Po-Wen Chi
National Taiwan University
H-index: 10
Asia-Taiwan
Top articles of Po-Wen Chi
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Secure Collaborative Computing for Linear Regression | Applied Sciences | Albert Guan Chun-Hung Lin Po-Wen Chi | 2023/12/26 |
An SDN-Driven Reliable Transmission Architecture for Enhancing Real-Time Video Streaming Quality | IEEE MultiMedia | Ming-Hung Wang Ting-Shen Hsieh Yu-Yao Tseng Po-Wen Chi | 2023/10/24 |
A Revocation Key-based Approach Towards Efficient Federated Unlearning | Rui-Zhen Xu Sheng-Yi Hong Po-Wen Chi Ming-Hung Wang | 2023/8/15 | |
Privacy Preserving Provable Data Possession: A FHE-based Hash Approach | Sheng-Yi Hong Rui-Zhen Xu Po-Wen Chi Albert Guan | 2023/8/15 | |
A privacy-preserving zero-knowledge proof for blockchain | IEEE Access | Po-Wen Chi Yun-Hsiu Lu Albert Guan | 2023/8/7 |
LED: Learnable Encryption with Deniability | Zhe-Wei Lin Tzu-Hung Liu Po-Wen Chi | 2022/12/15 | |
A LWE-Based Receiver-Deniable Encryption Scheme | Po-Wen Chi Ming-Hung Wang Yun-Hsin Chuang | 2022/11/30 | |
SandboxNet: A Learning-Based Malicious Application Detection Framework in SDN Networks. | Journal of Information Science & Engineering | Po-Wen Chi Yu Zheng Wei-Yang Chang Ming-Hung Wang | 2022/11/1 |
Building a privacy-preserving blockchain-based bidding system: A crypto approach | IEEE Access | Hsuan-Hao Chen Po-Wen Chi Yun-Hsin Chuang | 2022/1/19 |
Multi-level privacy preserving k-anonymity | Jui-Hung Weng Po-Wen Chi | 2021/8/19 | |
Deniable search of encrypted cloud-storage data | Journal of Information Security and Applications | Po-Wen Chi Ming-Hung Wang | 2021/5/1 |
Do not ask me what I am looking for: Index deniable encryption | Future Generation Computer Systems | Po-Wen Chi Yu-Lun Chang | 2021/9/1 |
SmileJob: A Lightweight Personalized Accompanying System for Home Security | Pin-Yu Lin Yow-Shin Liou Jian-Xing Li Joon-Kui Liew Po-Wen Chi | 2020 | |
SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking | Po-Wen Chi Ming-Hung Wang Yu Zheng | 2020/12/17 | |
How to hide the real receiver under the cover receiver: Cp-abe with policy deniability | IEEE Access | Po-Wen Chi Ming-Hung Wang Hung-Jr Shiu | 2020/5/11 |
Understanding potential cyber-armies in elections: a study of Taiwan | Sustainability | Ming-Hung Wang Nhut-Lam Nguyen Shih-chan Dai Po-Wen Chi Chyi-Ren Dow | 2020/3/13 |