Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Heiji Watanabe
Beatriz Bernardo
Claudia Calabrese
Hao Mao
Peter Malec
C. Anderson
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
WEI-LIANG TAI
Author Info
Open Visualization
Name
Affiliation
Papers
WEI-LIANG TAI
Asia Univ, Dept Biomed Informat, Taichung, Taiwan
36
Collaborators
Citations
PageRank
38
733
36.91
Referers
Referees
References
1167
527
321
Search Limit
100
1000
Publications (36 rows)
Collaborators (38 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing.
0
0.34
2020
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments.
0
0.34
2019
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images.
1
0.36
2019
Image self-recovery with watermark self-embedding.
3
0.37
2018
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography.
2
0.37
2018
A novel hybrid image authentication scheme based on absolute moment block truncation coding.
6
0.44
2017
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks.
6
0.45
2017
A Secure Mobility Network Authentication Scheme Ensuring User Anonymity.
2
0.38
2017
Comments on a Secure Authentication Scheme for IoT and Cloud Servers.
2
0.37
2017
A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks.
0
0.34
2016
An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems.
0
0.34
2016
A novel reversible data hiding scheme based on AMBTC compression technique
15
0.60
2015
A High-Quality Image Authentication Scheme for AMBTC-compressed Images.
13
1.22
2014
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards
0
0.34
2014
Novel Image Authentication Scheme for AMBTC-Compressed Images
2
0.37
2014
Untraceable Dynamic-Identity-Based Remote User Authentication Scheme With Verifiable Password Update
14
0.60
2014
A Novel Hybrid Image Authentication Scheme For Ambtc-Compressed Images
1
0.35
2014
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices
2
0.42
2013
A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN
0
0.34
2013
Apply Run-length encoding on pixel differences to do image hiding
0
0.34
2013
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating
2
0.36
2012
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting.
1
0.35
2012
A Verifiable Proxy Signature Scheme Based On Bilinear Pairings With Identity-Based Cryptographic Approaches
0
0.34
2012
Blood Cell Image Classification Based on Hierarchical SVM
5
0.42
2011
Object Relational Programming of Biomedical Images
0
0.34
2011
Reversible data hiding based on histogram modification of pixel differences
208
6.42
2009
Multilevel reversible data hiding based on histogram modification of difference images
114
3.81
2008
Lossless Data Hiding Based on Histogram Modification for Image Authentication
8
0.67
2008
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
44
1.57
2008
Improvements of EMD Embedding for Large Payloads
5
0.50
2007
A Novel Image Hiding Scheme Based on VQ and Hamming Distance
1
0.36
2007
Reversible hiding in DCT-based compressed images
134
5.09
2007
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization
117
5.45
2006
A Multipurpose Wavelet-Based Image Watermarking
5
0.61
2006
A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization
20
1.62
2005
Secret Hiding Using Side Match Vector Quantization
0
0.34
2005
1