Shu-Ping Lu, Chin-Laung Lei and Meng-Han Tsai, “An efficient Proof-of-Authority consensus scheme against cloning attacks,” Computer Communications, Volume 228, Dec. 2024
Yi-Ting Peng and Chin-Laung Lei, “Using Bidirectional Encoder Representations from Transformers (BERT) to predict criminal charges and sentences from Taiwanese court judgments,” PeerJ Computer Science, 10:e1841, Jan. 2024
Meng-Han Tsai, Chia-Ching Lin, Zheng-Gang He, Wei-Chieh Yang, and Chin-Laung Lei , “PowerDP: De-obfuscating and Profiling Malicious PowerShell Commands with Multi-label Classifiers,” IEEE Access, 11(1), 256-270, Jan. 2023
Yi-Hsien Chen, Si-Chen Lin, Szu-Chun Huang, Chin-Laung Lei, and Chun-Ying Huang, “Guided Malware Sample Analysis based on Graph Neural Networks,” IEEE Transactions on Information Forensics & Security, Vol. 18, 4128-4143, 2023
Chung-Kuan Chen, Si-Chen Lin, Szu-Chun Huang, “Building Machine Learning-based Threat Hunting System from Scratch,” ACM Digital Threats: Research and Practice, 1, 21-Vol. 3, No. 3, Sept. 2022
Shu-Ping Lu, Chin-Laung Lei, Cheng-Yun Ho, Shy-Shang Hwang, and Hsin-Chen Chen, “Distributed Ledger Technology based Architecture for Decentralized Device-to-Device Communication Network,” IEEE Access, 10(1), 92006--92022, Sept. 2022
Chia-Ching Lin, Hsin-Li Chu, Yu-Chiang Frank Wang, and Chin-Laung Lei, “Joint Feature Disentanglement and Hallucination for Few-Shot Image Classification,” IEEE Transactions on Image Processing, Volume: 30, 9245-9258, Nov. 2021
Yun-Hsin Chuang and Chin-Laung Lei, “"PUF Based Authenticated Key Exchange Protocol for IoT without Verifiers and Explicit CRPs,” IEEE Access, Volume 9, 112733-112743, Aug. 2021
Yun-Hsin Chuang and Chin-Laung Lei, “An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multi-server environment and a survey,” International Journal of Communication Systems, 34(1), 2021
Yun-Hsin Chuang, Chin-Laung Lei, and Hung-Jr Shiu, “How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security,” Symmetry, 13(9), 2021
Po-Wen Chi, Ming-Hung Wang, Jing-Wei Guo, and Chin-Laung Lei, “MigrateSDN: Efficient Approach to Integrate OpenFlow Networks with STP-enabled Networks,” International Journal of Computational Science and Engineering, 20 (4), 480-491, Jan. 2020
Albert Guan and Chin-Laung Lei, “An Improved Key-Agreement Protocol for Channels with Small Error Rate,” Journal of Internet Technology, vol. 20, no. 7, 2277-2284, Dec. 2019
Yun-Hsin Chuang and Chin-Laung Lei, “Privacy Protection for Telecare Medicine Information Systems with Multiple Servers Using a Biometric-based Authenticated Key Agreement Scheme,” IEEE Access, Volume 7, Issue 1, 186480-186490, Dec. 2019
Chih-Fan Hsu, Yu-Shuen Wang, Chin-Laung Lei, and Kuan-Ta Chen, “Look at Me! Correcting Eye Gaze in Live Video Communication,” ACM Transactions on Multimedia Computing Communications and Applications, Volume 15, Issue 2, Jun. 2019
Yi-Cheng Tsai, Mu-En Wu, Chin-Laung Lei, Chung-Shu Wu, Jan-Ming Ho and Chuan-Ju Wang, “Assessing the profitability of timely opening range breakout breakout on index futures markets,” IEEE Access, Vol. 7, Issue 1,, 32061-32071, 2019
Yi-Cheng Tsai, Mu-En Wu, Chin-Laung Lei, Chung-Shu Wu, Jan-Ming Ho and Chuan-Ju Wang, “Assessing the profitability of timely opening range breakout on index futures markets,” IEEE Acces, Vol. 7, Issue 1, 32061-32071, 2019
Po-Wen Chi, and Chin-Luang Lei,, “Audit-Free Cloud Storage via Deniable Attribute-based Encryption,” IEEE Transactions on Cloud Computing, accepted, Vol. 6, Issue 2, 414-427, Jun. 2018
Ming-Hung Wang and Chin-Laung Lei, “SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events,” Journal of Information Science and Engineering, Vol. 34, No. 6, 1579-1598, 2018
Hong-Bin Tsai and Chin-Laung Lei, “Time-Shift Replacement Algorithm for Main Memory Performance Optimization,” Journal of Supercomputing, Vol. 74, No. 6, 2729-2746, 2018
Chien-Ting Kuo, Po-Wen Chi, Victor Chang, and Chin-Laung Lei, “SFaaS: Keeping an Eye on IoT Fusion Environment with Security Fusion as a Service,” Future Generation Computer Systems, Vol. 86, 1424-1436, 2018
Yi-Cheng Tsai, Chuan-Ju Wang, William Cheung, Chung-Shu Wu, Jan-Ming Ho, and Chin-Laung Lei,, “Exploring the Persistent Behavior of Financial Markets,” Finance Research Letters, Vol. 24, 199-220, 2018
Ming-Hung Wang and Chin-Laung Lei, “SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events,” Journal of Information Science and Engineering, Vol. 34, No. 6, 1579-1598, 2018
Po-Wen Chi and Chin-Luang Lei, “Audit-Free Cloud Storage via Deniable Attribute-based Encryption,” IEEE Transactions on Cloud Computing,, Vol. 6, Issue 2, 414-427, 2018
Ming-Hung Wang, Lung-Wen Chen, Po-Wen Chi, and Chin-Laung Lei, “SDUDP: A Reliable UDP-based Transmission Protocol over SDN,” IEEE Access, Volume 5, Issue 1, 5904-5916, Dec. 2017
Yen-Hwa Liao, Chin-Laung Lei, Ying-I Ko, Yu-Shian Chen, and Chien-Hua Chiu, “Enhanced Tame-based Key Predistribution Scheme for Sensor Networks,” Journal of Internet Technology, Vol. 18, No, 7, 1499-1514, Dec. 2017
Hung-Jr Shiu, Bor-Shing Lin, and Chin-Laung Lei, “Privacy Preserving of Online Digital Physiological Signals using Reversible Steganography,” Computer Methods and Programs in Biomedicine, Volume 151, 159-170, Nov. 2017
Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan,” The Computer Journal, Volume 60, Issue 11, 1675-1686, Nov. 2017
Ming-Hung Wang, Han-Chi Wang, and Chin-Laung Lei,, “Automatic Test Pattern Generator for Fuzzing Based on Finite State Machines,” Security and Communication Networks, vol. 2017, Nov. 2017
Hung-Jr Shiu, Bor-Shing Lin, Chia-Wei Cheng, Chien-Hung Huang, and Chin-Laung Lei, “High Capacity Information Protection of Synthesized Pitches using Amplitude Enhancement-A New Vision of Acoustic Steganography,” Symmetry, Vol. 9, No.6, Jun. 2017
Yi-Cheng Tsai, Chin-Laung Lei, Jan-Ming Ho, Ming-Yang Kao, and Szu-Lang Liao, “Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing,” Journal of Information Science and Engineering, Vol. 31. No. 3, pp. 925-942, May 2015
He-Ming Ruan, and Chin-Laung Lei,, “Discovery of De-identification Policies Considering Re-identification Risks and Information Loss,” Engineering Science & Technology Bulletin, No. 145, pp. 45-47, Apr. 2015
Yu-Shian Chen, He-Ming Ruan, and Chin-Laung Lei, “Stratus: Check and Share Encrypted Data among Heterogeneous Cloud Storage,” Journal of Internet Technology, Vol. 15, No. 6, pp. 999-1011, Nov. 2014
H. J. Shiu, S. Y. Tang, C. H. Huang, R .C. T. Lee, and C. L. Lei, “A Reversible Acoustic Data Hiding Method Based on Analog Modulation,” Information Sciences, Volume 273, pp. 233–246, Jul. 2014
Jing-Kai Lou, Fu-Min Wang, Chin-Hua Tsai, San-Chuan Hung, Perng-Hwa Kung, Shou-De Lin, Kuan-Ta Chen and Chin-Laung Lei, “A Social Diffusion Model with an Application on Election Simulation,” The Scientific World Journal, Volume 2014, Article ID 180590, 14 pages, 2014
Yu-Shian Chen, and Chin-Laung Lei, “Aggregate Message Authentication Codes (AMACs) with On-the-fly Verification,” International Journal of Information Security, Vol. 12, No. 6,, pp. 495-504, Nov. 2013
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework,” IEEE Transactions on Multimedia, Vol. 15, No. 5, pp. 1121-1137, Aug. 2013
Chien-Hua Chiu and Chin-Laung Lei, “EtherAgent: Scaling Ethernet for Enterprise and Campus Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2465-2483, Jun. 2013
Chia-Chang Hsu and Chin-Laung Lei, “A Lightweight Firework Search Protocol for Location-Aided Routing Enhancement in Mobile Ad-Hoc Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2261-2282, Jun. 2013
Jiunn-Jye Lee, Li-Yuan Lee and Chin-Laung Lei, “Aura: An Anonymous Universal Relay Architecture over Structured Peer-To-Peer Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2327-2346, Jun. 2013
Chia-Chang Hsu and Chin-Laung Lei, “A Lightweight Firework Search Protocol for Location-Aided Routing Enhancement in Mobile Ad-Hoc Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2261-2282, Jun. 2013
Jiunn-Jye Lee, Hann-Huei Chiou, Chia-Chang Hsu, and Chin-Laung Lei, “An Adaptive Sector-Based Routing Model over Structured Peer-to-Peer Networks,” Computer Networks, Volume 57, Issue 4, pp. 887–896, Mar. 2013
Yun-Hsin Chuang, Yuh-Min Tseng and Chin-Laung Lei, “Efficient Mutual Authentication And Key Agreement With User Anonymity For Roaming Services In Global Mobility Networks,” International Journal of Innovative Computing, Information and Control, Vol. 8, No. 9, pp. 6415-6427, Sept. 2012
Chien-Hua Chiu and Chin-Laung Lei, “A Decentralized Clustering Scheme for Transparent Mode Devices,” Journal of Clustering Computing, Volume 15, Issue 3, 265-279, Sept. 2012
Yu-Chun Chang, Chi-Jui Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Radar Chart: Scanning for High QoE in QoS Dimension,” IEEE Network, Volume: 26, Issue: 4, pp. 25-31, Aug. 2012
Yun-Peng Chiu, Chun-Ying Huang and Chin-Laung Lei, “SEMPRE: Secure Multicast Architecture Using Proxy Re-Encryptio,” International Journal of Innovative Computing, Information and Control, Volume 8, Number 7(A), pp. 4719-4748, Jul. 2012
Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang and Wen-Chi Tsai, “Tame Pool-based Pairwise Key Predistribution for Large-scale Sensor Networks,” International Journal of Innovative Computing, Information and Control, Volume 8, Number 2, pp. 1001-1024, Feb. 2012
Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Provably Secure and Efficient Identification and Key Agreement Protocol with User Anonymity,” Journal of Computer and System Sciences, Volume 77, Issue 4, pp. 790-798, Jul. 2011
13. Chien-Ju Ho, Chen-Chi Wu, Kuan-Ta Chen, and Chin-Laung Lei, “DevilTyper: A Game for CAPTCHA Usability Evaluation,” ACM Computer in Entertainment, Volume 9 Issue 1, pp. 3-1~3-14, Apr. 2011
Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Robust Authentication and Key Agreement Scheme Preserving the Privacy of Secret Key,” Computer Communications, Vol. 34, pp. 274-280, 2011
Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Smart Card-based Secure Web Services in the Three-party Setting,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 11, pp. 5259-5274, Nov. 2010
Kuan-Ta Chen, Chi-Jui Chang, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “Quadrant of Euphoria: A Crowdsourcing Platform for QoE Assessment,” IEEE Network, Vol. 24, No. 2, pp.28-35, Mar. 2010
Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw and Wei-Ken Nien, “Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings,” International Journal of Innovative Computing Information and Control, Vol. 6, No. 2, pp. 763-772, Feb. 2010
Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 6, No. 3, pp. 183-190, 2010
Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, and Chin-Laung Lei, “Fair anonymous rewarding based on electronic cash,” Journal of Systems and Software, Volume 82 Issue 7, pp. 1168-1176, Jul. 2009
Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “Effect of Network Quality on Player Departure Behavior in Online Games,” IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 5, pp. 593-606, May 2009
Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, “A Robust Authentication Scheme with User Anonymity for Wireless Environments,” International Journal of Innovative Computing, Information and Control, Vol. 5, No. 4, pp. 1069-1080, Apr. 2009
Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, “User Authentication Scheme with Privacy-preservation for Multi-server Environment,” IEEE Communications Letters, Vol. 13, No. 2, pp, 157-159, Feb. 2009
Chen-Chi Wu, Kuan-Ta Chen, Chih-Ming Chen, Polly Huang, and Chin-Laung Lei, “On the Challenges and Designs of Transport Protocols for MMORPGs,” Multimedia Tools and Applications, Vol. 45, pp. 7-32, 2009
Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Hao-Hua Chu, Chin-Laung Lei and Wen-Chin Chen, “Identifying MMORPG Bots: A Traffic Analysis Approach,” EURASIP Journal on Advances in Signal Processing, Volume 2009, 2009
Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Web Metering Scheme for Fair Advertisement Transactions,” International Journal of Security and Its Applications, Vol. 2, No. 4, pp. 49-56, Oct. 2008
Te-Yuan Huang, Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “A Generalizable Methodology for Quantifying User Satisfaction,” IEICE Transactions on Communications, 91-B(5), 1260-1268, May 2008
Yu-Shian Chen, Hsu-Chun Hsiao, and Chin-Laung Lei, “A Survey of Secure Data Aggregation on Sensor Networks,” Communications of CCISA, Vol. 13, No. 4, pp. 17-28, Oct. 2007
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, and Chin-Laung Lei, “Secure Multicast in Dynamic Environments,” Computer Networks, Volume 51, Issue 10, pp. 2805--2817, Jul. 2007
Pan-Lung Tsai, and Chin-Laung Lei, “Analysis and Evaluation of a Multiple Gateway Traffic-Distribution Scheme for Gateway Clusters,” Computer Communications, Vol. 29, Issue 16, pp. 3170-3181, Dec. 2006
Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “How sensitive are online gamers to network quality?,” Communications of the ACM, Vol. 49, Issue 11, pp. 34-38, Nov. 2006
K. T. Chen, P. Huang, and C. L. Le, “Game Traffic Analysis: An MMORPG Perspective,” Computer Networks, Vol. 50, No. 16, pp. 3002-3023, 2006
C. L. Lei, P. L. Yu, P. L. Tsai, and M. H. Chan, “An Efficient and Anonymous Buyer-Seller Watermarking Protocol,” IEEE Transactions on Image Processing,, Vol. 13 , No. 12, pp. 1618 - 1626,, 2004
C. I. Fan, and C. L. Lei, “Divisible Blind Signatures based on Hash Chains,” International Journal of Computers and Applications, Volume 26, Issue 1,, pp. 1-9,, 2004
W. S. Juang, C. L. Lei, and H. T. Liaw, “Privacy and Anonymity Protection wit Blind Threshold Signatures,” International Journal of Electronic Commerce, Vol. 7, No. 2, pp. 145-159, 2003
C. L. Lei, and W. S. Juang, “Provably Secure Blind Threshold Signatures Based on Discrete Logarithm,” Journal of Information Science and Engineering, Vol. 18, pp. 23-39, 2002
C. I. Fan, and C. L. Lei, “An Unlinkably Divisible and Intention Attachable Ticket Scheme for Runoff Elections,” Journal of Network and Computer Applications, Vol. 25, No. 2, pp. 93-107, 2002
T. H. Yeh, C. M. Kuo, C. L. Lei, and H. C. Yen, “Distributed and On-Line Routing on Tori,” Algorithmica, Vol. 32, No. 4, pp. 562-593, 2002
W. S. Juang, C. L. Lei, and H. T. Liaw, “A Verifiable Multi-Authorities Secret Election Allowing Abstaining from Voting,” The Computer Journal, Vol. 45, No. 6, pp. 672-682, 2002
C. I. Fan, and C. L. Lei, “A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash,” Journal of Information Science and Engineering, Vol. 18, pp. 47-58, 2002
C. I. Fan, and C. L. Lei, “Divisible Blind Signatures based on Hash Chains,” International Journal of Computers and Application, Vol. 24, Issue 3, 2002
T. H. Yeh, and C. L. Lei, “Competitive Analysis of Minimal Oblivious Routing Algorithms on Hypercubes,” IEICE Trans. on Information and Systems, Vol. E84-D, No.1, pp. 65-75, 2001
W. S. Juang, C. L. Lei, and H. T. Liaw, “Fair Blind Threshold Signatures Based on Discrete Logarithms,” Computer Systems – Science and Engineering, Vol. 16, No. 6, pp. 371-379, 2001
C. I. Fan, and C. L. Lei,, “Cryptanalysis on improved user efficient blind signatures,” IEE Electronics Letters, Vol.37, No.10, pp.630-631, 2001
Y. C. Sun, C. L. Lei, and M. L. Kuo, “A Fully Distributed Approach to Repositories of Reusable Components,” Journal of Information Science and Engineering, Vol. 17, No. 1, pp. 147-158, 2001
H. J. Chen, C. L. Lei, and P. L. Yu, “Fairness in E-cash Systems,” Information Security Newsletter, Vol. 7, No. 4, pp. 82-95, 2001
C. L. Lei, and C. E. Yin, “Smart Card Payment Today and Tomorrow,” Information Security Newsletter, Vol. 7, No. 4, pp. 46-60, 2001
Y. C. Sun, C. L. Lei, and M. L. Kuo, “A Naming, Storage, and Retrieval Model for Software Assets,” IEICE Trans. on Information and Systems, Vol. E83-D, No. 4, pp. 789-796, 2000
A. Lai, C. L. Lei, and H. H. Chiou, “A False-Sharing Free Distributed Shared Memory Management Scheme,” IEICE Trans. on Information and Systems, Vol. E83-D, No. 4, pp. 777-788, 2000
W. S. Juang, C. L. Lei, and C. Y. Chang, “Anonymous Channel and Authentication in Wireless Communications,” Computer Communications, Vol. 22, No. 15-16, pp. 1502-1511, 1999
W. S. Juang, and C. L. Lei, “Partially Blind Threshold Signatures Based on Discrete Logarithms,” Computer Communications, Vol. 22, No. 1, pp. 73-86, 1999
Conference & proceeding papers:
Jian-Syue Huang, Tsung-Han Liu, Yi-Hsien Chen, Hsuan-Yu Peng, Tse-Wei Huang, Chin-Laung Lei, and Chun-Ying Huang, “Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the Hypervisor,” 2024 ACM Computer and Communications Security Conference, Cloud Computing Security Workshop, 66-79, Salt Lake City, USA, Oct. 2024
Si-Chen Lin, Yi-Hsien Chen, Szu-Chun Huang, Chin-Laung Lei and Chun-Ying Huang, “Automatic Analysis of Malware Based on Graph Neural Network,” the 32nd Cryptology & Information Security Conference, New Taipei City, Taiwan, Jun. 2022
Yi-Hsien Chen, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, and Chun-Ying Huang, “Construct macOS Cyber Range for Red/Blue Teams,” 15th ACM ASIA Conference on Computer and Communications Security, 934-936, Taipei, Taiwan., Oct. 2020
Yun-Hsin Chuang, Chin-Laung Lei, and Hung-Jr Shiu, “Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines,” 15th Asia Joint Conference on Information Security, 66-73, Taipei, Taiwan., Aug. 2020
Chia-Ching Lin, Yu-Chiang Frank Wang, Chin-Laung Lei, and Kuan-Ta Chen, “Semantics-Guided Data Hallucination for Few-Shot Visual Classification,” The 26th IEEE International Conference on Image Processing (ICIP), 3302-3306, Taipei, Taiwan., Sept. 2019
Meng-Han Tsai, Ming-Hung Wang, Wei-Chieh Yang, and Chin-Laung Lei,, “Uncovering Internal Threats Based on Open-source Intelligence,” International Computer Symposium, Yunlin, Taiwan, Dec. 2018
Albert Guan and Chin-Laung Lei, “Efficient Key Agreement Protocol for Smart Sensors,” IEEE Conference on Dependable and Secure Computing, Kaohsiung, Taiwan, Dec. 2018
Chih-Fan Hsu, Yu-Cheng Chen, Yu-Shuen Wang, Chin-Laung Lei, and Kuan-Ta Chen, “Realizing the Real-time Gaze Redirection System with Convolutional Neural Network,” ACM Multimedia Systems Conference, Amsterdam, The Netherland, Jun. 2018
Ming-Hung Wang, Meng-Han Tsai, Wei-Chieh Yang, and Chin-Laung Lei, “Infection Categorization Using Deep Autoencoder,” IEEE INFOCOM’18 Demo Session, Honolulu, HI, USA, Apr. 2018
Hong-Bin Tsai and Chin-Laung Lei, “CAHR: Centrality-Aware Hybrid Replacement in Information-Centric Network,” National Computer Symposium, Hualien, Taiwan, Dec. 2017
8. Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Wei-Chou Lai, Chien-Hung Huang and Chin-Laung Lei, “A Stereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure Tones,” Euro-China Conference on Intelligent Data Analysis and Application, Málaga, Spain, Oct. 2017
7. He-Ming Ruan, Jen-Hao Kuo, Chun-Yi Chan, and Chin-Laung Lei, “Investigation of Mobile App Behaviors, from the Aspect of Real World Mobile Backend System,” IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, Amman, Jordan, Oct. 2017
6. Chih-Fan Hsu, Anthony Chen, Cheng-Hsin Hsu, Chun-Ying Huang, Kuan-Ta Chen and Chin-Laung Lei, “Is Foveated Rendering Perceivable? A Study on the Efficiency and Consistency of Subjective Assessment Methods,” ACM Multimedia, Mountain View, CA USA., Oct. 2017
9. Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang and Chin-Laung Lei, “Data Hiding on Social Media Communications Using Text Steganography,” International Conference on Risks and Security of Internet and System, Dinard, France, Sept. 2017
10. Chien-Ting Kuo, Victor Chang, and Chin-Laung Lei,, “A Feasibility Analysis for Edge Computing Fusion in LPWA IoT Environment with SDN Structure,” InternationaWorkshop on Data Analytics and Emerging Services, Antalya, Turkey, Aug. 2017
11. He-Ming Ruan, Jen-Hao Kuo, Chun-Yi Chan, and Chin-Laung Lei, “Toward High Throughput Backend Provision for Mobile Apps with a Microservice Approach,” International Conferance on Internet Computing and Internet of Things, Las Vegas, USA., Jul. 2017
12. Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Temporal Dynamics of On-Line Political Ideology: Longitudinal Study on Facebook,” Annual Conference of the European Political Science Association, Milan, Italy, Jun. 2017
Hong-Bin Tsai and Chin-Laung Lei, “A Page Replacement Algorithm Based on Frequency Derived From Reference History,” ACM SIGAPP Symposium On Applied Computing, 1522-1527, Marrakesh, Morocco, Apr. 2017
14. Po-Wen Chi, Ming-Hung Wang, Jing-Wei Guo, and Chin-Laung Lei,, “SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-enabled Networks,” International Computer Symposium, 148-153, Chiayi, Taiwan, Dec. 2016
15. Ming-Hung Wang, Ting-Chieh Lai, Han-Chi Wang, Lung-Wen Chen, Chin-Wei Tien, Jian-Wei Liao and Chin-Laung Lei, “Investigating Vulnerabilities of HTML5 and HTTP/2.0 Websites Using Fuzzing,” Taiwan Academic Network Conference, 937-941, Hualian, Taiwan, Oct. 2016
16. Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei and Nen-Fu Huang, “SDNort: A Software Defined Network Testing Framework Using Openflow,” 11th Asia Joint Conference on Information Security, 100-107, Fukuoka, Japan, Aug. 2016
17. Ming-Hung Wang, Po-Wen Chi, Jing-Wei Guoy, and Chin-Laung Lei,, “DN Storage: A Stream-based Storage System over Software-defined Networks,” IEEE International Conference on Computer Communications, 361-362, San Francisco, CA, USA., Apr. 2016
Ming-Hung Wang and Chin-Laung Lei, “Boosting Election Prediction Accuracy by Crowd Wisdom on Social Forums,” the 13th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, USA., Jan. 2016
Ming-Hung Wang and Chin-Laung Lei, “Modelling Articles Polarity and Identifying Influential Authors through Social Movements,” IEEE International Conference on Systems, Man, and Cybernetics, Hong Kong, Oct. 2015
Po-Wen Chi, Yu-Cheng Huang, Jing-Wei Guo, and Chin-Luang Lei, “Efficient NFV Deployment in Data Center Networks,” IEEE ICC 2015 - Next Generation Networking Symposium, pp. 5290-5295, London, UK., Jun. 2015
He-Ming Ruan, Ming-Hwa Tsai, Yen-Nun Huang, Yen-Hua Liao and Chin-Laung Lei, “Discovery of De-identification Policies Considering Re-identification Risks and Information Loss,” the 10th Asia Joint Conference on Information Security (Recipient of the Best Paper Award), pp. 69-76, Kaohsiung, Taiwan, May 2015
Po-Wen Chi, Chien-Ting Kuo, Jing-Wei Guo, and Chin-Laung Lei, “How to Detect a Compromised SDN Switch,” IEEE Conference on Network Softwarization, Workshop on Security issues in SDN, London, U.K., Apr. 2015
Ming-Hung Wang, and Chin-Laung Lei,, “Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies,” ICS 2014, pp. 328-337, Taichung Taiwan, Dec. 2014
Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei, “A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line,” Workshop on Cryptography and Information Security, ICS 2014 (Recipient of the Best Poster Award), pp. 269-276, Taichung Taiwan, Dec. 2014
He-Ming Ruan, Gan Wei Yeap, and Chin-Laung Lei, “Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure,” Workshop on Cryptography and Information Security, ICS 2014, pp. 170-179, Taichung Taiwan, Dec. 2014
Po-Wen Chi, Yu-Cheng Huang, Jing-Wei Guo, and Chin-Luang Lei, “Give Me a Broadcast-Free Network,” Globecom 2014 - Next Generation Networking Symposium, pp. 2009-2014, Austin, Texas, USA., Dec. 2014
Po-Wen Chi, Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei, “An AMI Threat Detection Mechanism Based on SDN Networks,” The Eighth International Conference on Emerging Security Information, Systems and Technologies, pp. 208-211, Lisbon, Portugal, Nov. 2014
He-Ming Ruan, and Chin-Laung Lei, “Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage,” The 9th Asia Joint Conference on Information Security, pp. 156-163, Wuhan, China., Sept. 2014
Yi-Cheng Tsai, Mu-En Wu, Chin-Laung Lei, Chung-Shu Wu, and Jan-Ming Ho, “Comparing Profitability of Day Trading Using ORB Strategies on Index Futures Markets in Taiwan, Hong-Kong and USA,” the 10th Annual Conference of the Asia-Pacific Association of Derivatives, Busan, Korea, Aug. 2014
He-Ming Ruan, Yun-Hsin Chuang, and Chin-Laung Lei, “Access Control over Vulnerable Devices in Advanced Metering Infrastructure,” National Computer Symposium, Taichung, Taiwan., Dec. 2013
Ming-Hung Wang, Kuan-Ta Chen, Shuo-Yang Wang, and Chin-Laung Lei, “Understanding Potential Microtask Workers for Paid Crowdsourcing,” Conference on Human Computation & Crowdsourcing, Palm Springs, California USA., Nov. 2013
He-Ming Ruan, Gan Wei Yeap, and Chin-Laung Lei, “Security Event Handling Framework For Advanced Metering Infrastructure,” International Conference on Applied and Theoretical Information Systems Research, Taipei, Taiwan., Nov. 2013
Yeng-Ting Lee, Kuan-Ta Chen, Han-I Su, and Chin-Laung Lei, “Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach,” IGCVP 2013, Ilan, Taiwan, Aug. 2013
Jing-Kai Lou, Kunwoo Park, Meeyoung Cha, Juyong Park, Chin-Laung Lei and Kuan-Ta Chen, “Gender Swapping and User Behaviors in Online Social Games,” The 22nd International World Wide Web Conference (WWW2013), pp. 827-836, Rio de Janeiro, Brazil, May 2013
Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen and Chin-Laung Lei, “Design and Implementation of a Self-Growth Security Baseline Database for Automatic Security Auditing,” International Computer Symposium, Advances in Intelligent Systems and Applications, Vol. 2, pp. 177-184, Hualien, Taiwan, Dec. 2012
Christine Peijinn Chai, He-Ming Ruan, Yu-Sheng Yang, I-An Fan, Yun-Hsin Chuang, Chin-Laung Lei, Chun-Ying Huang, Chi-Wen Teng, Yuh-Sheng Shaw and Minsiong Liang, “A Lightweight Mutual Authentication Scheme for Advanced Metering Infrastructure,” The 2nd. International Conference on Applied and Theoretical Information Systems Research, Taipei, Taiwan, Dec. 2012
Jing-Kai Lou, Kuan-Ta Chen, Hwai-Jung Hsu, and Chin-Laung Lei, “Foretelling Online Game Addictveness,” 2012 International Workshop on Network and Systems Support for Games (NetGames 2012), Venice, Italy, Nov. 2012
Yeng-Ting Lee, Kuan-Ta Chen, Han-I Su, and Chin-Laung Lei, “Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach,” 2012 International Workshop on Network and Systems Support for Games (NetGames 2012), Venice, Italy, Nov. 2012
Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen and Chin-Laung Lei, “An Analysis of Security Patch Lifecycle Using Google Trend Tool,” 7th Asia Joint Conference on Information Security, pp. 31-34, Tokyo, Japan, Aug. 2012
He-Ming Ruan, Yu-Shian Chen and Chin-Laung Lei, “Data Integrity on Remote Storage for On-line Co-working,” 7th Asia Joint Conference on Information Security, pp. 92-99, Tokyo, Japan, Aug. 2012
He-Ming Ruan, Yu-Shian Chen, and Chin-Laung Lei, “Enabling Efficient Batch Verification on Data Integrity for Remote Storage,” The 13th International Conference on Internet Computing, Las Vegas, USA, Jul. 2012
Yi-Cheng Tsai, Zheng-Hui Chen, Jan-Ming Ho, Ming-Yang Kao, Chin-Laung Lei, and Szu-Lang Liao, “Closed-Form Mortgage Pricing Formula with Outstanding Principal as Prepayment Value,” IEEE Computational Intelligence, New York City, USA, Mar. 2012
Kuan-Ta Chen, Yu-Chun Chang, Po-Han Tseng, Chun-Ying Huang, and Chin-Laung Lei, “Measuring the latency of cloud gaming systems,” ACM international conference on Multimedi, pp. 1269-1272, Scottsdale, Arizona, USA, Dec. 2011
Ren-Chiun Wang, Chun-Han Tung, and Chin-Laung Lei, “An Efficient Conference-Key Agreement Protocol for Mobile Devices,” National Computer Symposium, Chayi, Taiwan, Dec. 2011
Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei and Sen-Jeng Chen, “A Mechanism on Risk Analysis of Information Security with Dynamic Assessment,” 3rd International Workshop on Managing Insider Security Threats, pp. 643-646, Fukuoka, Japan, Nov. 2011
He-Ming Ruan, Yu-Sheng Yang, I-An Fan, Christine Peijinn Chai, Chun-Ying Huang and Chin-Laung Lei, “Security Threats in Advanced Metering Infrastructure,” The 6th Joint Workshop on Information Security, Kaohsiung, Taiwan, Oct. 2011
Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei and Shih-Jen Chen, “AFRODITA: A Flexible Vulnerability Risk Scoring Database of Information Technology Security,” The 6th Joint Workshop on Information Security, Kaohsiung, Taiwan, Oct. 2011
Yu-Chun Chang, Kuan-Ta Chen, Po-Han Tseng, and Chin-Laung Lei, “Understanding the Performance of Thin-Client Gaming,” 2011 Annual IEEE Communications Quality and Reliability (CQR) International Workshop, Naples, Florida, USA, May 2011
He-Ming Ruan, Yu-Shian Chen, and Chin-Laung Lei, “Generic Framework for Electronic Anonymous Auctions,” International Conference on Information Security, pp. 7-12, Hangchou, China, Apr. 2011
Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework,” ACM Multimedia Systems Conference (MMSys 2011), pp. 81-92, San Jose, U.S.A., Feb. 2011
Yeng-Ting Lee, Kuan-Ta Chen, Yun-Maw Cheng, and Chin-Laung Lei, “World of Warcraft Avatar History Dataset,” ACM Multimedia Systems Conferene, pp. 123-128, San Jose, U.S.A, Feb. 2011
Chien-Ju Ho, Chen-Chi Wu, Kuan-Ta Chen, and Chin-Laung Lei, “DevilTyper: A Game for Quantifying the Usability of CAPTCHA Tests,” 7th ACM International Conference on Advances in Computer Entertainment Technology, Taipei, Taiwan, Nov. 2010
Chia-Chang Hsu, and Chin-Laung Lei, “A Search for Location Aided Routing Enhancement in Mobile Ad-Hoc Networks,” 8th ACM International Symposium on Mobility Management and Wireless Access, pp. 121-124, Bodrum, Turkey, Oct. 2010
Jing-Kai Lou, Shou-de Lin, Kuan-Ta Chen, and Chin-Laung Lei, “What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information,” The 2010 International Conference on Advances in Social Networks Analysis and Mining, pp. 56-63, Odense, Denmark, Aug. 2010
Yu-Chun Chang, Chi-Jui Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Radar Chart: Scanning for High QoE in QoS Dimensions,” 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop, Vancouver, British Columbia, Canada., Jun. 2010
Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, Chien-Ju Ho, and Chin-Laung Lei, “Online Game QoE Evaluation using Paired Comparisons,” 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop, Vancouver, British Columbia, Canada, Jun. 2010
Yu-Shian Chen, and Chin-Laung Lei, “Generic Framework Intimating Conventional Anonymous Auctions,” the 20th Cryptology & Information Security Conference, Hsinchu, Taiwan, May 2010
Yu-Shian Chen, and Chin-Laung Lei, “Filtering False Messages En-route in Wireless Multi-hop Networks,” IEEE Wireless Communications and Networking Conference, Sydney, Australia, Apr. 2010
Yen-Hua Liao, Chin-Laung Lei, and Wen-Chi Tsai, “A Robust Grid-based Key Predistribution Scheme for Sensor Networks,” Fourth International Conference on Innovative Computing, Information and Control, Kaohsiung, Taiwan, Dec. 2009
Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems,” Workshop on Mobile Computing and Wireless Communication, NCS2009 (Recipient of the Excellent Paper Award), Taipei, Taiwan, Nov. 2009
Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, and Wen-Chi Tsai, “Tame Pool-based Pairwise Key Predistribution for Large-scale Sensor Networks,” IEEE Global Communications Conference 2009 (GLOBECOM'09), Hawaii USA, Nov. 2009
Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “A Crowdsourceable QoE Evaluation Methodology for Multimedia Content,” ACM Multimedia 2009, pp. 491-500, Beijing, China, Oct. 2009
Chia-Chang Hsu, and Chin-Laung Lei, “A Geographic Scheme with Location Update for Ad Hoc Routing,” International Conference on Systems and Networks Communications (Recipient of the Best Paper Award), pp. 43-48, Porto, Portugal, Sept. 2009
Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, and Wen-Chi Tsai, “A Robust Hypercube-based Pairwise Key Establishment for Sensor Networks,” The 4th Joint Workshop on Information Security, Kaohsiung, Taiwan, Aug. 2009
Powen Chi, and Chin-Laung Lei, “A Prevention Approach to Scrambling Attack in WiMAX Networks,” The 10th IEEE International Symposium on a World of Wireless, Mobile and Multmedia Networks, Kos, Greece, Jul. 2009
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger,” The 19th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 97-102, Williamsburg, Virginia, USA, Jul. 2009
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Peer-to-Peer Application Recognition Based on Signaling Activity,” IEEE International Conference on Communications (ICC), Dresden, Germany, Jun. 2009
Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Security Enhancement for Two User Identification Schemes with Anonymity against Active Attacks,” the 19th Cryptology & Information Security Conference, Taipei, Taiwan, Jun. 2009
Jing-Kai Lou, Kuan-Ta Chen, and Chin-Laung Lei, “A Collusion-Resistant Automation Scheme for Social Moderation Systems,” the 6th annual IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, USA, Jan. 2009
Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, and Chin-Laung Lei, “Inferring Speech Activity from Encrypted Skype Traffic,” IEEE Global Telecommunications Conference, 2008 (GLOBECOM'08, pp. 2143-2147, New Orleans, USA, Dec. 2008
Jiunn-Jye Lee, Hann-Huei Chiou, Yu-Sheng Yang, Yu-Cheng Su, and Chin-Laung Lei, “A Sector-Based Routing Model over Structured Peer-to-Peer Networks,” International Workshop on Wireless Technologies for Smart Homes, Ilan, Taiwan., Sept. 2008
Li Chen, Chia-Chang Hsu, and Chin-Laung Lei, “A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks,” International Workshop on Wireless Technologies for Smart Homes, Ilan, Taiwan, Sept. 2008
Cheng-Chun Tu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “OneClick: A Framework for Capturing Users Network Experiences,” ACM SIGCOMM 2008 (poster), pp. 485-486, Seattle, USA, Aug. 2008
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Detecting Peer-to-Peer Activity by Signaling Packets,” ACM SIGCOMM 2008 (poster), pp. 487-488, Seattle, USA, Aug. 2008
Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw and Wei-Ken Nien, “Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings,” The 3rd Joint Workshop on Information Security, pp. 85-96, Seoul, Korea, Jul. 2008
Yu-Shian Chen, I-Lun Lin, and Chin-Laung Lei, “Lightweight Broadcast Authentication for Multiple Senders in Sensor Networks,” The 3rd Joint Workshop on Information Security, pp. 436-448, Seoul, Korea, Jul. 2008
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Detecting VoIP Traffic Based on Human Conversation Patterns,” IPTComm 08: the Second Conference on Principles, Systems and Applications of IP Telecommunications, pp. 280-295, Heidelberg, Germany, Jul. 2008
Yu-Shian Chen, I-Lun Lin, and Chin-Laung Lei, “Broadcast Authentication in Sensor Networks using Compressed Bloom Filters,” the 4th IEEE International Conference on Distributed Computing in Sensor Systems, pp. 99-111, Santorini Island, Greece, Jun. 2008
12. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Web Metering Scheme for Fair Advertisement Transactions,” the 2nd International Conference on Information Security and Assurance, pp. 453-356, Busan, Korea, Apr. 2008
Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “An Anonymous and Deniable Conversation for a Thin Client,” Fourth International Symposium on Frontiers in Networking with Applications (FINA2008), pp. 416-421, Ginowan city, Okinawa, Mar. 2008
Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost Problem,” The Third International Symposium on Security in Ubiquitous Computing, pp. 728–744, Taipei, Taiwan, Dec. 2007
Li Yuan Lee, Jiunn Jye Lee, and Chin-Laung Lei, “A Universal Anonymous System for Structured Peer-to-Peer Networks,” IEEE TENCON 2007, Taipei, Taiwan., Oct. 2007
Chien-Hua Chiu, and Chin-Laung Lei, “A High-Performance Clustering Scheme with Application in Network Intrusion Prevention System,” the 7th IEEE International Symposium on Communications and Information Technologies, pp. 1219-1224, Sydney, Australia, Oct. 2007
Chun-Ying Huang, and Chin-Laung Lei, “Bounding Peer-to-Peer Upload Traffic in Client Networks,” 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2007), Edinburgh, UK, Jun. 2007
Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments,” 2007 International Conference on Multimedia and Ubiquitous Engineering, pp. 313-318, Seoul, Korea, Apr. 2007
Jiunn-Jye Lee, Chun-Ying Huang, and Chin-Laung Lei, “Design and Implementation of Secure Communication Channels over UPnP Networks,” 2007 International Conference on Multimedia and Ubiquitous Engineering, pp. 307-312, Seoul, Korea., Apr. 2007
Kuan-Ta Chen, and Chin-Laung Lei, “Network Game Design: Hints and Implications of Player Interaction,” NetGames 2006, Singapore., Oct. 2006
Yu-Shian Chen, Chin-Laung Lei, Yu-Peng Chiu, and Chun-Ying Huang, “Confessible Threshold Ring Signatures,” International Conference on Systems and Networks Communications (ICSNC 2006), Tahiti, French Polynesia., Oct. 2006
Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, and Chin-Laung Lei, “Building High-Performance Reconfigurable Bandwidth Controllers with Adaptive Clustering,” International Conference on Systems and Networks Communications (ICSNC 2006), Tahiti, French Polynesia., Oct. 2006
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, and Chin-Laung Lei,, “Quantifying Skype User Satisfaction,” ACM SIGCOMM 2006, pp. 399-410, Pisa, Italy, Sept. 2006
Kuan-Ta Chen, and Chin-Laung Lei, “Design Implications of Social Interaction for Online Games,” IFIP 5th International Conference on Entertainment Computing (ICEC 2006), pp. 318-321, Cambridge, UK, Sept. 2006
C. Y. Huang, K. T. Chen, and C. L. Lei,, “Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter,” 2006 International Conference on Dependable Systems and Networks (DSN-2006), pp. 403-412, Philadelphia, PA, USA, Jun. 2006
K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei, “On the Sensitivity of Online Game Playing Time to Network QoS,” to appear in the 25th Conference on Computer Communications (IEEE INFOCOM 2006), Barcelona, Spain, Apr. 2006
C. Y. Huang, Y. P. Chiu, K. T. Chen, and C. L. Lei,, “A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy Cryptography,” to appear in ACM Symposium on InformAtion, Computer and Communications Security, Taipei, Mar. 2006
P. L. Tsai, C. Y. Huang, Y. Y. Huang, C. C. Hsu, and C. L. Lei, “A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec Virtual Private Networks\,” the 12th Annual IEEE International Conference on High Performance Computing, pp. 432-443, Goa, India, Dec. 2005
J. H. Kuo, S. U. Te, P. T. Liao, C. Y. Huang, P. L. Tsai, C. L. Lei, Sy-Yen Kuo, Y. Huang, and Z. Tsai,, “An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing,” The 11th IEEE International Symposium Pacific Rim Dependable Computing (PRDC 05), pp. 133-139,, Changsha, China, Dec. 2005
C. Y. Huang, Y. P. Chiu, K. T. Chen, H. H. Chiou, and C. L. Lei, “Secure Content Delivery using Key Composition,”,” 30th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, Nov. 2005
H. H. Chiou, P. L. Tsai, J. J. Lee, H. F. Tung, and C. L. Lei, “Extending Cluster File Systems beyond Last Miles,” IEEE TENCON’05,, Melbourne, Australia, Nov. 2005
C. L. Chang, Y. P. Chiu and C. L. Lei, “Automatic Generation of Conflict-Free IPSec Policies,” International Conference on Formal Techniques for Networked and Distributed Systems, pp. 233-246, Taipei,, Oct. 2005
J. J Lee, P. L. Tsai, and C. L. Lei, “An On-Line Page-Structure Approximation Scheme for Web Proxies,” IEEE Distributed, Parallel and Network Applications, pp. 769-773, Fukuoka, Japan, Jul. 2005
K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei,, “Game Traffic Analysis: An MMORPG Perspective,” 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 19-24, Washington, Jun. 2005
C. L. Lei, P. W. Chi, and Y. P. Chiu, “A CRT-Based Key Pre-distribution Scheme for Sensor Networks,” the 15th Conference on Information Security,, pp. 68-75, May 2005
K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei,, “The Impact of Network Variabilities on TCP Clocking Schemes,” 8th IEEE Global Internet Symposium (in conjunction with IEEE INFOCOM 2005), pp. 97-102, Miami, USA, Mar. 2005
Y. P. Chiu, C. L. Lei, and C. Y. Huang, “Secure Multicast Using Proxy Encryption,” the Seventh International Conference on Information and Communications Security, pp. 280-290, Beijing, China, 2005
P. L. Yu, P. L. Tsai, and C. L. Lei, “A Content-Protection Scheme for Multi-Layered Reselling Structures,” 19th IFIP International Information Security Conference, pp. 339-349, Aug. 2004
P. L. Tsai and C. L. Lei, “A Session Migration Scheme for Smart Web Services in Mobile Computing,” Proceedings of the International Symposium on Web Services and Applications (ISWS '04),, pp. 846-850, Jun. 2004
P. L. Tsai, C. L. Lei, and W. Y. Wang, “A Remote Control Scheme for Ubiquitous Personal Computing,” IEEE International Conference on Networking, Sensing and Control, pp. 1020-1025, 2004
C. Y. Huang, and C. L. Lei, “Roundly Router Stamping: Detect and Mitigate DDoS Attacks,” Proceedings of the 14th Conference on Information Security (candidate for best paper), pp 39-46, 2004
Y. P. Chiu, C. L. Lei, and P. L. Yu, “Comments on Improved Proxy Deposit Protocol for E-cash Systems,” Proceedings of the 14th Conference on Information Security, pp 460-462, 2004
C. L. Lei, “Design and Implementation of a Secure and High Performance Linux-Based Cluster File System,” 2003 International Conference on Open Source, pp. 191-196, 2003
Y. M. Hsu and C. L. Lei, “On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent Perspective,” The fourth Workshop for Management Sciences, pp. 272-288, 2003
P. L. Yu, C. L. Lei, H. J. Chen and C. Y. Huang, “User Efficient Fair Blind Signatures,” Proceedings of the Second International Workshop for Asia Public Key Infrastructure, pp. 101-103, 2003
C. L. Lei and M. H. Chan, “An Efficient Anonymous Buyer-Seller Watermarking Protocol,” 2002 International Computer Symposium, Workshop on Cryptology and Information Security, 2002
C. L. Lei and Y. M. Hsu, “Designing E-Marketplace for Wireless PDA using Mobile Agents and Kerberos,” 4th Workshop on Cyberspace:Information, Law and Society, pp. 278-286, 2002
C. L. Lei and Y. M. Hsu, “Building E-marketplaces with Mobile Agents,” The 2002 Conference on Technology and Management-Production-Commerce Integration and Collaborative Management in e-Era, pp. 51-59, 2002
C. L. Lei and Y. M. Hsu, “Mobile Agents for E-marketplaces in Wireless Networks,” The 13th Workshop on Object Oriented Technology and Application, pp. 285-294, 2002
W. S. Juang, H. T. Liaw, and C. L. Lei, “A Practical Anonymous Payment Scheme for Electronic Commerce,” The Seventh International Conference on Distributed Multimedia Systems, pp. 305-311, 2001
P. L. Yu, C. L. Lei, C. I. Fan and H. J. Chen, “A User Efficient Fair E-cash Scheme without On-line Trusted Third Party,” The 2001 International Workshop on Cryptology and Network Security, pp. 246-251, 2001
C. I. Fan, C. L. Lei, and Y. P. Chiu, “A Fast Blind Signature Scheme,” The 2001 International Workshop on Cryptology and Network Security, pp. 189-193, 2001
P. L. Tsai, and C. L. Lei, “Towards Ubiquitous Computing via Secure Desktop Service,” IEEE Region 10 International Conference on Electrical and Electronics Technology, pp. 187-190, 2001
P. L. Yu, and C. L. Lei, “A User Efficient Fair E-cash Scheme with Anonymous Certificates,” IEEE Region 10 International Conference on Electrical and Electronics Technology, pp. 74-77, 2001
W. S. Juang, H. T. Liaw, C. L. Lei, and P. C. Lin, “Fair Blind Threshold Signatures in Wallet with Observers,” Proceedings of 2001 National Computer Symposium, pp. 1-8, 2001
L. F. Chen, and C. L. Lei, “A Computer Immune System using Mobile Agents,” Proceedings of the First National Internet Engineering Conference, 2001
W. S. Juang, H. T. Liaw, C. L. Lei, and P. L. Yu, “A Secure and Anonymous Multi-authorties E-cash Scheme,” Proceedings of the 11th Conference on Information Security, pp. 281-288, 2001
C. I. Fan, C. L. Lei, and Y. P. Chiu, “Comments on Improved User Efficient Blind Signatures,” Proceedings of the 11th Conference on Information Security, pp. 51-53, 2001
P. L. Yu, and C. L. Lei, “A Proxy Deposit Protocol for E-Cash Systems,” Proceedings of the 11th Conference on Information Security, pp. 289-295, 2001
H. H. Chiou, I. C. Lai, and C. L. Lei, “Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems,” 20th International Conference on Distributed Computing Systems, pp. 654-661, 2000
P. L. Yu, C. L. Lei, and L. F. Chen, “An Efficient Inter-Domain Group Key Management Scheme,” 2000 International Computer Symposium, Workshop on Cryptology and Information Security, pp. 21-26, 2000
S. F. Tsai, C. L. Lei and I. C. Lai, “An Efficient Tree-Based Processor Allocation Scheme for Mesh Connected Systems,” 2000 International Computer Symposium, Workshop on Software Engineering and Database Systems, pp. 168-175, 2000
C. L. Lei, and W. S. Juang, “Provably Secure Blind Threshold Signatures Based on Discrete Logarithm,” Proceedings of 1999 National Computer Symposium, pp. C198-C205, 1999
Y. C. Sun, and C. L. Lei, “Skins as a Mechanism for Making Languages Syntactically Extensible,” Proceedings of 1999 National Computer Symposium, A181-A187, 1999
C. I. Fan, and C. L. Lei, “A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting Process,” Proceedings of 1999 National Computer Symposium, pp. C269-C276, 1999
C. L. Lei, “Issues for Building Virtual Private Networks,” Proceedings of the 1999 Computer & Communications Technologies conference, 1999
Books:
Shiuh-Jeng Wang, Chung-Huang Yang, and Chin-Laung Lei, “Computer and Network Security in Practice Applying to High-tech Society,” DrMaster Press Co., Ltd., Taiwan, 506 pages, Sept. 2009, ISBN:978-986-201-254-3
Tzong-Chen, Chin-Laung Lei, Vincent Rijmen, and Der-Tsai Lee, “Information Security,” LNCS5222, Springer, USA, 504 pages, Sept. 2008, ISBN:978-3-540-85884-3
Wen-Shenq Juang, Sian-Teng Chen and Chin-Laung Lei,, “VoIP Security (in Collected Papers on Information and Communication Security),” Science & Technology Policy Research and Information Center, National Applied Research Laboratories, Taiwan, R.O.C., Nov. 2006, ISBN:957-619-133-5
C. L. Lei, and Chun-I Fan, “The Security of Mobile E-Commerce,” Science and Technology Policy Research and Information Center, NARL, Taiwan, R.O.C., 158 pages, Jun. 2005, ISBN:957-619-124-6
Patents:
Yu-Shian Chen and Chin-Laung Lei, “Method for processing and verifying remote dynamic data, system using the same, and computer-readable medium,” 美國專利 US 9378155 B2, Jun. 2016