Close Open

Please Update Your Browser.

It is recommended that you update your browser to the latest version to view the website's full experience.

Dismiss

Chao-Hsien Chu

You are here

Title(s):
  • Professor of Information Sciences and Technology

  • Affiliate Professor of Management Science and Information Systems, Smeal College of Business

  • Director of Smart Sensing Lab

  • Co-director of the Center for Cyber Security, Information Privacy and Trust

Contact:
301K Information Sciences and Technology Building
University Park, PA 16802
(814) 865-4446
Education:
  • Ph.D., Business Administration The Pennsylvania State University

  • M.B.A. Tatung Institute of Technology, Taiwan

  • B.E., Industrial Engineering Chung Yuan University, Taiwan

Biography:

Chu has published more than 180 refereed articles in top-ranking journals and in proceedings such as INFORMS Journal on Computing, IEEE Sensors Journal,  IEEE Internet of Things (IoT) Journal, Decision Sciences, IEEE Transactions on Evolutionary Computation, Decision Support Systems, IEEE Transactions on Dependable and Secure Computing, European Journal of Operational Research, IEEE Transactions on Information Forensics & Security, Journal of Operations Management, IIE Transactions, IEEE Security & Privacy, International Journal of Production Research, International Conference on Information Systems (ICIS), ACM Conference on Electronic Commerce, ACM Conf. on Computer and Communication Security (CCS), IEEE Global Telecommunications Conference (GLOBECOM), IEEE Conference on Computer Communications (INFOCOM), and other high-quality of outlets.. He is coauthor of the book PROSIM: A Production Management Simulation by Harper Collins (second edition) and Irwin/McGraw-Hill (third edition).

Dr. Chu is an avid journal referee and is or has been on the Editorial Review Board of Decision Sciences Journal, International Journal of Information Technology and Decision Making, Journal of International Technology and Information Management, International Journal of Information Systems and Change Management, Journal of Computer Information Systems, International Journal of Business and Systems Research, International Journal of Intercultural Information Management, Journal of Production and Operations Management, Journal of End User Computing and Journal of Microcomputer Systems Management. He has served as a track chair or program committee member for more than 30 international conferences. He chaired the Information Security Track for the 2007 Annual Meeting of Decision Sciences Institute. In addition, he has served as ad hoc reviewer for many major journals, such as Decision Sciences, Information Systems Research, IEEE Transactions on Evolutionary Computation, IEEE Transactions on Engineering Management, Journal of Operations Management, Operations Research, IIE Transactions, European Journal of Operational Research, International Journal of Production Research, and others. He has been certified as CPIM by the American Production and Inventory Control Society (APICS).

Research Interests:

Chu’s current research focuses on (1) Smart Sensing /Internet of Things (IoT) Technologies and Applications (a new initiation in 2005), especially in data management, complex event processing (CEP) & inference, system integration, security and privacy issues, and their applications in healthcare, supply chains, environmental monitoring and smart spaces; (2) Information Assurance and Security, especially in wireless security, privacy preserving, cyber forensics and risk management; (3) Intelligent Informatics and Analytics, especially for stress detection, financial fraud detection and communication networks design; and (4) Operations and Technology Innovation including lean thinking, strategic quality management, process reengineering, and supply chain integration and management.

Four of his articles received best paper awards. Dr. Chu received the best theoretical/empirical research paper award from the Decision Sciences Institute (DSI) in 1989, the Research Citation from the College of Business at Iowa State University in 1991, the best paper award from the IEEE Workshop on Computer Vision Methods for Bioinformatics in 2005, the best paper award from the International Conference on Information and Management Science in 2007 and the best paper award from the IEEE Conference on RFID Technology and Applications in 2013. In research grants, Dr. Chu has received more than $ 3 Million (as PI or co-PI) from various funding sources, including NSF, DoD/NSA, Japan Society for the Promotion of Sciences, National Science Council of Hebei Province (China), Marine Corps Research University (MCRU, Penn State), Hewlett-Packard (HP) Co., Lockheed Martin Corp., Cisco Systems, and others.

Chu has taught networking and telecommunications, computer and cyber forensics, security and risk managment, wireless security, IT and systems integration, intelligent technologies for Business; decision support systems (DSS); object-oriented systems analysis and design; enterprise resources planning (ERP); process reengineering; competitive manufacturing management, strategic quality management, and many others.

Publications:

Books:

Li, T., Chu, C. H., Wang, P. and Wang, G. (Eds.), Radio Frequency Identification System Security, Cryptology and Information Security, Volume 6 - RFIDsec'11 Asia Workshop Proceedings, IOS Press, Amsterdam, Netherlands. April 15, 2011. ISBN: 1607507218.

Chu, C. H., Hottenstein, M. P. and Greenlaw, P. S. (1996) PROSIM III for Windows: A Production Management Simulation, Third Edition, Richard D. Irwin, Inc. 

Chu, C. H., Hottenstein, M. P. and Greenlaw, P. S. (1996) Instructor Manual: PROSIM III, Richard D. Irwin, Inc.

Hottenstein, M. P., Greenlaw, P. S., and Chu, C. H. (1991) PROSIM: A Production Management Simulation, Second Edition, Harper-Collin, Inc.

Journal Publications:
Smart Sensing/Internet of Things/RFID:

Ma, M., Wang, P., Chu, C. H. and Liu, L. (2015), "Efficient Multi-Pattern Event Processing over High-Speed Train Data Streams," IEEE Internet of Things Journal (Accepted).

Kim, JY, Chu, C. H. and M. Shin, S. M. (2014), "ISSAQ: An Integrated Sensing Systems for Real-Time Indoor Air Quality Monitoring," IEEE Sensors Journal, 14(12): 1-15 (December).

Li, Z., Chu, C. H. and Yao, W. (2014), “A Semantic Authorization Model for Pervasive Healthcare,” Journal of Network and Computer Applications, 38: 76-87.

Kumar, A., Yao, W. and Chu, C. H. (2013), “Flexible Process Compliance with Semantic Constraints using Mixed-Integer Programming,” INFORMS Journal on Computing, 25(3): 543-559.

Deng, Y., Chu, C. H., Wu, Z. and Si, H. (2013), “An Investigation of Decision Analytic Methodologies for Stress Identification,” International Journal on Smart Sensing and Intelligent Systems, 6(4): 1675-1699.

Deng, Y., Wu, Z., Chu, C. H., Zhang, Q., and Hsu, D. F. (2013), “Sensor Feature Selection and Combination for Stress Identification Using Combinatorial Fusion,” International Journal of Advanced Robotic Systems, 10: 306-313 (Open Access)

Deng, Y., Hsu, D. F., Wu, Z., and Chu, C. H. (2012), "Combining Multiple Sensor Features For Stress Detection Using Combinatorial Fusion," Journal of Interconnection Networks, 13(3/4).

Zhou, S., Chu, C. H., Yu, Z. and Kim, J. (2012), “A Context-aware Reminder System for Elders Based on Fuzzy Linguistic Approach,” Expert Systems with Applications, 39: 9411–9419.

Yao, W., Chu, C. H. and Li, Z. (2012), “The Adoption and Implementation of RFID Technologies in Healthcare: A Literature Review,” Journal of Medical Systems, 36: 3007-3523.

Han, S., Chu, C. H. and Luo, Z. (2011), “Tamper Detection in the EPC Network Using Digital Watermarking,” IEEE Security & Privacy, 9(5): 62-69.

Yao, W., Chu, C. H. and Li, Z. (2011), "Leveraging Complex Event Processing for Smart Hospitals Using RFID,"   Journal of Network and Computer Applications, 34(3): 799-810.

Parks, R., Chu, C. H. and Xu, H. (2010), "RFID Information Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations," Journal of Information Privacy and Security, 6(3): 1-24.

Bhattacharya, M., Chu, C. H., Hayya, J. and Mullen, T. (2010), "An Exploratory Study of RFID Adoption in the Retail Sector," Operations Management Research, 3: 80–89.

Information Security and Assurance:

Wang, D., He, D., Wang, P. and Chu, C. H. (Accepted), "Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are beyond Attainment," IEEE Transactions on Dependable and Secure Computing. 

Li, F., Luo, B., Liu, P., Lee, D. and Chu, C. H. (2013), “Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing,” IEEE Transactions on Information Forensics & Security, 8(6): 888-900.

Han, S. and Chu, C. H., (2010) “Content-based Image Authentication: Current Status, Issues, and Challenges,” International Journal of Information Security, 9(1): 19-32.

Gu, Q.  Liu, P., Lee, W. C. and Chu, C. H. (2009) “KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services Recovery,” IEEE Transactions on Dependable and Secure Computing (TDSC), 6(3): 188-201.

Marchant, R. L., Cole, R. and Chu, C. H (2009), “Answering the Need for Information Assurance Graduates: A Case Study of Pennsylvania State University’s Security and Risk Analysis,” Information Systems Education Journal, 7(75): 1-11.

Gu, Q., Chu, C. H. and Liu, P. (2007) “Modeling and Analysis of Bandwidth Competition in 802.11 Networks,” International Journal of Mobile Network Design and Innovation, 2(3/4): 190-201.

Li, F., Luo, B., Liu, P., Lee, D., Mitra, P., Lee, W. and Chu, C. H. (2007), “In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems,” International Journal on Intelligent Control and Systems, Special Issue on Information Assurance, 12(4): 283-292.

Gu, Q., Liu, P. and Chu, C. H. (2007) “Analysis of Area-congestion-based DDoS Attacks in Ad Hoc Networks,” Ad Hoc Networks Journal, 5(5): 613-625.

Gu, Q., Liu, P. and Chu, C. H. and Zhu, S. (2007) “Defense Against Packet Injection in Ad Hoc Networks,” International Journal of Security and Networks, 2: 154-169.

Gu, Q., Chu, C. H., Liu, P., and Zhu, S. (2006) “Slander-Resistant Forwarding Isolation in Ad Hot Networks,” International Journal of Mobile Network Design and Innovation, 1 (3/4): 162¬174.

Chu, C. H. and Lin, H. H. (2006) “Factors Influencing the Adoption of Wireless Technologies on Campus,” International Journal of Mobile Communications, 4(3): 291-308.

Zhu, D., Premkumar, G., Zhang, X., and Chu, C. H. (2001) “Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods,” Decision Sciences, 32(4): 635-660.

Informatics and Analytics:

Li, J., Xu, Y., Wang, Y. and Chu, C. H. (2009), “Strongest Association Rules Mining for Personalized Recommendation,” Systems Engineering - Theory & Practice, 29(8): 144-152.

Yue, D., Han, C. M., Wu, X. and Chu, C. H., (2009), “Empirical Study of Accounting Frauds in Chinese Public Companies,” Auditing Research (审计研究), 5: 82-89 (In Chinese).

Li, J., Xu, Y., Chu, C. H., and Wang, Y. (2008) “A Simulation Analysis of Parameters for Fuzzy C-Mean Model,” Journal of Systems Simulation, 20(2). (In Chinese).

Leong, T.Y. and Chu, C. H. (2007), “Wireless Network Design: A Space-Filling Curve Approach,” International Journal of Mobile Network Design and Innovation, 2 (3/4): 180 - 189.

Chen, Y., Chu, C. H. and Mullen, T. (2006) “Predicting Uncertain Outcomes Using Information Markets,” Journal of New Mathematics and Natural Computation, 2(3): 281-297.

Zhang, Y., Zha, H., Chu, C. H., Ji, X. and Chen, X. W. (2006) “Towards Inferring Protein Interactions: Challenges and Solutions” EURASIP Journal on Applied Signal Processing, Special Issue in Advanced Signal Processing Techniques in Bioinformatics, 2006: 1-14.

Chen, Y., Mullen, T., and Chu, C. H. (2006) “An In-depth Analysis of Information Markets with Aggregate Uncertainty,” Electronic Commerce Research Journal, 6: 201-220.

Zhang, Y., Chu, C. H., Chen, Y., Zha, H., and Ji, X. (2006) “Splice Site Prediction Using Support Vector Machines with a Bayes Kernel,” Expert Systems with Applications, 30: 73-81.

Huang, M. S., Lin, H. H. and Chu, C. H. (2005) “Determining Object Class Similarity Based on Semantic Similarity Degree,” Journal of Management and Information, 6: 329-364.

Zhang, Y., Ji, X., Chu, C. H., Zha, H. (2004) “Correlating Summarization of Multisource News with K-Way Graph Biclustering,” SIGKDD Explorations (Special Issue on Web Content Mining), 6(2):34-42.

Chou, H., Premkumar, G. and Chu, C. H. (2001) “Performance of Genetic Algorithms – An Examination of the Impact of Encoding, Crossover, and Mutation Operators,” IEEE Transactions on Evolutionary Computation, 5(3), 236-249.

Premkumar, G., Chu, C. H. and Chou, H. (2000) "Telecommunications Network Design:  Comparison of Alternative Approaches," Decision Sciences, 31(2), 483-506.

Chu, C. H., Chou, H., and Premkumar, G. (2000) “Digital Data Networks Design Using Genetic Algorithms,” European Journal of Operational Research, 127(1), 140-158.

Chu, C. H. (1989) "Design Issues for Intelligent Microcomputer-Based Decision Support Systems," Journal of Information Systems Management, 6(2), 25-33.

Chu, C. H. and Lin, H. H. (1989) "Evaluating Microcomputer DBMSs," Journal of Information Systems Management, 6(2), 69-75.

Operations and Technology Innovation:

Chen, R., Li, Z. and Chu, C. H. (2011), “Toward Service Innovation: An Investigation of the Business Potential of Mobile Video Services in China,” Journal of Technology Management in China, 6(3): 216 – 231.

Han, S. and Chu, C. H. (2009), “Developing a Collaborative Supply Chain Reference Model for a Regional Manufacturing Industry in China," Int. J. Electronic Customer Relationship Management, 3(1): 52-70.

Wu, X., Chu, C. H., Wang, Y. and Yan, W. (2007) “Genetic Algorithms for Concurrent Cellular Manufacturing Decisions,” European Journal of Operational Research, 181, pp. 156-167.

Wu, X., Chu, C. H., Wang, Y., and Yeh, D. M. (2007) “Genetic Algorithms for Integrating Cell Formation with Machine Layout and Scheduling,” Computers and Industrial Engineering, pp. 277-289.

Li, J., Chu, C. H., Wang, Y. and Yan, W. (2007) “An Improved Fuzzy Clustering Method for Cellular Manufacturing,” International Journal of Production Research, 45 (5): 1049-1062.

Wu, X. D., Chu, C. H., Wang, Y. F., and Yan, Y. L. (2006) “Concurrent Design of Cellular Manufacturing Systems: A Genetic Algorithm Approach,” International Journal of Production Research, 44(6):1217-1241.

Li, J., Wang, Y. F., Chu, C. H., and Xu, Y. (2004) “Research on Fuzzy Manufacturing Cell Formulation Algorithms,” Chinese Journal of Computer Integrated Manufacturing Systems (EI Indexed), 10(12): 1561-1566. (In Chinese).

Hayya, J. C., Chatfield, D. C., He, X. X. and Chu, C. H., (2003) “Supply Chain Information Technology Metrics,” International Journal of Operations and Quantitative Management, 9(1), 1-17.

Wu, X. D., Wang, Y. F., Chu, C. H., and Li, J. (2000) “Research on Cellular Manufacturing System Integration Modeling,” Chinese Journal of Computer Integrated Manufacturing Systems (EI Indexed), 6(2), 36-40 (In Chinese).

Wu, X. D., Wang, Y. F., Chu, C. H., and Li, J. (2000) “Genetic Algorithms for Cellular Manufacturing System Integration,” Chinese Journal of Computer Integrated Manufacturing Systems (EI Indexed), 6(4), 83-86 (In Chinese).

Chu, C. H. (1997) "An Improved Neural Network Model for Manufacturing Cell Formation," Decision Support Systems, 20, 279-295.

Tsai, C. C., Chu, C. H. and Barta, T. (1997) "Modeling and Analysis of a Manufacturing Cell Formation Problem with Fuzzy Integer Programming," IIE Transactions, 29(7), 533-547.

Chu, C. H. and Widjaja, D. (1994) "A Neural Network System for Forecasting Method Selection," Decision Support Systems, 12, 13-24.

Chu, C. H. (1993) "Manufacturing Cell Formation by Competitive Learning," International Journal of Production Research, 31(4), 829-843.

Chu, C. H. and Shih, W. L. (1992) "Simulation Studies for JIT Production," International Journal of Production Research, 30(11), 2573-2586.

Yeh, K. H. and     Chu, C. H. (1991) "Adaptive Strategies for Coping with Product Variety Decisions," International Journal of Operations & Production Management, 11(8), 35-47.

Chu, C. H. and Hayya, J. C. (1991) "A Fuzzy Clustering Approach to Manufacturing Cell Formation," International Journal of Production Research, 29(7), 1475-1487.

Chu, C. H. and Tsai, M. (1990) "A Comparison of Three Array-Based Clustering Techniques for Manufacturing Cellular Formation," International Journal of Production Research, 28(8), 1417-1433.

Lee, S., Wang, H. P. and     Chu, C. H. (1990) "Controlling a Robotic Cell by Dynamic Rule Dispatching -- A Simulation Study," International Journal of Operations & Production Management, 10(4), 51-64.

Chu, C. H. (1990) "Three Blueprints for Intelligent PC-Based Decision Support Systems," Expert Systems: Planning/Implementation/Integration, 1(4), 41-48.

Chu, C. H. (1989) "Cluster Analysis in Manufacturing Cellular Formation," OMEGA: The International Journal of Management Science, 17(3), 289-295.

Chu, C. H. (1988) "The Pervasive Elements of Total Quality Control," Industrial Management, 30(5), 30-32.

Chu, C. H., Wang, H. P., and Chu, Y. C. (1988) "On the Design of an Intelligent Micro-Based DSS for Line Balancing," International Journal of Computers and Industrial Engineering, 14(4), 419-427.

Chu, C. H. and Hayya, J. C. (1988) "Buffering Decisions under MRP Environment: A Review," OMEGA: The International Journal of Management Science, 16(4), 325-331.

Chu, C. H. and Wang, H. P. (1988) "The Use of Artificial Intelligence in Process Planning," International Journal of Operations & Production Management, 8(1), 5-18.

Bagchi, U., Hayya, J. C., and Chu, C. H. (1986) "The Effect of Lead-Time Variability: The Case of Independent Demand," Journal of Operations Management, 6(2), 159-177.

Recent Proceedings (after 2000):
Smart Sensing/Internet of Things/RFID:

Kim JY and Chu C. H., “Analysis of Energy Consumption for Wearable ECG Devices” IEEE SENSORS 2014, Valencia, Spain, November 2-5, 2014.

Kim JY and Chu C.H., “ETD: An Extended Time Delay Algorithm for Ventricular Fibrillation Detection” The 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS'14), Chicago, IL, USA , August 26-30, 2014.

Wu, X., Chu, C. H., Yue, D., Kim, JY and Wang, Y., “A Simple and Effective Algorithm for R-Wave Detection Using Smartphones,” 2014 International Conference on Information Technology and Biomedical Engineering (ICITBE 2014), Chongqing, China, May 30-31, 2014.

Kim, JY, Chu, C. H and Shin, SM., “Designing Integrated Sensing Systems for Real-Time Air Quality Monitoring”, IEEE International Conference on Information Science and Applications (ICISA2014), Seoul, Korea, May, 2014.

Ma, M., Wang, P. and Chu, C. H., “A Novel Distributed Algorithm for Redundant Reader Elimination in RFID Networks,” Proc. of the IEEE Conference on RFID Technology and Applications, September 2013. (Received the Best Paper Award)

Ma, M., Wang, P. and Chu, C. H., “Data Management for Internet of Things: Challenges, Approaches and Opportunities,” The 2013 IEEE International Conference on Internet of Things, August 2013.

Deng, Y., Hsu, D. F., Wu, Z. and Chu, C. H. (2012), “Feature Selection and Combination for Stress Identification Using Correlation and Diversity,” Proceedings of the 12th International Symposium on Pervasive Systems, Algorithms and Networks (ISPAN), pp. 37 – 43.

Ma, M., Huang, Y., Gao, Y., Chu, C. H. and Wang, P., (2012) “User-Driven Cloud Transportation System for Smart Driving,” IEEE International Workshop on Emerging Issues in Cloud Computing, December 3-6, 2012, Taipei, Taiwan.

Deng, Y., Wu, Z., Chu, C. H. and Yang, T., (2012) “Evaluating Feature Selection for Stress Identification,” 2012 IEEE 13th International Conference on Information Reuse and Integration (IRI), 2012, pp. 584 – 591.

Liu, B and Chu, C. H. (2011), “A Fine-Grained Authentication Method for Inter-Domain EPCglobal Network,” RFID Security Workshop Asia 2011.

Liu, B and Chu, C. H. (2010), “Security Analysis of EPC-enabled RFID Network,” in Proc. of the IEEE Conference on RFID Technology and Applications, June 2010.

Li, Z., Chu, C. H., Yao, W., and Behr, R. (2010), Ontology-Driven Event Detection and Indexing in Smart Spaces, the IEEE Conference on Semantic Computing (ICSC), September 22-24, Pittsburgh, PA, USA.

Yao, W., Chu, C. H., Li, Z. (2010), “The Use of RFID in Healthcare: Benefits and Barriers,” Proc. of the IEEE Conference on RFID Technology and Applications, June 2010.

Li, Z., Chu, C. H. and Wu, X. (2010), “Monitoring Object Motion Using Passive RFID Technology,” Proc. of the IEEE Conference on RFID Technology and Applications, June 2010.

Li, J., Wang, Y., Zhang, Z., and Chu, C. H. (2010), “Investing Acceptance of RFID in Chinese Firms: the Technology-organization-environment Framework,” Proc. of the IEEE Conference on RFID Technology and Applications, June 2010, pp. 263-268.

Li, Z., Chu, C. H. and Yao, W. (2010), “A Semantic Access Control Model for Securing RFID-enabled Supply Chains,” Third Workshop of RFID Security Asia, Singapore, 95-108.

Parks, R., Chu, C. H. and Yao, W. (2009), “RFID Privacy Concerns: A Conceptual Analysis in the Healthcare Sector,” Proceedings of the Americas' Conference on Information Systems (AMCIS), August 2009.

Yao, W., Chu, C. H., Kumar, A. and Li, Z. (2009), “Using Ontology To Support Context Awareness in Healthcare,” in 19th Workshop on Information Technologies and Systems, Phoenix, AZ, 2009, pp. 43-48.

Yao, W., Chu, C. H., Li, Z. and Parks, R. (2009), “A Comparative Analysis of Selected Data Filtering Methods for RFID Implementation,” Proceedings of National Conference of Decision Science Institute, November 2009.

Bhattacharya, M., Chu, C. H. and Mullen, T. (2009), “An Exploratory Study of RFID Adoption in Retail Sector,” Proceedings of National Conference of Decision Science Institute, November 2009.

Wu, X., Chu, C. H., Yue, D., and Bai, J. (2009), “A Real Options Approach to Strategic RFID Investment Decision,” IEEE International Conference on RFID, April 2009, pp.314-321.

Li, Z., Chu, C. H., and Yao, W. (2008), “A Policy-based Access Control Mechanism for RFID Information Services,” Proceedings of National Conference of Decision Science Institute, November 2008, Baltimore, MD.

Yao, W., Chu, C. H., Li, Z. and Mullen, T. (2008), “Leveraging Complex Event Processing for RFID Applications: A Case Study in Hospitals,” in National Conference of Decision Science Institute, November 2008, Baltimore, MD.

Li, Z. and Chu, C. H. and Yao, W. (2008), “SIP-RLTS: An RFID Location Tracking System Based on SIP,” IEEE International Conference on RFID, April 2008.

Bhattacharya, M., Chu, C. H. and Mullen, T. (2008), “A Comparative Analysis of RFID Adoption in Retail and Manufacturing Sectors,” IEEE International Conference on RFID, April 2008.

Han, S. H. and Chu, C. H. (2008), “Tamper Detection in RFID-Enabled Supply Chains Using Fragile Watermarking,” IEEE International Conference on RFID, April 2008, 111-117.

Bhattacharya, M., Chu, C. H. and Mullen, T. (2007) “RFID Implementation in Retail Industry: Current Status, Issues, and Challenges,” in National Conference of Decision Science Institute, November 2007, Phoenix, AZ.

Wu, X., Chu, C. H., Yu, D., Bai, J. and Wang, Y. (2007) “RFID Implementation in China: Current Status, Issues, and Challenges,” International Conference on Industrial Engineering and Engineering Management, October 2007, Tianjin, China.

Information Security and Assurance:

Parks, R., Xu, H., and Chu, C. H. (2012). “Imbalance Challenge of Enacting Information Privacy Safeguards in Healthcare: A Grounded Theory Approach,” Proceedings of IFIP WG8.11/WG11.13 Dewald Roode Information Security Workshop, Brigham Young University, Provo, UT.

Parks, R., Chu, C. H., Xu, H. and Adams, L. (2011), “Understanding the Drivers and Outcomes of Healthcare Organizational Privacy Responses.” Proceedings of the 32nd Annual International Conference on Information Systems (ICIS), December 2011.

Parks, R., Chu, C. H., and Xu, H. (2011), “Healthcare Information Privacy Research: Issues, Gaps and What Next “. Proceedings of the 17th Americas Conference on Information Systems (AMCIS), Detroit, MI, August, 2011.

Xu, H., Parks, R., Chu, C. and Zhang, X. (2010). "Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding" (2010). Proceedings of the 16th Americas Conference on Information Systems (AMCIS), Lima, Peru.

Yao, W., Chu, C. H., Liu, B. and Li, Z. (2010), “Designing A Virtual Lab for Computer Forensics,” Proceedings of the 14th Colloquium for Information Systems Security Education, Baltimore Marriott Inner Harbor Baltimore, Maryland June 7 - 9, 2010

Gupta, S., Xu, H. and Chu, C. H., (2010), “Security Concerns and Mobile Banking Services,” Proc. of the Joint Conference on e-Service and Business Intelligence, Chengdu, China.

Li, F., Luo, B., Liu, P., Squicciarini, A. C., Lee, D. and Chu, C. H. (2008), “Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering,” In 4th International Conference on Collaborative Computing: Networking, Applications and Works Sharing (Collaborate Com), Orlando, FL, USA, 2008 (invited paper).

Li, F., Luo, B., Liu, P., Lee, D.,     Chu, C. H. (2007), “Automaton Segmentation: A New Approach to Preserve Privacy in XML Information Brokering,” In 14th ACM Conf. on Computer and Communication Security (CCS), Alexandria, VA, USA, October 2007, 508-518.

Marchant, R. L., Cole, R. and Chu, C. H. (2007), “Answering the Need for Information Assurance Graduates: A Case Study of Pennsylvania State University’s Security and Risk Analysis Major,” IS Education Conference (ISECON 2007), Nov. 1 - 4, 2007, Pittsburgh, PA.

Wu, X., Chu, C. H., Wang, Y., Yeh, D. M., Chen, P., and Liu, F. (2007) “Privacy Preserving Data Mining Research: Current Status and Key Issues,” Proceedings of the Computational Science–ICCS 2007, May 2007, 762-772.

Cole, R. and Chu, C. H. (2007), “Computer Worms, Detection and Defense,” in Quigley, M. (ed.), Encyclopedia of Information Ethics and Security, Idea Group Inc., Hershey, PA.

Han, S.H., Chu, C. H., and Yang, S. (2007) “Content-based Image Authentication: Current Status, Issues, and Challenges,” In International Conference on Semantic Computing (ICSC 2007), 17-19 Sept. 2007, pp. 630 - 636.

Gu, Q., Liu, P. and Chu, C. H. (2006), “Hacking Techniques in Wired Networks,” in Hossein Bidgoli et al. (eds.), Handbook of Information Security, John Wiley & Sons, New York. 

Wu, X., Wang, Y., Chu, C. H., Yeh, D. M., Chen, P., and Liu, F. (2006) “A Close Look at Privacy Preserving Data Mining Methods,” Proceedings of the 10th Pacific Asian Conference of Information Systems (PACIS 2006), Kuala Lumpur, Malaysia, July 6-9, 2006.

Li, F., Luo, B., Liu, P., Lee, D., Mitra, P., Lee, W. and Chu, C. H. (2006) “In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems,” IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), Taichung, Taiwan, June 5-7, 2006.

Cole, R. and Chu, C. H. (2006) “A Survey of Worm Detection and Defense,” Proceedings of the International Conference on Information Warfare and Security (ICIW 2006), March 15-16, Eastern Shore, Maryland. 

Gu, Q., Bai, K., Wang, H., Liu, P. and Chu, C. H., (2006) “Modeling of Pollution in P2P File Sharing Systems,” Proc. 2006 IEEE Consumer Communications and Networking Conference (CCNC 2006), 8-10 January 2006, Las Vegas, NV.

Gu, Q., Chu, C. H., Liu, P., and Zhu, S. (2005) “Slander Resistant Attacker Isolation in Ad Hot Networks,” Proc. International Conference on Telecommunication Systems – Modeling and Analysis, November 17-20, 2005, Dallas, TX.

Gu, Q., Liu, P., Zhu, S. and Chu, C. H. (2005) “Defending against Packet Injection Attacks in Unreliable Ad Hoc Networks,” Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM ’05), November 28 – December 2, 2005, St. Louis, MO.

Gu, Q., Liu, P., Lee, W. and Chu, C. H. (2005) “KTR: An Efficient Key Management Scheme for Air Access Control,” Proceedings of the IEEE International Conference on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous 2005) (short “poster” paper), July 17-21, 2005, San Diego, CA.

Gu, Q., Liu, P. and Chu, C. H. (2004) “Tactical Bandwidth Exhaustion in Ad Hoc Networks,” Proceedings of the IEEE Information Assurance Workshop, West Point, NY.

Informatics and Analytics:

Kumar, A., Yao, W., Chu, C. H., and Li, Z. (2010), “Ensuring Compliance with Semantic Constraints in Process Adaptation with Rule-Based Event Processing”, the 4th International RuleML Symposium on Rule Interchange and Applications (RuleML’10), October 21-23, Washington, DC, USA

Yao, W., Chu, C. H., Kumar, A., and Li, Z. (2009), "Using Ontology to Support Context Awareness in Healthcare," The Nineteenth Annual Workshop on Information Technologies and Systems (WITS'09), Dec. 2009.

Li, J., Chu, C. H., and Wang, Y. (2008), “An In-depth Analysis of Fuzzy C-means Clustering for Cellular Manufacturing,” The 5th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD2008), 18-20 October 2008, Jinan, Shandong, China, Vol. 1, pp. 42-46.

Li, J., Xu, Y., Wang, Y. and Chu, C. H. (2007), “Strongest Association Rules Mining for Efficient Applications,” The Fourth IEEE Conference on Service Systems and Service Management, June 09-11, 2007, University of Electronic Science and Technology of China Chengdu, P. R. China.

Li, J., Xu, Y., Chu, C. H. and Y. Wang (2007), “Privacy Preserving K-Means Clustering with Chaotic Distortion,” In International Conference in Electronic Business, December 2007, Taipei, Taiwan.

Yue D.M, Wu X.D, Li Y, Chu C. H. (2007), “Data Minding-based Financial Fraud Detection: Current Status and Key Issues,” Proceedings of the 14th International Conference on Industrial Engineering and Engineering Management, Oct. 20-22, 2007, Tianjin, China, 2007, pp 891-896.

Yue, D., Wu, X., Wang, Y., Li, Y. and Chu, C. H. (2007) “A Review of Data Mining-Based Financial Fraud Detection Research,” In International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 2007), 21-25 Sept. 2007, pp. 5514 - 5517.

Li, J., Xu, Y., Wang, Y. and Chu, C. H. (2007) “Strongest Association Rules Mining for Efficient Applications,” The Fourth IEEE Conference on Service Systems and Service Management, June 09-11, 2007, University of Electronic Science and Technology of China Chengdu, P. R. CHINA.

Leong, T. Y. and Chu, C. H. (2007) “Wireless Networks Design: A Space-filling Curve Approach,” In International Conference on Information and Management Science, June 2007. [Winner of the Best Paper Award].

Wu, X., Chu, C. H., Wang, Y., Liu, F., and Yuen, D. (2007) “Privacy Preserving Data Mining Research: Current Status and Key Issues,” in International Conference on Computational Science, May 27-30, 2007, Beijing, China.

Tsai, C. C., Chu, C. H. and Wu, X. (2007), “An Evolutionary Fuzzy Multi-objective Approach to Cell Formation,” In T.-D. Wang et al. (Eds.), International Conference on Simulated Evolution and Learning (SEAL’06), LNCS 4247, Springer-Verlag Berlin Heidelberg, 2006, pp. 377 – 383.

Leong, T. Y. and Chu, C. H. (2006) “A Space Filling Curve Heuristic for Wireless Network Design,” Proceedings of the 37th Annual Meeting of Decision Sciences Institute, November, 2006. 

Yang, T. and Chu, C. H. (2006) “Optimal Topology Design for Wireless Local Area Networks,” Proceedings of the 14th International Conference on Telecommunication Systems – Modeling and Analysis (ICTSM 2006), Reading, PA, October 4-8, 2006.

Gu, Q. and Chu, C. H. (2005) “Genetic Algorithms for Multicast Routing with Multiple QoS Requirements,” Proceedings of the 8th Joint Conference on Information Sciences, July 21-26, 2005, Salt Lake City, UT.

Zhang, Y., Chu, C. H., Chen, Y., Zha, H., and Ji, X. (2005) “Splice Site Prediction with Linear Kernel and Bayesian Mapping,” Proceedings of the 8th Joint Conference on Information Sciences, July 21-26, 2005, Salt Lake City, UT.

Chen, Y., Chu, C. H. and Mullen, T. (2005) “Predicting Uncertain Outcomes Using Information Markets,” Proceedings of the 8th Joint Conference on Information Sciences, July 21-26, 2005, Salt Lake City, UT.

Zhang, Y., Zha, H., Chu, C. H. and Ji, X. (2005) “Protein Interaction Inference as a MAX-SAT Problem,” Proceedings of the IEEE CVPR 2005 Workshop on Computer Vision Methods for Bioinformatics [Winner of the Best Paper Award].

Chen, Y., Chu, C. H., Mullen, T., and Pennock, D. M. (2005) “Information Markets vs. Opinion Pools: An Empirical Comparison,” Proceedings of the ACM Conference on Electronic Commerce (EC'05), June 5-8, 2005, Vancouver, Canada.

Zhang, Y., Chu, C. H., Zha, H., Chen, Y. and Ji, X. (2005) “A Probabilistic Kernel for Splice Site Prediction,” Proc. 8th Joint Conference on Information Sciences, pp. 1278-1281, Salt Lake City, Utah, July 2005.

Zhang, Y., Zha, H. and Chu, C. H. (2005) “A Time-Series Biclustering Algorithm for Revealing Co-regulated Genes,” Proceeding of the IEEE International Conference on Information and Technology: Coding and Computing, (ITCC 2005), pp. 32-37. 

Yang, T. and Chu, C. H. (2004) “On Efficient Modeling of Indoor Base Station Positioning,” Proceedings of the National Conference in Decision Sciences Institute, Boston, MA, 2004.

Chen, Y., Mullen, T. and Chu, C. H. (2004) “Theoretical Investigation of Prediction Markets with Aggregate Uncertainty,” Proceedings of the 7th International Conference in E-Commerce Research (ICECR-7), June 2004.

Gu, Q. and Chu, C. H. (2003) “Solving the QoS Multicast Routing Problems Using Genetic Algorithms,” in Wang, L. (Editor), Soft Computing in Communications, Studies in Fuzziness and Soft Computing, Vol. 136, Springer-Verlag Co., Berlin, 175-200.

Chu, C. H. and Zhu, D. (2003) “Computational Intelligence for Predicting Corporate Takeovers: A Comparison of Alternative Methods,” Proceedings of the 3rd International Workshop on Computational Intelligence in Economics and Finance, September 26-31, 2003.

Chu, C. H., Gu, J., Hou, X. D. and Gu, Q. (2002) “A Heuristic Ant Algorithm for Solving QoS Multicast Routing Problem,” Proceedings of the 2002 IEEE Congress on Evolutionary Computation, Honolulu, Hawaii, May 12-17, 1630-1635.

Operations and Technology Innovation:

Chen, R., Li, Z. and Chu, C. H. (2009), “Analyzing the Business Potential of Mobile Video Services in China,” Proceedings of National Conference of Decision Science Institute, November 2009.

Chen, R., Li, Z. and Chu, C. H. (2009), “Analyzing the Reciprocal Relationships between Trust and Interorganization System Use,” Proceedings of National Conference of Decision Science Institute, November 2009.

Han, S., Yang, S. and Chu, C. H. (2007) “Developing a Collaborative Supply Chain Reference Model: A Case Study in China,” In IEEE/INFORMS International Conference on Service Operations and Logistics, and Informatics, September 2007, Philadelphia, PA., USA, pp. 1-6.

Tsai, C. C., Chu, C. H., and Wu, X. (2006) “An Evolutionary Fuzzy Multi-objective Approach to Cell Formation,” Proceedings of the Sixth International Conference on Simulated Evolution and Learning (SEAL'06), Hefei, China, October 15-18, 2006.

Wu, X., Chu, C. H., Wang, Y. F., He, M. and Yue, D. (2005) “A Genetic Algorithm for Flexible Manufacturing Cell Formation,” Proceedings of the Eleventh International Fuzzy Systems Association World Congress (IFSA 2005), July 28-31, 2005, Beijing, China. Vol. III, pp. 1359-1363.

Hayya, J., Chatfield, D.,     Chu, C. H., and He, X. X. (2003) "Supply Chain Information Technology Metrics," 2003 Proceedings of the Western Decision Sciences Institute, April 15¬-19, 500-502.

Li, J., Chu, C. H., Wang, Y. and Yan. W. (2002) “An Improved Fuzzy C-Mean Algorithm for Manufacturing Cell Formation,” Proceedings of the 2002 IEEE International Conference on Fuzzy System (FUZZ-IEEE), Honolulu, Hawaii, May 12-17, 1505-1510.

Wu, X., Chu, C. H., Wang, Y. and Yan, W. (2002) “A Genetic Algorithm for Integrated Cell Formation and Layout Decision,” Proceedings of the 2002 IEEE Congress on Evolutionary Computation, Honolulu, Hawaii, May 12-17, 1866-1871.

Chu, C. H. and Tsai, C. C. (2001) “A Heuristic Algorithm for Grouping Manufacturing Cells,” Proceedings of the 2001 IEEE Congress on Evolutionary Computation, Seoul, Korea, 310-317.

Chu, C. H., He, X., and Hayya, J. (2001), “Critical Success Factors for the Supply Chain Process,” 2001 Proceedings of the Western Decision Sciences Institute, April 3-7, 861-863.

Chu, C. H., Hayya, J. and He, X. J. (2001) “A Data Warehousing Approach to Supply Chain Integration,” Proceedings of the 2001 National Conference of Decision Sciences Institute, November, 186-188.