Chin-Laung Lei

Orcid: 0000-0002-9011-5025

According to our database1, Chin-Laung Lei authored at least 147 papers between 1985 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Using Bidirectional Encoder Representations from Transformers (BERT) to predict criminal charges and sentences from Taiwanese court judgments.
PeerJ Comput. Sci., 2024

Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the Hypervisor.
Proceedings of the 2024 on Cloud Computing Security Workshop, 2024

2023
Guided Malware Sample Analysis Based on Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2023

PowerDP: De-Obfuscating and Profiling Malicious PowerShell Commands With Multi-Label Classifiers.
IEEE Access, 2023

2022
Building Machine Learning-based Threat Hunting System from Scratch.
DTRAP, 2022

Distributed Ledger Technology Based Architecture for Decentralized Device-to-Device Communication Network.
IEEE Access, 2022

2021
Joint Feature Disentanglement and Hallucination for Few-Shot Image Classification.
IEEE Trans. Image Process., 2021

How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security.
Symmetry, 2021

An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey.
Int. J. Commun. Syst., 2021

PUF Based Authenticated Key Exchange Protocol for IoT Without Verifiers and Explicit CRPs.
IEEE Access, 2021

2020
A Detailed Look At CNN-based Approaches In Facial Landmark Detection.
CoRR, 2020

POSTER: Construct macOS Cyber Range for Red/Blue Teams.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Look at Me! Correcting Eye Gaze in Live Video Communication.
ACM Trans. Multim. Comput. Commun. Appl., 2019

MigrateSDN: efficient approach to integrate OpenFlow networks with STP-enabled networks.
Int. J. Comput. Sci. Eng., 2019

Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets.
IEEE Access, 2019

Privacy Protection for Telecare Medicine Information Systems with Multiple Servers Using a Biometric-based Authenticated Key Agreement Scheme.
IEEE Access, 2019

Semantics-Guided Data Hallucination for Few-Shot Visual Classification.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

2018
Time-shift replacement algorithm for main memory performance optimization.
J. Supercomput., 2018

Audit-Free Cloud Storage via Deniable Attribute-Based Encryption.
IEEE Trans. Cloud Comput., 2018

SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events.
J. Inf. Sci. Eng., 2018

SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service.
Future Gener. Comput. Syst., 2018

Realizing the real-time gaze redirection system with convolutional neural network.
Proceedings of the 9th ACM Multimedia Systems Conference, 2018

Uncovering Internal Threats Based on Open-Source Intelligence.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

Infection categorization using deep autoencoder.
Proceedings of the IEEE INFOCOM 2018, 2018

Efficient Key Agreement Protocol for Smart Sensors.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
High-Capacity Data-Hiding Scheme on Synthesized Pitches Using Amplitude Enhancement - A New Vision of Non-Blind Audio Steganography.
Symmetry, 2017

Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine.
Secur. Commun. Networks, 2017

Preserving privacy of online digital physiological signals using blind and reversible steganography.
Comput. Methods Programs Biomed., 2017

Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan.
Comput. J., 2017

SDUDP: A Reliable UDP-Based Transmission Protocol Over SDN.
IEEE Access, 2017

A page replacement algorithm based on frequency derived from reference history.
Proceedings of the Symposium on Applied Computing, 2017

Is Foveated Rendering Perceivable in Virtual Reality?: Exploring the Efficiency and Consistency of Quality Assessment Methods.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

A Stereo Audio Steganography by Inserting Low-Frequency and Octave Equivalent Pure Tones.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Data Hiding on Social Media Communications Using Text Steganography.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
SDN storage: A stream-based storage system over software-defined networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Boosting election prediction accuracy by crowd wisdom on social forums.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

SDNort: A Software Defined Network Testing Framework Using Openflow.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing.
J. Inf. Sci. Eng., 2015

Modelling Polarity of Articles and Identifying Influential Authors through Social Movements.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

How to detect a compromised SDN switch.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Efficient NFV deployment in data center networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Discovery of De-identification Policies Considering Re-identification Risks and Information Loss.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
A reversible acoustic data hiding method based on analog modulation.
Inf. Sci., 2014

Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies.
Proceedings of the Intelligent Systems and Applications, 2014

Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure.
Proceedings of the Intelligent Systems and Applications, 2014

A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line.
Proceedings of the Intelligent Systems and Applications, 2014

Give me a broadcast-free network.
Proceedings of the IEEE Global Communications Conference, 2014

Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework.
IEEE Trans. Multim., 2013

Aggregate message authentication codes (AMACs) with on-the-fly verification.
Int. J. Inf. Sec., 2013

An adaptive sector-based routing model over structured peer-to-peer networks.
Comput. Networks, 2013

Gender swapping and user behaviors in online social games.
Proceedings of the 22nd International World Wide Web Conference, 2013

Understanding Potential MicrotaskWorkers for Paid Crowdsourcing.
Proceedings of the Human Computation and Crowdsourcing: Works in Progress and Demonstration Abstracts, 2013

2012
Radar chart: scanning for satisfactory QoE in QoS dimensions.
IEEE Netw., 2012

A decentralized clustering scheme for transparent mode devices.
Clust. Comput., 2012

Forecasting online game addictiveness.
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games, 2012

Are all games equally cloud-gaming-friendly? An electromyographic approach.
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games, 2012

Closed-form mortgage pricing formula with outstanding principal as prepayment value.
Proceedings of the 2012 IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2012

Data Integrity on Remote Storage for On-line Co-working.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

An Analysis of Security Patch Lifecycle Using Google Trend Tool.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Provably secure and efficient identification and key agreement protocol with user anonymity.
J. Comput. Syst. Sci., 2011

Robust authentication and key agreement scheme preserving the privacy of secret key.
Comput. Commun., 2011

DevilTyper: a game for CAPTCHA usability evaluation.
Comput. Entertain., 2011

World of warcraft avatar history dataset.
Proceedings of the Second Annual ACM SIGMM Conference on Multimedia Systems, 2011

Quantifying QoS requirements of network services: a cheat-proof framework.
Proceedings of the Second Annual ACM SIGMM Conference on Multimedia Systems, 2011

Measuring the latency of cloud gaming systems.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

A Mechanism on Risk Analysis of Information Security with Dynamic Assessment.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
Quadrant of euphoria: a crowdsourcing platform for QoE assessment.
IEEE Netw., 2010

A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Filtering False Messages En-Route in Wireless Multi-Hop Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Firework search for location aided routing enhancement in mobile ad-hoc networks.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

2009
Effect of Network Quality on Player Departure Behavior in Online Games.
IEEE Trans. Parallel Distributed Syst., 2009

On the challenge and design of transport protocols for MMORPGs.
Multim. Tools Appl., 2009

Fair anonymous rewarding based on electronic cash.
J. Syst. Softw., 2009

User authentication scheme with privacy-preservation for multi-server environment.
IEEE Commun. Lett., 2009

Identifying MMORPG Bots: A Traffic Analysis Approach.
EURASIP J. Adv. Signal Process., 2009

A prevention approach to scrambling attacks in WiMAX networks.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009

A crowdsourceable QoE evaluation framework for multimedia content.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

Peer-to-Peer Application Recognition Based on Signaling Activity.
Proceedings of IEEE International Conference on Communications, 2009

Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A Collusion-Resistant Automation Scheme for Social Moderation Systems.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
A Generalizable Methodology for Quantifying User Satisfaction.
IEICE Trans. Commun., 2008

A sector-based routing model over structured peer-to-peer networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

A location-ID sensitive key establishment scheme in static wireless sensor networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Detecting VoIP Traffic Based on Human Conversation Patterns.
Proceedings of the Principles, 2008

Inferring Speech Activity from Encrypted Skype Traffic.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters.
Proceedings of the Distributed Computing in Sensor Systems, 2008

An Anonymous and Deniable Conversation for a Thin Client.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Secure multicast in dynamic environments.
Comput. Networks, 2007

A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Design and Implementation of Secure Communication Channels over UPnP Networks.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Bounding Peer-to-Peer Upload Traffic in Client Networks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters.
Comput. Commun., 2006

Game traffic analysis: An MMORPG perspective.
Comput. Networks, 2006

How sensitive are online gamers to network quality?
Commun. ACM, 2006

Quantifying Skype user satisfaction.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Network game design: hints and implications of player interaction.
Proceedings of the 5th Workshop on Network and System Support for Games, 2006

Design Implications of Social Interaction in Online Games.
Proceedings of the Entertainment Computing, 2006

On the Sensitivity of Online Game Playing Time to Network QoS.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

The Impact of Network Variabilities on TCP Clocking Schemes.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Confessible Threshold Ring Signatures.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

A distributed key assignment protocol for secure multicast based on proxy cryptography.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

An empirical evaluation of TCP performance in online games.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2006

2005
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Game traffic analysis: an MMORPG perspective.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005

Secure Content Delivery using Key Composition.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

An On-Line Page-Structure Approximation Scheme for Web Proxies.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Secure Multicast Using Proxy Encryption.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs.
Proceedings of the High Performance Computing, 2005

Automatic Generation of Conflict-Free IPsec Policies.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005

2004
An efficient and anonymous buyer-seller watermarking protocol.
IEEE Trans. Image Process., 2004

A Content-Protection Scheme for Multi-Layered Reselling Structure.
Proceedings of the Security and Protection in Information Processing Systems, 2004

A Session Migration Scheme for Smart Web Services in Mobile Computing.
Proceedings of the International Conference on Internet Computing, 2004

2002
An unlinkably divisible and intention attachable ticket scheme for runoff elections.
J. Netw. Comput. Appl., 2002

Provably Secure Blind Threshold Signatures Based on Discrete Logarithm.
J. Inf. Sci. Eng., 2002

A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash.
J. Inf. Sci. Eng., 2002

Privacy and Anonymity Protection with Blind Threshold Signatures.
Int. J. Electron. Commer., 2002

A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting.
Comput. J., 2002

Distributed and On-Line Routing on Tori.
Algorithmica, 2002

2001
A Fully Distributed Approach to Repositories of Reusable Software Components.
J. Inf. Sci. Eng., 2001

Fair blind threshold signatures based on discrete logarithm.
Comput. Syst. Sci. Eng., 2001

2000
Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1999
Anonymous channel and authentication in wireless communications.
Comput. Commun., 1999

Partially Blind Threshold signatures Based on Discrete Logarithm.
Comput. Commun., 1999

1998
Competitive Analysis of On-Line Disk Scheduling.
Theory Comput. Syst., 1998

Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting.
Proceedings of the Network-Based Parallel Computing: Communication, 1998

1997
A High Performance Dynamic Token-Based Distributed Synchronization Algorithm.
Proceedings of the 1997 International Symposium on Parallel Architectures, 1997

Competitive Source Routing on Tori and Meshes.
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997

Secure Rewarding Schemes.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

1996
A collision-free secret ballot protocol for computerized general elections.
Comput. Secur., 1996

Data Prefetching for Distributed Shared Memory Systems.
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996

Blind Threshold Signatures Based on Discrete Logarithm.
Proceedings of the Concurrency and Parallelism, 1996

A Multi-Recastable Ticket Scheme for Electronic Elections.
Proceedings of the Advances in Cryptology, 1996

1995
An Efficient Password Authentication Scheme Based on a Unit Circle.
Cryptologia, 1995

1993
Efficient Parallel Algorithms for Finding the Majority Element.
J. Inf. Sci. Eng., 1993

An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control.
BIT, 1993

1992
A parallel algorithm for finding congruent regions.
Comput. Graph., 1992

1987
Modalities for Model Checking: Branching Time Logic Strikes Back.
Sci. Comput. Program., 1987

1986
Temporal Reasoning Under Generalized Fairness Constraints.
Proceedings of the STACS 86, 1986

Efficient Model Checking in Fragments of the Propositional Mu-Calculus (Extended Abstract)
Proceedings of the Symposium on Logic in Computer Science (LICS '86), 1986

1985
Modalities for Model Checking: Branching Time Strikes Back.
Proceedings of the Conference Record of the Twelfth Annual ACM Symposium on Principles of Programming Languages, 1985


  Loading...