A blockchain connected gateway for BLE-based devices in the internet of things SC Cha, JF Chen, C Su, KH Yeh ieee access 6, 24639-24649, 2018 | 213 | 2018 |
Blockchain-based reliable and efficient certificateless signature for IIoT devices W Wang, H Xu, M Alazab, TR Gadekallu, Z Han, C Su IEEE transactions on industrial informatics 18 (10), 7059-7067, 2021 | 147 | 2021 |
Lightweight IoT-based authentication scheme in cloud computing circumstance L Zhou, X Li, KH Yeh, C Su, W Chiu Future generation computer systems 91, 244-251, 2019 | 141 | 2019 |
Contractward: Automated vulnerability detection models for ethereum smart contracts W Wang, J Song, G Xu, Y Li, H Wang, C Su IEEE Transactions on Network Science and Engineering 8 (2), 1133-1144, 2020 | 105 | 2020 |
Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks W Wang, Q Chen, Z Yin, G Srivastava, TR Gadekallu, F Alsolami, C Su IEEE Internet of Things Journal 9 (11), 8883-8891, 2021 | 88 | 2021 |
Two robust remote user authentication protocols using smart cards KH Yeh, C Su, NW Lo, Y Li, YX Hung Journal of Systems and Software 83 (12), 2556-2565, 2010 | 86 | 2010 |
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data W Meng, W Li, C Su, J Zhou, R Lu Ieee Access 6, 7234-7243, 2017 | 83 | 2017 |
Secure and efficient mutual authentication protocol for smart grid under blockchain W Wang, H Huang, L Zhang, C Su Peer-to-Peer Networking and Applications 14, 2681-2693, 2021 | 81 | 2021 |
FPDP: Flexible privacy-preserving data publishing scheme for smart agriculture J Song, Q Zhong, W Wang, C Su, Z Tan, Y Liu IEEE Sensors Journal 21 (16), 17430-17438, 2020 | 70 | 2020 |
On the design of blockchain-based ECDSA with fault-tolerant batch verification protocol for blockchain-enabled IoMT H Xiong, C Jin, M Alazab, KH Yeh, H Wang, TR Gadekallu, W Wang, C Su IEEE journal of biomedical and health informatics 26 (5), 1977-1986, 2021 | 69 | 2021 |
A novel certificateless signature scheme for smart objects in the Internet-of-Things KH Yeh, C Su, KKR Choo, W Chiu Sensors 17 (5), 1001, 2017 | 67 | 2017 |
Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints L Zhou, KH Yeh, G Hancke, Z Liu, C Su IEEE Signal Processing Magazine 35 (5), 76-87, 2018 | 60 | 2018 |
Am I eclipsed? A smart detector of eclipse attacks for Ethereum G Xu, B Guo, C Su, X Zheng, K Liang, DS Wong, H Wang Computers & Security 88, 101604, 2020 | 54 | 2020 |
Special issue on advanced persistent threat J Chen, C Su, KH Yeh, M Yung Future Generation Computer Systems 79, 243-246, 2018 | 46 | 2018 |
Secure-enhanced federated learning for ai-empowered electric vehicle energy prediction W Wang, MH Fida, Z Lian, Z Yin, QV Pham, TR Gadekallu, K Dev, C Su IEEE Consumer Electronics Magazine, 2021 | 42 | 2021 |
I walk, therefore i am: continuous user authentication with plantar biometrics KH Yeh, C Su, W Chiu, L Zhou IEEE Communications Magazine 56 (2), 150-157, 2018 | 38 | 2018 |
A user-friendly privacy framework for users to achieve consents with nearby BLE devices SC Cha, MS Chuang, KH Yeh, ZJ Huang, C Su IEEE Access 6, 20779-20787, 2018 | 35 | 2018 |
You think, therefore you are: Transparent authentication system with brainwave-oriented bio-features for IoT networks L Zhou, C Su, W Chiu, KH Yeh IEEE Transactions on Emerging Topics in Computing 8 (2), 303-312, 2017 | 32 | 2017 |
Towards false alarm reduction using fuzzy if-then rules for medical cyber physical systems W Li, W Meng, C Su, LF Kwok IEEE Access 6, 6530-6539, 2018 | 31 | 2018 |
Privacy-preserving two-party k-means clustering via secure approximation C Su, F Bao, J Zhou, T Takagi, K Sakurai 21st International Conference on Advanced Information Networking and …, 2007 | 29 | 2007 |