How to detect a compromised SDN switch CLL PW Chi, CT Kuo, JW Guo Network Softwarization (NetSoft), 2015 1st IEEE Conference on, 1-6, 2015 | 117* | 2015 |
Audit-free cloud storage via deniable attribute-based encryption PW Chi, CL Lei IEEE Transactions on Cloud Computing 6 (2), 414-427, 2015 | 79 | 2015 |
Efficient NFV deployment in data center networks PW Chi, YC Huang, CL Lei 2015 IEEE International Conference on Communications (ICC), 5290-5295, 2015 | 53 | 2015 |
SDUDP: A reliable UDP-Based transmission protocol over SDN MH Wang, LW Chen, PW Chi, CL Lei IEEE Access 5, 5904-5916, 2017 | 45 | 2017 |
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service CT Kuo, PW Chi, V Chang, CL Lei Future Generation Computer Systems 86, 1424-1436, 2018 | 34 | 2018 |
A privacy-preserving zero-knowledge proof for blockchain PW Chi, YH Lu, A Guan Ieee Access, 2023 | 23 | 2023 |
OpenE2EQoS: Meter-based method for end-to-end QoS of multimedia services over SDN TN Lin, YM Hsu, SY Kao, PW Chi 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and …, 2016 | 22 | 2016 |
Apparatus, method, and computer readable medium for transmitting data via a plurality of network interfaces PW Chi, YH Lin US Patent 7,957,358, 2011 | 20 | 2011 |
An AMI threat detection mechanism based on SDN networks PW Chi, CT Kuo, HM Ruan, SJ Chen, CL Lei Proc. SECURWARE, 208-211, 2014 | 14 | 2014 |
A prevention approach to scrambling attacks in WiMAX networks PW Chi, CL Lei 2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009 | 12 | 2009 |
SDN storage: A stream-based storage system over software-defined networks MH Wang, PW Chi, JW Guo, CL Lei 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016 | 10 | 2016 |
Give me a broadcast-free network PW Chi, YC Huang, JW Guo, CL Lei 2014 IEEE Global Communications Conference, 1968-1973, 2014 | 10 | 2014 |
Multi-level privacy preserving k-anonymity JH Weng, PW Chi 2021 16th Asia Joint Conference on Information Security (AsiaJCIS), 61-67, 2021 | 8 | 2021 |
How to hide the real receiver under the cover receiver: Cp-abe with policy deniability PW Chi, MH Wang, HJ Shiu IEEE Access 8, 89866-89881, 2020 | 7 | 2020 |
Understanding potential cyber-armies in elections: a study of Taiwan MH Wang, NL Nguyen, S Dai, PW Chi, CR Dow Sustainability 12 (6), 2248, 2020 | 7 | 2020 |
Do not ask me what I am looking for: Index deniable encryption PW Chi, YL Chang Future Generation Computer Systems 122, 28-39, 2021 | 5 | 2021 |
A lightweight compound defense framework against injection attacks in iiot PW Chi, MH Wang 2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018 | 5 | 2018 |
SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-Enabled Networks PW Chi, MH Wang, JW Guo, CL Lei 2016 International Computer Symposium (ICS), 148-153, 2016 | 5 | 2016 |
A Revocation Key-based Approach Towards Efficient Federated Unlearning RZ Xu, SY Hong, PW Chi, MH Wang 2023 18th Asia Joint Conference on Information Security (AsiaJCIS), 17-24, 2023 | 4 | 2023 |
Building a privacy-preserving blockchain-based bidding system: A crypto approach HH Chen, PW Chi, YH Chuang IEEE Access 10, 13367-13378, 2022 | 4 | 2022 |