Chin-Laung Lei

According to our database1, Chin-Laung Lei authored at least 127 papers between 1985 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Time-shift replacement algorithm for main memory performance optimization.
The Journal of Supercomputing, 2018

Audit-Free Cloud Storage via Deniable Attribute-Based Encryption.
IEEE Trans. Cloud Computing, 2018

SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events.
J. Inf. Sci. Eng., 2018

SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service.
Future Generation Comp. Syst., 2018

Realizing the real-time gaze redirection system with convolutional neural network.
Proceedings of the 9th ACM Multimedia Systems Conference, 2018

Infection categorization using deep autoencoder.
Proceedings of the IEEE INFOCOM 2018, 2018

Efficient Key Agreement Protocol for Smart Sensors.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
High-Capacity Data-Hiding Scheme on Synthesized Pitches Using Amplitude Enhancement - A New Vision of Non-Blind Audio Steganography.
Symmetry, 2017

Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine.
Security and Communication Networks, 2017

Preserving privacy of online digital physiological signals using blind and reversible steganography.
Computer Methods and Programs in Biomedicine, 2017

Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan.
Comput. J., 2017

SDUDP: A Reliable UDP-Based Transmission Protocol Over SDN.
IEEE Access, 2017

A page replacement algorithm based on frequency derived from reference history.
Proceedings of the Symposium on Applied Computing, 2017

Is Foveated Rendering Perceivable in Virtual Reality?: Exploring the Efficiency and Consistency of Quality Assessment Methods.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

A Stereo Audio Steganography by Inserting Low-Frequency and Octave Equivalent Pure Tones.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Data Hiding on Social Media Communications Using Text Steganography.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
SDN storage: A stream-based storage system over software-defined networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Boosting election prediction accuracy by crowd wisdom on social forums.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

SDNort: A Software Defined Network Testing Framework Using Openflow.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing.
J. Inf. Sci. Eng., 2015

Modelling Polarity of Articles and Identifying Influential Authors through Social Movements.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

How to detect a compromised SDN switch.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Efficient NFV deployment in data center networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Discovery of De-identification Policies Considering Re-identification Risks and Information Loss.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies.
Proceedings of the Intelligent Systems and Applications, 2014

Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure.
Proceedings of the Intelligent Systems and Applications, 2014

A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line.
Proceedings of the Intelligent Systems and Applications, 2014

Give me a broadcast-free network.
Proceedings of the IEEE Global Communications Conference, 2014

Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework.
IEEE Trans. Multimedia, 2013

Aggregate message authentication codes (AMACs) with on-the-fly verification.
Int. J. Inf. Sec., 2013

An adaptive sector-based routing model over structured peer-to-peer networks.
Computer Networks, 2013

Gender swapping and user behaviors in online social games.
Proceedings of the 22nd International World Wide Web Conference, 2013

Understanding Potential MicrotaskWorkers for Paid Crowdsourcing.
Proceedings of the Human Computation and Crowdsourcing: Works in Progress and Demonstration Abstracts, 2013

2012
Radar chart: scanning for satisfactory QoE in QoS dimensions.
IEEE Network, 2012

A decentralized clustering scheme for transparent mode devices.
Cluster Computing, 2012

Forecasting online game addictiveness.
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games, 2012

Are all games equally cloud-gaming-friendly? An electromyographic approach.
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games, 2012

Closed-form mortgage pricing formula with outstanding principal as prepayment value.
Proceedings of the 2012 IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2012

Data Integrity on Remote Storage for On-line Co-working.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

An Analysis of Security Patch Lifecycle Using Google Trend Tool.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Provably secure and efficient identification and key agreement protocol with user anonymity.
J. Comput. Syst. Sci., 2011

Robust authentication and key agreement scheme preserving the privacy of secret key.
Computer Communications, 2011

DevilTyper: a game for CAPTCHA usability evaluation.
Computers in Entertainment, 2011

World of warcraft avatar history dataset.
Proceedings of the Second Annual ACM SIGMM Conference on Multimedia Systems, 2011

Quantifying QoS requirements of network services: a cheat-proof framework.
Proceedings of the Second Annual ACM SIGMM Conference on Multimedia Systems, 2011

Measuring the latency of cloud gaming systems.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

A Mechanism on Risk Analysis of Information Security with Dynamic Assessment.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
Quadrant of euphoria: a crowdsourcing platform for QoE assessment.
IEEE Network, 2010

A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems.
IJAHUC, 2010

Filtering False Messages En-Route in Wireless Multi-Hop Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Firework search for location aided routing enhancement in mobile ad-hoc networks.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

2009
Effect of Network Quality on Player Departure Behavior in Online Games.
IEEE Trans. Parallel Distrib. Syst., 2009

On the challenge and design of transport protocols for MMORPGs.
Multimedia Tools Appl., 2009

Fair anonymous rewarding based on electronic cash.
Journal of Systems and Software, 2009

User authentication scheme with privacy-preservation for multi-server environment.
IEEE Communications Letters, 2009

A prevention approach to scrambling attacks in WiMAX networks.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009

A crowdsourceable QoE evaluation framework for multimedia content.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

Peer-to-Peer Application Recognition Based on Signaling Activity.
Proceedings of IEEE International Conference on Communications, 2009

Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A Generalizable Methodology for Quantifying User Satisfaction.
IEICE Transactions, 2008

A sector-based routing model over structured peer-to-peer networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

A location-ID sensitive key establishment scheme in static wireless sensor networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Detecting VoIP Traffic Based on Human Conversation Patterns.
Proceedings of the Principles, 2008

Inferring Speech Activity from Encrypted Skype Traffic.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters.
Proceedings of the Distributed Computing in Sensor Systems, 2008

An Anonymous and Deniable Conversation for a Thin Client.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Secure multicast in dynamic environments.
Computer Networks, 2007

A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Design and Implementation of Secure Communication Channels over UPnP Networks.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Bounding Peer-to-Peer Upload Traffic in Client Networks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters.
Computer Communications, 2006

Game traffic analysis: An MMORPG perspective.
Computer Networks, 2006

How sensitive are online gamers to network quality?
Commun. ACM, 2006

Quantifying Skype user satisfaction.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Network game design: hints and implications of player interaction.
Proceedings of the 5th Workshop on Network and System Support for Games, 2006

Design Implications of Social Interaction in Online Games.
Proceedings of the Entertainment Computing, 2006

On the Sensitivity of Online Game Playing Time to Network QoS.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

The Impact of Network Variabilities on TCP Clocking Schemes.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Confessible Threshold Ring Signatures.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

A distributed key assignment protocol for secure multicast based on proxy cryptography.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Identifying MMORPG bots: a traffic analysis approach.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2006

An empirical evaluation of TCP performance in online games.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2006

2005
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Game traffic analysis: an MMORPG perspective.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005

Secure Content Delivery using Key Composition.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

The impact of network variabilities on TCP clocking schemes.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

An On-Line Page-Structure Approximation Scheme for Web Proxies.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Secure Multicast Using Proxy Encryption.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs.
Proceedings of the High Performance Computing, 2005

Automatic Generation of Conflict-Free IPsec Policies.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005

2004
An efficient and anonymous buyer-seller watermarking protocol.
IEEE Trans. Image Processing, 2004

A Content-Protection Scheme for Multi-Layered Reselling Structure.
Proceedings of the Security and Protection in Information Processing Systems, 2004

A Session Migration Scheme for Smart Web Services in Mobile Computing.
Proceedings of the International Conference on Internet Computing, 2004

2002
An unlinkably divisible and intention attachable ticket scheme for runoff elections.
J. Network and Computer Applications, 2002

Provably Secure Blind Threshold Signatures Based on Discrete Logarithm.
J. Inf. Sci. Eng., 2002

A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash.
J. Inf. Sci. Eng., 2002

Privacy and Anonymity Protection with Blind Threshold Signatures.
Int. J. Electronic Commerce, 2002

A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting.
Comput. J., 2002

Distributed and On-Line Routing on Tori.
Algorithmica, 2002

2001
A Fully Distributed Approach to Repositories of Reusable Software Components.
J. Inf. Sci. Eng., 2001

Fair blind threshold signatures based on discrete logarithm.
Comput. Syst. Sci. Eng., 2001

2000
Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1999
Anonymous channel and authentication in wireless communications.
Computer Communications, 1999

Partially Blind Threshold signatures Based on Discrete Logarithm.
Computer Communications, 1999

1998
Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting.
Proceedings of the Network-Based Parallel Computing: Communication, 1998

1997
A High Performance Dynamic Token-Based Distributed Synchronization Algorithm.
Proceedings of the 1997 International Symposium on Parallel Architectures, 1997

Competitive Source Routing on Tori and Meshes.
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997

Secure Rewarding Schemes.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

1996
A collision-free secret ballot protocol for computerized general elections.
Computers & Security, 1996

Competitive Analysis of On-Line Disk Scheduling.
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996

Data Prefetching for Distributed Shared Memory Systems.
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996

Blind Threshold Signatures Based on Discrete Logarithm.
Proceedings of the Concurrency and Parallelism, 1996

A Multi-Recastable Ticket Scheme for Electronic Elections.
Proceedings of the Advances in Cryptology, 1996

1995
An Efficient Password Authentication Scheme Based on a Unit Circle.
Cryptologia, 1995

1993
Efficient Parallel Algorithms for Finding the Majority Element.
J. Inf. Sci. Eng., 1993

An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control.
BIT, 1993

1992
A parallel algorithm for finding congruent regions.
Computers & Graphics, 1992

1987
Modalities for Model Checking: Branching Time Logic Strikes Back.
Sci. Comput. Program., 1987

1986
Temporal Reasoning Under Generalized Fairness Constraints.
Proceedings of the STACS 86, 1986

Efficient Model Checking in Fragments of the Propositional Mu-Calculus (Extended Abstract)
Proceedings of the Symposium on Logic in Computer Science (LICS '86), 1986

1985
Modalities for Model Checking: Branching Time Strikes Back.
Proceedings of the Conference Record of the Twelfth Annual ACM Symposium on Principles of Programming Languages, 1985


  Loading...