Kun-Lin Tsai

Orcid: 0000-0002-1317-6019

According to our database1, Kun-Lin Tsai authored at least 51 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Content-aware malicious webpage detection using convolutional neural network.
Multim. Tools Appl., January, 2024

2023
A Deep Learning based Sustainable Energy Scheduling System.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2021
Data Retention-Based Low Leakage Power TCAM for Network Packet Routing.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

Accuracy-Configurable Radix-4 Adder With a Dynamic Output Modification Scheme.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

A Fault Tolerant Mechanism for UE Authentication in 5G Networks.
Mob. Networks Appl., 2021

Secure LoRaWAN Root Key Update Scheme for IoT Environment.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

2020
A channel assignment scheme for MIMO on concentric-hexagon-based multi-channel wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2020

Low-power ternary content-addressable memory design based on a voltage self-controlled fin field-effect transistor segment.
Comput. Electr. Eng., 2020

Secure Session Key Generation Method for LoRaWAN Servers.
IEEE Access, 2020

Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks.
IEEE Access, 2020

IoT Device Power Management Based on PSM and EDRX Mechanisms.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

2019
E-ANDSF-Based Base Station Selection Scheme by Using MLP in Untrusted Environments.
IEEE Trans. Ind. Informatics, 2019

Low-Power AES Data Encryption Architecture for a LoRaWAN.
IEEE Access, 2019

LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

A LoRaWAN Based Energy Efficient Data Encryption Method.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

2018
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments.
IEEE Access, 2018

MIH-Based eNB Selection for Untrusted Networks.
Proceedings of the Wireless Internet - 11th EAI International Conference, 2018

Self-parameter Based Bilateral Session Key Exchange Method.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2017
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques.
IEEE Syst. J., 2017

Secure data-sharing using distributed environmental matching keys.
Pervasive Mob. Comput., 2017

A Light Weight Data Encryption Method for WSN Communication.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

2016
Using fuzzy logic to reduce ping-pong handover effects in LTE networks.
Soft Comput., 2016

An ECC-based secure EMR transmission system with data leakage prevention scheme.
Int. J. Comput. Math., 2016

Data Encryption Method Using Environmental Secret Key with Server Assistance.
Intell. Autom. Soft Comput., 2016

Residence Energy Control System Based on Wireless Smart Socket and IoT.
IEEE Access, 2016

TTP Based High-Efficient Multi-Key Exchange Protocol.
IEEE Access, 2016

Cloud Encryption Using Distributed Environmental Keys.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Device Parameter based Secure User Authentication.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Secure Power Management Scheme for WSN.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Power and Area Efficiency NoC Router Design for Application-Specific SoC by Using Buffer Merging and Resource Sharing.
ACM Trans. Design Autom. Electr. Syst., 2014

Automatic Charge Balancing Content Addressable Memory With Self-control Mechanism.
IEEE Trans. Circuits Syst. I Regul. Pap., 2014

A Secure ECC-based Electronic Medical Record System.
J. Internet Serv. Inf. Secur., 2014

A Group File Encryption Method using Dynamic System Environment Key.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
Low Leakage TCAM for IP Lookup Using Two-Side Self-Gating.
IEEE Trans. Circuits Syst. I Regul. Pap., 2013

A Fast Power Estimation Method for Content Addressable Memory by Using SystemC Simulation Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A low power detection routing method for bufferless NoC.
Proceedings of the International Symposium on Quality Electronic Design, 2013

2011
Design of timing-error-resilient systolic arrays for matrix multiplication.
Proceedings of the International SoC Design Conference, 2011

A priority based output arbiter for NoC router.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

2010
Distinguishable error detection method for Network on Chip.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

A Takagi-Sugeno fuzzy-model-based modeling method.
Proceedings of the FUZZ-IEEE 2010, 2010

2009
LMI-based fuzzy control for a class of time-delay discrete fuzzy bilinear system.
Proceedings of the FUZZ-IEEE 2009, 2009

2008
A low power high performance design for JPEG Huffman decoder.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

2006
Low power scheduling method using multiple supply voltages.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

2005
Bipartitioning and encoding in low-power pipelined circuits.
ACM Trans. Design Autom. Electr. Syst., 2005

A low power scheduling method using dual V<sub>dd</sub> and dual V<sub>th</sub>.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

2003
State Reordering for Low Power Combinational Logic.
Proceedings of the Advances in Computer Systems Architecture, 2003

2001
A bipartition-codec architecture to reduce power in pipelinedcircuits.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2001

Synthesis of partition-codec architecture for low power and small area circuit design.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001

An entropy-based algorithm to reduce area overhead for bipartition-codec architecture.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001

2000
An effective output-oriented algorithm for low power multipartition architecture.
Proceedings of the 2000 7th IEEE International Conference on Electronics, 2000


  Loading...