default search action
Yi-Li Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c28]Yi-Li Huang, Chengyu Gu, Shilin Wang, Zheng Huang, Kai Chen:
Spatial Aggregation for Scene Text Recognition. BMVC 2021: 51 - [c27]Yi-Li Huang, Shi-Lin Wang, Chengyu Gu, Zheng Huang, Kai Chen:
A Seq2seq-based Model with Global Semantic Context for Scene Text Recognition. DICTA 2021: 1-6 - 2020
- [j15]Yi-Li Huang, Fang-Yie Leu, Ruey-Kai Sheu, Jung-Chun Liu, Heru Susanto:
A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme. Concurr. Comput. Pract. Exp. 32(18) (2020)
2010 – 2019
- 2018
- [j14]Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Yu-Ling Huang, Cheng-Han Tsai:
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments. IEEE Access 6: 45325-45334 (2018) - 2017
- [j13]Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu:
Square Key Matrix Management Scheme in Wireless Sensor Networks. Comput. Informatics 36(1): 169-185 (2017) - [c26]Yi-Li Huang, Fang-Yie Leu, Ilsun You, Rong-Yi Su, Po-Hao Su, Hsing-Chung Chen:
A 3D encryption with shifting mapping substitution mechanism. CCNC 2017: 1-6 - [c25]Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu, Xing-You Pan, Li-Ren Chen:
Generating Dynamic Box by Using an Input String. MobiSec 2017: 17-29 - 2016
- [j12]Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Ilsun You:
TTP Based High-Efficient Multi-Key Exchange Protocol. IEEE Access 4: 6261-6271 (2016) - [c24]Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu:
Enhancing Security of LTE using a Double Masking Technique. BWCCA 2016: 747-754 - [c23]Yi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu:
A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix. IMIS 2016: 470-475 - [c22]Yi-Li Huang, Fang-Yie Leu, Ilsun You, Hsing-Chung Chen, Chishyan Liaw, Jung-Chun Liu:
Random Cladding with Feedback Mechanism for encrypting mobile messages. INFOCOM Workshops 2016: 970-975 - 2015
- [j11]Fang-Yie Leu, Yi-Li Huang, Sheng-Mao Wang:
A Secure M-Commerce System based on credit card transaction. Electron. Commer. Res. Appl. 14(5): 351-360 (2015) - [j10]Yi-Li Huang, Cheng-Ru Dai, Fang-Yie Leu, Ilsun You:
A secure data encryption method employing a sequential-logic style mechanism for a cloud system. Int. J. Web Grid Serv. 11(1): 102-124 (2015) - 2014
- [j9]Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, William Cheng-Chung Chu:
A true Random-Number Encryption Method employing block cipher and PRNG. Comput. Sci. Inf. Syst. 11(3): 905-924 (2014) - [j8]Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu, Yi-Li Huang:
Designing A Healthcare Authorization Model Based On Cloud Authentication. Intell. Autom. Soft Comput. 20(3): 365-379 (2014) - [j7]Fang-Yie Leu, Fatos Xhafa, Aniello Castiglione, Yi-Li Huang:
Editorial. Int. J. Commun. Networks Distributed Syst. 13(3/4) (2014) - [j6]Fang-Yie Leu, Jung-Chun Liu, Ya-Ting Hsu, Yi-Li Huang:
The simulation of an emotional robot implemented with fuzzy logic. Soft Comput. 18(9): 1729-1743 (2014) - [j5]Yi-Li Huang, Fang-Yie Leu, Ilsun You, Yao-Kuo Sun, William Cheng-Chung Chu:
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment. J. Supercomput. 67(3): 635-652 (2014) - [c21]Yi-Li Huang, Fang-Yie Leu, Ilsun You, Jing-Hao Yang:
Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters. CD-ARES 2014: 166-171 - [c20]Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Ilsun You, Kangbin Yim, Jian-Hong Chen, William Cheng-Chung Chu:
A random wrapping encryption method. CCNC 2014: 151-156 - [c19]Kun Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Jiu Soon Tan, Mengyuan Ye:
High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication. IMIS 2014: 487-492 - [c18]Yi-Li Huang, Sheng-Mao Wang, Fang-Yie Leu, Jung-Chun Liu, Chia-Yin Ko:
A Secure Mobile Shopping System Based on Credit Card Transaction. INCoS 2014: 336-341 - [c17]Yi-Li Huang, Shih-Han Chen, Fang-Yie Leu, Chia-Yin Ko, Jung-Chun Liu:
A Secure Traffic Control System with Emergency Handling for Ambulances. INCoS 2014: 356-361 - [c16]Kun Lin Tsai, Jiu Soon Tan, Fang-Yie Leu, Yi-Li Huang:
A Group File Encryption Method using Dynamic System Environment Key. NBiS 2014: 476-483 - 2013
- [j4]Yi-Li Huang, Fang-Yie Leu, Ko-Chung Wei:
A secure communication over wireless environments by using a data connection core. Math. Comput. Model. 58(5-6): 1459-1474 (2013) - [c15]Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu:
A Multiple-Key Management Scheme in Wireless Sensor Networks. CD-ARES Workshops 2013: 337-344 - [c14]Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Lih-Jiun Lo, William Cheng-Chung Chu:
A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core. BWCCA 2013: 360-365 - [c13]Ya-Ting Hsu, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, William Cheng-Chung Chu:
The Simulation of a Robot with Emotions Implemented with Fuzzy Logic. BWCCA 2013: 382-386 - [c12]Yu-Shin Huang, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, William Cheng-Chung Chu:
A Handover Scheme for LTE Wireless Networks under the Assistance of GPS. BWCCA 2013: 399-403 - [c11]Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang:
A Block Cipher Mode of Operation with Two Keys. ICT-EurAsia 2013: 392-398 - [c10]Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, William Cheng-Chung Chu, Chao-Tung Yang:
A True Random-Number Encryption Method. IMIS 2013: 654-659 - [c9]Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang, Chih-Wei Yu, Cheng-Chung Chu, Chao-Tung Yang:
Building a block cipher mode of operation with feedback keys. ISIE 2013: 1-4 - [c8]Yi-Li Huang, Fang-Yie Leu, Yao-Kuo Sun, William Cheng-Chung Chu, Chao-Tung Yang:
A secure wireless communication system by integrating RSA and Diffie-Hellman PKDS in 4G environments and an intelligent protection-key chain with a data connection core. ISIE 2013: 1-6 - 2012
- [c7]Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai:
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation. CD-ARES 2012: 578-592 - [c6]Fang-Yie Leu, Yi-Li Huang, Chien-Nan Chen:
The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link. BWCCA 2012: 452-457 - [c5]Fang-Yie Leu, Miao-Heng Chen, Yi-Li Huang, Chung-Chi Lin:
Controlling Traffic Lights for Ambulances. BWCCA 2012: 462-467 - [c4]Fang-Yie Leu, Ilsun You, Yi-Li Huang, Kangbin Yim, Cheng-Ru Dai:
Improving security level of LTE authentication and key agreement procedure. GLOBECOM Workshops 2012: 1032-1036 - [c3]Ko-Chung Wei, Yi-Li Huang, Fang-Yie Leu:
A Secure Communication over Wireless Environments by Using a Data Connection Core. IMIS 2012: 570-575 - 2011
- [j3]Yi-Li Huang, Fang-Yie Leu:
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(3): 96-107 (2011) - [j2]Yi-Li Huang, Fang-Yie Leu, Chao-Hong Chiu, I-Long Lin:
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. J. Univers. Comput. Sci. 17(6): 891-911 (2011) - [j1]Yi-Fu Ciou, Fang-Yie Leu, Yi-Li Huang, Kangbin Yim:
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks. Mob. Inf. Syst. 7(3): 241-269 (2011) - [c2]Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang:
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks. ARES 2011: 255-270 - [c1]Yi-Li Huang, Chu-Hsing Lin, Fang-Yie Leu:
Verification of a Batch of Bad Signatures by Using the Matrix-Detection Algorithm. CCP 2011: 299-306
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint