimental results verify the effectiveness of the proposed methods.
Journal ArticleDOI

Matrix-based dynamic updating rough fuzzy approximations for data mining

TL;DR: Experimental results on six UCI datasets shown that the proposed dynamic algorithm achieves significantly higher efficiency than the static algorithm and the combination of two reference incremental algorithms.
Journal ArticleDOI

An adaptive watermarking scheme for e-government document images

TL;DR: Improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks.
Journal ArticleDOI

A wavelet-tree-based watermarking method using distance vector of binary cluster

TL;DR: The experimental results show that the watermarked image looks visually identical to the original and the watermark can be effectively extracted upon image processing attacks.