Wen-Guey Tzeng

Orcid: 0000-0002-0441-5006

According to our database1, Wen-Guey Tzeng authored at least 93 papers between 1989 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing Algorithm.
IEEE Trans. Dependable Secur. Comput., 2022

2021
RL-PMAgg: Robust aggregation for PM2.5 using deep RL-based trust management system.
Internet Things, 2021

A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
RL-Routing: An SDN Routing Algorithm Based on Deep Reinforcement Learning.
IEEE Trans. Netw. Sci. Eng., 2020

A Robust Algorithm for Predicting Attacks Using Collaborative Security Logs.
J. Inf. Sci. Eng., 2020

A Cooperative Game-Theoretic Model in Cloud Storage Auditing.
J. Inf. Sci. Eng., 2020

2019
A light-weight bit commitment protocol based on unpredictable channel noise.
Theor. Comput. Sci., 2019

2018
Phrase Search for Encrypted Cloud Storage.
J. Inf. Sci. Eng., 2018

Privacy-preserving ridge regression on distributed data.
Inf. Sci., 2018

Effective Botnet Detection Through Neural Networks on Convolutional Features.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design.
Proceedings of the Security and Privacy in Communication Networks, 2018

Monsieur Poirot: Detecting Botnets Using Re-Identification Algorithm and Nontrivial Feature Selection Technique.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over ℤ<sub>p</sub>.
J. Inf. Sci. Eng., 2017

Strategy analysis for cloud storage reliability management based on game theory.
J. Comput. Secur., 2017

A secret key establishment protocol for wireless networks using noisy channels.
J. Comput. Secur., 2017

A light-weight oblivious transfer protocol based on channel noise.
Int. J. Comput. Math. Comput. Syst. Theory, 2017

Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members.
Comput. Commun., 2017

The forward-backward string: A new robust feature for botnet detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

An online subject-based spam filter using natural language features.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security.
Proceedings of the Applied Cryptography and Network Security, 2017

2015
An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems.
IEEE Trans. Reliab., 2015

Delegated integrity check for hierarchical cloud data.
J. Comput. Secur., 2015

Unique Signature with Short Output from CDH Assumption.
IACR Cryptol. ePrint Arch., 2015

Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp.
IACR Cryptol. ePrint Arch., 2015

2014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

Preserving user query privacy in cloud-based security services.
J. Comput. Secur., 2014

Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

2013
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
IACR Cryptol. ePrint Arch., 2013

2012
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding.
IEEE Trans. Parallel Distributed Syst., 2012

Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
An Optimal Data Hiding Scheme With Tree-Based Parity Check.
IEEE Trans. Image Process., 2011

A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Secure group key management using uni-directional proxy re-encryption schemes.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Delegable Provable Data Possession for Remote Data in the Clouds.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

2010
A Secure Decentralized Erasure Code for Distributed Networked Storage.
IEEE Trans. Parallel Distributed Syst., 2010

Permutation arrays under the Chebyshev distance.
IEEE Trans. Inf. Theory, 2010

New Secure Broadcasting Scheme Realizing Information Granularity.
J. Inf. Sci. Eng., 2010

2009
Key establishment schemes against storage-bounded adversaries in wireless sensor networks.
IEEE Trans. Wirel. Commun., 2009

Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication.
J. Inf. Sci. Eng., 2009

Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes.
J. Inf. Sci. Eng., 2009

A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
Efficient k-out-of-n Oblivious Transfer Schemes.
J. Univers. Comput. Sci., 2008

Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time.
Proceedings of the Public Key Cryptography, 2008

Efficient encoding and decoding with permutation arrays.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
Cheating Prevention in Visual Cryptography.
IEEE Trans. Image Process., 2007

Optimal resilient threshold GQ signatures.
Inf. Sci., 2007

Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2).
IACR Cryptol. ePrint Arch., 2007

Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.
IACR Cryptol. ePrint Arch., 2007

