Department of Information Management

Filter
Conference contribution

Search results

  • 2024

    Joint Steganography and Encryption Techniques for Security Enhancement Using Deep Learning Models

    Chen, Y. H., Tsai, M. Y. & Chen, S. H., 14 03 2024, IVSP 2024 - 2024 6th International Conference on Image, Video and Signal Processing. Association for Computing Machinery, p. 171-174 4 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Learn to Play: From Knowledge to Repeated Gameplay

    Liao, G. Y., Huang, T. L., Huang, H. Y., Dennis, A. R., Huang, Y. T. & Teng, C. I., 2024, Proceedings of the 57th Annual Hawaii International Conference on System Sciences, HICSS 2024. Bui, T. X. (ed.). IEEE Computer Society, p. 4663-4672 10 p. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Understanding the Impact of Emotional Comments and Image on Resistance Intention and Participation: A Study of Taiwanese Consumers' Buying Behavior

    Liang, C. C. & Shiau, W. L., 2024, Proceedings of the 57th Annual Hawaii International Conference on System Sciences, HICSS 2024. Bui, T. X. (ed.). IEEE Computer Society, p. 4413-4421 9 p. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Comments on the Visual Binary QR Code

    Lin, P. Y., Chen, Y. H., Wu, W. C., Huang, Y. T. & Chang, Y. F., 2023, 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications. Tsihrintzis, G. A., Wang, S.-J. & Lin, I.-C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 14-20 7 p. (Smart Innovation, Systems and Technologies; vol. 314).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Data Augmentation for a Deep Learning Framework for Ventricular Septal Defect Ultrasound Image Classification

    Chen, S. H., Tai, I. H., Chen, Y. H., Weng, K. P. & Hsieh, K. S., 2021, Pattern Recognition. ICPR International Workshops and Challenges, 2021, Proceedings. Del Bimbo, A., Cucchiara, R., Sclaroff, S., Farinella, G. M., Mei, T., Bertini, M., Escalante, H. J. & Vezzani, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12664 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Integrated Hamming Coding Operation to Reversible Data Hiding Scheme for Encrypted Images

    Chen, Y. H. & Lin, P. Y., 2021, Proceedings - 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2021-Fall. Yau, H.-T., Stenzel, R., Shyu, M.-L. & Lin, H.-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 198-201 4 p. (Proceedings - 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2021-Fall).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2020

    Ontology-based Dynamic Semantic Annotation for Social Image Retrieval

    Chen, Y. H., Lu, E. J. L. & Lin, S. C., 06 2020, Proceedings - 2020 21st IEEE International Conference on Mobile Data Management, MDM 2020. Institute of Electrical and Electronics Engineers Inc., p. 337-341 5 p. 9162252. (Proceedings - IEEE International Conference on Mobile Data Management; vol. 2020-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2018

    How can information systems strengthen virtual communities? Perspective of media richness theory

    Liao, G. Y. & Teng, C. I., 2018, Proceedings of the 22nd Pacific Asia Conference on Information Systems - Opportunities and Challenges for the Digitized Society: Are We Ready?, PACIS 2018. Tanabu, M. & Senoo, D. (eds.). Association for Information Systems, (Proceedings of the 22nd Pacific Asia Conference on Information Systems - Opportunities and Challenges for the Digitized Society: Are We Ready?, PACIS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Not all are the same: Facets of conscientiousness, competitive virtual team functions, and continuance intention

    Liao, G. Y., Cheng, T. C. E. & Teng, C. I., 2018, Proceedings of the 22nd Pacific Asia Conference on Information Systems - Opportunities and Challenges for the Digitized Society: Are We Ready?, PACIS 2018. Tanabu, M. & Senoo, D. (eds.). Association for Information Systems, (Proceedings of the 22nd Pacific Asia Conference on Information Systems - Opportunities and Challenges for the Digitized Society: Are We Ready?, PACIS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2014

    Applying simulated annealing to the nurse rostering problem in an emergency department

    Lin, S. W., Lee, Y. E., Chen, L. C., Chang, H. K. & Lin, C. F., 2014, Moving Integrated Product Development to Service Clouds in the Global Economy - Proceedings of the 21st ISPE Inc. International Conference on Concurrent Engineering, CE 2014. Chou, S.-Y., Stjepandic, J., Xu, W., Cha, J. & Curran, R. (eds.). IOS Press BV, p. 852-860 9 p. (Moving Integrated Product Development to Service Clouds in the Global Economy - Proceedings of the 21st ISPE Inc. International Conference on Concurrent Engineering, CE 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Greedy dynamic programming for scheduling the advanced reservation parking demands

    Chou, S. Y., Phuc, P. N. K., Yu, V. F. & Lin, S. W., 2014, Moving Integrated Product Development to Service Clouds in the Global Economy - Proceedings of the 21st ISPE Inc. International Conference on Concurrent Engineering, CE 2014. Chou, S.-Y., Stjepandic, J., Xu, W., Cha, J. & Curran, R. (eds.). IOS Press BV, p. 846-851 6 p. (Moving Integrated Product Development to Service Clouds in the Global Economy - Proceedings of the 21st ISPE Inc. International Conference on Concurrent Engineering, CE 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2013

    A security and efficiency of authenticated key exchange protocol for wireless Mobile Ad Hoc Networks

    Lu, E. H., Chang, H. K. C., Liaw, S. H. & Su, P. C., 2013, Innovation for Applied Science and Technology. p. 3280-3284 5 p. (Applied Mechanics and Materials; vol. 284-287).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A trusted and efficient cloud computing service with personal health record

    Wu, C. H., Hwang, J. J. & Zhuang, Z. Y., 2013, 2013 International Conference on Information Science and Applications, ICISA 2013. 6579425. (2013 International Conference on Information Science and Applications, ICISA 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Biomechanical evaluation of an orthodontic mini-implant with plastic removal cap: An in-vitro experimental testing

    Lin, Y. S., Lin, C.-L., Chang, W. J., Chang, Y. H., Yu, J. H. & Chang, Y. Z., 2013, 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2013. p. 3183-3185 3 p. 6610217. (Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Proven security and efficiency of gap diffie-hellman group blind signature in e-commerce

    Lu, E. H., Chang, H. K. C., Liaw, S. H. & Su, P. C., 2013, Innovation for Applied Science and Technology. p. 3522-3526 5 p. (Applied Mechanics and Materials; vol. 284-287).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Towards an ontological interpretation on the i*modeling language extended with security concepts: A bunge-wand-weber model perspective

    Liao, G. Y., Liang, P. J. & Huang, L. T., 2013, Human Interface and the Management of Information: Information and Interaction Design - 15th International Conference, HCI International 2013, Proceedings. PART 1 ed. Springer Verlag, p. 322-328 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8016 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2012

    A mobile RFID-based mutual authentication protocol using elliptic curve cryptography for security patrolling application

    Ko, W. T., Lu, E. H., Chiou, S. Y. & Chang, H. K. C., 2012, Radio Frequency Identification System Security. RFIDsec'12 Asia Workshop Proceedings. IOS Press, p. 63-71 9 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Controlling decryption of personal health records in the cloud

    Hsu, Y. C. & Hwang, J. J., 2012, Proceedings of the International Conference on IT Convergence and Security 2011. p. 69-79 11 p. (Lecture Notes in Electrical Engineering; vol. 120 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Safeguard workers performing catalyst replacement inside dangerous chemical reactors: An application of the RF communication technology

    Wu, C. H., Hwang, J. J. & Hsu, Y. C., 2012, 2012 International Conference on Information Science and Applications, ICISA 2012. 6220948. (2012 International Conference on Information Science and Applications, ICISA 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    A business model for cloud computing based on a separate encryption and decryption service

    Hwang, J. J., Chuang, H. K., Wu, C. H. & Hsu, Y. C., 2011, 2011 International Conference on Information Science and Applications, ICISA 2011. 5772349. (2011 International Conference on Information Science and Applications, ICISA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    44 Scopus citations
  • An improvement of privacy-preserving ECC-based grouping proof for RFID

    Ko, W. T., Chiou, S. Y., Lu, E. H. & Chang, H. K. C., 2011, Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, CSQRWC 2011. p. 1062-1064 3 p. 6037140. (Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, CSQRWC 2011; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • A novel ECC protocol for key exchanging in non-PKI networks

    Lu, E. H., Ko, W. T. & Chang, H. K. C., 2011, Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, CSQRWC 2011. p. 822-825 4 p. 6037077. (Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, CSQRWC 2011; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • A secure self-certification mechanism of RFID

    Liu, A. T., Su, P. C. & Chang, H. K. C., 2011, Proceeding of the International Conference on e-Education Entertainment and e-Management, ICEEE 2011. p. 216-221 6 p. 6137790. (Proceeding of the International Conference on e-Education Entertainment and e-Management, ICEEE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Exploring the influences of implementation intention on information security behaviors

    Liao, G. Y. & Wang, C. M., 2011, 17th Americas Conference on Information Systems 2011, AMCIS 2011. p. 4153-4163 11 p. (17th Americas Conference on Information Systems 2011, AMCIS 2011; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • RSA with user chosen and changeable password

    Hwang, J. J., Liao, G. Y. & Hsu, Y. C., 2011, 2011 International Conference on Information Science and Applications, ICISA 2011. 5772312. (2011 International Conference on Information Science and Applications, ICISA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2010

    An advanced approach for vehicle routing problem with time windows

    Lee, C. Y., Lin, S. W., Ying, K. C. & Yang, M. R., 2010, Proceeding - 6th International Conference on Networked Computing and Advanced Information Management, NCM2010. p. 408-411 4 p. 5572066. (Proceeding - 6th International Conference on Networked Computing and Advanced Information Management, NCM 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A power saving scheduling algorithm for multiple MSSs in large-scale IEEE 802.16e environments

    Huang, H. S., Chen, Y. J., Wu, S. L. & Chen, J. J., 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 900-904 5 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Effectiveness of inter-organizational systems in global manufacturing: Evidence from industrial cases in Taiwan

    Huang, Y. T., Leu, J. D. & Huang, L. T., 2010, Proc. of the IADIS Int. Conf. Collaborative Technologies 2010,CT, IADIS Int. Conf. Web Based Communities 2010, Part of the MCCSIS 2010. p. 28-36 9 p. (Proc. of the IADIS Int. Conf. Collaborative Technologies 2010, Proc. of the IADIS Int. Conf. Web Based Communities 2010, Part of the MCCSIS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2009

    A secure anonymous key mechanism for privacy protection in VANET

    Lai, C., Chang, H. & Lu, C. C., 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, ITST 2009. p. 635-640 6 p. 5399278. (2009 9th International Conference on Intelligent Transport Systems Telecommunications, ITST 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Logistics planning of The IC manufacturing industry: A method based on theSAP-APO

    Leu, J. D. & Huang, L. T., 2009, 2009 International Conference on Computers and Industrial Engineering, CIE 2009. p. 760-766 7 p. 5223852. (2009 International Conference on Computers and Industrial Engineering, CIE 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Risk assessment on instrumentation and control network security management system for nuclear power plants

    Chen, Y. J., Liao, G. Y. & Cheng, T. C., 2009, Proceedings - 43rd Annual 2009 International Carnahan Conference on Security Technology, ICCST 2009. p. 261-264 4 p. 5335526. (Proceedings - International Carnahan Conference on Security Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2008

    Analyzing security of RFID tag reading protocols based on binary tree traversal

    Liao, G. Y. & Hsieh, H. F., 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 1199-1201 3 p. 4780842. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A simulation-based rolling forecast approach for the selection of ordering strategy in the supply chain

    Huang, L., Farn, C. & Hsieh, I., 2008, 38th International Conference on Computers and Industrial Engineering 2008. p. 1115-1122 8 p. (38th International Conference on Computers and Industrial Engineering 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • A study on the security of RFID with enhancing privacy protection

    Chang, H. K. C., Yen, L. C. & Huang, W. C., 2008, 7th European Conference on Information Warfare and Security 2008, ECIW 2008. p. 35-40 6 p. (7th European Conference on Information Warfare and Security 2008, ECIW 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Location-aware tour guide systems in museum

    Tsai, C. Y., Chou, S. Y. & Lin, S. W., 2008, Collaborative Product and Service Life Cycle Management for a Sustainable World - Proceedings of the 15th ISPE International Conference on Concurrent Engineering, CE 2008. Springer-Verlag London Ltd, p. 349-356 8 p. (Collaborative Product and Service Life Cycle Management for a Sustainable World - Proceedings of the 15th ISPE International Conference on Concurrent Engineering, CE 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Location determination of mobile device for indoor WLAN application using neural network

    Tsai, C. Y., Chou, S. Y., Lin, S. W. & Wang, W. H., 2008, 4th International Conference on Intelligent Environments (IE 08). 541 CP ed. (IET Conference Publications; no. 541 CP).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2006

    Bisection algorithms for solving A-fuzzy measures

    Wang, J. C. & Chen, T. Y., 2006, Proceedings of the 9th Joint Conference on Information Sciences, JCIS 2006. FTT-3. (Proceedings of the 9th Joint Conference on Information Sciences, JCIS 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • Reducing positive leniency in fuzzy measure ratings

    Chen, T. Y. & Wang, J. C., 2006, Proceedings of the 9th Joint Conference on Information Sciences, JCIS 2006. FTT-33. (Proceedings of the 9th Joint Conference on Information Sciences, JCIS 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2005

    An efficient and secure micro-payment protocol for mobile commerce

    Chen, Y. J., Hsieh, W. C., Chen, W. & Meng, Z. Y., 2005, WMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings. p. 7-12 6 p. (WMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Online gaming cheating and security issue

    Chen, Y. C., Hwang, J. J., Song, R., Yee, G. & Korba, L., 2005, Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing. Selvaraj, H. & Srimani, P. K. (eds.). p. 518-523 6 p. (International Conference on Information Technology: Coding and Computing, ITCC; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Secured key exchange protocol in wireless mobile ad hoc networks

    Liaw, S. H., Su, P. C., Chang, H. K. C., Lu, E. H. & Pon, S. F., 2005, 39th Annual 2005 International Carnahan Conference on Security Technology, CCST'05. 1594839. (Proceedings - International Carnahan Conference on Security Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • 2003

    Establishing chain of evidence as a base for non-repudiation services

    Hwang, J. J., Shao, M. H. & Wu, S., 2003, Security and Privacy in the age of Uncertainty - IFIP TC11 18th International Conference on Information Security, SEC 2003. Springer New York LLC, p. 49-60 12 p. (IFIP Advances in Information and Communication Technology; vol. 122).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations