Kuo‐Hui Yeh
YOU?
Author Swipe
View article: ArtPerception: ASCII art-based jailbreak on LLMs with recognition pre-test
ArtPerception: ASCII art-based jailbreak on LLMs with recognition pre-test Open
View article: Inaugural Editorial for the Journal of Reliable and Secure Computing
Inaugural Editorial for the Journal of Reliable and Secure Computing Open
Presents the introductory editorial for the inaugural issue of this title.
View article: GNN-enhanced Traffic Anomaly Detection for Next-Generation SDN-Enabled Consumer Electronics
GNN-enhanced Traffic Anomaly Detection for Next-Generation SDN-Enabled Consumer Electronics Open
Consumer electronics (CE) connected to the Internet of Things are susceptible to various attacks, including DDoS and web-based threats, which can compromise their functionality and facilitate remote hijacking. These vulnerabilities allow a…
View article: Enhancing Resilience for IoE: A Perspective of Networking-Level Safeguard
Enhancing Resilience for IoE: A Perspective of Networking-Level Safeguard Open
The Internet of Energy (IoE) integrates IoT-driven digital communication with power grids to enable efficient and sustainable energy systems. Still, its interconnectivity exposes critical infrastructure to sophisticated cyber threats, incl…
View article: Automated Vulnerability Detection Using Deep Learning Technique
Automated Vulnerability Detection Using Deep Learning Technique Open
Our work explores the utilization of deep learning, specifically leveraging the CodeBERT model, to enhance code security testing for Python applications by detecting SQL injection vulnerabilities. Unlike traditional security testing method…
View article: TPSQLi: Test Prioritization for SQL Injection Vulnerability Detection in Web Applications
TPSQLi: Test Prioritization for SQL Injection Vulnerability Detection in Web Applications Open
The rapid proliferation of network applications has led to a significant increase in network attacks. According to the OWASP Top 10 Projects report released in 2021, injection attacks rank among the top three vulnerabilities in software pr…
View article: Emerging Authentication Technologies for Zero Trust on the Internet of Things
Emerging Authentication Technologies for Zero Trust on the Internet of Things Open
The large and interconnected nature of the Internet of Things (IoT) presents unique security challenges, even as it revolutionizes various sectors. With numerous devices, often limited in resources, traditional perimeter-based security met…
View article: Emerging Authentication Technologies for Zero Trust on the Internet of Things
Emerging Authentication Technologies for Zero Trust on the Internet of Things Open
The large and interconnected nature of the Internet of Things (IoT) presents unique security challenges, even as it revolutionizes various sectors. With numerous devices, often limited in resources, traditional perimeter-based security met…
View article: Automated Vulnerability Detection Using Deep Learning Technique
Automated Vulnerability Detection Using Deep Learning Technique Open
View article: Application of Simplified Swarm Optimization on Graph Convolutional Networks
Application of Simplified Swarm Optimization on Graph Convolutional Networks Open
View article: Editorial: Sustainable and intelligent plant health management in Asia (2022)
Editorial: Sustainable and intelligent plant health management in Asia (2022) Open
EDITORIAL article Front. Plant Sci., 14 August 2023Sec. Sustainable and Intelligent Phytoprotection Volume 14 - 2023 | https://doi.org/10.3389/fpls.2023.1244869
View article: A Trusted Reputation Management Scheme for Cross-Chain Transactions
A Trusted Reputation Management Scheme for Cross-Chain Transactions Open
Blockchain has become a well-known, secured, decentralized datastore in many domains, including medical, industrial, and especially the financial field. However, to meet the requirements of different fields, platforms that are built on blo…
View article: A cycle-level recovery method for embedded processor against HT tamper
A cycle-level recovery method for embedded processor against HT tamper Open
As the core of Internet of Things (IoT), embedded processors are being used more and more extensive. However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a…
View article: Special Issue Editorial “Blockchain-Enabled Technology for IoT Security, Privacy and Trust”
Special Issue Editorial “Blockchain-Enabled Technology for IoT Security, Privacy and Trust” Open
The Internet of Things (IoT) is an emerging paradigm, seamlessly integrating a great quantity of smart objects that are connected to the Internet [...]
View article: Special Issue Editorial “Deep Learning Technologies for Mobile Networks: A Themed Issue in Honor of Prof. Han-Chieh Chao”
Special Issue Editorial “Deep Learning Technologies for Mobile Networks: A Themed Issue in Honor of Prof. Han-Chieh Chao” Open
Han-Chieh Chao received his MS and PhD degrees in Electrical Engineering from Purdue University, West Lafayette, Indiana, in 1989 and 1993, respectively [...]
View article: Designing a Mobile Payment-Driven Mobility-as-a-Service Architecture for Bus Transportation
Designing a Mobile Payment-Driven Mobility-as-a-Service Architecture for Bus Transportation Open
This paper proposes a comprehensive architecture for a Mobility-as-a-Service (MaaS) platform, focusing on service browsing, ticketing, and payment, with a specific emphasis on integrating MaaS into bus payment systems. The proposed archite…
View article: A Secure Interoperability Management Scheme for Cross-Blockchain Transactions
A Secure Interoperability Management Scheme for Cross-Blockchain Transactions Open
Blockchain technology has recently attracted tremendous interest due to its potential to revolutionize the industry by achieving decentralization while increasing the number of data sources, transparency, reliability, auditability, and tru…
View article: A Secure IoT and Cloud Computing-Enabled e-Health Management System
A Secure IoT and Cloud Computing-Enabled e-Health Management System Open
Utilization of the Internet of Things (IoT) technology is virtually ubiquitous across various life disciplines. When the IoT is integrated into e-health system to enable more real-time on-demand services, it brings significant convenience …
View article: Security, Trust and Privacy for Cloud, Fog and Internet of Things
Security, Trust and Privacy for Cloud, Fog and Internet of Things Open
View article: Efficient access control with traceability and user revocation in IoT
Efficient access control with traceability and user revocation in IoT Open
With the universality and availability of Internet of Things (IoT), data privacy protection in IoT has become a hot issue. As a branch of attribute-based encryption (ABE), ciphertext policy attribute-based encryption (CP-ABE) is widely use…
View article: Security and Privacy Techniques in IoT Environment
Security and Privacy Techniques in IoT Environment Open
Due to rapid technical advancements, many devices in the Internet of Things (IoT) environment, such as embedded systems, mobile devices, actuators, and sensors (all of which can be referred to as smart things), can receive huge amounts of …
View article: Security and Privacy in IoT-Cloud-Based e-Health Systems—A Comprehensive Review
Security and Privacy in IoT-Cloud-Based e-Health Systems—A Comprehensive Review Open
When the Internet and other interconnected networks are used in a health system, it is referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to explore the utilization of intelligent techniques in health and…
View article: On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining Open
Intelligence mining is one of the most promising technologies for effectively extracting intelligence (and knowledge) to enhance the quality of decision-making. In Taiwan, the government curtails underground economic activities and facilit…
View article: Special issue on security and privacy of blockchain technologies
Special issue on security and privacy of blockchain technologies Open
View article: Exploring coupled images fusion based on joint tensor decomposition
Exploring coupled images fusion based on joint tensor decomposition Open
Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion algorithm usually utilizes the information from one data set to im…
View article: IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT
IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT Open
The Internet of Things (IoT), which enables a wide variety of embedded devices, sensors, and actuators (known as smart things) to interconnect and exchange data, is a promising network scenario for bridging physical devices and virtual obj…
View article: Robust IoT-based nursing-care support system with smart bio-objects
Robust IoT-based nursing-care support system with smart bio-objects Open
View article: Authentication with What You See and Remember in the Internet of Things
Authentication with What You See and Remember in the Internet of Things Open
The Internet-of-Things (IoT) is an emerging paradigm seamlessly integrating a great number of smart objects ubiquitously connected to the Internet. With the rise in interest in the IoT, industry and academia have introduced a variety of au…
View article: A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol
A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol Open
Session initiation protocol (SIP) is the most widely used application layer control protocol for creating, modifying, and terminating session processes. Many authentication schemes have been proposed for SIP aimed at providing secure commu…
View article: A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things
A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things Open
Recently, the popularity of the Internet of Things (IoT) has led to a rapid development and significant advancement of ubiquitous applications seamlessly integrated within our daily life. Owing to the accompanying growth of the importance …