Yu-Fang Chung
Orcid: 0000-0002-7373-7201
  According to our database1,
  Yu-Fang Chung
  authored at least 65 papers
  between 2002 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2025
An autoencoder-based arithmetic optimization clustering algorithm to enhance principal component analysis to study the relations between industrial market stock indices in real estate.
    
  
    Expert Syst. Appl., 2025
    
  
  2024
Machine learning approaches to identify systemic lupus erythematosus in anti-nuclear antibody-positive patients using genomic data and electronic health records.
    
  
    BioData Min., 2024
    
  
  2021
Machine learning approaches for the genomic prediction of rheumatoid arthritis and systemic lupus erythematosus.
    
  
    BioData Min., 2021
    
  
  2020
    Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
    
  
  2019
    Int. J. Netw. Secur., 2019
    
  
  2018
A hierarchical access control scheme based on Lagrange interpolation for mobile agents.
    
  
    Int. J. Distributed Sens. Networks, 2018
    
  
An Implementation of Interactive Healthy Eating Index and Healthcare System on Mobile Platform in College Student Samples.
    
  
    IEEE Access, 2018
    
  
  2017
    Comput. Electr. Eng., 2017
    
  
  2016
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
    
  
    J. Medical Syst., 2016
    
  
    J. Medical Syst., 2016
    
  
  2014
The Application of RFID Monitoring Technology to Patrol Management System in Petrochemical Industry.
    
  
    Wirel. Pers. Commun., 2014
    
  
The design of authentication key protocol in certificate-free public key cryptosystem.
    
  
    Secur. Commun. Networks, 2014
    
  
    J. Medical Syst., 2014
    
  
Improving Inpatient Fall Prevention Strategies Using Interactive Data Repository Information System.
    
  
    Proceedings of the Nursing Informatics 2014 - East Meets West eSMART+, 2014
    
  
  2013
    J. Medical Syst., 2013
    
  
Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining.
    
  
    Inf. Sci., 2013
    
  
    Expert Syst. Appl., 2013
    
  
    Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
    
  
    Proceedings of the 42nd International Conference on Parallel Processing, 2013
    
  
  2012
    J. Medical Syst., 2012
    
  
A Reliable User Authentication and Key Agreement Scheme for Web-Based Hospital-Acquired Infection Surveillance Information System.
    
  
    J. Medical Syst., 2012
    
  
    J. Medical Syst., 2012
    
  
A Password-Based User Authentication Scheme for the Integrated EPR Information System.
    
  
    J. Medical Syst., 2012
    
  
    J. Medical Syst., 2012
    
  
    J. Medical Syst., 2012
    
  
    J. Medical Syst., 2012
    
  
    J. Medical Syst., 2012
    
  
    J. Medical Syst., 2012
    
  
    Comput. J., 2012
    
  
    Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
    
  
  2011
An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce.
    
  
    Expert Syst. Appl., 2011
    
  
  2010
    Expert Syst. Appl., 2010
    
  
  2009
    J. Syst. Softw., 2009
    
  
    Comput. Stand. Interfaces, 2009
    
  
    Comput. Stand. Interfaces, 2009
    
  
    Comput. Stand. Interfaces, 2009
    
  
    Comput. Stand. Interfaces, 2009
    
  
    Comput. Stand. Interfaces, 2009
    
  
    Comput. Stand. Interfaces, 2009
    
  
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent.
    
  
    Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
    
  
    Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
    
  
An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce.
    
  
    Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
    
  
  2008
    J. Syst. Softw., 2008
    
  
    Inf. Sci., 2008
    
  
    Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
    
  
  2007
    Comput. Stand. Interfaces, 2007
    
  
  2006
    Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006
    
  
    Proceedings of the 2006 Joint Conference on Information Sciences, 2006
    
  
    Proceedings of the 2006 Joint Conference on Information Sciences, 2006
    
  
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
    
  
    Proceedings of the Computational Intelligence and Security, International Conference, 2006
    
  
  2004
    J. Comput. Sci. Technol., 2004
    
  
A practical authenticated encryption scheme based on the elliptic curve cryptosystem.
    
  
    Comput. Stand. Interfaces, 2004
    
  
    Appl. Math. Comput., 2004
    
  
Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme.
    
  
    Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
    
  
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem.
    
  
    Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
    
  
    Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
    
  
  2003
An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy.
    
  
    J. Comput. Sci. Technol., 2003
    
  
    Comput. Secur., 2003
    
  
  2002
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm.
    
  
    Comput. Secur., 2002