


default search action
Chien-Ming Chen 0001
Person information
- affiliation: Harbin Institute of Technology, School of Computer Science, Shenzhen, China
- affiliation (former): Shandong University of Science and Technology, College of Computer Science and Engineering, Qingdao, China
Other persons with the same name
- Chien-Ming Chen — disambiguation page
- Chien-Ming Chen 0002
— Nanyang Technological University, Nanyang Business School, Singapore
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j151]Dehua Zhou, Ziyu Song, Zicong Chen, Xianting Huang
, Congming Ji, Saru Kumari, Chien-Ming Chen
, Sachin Kumar
:
Advancing explainability of adversarial trained Convolutional Neural Networks for robust engineering applications. Eng. Appl. Artif. Intell. 140: 109681 (2025) - [j150]Yue Zhao
, Farhan Ullah
, Chien-Ming Chen, Mohammed Amoon
, Saru Kumari:
Efficient malware detection using hybrid approach of transfer learning and generative adversarial examples with image representation. Expert Syst. J. Knowl. Eng. 42(2) (2025) - [j149]Guosong Zhu, Zhen Qin, Hu Xiong, Saru Kumari, Mohammed J. F. Alenazi, Yingkun Guo, Chien-Ming Chen
:
Open-world multi-modal machine learning decision model based on uncertain data analysis for fetal heart diagnosis. Inf. Sci. 701: 121868 (2025) - 2024
- [j148]Abdalla Hadabi, Zheng Qu, Mohammed Amoon
, Chien-Ming Chen
, Saru Kumari
, Hu Xiong:
Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption. Comput. Electr. Eng. 118: 109373 (2024) - [j147]Changsheng Ma, Achyut Shankar, Saru Kumari, Chien-Ming Chen:
A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security. Internet Things 28: 101391 (2024) - [j146]Aryan Rana, Sunil Prajapat
, Pankaj Kumar
, Deepika Gautam, Chien-Ming Chen
:
Designing a Security Framework Based on Hybrid Communication in Internet of Nano Things. IEEE Internet Things J. 11(4): 7265-7284 (2024) - [j145]Chien-Ming Chen
, Zhaoting Chen, Ashok Kumar Das
, Shehzad Ashraf Chaudhry
:
A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things. IEEE Internet Things J. 11(6): 10168-10182 (2024) - [j144]Chien-Ming Chen
, Qingkai Miao, Saru Kumari
, Muhammad Khurram Khan
, Joel J. P. C. Rodrigues
:
A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain. IEEE Internet Things J. 11(10): 17538-17551 (2024) - [j143]Shan Zhou, Xianting Huang
, Mohammad S. Obaidat
, Bander A. Alzahrani
, Xuming Han
, Saru Kumari
, Chien-Ming Chen
:
Transferability of Adversarial Attacks on Tiny Deep Learning Models for IoT Unmanned Aerial Vehicles. IEEE Internet Things J. 11(12): 21037-21045 (2024) - [j142]Chien-Ming Chen
, Zhaoting Chen, Saru Kumari
, Mohammad S. Obaidat
, Joel J. P. C. Rodrigues
, Muhammad Khurram Khan
:
Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment. IEEE Internet Things J. 11(14): 25394-25412 (2024) - [j141]Shuangshuang Liu
, Zhi Wang, Saru Kumari
, Jianhui Lv
, Chien-Ming Chen
:
Provably Secure Anti-Phishing Scheme for Medical Information in Smart Healthcare. IEEE Internet Things J. 11(23): 38086-38097 (2024) - [j140]Abdalla Hadabi
, Zheng Qu, Kuo-Hui Yeh, Chien-Ming Chen, Saru Kumari
, Hu Xiong:
Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system. J. Syst. Archit. 154: 103235 (2024) - [j139]Garima Thakur, Sunil Prajapat
, Pankaj Kumar, Chien-Ming Chen
:
A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks. J. Syst. Archit. 154: 103245 (2024) - [j138]Sachin Kumar
, Akshit Tyagi
, Kadambri Agarwal, Saru Kumari
, Chien-Ming Chen
:
A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city. Secur. Priv. 7(4) (2024) - [j137]Jianhui Lv, Byung-Gyu Kim, Adam Slowik
, B. D. Parameshachari, Saru Kumari, Chien-Ming Chen, Keqin Li:
ERLNEIL-MDP: Evolutionary reinforcement learning with novelty-driven exploration for medical data processing. Swarm Evol. Comput. 91: 101769 (2024) - [j136]Lili Chen
, Wensheng Gan
, Chien-Ming Chen
:
Toward Correlated Sequential Rules. IEEE Trans. Artif. Intell. 5(10): 5340-5351 (2024) - [j135]Chien-Ming Chen
, Qingkai Miao, Fazlullah Khan
, Gautam Srivastava
, Saru Kumari
:
Sustainable Secure Communication in Consumer-Centric Electric Vehicle Charging in Industry 5.0 Environments. IEEE Trans. Consumer Electron. 70(1): 1544-1555 (2024) - [j134]Hu Xiong
, Lingxiao Gong
, Ruoxia Li
, Saru Kumari
, Chien-Ming Chen
, Mohammed Amoon
:
Blockchain-Enabled Distributed Identity-Based Ring Signature With Identity Abort for Consumer Electronics. IEEE Trans. Consumer Electron. 70(3): 5340-5352 (2024) - [j133]Da Guo, Zhengjie Feng, Zhen Zhang
, Fazlullah Khan
, Chien-Ming Chen
, Ruibin Bai
, Marwan Omar
, Saru Kumari
:
Causal Effects of Adversarial Attacks on AI Models in 6G Consumer Electronics. IEEE Trans. Consumer Electron. 70(3): 5804-5813 (2024) - [j132]Xuan Wu, Xuanye Lin
, Zhen Zhang
, Chien-Ming Chen
, Thippa Reddy Gadekallu
, Saru Kumari
, Sachin Kumar
:
TinyML-Enabled Intelligent Question-Answer Services in IoT Edge Consumer Devices. IEEE Trans. Consumer Electron. 70(4): 7322-7333 (2024) - [j131]Qian Mei
, Hu Xiong
, Yeh-Cheng Chen
, Chien-Ming Chen
:
Blockchain-Enabled Privacy-Preserving Authentication Mechanism for Transportation CPS With Cloud-Edge Computing. IEEE Trans. Engineering Management 71: 12463-12474 (2024) - [j130]Brijmohan Lal Sahu
, Preeti Chandrakar
, Saru Kumari
, Chien-Ming Chen
, Mohammed Amoon
:
Blockchain and Machine Learning Integrated Secure Driver Behavior Centric Electric Vehicle Insurance Model. IEEE Trans. Intell. Transp. Syst. 25(11): 19073-19087 (2024) - [j129]Xin Wang, Jianhui Lv
, Adam Slowik
, Parameshachari Bidare Divakarachari, Keqin Li
, Chien-Ming Chen
, Saru Kumari
:
DLLF-2EN: Energy-Efficient Next Generation Mobile Network With Deep Learning-Based Load Forecasting. IEEE Trans. Netw. Serv. Manag. 21(6): 6515-6526 (2024) - [j128]Chien-Ming Chen
, Zhen Li
, Ashok Kumar Das
, Shehzad Ashraf Chaudhry
, Pascal Lorenz
:
Provably Secure Authentication Scheme for Fog Computing-Enabled Intelligent Social Internet of Vehicles. IEEE Trans. Veh. Technol. 73(9): 13600-13610 (2024) - [j127]Sumbal Fatima, Muhammad Arslan Akram, Adnan Noor Mian
, Saru Kumari, Chien-Ming Chen
:
On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. Wirel. Pers. Commun. 136(2): 1079-1106 (2024) - 2023
- [j126]Garima Thakur, Pankaj Kumar
, Chien-Ming Chen
, Athanasios V. Vasilakos, Anchna, Sunil Prajapat
:
A Robust Privacy-Preserving ECC-Based Three-Factor Authentication Scheme for Metaverse Environment. Comput. Commun. 211: 271-285 (2023) - [j125]Pooja Tyagi, Saru Kumari
, Mridul Kumar Gupta
, Chien-Ming Chen
, Tsu-Yang Wu, Sachin Kumar
:
A secure protocol for patient monitoring in wireless body area networks. Concurr. Comput. Pract. Exp. 35(10) (2023) - [j124]Tsu-Yang Wu, Fangfang Kong, Qian Meng, Saru Kumari, Chien-Ming Chen
:
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture. EURASIP J. Wirel. Commun. Netw. 2023(1): 36 (2023) - [j123]Chien-Ming Chen
, Qingkai Miao, Sachin Kumar
, Tsu-Yang Wu:
Privacy-preserving authentication scheme for digital twin-enabled autonomous vehicle environments. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - [j122]Jiahui Chen, Hang Xiao, Muchuang Hu, Chien-Ming Chen
:
A blockchain-based signature exchange protocol for metaverse. Future Gener. Comput. Syst. 142: 237-247 (2023) - [j121]Ke Wang
, Chien-Ming Chen
, Mohammad S. Obaidat
, Saru Kumari
, Sachin Kumar
, Jinyi Long
:
Deep Semantics Sorting of Voice-Interaction-Enabled Industrial Control System. IEEE Internet Things J. 10(4): 2793-2801 (2023) - [j120]Sriramulu Bojjagani
, V. N. Sastry, Chien-Ming Chen
, Saru Kumari, Muhammad Khurram Khan
:
Systematic survey of mobile payments, protocols, and security infrastructure. J. Ambient Intell. Humaniz. Comput. 14(1): 609-654 (2023) - [j119]Chien-Ming Chen
, Shuangshuang Liu, Xuanang Li, SK Hafizul Islam, Ashok Kumar Das
:
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT. J. Syst. Archit. 136: 102831 (2023) - [j118]Eric Ke Wang
, Zicong Chen, Xilin Dang, Xuan Fan, Xuming Han, Chien-Ming Chen
, Weiping Ding, Siu-Ming Yiu, Jian Weng
:
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation. Pattern Recognit. 143: 109745 (2023) - [j117]Insaf Ullah, Muhammad Asghar Khan
, Ako Muhammad Abdullah
, Fazal Noor
, Nisreen Innab
, Chien-Ming Chen
:
Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme. Sensors 23(3): 1121 (2023) - [j116]Chien-Ming Chen
, Shi Lv, Jirsen Ning, Jimmy Ming-Tai Wu
:
A Genetic Algorithm for the Waitable Time-Varying Multi-Depot Green Vehicle Routing Problem. Symmetry 15(1): 124 (2023) - [j115]Kuo-Hui Yeh
, Chien-Ming Chen
, Wei-Che Chien:
Special Issue Editorial "Deep Learning Technologies for Mobile Networks: A Themed Issue in Honor of Prof. Han-Chieh Chao". Symmetry 15(4): 882 (2023) - [j114]Ship Peng Xu
, Ke Wang
, Md. Rafiul Hassan, Mohammad Mehedi Hassan
, Chien-Ming Chen
:
An Interpretive Perspective: Adversarial Trojaning Attack on Neural-Architecture-Search Enabled Edge AI Systems. IEEE Trans. Ind. Informatics 19(1): 503-510 (2023) - [j113]Eric Ke Wang
, Zicong Chen, Mingjia Zhu
, Siu-Ming Yiu
, Chien-Ming Chen
, Mohammad Mehedi Hassan
, Stefano Izzo
, Giancarlo Fortino
:
Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain. IEEE Trans. Ind. Informatics 19(2): 2165-2172 (2023) - [j112]Ship Peng Xu
, Eric Ke Wang
, Mohammad Mehedi Hassan
, Chien-Ming Chen
, Weiguo Lin, Md. Rafiul Hassan, Giancarlo Fortino
:
Adversarial Robustness in Graph-Based Neural Architecture Search for Edge AI Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(8): 8465-8474 (2023) - [j111]Wensheng Gan
, Lili Chen, Shicheng Wan, Jiahui Chen
, Chien-Ming Chen
:
Anomaly Rule Detection in Sequence Data. IEEE Trans. Knowl. Data Eng. 35(12): 12095-12108 (2023) - [j110]Jimmy Ming-Tai Wu
, Qian Teng
, Shamsul Huda
, Yeh-Cheng Chen
, Chien-Ming Chen
:
A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning. ACM Trans. Sens. Networks 19(2): 27:1-27:15 (2023) - [j109]Chien-Ming Chen
, Zhen Li, Saru Kumari
, Gautam Srivastava
, Kuruva Lakshmanna
, Thippa Reddy Gadekallu
:
A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment. Veh. Commun. 39: 100567 (2023) - [c63]Shi Lv
, Chien-Ming Chen
, Saru Kumari
, Pradeep Chaudhary
:
An Improved Max-Min Ant Colony System for Green Dynamic Vehicle Routing Problem. ICEA 2023: 121-122 - [c62]Yiro Hao
, Chien-Ming Chen
, Saru Kumari
, Pradeep Chaudhary
:
Comments on SALS-TMIS: Secure Anonymous and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments. ICEA 2023: 123-124 - [c61]Zahid Ghaffar
, Khalid Mahmood
, Muhammad Farooq
, Khalid Yahya
, Chien-Ming Chen
, Shehzad Ashraf Chaudhry
:
Security analysis on "EAKE-WC: Authenticated Key Exchange Protocol for Wearable Computing". ICEA 2023: 148-153 - 2022
- [j108]Uddalak Chatterjee, Sangram Ray
, Muhammad Khurram Khan
, Mou Dasgupta, Chien-Ming Chen
:
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. Computing 104(6): 1359-1395 (2022) - [j107]Sajid Hussain
, Khalid Mahmood, Muhammad Khurram Khan
, Chien-Ming Chen
, Bander A. Alzahrani, Shehzad Ashraf Chaudhry
:
Designing secure and lightweight user access to drone for smart city surveillance. Comput. Stand. Interfaces 80: 103566 (2022) - [j106]Salman Shamshad
, Muhammad Faizan Ayub
, Khalid Mahmood, Saru Kumari, Shehzad Ashraf Chaudhry, Chien-Ming Chen
:
An enhanced scheme for mutual authentication for healthcare services. Digit. Commun. Networks 8(2): 150-161 (2022) - [j105]Jiahui Chen
, Xu Guo, Wensheng Gan, Chien-Ming Chen
, Weiping Ding
, Guoting Chen
:
On-shelf utility mining from transaction database. Eng. Appl. Artif. Intell. 107: 104516 (2022) - [j104]Jimmy Ming-Tai Wu, Min Wei, Gautam Srivastava
, Chien-Ming Chen
, Jerry Chun-Wei Lin
:
Mining large-scale high utility patterns in vehicular ad hoc network environments. Trans. Emerg. Telecommun. Technol. 33(10) (2022) - [j103]Zhen Li, Qingkai Miao, Shehzad Ashraf Chaudhry, Chien-Ming Chen
:
A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles. Int. J. Distributed Sens. Networks 18(6): 155013292211043 (2022) - [j102]Longxin Lin, Zhenxiong Xu, Chien-Ming Chen
, Ke Wang
, Md. Rafiul Hassan, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan, Giancarlo Fortino:
Understanding the impact on convolutional neural networks with different model scales in AIoT domain. J. Parallel Distributed Comput. 170: 1-12 (2022) - [j101]Eric Ke Wang, Juntao Yu, Chien-Ming Chen
, Saru Kumari
, Joel J. P. C. Rodrigues:
Data Augmentation for Internet of Things Dialog System. Mob. Networks Appl. 27(1): 158-171 (2022) - [j100]Abdul Lateef Haroon Phulara Shaik, Monica Komala Manoharan, Alok Kumar Pani, Raji Reddy Avala
, Chien-Ming Chen
:
Gaussian Mutation-Spider Monkey Optimization (GM-SMO) Model for Remote Sensing Scene Classification. Remote. Sens. 14(24): 6279 (2022) - [j99]Chien-Ming Chen
, Shehzad Ashraf Chaudhry
, Kuo-Hui Yeh
, Muhammad Naveed Aman
:
Security, Trust and Privacy for Cloud, Fog and Internet of Things. Secur. Commun. Networks 2022: 9841709:1-9841709:2 (2022) - [j98]Chien-Ming Chen
, Zhaoting Chen, Saru Kumari, Meng-Chang Lin
:
LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things. Sensors 22(14): 5401 (2022) - [j97]Hu Xiong
, Yingzhe Hou
, Xin Huang
, Yanan Zhao
, Chien-Ming Chen
:
Heterogeneous Signcryption Scheme From IBC to PKI With Equality Test for WBANs. IEEE Syst. J. 16(2): 2391-2400 (2022) - [j96]Tsu-Yang Wu
, Xinglan Guo, Yeh-Cheng Chen, Saru Kumari, Chien-Ming Chen
:
SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing. Symmetry 14(7): 1393 (2022) - [j95]Ke Wang
, Chien-Ming Chen
, Zhuoyu Tie, Mohammad Shojafar
, Sachin Kumar
, Saru Kumari
:
Forward Privacy Preservation in IoT-Enabled Healthcare Systems. IEEE Trans. Ind. Informatics 18(3): 1991-1999 (2022) - [j94]Ke Wang
, Fengjun Li, Chien-Ming Chen
, Mohammad Mehedi Hassan
, Jinyi Long
, Neeraj Kumar
:
Interpreting Adversarial Examples and Robustness for Deep Learning-Based Auto-Driving Systems. IEEE Trans. Intell. Transp. Syst. 23(7): 9755-9764 (2022) - [j93]Eric Ke Wang
, Chien-Ming Chen
, Mohammad Shojafar
, Zhuoyu Tie, Mamoun Alazab
, Saru Kumari
:
AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 23(11): 22607-22618 (2022) - [j92]Shuangshuang Liu
, Chien-Ming Chen
:
Comments on "A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance". IEEE Trans. Intell. Transp. Syst. 23(12): 25054-25058 (2022) - [j91]Lili Chen, Wensheng Gan, Qi Lin, Shuqiang Huang, Chien-Ming Chen
:
OHUQI: Mining on-shelf high-utility quantitative itemsets. J. Supercomput. 78(6): 8321-8345 (2022) - [j90]Yu-Teng Chang, Hui-Ru Yang, Chien-Ming Chen
:
Analysis on improving the application of machine learning in product development. J. Supercomput. 78(10): 12435-12460 (2022) - [j89]Qi Lin
, Wensheng Gan
, Yongdong Wu
, Jiahui Chen
, Chien-Ming Chen
:
Smart System: Joint Utility and Frequency for Pattern Classification. ACM Trans. Manag. Inf. Syst. 13(4): 43:1-43:24 (2022) - [i8]Wensheng Gan, Guoting Chen, Hongzhi Yin, Philippe Fournier-Viger, Chien-Ming Chen, Philip S. Yu:
Towards Revenue Maximization with Popular and Profitable Products. CoRR abs/2202.13041 (2022) - [i7]Qi Lin, Wensheng Gan, Yongdong Wu, Jiahui Chen, Chien-Ming Chen:
Smart System: Joint Utility and Frequency for Pattern Classification. CoRR abs/2206.04269 (2022) - [i6]Lili Chen, Wensheng Gan, Chien-Ming Chen:
Towards Correlated Sequential Rules. CoRR abs/2210.15637 (2022) - 2021
- [j88]Muchuang Hu, Jiahui Chen, Wensheng Gan, Chien-Ming Chen
:
A jumping mining attack and solution. Appl. Intell. 51(3): 1367-1378 (2021) - [j87]Kuo-Kun Tseng, Jiangrui Lin, Chien-Ming Chen
, Mohammad Mehedi Hassan:
A fast instance segmentation with one-stage multi-task deep neural network for autonomous driving. Comput. Electr. Eng. 93: 107194 (2021) - [j86]Kuo-Kun Tseng, Chao Wang, Tianjie Xiao, Chien-Ming Chen
, Mohammad Mehedi Hassan, Victor Hugo C. de Albuquerque:
Sliding large kernel of deep learning algorithm for mobile electrocardiogram diagnosis. Comput. Electr. Eng. 96(Part): 107521 (2021) - [j85]Eric Ke Wang
, Chien-Ming Chen
, M. Shamim Hossain
, Ghulam Muhammad
, Sachin Kumar
, Saru Kumari:
Transfer reinforcement learning-based road object detection in next generation IoT domain. Comput. Networks 193: 108078 (2021) - [j84]Chien-Ming Chen
, Yanyu Huang, King-Hang Wang, Saru Kumari
, Mu-En Wu:
A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 15(9): 1200-1215 (2021) - [j83]Chien-Ming Chen
, Lili Chen, Yanyu Huang, Sachin Kumar
, Jimmy Ming-Tai Wu
:
Lightweight authentication protocol in edge-based smart grid environment. EURASIP J. Wirel. Commun. Netw. 2021(1): 68 (2021) - [j82]Eric Ke Wang, Chien-Ming Chen
, Zuodong Liang, Mohammad Mehedi Hassan, Giuseppe M. L. Sarné
, Lidia Fotia
, Giancarlo Fortino:
A trusted consensus fusion scheme for decentralized collaborated learning in massive IoT domain. Inf. Fusion 72: 100-109 (2021) - [j81]Eric Ke Wang
, Peng Xu
, Chien-Ming Chen
, Saru Kumari
, Mohammad Shojafar
, Mamoun Alazab
:
Neural Architecture Search for Robust Networks in 6G-Enabled Massive IoT Domain. IEEE Internet Things J. 8(7): 5332-5339 (2021) - [j80]Chien-Ming Chen
, Lili Chen, Wensheng Gan
, Lina Qiu, Weiping Ding:
Discovering high utility-occupancy patterns from uncertain data. Inf. Sci. 546: 1208-1229 (2021) - [j79]Saddam Hussain, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Chien-Ming Chen
, Saru Kumari
:
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT). J. Inf. Secur. Appl. 58: 102625 (2021) - [j78]Jiahui Chen
, Wensheng Gan
, Muchuang Hu, Chien-Ming Chen
:
On the construction of a post-quantum blockchain for smart city. J. Inf. Secur. Appl. 58: 102780 (2021) - [j77]Tsu-Yang Wu
, Xinglan Guo, Lei Yang
, Qian Meng
, Chien-Ming Chen
:
A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles. Mob. Inf. Syst. 2021: 3277113:1-3277113:14 (2021) - [j76]Eric Ke Wang
, Ship Peng Xu, Chien-Ming Chen
, SK Hafizul Islam, Mohammad Mehedi Hassan, Claudio Savaglio
, Pasquale Pace, Gianluca Aloi
:
A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain. IEEE Netw. 35(1): 204-210 (2021) - [j75]Chien-Ming Chen
, Zhuoyu Tie, Eric Ke Wang, Muhammad Khurram Khan
, Sachin Kumar
, Saru Kumari
:
Verifiable dynamic ranked search with forward privacy over encrypted cloud data. Peer-to-Peer Netw. Appl. 14(5): 2977-2991 (2021) - [j74]Chien-Ming Chen
, Shuangshuang Liu
:
Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure. Secur. Commun. Networks 2021: 6537678:1-6537678:13 (2021) - [j73]Tsu-Yang Wu
, Lei Yang
, Zhiyuan Lee
, Chien-Ming Chen
, Jeng-Shyang Pan
, SK Hafizul Islam
:
Improved ECC-Based Three-Factor Multiserver Authentication Scheme. Secur. Commun. Networks 2021: 6627956:1-6627956:14 (2021) - [j72]Tsu-Yang Wu
, Zhiyuan Lee
, Lei Yang
, Chien-Ming Chen
:
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks. Secur. Commun. Networks 2021: 9944460:1-9944460:17 (2021) - [j71]Eric Ke Wang
, Ship Peng Xu
, Chien-Ming Chen
, Neeraj Kumar
:
Neural-Architecture-Search-Based Multiobjective Cognitive Automation System. IEEE Syst. J. 15(2): 2918-2925 (2021) - [j70]Wensheng Gan
, Guoting Chen, Hongzhi Yin
, Philippe Fournier-Viger, Chien-Ming Chen
, Philip S. Yu:
Towards Revenue Maximization with Popular and Profitable Products. Trans. Data Sci. 2(4): 42:1-42:21 (2021) - [j69]Eric Ke Wang
, Xi Liu, Chien-Ming Chen
, Saru Kumari
, Mohammad Shojafar
, M. Shamim Hossain
:
Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain. IEEE Trans. Ind. Informatics 17(10): 7085-7092 (2021) - [j68]Peng Wang, Chien-Ming Chen
, Saru Kumari
, Mohammad Shojafar
, Rahim Tafazolli
, Yi-Ning Liu
:
HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs. IEEE Trans. Intell. Transp. Syst. 22(8): 5071-5080 (2021) - [j67]Eric Ke Wang, Fan Wang, Saru Kumari
, Jyh-Haw Yeh, Chien-Ming Chen
:
Intelligent monitor for typhoon in IoT system of smart city. J. Supercomput. 77(3): 3024-3043 (2021) - [j66]Kuo-Kun Tseng, Ran Zhang, Chien-Ming Chen
, Mohammad Mehedi Hassan
:
DNetUnet: a semi-supervised CNN of medical image segmentation for super-computing AI service. J. Supercomput. 77(4): 3594-3615 (2021) - [j65]Chien-Ming Chen
, Xiaoting Deng, Wensheng Gan
, Jiahui Chen, SK Hafizul Islam:
A secure blockchain-based group key agreement protocol for IoT. J. Supercomput. 77(8): 9046-9068 (2021) - [c60]Lili Chen, Wensheng Gan, Qi Lin, Jinbao Miao, Chien-Ming Chen
:
Mining On-shelf High-utility Quantitative Itemsets. IEEE BigData 2021: 5491-5500 - [c59]Gengsen Huang, Wensheng Gan, Shan Huang, Jiahui Chen, Chien-Ming Chen
:
NSPIS: Mining Negative Sequential Patterns with Individual Support. IEEE BigData 2021: 5507-5516 - [c58]Qi Lin, Wensheng Gan, Yongdong Wu, Jiahui Chen, Chien-Ming Chen
:
Joint Utility and Frequency for Pattern Classification. IEEE BigData 2021: 5524-5533 - [c57]Chien-Ming Chen
, Zhuoyu Tie, Eric Ke Wang, Kuo-Hui Yeh, Wensheng Gan, SK Hafizul Islam:
A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy. DSC 2021: 1-8 - [c56]Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien-Ming Chen
:
On the Construction of a Post-Quantum Blockchain. DSC 2021: 1-8 - [c55]Ning Shen, Jyh-Haw Yeh, Hung-Min Sun, Chien-Ming Chen
:
A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases. PRDC 2021: 133-142 - [i5]Chien-Ming Chen, Lili Chen, Wensheng Gan:
Flexible Pattern Discovery and Analysis. CoRR abs/2111.12218 (2021) - [i4]Wensheng Gan, Lili Chen, Shicheng Wan, Jiahui Chen, Chien-Ming Chen:
Anomaly Rule Detection in Sequence Data. CoRR abs/2111.15026 (2021) - 2020
- [j64]Tsu-Yang Wu
, Zhiyuan Lee, Mohammad S. Obaidat, Saru Kumari
, Sachin Kumar
, Chien-Ming Chen
:
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks. IEEE Access 8: 28096-28108 (2020) - [j63]Izwa Altaf, Muhammad Asad Saleem
, Khalid Mahmood
, Saru Kumari
, Pradeep Chaudhary
, Chien-Ming Chen
:
A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems. IEEE Access 8: 46278-46287 (2020) - [j62]Adesh Kumari, Vinod Kumar
, M. Yahya Abbasi, Saru Kumari
, Pradeep Chaudhary
, Chien-Ming Chen
:
CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC. IEEE Access 8: 107838-107852 (2020) - [j61]Mu-En Wu, Hui-Huang Tsai, Wei-Ho Chung, Chien-Ming Chen
:
Analysis of Kelly betting on finite repeated games. Appl. Math. Comput. 373: 125028 (2020) - [j60]Yu-Qiang Chen
, Biao Zhou, Mingming Zhang, Chien-Ming Chen
:
Using IoT technology for computer-integrated manufacturing systems in the semiconductor industry. Appl. Soft Comput. 89: 106065 (2020) - [j59]Hongfeng Zhu, Xueying Wang, Chien-Ming Chen
, Saru Kumari
:
Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain. Comput. Electr. Eng. 86: 106714 (2020) - [j58]Eric Ke Wang, Chien-Ming Chen
, Fan Wang, Muhammad Khurram Khan
, Saru Kumari
:
Joint-learning segmentation in Internet of drones (IoD)-based monitor systems. Comput. Commun. 152: 54-62 (2020) - [j57]Eric Ke Wang
, RuiPei Sun, Chien-Ming Chen
, Zuodong Liang, Saru Kumari
, Muhammad Khurram Khan
:
Proof of X-repute blockchain consensus protocol for IoT systems. Comput. Secur. 95: 101871 (2020) - [j56]Eric Ke Wang, Chien-Ming Chen
, Siu-Ming Yiu, Mohammad Mehedi Hassan, Majed A. AlRubaian, Giancarlo Fortino:
Incentive evolutionary game model for opportunistic social networks. Future Gener. Comput. Syst. 102: 14-29 (2020) - [j55]Eric Ke Wang, Zuodong Liang, Chien-Ming Chen
, Saru Kumari
, Muhammad Khurram Khan
:
PoRX: A reputation incentive scheme for blockchain consensus of IIoT. Future Gener. Comput. Syst. 102: 140-151 (2020) - [j54]Eric Ke Wang, Chien-Ming Chen
, Mohammad Mehedi Hassan, Ahmad Almogren
:
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain. Future Gener. Comput. Syst. 108: 135-144 (2020) - [j53]Muhammad Arslan Akram, Zahid Ghaffar
, Khalid Mahmood, Saru Kumari
, Kadambri Agarwal
, Chien-Ming Chen
:
An anonymous authenticated key-agreement scheme for multi-server infrastructure. Hum. centric Comput. Inf. Sci. 10: 22 (2020) - [j52]Jianneng Chen, Zhen-Jie Huang
, Yu-Ping Zhou, Fumin Zou, Chien-Ming Chen
, Jimmy Ming-Tai Wu, Tsu-Yang Wu
:
Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks. IET Networks 9(6): 290-297 (2020) - [j51]Zijian Bao, Wenbo Shi, Saru Kumari
, Zhiyin Kong, Chien-Ming Chen
:
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity. Int. J. Inf. Sec. 19(3): 311-321 (2020) - [j50]Salman Shamshad
, Minahil Rana, Khalid Mahmood, Saru Kumari
, Chien-Ming Chen
:
A secure blockchain-based e-health records storage and sharing scheme. J. Inf. Secur. Appl. 55: 102590 (2020) - [j49]Shou-Ching Hsiao, Zi-Yuan Liu
, Raylin Tso, Da-Yu Kao, Chien-Ming Chen
:
PrivGRU: Privacy-preserving GRU inference using additive secret sharing. J. Intell. Fuzzy Syst. 38(5): 5627-5638 (2020) - [j48]Tai-Li Luo, Mu-En Wu, Chien-Ming Chen
:
A framework of deep reinforcement learning for stock evaluation functions. J. Intell. Fuzzy Syst. 38(5): 5639-5649 (2020) - [j47]Akasha Shafiq, Muhammad Faizan Ayub
, Khalid Mahmood
, Mazhar Sadiq, Saru Kumari
, Chien-Ming Chen
:
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure. J. Sensors 2020: 8829319:1-8829319:17 (2020) - [j46]Shu-Chuan Chu, Lili Chen, Sachin Kumar
, Saru Kumari
, Joel J. P. C. Rodrigues
, Chien-Ming Chen
:
Decentralized Private Information Sharing Protocol on Social Networks. Secur. Commun. Networks 2020: 7137480:1-7137480:12 (2020) - [j45]Mostafa Yavari
, Masoumeh Safkhani
, Saru Kumari
, Sachin Kumar
, Chien-Ming Chen
:
An Improved Blockchain-Based Authentication Protocol for IoT Network Management. Secur. Commun. Networks 2020: 8836214:1-8836214:16 (2020) - [j44]Eric Ke Wang, Chien-Ming Chen
, Dongning Zhao, Wai Hung Ip
, Kai-Leung Yung
:
A dynamic trust model in internet of things. Soft Comput. 24(8): 5773-5782 (2020) - [c54]Jiahui Chen, Xu Guo, Wensheng Gan, Chien-Ming Chen
, Weiping Ding, Guoting Chen:
OSUMI: On-Shelf Utility Mining from Itemset-based Data. IEEE BigData 2020: 5340-5349 - [c53]Wensheng Gan, Shicheng Wan, Jiahui Chen, Chien-Ming Chen
, Lina Qiu:
TopHUI: Top-k high-utility itemset mining with negative utility. IEEE BigData 2020: 5350-5359 - [c52]Chien-Ming Chen
, Lili Chen, Wensheng Gan, Lina Qiu, Weiping Ding:
UHUOPM: High Utility Occupancy Pattern Mining in Uncertain Data. SMC 2020: 3066-3071 - [i3]Muchuang Hu, Jiahui Chen, Wensheng Gan, Chien-Ming Chen:
A Jumping Mining Attack and Solution. CoRR abs/2008.08184 (2020) - [i2]Chien-Ming Chen, Lili Chen, Wensheng Gan, Lina Qiu, Weiping Ding:
Discovering High Utility-Occupancy Patterns from Uncertain Data. CoRR abs/2008.08190 (2020) - [i1]Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien-Ming Chen:
On the Construction of a Post-Quantum Blockchain for Smart City. CoRR abs/2012.15799 (2020)
2010 – 2019
- 2019
- [j43]Chien-Ming Chen
, Bin Xiang, Yining Liu, King-Hang Wang
:
A Secure Authentication Protocol for Internet of Vehicles. IEEE Access 7: 12047-12057 (2019) - [j42]Saru Kumari
, Pradeep Chaudhary
, Chien-Ming Chen
, Muhammad Khurram Khan
:
Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications. IEEE Access 7: 39717-39720 (2019) - [j41]Tsu-Yang Wu
, Chien-Ming Chen
, King-Hang Wang, Jimmy Ming-Tai Wu
:
Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments. IEEE Access 7: 49232-49239 (2019) - [j40]Lanlan Kang, Ruey-Shun Chen, Naixue Xiong
, Yeh-Cheng Chen, Yu-Xi Hu, Chien-Ming Chen
:
Selecting Hyper-Parameters of Gaussian Process Regression Based on Non-Inertial Particle Swarm Optimization in Internet of Things. IEEE Access 7: 59504-59513 (2019) - [j39]Eric Ke Wang
, Xun Zhang, Fan Wang, Tsu-Yang Wu
, Chien-Ming Chen
:
Multilayer Dense Attention Model for Image Caption. IEEE Access 7: 66358-66368 (2019) - [j38]Wenyuan Zhang, Ruey-Shun Chen
, Yeh-Cheng Chen, S.-Y. Lu, Naixue Xiong
, Chien-Ming Chen
:
An Effective Digital System for Intelligent Financial Environments. IEEE Access 7: 155965-155976 (2019) - [j37]Fengjun Xiao, Ruey-Shun Chen
, Wenyuan Zhang, Yeh-Cheng Chen, S.-Y. Lu, Yu-Qiang Chen, Naixue Xiong
, Chien-Ming Chen
:
Design and Analysis of a Strengthen Internal Control Scheme for Smart Trust Financial Service. IEEE Access 7: 163202-163218 (2019) - [j36]Jian-Lan Guo, Yu-Qiang Chen
, Huai-De Yang, Chien-Ming Chen
, Yeh-Cheng Chen, Huiyu Zhang, Zhiyu Zhang:
Study on Secrecy Capacity of Wireless Sensor Networks in Internet of Things Based on the Amplify-and-Forward Compressed Sensing Scheme. IEEE Access 7: 185580-185589 (2019) - [j35]Chien-Ming Chen
, King-Hang Wang
, Kuo-Hui Yeh, Bin Xiang, Tsu-Yang Wu
:
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J. Ambient Intell. Humaniz. Comput. 10(8): 3133-3142 (2019) - [j34]Km. Renuka, Sachin Kumar
, Saru Kumari
, Chien-Ming Chen
:
Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks. Sensors 19(21): 4625 (2019) - [j33]Hu Xiong, Yi Wang, Wenchao Li, Chien-Ming Chen
:
Flexible, Efficient, and Secure Access Delegation in Cloud Computing. ACM Trans. Manag. Inf. Syst. 10(1): 2:1-2:20 (2019) - [j32]Chao-Lin Chen, Jun-Ting Liu, Yi-Chun Hsiao, Chien-Ming Chen
, Ho-Chun Tsao, Che Lin
:
Robust Beamforming Design for MISO Bursty Interference Channels Under Traffic Uncertainties. IEEE Trans. Signal Process. 67(6): 1477-1492 (2019) - [c51]Tsu-Yang Wu
, Zhiyuan Lee, Yanyu Huang, Chien-Ming Chen
, Yeh-Cheng Chen:
Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing. ICCE-TW 2019: 1-2 - [c50]Xiao-Cong Liang, Tsu-Yang Wu
, Yu-Qi Lee, Tao Wang, Chien-Ming Chen
, Yeh-Cheng Chen:
Cryptanalysis of an Anonymous Message Authentication Scheme for Smart Grid. ICGEC 2019: 455-461 - [c49]Lei Yang, Tsu-Yang Wu
, Zhiyuan Lee, Chien-Ming Chen
, King-Hang Wang, Jeng-Shyang Pan
, Shu-Chuan Chu
, Mu-En Wu:
Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks. ICGEC 2019: 462-467 - [c48]Zhiyuan Lee, Tsu-Yang Wu
, Lei Yang, Chien-Ming Chen
, King-Hang Wang, Jeng-Shyang Pan
, Shu-Chuan Chu
, Yeh-Cheng Chen:
A Lightweight Anonymous Mutual Authentication Scheme in Mobile Networks. ICGEC 2019: 468-473 - [c47]Zhuoyu Tie, Eric Ke Wang, Jyh-Haw Yeh, Chien-Ming Chen
:
Forward Privacy Analysis of a Dynamic Searchable Encryption Scheme. ICGEC 2019: 474-480 - [c46]Jimmy Ming-Tai Wu, Min Wei, Jerry Chun-Wei Lin
, Chien-Ming Chen
:
High-Utility Itemset Mining in Big Dataset. ICGEC 2019: 567-570 - [c45]Ning Shen, Jyh-haw Yeh, Chien-Ming Chen
, Yeh-Cheng Chen, Yunpeng Zhang:
Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption. ISPA/BDCloud/SocialCom/SustainCom 2019: 776-783 - 2018
- [j31]Kuo-Hui Yeh
, Chunhua Su, Jia-Li Hou, Wayne Chiu
, Chien-Ming Chen
:
A Robust Mobile Payment Scheme With Smart Contract-Based Transaction Repository. IEEE Access 6: 59394-59404 (2018) - [j30]Chun-Ta Li
, Tsu-Yang Wu
, Chien-Ming Chen
:
A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps. IEEE Access 6: 66742-66753 (2018) - [j29]Tsu-Yang Wu, Chao Meng, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan:
Comments on Recent Proposed Cui Et Al.'s KASE and Lu Et Al.'s dIBEKS Schemes. J. Inf. Hiding Multim. Signal Process. 9(1): 162-169 (2018) - [j28]Tsu-Yang Wu, Xiaoning Fan, King-Hang Wang, Jeng-Shyang Pan, Chien-Ming Chen, Jimmy Ming-Tai Wu:
Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map. J. Inf. Hiding Multim. Signal Process. 9(4): 1050-1057 (2018) - [j27]Chien-Ming Chen, Guangjie Wang, Weicheng Fang, Tsu-Yang Wu:
A New Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. J. Inf. Hiding Multim. Signal Process. 9(6): 1595-1602 (2018) - [j26]Chien-Ming Chen, Weicheng Fang, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan, King-Hang Wang:
Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol. J. Inf. Sci. Eng. 34(2): 371-390 (2018) - [j25]Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Weimin Zheng, Shu-Chuan Chu, John F. Roddick:
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review. J. Netw. Intell. 3(1): 16-25 (2018) - [j24]Chun-Ta Li, Cheng-Chi Lee
, Chi-Yao Weng, Chien-Ming Chen
:
Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw. Appl. 11(1): 198-208 (2018) - [j23]Chun-Ta Li
, Chin-Ling Chen, Cheng-Chi Lee
, Chi-Yao Weng, Chien-Ming Chen:
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput. 22(8): 2495-2506 (2018) - [j22]Wayne Chiu
, Chunhua Su, Chuan-Yen Fan, Chien-Ming Chen
, Kuo-Hui Yeh
:
Authentication with What You See and Remember in the Internet of Things. Symmetry 10(11): 537 (2018) - [j21]King-Hang Wang
, Chien-Ming Chen
, Weicheng Fang, Tsu-Yang Wu
:
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J. Supercomput. 74(1): 65-70 (2018) - [c44]Tsu-Yang Wu
, Chien-Ming Chen
, King-Hang Wang, Jimmy Ming-Tai Wu, Jeng-Shyang Pan
:
A Public Auditing Scheme with Data Recovery. ICGEC 2018: 595-602 - [c43]Chien-Ming Chen
, Yanyu Huang, Xiaoting Deng, Tsu-Yang Wu
:
On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor. IIH-MSP (1) 2018: 171-177 - [c42]Tsu-Yang Wu
, Chien-Ming Chen
, King-Hang Wang
, Jimmy Ming-Tai Wu, Jeng-Shyang Pan
:
Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme. IIH-MSP (1) 2018: 178-183 - [c41]Yi Chun Hsiao, Chien-Ming Chen, Che Lin:
Energy Efficiency Maximization in Multi-User Miso Mixed RF/VLC Heterogeneous Cellular Networks. SECON 2018: 82-90 - [c40]Jerry Chun-Wei Lin
, Yuyu Zhang, Chun-Hao Chen, Jimmy Ming-Tai Wu, Chien-Ming Chen
, Tzung-Pei Hong
:
A Multiple Objective PSO-Based Approach for Data Sanitization. TAAI 2018: 148-151 - [e2]Jerry Chun-Wei Lin, Jeng-Shyang Pan, Shu-Chuan Chu, Chien-Ming Chen:
Genetic and Evolutionary Computing - Proceedings of the Eleventh International Conference on Genetic and Evolutionary Computing, ICGEC 2017, November 6-8, 2017, Kaohsiung, Taiwan. Advances in Intelligent Systems and Computing 579, Springer 2018, ISBN 978-981-10-6486-9 [contents] - 2017
- [j20]Chien-Ming Chen
, Chun-Ta Li
, Shuai Liu, Tsu-Yang Wu
, Jeng-Shyang Pan
:
A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System. IEEE Access 5: 3410-3422 (2017) - [j19]King-Hang Wang
, Chien-Ming Chen
, Weicheng Fang, Tsu-Yang Wu
:
A secure authentication scheme for Internet of Things. Pervasive Mob. Comput. 42: 15-26 (2017) - [j18]Chun-Ta Li
, Tsu-Yang Wu
, Chin-Ling Chen, Cheng-Chi Lee
, Chien-Ming Chen:
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Sensors 17(7): 1482 (2017) - [j17]Tsu-Yang Wu
, Chien-Ming Chen
, Xiuyang Sun, Shuai Liu, Jerry Chun-Wei Lin
:
A Countermeasure to SQL Injection Attack for Cloud Environment. Wirel. Pers. Commun. 96(4): 5279-5293 (2017) - [c39]Jen-Ho Hsiao, Raylin Tso, Chien-Ming Chen
, Mu-En Wu:
Decentralized E-Voting Systems Based on the Blockchain Technology. CSA/CUTE 2017: 305-309 - [c38]Kun-Tai Chan, Raylin Tso, Chien-Ming Chen
, Mu-En Wu:
Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart Contracts. CSA/CUTE 2017: 310-314 - [c37]Yi-Siou Jheng, Raylin Tso, Chien-Ming Chen
, Mu-En Wu:
Password-Based Authenticated Key Exchange from Lattices for Client/Server Model. CSA/CUTE 2017: 315-319 - [c36]Tsu-Yang Wu
, Yueshan Lin, King-Hang Wang
, Chien-Ming Chen
, Jeng-Shyang Pan
:
Comments on Yu et al's Shared Data Integrity Verification Protocol. ECC 2017: 73-78 - [c35]Tsu-Yang Wu
, Weicheng Fang, Chien-Ming Chen
, Eric Ke Wang:
Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards. ECC 2017: 79-87 - [c34]Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee
, Chien-Ming Chen:
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems. GPC 2017: 116-126 - [c33]Tsu-Yang Wu
, Bin Xiang, Guangjie Wang, Chien-Ming Chen
, Eric Ke Wang:
Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. ICGEC 2017: 191-198 - [c32]Tsu-Yang Wu
, Chao Meng, King-Hang Wang
, Chien-Ming Chen
, Jeng-Shyang Pan
:
Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme. ICGEC 2017: 199-205 - [c31]Chun-Ta Li, Cheng-Chi Lee
, Chi-Yao Weng, Tsu-Yang Wu
, Chien-Ming Chen
:
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System". ICISA 2017: 282-289 - [c30]Tsu-Yang Wu
, Chao Meng, Chien-Ming Chen
, King-Hang Wang
, Jeng-Shyang Pan
:
On the Security of a Certificateless Public Key Encryption with Keyword Search. IIH-MSP (1) 2017: 191-197 - [c29]Tsu-Yang Wu
, Weicheng Fang, Chien-Ming Chen
, Guangjie Wang:
Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks. IIH-MSP (1) 2017: 206-213 - [c28]Tsu-Yang Wu
, Yueshan Lin, King-Hang Wang
, Chien-Ming Chen
, Jeng-Shyang Pan
, Mu-En Wu:
Comments on a privacy preserving public auditing mechanism for shared cloud data. MISNC 2017: 48:1-48:6 - 2016
- [j16]Yu Chen, Chien-Ming Chen, Jeng-Shyang Pan, Tsu-Yang Wu, Shuai Liu:
Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps. J. Inf. Hiding Multim. Signal Process. 7(6): 1365-1372 (2016) - [j15]Chien-Ming Chen, Linlin Xu, Tsu-Yang Wu, Ci-Rong Li:
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol. J. Netw. Intell. 1(2): 61-66 (2016) - [c27]Chien-Ming Chen
, Xiaojie Zhang, Tsu-Yang Wu
:
A Secure Condition-Based Location Authentication Protocol for Mobile Devices. CMCSN 2016: 146-149 - [c26]Shuai Liu, Jeng-Shyang Pan
, Lingping Kong, Chien-Ming Chen
:
Time Competition Flooding in High-Density Wireless Sensor Network. CMCSN 2016: 170-173 - [c25]Tsu-Yang Wu
, Fanya Meng, Chien-Ming Chen
, Shuai Liu, Jeng-Shyang Pan
:
On the Security of a Certificateless Searchable Public Key Encryption Scheme. ICGEC 2016: 113-119 - [c24]Jerry Chun-Wei Lin
, Jiexiong Zhang, Philippe Fournier-Viger
, Tzung-Pei Hong
, Chien-Ming Chen
, Ja-Hwung Su:
Efficient mining of short periodic high-utility itemsets. SMC 2016: 3083-3088 - 2015
- [j14]Chien-Ming Chen
, Shuai-Min Chen, Wei-Chih Ting, Chi-Yi Kao, Hung-Min Sun:
An enhancement of return address stack for security. Comput. Stand. Interfaces 38: 17-24 (2015) - [j13]Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen
, Tsu-Yang Wu
, Chia-Hsien Lin, Huaxiong Wang:
A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321: 224-237 (2015) - [j12]Eric Ke Wang, Zhenjie Cao, Tsu-Yang Wu, Chien-Ming Chen:
MAPMP: A Mutual Authentication Protocol for Mobile Payment. J. Inf. Hiding Multim. Signal Process. 6(4): 697-707 (2015) - [j11]Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, Mu-En Wu:
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks. J. Univers. Comput. Sci. 21(3): 406-418 (2015) - [c23]Jeng-Shyang Pan
, Tsu-Yang Wu
, Chien-Ming Chen
, Eric Ke Wang:
An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme. ICGEC (2) 2015: 3-9 - [c22]Jeng-Shyang Pan
, Raylin Tso
, Mu-En Wu, Chien-Ming Chen
:
Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments. ICGEC (2) 2015: 59-69 - [c21]Jeng-Shyang Pan
, Tsu-Yang Wu
, Chien-Ming Chen
, Eric Ke Wang:
Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme. IIH-MSP 2015: 203-206 - [c20]Chia-Hung Wang
, Mu-En Wu, Chien-Ming Chen
:
Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints. IIH-MSP 2015: 211-214 - [c19]Jeng-Shyang Pan
, Chi-Yao Weng, Mu-En Wu, Chuan-Yih Chen, Chien-Ming Chen
, Chwei-Shyong Tsai:
A KL Divergence Function for Randomized Secret Shares. IIH-MSP 2015: 231-234 - [c18]Eric Ke Wang, Huan Liu, Gang Wang, Yuming Ye, Tsu-Yang Wu
, Chien-Ming Chen
:
Context recognition for adaptive hearing-aids. INDIN 2015: 1102-1107 - [c17]Eric Ke Wang, Chun-Wei Lin
, Tsu-Yang Wu
, Chien-Ming Chen
, Yuming Ye:
Privacy Protection Framework in Social Networked Cars. MISNC 2015: 553-561 - [c16]Chien-Ming Chen
, Linlin Xu, Xiaojie Zhang, Tsu-Yang Wu
, Jeng-Shyang Pan
:
On the Security of a Mutual Authentication and Key Agreement Protocol Based on Chaotic Maps. RVSP 2015: 143-146 - 2014
- [j10]Chien-Ming Chen
, Yao-Hsin Chen, Yue-Hsun Lin, Hung-Min Sun:
Eliminating rouge femtocells based on distance bounding protocol and geographic information. Expert Syst. Appl. 41(2): 426-433 (2014) - [j9]Bing-Zhe He, Chien-Ming Chen
, Yi-Ping Su, Hung-Min Sun:
A defence scheme against Identity Theft Attack based on multiple social networks. Expert Syst. Appl. 41(5): 2345-2352 (2014) - [j8]Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Lijun Yan, Huaxiong Wang, Hung-Min Sun:
Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID. J. Inf. Hiding Multim. Signal Process. 5(4): 642-648 (2014) - [c15]Tsu-Yang Wu
, Chengxiang Zhou, Eric Ke Wang, Jeng-Shyang Pan
, Chien-Ming Chen
:
Towards Time-Bound Hierarchical Key Management in Cloud Computing. ECC (1) 2014: 31-38 - [c14]Xinying Zheng, Chien-Ming Chen
, Tsu-Yang Wu
, Eric Ke Wang, Tsui-Ping Chung:
Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID. ECC (1) 2014: 145-153 - [c13]Tsu-Yang Wu
, Jeng-Shyang Pan
, Chien-Ming Chen
, Chun-Wei Lin
:
Towards SQL Injection Attacks Detection Mechanism Using Parse Tree. ICGEC 2014: 371-380 - [c12]Eric Ke Wang, Tsu-Yang Wu
, Chien-Ming Chen
, Yuming Ye, Zhujin Zhang, Futai Zou:
MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things. ICGEC 2014: 389-397 - [c11]Chun-Wei Lin
, Wensheng Gan
, Tzung-Pei Hong
, Chien-Ming Chen
:
Maintaining high-utility itemsets in dynamic databases. ICMLC 2014: 469-474 - [c10]Chien-Ming Chen
, Jeng-Shyang Pan
, Raylin Tso
, Szu-Wei Huang, Mu-En Wu:
Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID. IIH-MSP 2014: 634-637 - [c9]Chien-Ming Chen
, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun:
A Methodology for Hook-Based Kernel Level Rootkits. ISPEC 2014: 119-128 - [c8]Tsu-Yang Wu
, Chengxiang Zhou, Chien-Ming Chen
, Eric Ke Wang, Jeng-Shyang Pan
:
Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control. MISNC 2014: 437-444 - [c7]Chien-Ming Chen
, Tsu-Yang Wu
, Raylin Tso, Mu-En Wu:
Security Analysis and Improvement of Femtocell Access Control. NSS 2014: 223-232 - [c6]Raylin Tso
, Chien-Ming Chen
, Xinying Zheng, Mu-En Wu:
A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions. RFIDSec Asia 2014: 17-28 - [e1]Junzo Watada, Akinori Ito, Jeng-Shyang Pan, Han-Chieh Chao, Chien-Ming Chen:
2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014, Kitakyushu, Japan, August 27-29, 2014. IEEE 2014, ISBN 978-1-4799-5390-5 [contents] - 2013
- [j7]Chien-Ming Chen, Yue-Hsun Lin, Yao-Hsin Chen, Hung-Min Sun:
SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN. J. Inf. Hiding Multim. Signal Process. 4(1): 57-72 (2013) - [j6]Chien-Ming Chen
, King-Hang Wang
, Tsu-Yang Wu
, Jeng-Shyang Pan
, Hung-Min Sun:
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices. IEEE Trans. Inf. Forensics Secur. 8(8): 1318-1330 (2013) - [c5]Lingping Kong, Chien-Ming Chen, Hong-Chi Shih, Chun-Wei Lin, Bing-Zhe He, Jeng-Shyang Pan:
An Energy-Aware Routing Protocol Using Cat Swarm Optimization for Wireless Sensor Networks. EMC/HumanCom 2013: 311-318 - [c4]Wei Kan, Tsu-Yang Wu
, Tao Han, Chun-Wei Lin, Chien-Ming Chen, Jeng-Shyang Pan:
An Efficient Detecting Mechanism for Cross-Site Script Attacks in the Cloud. EMC/HumanCom 2013: 663-672 - 2012
- [j5]Chien-Ming Chen
, Yue-Hsun Lin, Ya-Ching Lin, Hung-Min Sun:
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(4): 727-734 (2012) - 2011
- [j4]Hung-Min Sun, Hsun Wang, King-Hang Wang
, Chien-Ming Chen
:
A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code. IEEE Trans. Computers 60(6): 813-823 (2011)
2000 – 2009
- 2009
- [j3]Hung-Min Sun, King-Hang Wang
, Chien-Ming Chen
:
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. IEEE Trans. Dependable Secur. Comput. 6(2): 159-160 (2009) - 2008
- [j2]Hung-Min Sun, Chien-Ming Chen
, Cheng-Zong Shieh:
Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems. IEEE Trans. Multim. 10(6): 1109-1120 (2008) - [c3]Hung-Min Sun, Yue-Hsun Lin, Ying-Chu Hsiao, Chien-Ming Chen
:
An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks. ICESS 2008: 19-26 - 2007
- [c2]Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen
:
Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. AINA Workshops (1) 2007: 457-462 - [c1]Hung-Min Sun, Chien-Ming Chen
, Feng-Ying Chu:
An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks. ISCC 2007: 495-500 - 2003
- [j1]Wei-Chi Ku, Chien-Ming Chen
, Hui-Lung Lee:
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. ACM SIGOPS Oper. Syst. Rev. 37(4): 19-25 (2003)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-18 02:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint