Yi-Ruei Chen

According to our database1, Yi-Ruei Chen authored at least 16 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enabling Dual Subpopulations and Clustering for Multimodal Multiobjective Optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

2023
Structural Topology Optimization Using Genetic Algorithm and Fractals.
Proceedings of the Technologies and Applications of Artificial Intelligence, 2023

Adjusting Infeasible Regions in the Constrained Multiobjective Optimization Problem.
Proceedings of the IEEE Congress on Evolutionary Computation, 2023

2018
Privacy-preserving ridge regression on distributed data.
Inf. Sci., 2018

Effective Botnet Detection Through Neural Networks on Convolutional Features.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over ℤ<sub>p</sub>.
J. Inf. Sci. Eng., 2017

Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members.
Comput. Commun., 2017

An online subject-based spam filter using natural language features.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Application of metaheuristics-based clustering algorithm to item assignment in a synchronized zone order picking system.
Appl. Soft Comput., 2016

2015
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp.
IACR Cryptol. ePrint Arch., 2015

2013
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
IACR Cryptol. ePrint Arch., 2013

2012
Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Secure group key management using uni-directional proxy re-encryption schemes.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

2009
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate.
Proceedings of the Information and Communications Security, 11th International Conference, 2009


  Loading...