A survey of key distribution in wireless sensor networks CY Chen, HC Chao Security and Communication Networks 7 (12), 2495-2508, 2014 | 156 | 2014 |
Internet of Things and Cloud Computing for Future Internet KD Chang, CY Chen, JL Chen, HC Chao Security-Enriched Urban Computing and Smart Grid, 1-10, 2011 | 95 | 2011 |
Survey on underwater delay/disruption tolerant wireless sensor network routing HH Cho, CY Chen, TK Shih, HC Chao IET Wireless Sensor Systems 4 (3), 112-121, 2014 | 81 | 2014 |
Quantum cryptography and its applications over the Internet CY Chen, GJ Zeng, FJ Lin, YH Chou, HC Chao IEEE Network 29 (5), 64-69, 2015 | 57 | 2015 |
An adaptive emergency broadcast strategy for vehicular ad hoc networks YH Chou, TH Chu, SY Kuo, CY Chen IEEE Sensors Journal 18 (12), 4814-4821, 2017 | 47 | 2017 |
Privacy-preserving power request in smart grid networks CM Yu, CY Chen, SY Kuo, HC Chao IEEE Systems Journal 8 (2), 441-449, 2014 | 46 | 2014 |
Reconfigurable software defined radio and its applications CY Chen, FH Tseng, KD Chang, HC Chao, JL Chen Tamkang Journal of Science and Engineering 13 (1), 29-38, 2010 | 45 | 2010 |
Software Defined Wireless Sensor Networks (SDWSN): A Review on Efficient Resources, Applications and Technologies BB Letswamotse, R Malekian, CY Chen, KM Modieginyane Journal of Internet Technology 19 (5), 1303-1313, 2018 | 42 | 2018 |
A Rule-based Dynamic Decision-making Stock Trading System based on Quantum-Inspired Tabu Search algorithm YH Chou, SY Kuo, CY Chen, HC Chao IEEE Access 2, 883-896, 2014 | 41 | 2014 |
Secure centralized spectrum sensing for cognitive radio networks CY Chen, YH Chou, HC Chao, CH Lo Wireless Networks 18 (6), 667-677, 2012 | 41 | 2012 |
Cloud-based image processing system with priority-based data distribution mechanism TY Wu, CY Chen, LS Kuo, WT Lee, HC Chao Computer Communications 35 (15), 1809-1818, 2012 | 38 | 2012 |
Service-Oriented Virtual Machine Placement Optimization for Green Data Center FH Tseng, CY Chen, LD Chou, HC Chao, JW Niu Mobile Networks and Applications 20 (5), 556-566, 2015 | 34 | 2015 |
Proof of ownership in deduplicated cloud storage with mobile device efficiency CM Yu, CY Chen, HC Chao IEEE Network 29 (2), 51-55, 2015 | 34 | 2015 |
Transaction-pattern-based anomaly detection algorithm for IP multimedia subsystem CY Chen, KD Chang, HC Chao IEEE Transactions on Information Forensics and Security 6 (1), 152-161, 2011 | 33 | 2011 |
Challenges to Next Generation Services in IP Multimedia Subsystem KD Chang, CY Chen, JL Chen, HC Chao Journal of Information Processing Systems 6 (2), 129-146, 2010 | 33 | 2010 |
Hybrid architecture performance analysis for device-to-device communication in 5G cellular network Z Lin, Z Gao, L Huang, CY Chen, HC Chao Mobile Networks and Applications 20 (6), 713-724, 2015 | 32 | 2015 |
Low energy aware communication process in IoT using the green computing approach S Kallam, RB Madda, CY Chen, R Patan, D Cheelu IET Networks 7 (4), 258-264, 2018 | 30 | 2018 |
Quantum-inspired algorithm for cyber-physical visual surveillance deployment systems SY Kuo, YH Chou, CY Chen Computer Networks 117, 5-18, 2017 | 30 | 2017 |
An efficient end-to-end security mechanism for IP multimedia subsystem CY Chen, TY Wu, YM Huang, HC Chao Computer Communications 31 (18), 4259-4268, 2008 | 30 | 2008 |
Privacy-preserving multikeyword similarity search over outsourced cloud data CM Yu, CY Chen, HC Chao IEEE Systems Journal 11 (2), 385-394, 2017 | 26 | 2017 |