
Cheng-Chi Lee- Fu Jen Catholic University
Cheng-Chi Lee
- Fu Jen Catholic University
About
179
Publications
32,241
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,487
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (179)
The rapid proliferation of Internet of Things (IoT) technology has transformed modern industries, introducing significant security vulnerabilities that necessitate practical intrusion detection systems (IDSs). While random forest (RF) has shown promise for anomaly detection in IoT networks, its inherent bias toward majority classes in imbalanced da...
The Internet of Vehicles (IoV) has emerged as a promising application capable of enhancing transportation efficiency and providing a variety of mobile services to drivers. This IoV enables real‐time data sharing among vehicles and infrastructure, allowing for better traffic flow, reduced congestion, and optimized routes. By providing vehicles with...
This paper proposes and engages the Levenberg–Marquardt algorithm method via regression to optimally model and predict real‐time signal strength values acquired via telecom software investigation tools in LTE cellular networks. To further improve the Levenberg–Marquardt method, which is sometimes prone to parameter evaporation on high dimensional d...
This paper proposes and engages the Levenberg-Marquardt algorithm method via regression to optimally model and predict real-time signal strength values acquired via telecom software investigation tools in LTE cellular networks. To further improve the Levenberg-Marquardt method, which is sometimes prone to parameter evaporation on high dimensional d...
Recent advancements in machine learning algorithms have facilitated the rapid use of blockchain technology and the Internet of Things in the design and development of smart cities [...]
One of the notable applications of quantum computing is in cryptography. However, quantum apparatus is still costly at this time. In practicality, some users may not have full quantum capabilities. Boyer et al. in 2007 proffered a semi-quantum key distribution scheme, in which one participant is a quantum user, and the other participant is a classi...
The current educational system relies heavily on manual grading, posing challenges such as delayed feedback and grading inaccuracies. Automated grading tools (AGTs) offer solutions but come with limitations. To address this, "GRAD-AI" is introduced, an advanced AGT that combines automation with teacher involvement for precise grading, timely feedba...
Mobile sequencing enables a rapid process of determining the order of nucleotides in deoxyribonucleic acid (DNA). The process is carried out by portable sequencers, which are the main element in the internet of living things (IoLT). This approach assists in obtaining rapid biological insights at the source regardless of the patient’s geographical l...
The significant issue is designing an intrusion detection and prevention system to enhance Mobile Adhoc Network security while considering the detection rate, false positive Rate, energy efficiency, and delay. Most prevailing technologies have struggled to attain accurate detection rates with minimal execution time and energy consumption. This pape...
Recently, there has been research on using cognitive radio to increase the effectiveness of spectrum resources. Secondary users (SUs) sense, identify, and access frequency bands presently unoccupied by primary users (PUs). Indeed, the precise communication methods of PUs remain consistently unknown to SUs. Designing an appropriate system for spectr...
The widespread proliferation of social media platforms in the 21st century has undoubtedly brought about a significant shift in how individuals establish connections. However, it is essential to acknowledge that this technological innovation has also given rise to negative repercussions. The proliferation of online abuse, harassment, cyberbullying,...
This study presents new fuzzy adaptations of Ostrowski’s integral inequalities through a novel class of convex fuzzy-valued mappings defined over a harmonic convex set, avoiding the use of the Sugeno integral. These innovative inequalities generalize the recently developed interval forms of real-valued Ostrowski inequalities. Their formulations inc...
Mobile technology is developing significantly. Mobile phone technologies have been integrated into the healthcare industry to help medical practitioners. Typically, computer vision models focus on image detection and classification issues. MobileNetV2 is a computer vision model that performs well on mobile devices, but it requires cloud services to...
Due to its significant influence on numerous areas of mathematics and practical sciences, the theory of integral inequality has attracted a lot of interest. Convexity has undergone several improvements, generalizations, and extensions over time in an effort to produce more accurate variations of known findings. This article’s main goal is to introd...
Recent technological development has facilitated the deployment of different Mobile Broadband Cellular Network
Systems (MBCNS), such as Long Term Evolution (LTE) and 5G New Radio (NR), globally. This development aims at satisfying the
ever-data-hungry multimedia applications to guarantee good quality of service for mobile subscribers. One way mobil...
A new network architecture called the Software-Defined Network (SDN) gives next-generation networks a more flexible and efficiently controlled network architecture. Using the programmable central controller design, network supervisors may easily supervise and manage the entire infrastructure. However, due to its centralized structure, SDN has been...
Recent technological development has facilitated the deployment of different Mobile Broadband Cellular Network Systems (MBCNS), such as Long Term Evolution (LTE) and 5G New Radio (NR), globally. This development aims at satisfying the ever-data-hungry multimedia applications to guarantee good quality of service for mobile subscribers. One way mobil...
The advancement of 6G networks is driven by the need for customer-centric communication and network control, particularly in applications such as intelligent transport systems. These applications rely on outdoor communication in extremely high-frequency (EHF) bands, including millimeter wave (mmWave) frequencies exceeding 30 GHz. However, EHF signa...
The symmetric function class interacts heavily with other types of functions. One of these is the convex function class, which is strongly related to symmetry theory. In this study, we define a novel class of convex mappings on planes using a fuzzy inclusion relation, known as coordinated up and down convex fuzzy-number-valued mapping. Several new...
The rapid development of digital data sharing has made information security a crucial concern in data communication. The information security system heavily relies on encryption methods. These algorithms employ strategies to increase data secrecy and privacy by obscuring the information, which only those parties who have the accompanying key can de...
Mobile broadband (MBB) services in Lagos, Nigeria are marred with poor signal quality and inconsistent user experience, which can result in frustrated end-users and lost revenue for service providers. With the introduction of 5G, it is becoming more necessary for 4G LTE users to find ways of maximizing the technology while they await the installati...
One of the most frequently used signaling techniques for initiating, sustaining, and dismissing sessions on the internet is a session initiation protocol (SIP). Currently, SIPs are gaining widespread applications in the human-centered Internet of Things (HC-IoT) domain. In HC-IoT environments, sensitive user data are transmitted over open communica...
Mobile edge computing (MEC) supported by non-orthogonal multiple access (NOMA) has recently gained a lot of interest due to its improved ability to lessen power consumption and MEC offload delay. In recent decades, the need for wireless communications has increased tremendously. Fifth-generation (5G) communications will soon be widely used and offe...
A keylogger is a type of spyware that records keystrokes from the user’s keyboard to steal confidential information. The problems with most keylogger methods are the lack of simulated keylogger patterns, the failure to maintain a database of current keylogger attack signatures, and the selection of an appropriate threshold value for keylogger detec...
The application of the Internet of Medical Things (IoMT) in medical systems has brought much ease in discharging healthcare services by medical practitioners. However, the security and privacy preservation of critical user data remain the reason the technology has not yet been fully maximized. Undoubtedly, a secure IoMT model that preserves individ...
With less human involvement, the Industrial Internet of Things (IIoT) connects billions of heterogeneous and self-organized smart sensors and devices. Recently, IIoT-based technologies are now widely employed to enhance the user experience across numerous application domains. However, heterogeneity in the node source poses security concerns affecti...
This review provides a detailed synthesis of various in-situ, remote sensing, and machine learning approaches to estimate soil moisture. Bibliometric analysis of the published literature on soil moisture shows that Time-Domain Reflectometry (TDR) is the most widely used in-situ instrument, while remote sensing is the most preferred application, and...
Considering the ever-growing demand for an efficient method of deductive mining and extrapolative analysis of large-scale dimensional datasets, it is very critical to explore advanced machine learning models and algorithms that can reliably meet the demands of modern cellular networks, satisfying computational efficiency and high precision requirem...
The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their communication has spurred various researchers to come up with various WSN models. Prime among the methods for extending the life span of WSNs is the clustering of Wireless Sensors (WS) which reduces the workload of WS and thereby reduces its power consumption. Howe...
This paper introduces 5GT-GAN, a novel approach leveraging generative adversarial networks (GANs) to create synthetic mobile Internet traffic data, particularly tailored to smart city applications. Given the challenges of data scarcity and privacy concerns in the context of 5G, generating synthetic data becomes a crucial aspect for effectively depl...
Benchmarking different optimization algorithms is tasky, particularly for network-based cellular communication systems. The design and management process of these systems involves
many stochastic variables and complex design parameters that demand an unbiased estimation and analysis. Though several optimization algorithms exist for different parame...
The wide use of internet-enabled devices has not left the healthcare sector untouched. The health status of each individual is being monitored irrespective of his/her medical conditions. The advent of such medical devices is beneficial not only for patients but also for physicians, hospitals, and insurance companies. It makes healthcare fast, relia...
The privacy of individuals and entire countries is currently threatened by the widespread use of face-swapping DeepFake models, which result in a sizable number of fake videos that seem extraordinarily genuine. Because DeepFake production tools have advanced so much and since so many researchers and businesses are interested in testing their limits...
The accurate and reliable predictive estimation of signal attenuation loss is of prime importance in radio resource management. During wireless network design and planning, a reliable path loss model is required for optimal predictive estimation of the received signal strength, coverage, quality, and signal interference-to-noise ratio. A set of tre...
In recent years, due to the rapid development of Internet of things (IoTs), various physical things (objects) in IoTs are smart enough to make their own decisions without the involvement of humans. The smart devices embedded in a drone can sense, collect, and transmit real-time data back to the controller from a designated environment via wireless...
In the field of software development, the efficient prioritizing of software risks was essential and play significant roles. However, finding a viable solution to this issue is a difficult challenge. The software developers have to adhere strictly to risk management practice because each phase of SDLC is faced with its individual type of risk rathe...
Modern cellular communication networks are already being perturbed by large and steadily increasing mobile subscribers in high demand for better service quality. To constantly and reliably deploy and optimally manage such mobile cellular networks, the radio signal attenuation loss between the path lengths of a base transmitter and the mobile statio...
The rapid growth in the number of vehicles has led to traffic congestion, pollution, and delays in logistic transportation in metropolitan areas. IoT has been an emerging innovation, moving the universe towards automated processes and intelligent management systems. This is a critical contribution to automation and smart civilizations. Effective an...
Atmospheric impairment-induced attenuation is the prominent source of signal degradation in radio wave communication channels. The computation-based modeling of radio wave attenuation over the atmosphere is the stepwise application of relevant radio propagation models, data, and procedures to effectively and prognostically estimate the losses of th...
Cassava is a crucial food and nutrition security crop cultivated by small-scale farmers and it can survive in a brutal environment. It is a significant source of carbohydrates in African countries. Sometimes, Cassava crops can be infected by leaf diseases, affecting the overall production and reducing farmers’ income. The existing Cassava disease r...
Up till now, numerous authentication and key agreement schemes have been proposed for ubiquitous networks. Recently, Arshad and Rasoolzadegan also proposed an authentication and key agreement scheme for ubiquitous network with user anonymity. However, we determined that Arshad and Rasoolzadegan’s scheme has the following flaws: (1) the login phase...
An innovative image enhancement and feature extraction technique that is based on the modified sigmoid function and two-dimensional DCT has been developed. The proposed technique uses a modified sigmoid function that accommodates the original microscopic input image characteristics. A novel block-based input value coupled with the modified sigmoid...
The birth of mass production started in the early 1900s. The manufacturing industries were transformed from mechanization to digitalization with the help of Information and Communication Technology (ICT). Now, the advancement of ICT and the Internet of Things has enabled smart manufacturing or Industry 4.0. Industry 4.0 refers to the various techno...
Fog-driven IoT architecture located between IoT devices and the centralized cloud infrastructure is introduced to extend computing, storage and network services to the edge of the Internet and therefore resources and services of the fog nodes are available and are closer to the end user and end device for providing mobility, low latency and locatio...
In the current medical insurance claims process, there are problems of low efficiency and complex services. When a patient applies for medical insurance claims, he/she must go to the hospital to apply for a diagnosis certificate and receipt and then send the relevant application documents to the insurance company. The patient will not receive compe...
Telecare medicine information system (TMIS) is recognized as an important tool for improving the quality and protection of healthcare services. In addition to protecting the privacy of patients, many authentication techniques are being introduced in TMIS. After investigations, it is observed that many authentication techniques have security breache...
In healthcare services, telecare medicine information systems (TMIS) is the viable solution offered currently. Moreover, to provide best security to the TMIS, it attracted the various researchers to investigate the security challenges in TMIS. Subsequently, the security of TMIS is improving but the application becoming widespread hence needs robust...
Recent advancements in internet technology and the infrastructure have attracted more people and organizations to do everything online. Internet technologies have provided amazing and smooth ease for electronic sales and purchases. However, many people have refused to use these internet technologies in electronic purchases because of unstable and i...
Wireless sensor networks (WSNs) are the backbones of numerous real-time monitoring systems that are applied to serve many different parts of our everyday lives including traffic management, telecare, pollution control, military application, among others. In most cases, WSN systems involve exchanges of sensitive/private data between the sensor nodes...
[This corrects the article DOI: 10.1371/journal.pone.0232277.].
Public key cryptosystems more recently developed have to be strong against newer and more advanced forms of attacks. The security protection of a public key cryptosystem relies heavily on the design of the public key. The key authentication procedure is one of the easiest and most advantageous authentication mechanisms used over insecure networks a...
In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play crucial roles in these IoT applications. Researche...
Wireless sensor network (WSN) is a network system that involves spatially distributed devices such as wireless sensor nodes. As the data collected by the sensor nodes and transmitted through WSNs are mostly sensitive, confidential, or personal data, secure information transmission is a critical challenge, and one of the most significant security re...
Cloud computing technologies have been prospering in recent years and have opened an avenue for a wide variety of forms of adaptable data sharing. Taking advantage of these state‐of‐the‐art innovations, the cloud storage data owner must, however, use a suitable identity‐based cryptographic mechanism to ensure the safety prerequisites while sharing...
Mobile technologies are capable of offering individual level health care services to users. Mobile Healthcare (m-Healthcare) frameworks, which feature smartphone (SP) utilizations of ubiquitous computing made possible by applying wireless Body Sensor Networks (BSNs), have been introduced recently to provide SP clients with health condition monitori...
In recent years, due to the rapid development of information techniques and network technologies, more and more medical documents have been replaced by electronic files for sharing and transmitting in real time. However, medical data transmitted over public communication channels may suffer from security attacks and privacy threats. Blockchain tech...
The advancement of the cloud storage technology opens up a wide range of possibilities for adaptable data sharing. When sharing data to an extensive number of users with fuzzy identities, the data proprietor must use an appropriate identity-based encryption technique that satisfies both efficiency and security prerequisites. Identity-based encrypti...
In recent years, Radio Frequency Identification (RFID) applications of various kinds have been blooming. However, along with the stunning advancement have come all sorts of security and privacy issues, for RFID tags oftentimes store private data and so the permission to read a tag or any other kind of access needs to be carefully controlled. Theref...
Recently, the chaos theory has been dealt with as a decent approach to reducing the computational complexity of a cryptographic technique while fulfilling the security necessities. In an ID-based cryptographic system where public keys are distributed to individual users, the application of chaotic maps allows users to set their network addresses or...
Radio Frequency Identification (RFID) is a wireless communication technology nowadays widely used in almost every aspect of our lives including healthcare, logistics and supply chain management, inventory tracking, race timing, access control, toll collection, and a lot more. In RFID systems, a tag usually stores private or sensitive information, a...
The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., enables one to send a trapdoor containing a encrypted keyword to query data without revealing the keyword. In Boneh et al.’s design, the trapdoor has to be transferred through a secure channel, which is both costly and inefficient. Baek et al. then proposed an e...
As the internet makes data transmission easy and fast, digital contents of all kinds can be spread all over the world at a shocking speed. Along with such amazing swiftness and convenience, however, modern computer and communication technologies have also brought various kinds of issues associated with digital rights management. Digital rights mana...
As wireless sensor networks (WSN) and Internet of things (IoT) have rapidly developed over recent years, the smart vehicular system is designed in the environment of WSN to provide vehicle related applications such as traffic safety for drivers, controlling traffic signal, broadcasting traffic information and speed monitoring etc. Recently, Mohit e...
Due to the advancement of convenience technology for people, the era of Internet of Things (IoT) has going on thriving, which has brought more and more attention to Radio Frequency Identification (RFID), as RFID is key to the sensor technology in IoT. As promoting of IoT, kind of protocols combine cloud to store authentication data and perform heav...
Digital rights management (DRM) systems are access control technologies used to restrict the use, modification, and distribution of protected digital contents. The success of a DRM system relies heavily on a good user authentication mechanism, and user identity verification through biometric information check is a great idea in that the biological...
Three-party authenticated key exchange (3PAKE) protocol allows two communication users to authenticate each other and to establish a secure common session key with the help of a trusted remote server. Recently, Farash and Attari propose an efficient and secure 3PAKE protocol based on Chebyshev chaotic maps and their protocol is supported by the for...
With the rapid development of information science and network technology, Internet has become an important platform for the dissemination of digital content, which can be easily copied and distributed through the Internet. Although convenience is increased, it causes significant damage to authors of digital content. Digital rights management system...
The proxy blind signature scheme (PBSS), allows the authorized proxy signer to use his proxy private key to create a legal blind signature on behalf of original signer. Recently, Alghazzawi, Salim and Hasan (A-S-H), presented the elliptic curve cryptography (ECC) based PBSS. However, we found their scheme is vulnerable to a linkability attack, whic...
The use of radio frequency identification (RFID) in Internet of things (IoT) has led to a significant progress in numerous intelligent devices. However, due to its restrictions on computation ability, storage space and battery capacity, RFID-based IoT system has to confront with various security and efficiency challenges. Recently, a lightweight RF...
Secure three party node authentication and key establishment scheme for data exchange in the Internet of Things (IoT) applications enables two resourceconstrained nodes to establish a secure end-to-end communication channel with the help of a data server. Since node in IoT have constraints on resources such as power, memory space and computation ab...
With the rapid development of wireless communication technologies, mobile networks will enable users to use personal mobile devices to access various network information services at anytime and anyplace. Recently, Lu et al. proposed a dynamic ID based mutual authentication and key agreement scheme using elliptic curve cryptography (ECC) which attem...
The leader of the new generation of technology, namely the Internet of Things (IoT), is now already an indispensable part of many people’s lives. In this research, we have analyzed the main communication models of IoT in terms of functional conformity and classified those models into two kinds. Then, for each of the two kinds, we have developed a n...
Certificate-based cryptography (CBC) was initially instigated during Eurocrypt 2003. A CBC scheme combines several merits of the public key cryptography (PKC) and identity-based cryptography (IBC) schemes while eliminating the problems inherited from both, i.e., the key management problem in PKC and the key escrow problem in IBC. In this paper, we...
The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not change the fact that the one-and-only Internet still remains open and unprotected. Therefore, for the sake of in...
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monit...
Recently, user authentication schemes for mobile devices have become increasingly critical. Because of wide use, numerous services for mobile devices are provided, and will continue to be required in the future. Occasionally, users must log on to a server to obtain services, and the server must authenticate that user. Because device resources, such...
Multi-proxy signature (MPS) scheme makes a very important branch of the proxy signature scheme family, as they are applicable in many practical situations. The MPS scheme enables the actual signer to pass on their signing authority to plural proxy signers, where each proxy/delegated signer should contribute together to create a genuine MPS to make...
Nowadays users can access various online services and resources from distributed information systems remotely via Internet or other public networks. However, remote online systems are vulnerable to many security attacks due to they are built on public networks. Therefore it is necessary to design an authentication scheme for securing network commun...
Recently, Wu et al. proposed a secure channel free searchable encryption (SCF-PEKS) scheme which not only can guard against keyword guessing and record disclosure attacks but also can provide much better performance than other related scheme for shareable EMRs. However, in this paper, we demonstrated that Wu et al.’s SCF-PEKS scheme has some design...
Zhang and Xiao presented a multi-signature scheme for a specified group of verifiers and showed that forging their signature is mathematically equivalent to forge Harn's signature. However, Zhang and Xiao's scheme is not secure against the rogue-key attack. In this paper, we show how to mount a rogue-key attack on Zhang and Xiao's scheme and propos...
An algorithm that a user has authenticated over remote devices should be designed to consider the limitations of computation and lower power in a wireless sensor networks. Lamport first proposed a one-time password authentication scheme which the password was different in each transaction. In this paper, according to the Lamport's concept we propos...
Password authenticated key agreement protocol allows users to use an easy-to-remember password and establish a secure session key with the help of a trusted server. Recently, Farash and Attari proposed an improved key agreement protocol based on chaotic maps and they pointed out that Gong et al.'s protocol is vulnerable to stolenverifier attack and...
In the last decade, the technology of Radio Frequency Identification (RFID) has boomed in the wireless communication environment. Applications of RFID have matured and reached far into various fields such as smart building, healthcare, supply chain management, etc. However, along with the rapid advancement of RFID systems have come many security is...
VANET (vehicular ad hoc network) is used to create communication networks for vehicles or other roadside devices so that they can quickly share and receive messages. However, VANET belongs to a family of wireless networks, which means that its functions are unsafe. To provide safe communication channels, key-agreements technology can be introduced...
As cloud technologies thrive, researches in the field of cloud storage have switched their focus from encryption-decryption techniques that help data owners protect their privacy and data confidentiality to the application of searching techniques on encrypted data while maintaining high level security and privacy of outsource data. To begin with, S...
Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login se...
Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves t...
Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients’ health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit...
Handling huge loads of data that are subject to change within every second, cloud storage services are facing the challenge of properly dealing with the problem of user legality management while making sure that the services are conveniently user-friendly. Ideally, the concept of attribute-based encryption should be applied, meaning that data shoul...
The elliptic curve digital signature algorithm (ECDSA) is the first successful algorithm based on elliptic curve and it is elliptic curve analogue of digital signature algorithm (DSA). The security of this algorithm relies on intractability of elliptic curve discrete logarithm problem (ECDLP). This algorithm has been also used for low computational...
Remote user authentication has been widely used in the integrated electronic patient record information system (EPRIS) to protect the security and integrity of communication sessions between the login user and the medical server. Recently, Wen 17 presented the user authentication and user anonymity scheme based on the quadratic residues and claimed...
With the growing popularity of network technologies, cloud-based health care applications are becoming an essential part of telecare medical information systems have been widely studied in recent years. To protect patient privacy and restrict the access of precious services for legal privileged participants only, many secure medical data exchange p...
Due to the rapid growth of computer networks and service providing servers, many network environments have been becoming multi-server architecture and various multiserver authentication protocols have been proposed. In such an environment, a user can obtain different network services from multiple network servers without repeating registration to e...
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the...
Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based...