Yi-Li Huang

According to our database1, Yi-Li Huang authored at least 42 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A Seq2seq-based Model with Global Semantic Context for Scene Text Recognition.
Proceedings of the 2021 Digital Image Computing: Techniques and Applications, 2021

Spatial Aggregation for Scene Text Recognition.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021

2020
A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme.
Concurr. Comput. Pract. Exp., 2020

2018
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments.
IEEE Access, 2018

2017
Square Key Matrix Management Scheme in Wireless Sensor Networks.
Comput. Informatics, 2017

Generating Dynamic Box by Using an Input String.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

A 3D encryption with shifting mapping substitution mechanism.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
TTP Based High-Efficient Multi-Key Exchange Protocol.
IEEE Access, 2016

Random Cladding with Feedback Mechanism for encrypting mobile messages.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Enhancing Security of LTE using a Double Masking Technique.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
A secure data encryption method employing a sequential-logic style mechanism for a cloud system.
Int. J. Web Grid Serv., 2015

A Secure M-Commerce System based on credit card transaction.
Electron. Commer. Res. Appl., 2015

2014
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.
J. Supercomput., 2014

The simulation of an emotional robot implemented with fuzzy logic.
Soft Comput., 2014

Editorial.
Int. J. Commun. Networks Distributed Syst., 2014

Designing A Healthcare Authorization Model Based On Cloud Authentication.
Intell. Autom. Soft Comput., 2014

A true Random-Number Encryption Method employing block cipher and PRNG.
Comput. Sci. Inf. Syst., 2014

A Group File Encryption Method using Dynamic System Environment Key.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

A Secure Mobile Shopping System Based on Credit Card Transaction.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Secure Traffic Control System with Emergency Handling for Ambulances.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A random wrapping encryption method.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
A secure communication over wireless environments by using a data connection core.
Math. Comput. Model., 2013

A secure wireless communication system by integrating RSA and Diffie-Hellman PKDS in 4G environments and an intelligent protection-key chain with a data connection core.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

Building a block cipher mode of operation with feedback keys.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

A True Random-Number Encryption Method.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Block Cipher Mode of Operation with Two Keys.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Handover Scheme for LTE Wireless Networks under the Assistance of GPS.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

The Simulation of a Robot with Emotions Implemented with Fuzzy Logic.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Multiple-Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Improving security level of LTE authentication and key agreement procedure.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Controlling Traffic Lights for Ambulances.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks.
Mob. Inf. Syst., 2011

Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.
J. Univers. Comput. Sci., 2011

Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Verification of a Batch of Bad Signatures by Using the Matrix-Detection Algorithm.
Proceedings of the First International Conference on Data Compression, 2011

A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011


  Loading...