default search action
Jung-San Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Chit-Jie Chew, Yu-Cheng Lin, Ying-Chin Chen, Yun-Yi Fan, Jung-San Lee:
Preserving manipulated and synthetic Deepfake detection through face texture naturalness. J. Inf. Secur. Appl. 83: 103798 (2024) - [j58]Chit-Jie Chew, Wei-Bin Lee, Tzu-Li Sung, Ying-Chin Chen, Shiuh-Jeng Wang, Jung-San Lee:
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime. IEEE Trans. Inf. Forensics Secur. 19: 5956-5970 (2024) - [j57]Chit-Jie Chew, Wei-Bin Lee, Tzu Hao Chen, Iuon-Chang Lin, Jung-San Lee:
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle. IEEE Trans. Netw. Sci. Eng. 11(4): 3495-3511 (2024) - [c14]Chih-Wei Chang, Jung-San Lee, Yung-Chen Chou:
Enhancing Data Embedding Capacity in Encrypted Images via Adaptive MSB Prediction. IVSP 2024: 45-53 - 2023
- [j56]Jung-San Lee, Ying-Chin Chen, Chit-Jie Chew, Wei-Che Hung, Yun-Yi Fan, Bo Li:
Constructing gene features for robust 3D mesh zero-watermarking. J. Inf. Secur. Appl. 73: 103414 (2023) - [j55]Jung-San Lee, Yin-Chin Chen, Yun-Hao Hsieh, Shih-Hao Chang, Ngoc-Tu Huynh:
Preserving friendly stacking and weighted shadows in selective scalable secret image sharing. Multim. Tools Appl. 82(19): 29283-29305 (2023) - 2022
- [j54]Jung-San Lee, Ying-Chin Chen, Chit-Jie Chew, Chih-Lung Chen, Thu-Nguyet Huynh, Chung-Wei Kuo:
CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training. Comput. Secur. 122: 102908 (2022) - [j53]Jung-San Lee, Chit-Jie Chew, Jo-Yun Liu, Ying-Chin Chen, Kuo-Yu Tsai:
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract. J. Inf. Secur. Appl. 65: 103117 (2022) - [j52]Wei-Chen Wu, Chit-Jie Chew, Ying-Chin Chen, Cheng-Han Wu, Tzu Hao Chen, Jung-San Lee:
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation. IEEE Trans. Netw. Serv. Manag. 19(4): 3810-3821 (2022) - [c13]Tzu Hao Chen, Chit-Jie Chew, Ying-Chin Chen, Jung-San Lee:
Preserving Collusion-Free and Traceability in Car-Sharing System Based on Blockchain. ICS 2022: 613-624 - 2021
- [j51]Chit-Jie Chew, Ying-Chin Chen, Jung-San Lee, Chih-Lung Chen, Kuo-Yu Tsai:
Preserving indomitable DDoS vitality through resurrection social hybrid botnet. Comput. Secur. 106: 102284 (2021) - [j50]Ting-Fang Cheng, Ying-Chin Chen, Zhu-Dao Song, Ngoc-Tu Huynh, Jung-San Lee:
Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem. Int. J. Inf. Comput. Secur. 15(1): 67-87 (2021) - [j49]Jung-San Lee, Chieh Liu, Ying-Chin Chen, Wei-Che Hung, Bo Li:
Robust 3D mesh zero-watermarking based on spherical coordinate and Skewness measurement. Multim. Tools Appl. 80(17): 25757-25772 (2021) - [j48]Jung-San Lee, Chit-Jie Chew, Ying-Chin Chen, Kuo-Jui Wei:
Preserving Liberty and Fairness in Combinatorial Double Auction Games Based on Blockchain. IEEE Syst. J. 15(3): 3517-3527 (2021) - 2020
- [j47]Wei-Chih Hong, Ding-Ray Huang, Chih-Lung Chen, Jung-San Lee:
Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks. IEEE Access 8: 123297-123309 (2020) - [j46]Quy-Anh Bui, Wei-Bin Lee, Jung-San Lee, Hsiao-Ling Wu, Jo-Yun Liu:
Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations. KSII Trans. Internet Inf. Syst. 14(1): 437-454 (2020) - [j45]Yung-Chen Chou, Yu-Wei Nien, Ying-Chin Chen, Bo Li, Jung-San Lee:
Learning salient seeds refer to the manifold ranking and background-prior strategy. Multim. Tools Appl. 79(9-10): 5859-5879 (2020) - [c12]Cheng-Hsing Yang, Chi-Yao Weng, Yu-Zhen Yang, Jung-San Lee, Cheng-Ta Huang:
Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images. ICFET 2020: 125-129
2010 – 2019
- 2019
- [j44]Ying-Chin Chen, Kuo-Jui Wei, Jung-San Lee, Ngoc-Tu Huynh, Jyun-Hong Lin:
AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS. Int. J. Netw. Secur. 21(4): 537-544 (2019) - [j43]Jung-San Lee, Chih-Hsuan Li, Hsin-Yu Lee:
Visibility dehazing based on channel-weighted analysis and illumination tuning. Multim. Tools Appl. 78(2): 1831-1856 (2019) - 2018
- [j42]Jung-San Lee, Hong-Chi Su, Kuo-Jui Wei:
Refining irregular image illumination with concurrent ownership embedding. Multim. Tools Appl. 77(15): 19851-19868 (2018) - [j41]Ying-Chin Chen, Jung-San Lee, Hong-Chi Su:
Selective scalable secret image sharing with adaptive pixel-embedding technique. Multim. Tools Appl. 77(20): 27107-27121 (2018) - 2017
- [j40]Kuo-Jui Wei, Jung-San Lee, Bo Li:
SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks. Int. J. Netw. Secur. 19(1): 60-71 (2017) - [j39]Jung-San Lee, You-Ren Chen:
Selective scalable secret image sharing with verification. Multim. Tools Appl. 76(1): 1-11 (2017) - [j38]Jung-San Lee, Kuo-Jui Wei, Kai-Rui Wen:
Image structure rebuilding technique using fractal dimension on the best match patch searching. Multim. Tools Appl. 76(2): 1875-1899 (2017) - 2016
- [j37]Jung-San Lee, Kuo-Jui Wei, Ying-Chin Chen, Yun-Hsiang Sun:
Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity. KSII Trans. Internet Inf. Syst. 10(12): 5616-5642 (2016) - [j36]Jung-San Lee, Kuo-Jui Wei, Shin-Jen Chen, Yi-Hua Wang:
Tele-micropayment scam prevention based on visual secret sharing technique. Multim. Tools Appl. 75(4): 2233-2248 (2016) - [j35]Jung-San Lee, Kai-Rui Wen, Bo Li:
Renovating Contaminative Image Archives Based on Patch Propagation and Adaptive Confidence Collation. IEEE Trans. Circuits Syst. Video Technol. 26(5): 1004-1011 (2016) - 2015
- [j34]Jung-San Lee, Chin-Chen Chang, Ngoc-Tu Huynh, Hsin-Yi Tsai:
Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Digit. Signal Process. 40: 131-139 (2015) - [j33]Kuo-Jui Wei, Jung-San Lee, Shin-Jen Chen:
Enhancing the Security of Credit Card Transaction based on Visual DSC. KSII Trans. Internet Inf. Syst. 9(3): 1231-1245 (2015) - [j32]Jung-San Lee, Hsiao-Shan Wong, You-Ren Chen, Yi-Hua Wang:
Stable watermarking technique based on XNOR operation and scale relationship. Multim. Tools Appl. 74(17): 6797-6826 (2015) - 2014
- [j31]Jung-San Lee, Bo Li:
Self-Recognized Image Protection Technique that Resists Large-Scale Cropping. IEEE Multim. 21(1): 60-73 (2014) - [j30]Jung-San Lee, Ya-Chieh Huang:
Fast authentication mechanism with provable correctness for cluster-based VANETs. Secur. Commun. Networks 7(6): 1016-1030 (2014) - 2013
- [j29]Jung-San Lee, Kun-Shian Lin:
An innovative electronic group-buying system for mobile commerce. Electron. Commer. Res. Appl. 12(1): 1-13 (2013) - [j28]Jung-San Lee, Wei-Chiang Kao, Bo Li:
Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness. IET Inf. Secur. 7(3): 172-180 (2013) - [j27]Jung-San Lee, Ming-Huang Hsieh:
Preserving user-participation for insecure network communications with CAPTCHA and visual secret sharing technique. IET Networks 2(2): 81-91 (2013) - [j26]Jung-San Lee, Chin-Chen Chang, Kuo-Jui Wei:
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy. Int. J. Netw. Secur. 15(5): 405-410 (2013) - [j25]Pei-Yu Lin, Yi-Hui Chen, Chin-Chen Chang, Jung-San Lee:
Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism. Image Vis. Comput. 31(4): 311-321 (2013) - [j24]Jung-San Lee:
RII: Renovating the irregular illumination of digital image archives. J. Vis. Commun. Image Represent. 24(7): 739-751 (2013) - [j23]Jung-San Lee, Bo Li:
Notes on "Authentication protocol using an identifier in an ad hoc network environment". Math. Comput. Model. 57(5-6): 1572-1575 (2013) - [j22]Chien-Chang Yang, Kuo-Jui Wei, Bo Li, Jung-San Lee:
HORME: hierarchical-object-relational medical management for electronic record. Secur. Commun. Networks 6(10): 1261-1270 (2013) - [j21]Jung-San Lee, Wan-Ting Tseng:
A wide-adapted bantam protocol for roaming across wireless areas. Wirel. Networks 19(6): 1423-1440 (2013) - 2012
- [j20]Jung-San Lee, Kun-Shian Lin:
A robust e-commerce service: Light-weight secure mail-order mechanism. Electron. Commer. Res. Appl. 11(4): 388-396 (2012) - 2011
- [j19]Jung-San Lee, Ming-Huang Hsieh:
An interactive mobile SMS confirmation method using secret sharing technique. Comput. Secur. 30(8): 830-839 (2011) - [j18]Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang:
Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multim. Comput. Commun. Appl. 7(3): 15:1-15:20 (2011) - 2010
- [j17]Chin-Chen Chang, Jung-San Lee, T. Hoang Ngan Le:
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector. Digit. Signal Process. 20(4): 1286-1307 (2010) - [j16]Jung-San Lee, Pei-Yu Lin, Chin-Chen Chang:
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs. Wirel. Pers. Commun. 53(4): 569-580 (2010)
2000 – 2009
- 2009
- [j15]Chin-Chen Chang, Shih-Chang Chang, Jung-San Lee:
An on-line electronic check system with mutual authentication. Comput. Electr. Eng. 35(5): 757-763 (2009) - [j14]Jung-San Lee, Chin-Chen Chang:
Design of electronic t-out-of-n lotteries on the Internet. Comput. Stand. Interfaces 31(2): 395-400 (2009) - [j13]Jung-San Lee, Chin-Chen Chang:
A Secure Multicast Framework in Large and High-Mobility Network Groups. IEICE Trans. Commun. 92-B(7): 2365-2373 (2009) - [j12]Jung-San Lee, Chi-Shiang Chan, Chin-Chen Chang:
Non-iterative privacy preservation for online lotteries. IET Inf. Secur. 3(4): 139-147 (2009) - [j11]Chin-Chen Chang, Jung-San Lee:
Robust t-out-of-n oblivious transfer mechanism based on CRT. J. Netw. Comput. Appl. 32(1): 226-235 (2009) - [j10]Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang:
Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognit. 42(5): 886-895 (2009) - [j9]Jung-San Lee, Chin-Hao Chen, Chin-Chen Chang:
A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images. IEEE Trans. Circuits Syst. Video Technol. 19(6): 900-905 (2009) - [j8]Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang:
Dual Digital Watermarking for Internet Media Based on Hybrid Strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8): 1169-1177 (2009) - [c11]Chin-Chen Chang, Pei-Yu Lin, Jung-San Lee:
A Self-Reference Watermarking Scheme Based on Wet Paper Coding. HIS (1) 2009: 228-233 - [c10]Jung-San Lee, Bo Li, Yung-Chen Chou:
A Brand-New Mobile Value-Added Service: M-Check. NCM 2009: 2050-2055 - [c9]Jung-San Lee, T. Hoang Ngan Le:
Hybrid (2, n) Visual Secret Sharing Scheme for Color Images. RIVF 2009: 1-8 - 2008
- [j7]Jung-San Lee, Chin-Chen Chang:
Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol. Secur. Commun. Networks 1(4): 277-286 (2008) - [c8]Chin-Chen Chang, Jung-San Lee, Ting-Fang Cheng:
Security design for three-party encrypted key exchange protocol using smart cards. ICUIMC 2008: 329-333 - [c7]Jing Li, Jung-San Lee, Chin-Chen Chang:
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques. IIH-MSP 2008: 1545-1548 - [c6]Chin-Chen Chang, Jung-San Lee:
Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol. ISDA (3) 2008: 467-471 - 2007
- [j6]Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang:
Security enhancement of an IC-card-based remote login mechanism. Comput. Networks 51(9): 2280-2287 (2007) - [j5]Jung-San Lee, Chin-Chen Chang, Pen-Yi Chang:
Anonymous authentication scheme for wireless communications. Int. J. Mob. Commun. 5(5): 590-601 (2007) - [j4]Jung-San Lee, Chin-Chen Chang:
Secure communications for cluster-based ad hoc networks using node identities. J. Netw. Comput. Appl. 30(4): 1377-1396 (2007) - 2006
- [j3]Chin-Chen Chang, Jung-San Lee:
An anonymous voting mechanism based on the key exchange protocol. Comput. Secur. 25(4): 307-314 (2006) - [j2]Ya-Fen Chang, Jung-San Lee, Chin-Chen Chang:
A secure and efficient authentication scheme for mobile users. Int. J. Mob. Commun. 4(5): 581-594 (2006) - 2005
- [j1]Chin-Chen Chang, Jung-San Lee, Ya-Fen Chang:
Efficient authentication protocols of GSM. Comput. Commun. 28(8): 921-928 (2005) - [c5]Chin-Chen Chang, Jung-San Lee, Chang-Chu Chen:
On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. CIT 2005: 702-705 - [c4]Chin-Chen Chang, Jung-San Lee:
Improvement on an Optimized Protocol for Mobile Network Authentication and Security. CIS (2) 2005: 538-541 - [c3]Chin-Chen Chang, Jui-Yi Kuo, Jung-San Lee:
Time-bounded Based Password Authentication Scheme. CW 2005: 117-122 - [c2]Chin-Chen Chang, Yu-Chiang Li, Jung-San Lee:
An Efficient Algorithm for Incremental Mining of Association Rules. RIDE 2005: 3-10 - 2004
- [c1]Chin-Chen Chang, Jung-San Lee:
An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards. CW 2004: 417-422
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint