I-En Liao

Orcid: 0000-0003-3895-0485

According to our database1, I-En Liao authored at least 52 papers between 1989 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Implementation of an HSM-Based Smart Meter for Supporting DLMS/COSEM Security Suite 1.
Proceedings of the 8th International Conference on Internet of Things, 2023

Implementing OIML R46 Communication Unit for DLMS/COSEM Security Suite 1 and Passing CTT V3.1 Test.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2023

2020
UCIS-X: An Updatable Compact Indexing Scheme for Efficient Extensible Markup Language Document Updating and Query Evaluation.
IEEE Access, 2020

2019
Anomaly Detection for Industrial Control Systems Using K-Means and Convolutional Autoencoder.
Proceedings of the 2019 International Conference on Software, 2019

2018
An interpretable health behavioral intervention policy for mobile device users.
IBM J. Res. Dev., 2018

2017
A model for aggregation and filtering on encrypted XML streams in fog computing.
Int. J. Distributed Sens. Networks, 2017

2016
An Efficient Ensemble Sequence Classifier.
J. Softw., 2016

2015
Ontology-based library recommender system using MapReduce.
Clust. Comput., 2015

Design of an NGS MicroRNA predictor using multilayer hierarchical MapReduce framework.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015

2014
DPRP: a database of phenotype-specific regulatory programs derived from transcription factor binding data.
Nucleic Acids Res., 2014

miRTarBase update 2014: an information resource for experimentally validated miRNA-target interactions.
Nucleic Acids Res., 2014

Mining Sequential Pattern Changes.
J. Inf. Sci. Eng., 2014

A frequent itemset mining algorithm based on the Principle of Inclusion-Exclusion and transaction mapping.
Inf. Sci., 2014

News Event Detection Using Random Walk with Restart.
Proceedings of the Intelligent Systems and Applications, 2014

2013
Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining.
Inf. Sci., 2013

CIS-X: A compacted indexing scheme for efficient query evaluation of XML documents.
Inf. Sci., 2013

EFilter: An Efficient Filter for Supporting Twig Query Patterns in XML Streams.
Proceedings of the DCNET, ICE-B and OPTICS 2013 - Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Reykjavík, Iceland, 29, 2013

A Sequence Classification Model Based on Pattern Coverage Rate.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage Environment.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Scaling Out Recommender System for Digital Libraries with MapReduce.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

A cloud service for the evaluation of company's financial health using XBRL-based financial statements.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
A new approach for data clustering and visualization using self-organizing maps.
Expert Syst. Appl., 2012

Supporting Efficient XML Query Evaluation Using Double Indexes.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

A Cloud Computing Implementation of XML Indexing Method Using Hadoop.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
An efficient authentication protocol for mobile communications.
Telecommun. Syst., 2011

Reversible Data Hiding Based on Median Difference Histogram.
J. Inf. Sci. Eng., 2011

On the Security of Self-Certified Public Keys.
Int. J. Inf. Secur. Priv., 2011

An improved frequent pattern growth method for mining association rules.
Expert Syst. Appl., 2011

A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2011

Efficient Identity-Based Key Management for Configurable Hierarchical Cloud Computing Environment.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

2010
A library recommender system based on a personal ontology model and collaborative filtering technique for English collections.
Electron. Libr., 2010

An Efficient Indexing and Compressing Scheme for XML Query Processing.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

An indoor location-based service using access points as signal strength data collectors.
Proceedings of the 2010 International Conference on Indoor Positioning and Indoor Navigation, 2010

2009
An index selection method without repeated optimizer estimations.
Inf. Sci., 2009

An Efficient Initialization Scheme for SOM Algorithm Based on Reference Point and Filters.
IEICE Trans. Inf. Syst., 2009

A New Clustering Validity Index for Cluster Analysis Based on a Two-Level SOM.
IEICE Trans. Inf. Syst., 2009

PORE: a personal ontology recommender system for digital libraries.
Electron. Libr., 2009

Detecting rogue access points using client-side bottleneck bandwidth analysis.
Comput. Secur., 2009

Reversible data hiding based on grayscale value histogram with optimal multiple pairs of crests and troughs.
Proceedings of the 2009 International Conference on Information Networking, 2009

Mining Frequent Itemsets by Transaction Decomposition with Itemset Clustering.
Proceedings of The 2009 International Conference on Data Mining, 2009

2008
A new authentication protocol based on pointer forwarding for mobile communications.
Wirel. Commun. Mob. Comput., 2008

Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information.
Inf. Sci., 2008

A traffic load-aware energy efficient protocol for wireless sensor networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

An Evolutionary Classifier Based on Adaptive Resonance Theory Network II and Genetic Algorithm.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2006
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments.
IEEE Trans. Ind. Electron., 2006

A password authentication scheme over insecure networks.
J. Comput. Syst. Sci., 2006

Identity-based deniable authentication protocol from pairings.
Proceedings of the Tenth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2006), 2006

A Personal Ontology Model for Library Recommendation System.
Proceedings of the Digital Libraries: Achievements, 2006

WLAN Location-Aware Application Based on Accumulated Orientation Strength Algorithm.
Proceedings of the Smart Sensing and Context, First European Conference, EuroSSC 2006, 2006

2005
Two attacks on a user friendly remote authentication scheme with smart cards.
ACM SIGOPS Oper. Syst. Rev., 2005

2004
A server assisted authentication protocol for detecting error vectors.
ACM SIGOPS Oper. Syst. Rev., 2004

1989
Incremental Protocol Verfication Using Deductive Database Systems.
Proceedings of the Fifth International Conference on Data Engineering, 1989


  Loading...