Ying-Chin Chen

According to our database1, Ying-Chin Chen authored at least 16 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime.
IEEE Trans. Inf. Forensics Secur., 2024

Preserving manipulated and synthetic Deepfake detection through face texture naturalness.
J. Inf. Secur. Appl., 2024

2023
Constructing gene features for robust 3D mesh zero-watermarking.
J. Inf. Secur. Appl., March, 2023

2022
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation.
IEEE Trans. Netw. Serv. Manag., December, 2022

Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract.
J. Inf. Secur. Appl., 2022

CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training.
Comput. Secur., 2022

Preserving Collusion-Free and Traceability in Car-Sharing System Based on Blockchain.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

2021
Preserving Liberty and Fairness in Combinatorial Double Auction Games Based on Blockchain.
IEEE Syst. J., 2021

Robust 3D mesh zero-watermarking based on spherical coordinate and Skewness measurement.
Multim. Tools Appl., 2021

Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem.
Int. J. Inf. Comput. Secur., 2021

Preserving indomitable DDoS vitality through resurrection social hybrid botnet.
Comput. Secur., 2021

2020
Learning salient seeds refer to the manifold ranking and background-prior strategy.
Multim. Tools Appl., 2020

Profiling Operations of Cyber Army in Manipulating Public Opinions.
Proceedings of the ICFET 2020, 2020

2019
AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS.
Int. J. Netw. Secur., 2019

2018
Selective scalable secret image sharing with adaptive pixel-embedding technique.
Multim. Tools Appl., 2018

2016
Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity.
KSII Trans. Internet Inf. Syst., 2016


  Loading...