Name
Affiliation
Papers
WEI-LIANG TAI
Asia Univ, Dept Biomed Informat, Taichung, Taiwan
36
Collaborators
Citations 
PageRank 
38
733
36.91
Referers 
Referees 
References 
1167
527
321
Search Limit
1001000
Title
Citations
PageRank
Year
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing.00.342020
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments.00.342019
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images.10.362019
Image self-recovery with watermark self-embedding.30.372018
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography.20.372018
A novel hybrid image authentication scheme based on absolute moment block truncation coding.60.442017
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks.60.452017
A Secure Mobility Network Authentication Scheme Ensuring User Anonymity.20.382017
Comments on a Secure Authentication Scheme for IoT and Cloud Servers.20.372017
A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks.00.342016
An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems.00.342016
A novel reversible data hiding scheme based on AMBTC compression technique150.602015
A High-Quality Image Authentication Scheme for AMBTC-compressed Images.131.222014
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards00.342014
Novel Image Authentication Scheme for AMBTC-Compressed Images20.372014
Untraceable Dynamic-Identity-Based Remote User Authentication Scheme With Verifiable Password Update140.602014
A Novel Hybrid Image Authentication Scheme For Ambtc-Compressed Images10.352014
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices20.422013
A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN00.342013
Apply Run-length encoding on pixel differences to do image hiding00.342013
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating20.362012
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting.10.352012
A Verifiable Proxy Signature Scheme Based On Bilinear Pairings With Identity-Based Cryptographic Approaches00.342012
Blood Cell Image Classification Based on Hierarchical SVM50.422011
Object Relational Programming of Biomedical Images00.342011
Reversible data hiding based on histogram modification of pixel differences2086.422009
Multilevel reversible data hiding based on histogram modification of difference images1143.812008
Lossless Data Hiding Based on Histogram Modification for Image Authentication80.672008
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery441.572008
Improvements of EMD Embedding for Large Payloads50.502007
A Novel Image Hiding Scheme Based on VQ and Hamming Distance10.362007
Reversible hiding in DCT-based compressed images1345.092007
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization1175.452006
A Multipurpose Wavelet-Based Image Watermarking50.612006
A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization201.622005
Secret Hiding Using Side Match Vector Quantization00.342005