default search action
Lo-Yao Yeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Boyi Lee, Jhao-Yin Jhang, Lo-Yao Yeh, Ming-Yi Chang, Chia-Mei Chen, Chih-Ya Shen:
Detecting Targets of Graph Adversarial Attacks With Edge and Feature Perturbations. IEEE Trans. Comput. Soc. Syst. 11(3): 3218-3231 (2024) - [j24]Lo-Yao Yeh, Wan-Hsin Hsu, Chih-Ya Shen:
GDPR-Compliant Personal Health Record Sharing Mechanism With Redactable Blockchain and Revocable IPFS. IEEE Trans. Dependable Secur. Comput. 21(4): 3342-3356 (2024) - [i1]Lo-Yao Yeh, Sheng-Po Tseng, Chia-Hsun Lu, Chih-Ya Shen:
Auditable Homomorphic-based Decentralized Collaborative AI with Attribute-based Differential Privacy. CoRR abs/2403.00023 (2024) - 2023
- [j23]Bay-Yuan Hsu, Lo-Yao Yeh, Ming-Yi Chang, Chih-Ya Shen:
Willingness Maximization for Ego Network Data Extraction in Multiple Online Social Networks. IEEE Trans. Knowl. Data Eng. 35(8): 8672-8686 (2023) - [c12]Lo-Yao Yeh, Jun-Qian Jian, Jen-Wei Hu:
Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting. DSC 2023: 1-8 - 2022
- [j22]Lo-Yao Yeh, Chih-Ya Shen, Wei-Chiao Huang, Wan-Hsin Hsu, Hsien-Chu Wu:
GDPR-Aware Revocable P2P File-Sharing System Over Consortium Blockchain. IEEE Syst. J. 16(4): 5234-5245 (2022) - [j21]Chih-Chieh Chang, Ming-Yi Chang, Jhao-Yin Jhang, Lo-Yao Yeh, Chih-Ya Shen:
Learning to Extract Expert Teams in Social Networks. IEEE Trans. Comput. Soc. Syst. 9(5): 1552-1562 (2022) - [j20]Lo-Yao Yeh, Nong-Xiang Shen, Ren-Hung Hwang:
Blockchain-Based Privacy-Preserving and Sustainable Data Query Service Over 5G-VANETs. IEEE Trans. Intell. Transp. Syst. 23(9): 15909-15921 (2022) - [c11]Sheng-Po Tseng, Jan-Yue Lin, Wei-Chien Cheng, Lo-Yao Yeh, Chih-Ya Shen:
Decentralized Federated Learning with Enhanced Privacy Preservation. ICME Workshops 2022: 1 - [c10]Sheng-Po Tseng, Lo-Yao Yeh, Lee-Chi Wu, Pei-Yu Tsai:
Analyzing Federated Learning with Enhanced Privacy Preservation. MDM 2022: 446-451 - 2020
- [j19]Lo-Yao Yeh, Hsien-Chu Wu:
Efficient Extraction of Target Users for Package Promotion in Big Social Networks. IEEE Trans. Comput. Soc. Syst. 7(5): 1111-1122 (2020) - [j18]Lo-Yao Yeh, Peggy Joy Lu, Szu-Hao Huang, Jiun-Long Huang:
SOChain: A Privacy-Preserving DDoS Data Exchange Service Over SOC Consortium Blockchain. IEEE Trans. Engineering Management 67(4): 1487-1500 (2020) - [c9]Lo-Yao Yeh, Wan-Hsin Hsu, Jiun-Long Huang, Chih-Ya Shen, Chi Wu-Lee:
Integrating Cellphone-based Hardware Wallet with Visional Certificate Verification System. GLOBECOM 2020: 1-6
2010 – 2019
- 2019
- [j17]Jen-Wei Hu, Lo-Yao Yeh, Shih-Wei Liao, Chu-Sing Yang:
Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices. Comput. Secur. 86: 238-252 (2019) - [j16]Woei-Jiunn Tsaur, Lo-Yao Yeh:
DANS: A Secure and Efficient Driver-Abnormal Notification Scheme With IoT Devices Over IoV. IEEE Syst. J. 13(2): 1628-1639 (2019) - [c8]Wei-Chiao Huang, Lo-Yao Yeh, Jiun-Long Huang:
A Monitorable Peer-to-Peer File Sharing Mechanism. APNOMS 2019: 1-4 - [c7]Chunju Tsai, Wen-Yueh Shih, Yi-Shu Lu, Jiun-Long Huang, Lo-Yao Yeh:
Design of a Data Collection System with Data Compression for Small Manufacturers in Industrial IoT Environments. APNOMS 2019: 1-4 - 2018
- [j15]Lo-Yao Yeh, Pei-Yu Chiang, Yi-Lang Tsai, Jiun-Long Huang:
Cloud-Based Fine-Grained Health Information Access Control Framework for LightweightIoT Devices with Dynamic Auditing andAttribute Revocation. IEEE Trans. Cloud Comput. 6(2): 532-544 (2018) - [c6]Peggy Joy Lu, Lo-Yao Yeh, Jiun-Long Huang:
An Privacy-Preserving Cross-Organizational Authentication/Authorization/Accounting System Using Blockchain Technology. ICC 2018: 1-6 - 2017
- [j14]Lo-Yao Yeh, Woei-Jiunn Tsaur, Hsin-Han Huang:
Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control. ACM Trans. Intell. Syst. Technol. 9(1): 10:1-10:23 (2017) - [c5]Lo-Yao Yeh, Peggy Joy Lu, Jen-Wei Hu:
NCHC Blockchain Construction Platform (NBCP): Rapidly Constructing Blockchain Nodes around Taiwan. JCDL 2017: 315-316 - 2014
- [j13]Lo-Yao Yeh, Yu-Cheng Lin:
A Proxy-Based Authentication and Billing Scheme With Incentive-Aware Multihop Forwarding for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 15(4): 1607-1621 (2014) - [j12]Lo-Yao Yeh, Jiun-Long Huang:
PBS: A Portable Billing Scheme with Fine-Grained Access Control for Service-Oriented Vehicular Networks. IEEE Trans. Mob. Comput. 13(11): 2606-2619 (2014) - 2013
- [j11]Lo-Yao Yeh, Chun-Chuan Yang, Jee-Gong Chang, Yi-Lang Tsai:
A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs. J. Netw. Comput. Appl. 36(1): 284-292 (2013) - [j10]Chen-Che Huang, Tsun-Tse Huang, Jiun-Long Huang, Lo-Yao Yeh:
Hierarchical role-based data dissemination in wireless sensor networks. J. Supercomput. 66(1): 35-56 (2013) - [j9]Lo-Yao Yeh, Jiun-Long Huang:
A conditional access system with efficient key distribution and revocation for mobile pay-TV systems. ACM Trans. Multim. Comput. Commun. Appl. 9(3): 18:1-18:20 (2013) - 2012
- [j8]Lo-Yao Yeh, Woei-Jiunn Tsaur:
A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems. IEEE Trans. Multim. 14(6): 1690-1693 (2012) - [j7]Lo-Yao Yeh, Yu-Lun Huang, Anthony D. Joseph, Shiuhpyng Winston Shieh, Woei-Jiunn Tsaur:
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks. IEEE Trans. Veh. Technol. 61(4): 1907-1924 (2012) - [c4]Lo-Yao Yeh, Jee-Gong Chang, Wei-Cheng Huang, Yi-Lang Tsai:
A localized authentication and billing scheme for proxy mobile IPv6 in VANETs. ICC 2012: 993-998 - [c3]Chen-Che Huang, Jiun-Long Huang, Jhih-An Yan, Lo-Yao Yeh:
An in-network approximate data gathering algorithm exploiting spatial correlation in wireless sensor networks. SAC 2012: 550-555 - 2011
- [j6]Lo-Yao Yeh, Yen-Cheng Chen, Jiun-Long Huang:
PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Comput. Commun. 34(3): 447-456 (2011) - [j5]Lo-Yao Yeh, Yen-Cheng Chen, Jiun-Long Huang:
ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks. IEEE J. Sel. Areas Commun. 29(3): 630-643 (2011) - [j4]Jiun-Long Huang, Lo-Yao Yeh, Hung-Yu Chien:
ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 60(1): 248-262 (2011) - [j3]Yen-Cheng Chen, Shu-Chuan Chuang, Lo-Yao Yeh, Jiun-Long Huang:
A practical authentication protocol with anonymity for wireless access networks. Wirel. Commun. Mob. Comput. 11(10): 1366-1375 (2011) - 2010
- [j2]Lo-Yao Yeh, Chen-Che Huang, Cheng-En Wu, Jiun-Long Huang:
ALM: An adaptive location management scheme for approximate location queries in wireless sensor networks. Comput. Commun. 33(16): 1937-1948 (2010) - [c2]Guo-He Ye, Lo-Yao Yeh, Jiun-Long Huang:
Hierarchical Role-based Data Dissemination for large-scale wireless sensor networks with mobile sinks. PerCom Workshops 2010: 129-134
2000 – 2009
- 2005
- [j1]Yen-Cheng Chen, Lo-Yao Yeh:
An efficient nonce-based authentication scheme with key agreement. Appl. Math. Comput. 169(2): 982-994 (2005) - [c1]Yen-Cheng Chen, Lo-Yao Yeh:
An Efficient Authentication and Access Control Scheme Using Smart Cards. ICPADS (2) 2005: 78-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint