Hung-Min Sun
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Focus-Shifting Attack: An Adversarial Attack That Retains Saliency Map Information and Manipulates Model Explanations.
IEEE Trans. Reliab., June, 2024
Intelligent radioactive waste process cloud-based system for nuclear power plant decommissioning.
J. Ambient Intell. Humaniz. Comput., March, 2024
TokenDoc: Source Authentication With a Hybrid Approach of Smart Contract and RNN-Based Models With AES Encryption.
IEEE Trans. Engineering Management, 2024
An Enhanced Online Certificate Status Protocol for Public Key Infrastructure with Smart Grid and Energy Storage System.
CoRR, 2024
Hybrid Online Certificate Status Protocol with Certificate Revocation List for Smart Grid Public Key Infrastructure.
CoRR, 2024
2023
Classification of Polyps in Endoscopic Images Using Self-Supervised Structured Learning.
IEEE Access, 2023
2022
Sensors, 2022
IEEE Access, 2022
Information spreading in mobile social networks: identifying the influential nodes using FPSO algorithm.
Proceedings of the 2022 10th International Conference on Information Technology: IoT and Smart City, 2022
2021
A Blockchain-Based Vehicle Condition Recording System for Second-Hand Vehicle Market.
Wirel. Commun. Mob. Comput., 2021
J. Inf. Sci. Eng., 2021
Response and Surveillance System for Diarrhoea Based on a Patient Symptoms Using Machine Learning: A Study on Eswatini.
IEEE Access, 2021
A Co-Attention Method Based on Generative Adversarial Networks for Multi-view Images.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021
A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases.
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020
IEEE Access, 2020
2019
Soft Comput., 2019
Int. J. Comput. Sci. Eng., 2019
Proceedings of the IEEE INFOCOM 2019, 2019
2018
Dataset, November, 2018
J. Supercomput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Int. J. Radio Freq. Identif. Technol. Appl., 2018
A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email Encryption.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
2017
Fast and low-complexity encoding of Raptor codes based on operation lists for known source block lengths.
Multim. Tools Appl., 2017
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
A Process for Exploring Employees' Relationships via Social Network and Sentiment Analysis.
Proceedings of the Data Mining and Big Data - Second International Conference, 2017
An Approach for Reducing the Traffic within Cloud Environments Based on Customized Linux Kernel.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017
2016
Pers. Ubiquitous Comput., 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Data Mining and Big Data, First International Conference, 2016
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
2015
Inf. Sci., 2015
Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage Providers.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
2014
J. Inf. Hiding Multim. Signal Process., 2014
Inf. Sci., 2014
Future Gener. Comput. Syst., 2014
Future Gener. Comput. Syst., 2014
Expert Syst. Appl., 2014
Eliminating rouge femtocells based on distance bounding protocol and geographic information.
Expert Syst. Appl., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Genetic and Evolutionary Computing, 2014
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014
2013
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks.
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Inf. Forensics Secur., 2013
ACM Trans. Embed. Comput. Syst., 2013
Pers. Ubiquitous Comput., 2013
SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN.
J. Inf. Hiding Multim. Signal Process., 2013
Multi-agent-based cloud utilization for the IT office-aid asset distribution chain: An empirical case study.
Inf. Sci., 2013
Efficient encoding of systematic Raptor codes based on operation lists for known block lengths.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the IEEE International Symposium on Consumer Electronics, 2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks.
ACM Trans. Sens. Networks, 2012
oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks.
IEEE Trans. Inf. Forensics Secur., 2012
Expert Syst. Appl., 2012
A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).
Electron. Commer. Res. Appl., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Multi-agent based cloud utilization for IT OA assets dispatching process in SCM's view: An empirical study.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
IEEE Trans. Computers, 2011
IEEE J. Sel. Areas Commun., 2011
Electron. Commer. Res. Appl., 2011
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011
2010
IEEE Trans. Mob. Comput., 2010
Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time.
SIAM J. Discret. Math., 2010
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization.
J. Vis. Commun. Image Represent., 2010
Varied PVD + LSB evading detection programs to spatial domain in data embedding systems.
J. Syst. Softw., 2010
2009
IEEE Trans. Multim., 2009
IEEE Trans. Mob. Comput., 2009
IEEE Trans. Inf. Forensics Secur., 2009
IEEE Trans. Dependable Secur. Comput., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems.
IEEE Trans. Multim., 2008
IEEE Trans. Inf. Forensics Secur., 2008
IACR Cryptol. ePrint Arch., 2008
Comput. Networks, 2008
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Password-based authentication and key distribution protocols with perfect forward secrecy.
J. Comput. Syst. Sci., 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
J. Syst. Softw., 2005
IACR Cryptol. ePrint Arch., 2005
Comput. Electr. Eng., 2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the ITRE 2005, 2005
2004
Password-based user authentication and key distribution protocols for client-server applications.
J. Syst. Softw., 2004
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
2003
IEEE Trans. Veh. Technol., 2003
Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks.
J. Inf. Sci. Eng., 2003
IACR Cryptol. ePrint Arch., 2003
2002
ACM SIGOPS Oper. Syst. Rev., 2002
J. Inf. Sci. Eng., 2002
Informatica, 2002
2001
Security analysis of the generalized key agreement and password authentication protocol.
IEEE Commun. Lett., 2001
Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices.
IEEE Commun. Lett., 2001
IEEE Commun. Lett., 2001
2000
IEEE Trans. Veh. Technol., 2000
IEEE Trans. Consumer Electron., 2000
ACM SIGOPS Oper. Syst. Rev., 2000
J. Inf. Sci. Eng., 2000
On the Dealer's Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank.
Int. J. Found. Comput. Sci., 2000
IEEE Commun. Lett., 2000
1999
Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures.
J. Inf. Sci. Eng., 1999
A Note on Breaking and Repairing a Secure Broadcasting in Large Networks.
Comput. Commun., 1999
Comput. Commun., 1999
1998
Proceedings of the Computer Security, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Proceedings of the Proceedings IEEE INFOCOM '97, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes.
Proceedings of the CCS '96, 1996
1994
Proceedings of the Proceedings IEEE INFOCOM '94, 1994
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994