Follow
Chunhua Su
Chunhua Su
Division of Computer Science, University of Aizu, Japan
Verified email at u-aizu.ac.jp
Title
Cited by
Cited by
Year
A blockchain connected gateway for BLE-based devices in the internet of things
SC Cha, JF Chen, C Su, KH Yeh
ieee access 6, 24639-24649, 2018
2612018
Blockchain-based reliable and efficient certificateless signature for IIoT devices
W Wang, H Xu, M Alazab, TR Gadekallu, Z Han, C Su
IEEE transactions on industrial informatics 18 (10), 7059-7067, 2021
2382021
Contractward: Automated vulnerability detection models for ethereum smart contracts
W Wang, J Song, G Xu, Y Li, H Wang, C Su
IEEE Transactions on Network Science and Engineering 8 (2), 1133-1144, 2020
2202020
Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks
W Wang, Q Chen, Z Yin, G Srivastava, TR Gadekallu, F Alsolami, C Su
IEEE Internet of Things Journal 9 (11), 8883-8891, 2021
1902021
Lightweight IoT-based authentication scheme in cloud computing circumstance
L Zhou, X Li, KH Yeh, C Su, W Chiu
Future generation computer systems 91, 244-251, 2019
1892019
On the design of blockchain-based ECDSA with fault-tolerant batch verification protocol for blockchain-enabled IoMT
H Xiong, C Jin, M Alazab, KH Yeh, H Wang, TR Gadekallu, W Wang, C Su
IEEE journal of biomedical and health informatics 26 (5), 1977-1986, 2021
1412021
Secure and efficient mutual authentication protocol for smart grid under blockchain
W Wang, H Huang, L Zhang, C Su
Peer-to-Peer Networking and Applications 14 (5), 2681-2693, 2021
1322021
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
Ieee Access 6, 7234-7243, 2017
1022017
FPDP: Flexible privacy-preserving data publishing scheme for smart agriculture
J Song, Q Zhong, W Wang, C Su, Z Tan, Y Liu
IEEE Sensors Journal 21 (16), 17430-17438, 2020
1002020
Am I eclipsed? A smart detector of eclipse attacks for Ethereum
G Xu, B Guo, C Su, X Zheng, K Liang, DS Wong, H Wang
Computers & Security 88, 101604, 2020
892020
Two robust remote user authentication protocols using smart cards
KH Yeh, C Su, NW Lo, Y Li, YX Hung
Journal of Systems and Software 83 (12), 2556-2565, 2010
892010
A novel certificateless signature scheme for smart objects in the Internet-of-Things
KH Yeh, C Su, KKR Choo, W Chiu
Sensors 17 (5), 1001, 2017
882017
Secure-enhanced federated learning for AI-empowered electric vehicle energy prediction
W Wang, FH Memon, Z Lian, Z Yin, TR Gadekallu, QV Pham, K Dev, C Su
IEEE Consumer Electronics Magazine 12 (2), 27-34, 2021
802021
Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints
L Zhou, KH Yeh, G Hancke, Z Liu, C Su
IEEE Signal Processing Magazine 35 (5), 76-87, 2018
762018
A lightweight blockchain-based remote mutual authentication for AI-empowered IoT sustainable computing systems
BD Deebak, FH Memon, SA Khowaja, K Dev, W Wang, NMF Qureshi, ...
IEEE Internet of Things Journal 10 (8), 6652-6660, 2022
592022
Blockchain-based two-stage federated learning with non-IID data in IoMT system
Z Lian, Q Zeng, W Wang, TR Gadekallu, C Su
IEEE Transactions on Computational Social Systems, 2022
572022
Special issue on advanced persistent threat
J Chen, C Su, KH Yeh, M Yung
Future Generation Computer Systems 79, 243-246, 2018
542018
DEEP-FEL: Decentralized, efficient and privacy-enhanced federated edge learning for healthcare cyber physical systems
Z Lian, Q Yang, W Wang, Q Zeng, M Alazab, H Zhao, C Su
IEEE Transactions on Network Science and Engineering 9 (5), 3558-3569, 2022
532022
BSIF: Blockchain-based secure, interactive, and fair mobile crowdsensing
W Wang, Y Yang, Z Yin, K Dev, X Zhou, X Li, NMF Qureshi, C Su
IEEE Journal on Selected Areas in Communications 40 (12), 3452-3469, 2022
522022
COFEL: Communication-efficient and optimized federated learning with local differential privacy
Z Lian, W Wang, C Su
ICC 2021-IEEE International Conference on Communications, 1-6, 2021
522021
The system can't perform the operation now. Try again later.
Articles 1–20