default search action
Wen-Guey Tzeng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j48]Amir Rezapour, Wen-Guey Tzeng:
RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing Algorithm. IEEE Trans. Dependable Secur. Comput. 19(6): 4052-4067 (2022) - 2021
- [j47]Amir Rezapour, Wen-Guey Tzeng:
RL-PMAgg: Robust aggregation for PM2.5 using deep RL-based trust management system. Internet Things 13: 100347 (2021) - [c42]Lyue Li, Amir Rezapour, Wen-Guey Tzeng:
A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space. DSC 2021: 1-7 - 2020
- [j46]Chung-Yi Lin, Wen-Guey Tzeng:
A Cooperative Game-Theoretic Model in Cloud Storage Auditing. J. Inf. Sci. Eng. 36(1): 127-143 (2020) - [j45]Amir Rezapour, Wen-Guey Tzeng:
A Robust Algorithm for Predicting Attacks Using Collaborative Security Logs. J. Inf. Sci. Eng. 36(3): 597-619 (2020) - [j44]Yi-Ren Chen, Amir Rezapour, Wen-Guey Tzeng, Shi-Chun Tsai:
RL-Routing: An SDN Routing Algorithm Based on Deep Reinforcement Learning. IEEE Trans. Netw. Sci. Eng. 7(4): 3185-3199 (2020)
2010 – 2019
- 2019
- [j43]Albert Guan, Wen-Guey Tzeng:
A light-weight bit commitment protocol based on unpredictable channel noise. Theor. Comput. Sci. 755: 29-37 (2019) - 2018
- [j42]Yi-Ruei Chen, Amir Rezapour, Wen-Guey Tzeng:
Privacy-preserving ridge regression on distributed data. Inf. Sci. 451-452: 34-49 (2018) - [j41]Yen-Chung Chen, Yu-Sung Wu, Wen-Guey Tzeng:
Phrase Search for Encrypted Cloud Storage. J. Inf. Sci. Eng. 34(2): 401-417 (2018) - [c41]Wei-Min Lee, Amir Rezapour, Wen-Guey Tzeng:
Monsieur Poirot: Detecting Botnets Using Re-Identification Algorithm and Nontrivial Feature Selection Technique. ICC 2018: 1-6 - [c40]Amir Rezapour, Wen-Guey Tzeng:
A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design. SecureComm (2) 2018: 139-154 - [c39]Shao-Chien Chen, Yi-Ruei Chen, Wen-Guey Tzeng:
Effective Botnet Detection Through Neural Networks on Convolutional Features. TrustCom/BigDataSE 2018: 372-378 - 2017
- [j40]Yi-Ruei Chen, Wen-Guey Tzeng:
Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members. Comput. Commun. 98: 31-42 (2017) - [j39]Albert Guan, Wen-Guey Tzeng:
A light-weight oblivious transfer protocol based on channel noise. Int. J. Comput. Math. Comput. Syst. Theory 2(1): 28-38 (2017) - [j38]Albert Guan, Wen-Guey Tzeng:
A secret key establishment protocol for wireless networks using noisy channels. J. Comput. Secur. 25(2): 139-151 (2017) - [j37]Chung-Yi Lin, Wen-Guey Tzeng:
Strategy analysis for cloud storage reliability management based on game theory. J. Comput. Secur. 25(2): 153-171 (2017) - [j36]Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over ℤp. J. Inf. Sci. Eng. 33(1): 233-250 (2017) - [c38]Yi-Ruei Chen, Wen-Guey Tzeng:
Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security. ACNS 2017: 165-183 - [c37]Chih-Ning Lee, Yi-Ruei Chen, Wen-Guey Tzeng:
An online subject-based spam filter using natural language features. DSC 2017: 479-487 - [c36]Yuan-Hsiang Su, Amir Rezapour, Wen-Guey Tzeng:
The forward-backward string: A new robust feature for botnet detection. DSC 2017: 485-492 - 2015
- [j35]Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Delegated integrity check for hierarchical cloud data. J. Comput. Secur. 23(4): 471-508 (2015) - [j34]Shiuan-Tzuo Shen, Hsiao-Ying Lin, Wen-Guey Tzeng:
An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems. IEEE Trans. Reliab. 64(3): 840-851 (2015) - [c35]Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng:
Unique Signature with Short Output from CDH Assumption. ProvSec 2015: 475-488 - [i11]Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng:
Unique Signature with Short Output from CDH Assumption. IACR Cryptol. ePrint Arch. 2015: 830 (2015) - [i10]Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp. IACR Cryptol. ePrint Arch. 2015: 947 (2015) - 2014
- [j33]Yen-Chung Chen, Yu-Sung Wu, Wen-Guey Tzeng:
Preserving user query privacy in cloud-based security services. J. Comput. Secur. 22(6): 997-1024 (2014) - [j32]Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, Robert H. Deng:
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. IEEE Trans. Parallel Distributed Syst. 25(2): 468-477 (2014) - [c34]Chung-Yi Lin, Wen-Guey Tzeng:
Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems. SERE 2014: 187-195 - 2013
- [c33]Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou:
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing. ACNS 2013: 37-52 - [e1]Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng:
8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013. ACM 2013, ISBN 978-1-4503-1767-2 [contents] - [i9]Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou:
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing. IACR Cryptol. ePrint Arch. 2013: 208 (2013) - 2012
- [j31]Hsiao-Ying Lin, Wen-Guey Tzeng:
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding. IEEE Trans. Parallel Distributed Syst. 23(6): 995-1003 (2012) - [c32]Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin:
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring. ACNS 2012: 544-560 - [c31]Hsiao-Ying Lin, Shiuan-Tzuo Shen, Wen-Guey Tzeng, Bao-Shuh Paul Lin:
Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System. AINA 2012: 740-747 - [c30]Hsiao-Ying Lin, John Kubiatowicz, Wen-Guey Tzeng:
A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems. SERE 2012: 225-234 - [c29]Yi-Ruei Chen, Wen-Guey Tzeng:
Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation. TrustCom 2012: 295-302 - 2011
- [j30]Chung-Li Hou, Chang-Chun Lu, Shi-Chun Tsai, Wen-Guey Tzeng:
An Optimal Data Hiding Scheme With Tree-Based Parity Check. IEEE Trans. Image Process. 20(3): 880-886 (2011) - [c28]Kuei-Yi Chou, Yi-Ruei Chen, Wen-Guey Tzeng:
An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems. APNOMS 2011: 1-8 - [c27]Shiuan-Tzuo Shen, Wen-Guey Tzeng:
Delegable Provable Data Possession for Remote Data in the Clouds. ICICS 2011: 93-111 - [c26]Yi-Ruei Chen, J. D. Tygar, Wen-Guey Tzeng:
Secure group key management using uni-directional proxy re-encryption schemes. INFOCOM 2011: 1952-1960 - [c25]Hsiao-Ying Lin, Wen-Guey Tzeng, Bao-Shuh Paul Lin:
A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems. TrustCom 2011: 613-620 - 2010
- [j29]Chin-I Lee, Tzong-Chen Wu, Bo-Yin Yang, Wen-Guey Tzeng:
New Secure Broadcasting Scheme Realizing Information Granularity. J. Inf. Sci. Eng. 26(4): 1509-1523 (2010) - [j28]Torleiv Kløve, Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng:
Permutation arrays under the Chebyshev distance. IEEE Trans. Inf. Theory 56(6): 2611-2617 (2010) - [j27]Hsiao-Ying Lin, Wen-Guey Tzeng:
A Secure Decentralized Erasure Code for Distributed Networked Storage. IEEE Trans. Parallel Distributed Syst. 21(11): 1586-1594 (2010)
2000 – 2009
- 2009
- [j26]Hsiao-Ying Lin, Wen-Guey Tzeng:
Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication. J. Inf. Sci. Eng. 25(3): 907-920 (2009) - [j25]Cheng-Kang Chu, Wen-Guey Tzeng:
Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes. J. Inf. Sci. Eng. 25(5): 1465-1483 (2009) - [j24]Shi-Chun Tsai, Wen-Guey Tzeng, Kun-Yi Zhou:
Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3): 1218-1222 (2009) - [c24]Yi-Ruei Chen, Wen-Guey Tzeng:
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate. ICICS 2009: 121-134 - [i8]Torleiv Kløve, Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng:
Permutation Arrays Under the Chebyshev Distance. CoRR abs/0907.2682 (2009) - 2008
- [j23]Cheng-Kang Chu, Wen-Guey Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes. J. Univers. Comput. Sci. 14(3): 397-415 (2008) - [c23]Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng:
Efficient encoding and decoding with permutation arrays. ISIT 2008: 211-214 - [c22]Yi-Ru Liu, Wen-Guey Tzeng:
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. Public Key Cryptography 2008: 380-396 - 2007
- [j22]Cheng-Kang Chu, Wen-Guey Tzeng:
Optimal resilient threshold GQ signatures. Inf. Sci. 177(8): 1834-1851 (2007) - [j21]Chi-Ming Hu, Wen-Guey Tzeng:
Cheating Prevention in Visual Cryptography. IEEE Trans. Image Process. 16(1): 36-45 (2007) - [c21]Cheng-Kang Chu, Wen-Guey Tzeng:
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. ACISP 2007: 323-337 - [c20]Cheng-Kang Chu, Wen-Guey Tzeng:
Identity-Based Proxy Re-encryption Without Random Oracles. ISC 2007: 189-202 - [c19]Jheng-Ru Ou, Shi-Chun Tsai, Wen-Guey Tzeng:
Efficient Large-Scale Distributed Key Generation against Burst Interruption. SECRYPT 2007: 197-203 - [i7]Yi-Ru Liu, Wen-Guey Tzeng:
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2). IACR Cryptol. ePrint Arch. 2007: 167 (2007) - [i6]Cheng-Kang Chu, Wen-Guey Tzeng:
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. IACR Cryptol. ePrint Arch. 2007: 354 (2007) - 2006
- [c18]Wen-Guey Tzeng:
A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. AsiaCCS 2006: 223-230 - [c17]Cheng-Kang Chu, Wen-Guey Tzeng:
Conditional Oblivious Cast. Public Key Cryptography 2006: 443-457 - 2005
- [j20]Wen-Guey Tzeng, Zhi-Jia Tzeng:
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Des. Codes Cryptogr. 35(1): 47-61 (2005) - [j19]Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai, Wen-Guey Tzeng:
Extracting randomness from multiple independent sources. IEEE Trans. Inf. Theory 51(6): 2224-2227 (2005) - [j18]Shi-Chun Tsai, Wen-Guey Tzeng, Hsin-Lung Wu:
On the Jensen-Shannon Divergence and Variational Distance. IEEE Trans. Inf. Theory 51(9): 3333-3336 (2005) - [c16]Hsiao-Ying Lin, Wen-Guey Tzeng:
An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. ACNS 2005: 456-466 - [c15]Chi-Ming Hu, Wen-Guey Tzeng:
Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. ISC 2005: 300-313 - [c14]Cheng-Kang Chu, Wen-Guey Tzeng:
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. Public Key Cryptography 2005: 172-183 - [i5]Hsiao-Ying Lin, Wen-Guey Tzeng:
An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2005: 43 (2005) - 2004
- [j17]Wen-Guey Tzeng:
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters. IEEE Trans. Computers 53(2): 232-240 (2004) - [i4]Cheng-Kang Chu, Wen-Guey Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries. IACR Cryptol. ePrint Arch. 2004: 41 (2004) - 2003
- [c13]Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng:
A Threshold GQ Signature Scheme. ACNS 2003: 137-150 - [c12]Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tseng, Wen-Guey Tzeng, Shyan-Ming Yuan:
A Framework of High Confidence E-Healthcare Information System. ICWI 2003: 493-500 - [c11]Min-Shiang Hwang, Wen-Guey Tzeng:
A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy. ICOIN 2003: 757-761 - [i3]Cheng-Kang Chu, Li-Shan Liu, Wen-Guey Tzeng:
A Threshold GQ Signature Scheme. IACR Cryptol. ePrint Arch. 2003: 16 (2003) - 2002
- [j16]Wen-Guey Tzeng, Chi-Ming Hu:
A New Approach for Visual Cryptography. Des. Codes Cryptogr. 27(3): 207-227 (2002) - [j15]Wen-Guey Tzeng:
A Secure Fault-Tolerant Conference-Key Agreement Protocol. IEEE Trans. Computers 51(4): 373-379 (2002) - [j14]Wen-Guey Tzeng:
Corrections to "A Secure Fault-Tolerant Conference-Key Agreement Protocol". IEEE Trans. Computers 51(12): 1462 (2002) - [j13]Wen-Guey Tzeng:
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. IEEE Trans. Knowl. Data Eng. 14(1): 182-188 (2002) - [c10]Wen-Guey Tzeng, Zhi-Jia Tzeng:
Robust Key-Evolving Public Key Encryption Schemes. ICICS 2002: 61-72 - [c9]Cheng-Kang Chu, Wen-Guey Tzeng:
Distributed Key Generation as a Component of an Integrated Protocol. ICICS 2002: 411-421 - [c8]Wen-Guey Tzeng:
Efficient 1-Out-n Oblivious Transfer Schemes. Public Key Cryptography 2002: 159-171 - 2001
- [j12]Zhi-Jia Tzeng, Wen-Guey Tzeng:
Practical and Efficient Electronic Voting Schemes. J. Inf. Sci. Eng. 17(6): 865-877 (2001) - [j11]Zhi-Jia Tzeng, Wen-Guey Tzeng:
Authentication of Mobile Users in Third Generation Mobile Systems. Wirel. Pers. Commun. 16(1): 35-50 (2001) - [c7]Wen-Guey Tzeng, Zhi-Jia Tzeng:
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Public Key Cryptography 2001: 207-224 - [c6]Wen-Guey Tzeng, Zhi-Jia Tzeng:
Robust Forward-Secure Signature Schemes with Proactive Security. Public Key Cryptography 2001: 264-276 - [i2]Wen-Guey Tzeng, Zhi-Jia Tzeng:
Robust key-evolving public key encryption schemes. IACR Cryptol. ePrint Arch. 2001: 9 (2001) - [i1]Wen-Guey Tzeng:
Efficient oblivious transfer schemes. IACR Cryptol. ePrint Arch. 2001: 73 (2001) - 2000
- [c5]Wen-Guey Tzeng, Zhi-Jia Tzeng:
Round-Efficient Conference Key Agreement Protocols with Provable Security. ASIACRYPT 2000: 614-628 - [c4]Wen-Guey Tzeng:
A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol. Public Key Cryptography 2000: 1-13
1990 – 1999
- 1999
- [j10]Wen-Guey Tzeng, Chi-Ming Hu:
Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols. Inf. Process. Lett. 69(6): 297-302 (1999) - [j9]Wen-Guey Tzeng:
Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations. Inf. Process. Lett. 70(3): 153-156 (1999) - [j8]Wen-Guey Tzeng, Gow-Hsing King:
Three-Quarter Approximation for the Number of Unused Colors in Graph Coloring. Inf. Sci. 114(1-4): 105-126 (1999) - [j7]Gow-Hsing King, Wen-Guey Tzeng:
A New Graph Invariant for Graph Isomorphism: Probability Propagation Matrix. J. Inf. Sci. Eng. 15(3): 337-352 (1999) - 1998
- [c3]Kuen-Feng Chu, Wen-Guey Tzeng, Ping-Jer Yeh, Shyan-Ming Yuan:
An Integrated System for Multilevel Secure Compound Documents. WebNet 1998 - 1997
- [j6]Gow-Hsing King, Wen-Guey Tzeng:
On-Line Algorithms for the Dominating Set Problem. Inf. Process. Lett. 61(1): 11-14 (1997) - 1996
- [j5]Min-Shiang Hwang, Wen-Guey Tzeng, Wei-Pang Yang:
An access control scheme based on Chinese remainder theorem and time stamp concept. Comput. Secur. 15(1): 73-81 (1996) - [j4]Wen-Guey Tzeng:
On Path Equivalence of Nondeterministic Finite Automata. Inf. Process. Lett. 58(1): 43-46 (1996) - 1992
- [j3]Wen-Guey Tzeng:
Learning Probabilistic Automata and Markov Chains via Queries. Mach. Learn. 8: 151-166 (1992) - [j2]Wen-Guey Tzeng:
A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata. SIAM J. Comput. 21(2): 216-227 (1992) - 1991
- [j1]Ker-I Ko, Wen-Guey Tzeng:
Three Sigma^p_2-Complete Problems in Computational Learning Theory. Comput. Complex. 1: 269-310 (1991) - 1990
- [c2]Ker-I Ko, Assaf Marron, Wen-Guey Tzeng:
Learning String Patterns and Tree Patterns from Examples. ML 1990: 384-391
1980 – 1989
- 1989
- [c1]Wen-Guey Tzeng:
The Equivalence and Learning of Probabilistic Automata (Extended Abstract). FOCS 1989: 268-273
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint