Wei-Chen Wu

Orcid: 0000-0002-2419-6453

According to our database1, Wei-Chen Wu authored at least 23 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-language IoT information security standard item matching based on deep learning.
Comput. Sci. Inf. Syst., 2024

A study of identity authentication using blockchain technology in a 5G multi-type network environment.
Comput. Sci. Inf. Syst., 2024

2022
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation.
IEEE Trans. Netw. Serv. Manag., December, 2022

Using machine learning to detect PII from attributes and supporting activities of information assets.
J. Supercomput., 2022

2020
pISRA: privacy considered information security risk assessment model.
J. Supercomput., 2020

2018
Performance evaluation of the recommendation mechanism of information security risk identification.
Neurocomputing, 2018

2017
A secret push messaging service in VANET clouds.
J. Supercomput., 2017

A secure smart card authentication and authorization framework using in multimedia cloud.
Multim. Tools Appl., 2017

2016
An authentication, authorization, and accounting mechanism for 3G/WLAN networks.
Secur. Commun. Networks, 2016

2015
Edge Curve Scaling and Smoothing with Cubic Spline Interpolation for Image Up-Scaling.
J. Signal Process. Syst., 2015

Pseudo-Multiple-Exposure-Based Tone Fusion With Local Region Adjustment.
IEEE Trans. Multim., 2015

A Study on High Secure and Efficient MANET Routing Scheme.
J. Sensors, 2015

Closing the Gap between Global and Detailed Placement: Techniques for Improving Routability.
Proceedings of the 2015 Symposium on International Symposium on Physical Design, ISPD 2015, Monterey, CA, USA, March 29, 2015

2014
An anonymous DRM scheme for sharing multimedia files in P2P networks.
Multim. Tools Appl., 2014

Improving the Authentication Scheme and Access Control Protocol for VANETs.
Entropy, 2014

2013
Edge curve scaling and smoothing with cubic spline interpolation for image upscaling.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2013

Edge curve scaling and smoothing with cubic spline interpolation.
Proceedings of the IEEE International Conference on Image Processing, 2013

2011
A Novel Authentication Scheme Using Polynomial for Multi-server Environments.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

2009
TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2007
A new electronic traveler's check scheme based on one-way hash function.
Electron. Commer. Res. Appl., 2007

2006
The design and implementation of a low-cost and programmable home automation module.
IEEE Trans. Consumer Electron., 2006

An efficient and complete remote user authentication scheme using smart cards.
Math. Comput. Model., 2006

2004
A simple password authentication using a polynomial.
ACM SIGOPS Oper. Syst. Rev., 2004


  Loading...