Chin-Ling Chen
Orcid: 0000-0002-4958-2043
According to our database1,
Chin-Ling Chen
authored at least 167 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Clust. Comput., August, 2024
Multim. Tools Appl., January, 2024
Quantified emotion analysis based on design principles of color feature recognition in pictures.
Multim. Tools Appl., 2024
Constructing a Secure Charity NFT Auction Platform Using Fisco Bcos Blockchain for Enhancing Transparency and Traceability.
IEEE Access, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
A Blockchain and IPFS-Based Anticounterfeit Traceable Functionality of Car Insurance Claims System.
Sensors, December, 2023
Special issue on "Recent advances on computational intelligence techniques and applications in big data".
Evol. Intell., October, 2023
J. Supercomput., September, 2023
An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort.
Sensors, July, 2023
J. Ambient Intell. Humaniz. Comput., March, 2023
Symmetry, February, 2023
Benefits Evaluation Method of an Integrated Energy System Based on a Fuzzy Comprehensive Evaluation Method.
Symmetry, 2023
EURASIP J. Wirel. Commun. Netw., 2023
2022
A Collective Anomaly Detection Technique to Detect Crypto Wallet Frauds on Bitcoin Network.
Symmetry, 2022
Symmetry, 2022
A Digital Media Subscription Management System Combined with Blockchain and Proxy Re-Encryption Mechanisms.
Symmetry, 2022
A Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System.
Symmetry, 2022
A Novel Deep Learning-Based Cooperative Communication Channel Model for Wireless Underground Sensor Networks.
Sensors, 2022
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications.
Sensors, 2022
A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions.
Sensors, 2022
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks.
Sensors, 2022
A Secure and Traceable Vehicles and Parts System Based on Blockchain and Smart Contract.
Sensors, 2022
Enterprise Data Sharing with Privacy-Preserved Based on Hyperledger Fabric Blockchain in IIOT's Application.
Sensors, 2022
A Bayesian network correlation-based classifier chain algorithm for multilabel learning.
Int. J. Comput. Sci. Eng., 2022
2021
A Novel Subcarrier-Level Spectrum Sensing Method by Utilizing Fine-Grained Channel State Information in Wireless Networks.
Wirel. Commun. Mob. Comput., 2021
J. Supercomput., 2021
An Anti-Counterfeit and Traceable Management System for Brand Clothing with Hyperledger Fabric Framework.
Symmetry, 2021
Symmetry, 2021
Symmetry, 2021
Authorized Shared Electronic Medical Record System with Proxy Re-Encryption and Blockchain Technology.
Sensors, 2021
A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism.
Trans. Emerg. Telecommun. Technol., 2021
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services.
IEEE Access, 2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
FreeSee: A Parameter-Independent Pattern-Based Device-Free Human Behaviour Sensing System with Wireless Signals of IoT Devices.
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021
2020
A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing.
Wirel. Pers. Commun., 2020
Symmetry, 2020
Neurocomputing, 2020
A secure electronic medical record authorization system for smart device application in cloud computing environments.
Hum. centric Comput. Inf. Sci., 2020
A spatiotemporal data compression approach with low transmission cost and high data fidelity for an air quality monitoring system.
Future Gener. Comput. Syst., 2020
IEEE Access, 2020
Semi-Online Computational Offloading by Dueling Deep-Q Network for User Behavior Prediction.
IEEE Access, 2020
A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System.
IEEE Access, 2020
2019
An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
2018
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018
Soft Comput., 2018
J. Netw. Intell., 2018
Design of a secure and effective medical cyber-physical system for ubiquitous telemonitoring pregnancy.
Concurr. Comput. Pract. Exp., 2018
Comput., 2018
An Agreement Under Early Stopping and Fault Diagnosis Protocol in a Cloud Computing Environment.
IEEE Access, 2018
IEEE Access, 2018
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018
Proceedings of the 14th International Conference on Natural Computation, 2018
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018
Proceedings of the Advances on Broadband and Wireless Computing, 2018
2017
Soft Comput., 2017
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.
Sensors, 2017
An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing.
J. Sensors, 2017
Inf. Technol. Control., 2017
Int. J. Found. Comput. Sci., 2017
A secure mutual authentication scheme with non-repudiation for vehicular ad hoc networks.
Int. J. Commun. Syst., 2017
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017
Proceedings of the 13th International Conference on Natural Computation, 2017
Development of Audio and Visual Attention Assessment System in Combination with Brain Wave Instrument: Apply to Children with Attention Deficit Hyperactivity Disorder.
Proceedings of the Genetic and Evolutionary Computing, 2017
Proceedings of the IEEE 8th International Conference on Awareness Science and Technology, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Intelligent Information and Database Systems - 9th Asian Conference, 2017
2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment.
Int. J. Data Warehous. Min., 2016
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
Inf. Technol. Control., 2016
Intell. Autom. Soft Comput., 2016
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 9th International Congress on Image and Signal Processing, 2016
2015
A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks.
J. Sensors, 2015
J. Sensors, 2015
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015
2014
Design and analysis of a secure and effective emergency system for mountaineering events.
J. Supercomput., 2014
Secur. Commun. Networks, 2014
J. Medical Syst., 2014
J. Medical Syst., 2014
J. High Speed Networks, 2014
A radio frequency identification application for car theft prevention in parking lot management systems.
Int. J. Commun. Syst., 2014
Intell. Autom. Soft Comput., 2014
Comput. Sci. Inf. Syst., 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
2013
Wirel. Pers. Commun., 2013
Telecommun. Syst., 2013
Inf. Technol. Control., 2013
Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
Inf. Technol. Control., 2013
Int. J. RF Technol. Res. Appl., 2013
Combining quality of services path first routing and admission control to support VoIP traffic.
Future Gener. Comput. Syst., 2013
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks.
Comput. Sci. Inf. Syst., 2013
Design a dynamic key management protocol for data gathering in wireless sensor network.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013
Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
2012
Secur. Commun. Networks, 2012
J. Medical Syst., 2012
A Non-Repudiated and Traceable Authorization System Based on Electronic Health Insurance Cards.
J. Medical Syst., 2012
J. Comput., 2012
A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards.
Inf. Technol. Control., 2012
Int. J. RF Technol. Res. Appl., 2012
Int. J. Commun. Syst., 2012
Int. J. Ad Hoc Ubiquitous Comput., 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012
A proposal of next generation network: QoS mapping for MPLS-DiffServ and label forwarding.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012
2011
Mob. Inf. Syst., 2011
KSII Trans. Internet Inf. Syst., 2011
RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards.
Int. J. Netw. Secur., 2011
A novel and low-computation e-cash transfer system against blackmail for mobile communications.
Int. J. Mob. Commun., 2011
Electron. Commer. Res. Appl., 2011
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011
A Coverage Algorithm to Improve the Performance of PEGASIS in Wireless Sensor Networks.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011
An Improvement on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011
On Achieving Robustness and Fairness in Call Admission Control for Voice Services within NGN Environment.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011
2010
Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks.
Sensors, 2010
Performance of a data gather scheme with novel chain construction for wireless sensor networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
On security of a more efficient and secure dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010
Proceedings of the International Conference on E-Business and E-Government, 2010
Proceedings of the CISIS 2010, 2010
Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
Wirel. Pers. Commun., 2009
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test.
J. Univers. Comput. Sci., 2009
IEICE Trans. Commun., 2009
Electron. Commer. Res. Appl., 2009
Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection.
Eng. Appl. Artif. Intell., 2009
2008
Int. J. Commun. Syst., 2008
EURASIP J. Wirel. Commun. Netw., 2008
Proceedings of the Fifth IEEE International Conference on Wireless, 2008
2007
Proceedings of the Network-Based Information Systems, First International Conference, 2007
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
2005
Comput. Stand. Interfaces, 2005
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005
2004
2002
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002
2000
Comput. Commun., 2000
1999
1995
A Distributed Load Balancing Algorithm Based on Spanning Trees.
Proceedings of the Seventh SIAM Conference on Parallel Processing for Scientific Computing, 1995