Wei-Bin Lee
Orcid: 0000-0002-8757-1214
According to our database1,
Wei-Bin Lee
authored at least 70 papers
between 1996 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IEEE Netw., January, 2025
2024
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle.
IEEE Trans. Netw. Sci. Eng., 2024
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime.
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
J. Inf. Sci. Eng., May, 2023
2022
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions.
J. Inf. Secur. Appl., 2022
2021
Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security.
Symmetry, 2021
2020
Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations.
KSII Trans. Internet Inf. Syst., 2020
2019
Int. J. Commun. Syst., 2019
2018
Multim. Tools Appl., 2018
2015
J. Medical Syst., 2015
2014
Int. J. Digit. Crime Forensics, 2014
Comput. Methods Programs Biomed., 2014
An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
2013
Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving.
J. Supercomput., 2013
Applying Cloud Computing Technologies to Gerontology and Geriatrics Health Care System (GGHCS).
Proceedings of the 2013 13th International Conference on Quality Software, 2013
2012
J. Syst. Softw., 2012
Proceedings of the Third FTRA International Conference on Mobile, 2012
An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme in Vehicular Ad-hoc Networks.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
2011
A Novel Key Management Solution for Reinforcing Compliance With HIPAA Privacy/Security Regulations.
IEEE Trans. Inf. Technol. Biomed., 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
2010
Secure communication between set-top box and smart card for fair use in DTV broadcasting.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010
2009
J. Organ. Comput. Electron. Commer., 2009
Int. J. Netw. Secur., 2009
A self-verification authentication mechanism for mobile satellite communication systems.
Comput. Electr. Eng., 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
2008
IEEE Trans. Inf. Technol. Biomed., 2008
J. Syst. Softw., 2008
Int. J. Netw. Secur., 2008
IEEE Commun. Lett., 2008
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks.
Comput. Stand. Interfaces, 2008
Comput. Electr. Eng., 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
Inf. Sci., 2007
A secure protocol for misbehavior-penalization-based fair digital signature exchange.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
2006
J. Syst. Softw., 2006
Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting.
Proceedings of the Ninth International Conference on Control, 2006
2005
A new delegation-based authentication protocol for use in portable communication systems.
IEEE Trans. Wirel. Commun., 2005
IEEE Trans. Ind. Electron., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Self-Stabilization Neighborhood Synchronizer for Uniform Rings.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005
Efficient Date-Constraint Hierarchical Key Assignment Scheme.
Proceedings of The 2005 International Conference on Security and Management, 2005
Remote User Authentication Scheme with User Anonymity.
Proceedings of The 2005 International Conference on Security and Management, 2005
2004
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems.
J. Netw. Comput. Appl., 2004
A smart card-based remote scheme for password authentication in multi-server Internet services.
Comput. Stand. Interfaces, 2004
2002
J. Syst. Softw., 2002
1999
J. Syst. Softw., 1999
J. Inf. Sci. Eng., 1999
Comput. Commun., 1999
1998
Proceedings of the Public Key Cryptography, 1998
1997
Inf. Process. Lett., 1997
1996
Inf. Process. Lett., 1996