Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
1989 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space

    Li, L., Rezapour, A. & Tzeng, W. G., 30 Jan 2021, 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021. Institute of Electrical and Electronics Engineers Inc., 9346264. (2021 IEEE Conference on Dependable and Secure Computing, DSC 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    A Robust intrusion detection network using thresholdless trust management system with incentive design

    Rezapour, A. & Tzeng, W-G., 1 Jan 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Chang, B., Li, Y., Beyah, R. & Zhu, S. (eds.). Springer Verlag, p. 139-154 16 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 255).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Effective Botnet Detection Through Neural Networks on Convolutional Features

    Chen, S. C., Chen, Y. R. & Tzeng, W-G., 5 Sep 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 372-378 7 p. 8455930. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • Monsieur poirot: Detecting botnets using re-identification algorithm and nontrivial feature selection technique

    Lee, W. M., Rezapour, A. & Tzeng, W-G., 27 Jul 2018, 2018 IEEE International Conference on Communications, ICC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8422081. (IEEE International Conference on Communications; vol. 2018-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2017

    An online subject-based spam filter using natural language features

    Lee, C. N., Chen, Y. R. & Tzeng, W-G., 18 Oct 2017, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 479-484 6 p. 8073830. (2017 IEEE Conference on Dependable and Secure Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security

    Chen, Y. R. & Tzeng, W-G., 1 Jan 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Springer Verlag, p. 165-183 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • The forward-backward string: A new robust feature for botnet detection

    Su, Y. H., Rezapour, A. & Tzeng, W-G., 18 Oct 2017, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 485-492 8 p. 8073831. (2017 IEEE Conference on Dependable and Secure Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2014

    Game-theoretic strategy analysis for data reliability management in cloud storage systems

    Lin, C. Y. & Tzeng, W-G., 1 Jan 2014, Proceedings - 8th International Conference on Software Security and Reliability, SERE 2014. Institute of Electrical and Electronics Engineers Inc., p. 187-195 9 p. 6895429. (Proceedings - 8th International Conference on Software Security and Reliability, SERE 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • 2013

    CloudHKA: A cryptographic approach for hierarchical access control in cloud computing

    Chen, Y. R., Chu, C. K., Tzeng, W-G. & Zhou, J., 12 Jul 2013, Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Proceedings. p. 37-52 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7954 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    26 Scopus citations
  • 2012

    A practical smart metering system supporting privacy preserving billing and load monitoring

    Lin, H. Y., Tzeng, W-G., Shen, S. T. & Lin , B-S., 9 Jul 2012, Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Proceedings. p. 544-560 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    36 Scopus citations
  • A secure fine-grained access control mechanism for networked storage systems

    Lin, H. Y., Kubiatowicz, J. & Tzeng, W-G., 1 Oct 2012, Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012. p. 225-234 10 p. 6258312. (Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Efficient and provably-secure group key management scheme using key derivation

    Chen, Y. R. & Tzeng, W-G., 5 Nov 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 295-302 8 p. 6295988. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • Toward data confidentiality via integrating hybrid encryption schemes and hadoop distributed file system

    Lin, H-Y., Shen, S. T., Tzeng, W-G. & Lin , B-S., 14 May 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012. p. 740-747 8 p. 6184943. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Scopus citations
  • 2011

    A decentralized repair mechanism for decentralized erasure code based storage systems

    Lin, H-Y., Tzeng, W-G. & Lin , B-S., 1 Dec 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 613-620 8 p. 6120872. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems

    Chou, K. Y., Chen, Y. R. & Tzeng, W-G., 15 Dec 2011, APNOMS 2011 - 13th Asia-Pacific Network Operations and Management Symposium: Managing Clouds, Smart Networks and Services, Final Program. 6077025. (APNOMS 2011 - 13th Asia-Pacific Network Operations and Management Symposium: Managing Clouds, Smart Networks and Services, Final Program).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Delegable provable data possession for remote data in the clouds

    Shen, S. T. & Tzeng, W-G., 17 Nov 2011, Information and Communications Security - 13th International Conference, ICICS 2011, Proceedings. p. 93-111 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Scopus citations
  • Secure group key management using uni-directional proxy re-encryption schemes

    Chen, Y. R., Tygar, J. D. & Tzeng, W-G., 2 Aug 2011, 2011 Proceedings IEEE INFOCOM. p. 1952-1960 9 p. 5934999. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    50 Scopus citations
  • 2009

    A public-key traitor tracing scheme with an optimal transmission rate

    Chen, Y. R. & Tzeng, W-G., 1 Dec 2009, Information and Communications Security - 11th International Conference, ICICS 2009, Proceedings. p. 121-134 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5927 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2008

    Efficient encoding and decoding with permutation arrays

    Lin, T. T., Tsai, S-C. & Tzeng, W-G., 29 Sep 2008, Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008. p. 211-214 4 p. 4594978. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • Public key broadcast encryption with low number of keys and constant decryption time

    Liu, Y. R. & Tzeng, W-G., 10 Mar 2008, Public Key Cryptography - PKC 2008 - 11th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings. p. 380-396 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4939 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • 2007

    Identity-based proxy re-encryption without random oracles

    Chu, C. K. & Tzeng, W-G., 1 Dec 2007, Information Security - 10th International Conference, ISC 2007, Proceedings. p. 189-202 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4779 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    188 Scopus citations
  • Identity-commit table signatures and their extension to group-oriented ring signatures

    Chu, C. K. & Tzeng, W-G., 1 Dec 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 323-337 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2006

    A secure system for data access based on anonymous authentication and time-dependent hierarchical keys

    Tzeng, W-G., 1 Dec 2006, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06. p. 223-230 8 p. (Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Scopus citations
  • Conditional oblivious cast

    Chu, C. K. & Tzeng, W-G., 17 Jul 2006, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings. p. 443-457 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3958 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2005

    Compatible ideal contrast visual cryptography schemes with reversing

    Hu, C. M. & Tzeng, W-G., 1 Dec 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 300-313 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3650 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • 2002

    Distributed key generation as a component of an integrated protocol

    Chu, C. K. & Tzeng, W-G., 1 Jan 2002, Information and Communications Security - 4th International Conference, ICICS 2002, Proceedings. Qing, S., Deng, R., Bao, F. & Zhou, J. (eds.). Springer Verlag, p. 411-421 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Efficient 1-out-n oblivious transfer schemes

    Tzeng, W-G., 1 Jan 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naccache, D. & Paillier, P. (eds.). Springer Verlag, p. 159-171 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    62 Scopus citations
  • Robust key-evolving public key encryption schemes

    Tzeng, W-G. & Tzeng, Z. J., 1 Jan 2002, Information and Communications Security - 4th International Conference, ICICS 2002, Proceedings. Qing, S., Deng, R., Bao, F. & Zhou, J. (eds.). Springer Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2001

    A public-key traitor tracing scheme with revocation using dynamic shares

    Tzeng, W-G. & Tzeng, Z. J., 13 Feb 2001, Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings. Kim, K. (ed.). Springer Verlag, p. 207-224 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1992).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    62 Scopus citations
  • Robust forward-secure signature schemes with proactive security

    Tzeng, W-G. & Tzeng, Z. J., 1 Jan 2001, Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings. Kim, K. (ed.). Springer Verlag, p. 264-276 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1992).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    33 Scopus citations
  • 2000

    A practical and secure fault-tolerant conference-key agreement protocol

    Tzeng, W-G., 18 Jan 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Scopus citations
  • Round-efficient conference key agreement protocols with provable security

    Tzeng, W-G. & Tzeng, Z. J., 3 Dec 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (ed.). Springer Verlag, p. 614-627 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1976).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • 1989

    Equivalence and learning of probabilistic automata

    Tzeng, W-G., 1 Nov 1989, Annual Symposium on Foundations of Computer Science (Proceedings). Publ by IEEE, p. 268-273 6 p. (Annual Symposium on Foundations of Computer Science (Proceedings)).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations