Follow
Kuan-Ching Li
Kuan-Ching Li
FIET SMIEEE
Verified email at gm.pu.edu.tw - Homepage
Title
Cited by
Cited by
Year
Secure data storage and recovery in industrial blockchain network environments
W Liang, Y Fan, KC Li, D Zhang, JL Gaudiot
IEEE Transactions on Industrial Informatics 16 (10), 6543 - 6552, 2020
1722020
A Secure Fabric Blockchain-based Data Transmission Technique for Industrial Internet-of-Things
W Liang, M Tang, J Long, X Peng, J Xu, KC Li
IEEE Transactions on Industrial Informatics 15 (6), 3582-3592, 2019
1722019
An Industrial Network Intrusion Detection Algorithm based on Multi-Feature Data Clustering Optimization Model
W Liang, KC Li, J Long, X Kui, AY Zomaya
IEEE Transactions on Industrial Informatics 16 (3), 2063-2071, 2020
1442020
Deep reinforcement learning for resource protection and real-time detection in IoT environment
W Liang, W Huang, J Long, K Zhang, KC Li, D Zhang
IEEE Internet of Things Journal 7 (7), 6392-6401, 2020
1332020
Circuit Copyright Blockchain: Blockchain-based Homomorphic Encryption for IP Circuit Protection
W Liang, D Zhang, X Lei, M Tang, KC Li, A Zomaya
IEEE Transactions on Emerging Topics in Computing 9 (3), 1410-1420, 2021
1102021
An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment
S Basu, M Karuppiah, K Selvakumar, KC Li, SK Hafizul Islam, MM Hasan, ...
Future Generation Computer Systems 88, 254-261, 2018
972018
Big data: Algorithms, analytics, and applications
KC Li, H Jiang, LT Yang, A Cuzzocrea
CRC Press, 2015
962015
A secure and scalable storage system for aggregate data in IoT
H Jiang, F Shen, S Chen, KC Li, YS Jeong
Future Generation Computer Systems 49, 133-141, 2015
872015
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System
Mamta, BB Gupta, KC Li, VCM Leung, KE Psannis, S Yamaguchi
IEEE/CAA J. Autom. Sinica 8 (12), 1877-1890, 2021
862021
Energy-aware task consolidation technique for cloud computing
CH Hsu, SC Chen, CC Lee, HY Chang, KC Lai, KC Li, C Rong
2011 IEEE Third International Conference on Cloud Computing Technology andá…, 2011
842011
Scaling up MapReduce-based big data processing on multi-GPU systems
H Jiang, Y Chen, Z Qiao, TH Weng, KC Li
Cluster Computing 18 (1), 369-383, 2015
832015
Data fusion approach for collaborative anomaly intrusion detection in Blockchain-based systems
W Liang, L Xiao, K Zhang, M Tang, D He, KC Li
IEEE Internet of Things Journal 9 (16), 14741-14751, 2022
822022
A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection
D Han, N Pan, KC Li
IEEE Transactions on Dependable and Secure Computing 19 (1), 316-327, 2022
752022
A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles
Z Xu, W Liang, KC Li, J Xu, H Jin
Journal of Parallel and Distributed Computing 149, 29-39, 2021
752021
Internet of Everything: Algorithms, methodologies, technologies and perspectives
B Di Martino, KC Li, LT Yang, A Esposito
Internet of things, 2017
75*2017
Decentralized overlay for federation of enterprise clouds
R Ranjan, R Buyya
Handbook of Research on Scalable Computing Technologies, 191-217, 2010
722010
An intrusion detection approach based on improved deep belief network
Q Tian, D Han, KC Li, X Liu, L Duan, A Castiglione
Applied Intelligence 50, 3162–3178, 2020
692020
A Double PUF-based RFID Identity Authentication Protocol in Service-Centric Internet of Things Environments
W Liang, S Xie, J Long, KC Li, D Zhang, K Li
Information Sciences 503, 129-147, 2019
692019
A Fast Defogging Image Recognition Algorithm based on Bilateral Hybrid Filtering
W Liang, J Long, KC Li, J Xu, N Ma, X Lei
ACM TOMM 17 (2), 42, 2021
642021
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism
X Li, M Miao, H Liu, J Ma, KC Li
Soft Computing 21 (14), 3907-3917, 2017
582017
The system can't perform the operation now. Try again later.
Articles 1–20