雷欽隆教授的著作列表 - Publication List of Chin-Laung Lei

Publication List of 雷欽隆 Chin-Laung Lei

Journal articles & book chapters:

  1. Shu-Ping Lu, Chin-Laung Lei and Meng-Han Tsai, “An efficient Proof-of-Authority consensus scheme against cloning attacks,” Computer Communications, Volume 228, Dec. 2024
  2. Yi-Ting Peng and Chin-Laung Lei, “Using Bidirectional Encoder Representations from Transformers (BERT) to predict criminal charges and sentences from Taiwanese court judgments,” PeerJ Computer Science, 10:e1841, Jan. 2024
  3. Meng-Han Tsai, Chia-Ching Lin, Zheng-Gang He, Wei-Chieh Yang, and Chin-Laung Lei , “PowerDP: De-obfuscating and Profiling Malicious PowerShell Commands with Multi-label Classifiers,” IEEE Access, 11(1), 256-270, Jan. 2023
  4. Yi-Hsien Chen, Si-Chen Lin, Szu-Chun Huang, Chin-Laung Lei, and Chun-Ying Huang, “Guided Malware Sample Analysis based on Graph Neural Networks,” IEEE Transactions on Information Forensics & Security, Vol. 18, 4128-4143, 2023
  5. Chung-Kuan Chen, Si-Chen Lin, Szu-Chun Huang, “Building Machine Learning-based Threat Hunting System from Scratch,” ACM Digital Threats: Research and Practice, 1, 21-Vol. 3, No. 3, Sept. 2022
  6. Shu-Ping Lu, Chin-Laung Lei, Cheng-Yun Ho, Shy-Shang Hwang, and Hsin-Chen Chen, “Distributed Ledger Technology based Architecture for Decentralized Device-to-Device Communication Network,” IEEE Access, 10(1), 92006--92022, Sept. 2022
  7. Chia-Ching Lin, Hsin-Li Chu, Yu-Chiang Frank Wang, and Chin-Laung Lei, “Joint Feature Disentanglement and Hallucination for Few-Shot Image Classification,” IEEE Transactions on Image Processing, Volume: 30, 9245-9258, Nov. 2021
  8. Yun-Hsin Chuang and Chin-Laung Lei, “"PUF Based Authenticated Key Exchange Protocol for IoT without Verifiers and Explicit CRPs,” IEEE Access, Volume 9, 112733-112743, Aug. 2021
  9. Yun-Hsin Chuang and Chin-Laung Lei, “An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multi-server environment and a survey,” International Journal of Communication Systems, 34(1), 2021
  10. Yun-Hsin Chuang, Chin-Laung Lei, and Hung-Jr Shiu, “How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security,” Symmetry, 13(9), 2021
  11. Po-Wen Chi, Ming-Hung Wang, Jing-Wei Guo, and Chin-Laung Lei, “MigrateSDN: Efficient Approach to Integrate OpenFlow Networks with STP-enabled Networks,” International Journal of Computational Science and Engineering, 20 (4), 480-491, Jan. 2020
  12. Albert Guan and Chin-Laung Lei, “An Improved Key-Agreement Protocol for Channels with Small Error Rate,” Journal of Internet Technology, vol. 20, no. 7, 2277-2284, Dec. 2019
  13. Yun-Hsin Chuang and Chin-Laung Lei, “Privacy Protection for Telecare Medicine Information Systems with Multiple Servers Using a Biometric-based Authenticated Key Agreement Scheme,” IEEE Access, Volume 7, Issue 1, 186480-186490, Dec. 2019
  14. Chih-Fan Hsu, Yu-Shuen Wang, Chin-Laung Lei, and Kuan-Ta Chen, “Look at Me! Correcting Eye Gaze in Live Video Communication,” ACM Transactions on Multimedia Computing Communications and Applications, Volume 15, Issue 2, Jun. 2019
  15. Yi-Cheng Tsai, Mu-En Wu, Chin-Laung Lei, Chung-Shu Wu, Jan-Ming Ho and Chuan-Ju Wang, “Assessing the profitability of timely opening range breakout breakout on index futures markets,” IEEE Access, Vol. 7, Issue 1,, 32061-32071, 2019
  16. Yi-Cheng Tsai, Mu-En Wu, Chin-Laung Lei, Chung-Shu Wu, Jan-Ming Ho and Chuan-Ju Wang, “Assessing the profitability of timely opening range breakout on index futures markets,” IEEE Acces, Vol. 7, Issue 1, 32061-32071, 2019
  17. Po-Wen Chi, and Chin-Luang Lei,, “Audit-Free Cloud Storage via Deniable Attribute-based Encryption,” IEEE Transactions on Cloud Computing, accepted, Vol. 6, Issue 2, 414-427, Jun. 2018
  18. Ming-Hung Wang and Chin-Laung Lei, “SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events,” Journal of Information Science and Engineering, Vol. 34, No. 6, 1579-1598, 2018
  19. Hong-Bin Tsai and Chin-Laung Lei, “Time-Shift Replacement Algorithm for Main Memory Performance Optimization,” Journal of Supercomputing, Vol. 74, No. 6, 2729-2746, 2018
  20. Chien-Ting Kuo, Po-Wen Chi, Victor Chang, and Chin-Laung Lei, “SFaaS: Keeping an Eye on IoT Fusion Environment with Security Fusion as a Service,” Future Generation Computer Systems, Vol. 86, 1424-1436, 2018
  21. Yi-Cheng Tsai, Chuan-Ju Wang, William Cheung, Chung-Shu Wu, Jan-Ming Ho, and Chin-Laung Lei,, “Exploring the Persistent Behavior of Financial Markets,” Finance Research Letters, Vol. 24, 199-220, 2018
  22. Ming-Hung Wang and Chin-Laung Lei, “SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events,” Journal of Information Science and Engineering, Vol. 34, No. 6, 1579-1598, 2018
  23. Po-Wen Chi and Chin-Luang Lei, “Audit-Free Cloud Storage via Deniable Attribute-based Encryption,” IEEE Transactions on Cloud Computing,, Vol. 6, Issue 2, 414-427, 2018
  24. Ming-Hung Wang, Lung-Wen Chen, Po-Wen Chi, and Chin-Laung Lei, “SDUDP: A Reliable UDP-based Transmission Protocol over SDN,” IEEE Access, Volume 5, Issue 1, 5904-5916, Dec. 2017
  25. Yen-Hwa Liao, Chin-Laung Lei, Ying-I Ko, Yu-Shian Chen, and Chien-Hua Chiu, “Enhanced Tame-based Key Predistribution Scheme for Sensor Networks,” Journal of Internet Technology, Vol. 18, No, 7, 1499-1514, Dec. 2017
  26. Hung-Jr Shiu, Bor-Shing Lin, and Chin-Laung Lei, “Privacy Preserving of Online Digital Physiological Signals using Reversible Steganography,” Computer Methods and Programs in Biomedicine, Volume 151, 159-170, Nov. 2017
  27. Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan,” The Computer Journal, Volume 60, Issue 11, 1675-1686, Nov. 2017
  28. Ming-Hung Wang, Han-Chi Wang, and Chin-Laung Lei,, “Automatic Test Pattern Generator for Fuzzing Based on Finite State Machines,” Security and Communication Networks, vol. 2017, Nov. 2017
  29. Hung-Jr Shiu, Bor-Shing Lin, Chia-Wei Cheng, Chien-Hung Huang, and Chin-Laung Lei, “High Capacity Information Protection of Synthesized Pitches using Amplitude Enhancement-A New Vision of Acoustic Steganography,” Symmetry, Vol. 9, No.6, Jun. 2017
  30. Yi-Cheng Tsai, Chin-Laung Lei, Jan-Ming Ho, Ming-Yang Kao, and Szu-Lang Liao, “Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing,” Journal of Information Science and Engineering, Vol. 31. No. 3, pp. 925-942, May 2015
  31. He-Ming Ruan, and Chin-Laung Lei,, “Discovery of De-identification Policies Considering Re-identification Risks and Information Loss,” Engineering Science & Technology Bulletin, No. 145, pp. 45-47, Apr. 2015
  32. Yu-Shian Chen, He-Ming Ruan, and Chin-Laung Lei, “Stratus: Check and Share Encrypted Data among Heterogeneous Cloud Storage,” Journal of Internet Technology, Vol. 15, No. 6, pp. 999-1011, Nov. 2014
  33. H. J. Shiu, S. Y. Tang, C. H. Huang, R .C. T. Lee, and C. L. Lei, “A Reversible Acoustic Data Hiding Method Based on Analog Modulation,” Information Sciences, Volume 273, pp. 233–246, Jul. 2014
  34. Jing-Kai Lou, Fu-Min Wang, Chin-Hua Tsai, San-Chuan Hung, Perng-Hwa Kung, Shou-De Lin, Kuan-Ta Chen and Chin-Laung Lei, “A Social Diffusion Model with an Application on Election Simulation,” The Scientific World Journal, Volume 2014, Article ID 180590, 14 pages, 2014
  35. Yu-Shian Chen, and Chin-Laung Lei, “Aggregate Message Authentication Codes (AMACs) with On-the-fly Verification,” International Journal of Information Security, Vol. 12, No. 6,, pp. 495-504, Nov. 2013
  36. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework,” IEEE Transactions on Multimedia, Vol. 15, No. 5, pp. 1121-1137, Aug. 2013
  37. Chien-Hua Chiu and Chin-Laung Lei, “EtherAgent: Scaling Ethernet for Enterprise and Campus Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2465-2483, Jun. 2013
  38. Chia-Chang Hsu and Chin-Laung Lei, “A Lightweight Firework Search Protocol for Location-Aided Routing Enhancement in Mobile Ad-Hoc Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2261-2282, Jun. 2013
  39. Jiunn-Jye Lee, Li-Yuan Lee and Chin-Laung Lei, “Aura: An Anonymous Universal Relay Architecture over Structured Peer-To-Peer Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2327-2346, Jun. 2013
  40. Chia-Chang Hsu and Chin-Laung Lei, “A Lightweight Firework Search Protocol for Location-Aided Routing Enhancement in Mobile Ad-Hoc Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2261-2282, Jun. 2013
  41. Jiunn-Jye Lee, Hann-Huei Chiou, Chia-Chang Hsu, and Chin-Laung Lei, “An Adaptive Sector-Based Routing Model over Structured Peer-to-Peer Networks,” Computer Networks, Volume 57, Issue 4, pp. 887–896, Mar. 2013
  42. Yun-Hsin Chuang, Yuh-Min Tseng and Chin-Laung Lei, “Efficient Mutual Authentication And Key Agreement With User Anonymity For Roaming Services In Global Mobility Networks,” International Journal of Innovative Computing, Information and Control, Vol. 8, No. 9, pp. 6415-6427, Sept. 2012
  43. Chien-Hua Chiu and Chin-Laung Lei, “A Decentralized Clustering Scheme for Transparent Mode Devices,” Journal of Clustering Computing, Volume 15, Issue 3, 265-279, Sept. 2012
  44. Yu-Chun Chang, Chi-Jui Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Radar Chart: Scanning for High QoE in QoS Dimension,” IEEE Network, Volume: 26, Issue: 4, pp. 25-31, Aug. 2012
  45. Yun-Peng Chiu, Chun-Ying Huang and Chin-Laung Lei, “SEMPRE: Secure Multicast Architecture Using Proxy Re-Encryptio,” International Journal of Innovative Computing, Information and Control, Volume 8, Number 7(A), pp. 4719-4748, Jul. 2012
  46. Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang and Wen-Chi Tsai, “Tame Pool-based Pairwise Key Predistribution for Large-scale Sensor Networks,” International Journal of Innovative Computing, Information and Control, Volume 8, Number 2, pp. 1001-1024, Feb. 2012
  47. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Provably Secure and Efficient Identification and Key Agreement Protocol with User Anonymity,” Journal of Computer and System Sciences, Volume 77, Issue 4, pp. 790-798, Jul. 2011
  48. 13. Chien-Ju Ho, Chen-Chi Wu, Kuan-Ta Chen, and Chin-Laung Lei, “DevilTyper: A Game for CAPTCHA Usability Evaluation,” ACM Computer in Entertainment, Volume 9 Issue 1, pp. 3-1~3-14, Apr. 2011
  49. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Robust Authentication and Key Agreement Scheme Preserving the Privacy of Secret Key,” Computer Communications, Vol. 34, pp. 274-280, 2011
  50. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Smart Card-based Secure Web Services in the Three-party Setting,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 11, pp. 5259-5274, Nov. 2010
  51. Kuan-Ta Chen, Chi-Jui Chang, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “Quadrant of Euphoria: A Crowdsourcing Platform for QoE Assessment,” IEEE Network, Vol. 24, No. 2, pp.28-35, Mar. 2010
  52. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw and Wei-Ken Nien, “Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings,” International Journal of Innovative Computing Information and Control, Vol. 6, No. 2, pp. 763-772, Feb. 2010
  53. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 6, No. 3, pp. 183-190, 2010
  54. Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, and Chin-Laung Lei, “Fair anonymous rewarding based on electronic cash,” Journal of Systems and Software, Volume 82 Issue 7, pp. 1168-1176, Jul. 2009
  55. Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “Effect of Network Quality on Player Departure Behavior in Online Games,” IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 5, pp. 593-606, May 2009
  56. Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, “A Robust Authentication Scheme with User Anonymity for Wireless Environments,” International Journal of Innovative Computing, Information and Control, Vol. 5, No. 4, pp. 1069-1080, Apr. 2009
  57. Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, “User Authentication Scheme with Privacy-preservation for Multi-server Environment,” IEEE Communications Letters, Vol. 13, No. 2, pp, 157-159, Feb. 2009
  58. Chen-Chi Wu, Kuan-Ta Chen, Chih-Ming Chen, Polly Huang, and Chin-Laung Lei, “On the Challenges and Designs of Transport Protocols for MMORPGs,” Multimedia Tools and Applications, Vol. 45, pp. 7-32, 2009
  59. Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Hao-Hua Chu, Chin-Laung Lei and Wen-Chin Chen, “Identifying MMORPG Bots: A Traffic Analysis Approach,” EURASIP Journal on Advances in Signal Processing, Volume 2009, 2009
  60. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Web Metering Scheme for Fair Advertisement Transactions,” International Journal of Security and Its Applications, Vol. 2, No. 4, pp. 49-56, Oct. 2008
  61. Te-Yuan Huang, Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “A Generalizable Methodology for Quantifying User Satisfaction,” IEICE Transactions on Communications, 91-B(5), 1260-1268, May 2008
  62. Yu-Shian Chen, Hsu-Chun Hsiao, and Chin-Laung Lei, “A Survey of Secure Data Aggregation on Sensor Networks,” Communications of CCISA, Vol. 13, No. 4, pp. 17-28, Oct. 2007
  63. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, and Chin-Laung Lei, “Secure Multicast in Dynamic Environments,” Computer Networks, Volume 51, Issue 10, pp. 2805--2817, Jul. 2007
  64. Pan-Lung Tsai, and Chin-Laung Lei, “Analysis and Evaluation of a Multiple Gateway Traffic-Distribution Scheme for Gateway Clusters,” Computer Communications, Vol. 29, Issue 16, pp. 3170-3181, Dec. 2006
  65. Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “How sensitive are online gamers to network quality?,” Communications of the ACM, Vol. 49, Issue 11, pp. 34-38, Nov. 2006
  66. K. T. Chen, P. Huang, and C. L. Le, “Game Traffic Analysis: An MMORPG Perspective,” Computer Networks, Vol. 50, No. 16, pp. 3002-3023, 2006
  67. C. L. Lei, P. L. Yu, P. L. Tsai, and M. H. Chan, “An Efficient and Anonymous Buyer-Seller Watermarking Protocol,” IEEE Transactions on Image Processing,, Vol. 13 , No. 12, pp. 1618 - 1626,, 2004
  68. C. I. Fan, and C. L. Lei, “Divisible Blind Signatures based on Hash Chains,” International Journal of Computers and Applications, Volume 26, Issue 1,, pp. 1-9,, 2004
  69. W. S. Juang, C. L. Lei, and H. T. Liaw, “Privacy and Anonymity Protection wit Blind Threshold Signatures,” International Journal of Electronic Commerce, Vol. 7, No. 2, pp. 145-159, 2003
  70. C. L. Lei, and W. S. Juang, “Provably Secure Blind Threshold Signatures Based on Discrete Logarithm,” Journal of Information Science and Engineering, Vol. 18, pp. 23-39, 2002
  71. C. I. Fan, and C. L. Lei, “An Unlinkably Divisible and Intention Attachable Ticket Scheme for Runoff Elections,” Journal of Network and Computer Applications, Vol. 25, No. 2, pp. 93-107, 2002
  72. T. H. Yeh, C. M. Kuo, C. L. Lei, and H. C. Yen, “Distributed and On-Line Routing on Tori,” Algorithmica, Vol. 32, No. 4, pp. 562-593, 2002
  73. W. S. Juang, C. L. Lei, and H. T. Liaw, “A Verifiable Multi-Authorities Secret Election Allowing Abstaining from Voting,” The Computer Journal, Vol. 45, No. 6, pp. 672-682, 2002
  74. C. I. Fan, and C. L. Lei, “A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash,” Journal of Information Science and Engineering, Vol. 18, pp. 47-58, 2002
  75. C. I. Fan, and C. L. Lei, “Divisible Blind Signatures based on Hash Chains,” International Journal of Computers and Application, Vol. 24, Issue 3, 2002
  76. T. H. Yeh, and C. L. Lei, “Competitive Analysis of Minimal Oblivious Routing Algorithms on Hypercubes,” IEICE Trans. on Information and Systems, Vol. E84-D, No.1, pp. 65-75, 2001
  77. W. S. Juang, C. L. Lei, and H. T. Liaw, “Fair Blind Threshold Signatures Based on Discrete Logarithms,” Computer Systems – Science and Engineering, Vol. 16, No. 6, pp. 371-379, 2001
  78. C. I. Fan, and C. L. Lei,, “Cryptanalysis on improved user efficient blind signatures,” IEE Electronics Letters, Vol.37, No.10, pp.630-631, 2001
  79. Y. C. Sun, C. L. Lei, and M. L. Kuo, “A Fully Distributed Approach to Repositories of Reusable Components,” Journal of Information Science and Engineering, Vol. 17, No. 1, pp. 147-158, 2001
  80. H. J. Chen, C. L. Lei, and P. L. Yu, “Fairness in E-cash Systems,” Information Security Newsletter, Vol. 7, No. 4, pp. 82-95, 2001
  81. C. L. Lei, and C. E. Yin, “Smart Card Payment Today and Tomorrow,” Information Security Newsletter, Vol. 7, No. 4, pp. 46-60, 2001
  82. Y. C. Sun, C. L. Lei, and M. L. Kuo, “A Naming, Storage, and Retrieval Model for Software Assets,” IEICE Trans. on Information and Systems, Vol. E83-D, No. 4, pp. 789-796, 2000
  83. A. Lai, C. L. Lei, and H. H. Chiou, “A False-Sharing Free Distributed Shared Memory Management Scheme,” IEICE Trans. on Information and Systems, Vol. E83-D, No. 4, pp. 777-788, 2000
  84. W. S. Juang, C. L. Lei, and C. Y. Chang, “Anonymous Channel and Authentication in Wireless Communications,” Computer Communications, Vol. 22, No. 15-16, pp. 1502-1511, 1999
  85. W. S. Juang, and C. L. Lei, “Partially Blind Threshold Signatures Based on Discrete Logarithms,” Computer Communications, Vol. 22, No. 1, pp. 73-86, 1999

Conference & proceeding papers:

  1. Jian-Syue Huang, Tsung-Han Liu, Yi-Hsien Chen, Hsuan-Yu Peng, Tse-Wei Huang, Chin-Laung Lei, and Chun-Ying Huang, “Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the Hypervisor,” 2024 ACM Computer and Communications Security Conference, Cloud Computing Security Workshop, 66-79, Salt Lake City, USA, Oct. 2024
  2. Si-Chen Lin, Yi-Hsien Chen, Szu-Chun Huang, Chin-Laung Lei and Chun-Ying Huang, “Automatic Analysis of Malware Based on Graph Neural Network,” the 32nd Cryptology & Information Security Conference, New Taipei City, Taiwan, Jun. 2022
  3. Yi-Hsien Chen, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, and Chun-Ying Huang, “Construct macOS Cyber Range for Red/Blue Teams,” 15th ACM ASIA Conference on Computer and Communications Security, 934-936, Taipei, Taiwan., Oct. 2020
  4. Yun-Hsin Chuang, Chin-Laung Lei, and Hung-Jr Shiu, “Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines,” 15th Asia Joint Conference on Information Security, 66-73, Taipei, Taiwan., Aug. 2020
  5. Chia-Ching Lin, Yu-Chiang Frank Wang, Chin-Laung Lei, and Kuan-Ta Chen, “Semantics-Guided Data Hallucination for Few-Shot Visual Classification,” The 26th IEEE International Conference on Image Processing (ICIP), 3302-3306, Taipei, Taiwan., Sept. 2019
  6. Meng-Han Tsai, Ming-Hung Wang, Wei-Chieh Yang, and Chin-Laung Lei,, “Uncovering Internal Threats Based on Open-source Intelligence,” International Computer Symposium, Yunlin, Taiwan, Dec. 2018
  7. Albert Guan and Chin-Laung Lei, “Efficient Key Agreement Protocol for Smart Sensors,” IEEE Conference on Dependable and Secure Computing, Kaohsiung, Taiwan, Dec. 2018
  8. Chih-Fan Hsu, Yu-Cheng Chen, Yu-Shuen Wang, Chin-Laung Lei, and Kuan-Ta Chen, “Realizing the Real-time Gaze Redirection System with Convolutional Neural Network,” ACM Multimedia Systems Conference, Amsterdam, The Netherland, Jun. 2018
  9. Ming-Hung Wang, Meng-Han Tsai, Wei-Chieh Yang, and Chin-Laung Lei, “Infection Categorization Using Deep Autoencoder,” IEEE INFOCOM’18 Demo Session, Honolulu, HI, USA, Apr. 2018
  10. Hong-Bin Tsai and Chin-Laung Lei, “CAHR: Centrality-Aware Hybrid Replacement in Information-Centric Network,” National Computer Symposium, Hualien, Taiwan, Dec. 2017
  11. 8. Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Wei-Chou Lai, Chien-Hung Huang and Chin-Laung Lei, “A Stereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure Tones,” Euro-China Conference on Intelligent Data Analysis and Application, Málaga, Spain, Oct. 2017
  12. 7. He-Ming Ruan, Jen-Hao Kuo, Chun-Yi Chan, and Chin-Laung Lei, “Investigation of Mobile App Behaviors, from the Aspect of Real World Mobile Backend System,” IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, Amman, Jordan, Oct. 2017
  13. 6. Chih-Fan Hsu, Anthony Chen, Cheng-Hsin Hsu, Chun-Ying Huang, Kuan-Ta Chen and Chin-Laung Lei, “Is Foveated Rendering Perceivable? A Study on the Efficiency and Consistency of Subjective Assessment Methods,” ACM Multimedia, Mountain View, CA USA., Oct. 2017
  14. 9. Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang and Chin-Laung Lei, “Data Hiding on Social Media Communications Using Text Steganography,” International Conference on Risks and Security of Internet and System, Dinard, France, Sept. 2017
  15. 10. Chien-Ting Kuo, Victor Chang, and Chin-Laung Lei,, “A Feasibility Analysis for Edge Computing Fusion in LPWA IoT Environment with SDN Structure,” InternationaWorkshop on Data Analytics and Emerging Services, Antalya, Turkey, Aug. 2017
  16. 11. He-Ming Ruan, Jen-Hao Kuo, Chun-Yi Chan, and Chin-Laung Lei, “Toward High Throughput Backend Provision for Mobile Apps with a Microservice Approach,” International Conferance on Internet Computing and Internet of Things, Las Vegas, USA., Jul. 2017
  17. 12. Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Temporal Dynamics of On-Line Political Ideology: Longitudinal Study on Facebook,” Annual Conference of the European Political Science Association, Milan, Italy, Jun. 2017
  18. Hong-Bin Tsai and Chin-Laung Lei, “A Page Replacement Algorithm Based on Frequency Derived From Reference History,” ACM SIGAPP Symposium On Applied Computing, 1522-1527, Marrakesh, Morocco, Apr. 2017
  19. 14. Po-Wen Chi, Ming-Hung Wang, Jing-Wei Guo, and Chin-Laung Lei,, “SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-enabled Networks,” International Computer Symposium, 148-153, Chiayi, Taiwan, Dec. 2016
  20. 15. Ming-Hung Wang, Ting-Chieh Lai, Han-Chi Wang, Lung-Wen Chen, Chin-Wei Tien, Jian-Wei Liao and Chin-Laung Lei, “Investigating Vulnerabilities of HTML5 and HTTP/2.0 Websites Using Fuzzing,” Taiwan Academic Network Conference, 937-941, Hualian, Taiwan, Oct. 2016
  21. 16. Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei and Nen-Fu Huang, “SDNort: A Software Defined Network Testing Framework Using Openflow,” 11th Asia Joint Conference on Information Security, 100-107, Fukuoka, Japan, Aug. 2016
  22. 17. Ming-Hung Wang, Po-Wen Chi, Jing-Wei Guoy, and Chin-Laung Lei,, “DN Storage: A Stream-based Storage System over Software-defined Networks,” IEEE International Conference on Computer Communications, 361-362, San Francisco, CA, USA., Apr. 2016
  23. Ming-Hung Wang and Chin-Laung Lei, “Boosting Election Prediction Accuracy by Crowd Wisdom on Social Forums,” the 13th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, USA., Jan. 2016
  24. Ming-Hung Wang and Chin-Laung Lei, “Modelling Articles Polarity and Identifying Influential Authors through Social Movements,” IEEE International Conference on Systems, Man, and Cybernetics, Hong Kong, Oct. 2015
  25. Po-Wen Chi, Yu-Cheng Huang, Jing-Wei Guo, and Chin-Luang Lei, “Efficient NFV Deployment in Data Center Networks,” IEEE ICC 2015 - Next Generation Networking Symposium, pp. 5290-5295, London, UK., Jun. 2015
  26. He-Ming Ruan, Ming-Hwa Tsai, Yen-Nun Huang, Yen-Hua Liao and Chin-Laung Lei, “Discovery of De-identification Policies Considering Re-identification Risks and Information Loss,” the 10th Asia Joint Conference on Information Security (Recipient of the Best Paper Award), pp. 69-76, Kaohsiung, Taiwan, May 2015
  27. Po-Wen Chi, Chien-Ting Kuo, Jing-Wei Guo, and Chin-Laung Lei, “How to Detect a Compromised SDN Switch,” IEEE Conference on Network Softwarization, Workshop on Security issues in SDN, London, U.K., Apr. 2015
  28. Ming-Hung Wang, and Chin-Laung Lei,, “Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies,” ICS 2014, pp. 328-337, Taichung Taiwan, Dec. 2014
  29. Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei, “A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line,” Workshop on Cryptography and Information Security, ICS 2014 (Recipient of the Best Poster Award), pp. 269-276, Taichung Taiwan, Dec. 2014
  30. He-Ming Ruan, Gan Wei Yeap, and Chin-Laung Lei, “Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure,” Workshop on Cryptography and Information Security, ICS 2014, pp. 170-179, Taichung Taiwan, Dec. 2014
  31. Po-Wen Chi, Yu-Cheng Huang, Jing-Wei Guo, and Chin-Luang Lei, “Give Me a Broadcast-Free Network,” Globecom 2014 - Next Generation Networking Symposium, pp. 2009-2014, Austin, Texas, USA., Dec. 2014
  32. Po-Wen Chi, Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei, “An AMI Threat Detection Mechanism Based on SDN Networks,” The Eighth International Conference on Emerging Security Information, Systems and Technologies, pp. 208-211, Lisbon, Portugal, Nov. 2014
  33. He-Ming Ruan, and Chin-Laung Lei, “Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage,” The 9th Asia Joint Conference on Information Security, pp. 156-163, Wuhan, China., Sept. 2014
  34. Yi-Cheng Tsai, Mu-En Wu, Chin-Laung Lei, Chung-Shu Wu, and Jan-Ming Ho, “Comparing Profitability of Day Trading Using ORB Strategies on Index Futures Markets in Taiwan, Hong-Kong and USA,” the 10th Annual Conference of the Asia-Pacific Association of Derivatives, Busan, Korea, Aug. 2014
  35. He-Ming Ruan, Yun-Hsin Chuang, and Chin-Laung Lei, “Access Control over Vulnerable Devices in Advanced Metering Infrastructure,” National Computer Symposium, Taichung, Taiwan., Dec. 2013
  36. Ming-Hung Wang, Kuan-Ta Chen, Shuo-Yang Wang, and Chin-Laung Lei, “Understanding Potential Microtask Workers for Paid Crowdsourcing,” Conference on Human Computation & Crowdsourcing, Palm Springs, California USA., Nov. 2013
  37. He-Ming Ruan, Gan Wei Yeap, and Chin-Laung Lei, “Security Event Handling Framework For Advanced Metering Infrastructure,” International Conference on Applied and Theoretical Information Systems Research, Taipei, Taiwan., Nov. 2013
  38. Yeng-Ting Lee, Kuan-Ta Chen, Han-I Su, and Chin-Laung Lei, “Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach,” IGCVP 2013, Ilan, Taiwan, Aug. 2013
  39. Jing-Kai Lou, Kunwoo Park, Meeyoung Cha, Juyong Park, Chin-Laung Lei and Kuan-Ta Chen, “Gender Swapping and User Behaviors in Online Social Games,” The 22nd International World Wide Web Conference (WWW2013), pp. 827-836, Rio de Janeiro, Brazil, May 2013
  40. Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen and Chin-Laung Lei, “Design and Implementation of a Self-Growth Security Baseline Database for Automatic Security Auditing,” International Computer Symposium, Advances in Intelligent Systems and Applications, Vol. 2, pp. 177-184, Hualien, Taiwan, Dec. 2012
  41. Christine Peijinn Chai, He-Ming Ruan, Yu-Sheng Yang, I-An Fan, Yun-Hsin Chuang, Chin-Laung Lei, Chun-Ying Huang, Chi-Wen Teng, Yuh-Sheng Shaw and Minsiong Liang, “A Lightweight Mutual Authentication Scheme for Advanced Metering Infrastructure,” The 2nd. International Conference on Applied and Theoretical Information Systems Research, Taipei, Taiwan, Dec. 2012
  42. Jing-Kai Lou, Kuan-Ta Chen, Hwai-Jung Hsu, and Chin-Laung Lei, “Foretelling Online Game Addictveness,” 2012 International Workshop on Network and Systems Support for Games (NetGames 2012), Venice, Italy, Nov. 2012
  43. Yeng-Ting Lee, Kuan-Ta Chen, Han-I Su, and Chin-Laung Lei, “Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach,” 2012 International Workshop on Network and Systems Support for Games (NetGames 2012), Venice, Italy, Nov. 2012
  44. Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen and Chin-Laung Lei, “An Analysis of Security Patch Lifecycle Using Google Trend Tool,” 7th Asia Joint Conference on Information Security, pp. 31-34, Tokyo, Japan, Aug. 2012
  45. He-Ming Ruan, Yu-Shian Chen and Chin-Laung Lei, “Data Integrity on Remote Storage for On-line Co-working,” 7th Asia Joint Conference on Information Security, pp. 92-99, Tokyo, Japan, Aug. 2012
  46. He-Ming Ruan, Yu-Shian Chen, and Chin-Laung Lei, “Enabling Efficient Batch Verification on Data Integrity for Remote Storage,” The 13th International Conference on Internet Computing, Las Vegas, USA, Jul. 2012
  47. Yi-Cheng Tsai, Zheng-Hui Chen, Jan-Ming Ho, Ming-Yang Kao, Chin-Laung Lei, and Szu-Lang Liao, “Closed-Form Mortgage Pricing Formula with Outstanding Principal as Prepayment Value,” IEEE Computational Intelligence, New York City, USA, Mar. 2012
  48. Kuan-Ta Chen, Yu-Chun Chang, Po-Han Tseng, Chun-Ying Huang, and Chin-Laung Lei, “Measuring the latency of cloud gaming systems,” ACM international conference on Multimedi, pp. 1269-1272, Scottsdale, Arizona, USA, Dec. 2011
  49. Ren-Chiun Wang, Chun-Han Tung, and Chin-Laung Lei, “An Efficient Conference-Key Agreement Protocol for Mobile Devices,” National Computer Symposium, Chayi, Taiwan, Dec. 2011
  50. Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei and Sen-Jeng Chen, “A Mechanism on Risk Analysis of Information Security with Dynamic Assessment,” 3rd International Workshop on Managing Insider Security Threats, pp. 643-646, Fukuoka, Japan, Nov. 2011
  51. He-Ming Ruan, Yu-Sheng Yang, I-An Fan, Christine Peijinn Chai, Chun-Ying Huang and Chin-Laung Lei, “Security Threats in Advanced Metering Infrastructure,” The 6th Joint Workshop on Information Security, Kaohsiung, Taiwan, Oct. 2011
  52. Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei and Shih-Jen Chen, “AFRODITA: A Flexible Vulnerability Risk Scoring Database of Information Technology Security,” The 6th Joint Workshop on Information Security, Kaohsiung, Taiwan, Oct. 2011
  53. Yu-Chun Chang, Kuan-Ta Chen, Po-Han Tseng, and Chin-Laung Lei, “Understanding the Performance of Thin-Client Gaming,” 2011 Annual IEEE Communications Quality and Reliability (CQR) International Workshop, Naples, Florida, USA, May 2011
  54. He-Ming Ruan, Yu-Shian Chen, and Chin-Laung Lei, “Generic Framework for Electronic Anonymous Auctions,” International Conference on Information Security, pp. 7-12, Hangchou, China, Apr. 2011
  55. Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework,” ACM Multimedia Systems Conference (MMSys 2011), pp. 81-92, San Jose, U.S.A., Feb. 2011
  56. Yeng-Ting Lee, Kuan-Ta Chen, Yun-Maw Cheng, and Chin-Laung Lei, “World of Warcraft Avatar History Dataset,” ACM Multimedia Systems Conferene, pp. 123-128, San Jose, U.S.A, Feb. 2011
  57. Chien-Ju Ho, Chen-Chi Wu, Kuan-Ta Chen, and Chin-Laung Lei, “DevilTyper: A Game for Quantifying the Usability of CAPTCHA Tests,” 7th ACM International Conference on Advances in Computer Entertainment Technology, Taipei, Taiwan, Nov. 2010
  58. Chia-Chang Hsu, and Chin-Laung Lei, “A Search for Location Aided Routing Enhancement in Mobile Ad-Hoc Networks,” 8th ACM International Symposium on Mobility Management and Wireless Access, pp. 121-124, Bodrum, Turkey, Oct. 2010
  59. Jing-Kai Lou, Shou-de Lin, Kuan-Ta Chen, and Chin-Laung Lei, “What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information,” The 2010 International Conference on Advances in Social Networks Analysis and Mining, pp. 56-63, Odense, Denmark, Aug. 2010
  60. Yu-Chun Chang, Chi-Jui Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Radar Chart: Scanning for High QoE in QoS Dimensions,” 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop, Vancouver, British Columbia, Canada., Jun. 2010
  61. Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, Chien-Ju Ho, and Chin-Laung Lei, “Online Game QoE Evaluation using Paired Comparisons,” 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop, Vancouver, British Columbia, Canada, Jun. 2010
  62. Yu-Shian Chen, and Chin-Laung Lei, “Generic Framework Intimating Conventional Anonymous Auctions,” the 20th Cryptology & Information Security Conference, Hsinchu, Taiwan, May 2010
  63. Yu-Shian Chen, and Chin-Laung Lei, “Filtering False Messages En-route in Wireless Multi-hop Networks,” IEEE Wireless Communications and Networking Conference, Sydney, Australia, Apr. 2010
  64. Yen-Hua Liao, Chin-Laung Lei, and Wen-Chi Tsai, “A Robust Grid-based Key Predistribution Scheme for Sensor Networks,” Fourth International Conference on Innovative Computing, Information and Control, Kaohsiung, Taiwan, Dec. 2009
  65. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems,” Workshop on Mobile Computing and Wireless Communication, NCS2009 (Recipient of the Excellent Paper Award), Taipei, Taiwan, Nov. 2009
  66. Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, and Wen-Chi Tsai, “Tame Pool-based Pairwise Key Predistribution for Large-scale Sensor Networks,” IEEE Global Communications Conference 2009 (GLOBECOM'09), Hawaii USA, Nov. 2009
  67. Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “A Crowdsourceable QoE Evaluation Methodology for Multimedia Content,” ACM Multimedia 2009, pp. 491-500, Beijing, China, Oct. 2009
  68. Chia-Chang Hsu, and Chin-Laung Lei, “A Geographic Scheme with Location Update for Ad Hoc Routing,” International Conference on Systems and Networks Communications (Recipient of the Best Paper Award), pp. 43-48, Porto, Portugal, Sept. 2009
  69. Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, and Wen-Chi Tsai, “A Robust Hypercube-based Pairwise Key Establishment for Sensor Networks,” The 4th Joint Workshop on Information Security, Kaohsiung, Taiwan, Aug. 2009
  70. Powen Chi, and Chin-Laung Lei, “A Prevention Approach to Scrambling Attack in WiMAX Networks,” The 10th IEEE International Symposium on a World of Wireless, Mobile and Multmedia Networks, Kos, Greece, Jul. 2009
  71. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger,” The 19th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 97-102, Williamsburg, Virginia, USA, Jul. 2009
  72. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Peer-to-Peer Application Recognition Based on Signaling Activity,” IEEE International Conference on Communications (ICC), Dresden, Germany, Jun. 2009
  73. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Security Enhancement for Two User Identification Schemes with Anonymity against Active Attacks,” the 19th Cryptology & Information Security Conference, Taipei, Taiwan, Jun. 2009
  74. Jing-Kai Lou, Kuan-Ta Chen, and Chin-Laung Lei, “A Collusion-Resistant Automation Scheme for Social Moderation Systems,” the 6th annual IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, USA, Jan. 2009
  75. Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, and Chin-Laung Lei, “Inferring Speech Activity from Encrypted Skype Traffic,” IEEE Global Telecommunications Conference, 2008 (GLOBECOM'08, pp. 2143-2147, New Orleans, USA, Dec. 2008
  76. Jiunn-Jye Lee, Hann-Huei Chiou, Yu-Sheng Yang, Yu-Cheng Su, and Chin-Laung Lei, “A Sector-Based Routing Model over Structured Peer-to-Peer Networks,” International Workshop on Wireless Technologies for Smart Homes, Ilan, Taiwan., Sept. 2008
  77. Li Chen, Chia-Chang Hsu, and Chin-Laung Lei, “A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks,” International Workshop on Wireless Technologies for Smart Homes, Ilan, Taiwan, Sept. 2008
  78. Cheng-Chun Tu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “OneClick: A Framework for Capturing Users Network Experiences,” ACM SIGCOMM 2008 (poster), pp. 485-486, Seattle, USA, Aug. 2008
  79. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Detecting Peer-to-Peer Activity by Signaling Packets,” ACM SIGCOMM 2008 (poster), pp. 487-488, Seattle, USA, Aug. 2008
  80. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw and Wei-Ken Nien, “Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings,” The 3rd Joint Workshop on Information Security, pp. 85-96, Seoul, Korea, Jul. 2008
  81. Yu-Shian Chen, I-Lun Lin, and Chin-Laung Lei, “Lightweight Broadcast Authentication for Multiple Senders in Sensor Networks,” The 3rd Joint Workshop on Information Security, pp. 436-448, Seoul, Korea, Jul. 2008
  82. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Detecting VoIP Traffic Based on Human Conversation Patterns,” IPTComm 08: the Second Conference on Principles, Systems and Applications of IP Telecommunications, pp. 280-295, Heidelberg, Germany, Jul. 2008
  83. Yu-Shian Chen, I-Lun Lin, and Chin-Laung Lei, “Broadcast Authentication in Sensor Networks using Compressed Bloom Filters,” the 4th IEEE International Conference on Distributed Computing in Sensor Systems, pp. 99-111, Santorini Island, Greece, Jun. 2008
  84. 12. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Web Metering Scheme for Fair Advertisement Transactions,” the 2nd International Conference on Information Security and Assurance, pp. 453-356, Busan, Korea, Apr. 2008
  85. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “An Anonymous and Deniable Conversation for a Thin Client,” Fourth International Symposium on Frontiers in Networking with Applications (FINA2008), pp. 416-421, Ginowan city, Okinawa, Mar. 2008
  86. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost Problem,” The Third International Symposium on Security in Ubiquitous Computing, pp. 728–744, Taipei, Taiwan, Dec. 2007
  87. Li Yuan Lee, Jiunn Jye Lee, and Chin-Laung Lei, “A Universal Anonymous System for Structured Peer-to-Peer Networks,” IEEE TENCON 2007, Taipei, Taiwan., Oct. 2007
  88. Chien-Hua Chiu, and Chin-Laung Lei, “A High-Performance Clustering Scheme with Application in Network Intrusion Prevention System,” the 7th IEEE International Symposium on Communications and Information Technologies, pp. 1219-1224, Sydney, Australia, Oct. 2007
  89. Chun-Ying Huang, and Chin-Laung Lei, “Bounding Peer-to-Peer Upload Traffic in Client Networks,” 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2007), Edinburgh, UK, Jun. 2007
  90. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments,” 2007 International Conference on Multimedia and Ubiquitous Engineering, pp. 313-318, Seoul, Korea, Apr. 2007
  91. Jiunn-Jye Lee, Chun-Ying Huang, and Chin-Laung Lei, “Design and Implementation of Secure Communication Channels over UPnP Networks,” 2007 International Conference on Multimedia and Ubiquitous Engineering, pp. 307-312, Seoul, Korea., Apr. 2007
  92. Kuan-Ta Chen, and Chin-Laung Lei, “Network Game Design: Hints and Implications of Player Interaction,” NetGames 2006, Singapore., Oct. 2006
  93. Yu-Shian Chen, Chin-Laung Lei, Yu-Peng Chiu, and Chun-Ying Huang, “Confessible Threshold Ring Signatures,” International Conference on Systems and Networks Communications (ICSNC 2006), Tahiti, French Polynesia., Oct. 2006
  94. Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, and Chin-Laung Lei, “Building High-Performance Reconfigurable Bandwidth Controllers with Adaptive Clustering,” International Conference on Systems and Networks Communications (ICSNC 2006), Tahiti, French Polynesia., Oct. 2006
  95. Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, and Chin-Laung Lei,, “Quantifying Skype User Satisfaction,” ACM SIGCOMM 2006, pp. 399-410, Pisa, Italy, Sept. 2006
  96. Kuan-Ta Chen, and Chin-Laung Lei, “Design Implications of Social Interaction for Online Games,” IFIP 5th International Conference on Entertainment Computing (ICEC 2006), pp. 318-321, Cambridge, UK, Sept. 2006
  97. C. Y. Huang, K. T. Chen, and C. L. Lei,, “Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter,” 2006 International Conference on Dependable Systems and Networks (DSN-2006), pp. 403-412, Philadelphia, PA, USA, Jun. 2006
  98. K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei, “On the Sensitivity of Online Game Playing Time to Network QoS,” to appear in the 25th Conference on Computer Communications (IEEE INFOCOM 2006), Barcelona, Spain, Apr. 2006
  99. C. Y. Huang, Y. P. Chiu, K. T. Chen, and C. L. Lei,, “A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy Cryptography,” to appear in ACM Symposium on InformAtion, Computer and Communications Security, Taipei, Mar. 2006
  100. P. L. Tsai, C. Y. Huang, Y. Y. Huang, C. C. Hsu, and C. L. Lei, “A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec Virtual Private Networks\,” the 12th Annual IEEE International Conference on High Performance Computing, pp. 432-443, Goa, India, Dec. 2005
  101. J. H. Kuo, S. U. Te, P. T. Liao, C. Y. Huang, P. L. Tsai, C. L. Lei, Sy-Yen Kuo, Y. Huang, and Z. Tsai,, “An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing,” The 11th IEEE International Symposium Pacific Rim Dependable Computing (PRDC 05), pp. 133-139,, Changsha, China, Dec. 2005
  102. C. Y. Huang, Y. P. Chiu, K. T. Chen, H. H. Chiou, and C. L. Lei, “Secure Content Delivery using Key Composition,”,” 30th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, Nov. 2005
  103. H. H. Chiou, P. L. Tsai, J. J. Lee, H. F. Tung, and C. L. Lei, “Extending Cluster File Systems beyond Last Miles,” IEEE TENCON’05,, Melbourne, Australia, Nov. 2005
  104. C. L. Chang, Y. P. Chiu and C. L. Lei, “Automatic Generation of Conflict-Free IPSec Policies,” International Conference on Formal Techniques for Networked and Distributed Systems, pp. 233-246, Taipei,, Oct. 2005
  105. J. J Lee, P. L. Tsai, and C. L. Lei, “An On-Line Page-Structure Approximation Scheme for Web Proxies,” IEEE Distributed, Parallel and Network Applications, pp. 769-773, Fukuoka, Japan, Jul. 2005
  106. K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei,, “Game Traffic Analysis: An MMORPG Perspective,” 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 19-24, Washington, Jun. 2005
  107. C. L. Lei, P. W. Chi, and Y. P. Chiu, “A CRT-Based Key Pre-distribution Scheme for Sensor Networks,” the 15th Conference on Information Security,, pp. 68-75, May 2005
  108. K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei,, “The Impact of Network Variabilities on TCP Clocking Schemes,” 8th IEEE Global Internet Symposium (in conjunction with IEEE INFOCOM 2005), pp. 97-102, Miami, USA, Mar. 2005
  109. Y. P. Chiu, C. L. Lei, and C. Y. Huang, “Secure Multicast Using Proxy Encryption,” the Seventh International Conference on Information and Communications Security, pp. 280-290, Beijing, China, 2005
  110. P. L. Yu, P. L. Tsai, and C. L. Lei, “A Content-Protection Scheme for Multi-Layered Reselling Structures,” 19th IFIP International Information Security Conference, pp. 339-349, Aug. 2004
  111. P. L. Tsai and C. L. Lei, “A Session Migration Scheme for Smart Web Services in Mobile Computing,” Proceedings of the International Symposium on Web Services and Applications (ISWS '04),, pp. 846-850, Jun. 2004
  112. P. L. Tsai, C. L. Lei, and W. Y. Wang, “A Remote Control Scheme for Ubiquitous Personal Computing,” IEEE International Conference on Networking, Sensing and Control, pp. 1020-1025, 2004
  113. C. Y. Huang, and C. L. Lei, “Roundly Router Stamping: Detect and Mitigate DDoS Attacks,” Proceedings of the 14th Conference on Information Security (candidate for best paper), pp 39-46, 2004
  114. Y. P. Chiu, C. L. Lei, and P. L. Yu, “Comments on Improved Proxy Deposit Protocol for E-cash Systems,” Proceedings of the 14th Conference on Information Security, pp 460-462, 2004
  115. C. L. Lei, “Design and Implementation of a Secure and High Performance Linux-Based Cluster File System,” 2003 International Conference on Open Source, pp. 191-196, 2003
  116. Y. M. Hsu and C. L. Lei, “On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent Perspective,” The fourth Workshop for Management Sciences, pp. 272-288, 2003
  117. P. L. Yu, C. L. Lei, H. J. Chen and C. Y. Huang, “User Efficient Fair Blind Signatures,” Proceedings of the Second International Workshop for Asia Public Key Infrastructure, pp. 101-103, 2003
  118. C. L. Lei and M. H. Chan, “An Efficient Anonymous Buyer-Seller Watermarking Protocol,” 2002 International Computer Symposium, Workshop on Cryptology and Information Security, 2002
  119. C. L. Lei and Y. M. Hsu, “Designing E-Marketplace for Wireless PDA using Mobile Agents and Kerberos,” 4th Workshop on Cyberspace:Information, Law and Society, pp. 278-286, 2002
  120. C. L. Lei and Y. M. Hsu, “Building E-marketplaces with Mobile Agents,” The 2002 Conference on Technology and Management-Production-Commerce Integration and Collaborative Management in e-Era, pp. 51-59, 2002
  121. C. L. Lei and Y. M. Hsu, “Mobile Agents for E-marketplaces in Wireless Networks,” The 13th Workshop on Object Oriented Technology and Application, pp. 285-294, 2002
  122. W. S. Juang, H. T. Liaw, and C. L. Lei, “A Practical Anonymous Payment Scheme for Electronic Commerce,” The Seventh International Conference on Distributed Multimedia Systems, pp. 305-311, 2001
  123. P. L. Yu, C. L. Lei, C. I. Fan and H. J. Chen, “A User Efficient Fair E-cash Scheme without On-line Trusted Third Party,” The 2001 International Workshop on Cryptology and Network Security, pp. 246-251, 2001
  124. C. I. Fan, C. L. Lei, and Y. P. Chiu, “A Fast Blind Signature Scheme,” The 2001 International Workshop on Cryptology and Network Security, pp. 189-193, 2001
  125. P. L. Tsai, and C. L. Lei, “Towards Ubiquitous Computing via Secure Desktop Service,” IEEE Region 10 International Conference on Electrical and Electronics Technology, pp. 187-190, 2001
  126. P. L. Yu, and C. L. Lei, “A User Efficient Fair E-cash Scheme with Anonymous Certificates,” IEEE Region 10 International Conference on Electrical and Electronics Technology, pp. 74-77, 2001
  127. W. S. Juang, H. T. Liaw, C. L. Lei, and P. C. Lin, “Fair Blind Threshold Signatures in Wallet with Observers,” Proceedings of 2001 National Computer Symposium, pp. 1-8, 2001
  128. L. F. Chen, and C. L. Lei, “A Computer Immune System using Mobile Agents,” Proceedings of the First National Internet Engineering Conference, 2001
  129. W. S. Juang, H. T. Liaw, C. L. Lei, and P. L. Yu, “A Secure and Anonymous Multi-authorties E-cash Scheme,” Proceedings of the 11th Conference on Information Security, pp. 281-288, 2001
  130. C. I. Fan, C. L. Lei, and Y. P. Chiu, “Comments on Improved User Efficient Blind Signatures,” Proceedings of the 11th Conference on Information Security, pp. 51-53, 2001
  131. P. L. Yu, and C. L. Lei, “A Proxy Deposit Protocol for E-Cash Systems,” Proceedings of the 11th Conference on Information Security, pp. 289-295, 2001
  132. H. H. Chiou, I. C. Lai, and C. L. Lei, “Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems,” 20th International Conference on Distributed Computing Systems, pp. 654-661, 2000
  133. P. L. Yu, C. L. Lei, and L. F. Chen, “An Efficient Inter-Domain Group Key Management Scheme,” 2000 International Computer Symposium, Workshop on Cryptology and Information Security, pp. 21-26, 2000
  134. S. F. Tsai, C. L. Lei and I. C. Lai, “An Efficient Tree-Based Processor Allocation Scheme for Mesh Connected Systems,” 2000 International Computer Symposium, Workshop on Software Engineering and Database Systems, pp. 168-175, 2000
  135. C. L. Lei, and W. S. Juang, “Provably Secure Blind Threshold Signatures Based on Discrete Logarithm,” Proceedings of 1999 National Computer Symposium, pp. C198-C205, 1999
  136. Y. C. Sun, and C. L. Lei, “Skins as a Mechanism for Making Languages Syntactically Extensible,” Proceedings of 1999 National Computer Symposium, A181-A187, 1999
  137. C. I. Fan, and C. L. Lei, “A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting Process,” Proceedings of 1999 National Computer Symposium, pp. C269-C276, 1999
  138. C. L. Lei, “Issues for Building Virtual Private Networks,” Proceedings of the 1999 Computer & Communications Technologies conference, 1999

Books:

  1. Shiuh-Jeng Wang, Chung-Huang Yang, and Chin-Laung Lei, “Computer and Network Security in Practice Applying to High-tech Society,” DrMaster Press Co., Ltd., Taiwan, 506 pages, Sept. 2009, ISBN:978-986-201-254-3
  2. Tzong-Chen, Chin-Laung Lei, Vincent Rijmen, and Der-Tsai Lee, “Information Security,” LNCS5222, Springer, USA, 504 pages, Sept. 2008, ISBN:978-3-540-85884-3
  3. Wen-Shenq Juang, Sian-Teng Chen and Chin-Laung Lei,, “VoIP Security (in Collected Papers on Information and Communication Security),” Science & Technology Policy Research and Information Center, National Applied Research Laboratories, Taiwan, R.O.C., Nov. 2006, ISBN:957-619-133-5
  4. C. L. Lei, and Chun-I Fan, “The Security of Mobile E-Commerce,” Science and Technology Policy Research and Information Center, NARL, Taiwan, R.O.C., 158 pages, Jun. 2005, ISBN:957-619-124-6

Patents:

  1. Yu-Shian Chen and Chin-Laung Lei, “Method for processing and verifying remote dynamic data, system using the same, and computer-readable medium,” 美國專利 US 9378155 B2, Jun. 2016
  2. 郭建廷、阮鶴鳴、雷欽隆, “資訊安全稽核管控系統、方法及其電腦可讀取紀錄媒體,” 中華民國專利 發明第 I482047 號, Apr. 2015
  3. 陳煜弦、雷欽隆, “遠端動態資料的處理與驗證方法、系統,以及電腦可讀記錄媒體,” 中華民國專利 發明第 I483138 號, Apr. 2015
  4. 阮鶴鳴, 雷欽隆, 劉永之, “存取控制系統及其存取控制方法,” 中華民國專利 發明第 I466525 號, Dec. 2014
  5. Chin-Laung Lei, Yung-Chih Liu, He-Ming Ruan, “Access Control System and Access Control Method Thereof,” 美國專利 US8909937 B, Sept. 2014
  6. Chin-Laung Lei, Yung-Chih Liu, He-Ming Ruan, “Access Control System and Access Control Method Thereof,” 德國專利 DE. 10 2011 088 550 B4, May 2013
  7. 趙涵捷、郭斯彥、顏嗣鈞、雷欽隆、紀廷運, “一種定位資訊之情境影像系統,” 中華民國專利 發明第 I 359952 號, Mar. 2012
  8. 阮鶴鳴、雷欽隆、劉永之, “存取控制系統及其存取控制方法,,” 中國專利 發明第 1912319號, Dec. 2011
  9. 趙涵捷、郭斯彥、顏嗣鈞、雷欽隆、紀廷運, “一種定位資訊之情境影像裝置,” 中華民國專利 第M345243號, Nov. 2008
  10. 趙涵捷、郭斯彥、顏嗣鈞、雷欽隆、紀廷運, “影像偵測觸控學習裝置,” 中華民國專利 第M340503號, Sept. 2008