Yu-Chi Chen
Orcid: 0000-0002-5577-0016
According to our database1,
Yu-Chi Chen
authored at least 97 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A conceptually simple and generic construction of plaintext checkable encryption in the standard model.
Des. Codes Cryptogr., June, 2024
Privacy preserving support vector machine based on federated learning for distributed IoT-enabled data analysis.
Comput. Intell., April, 2024
Dual-Cloud Multi-Secret Sharing Architecture for Privacy Preserving Persistent Computation.
IEEE Trans. Inf. Forensics Secur., 2024
A 0.296pJ/bit 17.9Tb/s/mm<sup>2</sup> Die-to-Die Link in 5nm/6nm FinFET on a 9μm-Pitch 3D Package Achieving 10.24Tb/s Bandwidth at 16Gb/s PAM-4.
Proceedings of the IEEE Symposium on VLSI Technology and Circuits 2024, 2024
Design of Creative Thinking Skills Training Activity Using Board Game with Mobile Technology.
Proceedings of the 16th IIAI International Congress on Advanced Applied Informatics, 2024
Design and Evaluation of the Framework of ChatGPT-Based Situational Non-Player Character Scaffolding for Educational Games.
Proceedings of the 16th IIAI International Congress on Advanced Applied Informatics, 2024
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024
Proceedings of the 46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2024
2023
Design and evaluation of a remote synchronous gamified mathematics teaching activity that integrates multi-representational scaffolding and a mind tool for gamified learning.
Educ. Inf. Technol., October, 2023
JEDI: Joint and Effective Privacy Preserving Outsourced Set Intersection and Data Integration Protocols.
IEEE Trans. Inf. Forensics Secur., 2023
Adv. Math. Commun., 2023
Design and evaluation of a simulation business management educational card game combined with dynamic feedback from mobile technology.
Proceedings of the 14th IIAI International Congress on Advanced Applied Informatics, 2023
Design of an Employment Ethics Educational Mobile Game Combined with Realistic Situations.
Proceedings of the 15th International Congress on Advanced Applied Informatics Winter, 2023
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
Distributed Privacy-preserving Support Vector Machine Training Scheme on Vertically Partitioned Data.
Proceedings of the 2023 11th International Conference on Computer and Communications Management, 2023
Proceedings of the 5th Blockchain and Internet of Things Conference, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2023
2022
SecDT: Privacy-Preserving Outsourced Decision Tree Classification Without Polynomial Forms in Edge-Cloud Computing.
IEEE Trans. Signal Inf. Process. over Networks, 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Oblivious Access for Decentralized Database Systems: A New Asymmetric Framework from Smart Contracts.
Symmetry, 2022
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems.
IEEE Syst. J., 2022
Sensors, 2022
Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes.
J. Vis. Commun. Image Represent., 2022
A Generic Construction of Designated Verifier Signature from Standard Cryptographic Algorithms.
J. Inf. Sci. Eng., 2022
IET Inf. Secur., 2022
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation.
Comput. J., 2022
Efficient Privacy Preserving Nearest Neighboring Classification from Tree Structures and Secret Sharing.
Proceedings of the IEEE International Conference on Communications, 2022
2021
Decentralized Data Aggregation: A New Secure Framework Based on Lightweight Cryptographic Algorithms.
Wirel. Commun. Mob. Comput., 2021
Using Channel-Wise Attention for Deep CNN Based Real-Time Semantic Segmentation With Class-Aware Edge Information.
IEEE Trans. Intell. Transp. Syst., 2021
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System.
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2021
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2021
The Utilization of Big Data Analytics on Food Delivery Platforms in Taiwan: Taking Uber Eats and Foodpanda as an Example.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
Automatic Scoring Method of Short-Answer Questions in the Context of Low-Resource Corpora.
Proceedings of the International Conference on Asian Language Processing, 2021
Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
IEEE J. Solid State Circuits, 2020
Int. J. Ad Hoc Ubiquitous Comput., 2020
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing.
IEEE Access, 2020
A 4-to-18GHz Active Poly Phase Filter Quadrature Clock Generator with Phase Error Correction in 5nm CMOS.
Proceedings of the IEEE Symposium on VLSI Circuits, 2020
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020
POSTER: SecretSVM - Secret Sharing-Based SVM for Preventing Collusion in IoT Data Analysis.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract Model.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms.
IEEE Trans. Inf. Forensics Secur., 2019
KSII Trans. Internet Inf. Syst., 2019
The optimal combination of feature selection and data discretization: An empirical study.
Inf. Sci., 2019
Future Gener. Comput. Syst., 2019
A 7nm 4GHz Arm<sup>®</sup>-core-based CoWoS<sup>®</sup> Chiplet Design for High Performance Computing.
Proceedings of the 2019 Symposium on VLSI Circuits, Kyoto, Japan, June 9-14, 2019, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
SCDP: Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
Proceedings of the Pattern Recognition - 5th Asian Conference, 2019
2018
Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud.
IEEE Access, 2018
IEEE Access, 2018
Plaintext Checkable Encryption with Check Delegation: New Models and Simple Constructions.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption.
J. Comput. Syst. Sci., 2017
A social network analysis on elementary student engagement in the networked creation community.
Comput. Educ., 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
A 16nm 256-bit wide 89.6GByte/s total bandwidth in-package interconnect with 0.3V swing and 0.062pJ/bit power in InFO package.
Proceedings of the 2016 IEEE Hot Chips 28 Symposium (HCS), 2016
Proceedings of the Big Data Analytics and Knowledge Discovery, 2016
2015
Encrypted image-based reversible data hiding with public key cryptography from difference expansion.
Signal Process. Image Commun., 2015
Secur. Commun. Networks, 2015
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes.
J. Inf. Sci. Eng., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Comput. J., 2015
SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks.
Comput. J., 2015
Artif. Life Robotics, 2015
Proceedings of the SECRYPT 2015, 2015
2014
Multim. Tools Appl., 2014
J. Vis. Commun. Image Represent., 2014
Int. J. Commun. Syst., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Efficient public key encryption with user-friendly keywords search for searchable cloud storage.
Proceedings of the Intelligent Systems and Applications, 2014
A privacy-preserving human tracking scheme in centralized cloud based camera networks.
Proceedings of the IEEE International Conference on Communications, 2014
2013
J. Medical Syst., 2013
J. Inf. Hiding Multim. Signal Process., 2013
IET Inf. Secur., 2013
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes.
IACR Cryptol. ePrint Arch., 2013
Digit. Signal Process., 2013
2012
IEEE Trans. Image Process., 2012
A Thin Light Flexible Electromechanically Actuated Electret-Based Loudspeaker for Automotive Applications.
IEEE Trans. Ind. Electron., 2012
A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography.
J. Vis. Commun. Image Represent., 2012
2011
IACR Cryptol. ePrint Arch., 2011
On the security models for certificateless signature schemes achieving level 3 security.
IACR Cryptol. ePrint Arch., 2011
2009
A DEP chip with arc-shape microelectrode arrays for the separation of different-size particles.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009
2007
A Facial-Skin Condition Classification System Using Texture and Fuzzy C-Means Technologies.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007