Chu-Hsing Lin

According to our database1, Chu-Hsing Lin authored at least 103 papers between 1990 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multimodal Framework for Fake Messages Detection with Textual and Facial Data.
Proceedings of the 6th IEEE International Conference on Knowledge Innovation and Invention, 2023

Analysis of Tweet Sentiment and Propagation Graph of Twitter Users.
Proceedings of the 6th IEEE International Conference on Knowledge Innovation and Invention, 2023

2021
Detecting Propaganda on the Sentence Level during the COVID-19 Pandemic.
CoRR, 2021

Dataset of Propaganda Techniques of the State-Sponsored Information Operation of the People's Republic of China.
CoRR, 2021

2020
Pandemic Response and Crisis Informatics: An Imperative for Public Health Messaging.
Proceedings of the International Computer Symposium, 2020

Detecting Security Breaches in Personal Data Protection with Machine Learning.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

Performance Enhancement of GPU Parallel Computing Using Memory Allocation Optimization.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

2019
On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Computing.
Wirel. Pers. Commun., 2019

Response to Co-resident Threats in Cloud Computing Using Machine Learning.
Proceedings of the Advanced Information Networking and Applications, 2019

A Novel Movie Recommendation System Based on Collaborative Filtering and Neural Networks.
Proceedings of the Advanced Information Networking and Applications, 2019

2015
On the Accelerated Convergence of Genetic Algorithm Using GPU Parallel Operations.
Int. J. Softw. Innov., 2015

Performance Evaluation of Parallel Genetic Algorithm Using Single Program Multiple Data Technique.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

2014
Throughput Evaluation of a Novel Scheme to Mitigate the Congestion over WSNs.
Wirel. Pers. Commun., 2014

Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN.
Peer-to-Peer Netw. Appl., 2014

Lifetime elongation of ad hoc networks under flooding attack using power-saving technique.
Ad Hoc Networks, 2014

Designing QR Code with Authentication Capabilities.
Proceedings of the Intelligent Systems and Applications, 2014

Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms.
J. Inf. Sci. Eng., 2013

Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues.
J. Ambient Intell. Humaniz. Comput., 2013

Special issue on cloud, wireless and e-commerce security.
J. Ambient Intell. Humaniz. Comput., 2013

Performance evaluation of outage probability and BER for MIMO-femtocell system over spatial correlated channel.
Comput. Electr. Eng., 2013

2012
Dual paths node-disjoint routing for data salvation in mobile ad hoc.
J. Supercomput., 2012

Design strategy for optimizing power consumption of sensor node with Min(<i>N</i>, <i>T</i>) policy M/G/1 queuing models.
Int. J. Commun. Syst., 2012

Mobile Computer System with User Friendly Environment and Security Protection.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Routing Protocols with Power Saving and Data Salvation for Wireless Sensor Networks.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

2011
Contract signature in e-commerce.
Comput. Electr. Eng., 2011

Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET.
Comput. Informatics, 2011

Implementation of Image Watermarking Processes on Cloud Computing Environments.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011

Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS Attacks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Visible Watermarking Based on Multi-parameters Adjustable Gamma Correction.
Proceedings of the Communication and Networking, 2011

Research on the ZigBee-Based Indoor Location Estimation Technology.
Proceedings of the Communication and Networking, 2011

An Indoor Location-Aware System Based on Rotation Sampling in Positioning.
Proceedings of the Communication and Networking, 2011

Unseen Visible Watermarking for Gray Level Images Based on Gamma Correction.
Proceedings of the Communication and Networking, 2011

Generalized secure hash algorithm: SHA-X.
Proceedings of EUROCON 2011, 2011

Design and implementation of a mouth-controlled mouse.
Proceedings of EUROCON 2011, 2011

Verification of a Batch of Bad Signatures by Using the Matrix-Detection Algorithm.
Proceedings of the First International Conference on Data Compression, 2011

Energy Consumption Analysis for Cryptographic Algorithms with Different Clocks on Smart Cards in Mobile Devices.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Energy analysis of multimedia video decoding on mobile handheld devices.
Comput. Stand. Interfaces, 2010

Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET.
Proceedings of the CISIS 2010, 2010

Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Contract Signatures in E-Commerce Applications.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks.
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010

2009
Investigations of Factors Affecting the Genetic Algorithm for Shortest Driving Time.
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009

Energy Analysis of Multimedia Video Streaming on Mobile Devices.
Proceedings of the Advances in Information Security and Assurance, 2009

Binary Documents Recovery Based on Skeleton Extraction.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Counteract SYN flooding using second chance packet filtering.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

Analysis of Priority Queue-Based Scheme to Alleviate Malicious Flows from Distributed DoS Attacks.
Proceedings of the Communication and Networking, 2009

Access Log Generator for Analyzing Malicious Website Browsing Behaviors.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Integrity Protection of Binary Text Document Images Based on Image Topologies.
Int. J. Pattern Recognit. Artif. Intell., 2008

On the Security of the Full-Band Image Watermark for Copyright Protection.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

Node-Disjoint Alternative Dual-Path Routing for Data Salvation in Mobile Ad hoc Networks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

A Robust Watermark Scheme for Copyright Protection.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Detection Method Based on Reverse Proxy against Web Flooding Attacks.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Energy efficiency measurement for multimedia audio decoding on embedded systems.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Energy Analysis of Multimedia Video Decoding on Embedded Systems.
Proceedings of the 2008 International Conference on Information Networking, 2008

Safeguard Intranet Using Embedded and Distributed Firewall System.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
A Conference Key Distribution Scheme Using Interpolating Polynomials.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Binary Document Images Authentication by Thinning Digital Patterns.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Robust Multi-scale Full-Band Image Watermarking for Copyright Protection.
Proceedings of the New Trends in Applied Artificial Intelligence, 2007

2006
A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

An improvement of an efficient user identification scheme based on ID-based cryptosystem.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Multiparty Key Agreement for Secure Teleconferencing.
Proceedings of the IEEE International Conference on Systems, 2006

2005
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol.
IACR Cryptol. ePrint Arch., 2005

Improved DSA variant for batch verification.
Appl. Math. Comput., 2005

On the security of ID-based password authentication scheme using smart cards and fingerprints.
Proceedings of the ITRE 2005, 2005

An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Dynamic Key Generations for Secret Sharing in Access Structures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Efficient Secret Sharing with Access Structures in a Hierarchy.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Improved Low Computation Cost User Authentication Scheme for Mobile Communication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Authenticated Encryption Schemes with Message Linkage for Threshold Signatures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Comments on the Yang-Chang-Hwang anonymous conference key distribution system.
Comput. Stand. Interfaces, 2004

A flexible biometrics remote user authentication scheme.
Comput. Stand. Interfaces, 2004

A Novel Hierarchical Key Management Scheme Based on Quadratic Residues.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

A fingerprint-based user authentication scheme for multimedia systems.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Supervising Secret-Key Agreements in a Level-Based Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Using IC Cards to Remotely Login Passwords without Verification Tables.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Secret Sharing with Access Structures in a Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Infinite generating keys based on publish system.
Proceedings of the IEEE International Conference on Systems, 2003

Signature Schemes Based on Two Hard Problems Simultaneously.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
A New Micro-Payment System Using General Payword Chain.
Electron. Commer. Res., 2002

A Software Protection System for Internet Commerce.
Proceedings of the Advances in Multimedia Information Processing, 2002

2001
Hierarchical key assignment without public-key cryptography.
Comput. Secur., 2001

2000
Dynamic GOST.
J. Inf. Sci. Eng., 2000

1999
One-Way Hash Functions With Changeable Parameters.
Inf. Sci., 1999

1998
A confused document encrypting scheme and its implementation.
Comput. Secur., 1998

Threshold signature schemes with traceable signers in group communications.
Comput. Commun., 1998

1997
Dynamic key management schemes for access control in a hierarchy.
Comput. Commun., 1997

1996
A group-oriented (t, n) undeniable signature scheme without trusted center.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
New Public-Key Cipher System Based Upon the Diophantine Equations.
IEEE Trans. Computers, 1995

1994
Method for constructing a group-oriented cipher system.
Comput. Commun., 1994

1992
Hierarchy representations based on arithmetic coding for dynamic information protection systems.
Inf. Sci., 1992

A conference key broadcasting system using sealed locks.
Inf. Syst., 1992

A Record-Oriented Cryptosystem for Database Sharing (Short Note).
Comput. J., 1992

1991
Password authentication using Newton's interpolating polynomials.
Inf. Syst., 1991

1990
A Dynamic Access Control Mechanism in Information Protection Systems.
J. Inf. Sci. Eng., 1990

A Reciprocal Confluence Tree Unit and Its Applications.
BIT, 1990


  Loading...