Chien‐Ming Chen

ORCID: 0000-0002-6502-472X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Security in Wireless Sensor Networks
  • Privacy-Preserving Technologies in Data
  • Data Mining Algorithms and Applications
  • IoT and Edge/Fog Computing
  • Vehicular Ad Hoc Networks (VANETs)
  • Chaos-based Image/Signal Encryption
  • Biometric Identification and Security
  • Genomics and Phylogenetic Studies
  • Rough Sets and Fuzzy Logic
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Network Security and Intrusion Detection
  • RFID technology advancements
  • Energy Efficient Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • biodegradable polymer synthesis and properties
  • Wireless Body Area Networks
  • Adversarial Robustness in Machine Learning
  • Advanced Steganography and Watermarking Techniques

Nanjing University of Information Science and Technology
2023-2025

Shandong University of Science and Technology
2018-2024

China Medical University
2022-2024

National Cheng Kung University
1994-2024

National Taipei University of Technology
2009-2023

Industrial Technology Research Institute
2005-2023

Chiayi Chang Gung Memorial Hospital
2008-2023

National Taiwan University of Science and Technology
2000-2023

East Asia School of Theology
2021-2022

National Formosa University
2022

An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting messages for the vehicles on roads. However, as data are transmitted in an insecure network, it is essential to use authentication mechanism protect privacy vehicle users. Recently, Ying et al. proposed protocol IoV claimed that could resist various attacks. Unfortunately, we discovered their suffered from offline identity guessing attack, location spoofing replay consumed considerable amount time...

10.1109/access.2019.2891105 article EN cc-by-nc-nd IEEE Access 2019-01-01

The concept of a smart city is geared towards enhancing convenience and the efficient management areas through innovation. As Metaverse rises in 2020s, providing possible direction for new generation Internet, it has huge number opportunities to promote cities. can empower cities various aspects. In this article, we provide detailed review based on technologies. Firstly, introduce describe future vision applications cities, which are Metaverse. addition, discuss essential technologies...

10.1016/j.iotcps.2023.12.002 article EN cc-by Internet of Things and Cyber-Physical Systems 2024-01-01

Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, an extension of cloud computing, inheriting security challenges inevitable. Recently, Jia et al. proposed authenticated key exchange scheme for fog-driven IoT health care systems. Unfortunately, we discovered their vulnerable to ephemeral secret leakage attack. In this paper, propose fog computing. Compared with previous schemes, our performs better terms performance...

10.1080/17517575.2020.1712746 article EN Enterprise Information Systems 2020-01-10

Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated wireless sensor networks. These provide better security compared with traditional since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, base station only retrieves aggregated result, not individual data, which causes two problems. First, usage of functions constrained. For...

10.1109/tpds.2011.219 article EN IEEE Transactions on Parallel and Distributed Systems 2011-08-25

Public key encryption with keyword search, known as PEKS, is a useful technology in some Storage-as-a-Service clouds. This allows the cloud server to search on keyword, which received from data owner/user, over encrypted without having ability decrypt stored data. PEKS designated verifier, dPEKS, further advances security of such that only can perform searching.Combining certificateless technology, aims avoid escrow problem ID-based cryptography, produces dPEKS scheme inherits property...

10.1080/02533839.2018.1537807 article EN Journal of the Chinese Institute of Engineers 2019-01-02

In recent years, with the increase in degenerative diseases and aging population advanced countries, demands for medical care of older or solitary people have increased continually hospitals healthcare institutions. Applying wireless sensor networks IoT-based telemedicine system enables doctors, caregivers families to monitor patients' physiological conditions at anytime anyplace according acquired information. However, transmitting data through Internet concerns personal privacy patients....

10.3390/s17071482 article EN cc-by Sensors 2017-06-23

Currently, the popularity of Internet Things (IoT) has brought about an increase in amount data, so multi-server distributed cloud computing been widely used various applications that have convenience to our daily lives. At same time, development fifth generation (5G) mobile communication technology gradually become main driving force for popularization IoT. Because 5G network is a heterogeneous with multiple servers and small cells, mutual authentication protocol under also applicable...

10.1109/access.2020.2969986 article EN cc-by IEEE Access 2020-01-01

The fifth-generation (5G) mobile communication technology with higher capacity and data rate, ultra-low device to (D2D) latency, massive connectivity will greatly promote the development of vehicular ad hoc networks (VANETs). Meantime, new challenges such as security, privacy efficiency are raised. In this article, a hybrid D2D message authentication (HDMA) scheme is proposed for 5G-enabled VANETs, in which novel group signature-based algorithm used mutual between vehicle (V2V)...

10.1109/tits.2020.3013928 article EN IEEE Transactions on Intelligent Transportation Systems 2020-08-13

Abstract We developed a multi‐level model to test how team cultural diversity may relate team‐ and individual‐level creativity, integrating research information‐exchange perspective. proposed that the climate for inclusion would moderate both relationship between information sharing employee elaboration. collected time‐lagged data from 384 members their leaders within 57 multicultural work teams. The results showed was positively related creativity individual through elaboration,...

10.1002/jocb.93 article EN The Journal of Creative Behavior 2015-06-04

Gaussian process regression (GPR) is frequently used for uncertain measurement and prediction of nonstationary time series in the Internet Things data, nevertheless, generalization efficacy GPR are directly impacted by its selection hyper-parameters. In study, a non-inertial particle swarm optimization with elite mutation-Gaussian (NIPSO-GPR) proposed to optimize hyper-parameters GRP. NIPSO-GPR can adaptively obtain via uniform velocity update formula adaptive mutation strategy. When...

10.1109/access.2019.2913757 article EN cc-by-nc-nd IEEE Access 2019-01-01

Smart architecture is the concept to manage facilities via internet utilization in a proper manner.There are various technologies used smart such as cloud computing, of things, green automation and fog computing.Smart medical system (SMS) one application architecture, which based on communication networking along with sensor devices.In SMS, doctor provides online treatment patients help cloud-based applications mobile device, wireless body area network, etc. Security privacy major concern...

10.1109/access.2020.3001152 article EN cc-by IEEE Access 2020-01-01

In recent years, Internet of Things (IoT)-enabled health monitoring wearable devices have become a trend in healthcare systems, regularly collecting vital sign data from patients and uploading them to the cloud. Through on-demand search queries, are shared with third-party service providers monitor patients' status provide timely diagnoses. To ensure privacy security, patient should be encrypted before being uploaded The cloud can give encryption services. However, current searchable (SE)...

10.1109/tii.2021.3064691 article EN IEEE Transactions on Industrial Informatics 2021-03-09
Coming Soon ...