Data hiding methods based upon DNA sequences HJ Shiu, KL Ng, JF Fang, RCT Lee, CH Huang Information Sciences 180 (11), 2196-2208, 2010 | 241 | 2010 |
IoT based smart aquaculture system with automatic aerating and water quality monitoring KL Tsai, LW Chen, LJ Yang, HJ Shiu, HW Chen Journal of Internet Technology 23 (1), 177-184, 2022 | 49 | 2022 |
Preserving privacy of online digital physiological signals using blind and reversible steganography HJ Shiu, BS Lin, CH Huang, PY Chiang, CL Lei Computer methods and programs in biomedicine 151, 159-170, 2017 | 48 | 2017 |
DNA based encryption methods HZ Hsu, RCT Lee The 23rd workshop on combinatorial mathematics and computation theory, 545, 2006 | 36 | 2006 |
Steganography in RGB images using adjacent mean YH Chuang, BS Lin, YX Chen, HJ Shiu IEEE access 9, 164256-164274, 2021 | 14 | 2021 |
Data hiding on social media communications using text steganography HJ Shiu, BS Lin, BS Lin, PY Huang, CH Huang, CL Lei Risks and Security of Internet and Systems: 12th International Conference …, 2018 | 14 | 2018 |
Quantifiable Interactivity of Malicious URLs and the Social Media Ecosystem CM Lai, HJ Shiu, J Chapman Electronics 9 (12), 2020 | 9 | 2020 |
High-capacity data-hiding scheme on synthesized pitches using amplitude enhancement—A new vision of non-blind audio steganography HJ Shiu, BS Lin, CW Cheng, CH Huang, CL Lei Symmetry 9 (6), 92, 2017 | 9 | 2017 |
A reversible acoustic data hiding method based on analog modulation HJ Shiu, SY Tang, CH Huang, RCT Lee, CL Lei Information Sciences 273, 233-246, 2014 | 9 | 2014 |
Cryptanalysis of four biometric based authentication schemes with privacy-preserving for multi-server environment and design guidelines YH Chuang, CL Lei, HJ Shiu 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 66-73, 2020 | 8 | 2020 |
How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security YH Chuang, CL Lei, S Hung-Jr Symmetry 13 (9), 2021 | 7 | 2021 |
How to hide the real receiver under the cover receiver: Cp-abe with policy deniability PW Chi, MH Wang, HJ Shiu IEEE Access 8, 89866-89881, 2020 | 7 | 2020 |
Maintaining Secure Level on Symmetric Encryption under Quantum Attack HJ Shiu, CT Yang, YR Tsai, WC Lin, CM Lai Applied Sciences 13 (11), 6734-6747, 2023 | 5 | 2023 |
Adaptive resource management for spot workers in cloud computing environment LP Chen, FY Leu, HT Chiao, HJ Shiu International Journal of Web and Grid Services 18 (4), 437-452, 2022 | 4 | 2022 |
A stereo audio steganography by inserting low-frequency and octave equivalent pure tones HJ Shiu, BS Lin, BS Lin, WC Lai, CH Huang, CL Lei Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis …, 2018 | 4 | 2018 |
Efficient adaptive resource management for spot workers in cloud computing environment LP Chen, FY Leu, HT Chiao, HJ Shiu Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings …, 2022 | 1 | 2022 |
Novel Reversible Acoustic Steganography Based on Carrier Orthogonality HJ Shiu, FY Leu, CM Lai, YC Huang Information Security Applications: 21st International Conference, WISA 2020 …, 2020 | 1 | 2020 |
Rijndael AES 384 512 加密系統 HC Yen, PW Lin, HJ Shiu CISC 2021, 2021 | | 2021 |
How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security. Symmetry 2021, 13, 1629 YH Chuang, CL Lei, HJ Shiu s Note: MDPI stays neutral with regard to jurisdictional claims in published …, 2021 | | 2021 |
Corrigendum to``Preserving privacy of online digital physiological signals using blind and reversible steganography''[Computer Methods and Programs in Biomedicine 151C (2017 … HJ Shiu, BS Lin, CH Huang, PY Chiang, CL Lei Computer Methods and Programs in Biomedicine 161, 240, 2018 | | 2018 |