Kuei-Fang Hsiao

Orcid: 0000-0002-8342-6909

According to our database1, Kuei-Fang Hsiao authored at least 76 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Blockchain-based solutions for mobile crowdsensing: A comprehensive survey.
Comput. Sci. Rev., November, 2023

An efficient caching security approach for content-centric mobile networks in internet of things systems.
Secur. Priv., 2023

A Survey of DDoS Attacks Detection Schemes in SDN Environment.
Proceedings of the International Conference on Computer, 2023

Profit aware Resource Allocation in Fog Computing: A Stackelberg Game Approach.
Proceedings of the International Conference on Computer, 2023

SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications.
Proceedings of the International Conference on Communications, 2023

A Robust Remote Client Password Authentication Technique for Smart Cities E-Governance Applications.
Proceedings of the International Conference on Communications, 2023

2022
A simulation model to reduce the fuel consumption through efficient road traffic modelling.
Simul. Model. Pract. Theory, 2022

Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment.
Simul. Model. Pract. Theory, 2022

RAKI: A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT.
Proceedings of the IEEE Global Communications Conference, 2022

A Privacy-preserving Data Transmission Protocol with Constant Interactions in E-health.
Proceedings of the IEEE Global Communications Conference, 2022

A Comprehensive Study on Artificial Intelligence and Blockchain Driven Beyond 5G Networks.
Proceedings of the International Conference on Computer, 2022

On the Security of Content key Distribution Framework for DRM systems.
Proceedings of the International Conference on Communications, 2022

An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS.
Proceedings of the International Conference on Communications, 2022

An Efficient Digital Short Signature Scheme using CCM for HC-IoT Environments.
Proceedings of the International Conference on Communications, 2022

On the security of authenticated key agreement schemes for e-healthcare.
Proceedings of the International Conference on Communications, 2022

BeHAutH: A KNN-Based Classification Scheme for Behavior-Based Authentication in Web 3.0.
Proceedings of the International Conference on Communications, 2022

Internet-of-Explainable-Digital-Twins: A Case Study of Versatile Corn Production Ecosystem.
Proceedings of the International Conference on Communications, 2022

2021
Utility-Aware Charging Scheduling for Multiple Mobile Chargers in Large-Scale Wireless Rechargeable Sensor Networks.
IEEE Trans. Sustain. Comput., 2021

Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System.
IEEE J. Sel. Areas Commun., 2021

CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN.
Comput. Networks, 2021

AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE.
IEEE Consumer Electron. Mag., 2021

Blockchain Enabled Electronics Medical System Proposed Framework with Research Directions.
Proceedings of the International Conference on Computer, 2021

Amalgamation of Blockchain and AI to Classify Malicious Behavior of Autonomous Vehicles.
Proceedings of the International Conference on Computer, 2021

SCHOOL: Spectrum Allocation for D2D Communication Enabled HetNet using Stackelberg and Coalition Formation Game.
Proceedings of the International Conference on Computer, 2021

An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee.
Proceedings of the International Conference on Communications, 2021

2020
A novel unsupervised 3D skeleton detection in RGB-D images for video surveillance.
Multim. Tools Appl., 2020

Routing and collision avoidance techniques for unmanned aerial vehicles: Analysis, optimal solutions, and future directions.
Int. J. Commun. Syst., 2020

3T-FASDM: Linear discriminant analysis-based three-tier face anti-spoofing detection model using support vector machine.
Int. J. Commun. Syst., 2020

Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes.
Ad Hoc Sens. Wirel. Networks, 2020

A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2020

SDN based Network Traffic Routing in Vehicular Networks: A Scheme and Simulation Analysis.
Proceedings of the 10th International Conference on Simulation and Modeling Methodologies, 2020

Towards Wearable Sensing Enabled Healthcare Framework for Elderly Patients.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

CPNDD: Content Placement Approach in Content Centric Networking.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Secure Authentication Mechanism for Wireless Sensor Networks.
Proceedings of the International Conference on Computer, 2020

BITS: A Blockchain-driven Intelligent Scheme for Telesurgery System.
Proceedings of the International Conference on Computer, 2020

Parallelization of Global Sequence Alignment on Graphics Processing Unit.
Proceedings of the International Conference on Communications, 2020

HeaL: A blockchain-envisioned signcryption scheme for healthcare IoT ecosystems.
Proceedings of the International Conference on Communications, 2020

2019
Dynamic switch migration with noncooperative game towards control plane scalability in SDN.
Int. J. Commun. Syst., 2019

TACRM: trust access control and resource management mechanism in fog computing.
Hum. centric Comput. Inf. Sci., 2019

Service Management Algorithm-based on Security Monitoring Mechanism for Fog IoT Users in Fog Networks.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Missing Value Imputations by Rule-Based Incomplete Data Fuzzy Modeling.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

False-Locality Attack Detection Using CNN in Named Data Networking.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Anomaly Detection Based on Spatio-Temporal and Sparse Features of Network Traffic in VANETs.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete Logarithm.
Proceedings of the 2019 International Conference on Computer, 2019

2018
Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network.
Int. J. Commun. Syst., 2018

A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

QAIR: Quality Assessment Scheme for Information Retrieval in IoT Infrastructures.
Proceedings of the IEEE Global Communications Conference, 2018

Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Ensuring Privacy and Security in E- Health Records.
Proceedings of the 2018 International Conference on Computer, 2018

2017
An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Commun. Syst., 2017

Energy Optimisation using Distance and Hop-based Transmission (DHBT) in Wireless Sensor Networks - Scheme and Simulation Analysis.
Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, 2017

CITS 2017 general chairs' message.
Proceedings of the International Conference on Computer, 2017

Time efficient dynamic threshold-based load balancing technique for Cloud Computing.
Proceedings of the International Conference on Computer, 2017

Texture-based treatment prediction by automatic liver tumor segmentation on computed tomography.
Proceedings of the International Conference on Computer, 2017

2016
Latent semantic learning with time-series cross correlation analysis for video scene detection and classification.
Multim. Tools Appl., 2016

HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Secure message communication among vehicles using elliptic curve cryptography in smart cities.
Proceedings of the International Conference on Computer, 2016

2015
A new secure and efficient scheme for network mobility management.
Secur. Commun. Networks, 2015

Data modeling mobile augmented reality: integrated mind and body rehabilitation.
Multim. Tools Appl., 2015

Smartphone intelligent applications: a brief review.
Multim. Syst., 2015

Network Selection in Heterogeneous Wireless System Environments.
J. Networks, 2015

Improved IPSec tunnel establishment for 3GPP-WLAN interworking.
Int. J. Commun. Syst., 2015

A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network.
Proceedings of the International Conference on Computer, 2015

Fast 3D symmetric pattern indexing for modeling, tracking and detection of semantic objects.
Proceedings of the International Conference on Computer, 2015

2014
A novel media independent handover-based approach for vertical handover over heterogeneous wireless networks.
Int. J. Commun. Syst., 2014

A SCTP-based Authentication Protocol: SCTPAP.
Proceedings of the DCNET 2014, 2014

A novel vertical handoff decision making algorithm across Heterogeneous Wireless Networks.
Proceedings of the International Conference on Computer, 2014

2013
Using augmented reality for students health - case of combining educational learning with standard fitness.
Multim. Tools Appl., 2013

Image-sensing enabled augmented reality for perceived exertion and cardiorespiratory endurance.
IET Wirel. Sens. Syst., 2013

HIP_IKEv2: A Proposal to Improve Internet Key Exchange Protocol-based on Host Identity Protocol.
Proceedings of the SIMULTECH 2013, 2013

A Kinect-Based System for Golf Beginners' Training.
Proceedings of the Information Technology Convergence, 2013

Enhanced handover architecture in IEEE 802.21-enabled heterogeneous wireless networks.
Proceedings of the International Conference on Computer, 2013

2012
Learning while exercising for science education in augmented reality among adolescents.
Interact. Learn. Environ., 2012

2011
Integrating body language movements in augmented reality learning environment.
Hum. centric Comput. Inf. Sci., 2011

Body Language and Augmented Reality Learning Environment.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

The Development of the AR-Fitness System in Education.
Proceedings of the Edutainment Technologies. Educational Games and Virtual Reality/Augmented Reality Applications, 2011


  Loading...