Chin-Laung Lei
Orcid: 0000-0002-9011-5025
According to our database1,
Chin-Laung Lei
authored at least 147 papers
between 1985 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Using Bidirectional Encoder Representations from Transformers (BERT) to predict criminal charges and sentences from Taiwanese court judgments.
PeerJ Comput. Sci., 2024
Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the Hypervisor.
Proceedings of the 2024 on Cloud Computing Security Workshop, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
PowerDP: De-Obfuscating and Profiling Malicious PowerShell Commands With Multi-Label Classifiers.
IEEE Access, 2023
2022
Distributed Ledger Technology Based Architecture for Decentralized Device-to-Device Communication Network.
IEEE Access, 2022
2021
IEEE Trans. Image Process., 2021
How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security.
Symmetry, 2021
An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey.
Int. J. Commun. Syst., 2021
PUF Based Authenticated Key Exchange Protocol for IoT Without Verifiers and Explicit CRPs.
IEEE Access, 2021
2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
ACM Trans. Multim. Comput. Commun. Appl., 2019
MigrateSDN: efficient approach to integrate OpenFlow networks with STP-enabled networks.
Int. J. Comput. Sci. Eng., 2019
Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets.
IEEE Access, 2019
Privacy Protection for Telecare Medicine Information Systems with Multiple Servers Using a Biometric-based Authenticated Key Agreement Scheme.
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
2018
J. Supercomput., 2018
IEEE Trans. Cloud Comput., 2018
SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events.
J. Inf. Sci. Eng., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the 9th ACM Multimedia Systems Conference, 2018
Proceedings of the New Trends in Computer Technologies and Applications, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
High-Capacity Data-Hiding Scheme on Synthesized Pitches Using Amplitude Enhancement - A New Vision of Non-Blind Audio Steganography.
Symmetry, 2017
Secur. Commun. Networks, 2017
Preserving privacy of online digital physiological signals using blind and reversible steganography.
Comput. Methods Programs Biomed., 2017
Comput. J., 2017
Proceedings of the Symposium on Applied Computing, 2017
Is Foveated Rendering Perceivable in Virtual Reality?: Exploring the Efficiency and Consistency of Quality Assessment Methods.
Proceedings of the 2017 ACM on Multimedia Conference, 2017
A Stereo Audio Steganography by Inserting Low-Frequency and Octave Equivalent Pure Tones.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017
Proceedings of the Risks and Security of Internet and Systems, 2017
2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing.
J. Inf. Sci. Eng., 2015
Modelling Polarity of Articles and Identifying Influential Authors through Social Movements.
Proceedings of the 2015 IEEE International Conference on Systems, 2015
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Discovery of De-identification Policies Considering Re-identification Risks and Information Loss.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies.
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the Intelligent Systems and Applications, 2014
A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line.
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
IEEE Trans. Multim., 2013
Int. J. Inf. Sec., 2013
Comput. Networks, 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Human Computation and Crowdsourcing: Works in Progress and Demonstration Abstracts, 2013
2012
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games, 2012
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games, 2012
Proceedings of the 2012 IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
Provably secure and efficient identification and key agreement protocol with user anonymity.
J. Comput. Syst. Sci., 2011
Comput. Commun., 2011
Proceedings of the Second Annual ACM SIGMM Conference on Multimedia Systems, 2011
Proceedings of the Second Annual ACM SIGMM Conference on Multimedia Systems, 2011
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
2010
A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems.
Int. J. Ad Hoc Ubiquitous Comput., 2010
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010
What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010
2009
IEEE Trans. Parallel Distributed Syst., 2009
Multim. Tools Appl., 2009
IEEE Commun. Lett., 2009
EURASIP J. Adv. Signal Process., 2009
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009
An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009
Proceedings of the 17th International Conference on Multimedia 2009, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
IEICE Trans. Commun., 2008
Proceedings of the 5th International Conference on Mobile Technology, 2008
Proceedings of the 5th International Conference on Mobile Technology, 2008
Proceedings of the Principles, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the Distributed Computing in Sensor Systems, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2006
Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters.
Comput. Commun., 2006
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006
Proceedings of the 5th Workshop on Network and System Support for Games, 2006
Proceedings of the Entertainment Computing, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
A distributed key assignment protocol for secure multicast based on proxy cryptography.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2006
2005
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the High Performance Computing, 2005
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005
2004
IEEE Trans. Image Process., 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
A Session Migration Scheme for Smart Web Services in Mobile Computing.
Proceedings of the International Conference on Internet Computing, 2004
2002
J. Netw. Comput. Appl., 2002
J. Inf. Sci. Eng., 2002
J. Inf. Sci. Eng., 2002
Int. J. Electron. Commer., 2002
Comput. J., 2002
2001
J. Inf. Sci. Eng., 2001
Fair blind threshold signatures based on discrete logarithm.
Comput. Syst. Sci. Eng., 2001
2000
Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000
1999
Comput. Commun., 1999
Partially Blind Threshold signatures Based on Discrete Logarithm.
Comput. Commun., 1999
1998
Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting.
Proceedings of the Network-Based Parallel Computing: Communication, 1998
1997
Proceedings of the 1997 International Symposium on Parallel Architectures, 1997
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997
1996
Comput. Secur., 1996
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996
Proceedings of the Concurrency and Parallelism, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Cryptologia, 1995
1993
J. Inf. Sci. Eng., 1993
An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control.
BIT, 1993
1992
1987
Sci. Comput. Program., 1987
1986
Proceedings of the STACS 86, 1986
Efficient Model Checking in Fragments of the Propositional Mu-Calculus (Extended Abstract)
Proceedings of the Symposium on Logic in Computer Science (LICS '86), 1986
1985
Proceedings of the Conference Record of the Twelfth Annual ACM Symposium on Principles of Programming Languages, 1985