Efficient Large-Scale Distributed Key Generation against Burst Interruption.
Proceedings of the SECRYPT 2007, 2007

Identity-Based Proxy Re-encryption Without Random Oracles.
Proceedings of the Information Security, 10th International Conference, 2007

2006
Conditional Oblivious Cast.
Proceedings of the Public Key Cryptography, 2006

A secure system for data access based on anonymous authentication and time-dependent hierarchical keys.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
On the Jensen-Shannon Divergence and Variational Distance.
IEEE Trans. Inf. Theory, 2005

Extracting randomness from multiple independent sources.
IEEE Trans. Inf. Theory, 2005

An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2005

A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares.
Des. Codes Cryptogr., 2005

Efficient <i>k</i>-Out-of-<i>n</i> Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries.
Proceedings of the Public Key Cryptography, 2005

Compatible Ideal Contrast Visual Cryptography Schemes with Reversing.
Proceedings of the Information Security, 8th International Conference, 2005

2004
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters.
IEEE Trans. Computers, 2004

Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries.
IACR Cryptol. ePrint Arch., 2004

2003
A Threshold GQ Signature Scheme.
IACR Cryptol. ePrint Arch., 2003

A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy.
Proceedings of the Information Networking, 2003

A Framework of High Confidence E-Healthcare Information System.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

2002
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy.
IEEE Trans. Knowl. Data Eng., 2002

Corrections to "A Secure Fault-Tolerant Conference-Key Agreement Protocol".
IEEE Trans. Computers, 2002

A Secure Fault-Tolerant Conference-Key Agreement Protocol.
IEEE Trans. Computers, 2002

A New Approach for Visual Cryptography.
Des. Codes Cryptogr., 2002

Efficient 1-Out-n Oblivious Transfer Schemes.
Proceedings of the Public Key Cryptography, 2002

Distributed Key Generation as a Component of an Integrated Protocol.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
Authentication of Mobile Users in Third Generation Mobile Systems.
Wirel. Pers. Commun., 2001

Practical and Efficient Electronic Voting Schemes.
J. Inf. Sci. Eng., 2001

Robust key-evolving public key encryption schemes.
IACR Cryptol. ePrint Arch., 2001

Efficient oblivious transfer schemes.
IACR Cryptol. ePrint Arch., 2001

Robust Forward-Secure Signature Schemes with Proactive Security.
Proceedings of the Public Key Cryptography, 2001

2000
A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol.
Proceedings of the Public Key Cryptography, 2000

Round-Efficient Conference Key Agreement Protocols with Provable Security.
Proceedings of the Advances in Cryptology, 2000

1999
A New Graph Invariant for Graph Isomorphism: Probability Propagation Matrix.
J. Inf. Sci. Eng., 1999

Three-Quarter Approximation for the Number of Unused Colors in Graph Coloring.
Inf. Sci., 1999

Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols.
Inf. Process. Lett., 1999

Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations.
Inf. Process. Lett., 1999

1998
An Integrated System for Multilevel Secure Compound Documents.
Proceedings of WebNet 98, 1998

1997
On-Line Algorithms for the Dominating Set Problem.
Inf. Process. Lett., 1997

1996
On Path Equivalence of Nondeterministic Finite Automata.
Inf. Process. Lett., 1996

An access control scheme based on Chinese remainder theorem and time stamp concept.
Comput. Secur., 1996

1992
A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata.
SIAM J. Comput., 1992

Learning Probabilistic Automata and Markov Chains via Queries.
Mach. Learn., 1992

1991
Three Sigma^p_2-Complete Problems in Computational Learning Theory.
Comput. Complex., 1991

1990
Learning String Patterns and Tree Patterns from Examples.
Proceedings of the Machine Learning, 1990

1989
The Equivalence and Learning of Probabilistic Automata (Extended Abstract)
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989


  Loading...