default search action
Yu-Chi Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Yu-Chi Chen, Song-Yi Hsu, Xin Xie, Saru Kumari, Sachin Kumar, Joel J. P. C. Rodrigues, Bander A. Alzahrani:
Privacy preserving support vector machine based on federated learning for distributed IoT-enabled data analysis. Comput. Intell. 40(2) (2024) - [j49]Yu-Chi Chen:
A conceptually simple and generic construction of plaintext checkable encryption in the standard model. Des. Codes Cryptogr. 92(6): 1729-1746 (2024) - [j48]Yu-Chi Chen, Jhe-Kai Yang, Hsin-Chan Yen, Pei-Wen Lin:
Dual-Cloud Multi-Secret Sharing Architecture for Privacy Preserving Persistent Computation. IEEE Trans. Inf. Forensics Secur. 19: 7523-7535 (2024) - [c41]Yu-Chi Chen, Huei-Tse Hou:
Design and Evaluation of the Framework of ChatGPT-Based Situational Non-Player Character Scaffolding for Educational Games. IIAI-AAI 2024: 720-721 - [c40]Shi-Chian Wang, Yu-Chi Chen, Pei-Chun Chung, Huei-Tse Hou:
Design of Creative Thinking Skills Training Activity Using Board Game with Mobile Technology. IIAI-AAI 2024: 722-723 - [c39]Mu-Shan Lin, Chien-Chun Tsai, Shenggao Li, Tze-Chiang Huang, Wen-Hung Huang, Kate Huang, Yu-Chi Chen, Alex Liu, Yu-Jie Huang, Jimmy Wang, Shu-Chun Yang, Nai-Chen Cheng, Chao-Chieh Li, Hsin-Hung Kuo, Wei-Chih Chen, Chin-Hua Wen, Kevin Lin, Po-Yi Huang, Kenny Cheng-Hsiang Hsieh, Frank Lee:
A 0.296pJ/bit 17.9Tb/s/mm2 Die-to-Die Link in 5nm/6nm FinFET on a 9μm-Pitch 3D Package Achieving 10.24Tb/s Bandwidth at 16Gb/s PAM-4. VLSI Technology and Circuits 2024: 1-2 - 2023
- [j47]Yu-Chi Chen:
Security analysis of public key encryption with filtered equality test. Adv. Math. Commun. 17(6): 1358-1363 (2023) - [j46]Mei-Fen Chen, Yu-Chi Chen, Pei-Ying Zuo, Huei-Tse Hou:
Design and evaluation of a remote synchronous gamified mathematics teaching activity that integrates multi-representational scaffolding and a mind tool for gamified learning. Educ. Inf. Technol. 28(10): 13207-13233 (2023) - [j45]Yu-Chi Chen, Kuan-Chun Huang:
JEDI: Joint and Effective Privacy Preserving Outsourced Set Intersection and Data Integration Protocols. IEEE Trans. Inf. Forensics Secur. 18: 4504-4514 (2023) - [c38]I-Wen Hsieh, Yu-Chi Chen, Shao-Kang Hung:
Design and Implementation of Bending Force Sensor Featuring Printed Circuit Board. AIM 2023: 579-583 - [c37]Yan-Ru Chen, Shih-Wei-Chen Tseng, Yu-Chi Chen, Yeong-Hwa Chang:
Safety Enhancement for Mobility Scooter with Rule-Based Danger Prevention. APSIPA ASC 2023: 1536-1541 - [c36]Tse-Yang Huang, Yu-Chi Chen, Tsung-Chen Hsieh, Huan-Chi Chang, Chih-Chieh Chang:
A Secure and IoT-Enabled Data Sharing System Based on IPFS and IOTA Blockchain. BIOTC 2023: 50-57 - [c35]Chih-Jou Wu, Chang-Ching Hung, Nai-Chi Chen, Kuo-Yang Chang, Yu-Chi Chen:
Distributed Privacy-preserving Support Vector Machine Training Scheme on Vertically Partitioned Data. ICCCM 2023: 226-234 - [c34]Kai-Wei Lin, Yu-Chi Chen:
A File Verification Scheme Based on Verkle Trees. ICCE-Taiwan 2023: 295-296 - [c33]Yu-Chi Chen, Huei-Tse Hou:
