Yi-Hui Lin

ORCID: 0000-0002-7292-3942
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Advanced Authentication Protocols Security
  • Radiomics and Machine Learning in Medical Imaging
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • User Authentication and Security Systems
  • Biometric Identification and Security
  • Lung Cancer Diagnosis and Treatment
  • Innovative Teaching Methods
  • Caching and Content Delivery
  • Educational Games and Gamification
  • Smart Grid Security and Resilience
  • Engineering Applied Research
  • Child Development and Digital Technology
  • Integrated Circuits and Semiconductor Failure Analysis
  • Education and Critical Thinking Development
  • Semiconductor materials and devices
  • Software-Defined Networks and 5G
  • Advancements in Semiconductor Devices and Circuit Design
  • Security in Wireless Sensor Networks
  • IPv6, Mobility, Handover, Networks, Security
  • HIV, Drug Use, Sexual Risk
  • Advanced Memory and Neural Computing
  • Mobile Health and mHealth Applications
  • Child and Animal Learning Development

Taichung Veterans General Hospital
2023-2025

National Yang Ming Chiao Tung University
2025

National Central University
2022-2024

Guangdong University of Technology
2023

National Taiwan Normal University
2012-2022

Taiwan Nurses Association
2019

National Sun Yat-sen University
2006-2018

Institute of Information Science, Academia Sinica
2014-2018

National Chung Shan Institute of Science and Technology
2017

Academia Sinica
2015

<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> A three-factor authentication scheme combines biometrics with passwords and smart cards to provide high-security remote authentication. Most existing schemes, however, rely on verify biometric characteristics. The advantage of this approach is that the user's data not shared server. But disadvantage server must trust card perform proper which leads various vulnerabilities. To achieve truly secure...

10.1109/tifs.2009.2031942 article EN IEEE Transactions on Information Forensics and Security 2009-09-16

The accurate diagnosis and staging of lymph node metastasis (LNM) are crucial for determining the optimal treatment strategy head neck cancer patients. We aimed to develop a 3D Resnet model investigate its prediction value in detecting LNM. This study enrolled 156 patients analyzed 342 nodes segmented from surgical pathologic reports. patients' clinical pathological data related primary tumor site pathology T N stages were collected. To predict LNM, we developed dual-pathway incorporating...

10.1007/s10278-023-00938-2 article EN cc-by Deleted Journal 2024-01-16

It is necessary to authenticate users who attempt access resources in Wireless Local Area Networks (WLANs). Extensible Authentication Protocol (EAP) an authentication framework widely used WLANs. mechanisms built on EAP are called methods. The requirements for methods WLAN have been defined RFC 4017. To achieve user efficiency and robust security, lightweight computation forward secrecy, excluded 4017, desired authentication. However, all protocols designed WLANs so far do not satisfy of the...

10.1109/tpds.2012.164 article EN IEEE Transactions on Parallel and Distributed Systems 2012-05-30

Researchers suggest that game-based learning (GBL) can be used to facilitate mathematics learning. However, empirical GBL research targets young children is still limited. The purposes of the study develop a scenario-based digital game promote children's route-planning ability, empirically explore performance in route planning through game, and probe technology acceptance game. A total 71 participated study, both qualitative quantitative approaches were used, including an interview analysis...

10.1080/10494820.2015.1073745 article EN Interactive Learning Environments 2015-08-27

Local user access is important to machine-to-machine (M2M) communication because it possesses unique advantages over remote in that offers instant services, provides reliable connection, and offloads the traffic of M2M networks. control also essential for authorized users devices. In this paper, we propose a local authentication scheme (LACS), which allows devices locally verify rights privileges users. particular, property device heterogeneity considered our LACS. The resource-constrained...

10.1109/jiot.2018.2837163 article EN IEEE Internet of Things Journal 2018-05-16

Our study aimed to harness the power of CT scans, observed over time, in predicting how lung adenocarcinoma patients might respond a treatment known as EGFR-TKI. Analyzing scans from 322 advanced stage cancer patients, we identified distinct image-based patterns. By integrating these patterns with comprehensive clinical information, such gene mutations and regimens, our predictive capabilities were significantly enhanced. Interestingly, precision predictions, particularly related radiomics...

10.3390/cancers15215125 article EN Cancers 2023-10-24

Purpose Bulky tumor remains as a challenge to surgery, chemotherapy and conventional radiation therapy. Hence, in efforts overcome this challenge, we designed novel therapeutic paradigm via strategy of Stereotactic Central/Core Ablative Radiation Therapy (SCART).), which is based on the principles SBRT (stereotactic body therapy spatially fractionated (SFRT). We intend safely deliver an ablative dose core with low at edge. The purpose phase 1 study was determine dose-limiting toxicities...

10.3389/fonc.2024.1364627 article EN cc-by Frontiers in Oncology 2024-05-24

Software-Defined Networking and Network Function Virtualisation (SDN/NFV) can provide flexible resource allocation to support innovative security solutions in a central manner. To mitigate HTTP DDoS attacks, shuffling-based moving target defense has been regarded as one of the most effective ways by redirecting user traffic among group virtualized service functions. However, previous work did not notice that frequent changes will significantly intensify control overhead SDN. In this paper,...

10.1109/icc.2017.7997190 article EN 2017-05-01

Deep packet filtering (DPF) has been demonstrated as an essential technique for effective fine-grained access controls, but it is commonly recognized that the may invade individual privacy of users. Secure computation can address tradeoff between and DPF functionality, current solutions limit scalability network due to intensive overheads large connection setup delay, especially latest paradigm, function virtualisation (NFV) software-defined (SDN). In this paper, therefore, we propose a...

10.1109/icc.2016.7510993 article EN 2016-05-01

More and more researchers combine biometrics with passwords smart cards to design remote authentication schemes for the purpose of high-degree security. However, in most these proposed literature so far, biometric characteristics are verified only, not servers, during processes. Although this kind can prevent data users from being known it will result that they real three-factor therefore some security flaws may occur since servers do indeed verify factor biometrics. In paper we propose a...

10.1109/glocom.2006.278 article EN Globecom 2006-11-01

Articulation problems seriously reduce speech intelligent and communication affect person's interpersonal communication, personality, social adaptive capacity, learning ability. In the clinical protocol, language therapist utilizes experience to individualized assessment, treatment, training. However, manpower of therapists assistant instruments are insufficient. this paper, an articulation assessment training system is proposed assist disorders. The errors in phonetic analyzed modeled by...

10.1109/icassp.2007.367200 article EN 2007-04-01

The privacy issue of online social networks (OSNs) has been getting attention from the public, especially when data caused disagreement between users and OSN providers. While providers utilize users' as a commercial usage to make profit; on other hand, feel their violated by such behavior. In this paper, we propose preserving protocol for sharing in OSNs, where provider cannot retrieve content while can efficiently add or remove contact flexibly perform access control. Moreover, prove that...

10.1109/icc.2014.6883399 article EN 2014-06-01

With the ubiquity of social networks and mobile devices, various new applications for impromptu group formation communications have emerged recently, such as Meetup, Plancast, Yahoo! Upcoming, Eventbrite Epinions. Among those important applications, finding a dense subgraph in network plays crucial role, but current algorithms are only designed online networks. Different from networks, no central repository is available (MSNs). Finding distributed manner without compromising individual...

10.1109/glocom.2015.7417824 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2015-12-01

There are increasing opportunities for learners and instructors in different education level to engage Internet-based or Internet assisted learning instruction, therefore, it is important explore pre-service in-service preschool teachers' attitudes self-efficacy. This paper explores 1210 Taiwanese teachers, including 673 teachers 537 Attitude Scale (IAS) Self-efficacy (ISS) were conducted assess their self-efficacy toward the Internet. Exploratory factor analyses indicated adequate...

10.1109/iiai-aai.2012.72 article EN 2012-09-01

We investigate the inorganic/organic hybrid vertical phototransistor (VPT) by integrating an atomic layer deposition-processed ZnO (ALD-ZnO) transistor with a prototype poly(3-hexylthiophene):[6,6]-phenyl-C

10.3390/mi15111397 article EN cc-by Micromachines 2024-11-20

A double HfZrO <inf xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</inf> (HZO) ferroelectric field-effect transistor (FeFET) is demonstrated with ultra-low operating voltage as |V xmlns:xlink="http://www.w3.org/1999/xlink">P/E</inf> | = 3 V to achieve multilevel cell (MLC) nonvolatile memory (NVM). Compared a single FE-HZO FeFET, the metal/ferroelectric/metal/ferroelectric/Si (MFMFS) structure results not only in reduction of , but also provides...

10.1109/vlsi-tsa54299.2022.9771012 article EN 2022-04-18

With the improvement of internet technology in health applications, utilization and social media as new survey methodologies recruitment source for research participants have been encouraged, yet evidence feasibility people living with HIV (PLHIV) study is still lacking. We conducted a cross-sectional to determine whether there are differences among PLHIV recruited from networks health-care systems using an stigma discrimination questionnaire. The result revealed that were younger, more...

10.1080/09540121.2019.1668524 article EN AIDS Care 2019-09-18

The assistive hearing devices are the only aids to help subjects with loss use their residual hearing. However, performance of those is closely dependent on auditory training. To develop handheld based personal training system perceptional discrimination analysis and automatic test item generation very helpful for loss. Besides, it would ease burden speech-language pathologists in developing a In this study, mel-frequency cepstrum coefficients speech recognition applied objectively estimate...

10.1109/cirat.2013.6613818 article EN 2013-04-01

The contact process optimization of 40nm node has been achieved through co-optimization etch process, wet clean and glue layer film stack. In this study, it is found that the optimized can improve queue time window from to prevent polymer buildup inside for yield loss. wafer improvement strip reduce protrusion at interface ILD oxide CESL SiN, one root causes potential reliability issue due poly shorting. And increase thickness will square resistance, but lead high resistance shared on poly....

10.1149/05201.0619ecst article EN ECS Transactions 2013-03-08

This paper proposes an energy-efficient private matching for secure two-party computation, called SafeMatch, in mobile social networks (MSNs). The proposed SafeMatch utilizes locality sensitive hashing (LSH) to sample the data and protects samples with cryptographic hash functions one-time padding. Given acceptable tolerance rate error rate, our provides lightweight computation cost regardless size of set. To guarantee soundness we define its privacy prove security. Empirical experiment...

10.1109/iwcmc.2015.7289185 article EN 2015-08-01
Coming Soon ...