- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- Security in Wireless Sensor Networks
- Privacy-Preserving Technologies in Data
- Data Mining Algorithms and Applications
- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Chaos-based Image/Signal Encryption
- Biometric Identification and Security
- Genomics and Phylogenetic Studies
- Rough Sets and Fuzzy Logic
- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Network Security and Intrusion Detection
- RFID technology advancements
- Energy Efficient Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Anomaly Detection Techniques and Applications
- biodegradable polymer synthesis and properties
- Wireless Body Area Networks
- Adversarial Robustness in Machine Learning
- Advanced Steganography and Watermarking Techniques
Nanjing University of Information Science and Technology
2023-2025
Shandong University of Science and Technology
2018-2024
China Medical University
2022-2024
National Cheng Kung University
1994-2024
National Taipei University of Technology
2009-2023
Industrial Technology Research Institute
2005-2023
Chiayi Chang Gung Memorial Hospital
2008-2023
National Taiwan University of Science and Technology
2000-2023
East Asia School of Theology
2021-2022
National Formosa University
2022
An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting messages for the vehicles on roads. However, as data are transmitted in an insecure network, it is essential to use authentication mechanism protect privacy vehicle users. Recently, Ying et al. proposed protocol IoV claimed that could resist various attacks. Unfortunately, we discovered their suffered from offline identity guessing attack, location spoofing replay consumed considerable amount time...
The concept of a smart city is geared towards enhancing convenience and the efficient management areas through innovation. As Metaverse rises in 2020s, providing possible direction for new generation Internet, it has huge number opportunities to promote cities. can empower cities various aspects. In this article, we provide detailed review based on technologies. Firstly, introduce describe future vision applications cities, which are Metaverse. addition, discuss essential technologies...
Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, an extension of cloud computing, inheriting security challenges inevitable. Recently, Jia et al. proposed authenticated key exchange scheme for fog-driven IoT health care systems. Unfortunately, we discovered their vulnerable to ephemeral secret leakage attack. In this paper, propose fog computing. Compared with previous schemes, our performs better terms performance...
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated wireless sensor networks. These provide better security compared with traditional since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, base station only retrieves aggregated result, not individual data, which causes two problems. First, usage of functions constrained. For...
Public key encryption with keyword search, known as PEKS, is a useful technology in some Storage-as-a-Service clouds. This allows the cloud server to search on keyword, which received from data owner/user, over encrypted without having ability decrypt stored data. PEKS designated verifier, dPEKS, further advances security of such that only can perform searching.Combining certificateless technology, aims avoid escrow problem ID-based cryptography, produces dPEKS scheme inherits property...
In recent years, with the increase in degenerative diseases and aging population advanced countries, demands for medical care of older or solitary people have increased continually hospitals healthcare institutions. Applying wireless sensor networks IoT-based telemedicine system enables doctors, caregivers families to monitor patients' physiological conditions at anytime anyplace according acquired information. However, transmitting data through Internet concerns personal privacy patients....
Currently, the popularity of Internet Things (IoT) has brought about an increase in amount data, so multi-server distributed cloud computing been widely used various applications that have convenience to our daily lives. At same time, development fifth generation (5G) mobile communication technology gradually become main driving force for popularization IoT. Because 5G network is a heterogeneous with multiple servers and small cells, mutual authentication protocol under also applicable...
The fifth-generation (5G) mobile communication technology with higher capacity and data rate, ultra-low device to (D2D) latency, massive connectivity will greatly promote the development of vehicular ad hoc networks (VANETs). Meantime, new challenges such as security, privacy efficiency are raised. In this article, a hybrid D2D message authentication (HDMA) scheme is proposed for 5G-enabled VANETs, in which novel group signature-based algorithm used mutual between vehicle (V2V)...
Abstract We developed a multi‐level model to test how team cultural diversity may relate team‐ and individual‐level creativity, integrating research information‐exchange perspective. proposed that the climate for inclusion would moderate both relationship between information sharing employee elaboration. collected time‐lagged data from 384 members their leaders within 57 multicultural work teams. The results showed was positively related creativity individual through elaboration,...
Gaussian process regression (GPR) is frequently used for uncertain measurement and prediction of nonstationary time series in the Internet Things data, nevertheless, generalization efficacy GPR are directly impacted by its selection hyper-parameters. In study, a non-inertial particle swarm optimization with elite mutation-Gaussian (NIPSO-GPR) proposed to optimize hyper-parameters GRP. NIPSO-GPR can adaptively obtain via uniform velocity update formula adaptive mutation strategy. When...
Smart architecture is the concept to manage facilities via internet utilization in a proper manner.There are various technologies used smart such as cloud computing, of things, green automation and fog computing.Smart medical system (SMS) one application architecture, which based on communication networking along with sensor devices.In SMS, doctor provides online treatment patients help cloud-based applications mobile device, wireless body area network, etc. Security privacy major concern...
In recent years, Internet of Things (IoT)-enabled health monitoring wearable devices have become a trend in healthcare systems, regularly collecting vital sign data from patients and uploading them to the cloud. Through on-demand search queries, are shared with third-party service providers monitor patients' status provide timely diagnoses. To ensure privacy security, patient should be encrypted before being uploaded The cloud can give encryption services. However, current searchable (SE)...