Design of an Employment Ethics Educational Mobile Game Combined with Realistic Situations. IIAI-AAI-Winter 2023: 117-120 - [c32]Chien Chih-Chung, Chih-Chen Kuo, Yu-Chi Chen, Huei-Tse Hou:
Design and evaluation of a simulation business management educational card game combined with dynamic feedback from mobile technology. IIAI-AAI 2023: 732-733 - [i9]Hsun-Yu Kuo, Szu-Yu Liu, Chin-Ya Huang, Yu-Chi Chen, Meng-Hua Xie:
Reliable Data Transmission through Private CBRS Networks. CoRR abs/2310.14171 (2023) - 2022
- [j44]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation. Comput. J. 65(10): 2828-2844 (2022) - [j43]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant anonymous identity-based encryption with trable identities. IET Inf. Secur. 16(2): 111-126 (2022) - [j42]Jun-Rui Wang, Xing Xie, Yu-Chi Chen:
A Generic Construction of Designated Verifier Signature from Standard Cryptographic Algorithms. J. Inf. Sci. Eng. 38(5): 1051-1063 (2022) - [j41]Yu-Chi Chen, Gwoboa Horng:
Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes. J. Vis. Commun. Image Represent. 85: 103489 (2022) - [j40]Vikas Kumar, Rahul Kumar, Akber Ali Khan, Vinod Kumar, Yu-Chi Chen, Chin-Chieh Chang:
RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure. Sensors 22(9): 3110 (2022) - [j39]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems. IEEE Syst. J. 16(3): 4629-4640 (2022) - [j38]Zhong-Yi Guo, Yu-Chi Chen, Hsiu-Ping Lin:
Oblivious Access for Decentralized Database Systems: A New Asymmetric Framework from Smart Contracts. Symmetry 14(4): 680 (2022) - [j37]Yu-Chi Chen, Kuan-Ting Lai, Dong Liu, Ming-Syan Chen:
TAGNet: Triplet-Attention Graph Networks for Hashtag Recommendation. IEEE Trans. Circuits Syst. Video Technol. 32(3): 1148-1159 (2022) - [j36]Yu-Chi Chen, Che-Chia Chang, Chang-Ching Hung, Jian-Feng Lin, Song-Yi Hsu:
SecDT: Privacy-Preserving Outsourced Decision Tree Classification Without Polynomial Forms in Edge-Cloud Computing. IEEE Trans. Signal Inf. Process. over Networks 8: 1037-1048 (2022) - [c31]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. AsiaCCS 2022: 423-436 - [c30]Jhe-Kai Yang, Kuan-Chun Huang, Cheng-Yang Chung, Yu-Chi Chen, Ting-Wei Wu:
Efficient Privacy Preserving Nearest Neighboring Classification from Tree Structures and Secret Sharing. ICC 2022: 5615-5620 - 2021
- [j35]Yu-Chi Chen, Xin Xie, Hung-Yu Tsao, Raylin Tso:
Public key encryption with filtered equality test revisited. Des. Codes Cryptogr. 89(10): 2357-2372 (2021) - [j34]Hsiang-Yu Han, Yu-Chi Chen, Pei-Yung Hsiao, Li-Chen Fu:
Using Channel-Wise Attention for Deep CNN Based Real-Time Semantic Segmentation With Class-Aware Edge Information. IEEE Trans. Intell. Transp. Syst. 22(2): 1041-1051 (2021) - [j33]Xin Xie, Yu-Chi Chen:
Decentralized Data Aggregation: A New Secure Framework Based on Lightweight Cryptographic Algorithms. Wirel. Commun. Mob. Comput. 2021: 5565663:1-5565663:12 (2021) - [c29]Jian-Feng Lin, Jun-Rui Wang, Che-Chia Chang, Yu-Chi Chen:
Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability. DSC 2021: 1-2 - [c28]Xin Xie, Yu-Chi Chen:
Decentralized Data Aggregation: A New Secure Framework based on Lightweight Cryptographic Algorithms. DSC 2021: 1-2 - [c27]Tao-Hsing Chang, Ju-Ling Chen, Hui-Min Chou, Ming-Hong Bai, Fu-Yuan Hsu, Yu-Chi Chen:
Automatic Scoring Method of Short-Answer Questions in the Context of Low-Resource Corpora. IALP 2021: 25-29 - [c26]Yi-Fang Li, Sheng-Tsung Tu, Yue-Nuo Yan, Yu-Chi Chen, Chien-Hsing Chou:
The Utilization of Big Data Analytics on Food Delivery Platforms in Taiwan: Taking Uber Eats and Foodpanda as an Example. ICCE-TW 2021: 1-2 - [c25]Kuan-Chun Huang, Yu-Chi Chen:
Privacy Preserving Outsourced Data Integration from Inner Product Encryption. ISPACS 2021: 1-2 - [c24]Feng-Ming Yeh, Der-Chin Chen, Ya-Hui Hsieh, Yu-Chi Chen, Yung-Fu Liu, Jiann-Hwa Lue:
Measurement of contrast sensitivity in adults by optical grating. ISPACS 2021: 1-2 - [i8]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant Anonymous IBE with Traceable Identities. IACR Cryptol. ePrint Arch. 2021: 33 (2021) - [i7]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System. IACR Cryptol. ePrint Arch. 2021: 337 (2021) - [i6]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. IACR Cryptol. ePrint Arch. 2021: 1008 (2021) - 2020
- [j32]Raylin Tso, Kaibin Huang, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Tsu-Yang Wu:
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing. IEEE Access 8: 152551-152564 (2020) - [j31]Yu-Chi Chen:
Plaintext checkable encryption with check delegation revisited. Int. J. Ad Hoc Ubiquitous Comput. 34(2): 102-110 (2020) - [j30]Mu-Shan Lin, Tze-Chiang Huang, Chien-Chun Tsai, King-Ho Tam, Kenny Cheng-Hsiang Hsieh, Ching-Fang Chen, Wen-Hung Huang, Chi-Wei Hu, Yu-Chi Chen, Sandeep Kumar Goel, Chin-Ming Fu, Stefan Rusu, Chao-Chieh Li, Sheng-Yao Yang, Mei Wong, Shu-Chun Yang, Frank Lee:
A 7-nm 4-GHz Arm¹-Core-Based CoWoS¹ Chiplet Design for High-Performance Computing. IEEE J. Solid State Circuits 55(4): 956-966 (2020) - [c23]Zhong-Yi Guo, Yu-Chi Chen, Hsiu-Ping Lin:
POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract Model. AsiaCCS 2020: 895-897 - [c22]Song-Yi Hsu, Xin Xie, Yu-Chi Chen:
POSTER: SecretSVM - Secret Sharing-Based SVM for Preventing Collusion in IoT Data Analysis. AsiaCCS 2020: 904-906 - [c21]Che-Chia Chang, Jian-Feng Lin, Song-Yi Hsu, Yu-Chi Chen:
Privacy-Preserving Delegation of Decision Tree Classification. ICCE-TW 2020: 1-2 - [c20]Wei-Chih Chen, Chin-Hua Wen, Chin-Ming Fu, Tsung-Hsien Tsai, Yu-Chi Chen, Wen-Hung Huang, Chien-Chun Tsai, Alvin Leng Sun Loke, C. H. Kenny:
A 4-to-18GHz Active Poly Phase Filter Quadrature Clock Generator with Phase Error Correction in 5nm CMOS. VLSI Circuits 2020: 1-2
2010 – 2019
- 2019
- [j29]Yu-Chi Chen, Xin Xie, Peter Shaojui Wang, Raylin Tso:
Witness-based searchable encryption with optimal overhead for cloud-edge computing. Future Gener. Comput. Syst. 100: 715-723 (2019) - [j28]Chih-Fong Tsai, Yu-Chi Chen:
The optimal combination of feature selection and data discretization: An empirical study. Inf. Sci. 505: 282-293 (2019) - [j27]Chih-Wei Shiu, Yu-Chi Chen, Wien Hong:
Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy. KSII Trans. Internet Inf. Syst. 13(2): 1020-1042 (2019) - [j26]Yu-Chi Chen, Tsung-Hsuan Hung, Sung-Hsien Hsieh, Chih-Wei Shiu:
A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms. IEEE Trans. Inf. Forensics Secur. 14(12): 3332-3343 (2019) - [c19]Yu-Chi Chen, Chia-Yuan Chang, Pei-Yung Hsiao, Li-Chen Fu:
Real-Time Multi-class Instance Segmentation with One-Time Deep Embedding Clustering. ACPR (1) 2019: 223-235 - [c18]Yunmin He, Yu-Chi Chen, Zhong-Yi Guo, Raylin Tso, Shaozhen Ye:
SCDP: Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management. GCCE 2019: 881-882 - [c17]Yu-Chi Chen, Song-Yi Hsu, Ting-Wei Chang, Ting-Wei Wu:
Lottery DApp from Multi-Randomness Extraction. IEEE ICBC 2019: 78-80 - [c16]Mu-Shan Lin, Tze-Chiang Huang, Chien-Chun Tsai, King-Ho Tam, Kenny Cheng-Hsiang Hsieh, Tom Chen, Wen-Hung Huang, Jack Hu, Yu-Chi Chen, Sandeep Kumar Goel, Chin-Ming Fu, Stefan Rusu, Chao-Chieh Li, Sheng-Yao Yang, Mei Wong, Shu-Chun Yang, Frank Lee:
A 7nm 4GHz Arm®-core-based CoWoS® Chiplet Design for High Performance Computing. VLSI Circuits 2019: 28- - 2018
- [j25]Sung-Hsien Hsieh, Tsung-Hsuan Hung, Chun-Shien Lu, Yu-Chi Chen, Soo-Chang Pei:
A Secure Compressive Sensing-Based Data Gathering System via Cloud Assistance. IEEE Access 6: 31840-31853 (2018) - [j24]Dan Yang, Yu-Chi Chen, Shaozhen Ye, Raylin Tso:
Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud. IEEE Access 6: 63624-63634 (2018) - [c15]Jen-Chieh Hsu, Raylin Tso, Yu-Chi Chen, Mu-En Wu:
Oblivious Transfer Protocols Based on Commutative Encryption. NTMS 2018: 1-5 - [c14]Yu-Chi Chen:
Plaintext Checkable Encryption with Check Delegation: New Models and Simple Constructions. PAAP 2018: 140-145 - 2017
- [j23]Chen-Chung Liu, Yu-Chi Chen, Shu-Ju Diana Tai:
A social network analysis on elementary student engagement in the networked creation community. Comput. Educ. 115: 114-125 (2017) - [j22]Kaibin Huang, Raylin Tso, Yu-Chi Chen:
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption. J. Comput. Syst. Sci. 89: 400-409 (2017) - [j21]Yu-Chi Chen:
Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure. IEEE Trans. Inf. Forensics Secur. 12(5): 1082-1091 (2017) - 2016
- [j20]Yao-Chung Fan, Yu-Chi Chen, Kuan-Chieh Tung, Kuo-Chen Wu, Arbee L. P. Chen:
A Framework for Enabling User Preference Profiling through Wi-Fi Logs. IEEE Trans. Knowl. Data Eng. 28(3): 592-603 (2016) - [c13]Yu-Chi Chen, En Tzu Wang, Arbee L. P. Chen:
Mining User Trajectories from Smartphone Data Considering Data Uncertainty. DaWaK 2016: 51-67 - [c12]Mu-Shan Lin, Chien-Chun Tsai, Kenny Cheng-Hsiang Hsieh, Wen-Hung Huang, Yu-Chi Chen, Shu-Chun Yang, Chin-Ming Fu, Hao-Jie Zhan, Jinn-Yeh Chien, Shao-Yu Li, Y.-H. Chen, C.-C. Kuo, Shih-Peng Tai, Kazuyoshi Yamada:
A 16nm 256-bit wide 89.6GByte/s total bandwidth in-package interconnect with 0.3V swing and 0.062pJ/bit power in InFO package. Hot Chips Symposium 2016: 1-32 - [c11]Yao-Chung Fan, Yu-Chi Chen, Kuan-Chieh Tung, Kuo-Chen Wu, Arbee L. P. Chen:
A framework for enabling user preference profiling through Wi-Fi logs. ICDE 2016: 1550-1551 - [c10]Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Cryptography for Parallel RAM from Indistinguishability Obfuscation. ITCS 2016: 179-190 - [c9]Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin:
Delegating RAM Computations with Adaptive Soundness and Privacy. TCC (B2) 2016: 3-30 - 2015
- [j19]Yu-Chi Chen, Ya-Hui Wang, Yan-Chyuan Shiau, Yi-Jen Wang:
Preventing campus accidents among disabled students. Artif. Life Robotics 20(1): 1-6 (2015) - [j18]Yu-Chi Chen, Lian Pei, Yan-Chyuan Shiau:
Application of coastal vegetation to green roofs of residential buildings in Taiwan. Artif. Life Robotics 20(1): 86-91 (2015) - [j17]Yu-Chi Chen:
SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks. Comput. J. 58(4): 922-933 (2015) - [j16]Wien Hong, Gwoboa Horng, Chih-Wei Shiu, Tung-Shou Chen, Yu-Chi Chen:
Reversible Steganographic Method Using Complexity Control and Human Visual System. Comput. J. 58(10): 2583-2594 (2015) - [j15]Kaibin Huang, Raylin Tso, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Ahmad Almogren, Atif Alamri:
PKE-AET: Public Key Encryption with Authorized Equality Test. Comput. J. 58(10): 2686-2697 (2015) - [j14]Yu-Chi Chen, Raylin Tso, Gwoboa Horng, Chun-I Fan, Ruei-Hau Hsu:
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes. J. Inf. Sci. Eng. 31(1): 297-314 (2015) - [j13]Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, Gwoboa Horng:
Certificateless aggregate signature with efficient verification. Secur. Commun. Networks 8(13): 2232-2243 (2015) - [j12]Chih-Wei Shiu, Yu-Chi Chen, Wien Hong:
Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process. Image Commun. 39: 226-233 (2015) - [c8]Kaibin Huang, Yu-Chi Chen, Raylin Tso:
Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET. SECRYPT 2015: 327-334 - [i5]Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Computation-Trace Indistinguishability Obfuscation and its Applications. IACR Cryptol. ePrint Arch. 2015: 406 (2015) - [i4]Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin:
Delegating RAM Computations with Adaptive Soundness and Privacy. IACR Cryptol. ePrint Arch. 2015: 1082 (2015) - 2014
- [j11]Yu-Chi Chen, Chao-Liang Liu, Gwoboa Horng:
Cryptanalysis of some user identification schemes for distributed computer networks. Int. J. Commun. Syst. 27(11): 2909-2917 (2014) - [j10]Yu-Chi Chen, Gwoboa Horng, Chang-Chin Huang:
Privacy protection in on-line shopping for electronic documents. Inf. Sci. 277: 321-326 (2014) - [j9]Yu-Chi Chen, Chih-Wei Shiu, Gwoboa Horng:
Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25(5): 1164-1170 (2014) - [j8]Du-Shiau Tsai, Yu-Chi Chen:
Visibility bounds for visual secret sharing based on JND theory. Multim. Tools Appl. 70(3): 1825-1836 (2014) - [c7]Yu-Chi Chen, Chun-Te Chu, Jenq-Neng Hwang, Jang-Hee Yoo:
A privacy-preserving human tracking scheme in centralized cloud based camera networks. ICC 2014: 793-798 - [c6]Kuo-Chang Chen, Yu-Chi Chen, Gwoboa Horng, Raylin Tso:
Efficient public key encryption with user-friendly keywords search for searchable cloud storage. ICS 2014: 724-733 - [c5]Yu-Chi Chen, Kunhan Lu, Raylin Tso, Mu-En Wu:
An Improved Visual Cryptography with Cheating Prevention. IWDW 2014: 444-454 - [c4]Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun:
A New Public Key Encryption with Equality Test. NSS 2014: 550-557 - 2013
- [j7]Yu-Chi Chen, Du-shiau Tsai, Gwoboa Horng:
Visual secret sharing with cheating prevention revisited. Digit. Signal Process. 23(5): 1496-1504 (2013) - [j6]Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu:
Strong non-repudiation based on certificateless short signatures. IET Inf. Secur. 7(3): 253-263 (2013) - [j5]Yu-Chi Chen, Raylin Tso, Gwoboa Horng:
Security Analysis of Choi et al.'s Certificateless Short Signature Scheme. J. Inf. Hiding Multim. Signal Process. 4(3): 147-154 (2013) - [j4]Yu-Chi Chen, Gwoboa Horng, Yi-Jheng Lin, Kuo-Chang Chen:
Privacy Preserving Index for Encrypted Electronic Medical Records. J. Medical Syst. 37(6): 9992 (2013) - [i3]Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng:
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes. IACR Cryptol. ePrint Arch. 2013: 193 (2013) - 2012
- [j3]Yu-Chi Chen, Du-shiau Tsai, Gwoboa Horng:
A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography. J. Vis. Commun. Image Represent. 23(8): 1225-1233 (2012) - [j2]Yu-Chi Chen, Wen-Ching Ko, Han-Lung Chen, Wen-Jong Wu, Pei-Zen Chang, Chih-Kung Lee:
A Thin Light Flexible Electromechanically Actuated Electret-Based Loudspeaker for Automotive Applications. IEEE Trans. Ind. Electron. 59(11): 4140-4147 (2012) - [j1]Yu-Chi Chen, Gwoboa Horng, Du-shiau Tsai:
Comment on "Cheating Prevention in Visual Cryptography". IEEE Trans. Image Process. 21(7): 3319-3323 (2012) - 2011
- [i2]Yu-Chi Chen, Gwoboa Horng:
On the security models for certificateless signature schemes achieving level 3 security. IACR Cryptol. ePrint Arch. 2011: 554 (2011) - [i1]Yu-Chi Chen, Du-shiau Tsai, Gwoboa Horng:
On the Security of a Cheating Immune Visual Secret Sharing Scheme. IACR Cryptol. ePrint Arch. 2011: 631 (2011)
2000 – 2009
- 2009
- [c3]Yu-Chi Chen, Gwoboa Horng, Chang-Chin Huang:
Privacy Protection in On-line Shopping for Electronic Documents. IAS 2009: 105-108 - [c2]Cheng-Hsin Chuang, Yu-Chi Chen, You-Ming Hsu, Huei-Sheng Huang, Fei-Bin Hsiao, Chin-Hung Wang:
A DEP chip with arc-shape microelectrode arrays for the separation of different-size particles. NEMS 2009: 854-857 - 2007
- [c1]Jiann-Der Lee, Yu-Chi Chen, Li-Chang Liu, Chung-Hsien Huang:
A Facial-Skin Condition Classification System Using Texture and Fuzzy C-Means Technologies. FSKD (4) 2007: 127-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint