default search action
Chih-Hung Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Chih-Hung Wang, Tzu-Ching Lin, Guanru Chen, Meng-Rui Lee, Joyce Tay, Cheng-Yi Wu, Meng-Che Wu, Holger R. Roth, Dong Yang, Can Zhao, Weichung Wang, Chien-Hua Huang:
Deep Learning-based Diagnosis and Localization of Pneumothorax on Portable Supine Chest X-ray in Intensive and Emergency Medicine: A Retrospective Study. J. Medical Syst. 48(1): 1 (2024) - [j30]Dung-Jang Tsai, Chin Lin, Chin-Sheng Lin, Chia-Cheng Lee, Chih-Hung Wang, Wen-Hui Fang:
Artificial Intelligence-enabled Chest X-ray Classifies Osteoporosis and Identifies Mortality Risk. J. Medical Syst. 48(1): 12 (2024) - [j29]Yuan Hung, Chin Lin, Chin-Sheng Lin, Chiao-Chin Lee, Wen-Hui Fang, Chia-Cheng Lee, Chih-Hung Wang, Dung-Jang Tsai:
Artificial Intelligence-Enabled Electrocardiography Predicts Future Pacemaker Implantation and Adverse Cardiovascular Events. J. Medical Syst. 48(1): 67 (2024) - 2023
- [j28]Ching-Wei Wang, Yu-Ching Lee, Yi-Jia Lin, Chun-Chieh Chang, Aung-Kyaw-Oo Sai, Chih-Hung Wang, Tai-Kuang Chao:
Interpretable attention-based deep learning ensemble for personalized ovarian cancer treatment without manual annotations. Comput. Medical Imaging Graph. 107: 102233 (2023) - [j27]Yu-Hsuan Jamie Chen, Chin-Sheng Lin, Chin Lin, Dung-Jang Tsai, Wen-Hui Fang, Chia-Cheng Lee, Chih-Hung Wang, Sy-Jou Chen:
An AI-Enabled Dynamic Risk Stratification for Emergency Department Patients with ECG and CXR Integration. J. Medical Syst. 47(1): 81 (2023) - [c30]Po-I Lee, Chih-Hung Wang, Wei-Chun Hsiao:
Implementation and Analysis on Efficient Proxy-based Multicast Secure Data Sharing Mechanism with CP-ABE Supporting Outsourcing Decryption in IoT Environment. ICIT 2023: 134-141 - [c29]Tianyu Hwang, Chih-Hung Wang, Holger R. Roth, Dong Yang, Can Zhao, Chien-Hua Huang, Weichung Wang:
Semi-supervised Learning with Contrastive and Topology Losses for Catheter Segmentation and Misplacement Prediction. MIDL 2023: 1239-1253 - 2022
- [j26]Ching-Wei Wang, Cheng-Chang Chang, Yu-Ching Lee, Yi-Jia Lin, Shih-Chang Lo, Po-Chao Hsu, Yi-An Liou, Chih-Hung Wang, Tai-Kuang Chao:
Weakly supervised deep learning for prediction of treatment effectiveness on ovarian cancer from histopathology images. Comput. Medical Imaging Graph. 99: 102093 (2022) - [j25]Kuo-Hao Chang, Yi-Jyun Sun, Chi-An Lai, Li-Der Chen, Chih-Hung Wang, Chung-Jung Chen, Chih-Ming Lin:
Big data analytics energy-saving strategies for air compressors in the semiconductor industry - an empirical study. Int. J. Prod. Res. 60(6): 1782-1794 (2022) - [j24]Chin Lin, Tom Chau, Chin-Sheng Lin, Hung-Sheng Shang, Wen-Hui Fang, Ding-Jie Lee, Chia-Cheng Lee, Shi-Hung Tsai, Chih-Hung Wang, Shih-Hua Lin:
Point-of-care artificial intelligence-enabled ECG for dyskalemia: a retrospective cohort analysis for accuracy and outcome prediction. npj Digit. Medicine 5 (2022) - 2021
- [j23]Chien-Ming Wang, Chih-Hung Wang:
A highly secure three-party authentication key exchange protocol and its application in e-business communication with ECK model. Int. J. Inf. Comput. Secur. 16(3/4): 399-419 (2021) - 2020
- [c28]Chih-Hung Wang, Guo-Cyuan Mao:
Secure and flexible algorithm for outsourcing of bilinear pairings effectively resisting conspiracy. AsiaJCIS 2020: 40-45 - [c27]Mohammad Osaid, Yi-Sin Chen, Chih-Hung Wang, Anirban Sinha, Gwo-Bin Lee:
Parallel Nanoliter Arrays Based Microfluidic Device for Quick Antimicrobial Susceptibility Testing. NEMS 2020: 251-254
2010 – 2019
- 2019
- [c26]Chih-Hung Wang, Kuei-Ching Hsu:
Enhancing Biometric and Mutual Verification in Multi-server Three-factor User Remote Authentication Scheme with Elliptic Curve Cryptography. ICCBN 2019: 46-52 - 2018
- [c25]Chih-Hung Wang:
An Identity-Based Fair Contract Signing Protocol Constructed by the Confirmation Signature. DSC 2018: 1-6 - [c24]Tai-Yuan Tu, Tzung-Her Chen, Ji-Min Yang, Chih-Hung Wang:
A Weighted Threshold Visual Cryptography. ICS 2018: 580-589 - 2017
- [c23]Yu-Chun Hsiao, Chih-Hung Wang, Wen-Bin Lee, Gwo-Bin Lee:
Automatic cell fusion using optically-induced dielectrophoresis and optically-induced localized electric field on a structure-free microfluidic chip. NEMS 2017: 7-10 - 2016
- [j22]Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, Tzung-Her Chen:
On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services. Int. J. Netw. Secur. 18(3): 597-600 (2016) - [c22]Chih-Hung Wang, Chien-Ming Wang:
Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment. AsiaJCIS 2016: 130-135 - [c21]Yu-Dong Ma, Wen-Hsin Chang, Chih-Hung Wang, Shih-Yuan Liu, Wen-Hsiang Yen, Kang Luo, Huey-Ling You, Jiunn-Jong Wu, Mel S. Lee, Gwo-Bin Lee:
A self-driven microfluidic chip through a rapid surface modification of PDMS and its application for digital loop-mediated amplification (LAMP). NEMS 2016: 1-4 - [c20]Ching-Wen Yu, Lien-Yu Hung, Chien-Yu Fu, Chih-Hung Wang, Nai-Jung Chiang, Yu-Chun Wang, Yan-Shen Shan, Gwo-Bin Lee:
An integrated microfluidic system for screening of peptides specific to cholangiocarcinoma (CCA) cancer cell lines using the phage display technology. NEMS 2016: 561-564 - [c19]Wen-Hsin Chang, Sung-Yi Yang, Yi-Cheng Lin, Chih-Hung Wang, Huey-Ling You, Jiunn-Jong Wu, Mel S. Lee, Gwo-Bin Lee:
An integrated microfluidic system for antibiotic resistance gene identification capable differentiating live and dead of vancomycin-resistant enterococcus. NEMS 2016: 591-594 - 2015
- [j21]Tai-Yuan Tu, Chih-Hung Wang:
Reversible data hiding with high payload based on referred frequency for VQ compressed codes index. Signal Process. 108: 278-287 (2015) - [c18]Chih-Hung Wang, Gwo-Bin Lee:
Multiple influenza virulent diagnosis by utilizing a single-aptamer based microfluidic system. NEMS 2015: 20-24 - 2014
- [c17]Chih-Hung Wang, Xuan-Liang Chen:
Design of Hypervisor-based Integrated Intrusion Detection System in Cloud Computing Environment. ICS 2014: 972-981 - 2013
- [j20]Hsiao-Hsien Kang, Chih-Hung Wang, Hsin-Chien Chen, I-Hsun Li, Cheng-Yi Cheng, Ren-Shyan Liu, Wen-Sheng Huang, Chyng-Yann Shiue, Kuo-Hsing Ma:
Investigating the effects of noise-induced hearing loss on serotonin transporters in rat brain using 4-[18F]-ADAM/small animal PET. NeuroImage 75: 262-269 (2013) - [j19]Tzung-Her Chen, Bing-Jian Wang, Tai-Yuan Tu, Chih-Hung Wang:
A security-enhanced key agreement protocol based on chaotic maps. Secur. Commun. Networks 6(1): 108-114 (2013) - [c16]Chih-Hung Wang, Ji-Min Yang:
Adaptive Feature-Weighted Alert Correlation System Applicable in Cloud Environment. AsiaJCIS 2013: 41-47 - 2012
- [c15]Wen-Hsin Chang, Sung-Yi Yang, Chih-Hung Wang, Ping-Chen Li, Fuh-Jyh Jan, Tzong-Yueh Chen, Gwo-Bin Lee:
An optical diagnostic system using isothermal amplification technique for Phalaenopsis orchids. NEMS 2012: 204-207 - 2011
- [j18]Ching Wen Lin, Chih-Hung Wang:
A Selection Model for Auditing Software. Ind. Manag. Data Syst. 111(5): 776-790 (2011) - [c14]Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang:
An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme. ICGEC 2011: 180-183 - [c13]Chih-Hung Wang, Chao Chuan Chen:
Identity-Based Concurrent Signature Scheme with Improved Accountability. IMIS 2011: 514-519 - [c12]Wei-Bin Liang, Chung-Hsien Wu, Chih-Hung Wang, Jhing-Fa Wang:
Interactional Style Detection for Versatile Dialogue Response Using Prosodic and Semantic Features. INTERSPEECH 2011: 1345-1348 - [c11]Yu-Hsin Liu, Kang-Yi Lien, Chih-Hung Wang, Jiunn-Jong Wu, Gwo-Bin Lee:
Rapid isolation and detection of methicillin-resistant Staphylococcus aureus by using a microfluidic system. NEMS 2011: 88-91 - 2010
- [j17]Yuan Yuan, Chun-Yi Lee, Chih-Hung Wang:
A comparison study of polyominoes explorations in a physical and virtual manipulative environment. J. Comput. Assist. Learn. 26(4): 307-316 (2010) - [c10]Chih-Hung Wang, Po-Chin Lee:
A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks. NDT (1) 2010: 273-287
2000 – 2009
- 2009
- [c9]Chih-Hung Wang, Shan Chin:
A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment. HIS (1) 2009: 486-491 - 2007
- [j16]Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzonelih Hwang:
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes. Informatica 18(1): 55-60 (2007) - [j15]Chih-Hung Wang, Chih-Yu Liu:
A new ring signature scheme with signer-admission property. Inf. Sci. 177(3): 747-754 (2007) - [c8]Chih-Hung Wang, Chien-Chang Feng:
A Secure E-cash Scheme with Optional Traceability. Security and Management 2007: 439-445 - 2006
- [j14]Chih-Hung Wang, Chih-Heng Yin, Chieh-His Juan:
How to protect exchanged secrets in the fair exchange protocol with off-line TTP. Comput. Electr. Eng. 32(5): 364-375 (2006) - [j13]Chih-Hung Wang, Chih-Heng Yin:
Practical Implementations of a Non-disclosure Fair Contract Signing Protocol. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 297-309 (2006) - [j12]Chih-Hung Wang:
Practical Constructions to Multiple Designated Confirmer Signatures. J. Inf. Sci. Eng. 22(6): 1389-1407 (2006) - [c7]Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang:
A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. UIC 2006: 998-1007 - 2005
- [j11]Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang:
An iterative modular multiplication algorithm in RNS. Appl. Math. Comput. 171(1): 637-645 (2005) - [j10]Chih-Hung Wang, Yan-Sheng Kuo:
An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability. ACM SIGOPS Oper. Syst. Rev. 39(4): 66-79 (2005) - [c6]Chao-Cheng Lin, Yu-Chuan Li, Ya-Mei Bai, Jen-Yeu Chen, Chien-Yeh Hsu, Chih-Hung Wang, Hung-Wen Chiu, Hsu-Tien Wan:
The Evaluation of Game-based E-learning for Medical Education: a Preliminary Survey. AMIA 2005 - 2004
- [j9]Chih-Hung Wang, Yen-Cheng Chen:
Proxy Confirmation Signatures. Informatica 15(3): 425-437 (2004) - 2003
- [c5]Chih-Hung Wang:
Untraceable Fair Network Payment Protocols with Off-Line TTP. ASIACRYPT 2003: 173-187 - 2000
- [j8]Chih-Hung Wang, Tzonelih Hwang:
(t, m) Threshold and generalized ID-based conference key distribution system. Appl. Math. Comput. 112(2-3): 181-191 (2000) - [j7]Chih-Hung Wang, Tzonelih Hwang:
(T, M) Threshold and Generalized ID-Based Conference Key Distribution System. Cryptologia 24(2): 148-159 (2000)
1990 – 1999
- 1999
- [j6]Jiun-Jang Tsai, Tzonelih Hwang, Chih-Hung Wang:
New generalized group-oriented cryptosystem based on Diffie-Hellman scheme. Comput. Commun. 22(8): 727-729 (1999) - [j5]Chih-Hung Wang, Tzonelih Hwang, Narn-Yih Lee:
Comments on Two Group Signatures. Inf. Process. Lett. 69(2): 95-97 (1999) - [j4]Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang:
The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures. Inf. Process. Lett. 70(2): 79-81 (1999) - 1998
- [j3]Tzonelih Hwang, Chih-Hung Wang:
Arbetrated Unconditionally Secure Authentication Scheme with Multi-Senders. Inf. Process. Lett. 65(4): 189-193 (1998) - [c4]Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang:
On Zhang's Nonrepudiable Proxy Signature Schemes. ACISP 1998: 415-422 - 1997
- [j2]Chih-Hung Wang, Tzonelih Hwang:
Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication. Comput. Secur. 16(4): 339-344 (1997) - [c3]Chih-Hung Wang, Tzonelih Hwang:
Threshold and Generalized DSS Signatures without a Trusted Party. ACSAC 1997: 221-226 - [c2]Tzonelih Hwang, Chih-Hung Wang:
Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders. ISW 1997: 266-272 - 1995
- [j1]Tzonelih Hwang, Narn-Yih Lee, Chih-Hung Wang, Ming-Yung Ko:
On the security of Wu and Yeh's conference key distribution system. Comput. Commun. 18(12): 978-981 (1995) - [c1]Chih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai:
On the Matsumoto and Imai's Human Identification Scheme. EUROCRYPT 1995: 382-392
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint