Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
2009 | A Constrained Function Based Message Authentication Scheme for Sensor Networks | Yu, Chia-Mu; Lu, Chun-Shien; Kuo, Sy-Yen | | | | |
2008 | A Constrained Random Perturbation Vector-Based Pairwise Key Establishment Scheme for Wireless Sensor Networks | Yu, Chia-Mu; Chi, Ting-Yun; Lu, Chun-Shien; Kuo, Sy-Yen | | | | |
2009 | A DoS-Resilient En-route Filtering Scheme for Sensor Networks | Yu, Chia-Mu; Lu, Chun-Shien; Kuo, Sy-Yen | | | | |
2009 | A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks | Yu, Chia-Mu; Lu, Chun-Shien; Kuo, Sy-Yen | | | | |
2010 | Acquiring Authentic Data in Unattended Wireless Sensor Networks | Yu, Chia-Mu; Chen, Chi-Yuan; Lu, Chun-Shien; Kuo, Sy-Yen; Chao, Han-Chieh | Sensors 10, 2770-2792 | | | |
2011 | An Application-Driven Attack Probability-Based Deterministic Pairwise Key Pre-distribution Scheme for Non-Uniformly Deployed Sensor Networks | Yu, Chia-Mu; Li, Cheng-Chung; Lu, Chun-Shien; Kuo, Sy-Yen | International Journal of Sensor Networks 9, 89-106 | | | |
2012 | Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems | Yu, Chia-Mu; Hsieh, Sung-Hsien; Liang, Han-Wen; Lu, Chun-Shien; Chung, Wei-Ho; Kuo, Sy-Yen; Pei, Soo-Chang | IEEE Communications Letters 16, 1556-1559 | | | |
2011 | Constrained Function based Message Authentication for Sensor Networks | Yu, Chia-Mu; Tsou, Yao-Tung; Lu, Chun-Shien; Kuo, Sy-Yen | IEEE Trans. on Information Forensics and Security 6, 407-425 | | | |
2009 | Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks | Yu, Chia-Mu; Lu, Chun-Shien; Kuo, Sy-Yen | | | | |
2007 | Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking | Yu, Chia-Mu; Lu, Chun-Shien; Kuo, Sy-Yen | | | | |
2013 | Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks | Yu, Chia-Mu; Tsou, Yao-Tung; Lu, Chun-Shien; Kuo, Sy-Yen | IEEE Trans. on Information Forensics and Security 8, 754-768 | | | |
2008 | Mobile Sensor Network Resilient Against Node Replication Attack | Yu, Chia-Mu; Lu, Chun-Shien; Kuo, Sy-Yen | | | | |
2010 | Non-Interactive Pairwise Key Establishment for Sensor Networks | Yu, Chia-Mu; Lu, Chun-Shien; Kuo, Sy-Yen | IEEE Trans. on Information Forensics and Security 5, 556-569 | | | |
2005 | On the Security of Mesh-based Media Hash-dependent Watermarking Against Protocol Attacks | Lu, Chun-Shien; Yu, Chia-Mu | | | | |
2011 | Practical and Secure Multidimensional Queries in Tiered Sensor Networks | Yu, Chia-Mu; Tson, Yao-Tung; Lu, Chun-Shien; Kuo, Sy-Yen | IEEE Trans. on Information Forensics and Security 6, 241-255 | | | |
2012 | Resource Block Assignment for Interference Avoidance in Femtocell Networks | Liang, Yu-Shan; Chung, Wei-Ho; Yu, Chia-Mu; Zhang, Hongke; Chung, Chung-Hsiu; Ho, Chih-Hsiang; Kuo, Sy-Yen | | | | |
2005 | Robust Non-Interactive Zero-Knowledge Watermarking Scheme Against Cheating Prover | Yu, Chia-Mu; Lu, Chun-Shien | | | | |
2011 | Secure Transcoding for Compressive Multimedia Sensing | Kang, Li-Wei; Lin, Chin-Yang; Chen, Hung-Wei; Yu, Chia-Mu; Lu, Chun-Shien; Hsu, Chao-Yung; Pei, Soo-Chang | | | | |