S
Shi-Jinn Horng
Researcher at Southwest Jiaotong University
Publications - 21
Citations - 1028
Shi-Jinn Horng is an academic researcher from Southwest Jiaotong University. The author has contributed to research in topics: Rough set & Watermark. The author has an hindex of 16, co-authored 21 publications receiving 853 citations. Previous affiliations of Shi-Jinn Horng include National United University.
Papers
More filters
Journal ArticleDOI
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET
Shi-Jinn Horng,Shiang-Feng Tzeng,Yi Pan,Pingzhi Fan,Xian Wang,Tianrui Li,Muhammad Khurram Khan +6 more
TL;DR: A secure scheme that can achieve the security and privacy requirements, and overcome the weaknesses of SPECS is provided, and the efficiency merits of the scheme are shown through performance evaluations in terms of verification delay and transmission overhead.
Journal ArticleDOI
A Decision-Theoretic Rough Set Approach for Dynamic Data Mining
TL;DR: This paper presents an approach for dynamic maintenance of approximations w.r.t. objects and attributes added simultaneously under the framework of decision-theoretic rough set (DTRS) using equivalence feature vector and matrix and extensive experimental results verify the effectiveness of the proposed methods.
Journal ArticleDOI
Matrix-based dynamic updating rough fuzzy approximations for data mining
TL;DR: Experimental results on six UCI datasets shown that the proposed dynamic algorithm achieves significantly higher efficiency than the static algorithm and the combination of two reference incremental algorithms.
Journal ArticleDOI
An adaptive watermarking scheme for e-government document images
TL;DR: Improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks.
Journal ArticleDOI
A wavelet-tree-based watermarking method using distance vector of binary cluster
TL;DR: The experimental results show that the watermarked image looks visually identical to the original and the watermark can be effectively extracted upon image processing attacks.