Chien-Ming Chen
Orcid: 0000-0002-6502-472XAffiliations:
- Harbin Institute of Technology, School of Computer Science, Shenzhen, China
- Shandong University of Science and Technology, College of Computer Science and Engineering, Qingdao, China (former)
According to our database1,
Chien-Ming Chen
authored at least 206 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., December, 2024
Blockchain and Machine Learning Integrated Secure Driver Behavior Centric Electric Vehicle Insurance Model.
IEEE Trans. Intell. Transp. Syst., November, 2024
Provably Secure Authentication Scheme for Fog Computing-Enabled Intelligent Social Internet of Vehicles.
IEEE Trans. Veh. Technol., September, 2024
Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment.
IEEE Internet Things J., July, 2024
Transferability of Adversarial Attacks on Tiny Deep Learning Models for IoT Unmanned Aerial Vehicles.
IEEE Internet Things J., June, 2024
On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks.
Wirel. Pers. Commun., May, 2024
A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain.
IEEE Internet Things J., May, 2024
A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things.
IEEE Internet Things J., March, 2024
Sustainable Secure Communication in Consumer-Centric Electric Vehicle Charging in Industry 5.0 Environments.
IEEE Trans. Consumer Electron., February, 2024
Designing a Security Framework Based on Hybrid Communication in Internet of Nano Things.
IEEE Internet Things J., February, 2024
Blockchain-Enabled Privacy-Preserving Authentication Mechanism for Transportation CPS With Cloud-Edge Computing.
IEEE Trans. Engineering Management, 2024
ERLNEIL-MDP: Evolutionary reinforcement learning with novelty-driven exploration for medical data processing.
Swarm Evol. Comput., 2024
A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city.
Secur. Priv., 2024
A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks.
J. Syst. Archit., 2024
Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system.
J. Syst. Archit., 2024
A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security.
Internet Things, 2024
Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption.
Comput. Electr. Eng., 2024
2023
IEEE Trans. Knowl. Data Eng., December, 2023
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.
EURASIP J. Wirel. Commun. Netw., December, 2023
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation.
Pattern Recognit., November, 2023
Privacy-preserving authentication scheme for digital twin-enabled autonomous vehicle environments.
Trans. Emerg. Telecommun. Technol., November, 2023
A Robust Privacy-Preserving ECC-Based Three-Factor Authentication Scheme for Metaverse Environment.
Comput. Commun., November, 2023
Adversarial Robustness in Graph-Based Neural Architecture Search for Edge AI Transportation Systems.
IEEE Trans. Intell. Transp. Syst., August, 2023
A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning.
ACM Trans. Sens. Networks, May, 2023
Future Gener. Comput. Syst., May, 2023
Special Issue Editorial "Deep Learning Technologies for Mobile Networks: A Themed Issue in Honor of Prof. Han-Chieh Chao".
Symmetry, March, 2023
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT.
J. Syst. Archit., March, 2023
A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment.
Veh. Commun., February, 2023
Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme.
Sensors, February, 2023
IEEE Internet Things J., February, 2023
An Interpretive Perspective: Adversarial Trojaning Attack on Neural-Architecture-Search Enabled Edge AI Systems.
IEEE Trans. Ind. Informatics, 2023
Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain.
IEEE Trans. Ind. Informatics, 2023
A Genetic Algorithm for the Waitable Time-Varying Multi-Depot Green Vehicle Routing Problem.
Symmetry, 2023
J. Ambient Intell. Humaniz. Comput., 2023
Concurr. Comput. Pract. Exp., 2023
2022
ACM Trans. Manag. Inf. Syst., December, 2022
Gaussian Mutation-Spider Monkey Optimization (GM-SMO) Model for Remote Sensing Scene Classification.
Remote. Sens., December, 2022
J. Supercomput., 2022
Interpreting Adversarial Examples and Robustness for Deep Learning-Based Auto-Driving Systems.
IEEE Trans. Intell. Transp. Syst., 2022
AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022
Comments on "A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance".
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
Symmetry, 2022
IEEE Syst. J., 2022
Sensors, 2022
Secur. Commun. Networks, 2022
Understanding the impact on convolutional neural networks with different model scales in AIoT domain.
J. Parallel Distributed Comput., 2022
A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles.
Int. J. Distributed Sens. Networks, 2022
Trans. Emerg. Telecommun. Technol., 2022
Digit. Commun. Networks, 2022
Comput. Stand. Interfaces, 2022
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing.
Computing, 2022
2021
DNetUnet: a semi-supervised CNN of medical image segmentation for super-computing AI service.
J. Supercomput., 2021
J. Supercomput., 2021
IEEE Trans. Intell. Transp. Syst., 2021
Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain.
IEEE Trans. Ind. Informatics, 2021
Trans. Data Sci., 2021
IEEE Syst. J., 2021
Secur. Commun. Networks, 2021
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2021
Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure.
Secur. Commun. Networks, 2021
Peer-to-Peer Netw. Appl., 2021
A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain.
IEEE Netw., 2021
A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles.
Mob. Inf. Syst., 2021
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT).
J. Inf. Secur. Appl., 2021
J. Inf. Secur. Appl., 2021
IEEE Internet Things J., 2021
A trusted consensus fusion scheme for decentralized collaborated learning in massive IoT domain.
Inf. Fusion, 2021
EURASIP J. Wirel. Commun. Netw., 2021
Enterp. Inf. Syst., 2021
Transfer reinforcement learning-based road object detection in next generation IoT domain.
Comput. Networks, 2021
Sliding large kernel of deep learning algorithm for mobile electrocardiogram diagnosis.
Comput. Electr. Eng., 2021
A fast instance segmentation with one-stage multi-task deep neural network for autonomous driving.
Comput. Electr. Eng., 2021
A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases.
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Secur. Commun. Networks, 2020
Secur. Commun. Networks, 2020
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure.
J. Sensors, 2020
J. Intell. Fuzzy Syst., 2020
J. Intell. Fuzzy Syst., 2020
J. Inf. Secur. Appl., 2020
Int. J. Inf. Sec., 2020
Efficient certificate-based aggregate signature scheme for vehicular <i>ad hoc</i> networks.
IET Networks, 2020
Hum. centric Comput. Inf. Sci., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain.
Future Gener. Comput. Syst., 2020
Comput. Secur., 2020
Comput. Commun., 2020
Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain.
Comput. Electr. Eng., 2020
Using IoT technology for computer-integrated manufacturing systems in the semiconductor industry.
Appl. Soft Comput., 2020
IEEE Access, 2020
IEEE Access, 2020
A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems.
IEEE Access, 2020
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Robust Beamforming Design for MISO Bursty Interference Channels Under Traffic Uncertainties.
IEEE Trans. Signal Process., 2019
ACM Trans. Manag. Inf. Syst., 2019
Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.
Sensors, 2019
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications.
J. Ambient Intell. Humaniz. Comput., 2019
IEEE Access, 2019
Design and Analysis of a Strengthen Internal Control Scheme for Smart Trust Financial Service.
IEEE Access, 2019
Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments.
IEEE Access, 2019
Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications.
IEEE Access, 2019
Selecting Hyper-Parameters of Gaussian Process Regression Based on Non-Inertial Particle Swarm Optimization in Internet of Things.
IEEE Access, 2019
Study on Secrecy Capacity of Wireless Sensor Networks in Internet of Things Based on the Amplify-and-Forward Compressed Sensing Scheme.
IEEE Access, 2019
Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019
2018
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags.
J. Supercomput., 2018
Symmetry, 2018
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018
Peer-to-Peer Netw. Appl., 2018
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review.
J. Netw. Intell., 2018
J. Inf. Sci. Eng., 2018
J. Inf. Hiding Multim. Signal Process., 2018
Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map.
J. Inf. Hiding Multim. Signal Process., 2018
J. Inf. Hiding Multim. Signal Process., 2018
IEEE Access, 2018
A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps.
IEEE Access, 2018
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2018
Energy Efficiency Maximization in Multi-User Miso Mixed RF/VLC Heterogeneous Cellular Networks.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
Proceedings of the Genetic and Evolutionary Computing, 2018
2017
Wirel. Pers. Commun., 2017
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017
A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.
IEEE Access, 2017
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017
Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Genetic and Evolutionary Computing, 2017
Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2017
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart Contracts.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
2016
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol.
J. Netw. Intell., 2016
Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps.
J. Inf. Hiding Multim. Signal Process., 2016
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
Proceedings of the Genetic and Evolutionary Computing, 2016
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016
2015
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks.
J. Univers. Comput. Sci., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Inf. Sci., 2015
On the Security of a Mutual Authentication and Key Agreement Protocol Based on Chaotic Maps.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015
Proceedings of the Multidisciplinary Social Networks Research, 2015
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the Genetic and Evolutionary Computing, 2015
Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the Genetic and Evolutionary Computing, 2015
2014
J. Inf. Hiding Multim. Signal Process., 2014
Expert Syst. Appl., 2014
Eliminating rouge femtocells based on distance bounding protocol and geographic information.
Expert Syst. Appl., 2014
A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Multidisciplinary Social Networks Research - International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 International Conference on Machine Learning and Cybernetics, 2014
Proceedings of the Genetic and Evolutionary Computing, 2014
MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things.
Proceedings of the Genetic and Evolutionary Computing, 2014
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN.
J. Inf. Hiding Multim. Signal Process., 2013
An Energy-Aware Routing Protocol Using Cat Swarm Optimization for Wireless Sensor Networks.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
2012
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012
2011
IEEE Trans. Computers, 2011
2009
IEEE Trans. Dependable Secur. Comput., 2009
2008
Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems.
IEEE Trans. Multim., 2008
An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2008
2007
An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2003
ACM SIGOPS Oper. Syst. Rev., 2003