default search action
Wei-Bin Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Chit-Jie Chew, Wei-Bin Lee, Tzu-Li Sung, Ying-Chin Chen, Shiuh-Jeng Wang, Jung-San Lee:
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime. IEEE Trans. Inf. Forensics Secur. 19: 5956-5970 (2024) - [j43]Chit-Jie Chew, Wei-Bin Lee, Tzu Hao Chen, Iuon-Chang Lin, Jung-San Lee:
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle. IEEE Trans. Netw. Sci. Eng. 11(4): 3495-3511 (2024) - [c24]Wei-Jia Chen, Chia-Yi Hsu, Wei-Bin Lee, Chia-Mu Yu, Chun-Ying Huang:
Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns. DSN-S 2024: 133-140 - [c23]Zheng-Hong Huang, Yu-Sung Wu, Ying-Dar Lin, Chia-Mu Yu, Wei-Bin Lee:
Neural Network-based Functional Degradation for Cyber-Physical Systems. QRS 2024: 425-434 - [c22]Yang Lou, Yi Zhu, Qun Song, Rui Tan, Chunming Qiao, Wei-Bin Lee, Jianping Wang:
A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving. USENIX Security Symposium 2024 - [i2]Yang Lou, Yi Zhu, Qun Song, Rui Tan, Chunming Qiao, Wei-Bin Lee, Jianping Wang:
A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving. CoRR abs/2406.11707 (2024) - [i1]Weiwei Fu, Heqing Huang, Yifan Zhang, Ke Zhang, Jin Huang, Wei-Bin Lee, Jianping Wang:
ICSFuzz: Collision Detector Bug Discovery in Autonomous Driving Simulators. CoRR abs/2408.05694 (2024) - 2023
- [j42]Hsiu-Ling Chu, Yu-Chen Dai, Wei-Bin Lee, Ting-Shen Hsieh, Ming-Hung Wang:
Characterizing Behaviors of Sockpuppets in Online Political Discourses. J. Inf. Sci. Eng. 39(3): 489-506 (2023) - 2022
- [j41]Ying-Dar Lin, Jehoshua-Hanky Pratama, Didik Sudyana, Yuan-Cheng Lai, Ren-Hung Hwang, Po-Ching Lin, Hsuan-Yu Lin, Wei-Bin Lee, Chen-Kuo Chiang:
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions. J. Inf. Secur. Appl. 71: 103348 (2022) - 2021
- [j40]Tzung-Her Chen, Wei-Bin Lee, Hsing-Bai Chen, Chien-Lung Wang:
Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security. Symmetry 13(5): 855 (2021) - 2020
- [j39]Quy-Anh Bui, Wei-Bin Lee, Jung-San Lee, Hsiao-Ling Wu, Jo-Yun Liu:
Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations. KSII Trans. Internet Inf. Syst. 14(1): 437-454 (2020)
2010 – 2019
- 2019
- [j38]Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Tzungher Chen:
Secure and efficient protection for HTTP cookies with self-verification. Int. J. Commun. Syst. 32(2) (2019) - 2018
- [j37]Hsing-Bai Chen, Wei-Bin Lee, Tzungher Chen:
A novel DRM scheme for accommodating expectations of personal use. Multim. Tools Appl. 77(18): 23099-23114 (2018) - 2015
- [j36]Chen-Yi Lin, Tung-Shou Chen, Hui-Fang Tsai, Wei-Bin Lee, Tien-Yu Hsu, Yuan-Hung Kao:
A Novel Anti-classification Approach for Knowledge Protection. J. Medical Syst. 39(10): 113:1-113:10 (2015) - 2014
- [j35]Wei-Bin Lee, Chien-Ding Lee, Kevin I.-J. Ho:
A HIPAA-compliant key management scheme with revocation of authorization. Comput. Methods Programs Biomed. 113(3): 809-814 (2014) - [j34]Jia-Hong Li, Tzungher Chen, Wei-Bin Lee:
Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication. Int. J. Digit. Crime Forensics 6(3): 30-46 (2014) - [c21]Wei-Bin Lee, Tzungher Chen, Wei-Rung Sun, Kevin I.-J. Ho:
An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter. AINA Workshops 2014: 281-286 - 2013
- [j33]Tung-Shou Chen, Wei-Bin Lee, Jeanne Chen, Yuan-Hung Kao, Pei-Wen Hou:
Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving. J. Supercomput. 66(2): 907-917 (2013) - [c20]Tse-Chuan Hsu, Chih-Hung Chang, William C. Chu, Shinn-Ying Ho, Nien-Lin Hsueh, Wei-Bin Lee:
Applying Cloud Computing Technologies to Gerontology and Geriatrics Health Care System (GGHCS). QSIC 2013: 355-360 - 2012
- [j32]Woei-Jiunn Tsaur, Jia-Hong Li, Wei-Bin Lee:
An efficient and secure multi-server authentication scheme with key agreement. J. Syst. Softw. 85(4): 876-882 (2012) - [c19]Wei-Bin Lee, Che-Wei Fan, Kevin Ho, Chyi-Ren Dow:
A CAPTCHA with Tips Related to Alphabets Upper or Lower Case. BWCCA 2012: 458-461 - [c18]Chu-Hsing Lin, Hung-Yan Lin, Wei-Bin Lee:
Routing Protocols with Power Saving and Data Salvation for Wireless Sensor Networks. BWCCA 2012: 468-471 - [c17]Chyi-Ren Dow, Ruei-Yu Hu, Yu-Hong Lee, Shiow-Fen Hwang, Wei-Bin Lee:
A SWE-Based Network Management Framework for Environment Monitoring. BWCCA 2012: 472-477 - [c16]Yu-Hong Lee, Chyi-Ren Dow, Lu-Hui Huang, Ya-Chen Lin, Shiow-Fen Hwang, Wei-Bin Lee:
An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme in Vehicular Ad-hoc Networks. ITNG 2012: 54-59 - [c15]Kevin I.-J. Ho, Wei-Bin Lee, Siu-Chung Lau, John Sum:
Convergence Time of Wang's kWTA Network with Stochastic Output Nodes. MUSIC 2012: 182-187 - 2011
- [j31]Jia-Hong Li, Wei-Bin Lee, Dengpan Ye, Tzong-Jye Liu, Chuan Qin:
Adaptive Secret Sharing for Color Images. Int. J. Comput. Intell. Syst. 4(5): 797-805 (2011) - [j30]Chien-Ding Lee, Kevin I.-J. Ho, Wei-Bin Lee:
A Novel Key Management Solution for Reinforcing Compliance With HIPAA Privacy/Security Regulations. IEEE Trans. Inf. Technol. Biomed. 15(4): 550-556 (2011) - [c14]Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Chia-Chi Yang:
An Anti-phishing User Authentication Scheme without Using a Sensitive Key Table. IIH-MSP 2011: 141-144 - 2010
- [c13]Wei-Bin Lee, Hsing-Bai Chen, Ching-Chih Cheng:
Secure communication between set-top box and smart card for fair use in DTV broadcasting. ISI 2010: 156-158
2000 – 2009
- 2009
- [j29]Tzungher Chen, Wei-Bin Lee, Hsing-Bai Chen:
A self-verification authentication mechanism for mobile satellite communication systems. Comput. Electr. Eng. 35(1): 41-48 (2009) - [j28]Chang-Kuo Yeh, Wei-Bin Lee:
An Overall Cost-effective Authentication Technique for the Global Mobility Network. Int. J. Netw. Secur. 9(3): 227-232 (2009) - [j27]Tzungher Chen, Shu-Chen Yeh, Kuan-Chieh Liao, Wei-Bin Lee:
A Practical and Efficient Electronic Checkbook. J. Organ. Comput. Electron. Commer. 19(4): 285-293 (2009) - [c12]Hsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen:
Enhancement of the RFID security method with ownership transfer. ICUIMC 2009: 251-254 - [c11]Chi-Nan Lin, Chin-Chen Chang, Wei-Bin Lee, Jason Lin:
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix. IIH-MSP 2009: 369-373 - [c10]Chin-Chen Chang, Chia-Yin Lee, Wei-Bin Lee:
Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications. IIH-MSP 2009: 902-904 - 2008
- [j26]Tzungher Chen, Wei-Bin Lee:
A new method for using hash functions to solve remote user authentication. Comput. Electr. Eng. 34(1): 53-62 (2008) - [j25]Hsing-Bai Chen, Tzungher Chen, Wei-Bin Lee, Chin-Chen Chang:
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks. Comput. Stand. Interfaces 30(1-2): 95-99 (2008) - [j24]Chia Chun Wu, Wei-Bin Lee, Woei-Jiunn Tsaur:
A Secure Authentication Scheme with Anonymity for Wireless Communications. IEEE Commun. Lett. 12(10): 722-723 (2008) - [j23]Wei-Bin Lee, Chang-Kuo Yeh:
A Self-Concealing Mechanism for Authentication of Portable Communication Systems. Int. J. Netw. Secur. 6(3): 285-290 (2008) - [j22]Tzungher Chen, Wei-Bin Lee, Hsing-Bai Chen:
A round- and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81(9): 1581-1590 (2008) - [j21]Wei-Bin Lee, Chien-Ding Lee:
A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations. IEEE Trans. Inf. Technol. Biomed. 12(1): 34-41 (2008) - [c9]Ming-Way Huang, Hsing-Bai Chen, Wei-Bin Lee:
An Efficient Non-repudiation Mechanism for SIP-Based Services. IIH-MSP 2008: 1541-1544 - 2007
- [j20]Wei-Bin Lee, Chia Chun Wu, Woei-Jiunn Tsaur:
A novel deniable authentication protocol using generalized ElGamal signature scheme. Inf. Sci. 177(6): 1376-1381 (2007) - [j19]Wei-Bin Lee, Wei-Jhen Wu, Chen-Yi Chang:
A Portable DRM Scheme Using Smart Cards. J. Organ. Comput. Electron. Commer. 17(3): 247-258 (2007) - [c8]Chiung-Chou Tsai, Kuan-Chieh Liao, Tzungher Chen, Wei-Bin Lee:
Security enhancement of a novel proxy key generation protocol. COMPSAC (2) 2007: 681-688 - [c7]Tzungher Chen, Chang-Sian Wu, Wei-Bin Lee:
A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding. IIH-MSP 2007: 421-424 - [c6]Chia Chun Wu, Wei-Bin Lee, Woei-Jiunn Tsaur:
A secure protocol for misbehavior-penalization-based fair digital signature exchange. IWCMC 2007: 138-139 - 2006
- [j18]Wei-Bin Lee, Kuan-Chieh Liao:
Improved self-certified group-oriented cryptosystem without a combiner. J. Syst. Softw. 79(4): 502-506 (2006) - [c5]Chuan Qin, Wei-Bin Lee, Xinpeng Zhang, Shuozhong Wang:
Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting. ICARCV 2006: 1-4 - 2005
- [j17]Tzungher Chen, Wei-Bin Lee, Gwoboa Horng:
Remarks on some signature schemes based on factoring and discrete logarithms. Appl. Math. Comput. 169(2): 1070-1075 (2005) - [j16]Woei-Jiunn Tsaur, Chia Chun Wu, Wei-Bin Lee:
An enhanced user authentication scheme for multi-server Internet services. Appl. Math. Comput. 170(1): 258-266 (2005) - [j15]Tzungher Chen, Gwoboa Horng, Wei-Bin Lee:
A publicly verifiable copyright-proving scheme resistant to malicious attacks. IEEE Trans. Ind. Electron. 52(1): 327-334 (2005) - [j14]Wei-Bin Lee, Chang-Kuo Yeh:
A new delegation-based authentication protocol for use in portable communication systems. IEEE Trans. Wirel. Commun. 4(1): 57-64 (2005) - [c4]Wei-Bin Lee, Jia-Hong Li, Chyi-Ren Dow:
Efficient Date-Constraint Hierarchical Key Assignment Scheme. Security and Management 2005: 51-57 - [c3]Wei-Bin Lee, Hsing-Bai Chen, Chyi-Ren Dow:
Remote User Authentication Scheme with User Anonymity. Security and Management 2005: 412-420 - [c2]Tzong-Jye Liu, Chia-Lin Lee, Chyi-Ren Dow, Wei-Bin Lee, Hsing-Bai Chen:
Self-Stabilization Neighborhood Synchronizer for Uniform Rings. PDPTA 2005: 346-352 - 2004
- [j13]Tzungher Chen, Wei-Bin Lee, Gwoboa Horng:
Secure SAS-like password authentication schemes. Comput. Stand. Interfaces 27(1): 25-31 (2004) - [j12]Woei-Jiunn Tsaur, Chia Chun Wu, Wei-Bin Lee:
A smart card-based remote scheme for password authentication in multi-server Internet services. Comput. Stand. Interfaces 27(1): 39-51 (2004) - [j11]Wei-Bin Lee, Kuan-Chieh Liao:
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems. J. Netw. Comput. Appl. 27(4): 191-199 (2004) - 2002
- [j10]Wei-Bin Lee, Tzungher Chen:
A public verifiable copy protection technique for still images. J. Syst. Softw. 62(3): 195-204 (2002)
1990 – 1999
- 1999
- [j9]Chin-Chen Chang, Pai-Cheng Huang, Wei-Bin Lee:
Conference key distribution schemes for portable communication systems. Comput. Commun. 22(12): 1160-1164 (1999) - [j8]Wei-Bin Lee, Chin-Chen Chang:
(t, n) Threshold Digital Signature With Traceability Property. J. Inf. Sci. Eng. 15(5): 669-678 (1999) - [j7]Ren-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang:
A concept of designing cheater identification methods for secret sharing. J. Syst. Softw. 46(1): 7-11 (1999) - 1998
- [j6]Wei-Bin Lee, Chin-Chen Chang:
Authenticity of public keys in asymmetric cryptosystems. Comput. Commun. 21(2): 195-198 (1998) - [j5]Wei-Bin Lee, Chin-Chen Chang:
Using RSA with low exponent in a public network. Comput. Commun. 21(3): 284-286 (1998) - [c1]Chin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee:
A Scheme for Obtaining a Message from the Digital Multisignature. Public Key Cryptography 1998: 154-163 - 1997
- [j4]Wei-Bin Lee, Chin-Chen Chang:
Three ID-based information security functions. Comput. Commun. 20(14): 1301-1307 (1997) - [j3]Wei-Bin Lee, Chin-Chen Chang:
Authenticated Encryption Schemes with Linkage Between Message Blocks. Inf. Process. Lett. 63(5): 247-250 (1997) - 1996
- [j2]Wei-Bin Lee, Chin-Chen Chang:
Integrating Authentication in Public Key Distribution System. Inf. Process. Lett. 57(1): 49-52 (1996) - [j1]Wei-Bin Lee, Chin-Chen Chang:
On Key Changeable ID-Based Digital Signature Scheme. J. Inf. Sci. Eng. 12(3): 381-386 (1996)
Coauthor Index
aka: Tzungher Chen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint