Yu-Fang Chung
Orcid: 0000-0002-7373-7201
According to our database1,
Yu-Fang Chung
authored at least 65 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
An autoencoder-based arithmetic optimization clustering algorithm to enhance principal component analysis to study the relations between industrial market stock indices in real estate.
Expert Syst. Appl., 2025
2024
Machine learning approaches to identify systemic lupus erythematosus in anti-nuclear antibody-positive patients using genomic data and electronic health records.
BioData Min., 2024
2021
Machine learning approaches for the genomic prediction of rheumatoid arthritis and systemic lupus erythematosus.
BioData Min., 2021
2020
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
2019
Int. J. Netw. Secur., 2019
2018
A hierarchical access control scheme based on Lagrange interpolation for mobile agents.
Int. J. Distributed Sens. Networks, 2018
An Implementation of Interactive Healthy Eating Index and Healthcare System on Mobile Platform in College Student Samples.
IEEE Access, 2018
2017
Comput. Electr. Eng., 2017
2016
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
J. Medical Syst., 2016
J. Medical Syst., 2016
2014
The Application of RFID Monitoring Technology to Patrol Management System in Petrochemical Industry.
Wirel. Pers. Commun., 2014
The design of authentication key protocol in certificate-free public key cryptosystem.
Secur. Commun. Networks, 2014
J. Medical Syst., 2014
Improving Inpatient Fall Prevention Strategies Using Interactive Data Repository Information System.
Proceedings of the Nursing Informatics 2014 - East Meets West eSMART+, 2014
2013
J. Medical Syst., 2013
Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining.
Inf. Sci., 2013
Expert Syst. Appl., 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the 42nd International Conference on Parallel Processing, 2013
2012
J. Medical Syst., 2012
A Reliable User Authentication and Key Agreement Scheme for Web-Based Hospital-Acquired Infection Surveillance Information System.
J. Medical Syst., 2012
J. Medical Syst., 2012
A Password-Based User Authentication Scheme for the Integrated EPR Information System.
J. Medical Syst., 2012
J. Medical Syst., 2012
J. Medical Syst., 2012
J. Medical Syst., 2012
J. Medical Syst., 2012
J. Medical Syst., 2012
Comput. J., 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce.
Expert Syst. Appl., 2011
2010
Expert Syst. Appl., 2010
2009
J. Syst. Softw., 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
2008
J. Syst. Softw., 2008
Inf. Sci., 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Comput. Stand. Interfaces, 2007
2006
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2004
J. Comput. Sci. Technol., 2004
A practical authenticated encryption scheme based on the elliptic curve cryptosystem.
Comput. Stand. Interfaces, 2004
Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme.
Appl. Math. Comput., 2004
Appl. Math. Comput., 2004
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
2003
An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy.
J. Comput. Sci. Technol., 2003
Comput. Secur., 2003
2002
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm.
Comput. Secur., 2002