default search action
Chin-Laung Lei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j62]Yi-Ting Peng, Chin-Laung Lei:
Using Bidirectional Encoder Representations from Transformers (BERT) to predict criminal charges and sentences from Taiwanese court judgments. PeerJ Comput. Sci. 10: e1841 (2024) - [c87]Jian-Syue Huang, Tsung-Han Liu, Yi-Hsien Chen, Hsuan-Yu Peng, Tse-Wei Huang, Chin-Laung Lei, Chun-Ying Huang:
Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the Hypervisor. CCSW@CCS 2024: 66-79 - 2023
- [j61]Meng-Han Tsai, Chia-Ching Lin, Zheng-Gang He, Wei-Chieh Yang, Chin-Laung Lei:
PowerDP: De-Obfuscating and Profiling Malicious PowerShell Commands With Multi-Label Classifiers. IEEE Access 11: 256-270 (2023) - [j60]Yi-Hsien Chen, Si-Chen Lin, Szu-Chun Huang, Chin-Laung Lei, Chun-Ying Huang:
Guided Malware Sample Analysis Based on Graph Neural Networks. IEEE Trans. Inf. Forensics Secur. 18: 4128-4143 (2023) - 2022
- [j59]Shu-Ping Lu, Chin-Laung Lei, Cheng-Yun Ho, Shy-Shang Hwang, Hsin-Chen Chen:
Distributed Ledger Technology Based Architecture for Decentralized Device-to-Device Communication Network. IEEE Access 10: 92006-92022 (2022) - [j58]Chung-Kuan Chen, Si-Chen Lin, Szu-Chun Huang, Yung-Tien Chu, Chin-Laung Lei, Chun-Ying Huang:
Building Machine Learning-based Threat Hunting System from Scratch. DTRAP 3(3): 20:1-20:21 (2022) - 2021
- [j57]Yun-Hsin Chuang, Chin-Laung Lei:
PUF Based Authenticated Key Exchange Protocol for IoT Without Verifiers and Explicit CRPs. IEEE Access 9: 112733-112743 (2021) - [j56]Yun-Hsin Chuang, Chin-Laung Lei:
An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey. Int. J. Commun. Syst. 34(1) (2021) - [j55]Yun-Hsin Chuang, Chin-Laung Lei, Hung-Jr Shiu:
How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security. Symmetry 13(9): 1629 (2021) - [j54]Chia-Ching Lin, Hsin-Li Chu, Yu-Chiang Frank Wang, Chin-Laung Lei:
Joint Feature Disentanglement and Hallucination for Few-Shot Image Classification. IEEE Trans. Image Process. 30: 9245-9258 (2021) - 2020
- [c86]Yun-Hsin Chuang, Chin-Laung Lei, Hung-Jr Shiu:
Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines. AsiaJCIS 2020: 66-73 - [c85]Yi-Hsien Chen, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, Chun-Ying Huang:
POSTER: Construct macOS Cyber Range for Red/Blue Teams. AsiaCCS 2020: 934-936 - [i1]Chih-Fan Hsu, Chia-Ching Lin, Ting-Yang Hung, Chin-Laung Lei, Kuan-Ta Chen:
A Detailed Look At CNN-based Approaches In Facial Landmark Detection. CoRR abs/2005.08649 (2020)
2010 – 2019
- 2019
- [j53]Yi-Cheng Tsai, Mu-En Wu, Jia-Hao Syu, Chin-Laung Lei, Chung-Shu Wu, Jan-Ming Ho, Chuan-Ju Wang:
Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets. IEEE Access 7: 32061-32071 (2019) - [j52]Chin-Laung Lei, Yun-Hsin Chuang:
Privacy Protection for Telecare Medicine Information Systems with Multiple Servers Using a Biometric-based Authenticated Key Agreement Scheme. IEEE Access 7: 186480-186490 (2019) - [j51]Po-Wen Chi, Ming-Hung Wang, Jing-Wei Guo, Chin-Laung Lei:
MigrateSDN: efficient approach to integrate OpenFlow networks with STP-enabled networks. Int. J. Comput. Sci. Eng. 20(4): 480-491 (2019) - [j50]Chih-Fan Hsu, Yu-Shuen Wang, Chin-Laung Lei, Kuan-Ta Chen:
Look at Me! Correcting Eye Gaze in Live Video Communication. ACM Trans. Multim. Comput. Commun. Appl. 15(2): 38:1-38:21 (2019) - [c84]Chia-Ching Lin, Yu-Chiang Frank Wang, Chin-Laung Lei, Kuan-Ta Chen:
