How to detect a compromised SDN switch CLL PW Chi, CT Kuo, JW Guo Network Softwarization (NetSoft), 2015 1st IEEE Conference on, 1-6, 2015 | 115* | 2015 |
Audit-free cloud storage via deniable attribute-based encryption PW Chi, CL Lei IEEE Transactions on Cloud Computing 6 (2), 414-427, 2015 | 74 | 2015 |
Efficient NFV deployment in data center networks PW Chi, YC Huang, CL Lei 2015 IEEE International Conference on Communications (ICC), 5290-5295, 2015 | 52 | 2015 |
SDUDP: A reliable UDP-Based transmission protocol over SDN MH Wang, LW Chen, PW Chi, CL Lei IEEE Access 5, 5904-5916, 2017 | 43 | 2017 |
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service CT Kuo, PW Chi, V Chang, CL Lei Future Generation Computer Systems 86, 1424-1436, 2018 | 33 | 2018 |
OpenE2EQoS: Meter-based method for end-to-end QoS of multimedia services over SDN TN Lin, YM Hsu, SY Kao, PW Chi 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and …, 2016 | 20 | 2016 |
Apparatus, method, and computer readable medium for transmitting data via a plurality of network interfaces PW Chi, YH Lin US Patent 7,957,358, 2011 | 20 | 2011 |
A privacy-preserving zero-knowledge proof for blockchain PW Chi, YH Lu, A Guan Ieee Access, 2023 | 15 | 2023 |
An AMI threat detection mechanism based on SDN networks PW Chi, CT Kuo, HM Ruan, SJ Chen, CL Lei Proc. SECURWARE, 208-211, 2014 | 14 | 2014 |
A prevention approach to scrambling attacks in WiMAX networks PW Chi, CL Lei 2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009 | 12 | 2009 |
SDN storage: A stream-based storage system over software-defined networks MH Wang, PW Chi, JW Guo, CL Lei 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016 | 10 | 2016 |
Give me a broadcast-free network PW Chi, YC Huang, JW Guo, CL Lei 2014 IEEE Global Communications Conference, 1968-1973, 2014 | 9 | 2014 |
Multi-level privacy preserving k-anonymity JH Weng, PW Chi 2021 16th Asia Joint Conference on Information Security (AsiaJCIS), 61-67, 2021 | 7 | 2021 |
How to hide the real receiver under the cover receiver: Cp-abe with policy deniability PW Chi, MH Wang, HJ Shiu IEEE Access 8, 89866-89881, 2020 | 7 | 2020 |
Do not ask me what I am looking for: Index deniable encryption PW Chi, YL Chang Future Generation Computer Systems 122, 28-39, 2021 | 5 | 2021 |
Understanding potential cyber-armies in elections: a study of Taiwan MH Wang, NL Nguyen, S Dai, PW Chi, CR Dow Sustainability 12 (6), 2248, 2020 | 5 | 2020 |
A lightweight compound defense framework against injection attacks in iiot PW Chi, MH Wang 2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018 | 5 | 2018 |
SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-Enabled Networks PW Chi, MH Wang, JW Guo, CL Lei 2016 International Computer Symposium (ICS), 148-153, 2016 | 5 | 2016 |
Building a privacy-preserving blockchain-based bidding system: A crypto approach HH Chen, PW Chi, YH Chuang IEEE Access 10, 13367-13378, 2022 | 4 | 2022 |
SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking PW Chi, MH Wang, Y Zheng 2020 International Computer Symposium (ICS), 397-402, 2020 | 3 | 2020 |