Yu-Chi Chen

Orcid: 0000-0002-5577-0016

According to our database1, Yu-Chi Chen authored at least 90 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy preserving support vector machine based on federated learning for distributed IoT-enabled data analysis.
Comput. Intell., April, 2024

2023
Design and evaluation of a remote synchronous gamified mathematics teaching activity that integrates multi-representational scaffolding and a mind tool for gamified learning.
Educ. Inf. Technol., October, 2023

JEDI: Joint and Effective Privacy Preserving Outsourced Set Intersection and Data Integration Protocols.
IEEE Trans. Inf. Forensics Secur., 2023

Reliable Data Transmission through Private CBRS Networks.
CoRR, 2023

Security analysis of public key encryption with filtered equality test.
Adv. Math. Commun., 2023

Design and evaluation of a simulation business management educational card game combined with dynamic feedback from mobile technology.
Proceedings of the 14th IIAI International Congress on Advanced Applied Informatics, 2023

Design of an Employment Ethics Educational Mobile Game Combined with Realistic Situations.
Proceedings of the 15th International Congress on Advanced Applied Informatics Winter, 2023

A File Verification Scheme Based on Verkle Trees.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

Distributed Privacy-preserving Support Vector Machine Training Scheme on Vertically Partitioned Data.
Proceedings of the 2023 11th International Conference on Computer and Communications Management, 2023

A Secure and IoT-Enabled Data Sharing System Based on IPFS and IOTA Blockchain.
Proceedings of the 5th Blockchain and Internet of Things Conference, 2023

Safety Enhancement for Mobility Scooter with Rule-Based Danger Prevention.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Design and Implementation of Bending Force Sensor Featuring Printed Circuit Board.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2023

2022
SecDT: Privacy-Preserving Outsourced Decision Tree Classification Without Polynomial Forms in Edge-Cloud Computing.
IEEE Trans. Signal Inf. Process. over Networks, 2022

TAGNet: Triplet-Attention Graph Networks for Hashtag Recommendation.
IEEE Trans. Circuits Syst. Video Technol., 2022

Oblivious Access for Decentralized Database Systems: A New Asymmetric Framework from Smart Contracts.
Symmetry, 2022

Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems.
IEEE Syst. J., 2022

RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure.
Sensors, 2022

Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes.
J. Vis. Commun. Image Represent., 2022

A Generic Construction of Designated Verifier Signature from Standard Cryptographic Algorithms.
J. Inf. Sci. Eng., 2022

Quantum-resistant anonymous identity-based encryption with trable identities.
IET Inf. Secur., 2022

Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation.
Comput. J., 2022

Efficient Privacy Preserving Nearest Neighboring Classification from Tree Structures and Secret Sharing.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Decentralized Data Aggregation: A New Secure Framework Based on Lightweight Cryptographic Algorithms.
Wirel. Commun. Mob. Comput., 2021

Using Channel-Wise Attention for Deep CNN Based Real-Time Semantic Segmentation With Class-Aware Edge Information.
IEEE Trans. Intell. Transp. Syst., 2021

Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation.
IACR Cryptol. ePrint Arch., 2021

Quantum-resistant Anonymous IBE with Traceable Identities.
IACR Cryptol. ePrint Arch., 2021

Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System.
IACR Cryptol. ePrint Arch., 2021

Public key encryption with filtered equality test revisited.
Des. Codes Cryptogr., 2021

Measurement of contrast sensitivity in adults by optical grating.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2021

Privacy Preserving Outsourced Data Integration from Inner Product Encryption.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2021

The Utilization of Big Data Analytics on Food Delivery Platforms in Taiwan: Taking Uber Eats and Foodpanda as an Example.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

Automatic Scoring Method of Short-Answer Questions in the Context of Low-Resource Corpora.
Proceedings of the International Conference on Asian Language Processing, 2021

Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
A 7-nm 4-GHz Arm¹-Core-Based CoWoS¹ Chiplet Design for High-Performance Computing.
IEEE J. Solid State Circuits, 2020

Plaintext checkable encryption with check delegation revisited.
Int. J. Ad Hoc Ubiquitous Comput., 2020

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing.
IEEE Access, 2020

A 4-to-18GHz Active Poly Phase Filter Quadrature Clock Generator with Phase Error Correction in 5nm CMOS.
Proceedings of the IEEE Symposium on VLSI Circuits, 2020

Privacy-Preserving Delegation of Decision Tree Classification.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

POSTER: SecretSVM - Secret Sharing-Based SVM for Preventing Collusion in IoT Data Analysis.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract Model.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms.
IEEE Trans. Inf. Forensics Secur., 2019

Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy.
KSII Trans. Internet Inf. Syst., 2019

The optimal combination of feature selection and data discretization: An empirical study.
Inf. Sci., 2019

Witness-based searchable encryption with optimal overhead for cloud-edge computing.
Future Gener. Comput. Syst., 2019

A 7nm 4GHz Arm<sup>®</sup>-core-based CoWoS<sup>®</sup> Chiplet Design for High Performance Computing.
Proceedings of the 2019 Symposium on VLSI Circuits, Kyoto, Japan, June 9-14, 2019, 2019

Lottery DApp from Multi-Randomness Extraction.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

SCDP: Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Real-Time Multi-class Instance Segmentation with One-Time Deep Embedding Clustering.
Proceedings of the Pattern Recognition - 5th Asian Conference, 2019

2018
Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud.
IEEE Access, 2018

A Secure Compressive Sensing-Based Data Gathering System via Cloud Assistance.
IEEE Access, 2018

Plaintext Checkable Encryption with Check Delegation: New Models and Simple Constructions.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018

Oblivious Transfer Protocols Based on Commutative Encryption.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2017
Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure.
IEEE Trans. Inf. Forensics Secur., 2017

Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption.
J. Comput. Syst. Sci., 2017

A social network analysis on elementary student engagement in the networked creation community.
Comput. Educ., 2017

2016
A Framework for Enabling User Preference Profiling through Wi-Fi Logs.
IEEE Trans. Knowl. Data Eng., 2016

Cryptography for Parallel RAM from Indistinguishability Obfuscation.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

A 16nm 256-bit wide 89.6GByte/s total bandwidth in-package interconnect with 0.3V swing and 0.062pJ/bit power in InFO package.
Proceedings of the 2016 IEEE Hot Chips 28 Symposium (HCS), 2016

Mining User Trajectories from Smartphone Data Considering Data Uncertainty.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2016

2015
Encrypted image-based reversible data hiding with public key cryptography from difference expansion.
Signal Process. Image Commun., 2015

Certificateless aggregate signature with efficient verification.
Secur. Commun. Networks, 2015

Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes.
J. Inf. Sci. Eng., 2015

Computation-Trace Indistinguishability Obfuscation and its Applications.
IACR Cryptol. ePrint Arch., 2015

Delegating RAM Computations with Adaptive Soundness and Privacy.
IACR Cryptol. ePrint Arch., 2015

PKE-AET: Public Key Encryption with Authorized Equality Test.
Comput. J., 2015

Reversible Steganographic Method Using Complexity Control and Human Visual System.
Comput. J., 2015

SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks.
Comput. J., 2015

Preventing campus accidents among disabled students.
Artif. Life Robotics, 2015

Application of coastal vegetation to green roofs of residential buildings in Taiwan.
Artif. Life Robotics, 2015

Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET.
Proceedings of the SECRYPT 2015, 2015

2014
Visibility bounds for visual secret sharing based on JND theory.
Multim. Tools Appl., 2014

Encrypted signal-based reversible data hiding with public key cryptosystem.
J. Vis. Commun. Image Represent., 2014

Privacy protection in on-line shopping for electronic documents.
Inf. Sci., 2014

Cryptanalysis of some user identification schemes for distributed computer networks.
Int. J. Commun. Syst., 2014

A New Public Key Encryption with Equality Test.
Proceedings of the Network and System Security - 8th International Conference, 2014

An Improved Visual Cryptography with Cheating Prevention.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Efficient public key encryption with user-friendly keywords search for searchable cloud storage.
Proceedings of the Intelligent Systems and Applications, 2014

A privacy-preserving human tracking scheme in centralized cloud based camera networks.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Privacy Preserving Index for Encrypted Electronic Medical Records.
J. Medical Syst., 2013

Security Analysis of Choi et al.'s Certificateless Short Signature Scheme.
J. Inf. Hiding Multim. Signal Process., 2013

Strong non-repudiation based on certificateless short signatures.
IET Inf. Secur., 2013

Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes.
IACR Cryptol. ePrint Arch., 2013

Visual secret sharing with cheating prevention revisited.
Digit. Signal Process., 2013

2012
Comment on "Cheating Prevention in Visual Cryptography".
IEEE Trans. Image Process., 2012

A Thin Light Flexible Electromechanically Actuated Electret-Based Loudspeaker for Automotive Applications.
IEEE Trans. Ind. Electron., 2012

A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography.
J. Vis. Commun. Image Represent., 2012

2011
On the Security of a Cheating Immune Visual Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2011

On the security models for certificateless signature schemes achieving level 3 security.
IACR Cryptol. ePrint Arch., 2011

2009
A DEP chip with arc-shape microelectrode arrays for the separation of different-size particles.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

2007
A Facial-Skin Condition Classification System Using Texture and Fuzzy C-Means Technologies.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...