Semantics-Guided Data Hallucination for Few-Shot Visual Classification. ICIP 2019: 3302-3306 - 2018
- [j49]Chien-Ting Kuo, Po-Wen Chi, Victor Chang, Chin-Laung Lei:
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service. Future Gener. Comput. Syst. 86: 1424-1436 (2018) - [j48]Ming-Hung Wang, Chin-Laung Lei:
SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events. J. Inf. Sci. Eng. 34(6): 1579-1598 (2018) - [j47]Po-Wen Chi, Chin-Laung Lei:
Audit-Free Cloud Storage via Deniable Attribute-Based Encryption. IEEE Trans. Cloud Comput. 6(2): 414-427 (2018) - [j46]Hong-Bin Tsai, Chin-Laung Lei:
Time-shift replacement algorithm for main memory performance optimization. J. Supercomput. 74(6): 2729-2746 (2018) - [c83]Albert Guan, Chin-Laung Lei:
Efficient Key Agreement Protocol for Smart Sensors. DSC 2018: 1-7 - [c82]Ming-Hung Wang, Meng-Han Tsai, Wei-Chieh Yang, Chin-Laung Lei:
Infection categorization using deep autoencoder. INFOCOM Workshops 2018: 1-2 - [c81]Meng-Han Tsai, Ming-Hung Wang, Wei-Chieh Yang, Chin-Laung Lei:
Uncovering Internal Threats Based on Open-Source Intelligence. ICS 2018: 618-624 - [c80]Chih-Fan Hsu, Yu-Cheng Chen, Yu-Shuen Wang, Chin-Laung Lei, Kuan-Ta Chen:
Realizing the real-time gaze redirection system with convolutional neural network. MMSys 2018: 509-512 - 2017
- [j45]Ming-Hung Wang, Lung-Wen Chen, Po-Wen Chi, Chin-Laung Lei:
SDUDP: A Reliable UDP-Based Transmission Protocol Over SDN. IEEE Access 5: 5904-5916 (2017) - [j44]Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, Chin-Laung Lei:
Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan. Comput. J. 60(11): 1675-1686 (2017) - [j43]Hung-Jr Shiu, Bor-Shing Lin, Chien-Hung Huang, Pei-Ying Chiang, Chin-Laung Lei:
Preserving privacy of online digital physiological signals using blind and reversible steganography. Comput. Methods Programs Biomed. 151: 159-170 (2017) - [j42]Ming-Hung Wang, Hanchi Wang, You-Ru Chen, Chin-Laung Lei:
Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine. Secur. Commun. Networks 2017: 7819590:1-7819590:11 (2017) - [j41]Hung-Jr Shiu, Bor-Shing Lin, Chia-Wei Cheng, Chien-Hung Huang, Chin-Laung Lei:
High-Capacity Data-Hiding Scheme on Synthesized Pitches Using Amplitude Enhancement - A New Vision of Non-Blind Audio Steganography. Symmetry 9(6): 92 (2017) - [c79]Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang, Chin-Laung Lei:
Data Hiding on Social Media Communications Using Text Steganography. CRiSIS 2017: 217-224 - [c78]Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Wei-Chou Lai, Chien-Hung Huang, Chin-Laung Lei:
A Stereo Audio Steganography by Inserting Low-Frequency and Octave Equivalent Pure Tones. ECC 2017: 244-253 - [c77]Chih-Fan Hsu, Anthony Chen, Cheng-Hsin Hsu, Chun-Ying Huang, Chin-Laung Lei, Kuan-Ta Chen:
Is Foveated Rendering Perceivable in Virtual Reality?: Exploring the Efficiency and Consistency of Quality Assessment Methods. ACM Multimedia 2017: 55-63 - [c76]Hong-Bin Tsai, Chin-Laung Lei:
A page replacement algorithm based on frequency derived from reference history. SAC 2017: 1522-1527 - 2016
- [c75]Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei, Nen-Fu Huang:
SDNort: A Software Defined Network Testing Framework Using Openflow. AsiaJCIS 2016: 100-107 - [c74]Ming-Hung Wang, Chin-Laung Lei:
Boosting election prediction accuracy by crowd wisdom on social forums. CCNC 2016: 348-353 - [c73]Ming-Hung Wang, Po-Wen Chi, Jing-Wei Guo, Chin-Laung Lei:
SDN storage: A stream-based storage system over software-defined networks. INFOCOM Workshops 2016: 598-599 - 2015
- [j40]Hyi-Cheng Tsai, Chin-Laung Lei, Jan-Ming Ho, Ming-Yang Kao, Szu-Lang Liao:
Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing. J. Inf. Sci. Eng. 31(3): 925-942 (2015) - [c72]He-Ming Ruan, Ming-Hwa Tsai, Yennun Huang, Yen-Hua Liao, Chin-Laung Lei:
Discovery of De-identification Policies Considering Re-identification Risks and Information Loss. AsiaJCIS 2015: 69-76 - [c71]Po-Wen Chi, Yu-Cheng Huang, Chin-Laung Lei:
Efficient NFV deployment in data center networks. ICC 2015: 5290-5295 - [c70]Po-Wen Chi, Chien-Ting Kuo, Jing-Wei Guo, Chin-Laung Lei:
How to detect a compromised SDN switch. NetSoft 2015: 1-6 - [c69]Ming-Hung Wang, Chin-Laung Lei:
Modelling Polarity of Articles and Identifying Influential Authors through Social Movements. SMC 2015: 1664-1669 - 2014
- [j39]Hung-Jr Shiu, S. Y. Tang, Chien-Hung Huang, Richard C. T. Lee, Chin-Laung Lei:
A reversible acoustic data hiding method based on analog modulation. Inf. Sci. 273: 233-246 (2014) - [c68]He-Ming Ruan, Chin-Laung Lei:
Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage. AsiaJCIS 2014: 156-163 - [c67]Po-Wen Chi, Yu-Cheng Huang, Jing-Wei Guo, Chin-Laung Lei:
Give me a broadcast-free network. GLOBECOM 2014: 1968-1973 - [c66]Ming-Hung Wang, Chin-Laung Lei:
Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies. ICS 2014: 335-344 - [c65]He-Ming Ruan, Gan Wei Yeap, Chin-Laung Lei:
Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure. ICS 2014: 894-903 - [c64]Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, Chin-Laung Lei:
A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line. ICS 2014: 994-1001 - 2013
- [j38]Jiunn-Jye Lee, Hann-Huei Chiou, Chia-Chang Hsu, Chin-Laung Lei:
An adaptive sector-based routing model over structured peer-to-peer networks. Comput. Networks 57(4): 887-896 (2013) - [j37]Yu-Shian Chen, Chin-Laung Lei:
Aggregate message authentication codes (AMACs) with on-the-fly verification. Int. J. Inf. Sec. 12(6): 495-504 (2013) - [j36]Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Laung Lei:
Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework. IEEE Trans. Multim. 15(5): 1121-1137 (2013) - [c63]Ming-Hung Wang, Kuan-Ta Chen, Shuo-Yang Wang, Chin-Laung Lei:
Understanding Potential MicrotaskWorkers for Paid Crowdsourcing. HCOMP (Works in Progress / Demos) 2013 - [c62]Jing-Kai Lou, Kunwoo Park, Meeyoung Cha, Juyong Park, Chin-Laung Lei, Kuan-Ta Chen:
Gender swapping and user behaviors in online social games. WWW 2013: 827-836 - 2012
- [j35]Chien-Hua Chiu, Chin-Laung Lei:
A decentralized clustering scheme for transparent mode devices. Clust. Comput. 15(3): 265-279 (2012) - [j34]Yu-Chun Chang, Chi-Jui Chang, Kuan-Ta Chen, Chin-Laung Lei:
Radar chart: scanning for satisfactory QoE in QoS dimensions. IEEE Netw. 26(4): 25-31 (2012) - [c61]Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, Chin-Laung Lei:
An Analysis of Security Patch Lifecycle Using Google Trend Tool. AsiaJCIS 2012: 31-34 - [c60]He-Ming Ruan, Yu-Shian Chen, Chin-Laung Lei:
Data Integrity on Remote Storage for On-line Co-working. AsiaJCIS 2012: 92-99 - [c59]Yi-Cheng Tsai, Zheng-Hui Chen, Jan-Ming Ho, Ming-Yang Kao, Chin-Laung Lei, Szu-Lang Liao:
Closed-form mortgage pricing formula with outstanding principal as prepayment value. CIFEr 2012: 1-7 - [c58]Yeng-Ting Lee, Kuan-Ta Chen, Han-I Su, Chin-Laung Lei:
Are all games equally cloud-gaming-friendly? An electromyographic approach. NetGames 2012: 1-6 - [c57]Jing-Kai Lou, Kuan-Ta Chen, Hwai-Jung Hsu, Chin-Laung Lei:
Forecasting online game addictiveness. NetGames 2012: 1-6 - 2011
- [j33]Chien-Ju Ho, Chen-Chi Wu, Kuan-Ta Chen, Chin-Laung Lei:
DevilTyper: a game for CAPTCHA usability evaluation. Comput. Entertain. 9(1): 3:1-3:14 (2011) - [j32]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
Robust authentication and key agreement scheme preserving the privacy of secret key. Comput. Commun. 34(3): 274-280 (2011) - [j31]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
Provably secure and efficient identification and key agreement protocol with user anonymity. J. Comput. Syst. Sci. 77(4): 790-798 (2011) - [c56]Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei, Shih-Jen Chen:
A Mechanism on Risk Analysis of Information Security with Dynamic Assessment. INCoS 2011: 643-646 - [c55]Kuan-Ta Chen, Yu-Chun Chang, Po-Han Tseng, Chun-Ying Huang, Chin-Laung Lei:
Measuring the latency of cloud gaming systems. ACM Multimedia 2011: 1269-1272 - [c54]Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, Chin-Laung Lei:
Quantifying QoS requirements of network services: a cheat-proof framework. MMSys 2011: 81-92 - [c53]Yeng-Ting Lee, Kuan-Ta Chen, Yun-Maw Cheng, Chin-Laung Lei:
World of warcraft avatar history dataset. MMSys 2011: 123-128 - 2010
- [j30]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems. Int. J. Ad Hoc Ubiquitous Comput. 6(3): 183-190 (2010) - [j29]Kuan-Ta Chen, Chi-Jui Chang, Chen-Chi Wu, Yu-Chun Chang, Chin-Laung Lei:
Quadrant of euphoria: a crowdsourcing platform for QoE assessment. IEEE Netw. 24(2): 28-35 (2010) - [c52]Jing-Kai Lou, Shou-De Lin, Kuan-Ta Chen, Chin-Laung Lei:
What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information. ASONAM 2010: 56-63 - [c51]Chia-Chang Hsu, Chin-Laung Lei:
Firework search for location aided routing enhancement in mobile ad-hoc networks. MOBIWAC 2010: 121-124 - [c50]Yu-Shian Chen, Chin-Laung Lei:
Filtering False Messages En-Route in Wireless Multi-Hop Networks. WCNC 2010: 1-6
2000 – 2009
- 2009
- [j28]Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Chin-Laung Lei, Wen-Chin Chen:
Identifying MMORPG Bots: A Traffic Analysis Approach. EURASIP J. Adv. Signal Process. 2009 (2009) - [j27]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
User authentication scheme with privacy-preservation for multi-server environment. IEEE Commun. Lett. 13(2): 157-159 (2009) - [j26]Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, Chin-Laung Lei:
Fair anonymous rewarding based on electronic cash. J. Syst. Softw. 82(7): 1168-1176 (2009) - [j25]Chen-Chi Wu, Kuan-Ta Chen, Chih-Ming Chen, Polly Huang, Chin-Laung Lei:
On the challenge and design of transport protocols for MMORPGs. Multim. Tools Appl. 45(1-3): 7-32 (2009) - [j24]Kuan-Ta Chen, Polly Huang, Chin-Laung Lei:
Effect of Network Quality on Player Departure Behavior in Online Games. IEEE Trans. Parallel Distributed Syst. 20(5): 593-606 (2009) - [c49]Jing-Kai Lou, Kuan-Ta Chen, Chin-Laung Lei:
A Collusion-Resistant Automation Scheme for Social Moderation Systems. CCNC 2009: 1-5 - [c48]Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, Wen-Chi Tsai:
Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks. GLOBECOM 2009: 1-6 - [c47]Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Laung Lei:
Peer-to-Peer Application Recognition Based on Signaling Activity. ICC 2009: 1-5 - [c46]Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, Chin-Laung Lei:
A crowdsourceable QoE evaluation framework for multimedia content. ACM Multimedia 2009: 491-500 - [c45]Chen-Chi Wu, Kuan-Ta Chen, Chun-Ying Huang, Chin-Laung Lei:
An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger. NOSSDAV 2009: 97-102 - [c44]Po-Wen Chi, Chin-Laung Lei:
A prevention approach to scrambling attacks in WiMAX networks. WOWMOM 2009: 1-8 - 2008
- [j23]Te-Yuan Huang, Kuan-Ta Chen, Polly Huang, Chin-Laung Lei:
A Generalizable Methodology for Quantifying User Satisfaction. IEICE Trans. Commun. 91-B(5): 1260-1268 (2008) - [c43]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
An Anonymous and Deniable Conversation for a Thin Client. AINA Workshops 2008: 416-421 - [c42]Yu-Shian Chen, I-Lun Lin, Chin-Laung Lei, Yen-Hua Liao:
Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters. DCOSS 2008: 99-111 - [c41]Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, Chin-Laung Lei:
Inferring Speech Activity from Encrypted Skype Traffic. GLOBECOM 2008: 2143-2147 - [c40]Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Laung Lei:
Detecting VoIP Traffic Based on Human Conversation Patterns. IPTComm 2008: 280-295 - [c39]Li Chen, Chia-Chang Hsu, Chin-Laung Lei:
A location-ID sensitive key establishment scheme in static wireless sensor networks. Mobility Conference 2008: 102 - [c38]Jiunn-Jye Lee, Hann-Huei Chiou, Yu-Sheng Yang, Yu-Cheng Su, Chin-Laung Lei:
A sector-based routing model over structured peer-to-peer networks. Mobility Conference 2008: 103 - [e1]Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee:
Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings. Lecture Notes in Computer Science 5222, Springer 2008, ISBN 978-3-540-85884-3 [contents] - 2007
- [j22]Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei:
Secure multicast in dynamic environments. Comput. Networks 51(10): 2805-2817 (2007) - [c37]Chun-Ying Huang, Chin-Laung Lei:
Bounding Peer-to-Peer Upload Traffic in Client Networks. DSN 2007: 759-769 - [c36]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. EUC Workshops 2007: 728-744 - [c35]Jiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-Laung Lei:
Design and Implementation of Secure Communication Channels over UPnP Networks. MUE 2007: 307-312 - [c34]Ren-Chiun Wang, Wen-Shenq Juang, Chen-Chi Wu, Chin-Laung Lei:
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments. MUE 2007: 313-318 - 2006
- [j21]Kuan-Ta Chen, Polly Huang, Chin-Laung Lei:
How sensitive are online gamers to network quality? Commun. ACM 49(11): 34-38 (2006) - [j20]Kuan-Ta Chen, Polly Huang, Chin-Laung Lei:
Game traffic analysis: An MMORPG perspective. Comput. Networks 50(16): 3002-3023 (2006) - [j19]Pan-Lung Tsai, Chin-Laung Lei:
Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters. Comput. Commun. 29(16): 3170-3181 (2006) - [c33]Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Chin-Laung Lei, Wen-Chin Chen:
Identifying MMORPG bots: a traffic analysis approach. Advances in Computer Entertainment Technology 2006: 4 - [c32]Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei:
An empirical evaluation of TCP performance in online games. Advances in Computer Entertainment Technology 2006: 5 - [c31]Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei:
A distributed key assignment protocol for secure multicast based on proxy cryptography. AsiaCCS 2006: 359 - [c30]Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei:
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. DSN 2006: 403-412 - [c29]Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, Chin-Laung Lei:
Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering. ICSNC 2006: 7 - [c28]Yu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, Chun-Ying Huang:
Confessible Threshold Ring Signatures. ICSNC 2006: 25 - [c27]Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei:
The Impact of Network Variabilities on TCP Clocking Schemes. INFOCOM 2006 - [c26]Kuan-Ta Chen, Polly Huang, Guo-Shiuan Wang, Chun-Ying Huang, Chin-Laung Lei:
On the Sensitivity of Online Game Playing Time to Network QoS. INFOCOM 2006 - [c25]Kuan-Ta Chen, Chin-Laung Lei:
Design Implications of Social Interaction in Online Games. ICEC 2006: 318-321 - [c24]Kuan-Ta Chen, Chin-Laung Lei:
Network game design: hints and implications of player interaction. NETGAMES 2006: 17 - [c23]Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei:
Quantifying Skype user satisfaction. SIGCOMM 2006: 399-410 - 2005
- [c22]Chi-Lan Chang, Yun-Peng Chiu, Chin-Laung Lei:
Automatic Generation of Conflict-Free IPsec Policies. FORTE 2005: 233-246 - [c21]Pan-Lung Tsai, Chun-Ying Huang, Yun-Yin Huang, Chia-Chang Hsu, Chin-Laung Lei:
A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs. HiPC 2005: 432-443 - [c20]Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang:
Secure Multicast Using Proxy Encryption. ICICS 2005: 280-290 - [c19]Jiunn-Jye Lee, Chin-Laung Lei:
An On-Line Page-Structure Approximation Scheme for Web Proxies. ICPADS (2) 2005: 669-673 - [c18]Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei:
The impact of network variabilities on TCP clocking schemes. INFOCOM 2005: 2770-2775 - [c17]Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann-Huei Chiou, Chin-Laung Lei:
Secure Content Delivery using Key Composition. LCN 2005: 484-485 - [c16]Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei:
Game traffic analysis: an MMORPG perspective. NOSSDAV 2005: 19-24 - [c15]Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai:
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. PRDC 2005: 133-139 - 2004
- [j18]Chin-Laung Lei, Pei-Ling Yu, Pan-Lung Tsai, Ming-Hwa Chan:
An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 13(12): 1618-1626 (2004) - [c14]Pan-Lung Tsai, Chin-Laung Lei:
A Session Migration Scheme for Smart Web Services in Mobile Computing. International Conference on Internet Computing 2004: 846-852 - [c13]Pei-Ling Yu, Pan-Lung Tsai, Chin-Laung Lei:
A Content-Protection Scheme for Multi-Layered Reselling Structure. SEC 2004: 339-350 - 2002
- [j17]Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen:
Distributed and On-Line Routing on Tori. Algorithmica 32(4): 562-593 (2002) - [j16]Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw:
A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. Comput. J. 45(6): 672-682 (2002) - [j15]Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw:
Privacy and Anonymity Protection with Blind Threshold Signatures. Int. J. Electron. Commer. 7(2): 143-157 (2002) - [j14]Chin-Laung Lei, Wen-Shenq Juang, Pei-Ling Yu:
Provably Secure Blind Threshold Signatures Based on Discrete Logarithm. J. Inf. Sci. Eng. 18(1): 23-39 (2002) - [j13]Chun-I Fan, Chin-Laung Lei:
A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash. J. Inf. Sci. Eng. 18(1): 47-58 (2002) - [j12]Chun-I Fan, Chin-Laung Lei:
An unlinkably divisible and intention attachable ticket scheme for runoff elections. J. Netw. Comput. Appl. 25(2): 93-107 (2002) - 2001
- [j11]Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw:
Fair blind threshold signatures based on discrete logarithm. Comput. Syst. Sci. Eng. 16(6): 371-379 (2001) - [j10]Yuen-Chang Sun, Ming-Lin Kao, Chin-Laung Lei:
A Fully Distributed Approach to Repositories of Reusable Software Components. J. Inf. Sci. Eng. 17(1): 147-158 (2001) - 2000
- [c12]Hann-Huei Chiou, Alexander I-Chi Lai, Chin-Laung Lei:
Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems. ICDCS 2000: 654-661
1990 – 1999
- 1999
- [j9]Wen-Shenq Juang, Chin-Laung Lei:
Partially Blind Threshold signatures Based on Discrete Logarithm. Comput. Commun. 22(1): 73-86 (1999) - [j8]Wen-Shenq Juang, Chin-Laung Lei, C.-Y. Chang:
Anonymous channel and authentication in wireless communications. Comput. Commun. 22(15-16): 1502-1511 (1999) - 1998
- [j7]Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen:
Competitive Analysis of On-Line Disk Scheduling. Theory Comput. Syst. 31(5): 491-506 (1998) - [c11]Alexander I-Chi Lai, Chin-Laung Lei:
Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting. CANPC 1998: 119-131 - 1997
- [c10]Chun-I Fan, Chin-Laung Lei:
Secure Rewarding Schemes. HICSS (3) 1997: 571-580 - [c9]Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen:
Competitive Source Routing on Tori and Meshes. ISAAC 1997: 82-91 - [c8]Alexander I-Chi Lai, Chin-Laung Lei:
A High Performance Dynamic Token-Based Distributed Synchronization Algorithm. ISPAN 1997: 150-156 - 1996
- [j6]Wen-Shenq Juang, Chin-Laung Lei:
A collision-free secret ballot protocol for computerized general elections. Comput. Secur. 15(4): 339-348 (1996) - [c7]Chun-I Fan, Chin-Laung Lei:
A Multi-Recastable Ticket Scheme for Electronic Elections. ASIACRYPT 1996: 116-124 - [c6]Wen-Shenq Juang, Chin-Laung Lei:
Blind Threshold Signatures Based on Discrete Logarithm. ASIAN 1996: 172-181 - [c5]Alexander I-Chi Lai, Chin-Laung Lei:
Data Prefetching for Distributed Shared Memory Systems. HICSS (1) 1996: 102-110 - [c4]Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen:
Competitive Analysis of On-Line Disk Scheduling. ISAAC 1996: 356-365 - 1995
- [j5]Horng-Twu Liaw, Chin-Laung Lei:
An Efficient Password Authentication Scheme Based on a Unit Circle. Cryptologia 19(2): 198-208 (1995) - 1993
- [j4]Horng-Twu Liaw, Chin-Laung Lei:
An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control. BIT 33(1): 46-56 (1993) - [j3]Chin-Laung Lei, Horng-Twu Liaw:
Efficient Parallel Algorithms for Finding the Majority Element. J. Inf. Sci. Eng. 9(2): 319-334 (1993) - 1992
- [j2]Chin-Laung Lei, Horng-Twu Liaw:
A parallel algorithm for finding congruent regions. Comput. Graph. 16(3): 289-294 (1992)
1980 – 1989
- 1987
- [j1]E. Allen Emerson, Chin-Laung Lei:
Modalities for Model Checking: Branching Time Logic Strikes Back. Sci. Comput. Program. 8(3): 275-306 (1987) - 1986
- [c3]E. Allen Emerson, Chin-Laung Lei:
Efficient Model Checking in Fragments of the Propositional Mu-Calculus (Extended Abstract). LICS 1986: 267-278 - [c2]E. Allen Emerson, Chin-Laung Lei:
Temporal Reasoning Under Generalized Fairness Constraints. STACS 1986: 21-36 - 1985
- [c1]E. Allen Emerson, Chin-Laung Lei:
Modalities for Model Checking: Branching Time Strikes Back. POPL 1985: 84-96
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint