Tsu-Yang Wu

Orcid: 0000-0001-8970-2452

According to our database1, Tsu-Yang Wu authored at least 115 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.
EURASIP J. Wirel. Commun. Netw., December, 2023

Privacy-preserving authentication scheme for digital twin-enabled autonomous vehicle environments.
Trans. Emerg. Telecommun. Technol., November, 2023

A secure protocol for patient monitoring in wireless body area networks.
Concurr. Comput. Pract. Exp., 2023

2022
A provably secure lightweight authentication protocol in mobile edge computing environments.
J. Supercomput., 2022

SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing.
Symmetry, 2022

Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments.
Sensors, 2022

Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm.
Sensors, 2022

Transfer learning model for false positive reduction in lymph node detection via sparse coding and deep learning.
J. Intell. Fuzzy Syst., 2022

A deep dynamic neural network model and its application for ECG classification.
J. Intell. Fuzzy Syst., 2022

Simple multi-scale human abnormal behaviour detection based on video.
Int. J. Inf. Comput. Secur., 2022

An intelligent stage light-based actor identification and positioning system.
Int. J. Inf. Comput. Secur., 2022

An adaptive stochastic central force optimisation algorithm for node localisation in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2022

2021
A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2021

Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks.
J. Supercomput., 2021

A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments.
Secur. Commun. Networks, 2021

Improved ECC-Based Three-Factor Multiserver Authentication Scheme.
Secur. Commun. Networks, 2021

Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System.
Secur. Commun. Networks, 2021

A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2021

A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles.
Mob. Inf. Syst., 2021

2020
An efficient algorithm for fuzzy frequent itemset mining.
J. Intell. Fuzzy Syst., 2020

Efficient certificate-based aggregate signature scheme for vehicular <i>ad hoc</i> networks.
IET Networks, 2020

Application of Quantum Genetic Optimization of LVQ Neural Network in Smart City Traffic Network Prediction.
IEEE Access, 2020

An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks.
IEEE Access, 2020

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing.
IEEE Access, 2020

Data Filtering Method for the Optimization of Mobile Positioning Based on Deep Learning.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

A Probability-Based Analytical Model Based on Deep Learning for Traffic Information Estimation.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

2019
A Traffic Prediction Method of Bicycle-sharing based on Long and Short term Memory Network.
J. Netw. Intell., 2019

Node Coverage Optimization Strategy Based on Ions Motion Optimization.
J. Netw. Intell., 2019

Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications.
J. Ambient Intell. Humaniz. Comput., 2019

Human motion recognition based on SVM in VR art media interaction environment.
Hum. centric Comput. Inf. Sci., 2019

Video salient region detection model based on wavelet transform and feature comparison.
EURASIP J. Image Video Process., 2019

A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems.
IEEE Access, 2019

Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments.
IEEE Access, 2019

Multilayer Dense Attention Model for Image Caption.
IEEE Access, 2019

Using Cache Optimization Method to Reduce Network Traffic in Communication Systems Based on Cloud Computing.
IEEE Access, 2019

Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks.
Proceedings of the Genetic and Evolutionary Computing, 2019

Cryptanalysis of an Anonymous Message Authentication Scheme for Smart Grid.
Proceedings of the Genetic and Evolutionary Computing, 2019

A Lightweight Anonymous Mutual Authentication Scheme in Mobile Networks.
Proceedings of the Genetic and Evolutionary Computing, 2019

Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

2018
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags.
J. Supercomput., 2018

Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review.
J. Netw. Intell., 2018

Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol.
J. Inf. Sci. Eng., 2018

Comments on Recent Proposed Cui Et Al.'s KASE and Lu Et Al.'s dIBEKS Schemes.
J. Inf. Hiding Multim. Signal Process., 2018

Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map.
J. Inf. Hiding Multim. Signal Process., 2018

A New Certificate-Based Aggregate Signature Scheme for Wireless Sensor Networks.
J. Inf. Hiding Multim. Signal Process., 2018

A New Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
J. Inf. Hiding Multim. Signal Process., 2018

A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps.
IEEE Access, 2018

Construct Left Ventricular Hypertrophy Prediction Model Based on Random Forest.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

A Public Auditing Scheme with Data Recovery.
Proceedings of the Genetic and Evolutionary Computing, 2018

2017
A Countermeasure to SQL Injection Attack for Cloud Environment.
Wirel. Pers. Commun., 2017

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017

A secure authentication scheme for Internet of Things.
Pervasive Mob. Comput., 2017

A Parse Tree-Based NoSQL Injection Attacks Detection Mechanism.
J. Inf. Hiding Multim. Signal Process., 2017

Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems.
IEEE Access, 2017

A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.
IEEE Access, 2017

Comments on a privacy preserving public auditing mechanism for shared cloud data.
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017

On the Security of a Certificateless Public Key Encryption with Keyword Search.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Efficient Mining of High Average-Utility Itemsets with Multiple Thresholds.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017

Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Genetic and Evolutionary Computing, 2017

Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2017

Updating the Discovered High Average-Utility Patterns with Transaction Insertion.
Proceedings of the Genetic and Evolutionary Computing, 2017

Mining of Multiple Fuzzy Frequent Itemsets with Transaction Insertion.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Comments on Yu et al's Shared Data Integrity Verification Protocol.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

2016
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol.
J. Netw. Intell., 2016

Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps.
J. Inf. Hiding Multim. Signal Process., 2016

Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining.
Eng. Appl. Artif. Intell., 2016

On the Security of a Certificateless Searchable Public Key Encryption Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2016

A Secure Condition-Based Location Authentication Protocol for Mobile Devices.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

Efficient Mining of Fuzzy Frequent Itemsets with Type-2 Membership Functions.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

2015
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks.
J. Univers. Comput. Sci., 2015

MAPMP: A Mutual Authentication Protocol for Mobile Payment.
J. Inf. Hiding Multim. Signal Process., 2015

A provable authenticated group key agreement protocol for mobile environment.
Inf. Sci., 2015

On the Security of a Mutual Authentication and Key Agreement Protocol Based on Chaotic Maps.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Privacy Protection Framework in Social Networked Cars.
Proceedings of the Multidisciplinary Social Networks Research, 2015

Context recognition for adaptive hearing-aids.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2015

A Sanitization Approach of Privacy Preserving Utility Mining.
Proceedings of the Genetic and Evolutionary Computing, 2015

2014
RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE.
Informatica, 2014

Efficient searchable ID-based encryption with a designated server.
Ann. des Télécommunications, 2014

Security Analysis and Improvement of Femtocell Access Control.
Proceedings of the Network and System Security - 8th International Conference, 2014

Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control.
Proceedings of the Multidisciplinary Social Networks Research - International Conference, 2014

Maintenance algorithm for updating the discovered multiple fuzzy frequent itemsets for transaction deletion.
Proceedings of the 2014 International Conference on Machine Learning and Cybernetics, 2014

Towards SQL Injection Attacks Detection Mechanism Using Parse Tree.
Proceedings of the Genetic and Evolutionary Computing, 2014

MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things.
Proceedings of the Genetic and Evolutionary Computing, 2014

Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

Towards Time-Bound Hierarchical Key Management in Cloud Computing.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

2013
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2013

Further analysis of pairing-based traitor tracing schemes for broadcast encryption.
Secur. Commun. Networks, 2013

Provably secure revocable ID-based signature in the standard model.
Secur. Commun. Networks, 2013

Efficient Revocable Multi-Receiver ID-Based Encryption.
Inf. Technol. Control., 2013

Publicly verifiable multi-secret sharing scheme from bilinear pairings.
IET Inf. Secur., 2013

An Efficient Detecting Mechanism for Cross-Site Script Attacks in the Cloud.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

2012
A Revocable ID-based Signcryption Scheme.
J. Inf. Hiding Multim. Signal Process., 2012

Towards scalable key management for secure multicast communication.
Inf. Technol. Control., 2012

Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants.
Informatica, 2012

A Fully Secure Revocable ID-Based Encryption in the Standard Model.
Informatica, 2012

A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants.
Comput. Networks, 2012

Revocable ID-based Signature Scheme with Batch Verifications.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

2011
A pairing-based publicly verifiable secret sharing scheme.
J. Syst. Sci. Complex., 2011

A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks.
J. Inf. Sci. Eng., 2011

Two-round contributory group key exchange protocol for wireless network environments.
EURASIP J. Wirel. Commun. Netw., 2011

2010
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique.
Informatica, 2010

An efficient user authentication and key exchange protocol for mobile client-server environment.
Comput. Networks, 2010

An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices.
Comput. J., 2010

A Novel Convinced Diffie-Hellman Computation Scheme and Its Cryptographic Application.
Proceedings of the Computational Science and Its Applications, 2010

2009
Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings.
Proceedings of the The Forth International Conference on Availability, 2009

2008
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards.
Informatica, 2008

2007
A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007


  Loading...