Po-Wen Chi

Orcid: 0000-0001-5663-078X

According to our database1, Po-Wen Chi authored at least 29 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Privacy-Preserving Zero-Knowledge Proof for Blockchain.
IEEE Access, 2023

A Revocation Key-based Approach Towards Efficient Federated Unlearning.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

Privacy Preserving Provable Data Possession: A FHE-based Hash Approach.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
SandboxNet: A Learning-Based Malicious Application Detection Framework in SDN Networks.
J. Inf. Sci. Eng., 2022

Building a Privacy-Preserving Blockchain-Based Bidding System: A Crypto Approach.
IEEE Access, 2022

LED: Learnable Encryption with Deniability.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

2021
Deniable search of encrypted cloud-storage data.
J. Inf. Secur. Appl., 2021

Do not ask me what I am looking for: Index deniable encryption.
Future Gener. Comput. Syst., 2021

Multi-Level Privacy Preserving K-Anonymity.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2020
How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability.
IEEE Access, 2020

SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking.
Proceedings of the International Computer Symposium, 2020

2019
Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems.
Sensors, 2019

MigrateSDN: efficient approach to integrate OpenFlow networks with STP-enabled networks.
Int. J. Comput. Sci. Eng., 2019

Blurring Political Leanings of Messages on Social Networks Using Deniable Steganography.
IEEE Access, 2019

Learnable Audio Encryption for Untrusted Outsourcing Machine Learning Services.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Audit-Free Cloud Storage via Deniable Attribute-Based Encryption.
IEEE Trans. Cloud Comput., 2018

SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service.
Future Gener. Comput. Syst., 2018

Dynamic Key Management Scheme in IoT.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

A Lightweight Compound Defense Framework Against Injection Attacks in IIoT.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
SDUDP: A Reliable UDP-Based Transmission Protocol Over SDN.
IEEE Access, 2017

2016
OpenE2EQoS: Meter-based method for end-to-end QoS of multimedia services over SDN.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

SDN storage: A stream-based storage system over software-defined networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

SDNort: A Software Defined Network Testing Framework Using Openflow.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
How to detect a compromised SDN switch.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Efficient NFV deployment in data center networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Give me a broadcast-free network.
Proceedings of the IEEE Global Communications Conference, 2014

2011
Fast Uncontrolled Handover scheme for WiMAX: infrastructure networks.
Int. J. Auton. Adapt. Commun. Syst., 2011

2009
A prevention approach to scrambling attacks in WiMAX networks.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

2008
Fast uncontrolled handover scheme for WiMAX infrastructure networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008


  Loading...