著作 Publications


期刊論文 Journal paper

  1. Yunjhen Su, Chin-Yu Sun, Wen-Kuan Chiu, Yi-No Kang, Chiehfeng Chen, “Patient Decision Aids for Breast Cancer Reconstruction: A Systematic Review and Network Meta-Analysis of Randomized Controlled Trials,” Accepted by Plastic and Reconstructive Surgery, January 2024. [SCI]
  2. Chin-Yu Sun, Allen C.-H. Wu, and TingTing Hwang, “A Novel Privacy-Preserving Deep Learning Scheme without a Cryptography Component,” Computers & Electrical Engineering, Vol. 94, pp.1-15, September 2021. [SCI]
  3. Chin-Yu Sun, Hsiao-Ling Wu, Hung-Min Sun, and TingTing Hwang, “A New Attack to Self-Certified Digital Signature for E-commerce Applications,” Journal of Information Science and Engineering, Vol. 37 No. 6, pp. 1449-1466, June 2021. [SCI]
  4. Chin-Chen Chang, Hsiao-Ling Wu, and Chin-Yu Sun, “Notes on “Secure authentication scheme for IoT and cloud servers”,” Pervasive and Mobile Computing, Vol. 38, pp.275-278, July 2017. [SCI]
  5. Yanjun Liu, Chin-Chen Chang, and Chin-Yu Sun, “Notes on “An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics”,” International Journal of Network Security, Vol.18, No.5, September 2016, pp.997-1000.
  6. Hsiao-Ling Wu, Chin-Chen Chang, and Chin-Yu Sun, “A secure authentication scheme with provable correctness for pay‐TV systems,” Security and Communication Networks, Vol.9, No. 11, pp.1577-1588, February 2016. [SCI]
  7. Chin-Yu Sun and Ching-Chun Chang, “Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” International Journal of Network Security, Vol.18, No.3, pp.594-596, May 2016.
  8. Chin-Chen Chang, Chin-Yu Sun, and Shih-Chang Chang, “A Strong RSA-based and Certificateless-based Signature Scheme,” International Journal of Network Security, Vol.18, No.2, pp.201-208, March 2016.
  9. Yanjun Liu, Chin-Chen Chang, and Chin-Yu Sun, “A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing,” Journal of Information Hiding and Multimedia Signal Processing, Vol.7, No.4, July 2016, pp.741-753.
  10. Yanjun Liu, Chin-Chen Chang, and Chin-Yu Sun, “A Secure and Efficient Scheme for Digital Gift Certificates,” Journal of Information Hiding and Multimedia Signal Processing, Vol.6, No.3, May 2015, pp.416-429.
  11. Chin-Chen Chang, Chin-Yu Sun, and Ting-Fang Cheng, “A dependable storage service system in cloud environment,” Security and Communication Networks, Vol.8, No. 4, pp.574-588, March 2015. [SCI]
  12. Chin-Chen Chang, Yeh-Chieh Chou, and Chin-Yu Sun, “Novel and practical scheme based on secret sharing for laptop data protection,” IET Information Security, Vol.9, No.2, pp.100-107, February 2015. [SCI]
  13. Chin-Chen Chang, Chin-Yu Sun, and Shih-Chang Chang, “Practical secure and high efficient authentication scheme in global mobility networks,” Journal of Internet Technology, Vol.15, No.7, pp.1091-1100, December 2014. [SCI]
  14. Ching-Chun Chang and Chin-Yu Sun, “A Secure and Efficient Authentication Scheme for E-coupon Systems,” Wireless Personal Communications, Vol.77, No.4, pp.2981-2996, August 2014. [SCI]
  15. Cheng Guo, Chin-Chen Chang, and Chin-Yu Sun, “Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications,” Journal of Information Hiding and Multimedia Signal Processing, Vol.4, No.2, pp.99-109, April 2013.

會議論文 Conference paper

  1. Sheng-Shan Chen, Ren-Hung Hwang*, Chin-Yu Sun, Ying-Dar Lin, and Tun-Wen Pai, “Enhancing Cyber Threat Intelligence with Named Entity Recognition using BERT-CRF,” In Proceedings of IEEE Global Communication Conference, Kuala Lunpur, Malaysia, December 2023.
  2. Yuan-Tai Lin, Chin-Yu Sun*, and TingTing Hwang, “M-parties partitioning: A Secure Dynamic Cache Partitioning by More Than Two Parties,” Accepted by IEEE 36th International System-on-Chip Conference (SOCC 2023) – Design for Secure and Reliable System, June.
  3. Chun-Chieh Tsai, Chin-Yu Sun*, and Shih-Hsuan Yang, “Note on “RAKS: robust authentication and key agreement scheme for satellite infrastructure”,” Accepted by IEEE ICCE-TW 2023, May.
  4. Sheng-Shan Chen, Tun-Wen Pai, and Chin-Yu Sun*, “Applying the Diamond Model of Intrusion Analysis with Generative Pre-trained Transformer 3,” Accepted by IEEE ICCE-TW 2023, May.
  5. Sheng-Shan Chen, Chin-Yu Sun, and Tun-Wen Pai*, “Using Machine Learning for Efficient Smishing Detection,” Accepted by IEEE ICCE-TW 2023, May.
  6. Chin-Chen Chang and Chin-Yu Sun, “Polynomial-based secret sharing scheme based on the absolute moment block truncation coding technique,” 2014 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 485-488, Kitakyushu, Japan. August 2014.

Pending

  1. Sheng-Shan Chen, Tun-Wen Pai, and Chin-Yu Sun*, “Enhance Cyber Threat Intelligence with Weighted Similarity Method for Healthcare Security,” submitted to Computers & Security, September.
  2. Tzu-Yi Li, Han-Xuan Huang, Kuang-Ming Chang, and Chin-Yu Sun*, “A Novel Detection Method for Precise SQL Injection Attack Using Generative Adversarial Networks,” prepared for submission to Computers & Security, 2023.
  3. Han-Xuan Huang, Tzu-Yi Li, Sheng-Shan Chen, Kuang-Ming Chang, and Chin-Yu Sun*, “Security Challenges in Online Judges: Understanding and Mitigating CCA Attacks,” prepared for submission to IEEE Transactions on Network and Service Management, 2023.

Back To Top
error: Content is protected !!