default search action
Po-Wen Chi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Yi-Jun Tang, Po-Wen Chi:
Theseus Data Synthesis Approach: A Privacy-Preserving Online Data Sharing Service. IEEE Access 12: 141130-141143 (2024) - [j14]Ming-Hung Wang, Ting-Shen Hsieh, Yu-Yao Tseng, Po-Wen Chi:
A Software-Defined Networking-Driven Reliable Transmission Architecture for Enhancing Real-Time Video Streaming Quality. IEEE Multim. 31(1): 54-64 (2024) - [c19]Kenneth Ong Kuan Phing, Bo Yu Chen, Po-Wen Chi, Chao Wang:
A Study of Fully Homomorphic Encryption with Evaluation Control. AsiaJCIS 2024: 17-24 - [c18]Yun-Hsin Chuang, Po-Wen Chi, Ming-Hung Wang:
CCADM: A Continuous Collection Scheme for Anonymous Data Management. AsiaJCIS 2024: 69-74 - [c17]Yu Chi Lin, Po-Wen Chi:
Adaptive Machine Learning Model for Dynamic Field Selection. AsiaJCIS 2024: 151-156 - 2023
- [j13]Po-Wen Chi, Yun-Hsiu Lu, Albert Guan:
A Privacy-Preserving Zero-Knowledge Proof for Blockchain. IEEE Access 11: 85108-85117 (2023) - [c16]Rui-Zhen Xu, Sheng-Yi Hong, Po-Wen Chi, Ming-Hung Wang:
A Revocation Key-based Approach Towards Efficient Federated Unlearning. AsiaJCIS 2023: 17-24 - [c15]Sheng-Yi Hong, Rui-Zhen Xu, Po-Wen Chi, Albert Guan:
Privacy Preserving Provable Data Possession: A FHE-based Hash Approach. AsiaJCIS 2023: 47-52 - 2022
- [j12]Hsuan-Hao Chen, Po-Wen Chi, Yun-Hsin Chuang:
Building a Privacy-Preserving Blockchain-Based Bidding System: A Crypto Approach. IEEE Access 10: 13367-13378 (2022) - [j11]Po-Wen Chi, Yu Zheng, Wei-Yang Chang, Ming-Hung Wang:
SandboxNet: A Learning-Based Malicious Application Detection Framework in SDN Networks. J. Inf. Sci. Eng. 38(6): 1189-1211 (2022) - [c14]Zhe-Wei Lin, Tzu-Hung Liu, Po-Wen Chi:
LED: Learnable Encryption with Deniability. ICS 2022: 649-660 - 2021
- [j10]Po-Wen Chi, Yu-Lun Chang:
Do not ask me what I am looking for: Index deniable encryption. Future Gener. Comput. Syst. 122: 28-39 (2021) - [j9]Po-Wen Chi, Ming-Hung Wang:
Deniable search of encrypted cloud-storage data. J. Inf. Secur. Appl. 58: 102806 (2021) - [c13]Jui-Hung Weng, Po-Wen Chi:
Multi-Level Privacy Preserving K-Anonymity. AsiaJCIS 2021: 61-67 - 2020
- [j8]Po-Wen Chi, Ming-Hung Wang, Hung-Jr Shiu:
How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability. IEEE Access 8: 89866-89881 (2020) - [c12]Po-Wen Chi, Ming-Hung Wang, Yu Zheng:
SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking. ICS 2020: 397-402
2010 – 2019
- 2019
- [j7]Ming-Hung Wang, Po-Wen Chi:
Blurring Political Leanings of Messages on Social Networks Using Deniable Steganography. IEEE Access 7: 87692-87703 (2019) - [j6]Po-Wen Chi, Ming-Hung Wang, Jing-Wei Guo, Chin-Laung Lei:
MigrateSDN: efficient approach to integrate OpenFlow networks with STP-enabled networks. Int. J. Comput. Sci. Eng. 20(4): 480-491 (2019) - [j5]Po-Wen Chi, Ming-Hung Wang:
Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems. Sensors 19(24): 5463 (2019) - [c11]Po-Wen Chi, Pin-Hsin Hsiao:
Learnable Audio Encryption for Untrusted Outsourcing Machine Learning Services. AsiaJCIS 2019: 151-156 - 2018
- [j4]Chien-Ting Kuo, Po-Wen Chi, Victor Chang, Chin-Laung Lei:
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service. Future Gener. Comput. Syst. 86: 1424-1436 (2018) - [j3]Po-Wen Chi, Chin-Laung Lei:
Audit-Free Cloud Storage via Deniable Attribute-Based Encryption. IEEE Trans. Cloud Comput. 6(2): 414-427 (2018) - [c10]Po-Wen Chi, Ming-Hung Wang:
A Lightweight Compound Defense Framework Against Injection Attacks in IIoT. DSC 2018: 1-8 - [c9]Po-Wen Chi, Ming-Hung Wang:
Dynamic Key Management Scheme in IoT. ICS 2018: 559-566 - 2017
- [j2]Ming-Hung Wang, Lung-Wen Chen, Po-Wen Chi, Chin-Laung Lei:
SDUDP: A Reliable UDP-Based Transmission Protocol Over SDN. IEEE Access 5: 5904-5916 (2017) - 2016
- [c8]Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei, Nen-Fu Huang:
SDNort: A Software Defined Network Testing Framework Using Openflow. AsiaJCIS 2016: 100-107 - [c7]Ming-Hung Wang, Po-Wen Chi, Jing-Wei Guo, Chin-Laung Lei:
SDN storage: A stream-based storage system over software-defined networks. INFOCOM Workshops 2016: 598-599 - [c6]Tsung-Nan Lin, Yang-Ming Hsu, Sheng-Yi Kao, Po-Wen Chi:
OpenE2EQoS: Meter-based method for end-to-end QoS of multimedia services over SDN. PIMRC 2016: 1-6 - 2015
- [c5]Po-Wen Chi, Yu-Cheng Huang, Chin-Laung Lei:
Efficient NFV deployment in data center networks. ICC 2015: 5290-5295 - [c4]Po-Wen Chi, Chien-Ting Kuo, Jing-Wei Guo, Chin-Laung Lei:
How to detect a compromised SDN switch. NetSoft 2015: 1-6 - 2014
- [c3]Po-Wen Chi, Yu-Cheng Huang, Jing-Wei Guo, Chin-Laung Lei:
Give me a broadcast-free network. GLOBECOM 2014: 1968-1973 - 2011
- [j1]Yu-Hsiang Lin, Po-Wen Chi, Ching-Lun Lin, Wei-Chih Lin:
Fast Uncontrolled Handover scheme for WiMAX: infrastructure networks. Int. J. Auton. Adapt. Commun. Syst. 4(3): 237-251 (2011)
2000 – 2009
- 2009
- [c2]Po-Wen Chi, Chin-Laung Lei:
A prevention approach to scrambling attacks in WiMAX networks. WOWMOM 2009: 1-8 - 2008
- [c1]Po-Wen Chi, Ching-Lun Lin, Wei-Chih Lin:
Fast uncontrolled handover scheme for WiMAX infrastructure networks. Mobility Conference 2008: 109
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint