Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Greg Stachnick
Hao Mao
Peter Malec
Giovanni Venturelli
Chen Ma
Agarwal Nitin
Radu Timofte
Kuanrui Yin
Yanan Dong
Home
/
Author
/
JUNG-SAN LEE
Author Info
Open Visualization
Name
Affiliation
Papers
JUNG-SAN LEE
Department of Information Engineering and Computer Science, Feng Chia University, No. 100, Wunhua Rd., Situn Dist., Taichung City 40724, Taiwan, ROC
56
Collaborators
Citations
PageRank
52
353
30.52
Referers
Referees
References
770
935
577
Search Limit
100
935
Publications (56 rows)
Collaborators (52 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training
0
0.34
2022
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract
0
0.34
2022
Learning salient seeds refer to the manifold ranking and background-prior strategy
0
0.34
2020
AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS.
0
0.34
2019
Visibility dehazing based on channel-weighted analysis and illumination tuning.
1
0.35
2019
Refining irregular image illumination with concurrent ownership embedding.
0
0.34
2018
Selective scalable secret image sharing with adaptive pixel-embedding technique.
1
0.35
2018
SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks.
0
0.34
2017
Renovating Contaminative Image Archives based on Patch Propagation and Adaptive Confidence Collation
0
0.34
2016
Tele-micropayment scam prevention based on visual secret sharing technique
1
0.36
2016
Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity.
0
0.34
2016
Enhancing the Security of Credit Card Transaction based on Visual DSC.
0
0.34
2015
Stable watermarking technique based on XNOR operation and scale relationship
1
0.39
2015
Fast authentication mechanism with provable correctness for cluster-based VANETs
0
0.34
2014
Self-Recognized Image Protection Technique that Resists Large-Scale Cropping
6
0.59
2014
A wide-adapted bantam protocol for roaming across wireless areas
0
0.34
2013
Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness
0
0.34
2013
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy.
3
0.42
2013
RII: Renovating the irregular illumination of digital image archives
0
0.34
2013
Notes on \"Authentication protocol using an identifier in an ad hoc network environment\"
1
0.51
2013
Preserving user-participation for insecure network communications with CAPTCHA and visual secret sharing technique
1
0.35
2013
Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism.
14
0.76
2013
An innovative electronic group-buying system for mobile commerce
10
0.49
2013
HORME: hierarchical-object-relational medical management for electronic record.
0
0.34
2013
A robust e-commerce service: Light-weight secure mail-order mechanism
2
0.47
2012
Protecting the content integrity of digital imagery with fidelity preservation
24
0.84
2011
An interactive mobile SMS confirmation method using secret sharing technique
0
0.34
2011
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector
4
0.39
2010
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs
2
0.38
2010
Multicast Routing Scheme for Recipient Maximization in Wireless Relay Networks
9
0.58
2010
Design of electronic t-out-of-n lotteries on the Internet
9
0.75
2009
A novel illumination-balance technique for improving the quality of degraded text-photo images
8
0.57
2009
Distortion-free secret image sharing mechanism using modulus operator
38
1.35
2009
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
1
0.37
2009
Robust t-out-of-n oblivious transfer mechanism based on CRT
15
0.71
2009
A Brand-New Mobile Value-Added Service: M-Check
0
0.34
2009
Hybrid (2, n) Visual Secret Sharing Scheme for Color Images
2
0.38
2009
Dual digital watermarking for internet media based on hybrid strategies
17
0.83
2009
A Secure Multicast Framework In Large And High-Mobility Network Groups
0
0.34
2009
An on-line electronic check system with mutual authentication
15
1.00
2009
Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol
0
0.34
2008
Security design for three-party encrypted key exchange protocol using smart cards
5
0.45
2008
Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol
0
0.34
2008
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques
3
0.39
2008
Anonymous authentication scheme for wireless communications
4
0.49
2007
Secure communications for cluster-based ad hoc networks using node identities
28
1.10
2007
Security enhancement of an IC-card-based remote login mechanism
4
0.44
2007
An anonymous voting mechanism based on the key exchange protocol
8
0.59
2006
A secure and efficient authentication scheme for mobile users
5
0.53
2006
Time-bounded based password authentication scheme
0
0.34
2005
1
2
50 / page