Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Quantified emotion analysis based on design principles of color feature recognition in pictures

    When people observe pictures, different pictures will generate different emotions, and the painters often convey emotional energy to the audience through the media. Through the effect of this emotional transfe...

    Chin-Ling Chen, Qing-Yang Huang, Ming Zhou in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS

    With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage, but has also extended to cloud database storage methods. To ...

    Der-Chen Huang, Ling-Chun Liu, Yong-Yuan Deng, Chin-Ling Chen in Cluster Computing (2024)

  3. No Access

    Chapter and Conference Paper

    A Survey and Planning Advice of Blockchain-Based Used Car Bidding Platform

    In recent years, due to the increasing gap between rich and poor around the world, more and more people prefer to buy second-hand cars instead of buying new ones. As a result, the production and demand for new...

    Chin-Ling Chen, Yong-Yuan Deng, Yao-Yuan Hsu in Advanced Information Networking and Applic… (2024)

  4. No Access

    Article

    An IoT and blockchain based logistics application of UAV

    With the increasing number of online consumers, the relationship between the Internet of things and the Internet is becoming closer. Logistics transportation plays an important role in the whole online shoppin...

    Chin-Ling Chen, Yong-Yuan Deng, Shunzhi Zhu in Multimedia Tools and Applications (2024)

  5. Article

    Special issue on “Recent advances on computational intelligence techniques and applications in big data”

    **ngsi Xue, Pei-Wei Tsai, Yu** Wang, Chin-Ling Chen in Evolutionary Intelligence (2023)

  6. No Access

    Article

    An anonymous and fair auction system based on blockchain

    Consumer approval of the online auction paradigm is demonstrated by rapidly expanding online auction transaction volumes. Bidders can access a wider variety of products, and sellers can reach a larger audience...

    Zongli Ye, Chin-Ling Chen, Wei Weng, Hongyu Sun in The Journal of Supercomputing (2023)

  7. Article

    Open Access

    Machine learning for trust, security, and privacy in computing and communications

    Chin-Ling Chen, Haishuai Wang in EURASIP Journal on Wireless Communications… (2023)

  8. No Access

    Article

    Blockchain-based alcoholic beverages supply chain management system

    Nearly 3 million people die each year as a result of dangerous alcohol consumption, according to the World Health Organization, factoring for 5.3% of all deaths globally. Many international organizations and g...

    Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao in Journal of Ambient Intelligence and Humani… (2023)

  9. No Access

    Chapter and Conference Paper

    Research on the Analysis of Key Attack Modes in a Wireless Environment

    Wireless networks are more vulnerable to attacks than wired networks because data is transmitted via radio instead of cables. Although wireless networks have their advantages, such as easy setup and ease of mo...

    Chin-Ling Chen, Cheng-Yu Ye, Wei-An Chen in 2021 International Conference on Security … (2023)

  10. No Access

    Chapter and Conference Paper

    FreeSee: A Parameter-Independent Pattern-Based Device-Free Human Behaviour Sensing System with Wireless Signals of IoT Devices

    Wireless signal-based device-free human behavior sensing is an innovative method for accurate sensing and understanding human behaviors, which is the core technology to enable high level human computer intera...

    Hongyu Sun, **nyu Zhang, Yang Lu, Chin-Ling Chen in Advanced Data Mining and Applications (2022)

  11. No Access

    Chapter and Conference Paper

    An Early Detection of Distributed Denial of Service Attack

    attacks are arduous to detect because they can generate the attack traffic to flood the victim host from a large number of zombie machines. In this paper, we have designed and implemented an early attack de...

    Chin-Ling Chen, Chieh-Min Chen in Advanced Computational Paradigms and Hybri… (2022)

  12. No Access

    Article

    A blockchain-based intelligent anti-switch package in tracing logistics system

    In recent years, with the rapid development of e-commerce and network technologies, many people do online shop** through the Internet. If a physical product is bought by a client, the store will entrust thei...

    Chin-Ling Chen, Yong-Yuan Deng, Wei Weng, Ming Zhou in The Journal of Supercomputing (2021)

  13. No Access

    Article

    A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing

    In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because the...

    Chin-Ling Chen, Mao-Lun Chiang, Hui-Ching Hsieh in Wireless Personal Communications (2020)

  14. Article

    Open Access

    A secure electronic medical record authorization system for smart device application in cloud computing environments

    As cloud computing technology matures, along with an increased application of distributed networks, increasingly larger amounts of data are being stored in the cloud, and are thus available for pervasive appli...

    Chin-Ling Chen, Po-Tsun Huang in Human-centric Computing and Information Sc… (2020)

  15. No Access

    Article

    Research on effect of rings on coupling vibration in a rigid-disk rotor

    This paper uses new deductions of the equation of motion and obtains new modes of change that differ from the authors’ previous research. The blade-bending, shaft-torsion and ring-bending coupled vibration inf...

    Yi-Jui Chiu, **ao-Yun Li, Guo-Fei Yu in Journal of Mechanical Science and Technolo… (2020)

  16. No Access

    Chapter and Conference Paper

    Enhanced WPA2/PSK for Preventing Authentication Cracking

    With the popularization of mobile phones and Wi-Fi hotspots, the diversification of wireless communication applications has rapidly growing. Wi-Fi Protected Access (WPA), offered by network user authentication...

    Chin-Ling Chen, Supaporn Punya in Mobile Wireless Middleware, Operating Syst… (2020)

  17. No Access

    Chapter and Conference Paper

    Digital Image Anti-counterfeiting Technology

    There are many trademarks and logos around the world. Every trademark or logo represents its own brand or intellectual property. However, some people who are interested will benefit from counterfeiting tradema...

    Chin-Ling Chen, Chin-Feng Lee, Fang-Wei Hsu in Advances on Broad-Band Wireless Computing,… (2020)

  18. No Access

    Chapter and Conference Paper

    A Survey of Authentication Protocols in Logistics System

    E-commerce has developed rapidly in recent years. Many services and applications integrate IOT technologies are offered. Logistics is a representative application which focuses on rapid delivery, integrity of ...

    Chin-Ling Chen, Dong-Peng Lin, Chin-Feng Lee in Advances in Intelligent Information Hiding… (2020)

  19. No Access

    Chapter and Conference Paper

    A Survey of Authentication Protocols in VANET

    Vehicular Ad Hoc Network (VANET) is a very significant research topic in recent years. With the advancement of technology and traffic, people relied mobile communication, the application of VANET is widely use...

    Chin-Ling Chen, Yue-Xun Chen, Chin-Feng Lee in Advances on Broadband and Wireless Computi… (2019)

  20. No Access

    Chapter and Conference Paper

    An ECC Based Secure and Convenient Rural Medical Care System

    As hardware and software technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come to form the Internet of Things. At the sa...

    Yong-Yuan Deng, Chin-Ling Chen in Mobile and Wireless Technology 2018 (2019)

previous disabled Page of 3