Tsu-Yang Wu
Orcid: 0000-0001-8970-2452
According to our database1,
Tsu-Yang Wu
authored at least 116 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection.
Wirel. Networks, May, 2024
2023
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.
EURASIP J. Wirel. Commun. Netw., December, 2023
Privacy-preserving authentication scheme for digital twin-enabled autonomous vehicle environments.
Trans. Emerg. Telecommun. Technol., November, 2023
Concurr. Comput. Pract. Exp., 2023
2022
A provably secure lightweight authentication protocol in mobile edge computing environments.
J. Supercomput., 2022
Symmetry, 2022
Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments.
Sensors, 2022
Sensors, 2022
Transfer learning model for false positive reduction in lymph node detection via sparse coding and deep learning.
J. Intell. Fuzzy Syst., 2022
J. Intell. Fuzzy Syst., 2022
Int. J. Inf. Comput. Secur., 2022
Int. J. Inf. Comput. Secur., 2022
An adaptive stochastic central force optimisation algorithm for node localisation in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2022
2021
Wirel. Commun. Mob. Comput., 2021
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks.
J. Supercomput., 2021
A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2021
A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles.
Mob. Inf. Syst., 2021
2020
J. Intell. Fuzzy Syst., 2020
Efficient certificate-based aggregate signature scheme for vehicular <i>ad hoc</i> networks.
IET Networks, 2020
Application of Quantum Genetic Optimization of LVQ Neural Network in Smart City Traffic Network Prediction.
IEEE Access, 2020
IEEE Access, 2020
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing.
IEEE Access, 2020
Data Filtering Method for the Optimization of Mobile Positioning Based on Deep Learning.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020
A Probability-Based Analytical Model Based on Deep Learning for Traffic Information Estimation.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020
2019
A Traffic Prediction Method of Bicycle-sharing based on Long and Short term Memory Network.
J. Netw. Intell., 2019
J. Netw. Intell., 2019
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications.
J. Ambient Intell. Humaniz. Comput., 2019
Hum. centric Comput. Inf. Sci., 2019
Video salient region detection model based on wavelet transform and feature comparison.
EURASIP J. Image Video Process., 2019
IEEE Access, 2019
Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments.
IEEE Access, 2019
Using Cache Optimization Method to Reduce Network Traffic in Communication Systems Based on Cloud Computing.
IEEE Access, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019
2018
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags.
J. Supercomput., 2018
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review.
J. Netw. Intell., 2018
J. Inf. Sci. Eng., 2018
J. Inf. Hiding Multim. Signal Process., 2018
Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map.
J. Inf. Hiding Multim. Signal Process., 2018
J. Inf. Hiding Multim. Signal Process., 2018
J. Inf. Hiding Multim. Signal Process., 2018
A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps.
IEEE Access, 2018
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
Proceedings of the Genetic and Evolutionary Computing, 2018
2017
Wirel. Pers. Commun., 2017
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017
J. Inf. Hiding Multim. Signal Process., 2017
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems.
IEEE Access, 2017
A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.
IEEE Access, 2017
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017
Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Genetic and Evolutionary Computing, 2017
Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2017
Proceedings of the Genetic and Evolutionary Computing, 2017
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017
2016
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol.
J. Netw. Intell., 2016
Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps.
J. Inf. Hiding Multim. Signal Process., 2016
Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining.
Eng. Appl. Artif. Intell., 2016
Proceedings of the Genetic and Evolutionary Computing, 2016
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016
2015
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks.
J. Univers. Comput. Sci., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Inf. Sci., 2015
On the Security of a Mutual Authentication and Key Agreement Protocol Based on Chaotic Maps.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015
Proceedings of the Multidisciplinary Social Networks Research, 2015
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the Genetic and Evolutionary Computing, 2015
Proceedings of the Genetic and Evolutionary Computing, 2015
2014
Informatica, 2014
Ann. des Télécommunications, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Multidisciplinary Social Networks Research - International Conference, 2014
Maintenance algorithm for updating the discovered multiple fuzzy frequent itemsets for transaction deletion.
Proceedings of the 2014 International Conference on Machine Learning and Cybernetics, 2014
Proceedings of the Genetic and Evolutionary Computing, 2014
MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things.
Proceedings of the Genetic and Evolutionary Computing, 2014
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Secur. Commun. Networks, 2013
Secur. Commun. Networks, 2013
IET Inf. Secur., 2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
2012
J. Inf. Hiding Multim. Signal Process., 2012
Inf. Technol. Control., 2012
Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants.
Informatica, 2012
Informatica, 2012
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants.
Comput. Networks, 2012
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
2011
J. Syst. Sci. Complex., 2011
A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks.
J. Inf. Sci. Eng., 2011
Two-round contributory group key exchange protocol for wireless network environments.
EURASIP J. Wirel. Commun. Netw., 2011
2010
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique.
Informatica, 2010
An efficient user authentication and key exchange protocol for mobile client-server environment.
Comput. Networks, 2010
An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices.
Comput. J., 2010
A Novel Convinced Diffie-Hellman Computation Scheme and Its Cryptographic Application.
Proceedings of the Computational Science and Its Applications, 2010
2009
Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Informatica, 2008
2007
A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007