default search action
Kun-Lin Tsai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Yen-Jen Chang, Kun-Lin Tsai, Wei-Cheng Jiang, Meng-Kun Liu:
Content-aware malicious webpage detection using convolutional neural network. Multim. Tools Appl. 83(3): 8145-8163 (2024) - 2023
- [c26]Kun-Lin Tsai, Yan-Hao Chen, Choa-Ting Huang, Guo-Wei Huang, Shih-Ting Tseng:
A Deep Learning based Sustainable Energy Scheduling System. APSIPA ASC 2023: 401-407 - 2021
- [j24]Fang-Yie Leu, Kun-Lin Tsai, Heru Susanto, Cheng-Yan Gu, Ilsun You:
A Fault Tolerant Mechanism for UE Authentication in 5G Networks. Mob. Networks Appl. 26(4): 1650-1667 (2021) - [j23]Kun-Lin Tsai, Yen-Jen Chang, Chien-Ho Wang, Cheng-Tse Chiang:
Accuracy-Configurable Radix-4 Adder With a Dynamic Output Modification Scheme. IEEE Trans. Circuits Syst. I Regul. Pap. 68(8): 3328-3336 (2021) - [j22]Yen-Jen Chang, Kun-Lin Tsai, Yu-Cheng Cheng:
Data Retention-Based Low Leakage Power TCAM for Network Packet Routing. IEEE Trans. Circuits Syst. II Express Briefs 68(2): 757-761 (2021) - [c25]Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, Chuan-Tian Wu:
Secure LoRaWAN Root Key Update Scheme for IoT Environment. MobiSec 2021: 3-15 - 2020
- [j21]Kun-Lin Tsai, Fang-Yie Leu, Li-Ling Hung, Chia-Yin Ko:
Secure Session Key Generation Method for LoRaWAN Servers. IEEE Access 8: 54631-54640 (2020) - [j20]Li-Ling Hung, Fang-Yie Leu, Kun-Lin Tsai, Chia-Yin Ko:
Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks. IEEE Access 8: 56321-56332 (2020) - [j19]Yen-Jen Chang, Kun-Lin Tsai, Yu-Cheng Cheng, Meng-Rong Lu:
Low-power ternary content-addressable memory design based on a voltage self-controlled fin field-effect transistor segment. Comput. Electr. Eng. 81: 106528 (2020) - [j18]Fang-Yie Leu, Heru Susanto, Kun-Lin Tsai, Chia-Yin Ko:
A channel assignment scheme for MIMO on concentric-hexagon-based multi-channel wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 35(4): 205-221 (2020) - [c24]Kun-Lin Tsai, Fang-Yie Leu, Tz-Yuan Huang, Hao-En Yang:
IoT Device Power Management Based on PSM and EDRX Mechanisms. BWCCA 2020: 244-253
2010 – 2019
- 2019
- [j17]Kun-Lin Tsai, Fang-Yie Leu, Ilsun You, Shuo-Wen Chang, Shiung-Jie Hu, Hoonyong Park:
Low-Power AES Data Encryption Architecture for a LoRaWAN. IEEE Access 7: 146348-146357 (2019) - [j16]Fang-Yie Leu, Kun-Lin Tsai, Szu-Yin Lin:
E-ANDSF-Based Base Station Selection Scheme by Using MLP in Untrusted Environments. IEEE Trans. Ind. Informatics 15(10): 5708-5714 (2019) - [c23]Kun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang, Jiun-Yi Lin, Huei-Tang Luo:
A LoRaWAN Based Energy Efficient Data Encryption Method. IMIS 2019: 493-502 - [c22]Kun-Lin Tsai, Fang-Yie Leu, Li-Chun Yang, Chi Li, Jhih-Yan Liu:
LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server. MobiSec 2019: 23-33 - 2018
- [j15]Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Yu-Ling Huang, Cheng-Han Tsai:
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments. IEEE Access 6: 45325-45334 (2018) - [c21]Kun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang:
Self-parameter Based Bilateral Session Key Exchange Method. BWCCA 2018: 611-620 - [c20]Fang-Yie Leu, Kun-Lin Tsai, Rui-Ting Hung:
MIH-Based eNB Selection for Untrusted Networks. WICON 2018: 129-140 - 2017
- [j14]Kun-Lin Tsai, Fang-Yie Leu:
Secure data-sharing using distributed environmental matching keys. Pervasive Mob. Comput. 42: 513-525 (2017) - [j13]Fang-Yie Leu, Kun-Lin Tsai, Yi-Ting Hsiao, Chao-Tung Yang:
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques. IEEE Syst. J. 11(2): 427-438 (2017) - [c19]Kun-Lin Tsai, Fang-Yie Leu, Tung-Hung Su, Yi-Chen Chang:
A Light Weight Data Encryption Method for WSN Communication. BWCCA 2017: 788-795 - 2016
- [j12]Kun Lin Tsai, Fang-Yie Leu, Ilsun You:
Residence Energy Control System Based on Wireless Smart Socket and IoT. IEEE Access 4: 2885-2894 (2016) - [j11]Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Ilsun You:
TTP Based High-Efficient Multi-Key Exchange Protocol. IEEE Access 4: 6261-6271 (2016) - [j10]Kun-Lin Tsai, Fang-Yie Leu, Shun-Hung Tsai:
Data Encryption Method Using Environmental Secret Key with Server Assistance. Intell. Autom. Soft Comput. 22(3): 423-430 (2016) - [j9]Kun Lin Tsai, Fang-Yie Leu, Jiu Soon Tan:
An ECC-based secure EMR transmission system with data leakage prevention scheme. Int. J. Comput. Math. 93(2): 367-383 (2016) - [j8]Kun-Lin Tsai, Han-Yun Liu, Yu-Wei Liu:
Using fuzzy logic to reduce ping-pong handover effects in LTE networks. Soft Comput. 20(5): 1683-1694 (2016) - [c18]Kun-Lin Tsai, Fang-Yie Leu, King-Shing Yip:
Device Parameter based Secure User Authentication. BWCCA 2016: 721-730 - [c17]Kun-Lin Tsai, Fang-Yie Leu, Yi-Fung Huang, Chi Yang, Cheng-Hsin Chang, King-Shing Yip, Yuchen Xue, Guan-Chi Lai:
Cloud Encryption Using Distributed Environmental Keys. IMIS 2016: 476-481 - 2015
- [c16]Kun Lin Tsai, Mengyuan Ye, Fang-Yie Leu:
Secure Power Management Scheme for WSN. MIST@CCS 2015: 63-66 - 2014
- [j7]Kun-Lin Tsai, Fang-Yie Leu, Tien-Han Wu, Shin-shiuan Chiou, Yu-Wei Liu, Han-Yun Liu:
A Secure ECC-based Electronic Medical Record System. J. Internet Serv. Inf. Secur. 4(1): 47-57 (2014) - [j6]Kun-Lin Tsai, Yen-Jen Chang, Yu-Cheng Cheng:
Automatic Charge Balancing Content Addressable Memory With Self-control Mechanism. IEEE Trans. Circuits Syst. I Regul. Pap. 61-I(10): 2834-2841 (2014) - [j5]Kun-Lin Tsai, Hao-Tse Chen, Yo-An Lin:
Power and Area Efficiency NoC Router Design for Application-Specific SoC by Using Buffer Merging and Resource Sharing. ACM Trans. Design Autom. Electr. Syst. 19(4): 36:1-36:21 (2014) - [c15]Kun Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Jiu Soon Tan, Mengyuan Ye:
High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication. IMIS 2014: 487-492 - [c14]Kun Lin Tsai, Jiu Soon Tan, Fang-Yie Leu, Yi-Li Huang:
A Group File Encryption Method using Dynamic System Environment Key. NBiS 2014: 476-483 - 2013
- [j4]Kun-Lin Tsai, I-Jui Tung, Feipei Lai:
A Fast Power Estimation Method for Content Addressable Memory by Using SystemC Simulation Environment. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(8): 1723-1729 (2013) - [j3]Yen-Jen Chang, Kun-Lin Tsai, Hsiang-Jen Tsai:
Low Leakage TCAM for IP Lookup Using Two-Side Self-Gating. IEEE Trans. Circuits Syst. I Regul. Pap. 60-I(6): 1478-1486 (2013) - [c13]Chung-Kai Hsu, Kun-Lin Tsai, Jing-Fu Jheng, Shanq-Jang Ruan, Chung-An Shen:
A low power detection routing method for bufferless NoC. ISQED 2013: 364-367 - 2011
- [c12]Cheng-Hao Chan, Kun-Lin Tsai, Feipei Lai, Shun-Hung Tsai:
A priority based output arbiter for NoC router. ISCAS 2011: 1928-1931 - [c11]Hsin-Chou Chi, Hsi-Che Tseng, Kun-Lin Tsai:
Design of timing-error-resilient systolic arrays for matrix multiplication. ISOCC 2011: 219-222 - 2010
- [c10]Ming-Ying Hsiao, Chi-Hua Liu, Shun-Hung Tsai, Kun-Lin Tsai, Pei-Shin Chen, Ta-Tau Chen:
A Takagi-Sugeno fuzzy-model-based modeling method. FUZZ-IEEE 2010: 1-6 - [c9]Chung-Huang Jiang, Kun-Lin Tsai, Feipei Lai, Shun-Hung Tsai:
Distinguishable error detection method for Network on Chip. ISCAS 2010: 3733-3736
2000 – 2009
- 2009
- [c8]Shun-Hung Tsai, Ming-Ying Hsiao, Kun-Lin Tsai:
LMI-based fuzzy control for a class of time-delay discrete fuzzy bilinear system. FUZZ-IEEE 2009: 796-801 - 2008
- [c7]Kun-Lin Tsai, Paul Lan, Shanq-Jang Ruan, Mon-Chau Shie:
A low power high performance design for JPEG Huffman decoder. ICECS 2008: 1151-1154 - 2006
- [c6]Kun-Lin Tsai, Ju-Yueh Lee, Shanq-Jang Ruan, Feipei Lai:
Low power scheduling method using multiple supply voltages. ISCAS 2006 - 2005
- [j2]Shanq-Jang Ruan, Kun-Lin Tsai, Edwin Naroska, Feipei Lai:
Bipartitioning and encoding in low-power pipelined circuits. ACM Trans. Design Autom. Electr. Syst. 10(1): 24-32 (2005) - [c5]Kun-Lin Tsai, Szu-Wei Chaung, Feipei Lai, Shanq-Jang Ruan:
A low power scheduling method using dual Vdd and dual Vth. ISCAS (1) 2005: 684-687 - 2003
- [c4]Kun-Lin Tsai, Feipei Lai, Shanq-Jang Ruan, Szu-Wei Chaung:
State Reordering for Low Power Combinational Logic. Asia-Pacific Computer Systems Architecture Conference 2003: 268-276 - 2001
- [j1]Shanq-Jang Ruan, Rung-Ji Shang, Feipei Lai, Kun-Lin Tsai:
A bipartition-codec architecture to reduce power in pipelinedcircuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 20(2): 343-348 (2001) - [c3]Po-Hung Chen, Shanq-Jang Ruan, Kuen-Pin Wu, Dai-Xun Hu, Feipei Lai, Kun-Lin Tsai:
An entropy-based algorithm to reduce area overhead for bipartition-codec architecture. ISCAS (5) 2001: 49-52 - [c2]Shanq-Jang Ruan, Jen-Chiun Lin, Po-Hung Chen, Kun-Lin Tsai, Feipei Lai:
Synthesis of partition-codec architecture for low power and small area circuit design. ISCAS (5) 2001: 523-526 - 2000
- [c1]Shanq-Jang Ruan, Jen-Chiun Lin, Po-Hung Chen, Feipei Lai, Kun-Lin Tsai, Chung-Wei Yu:
An effective output-oriented algorithm for low power multipartition architecture. ICECS 2000: 609-612
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint