BibTeX records: Li-Chin Huang

download as .bib file

@article{DBLP:journals/ijnsec/ChenHLH20,
  author    = {Yi{-}Hui Chen and
               Li{-}Chin Huang and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {Research on the Secure Financial Surveillance Blockchain Systems},
  journal   = {Int. J. Netw. Secur.},
  volume    = {22},
  number    = {4},
  pages     = {708--716},
  year      = {2020},
  url       = {http://ijns.femto.com.tw/contents/ijns-v22-n4/ijns-2020-v22-n4-p708-716.pdf},
  timestamp = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijnsec/ChenHLH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangCH20,
  author    = {Li{-}Chin Huang and
               Chun{-}Hsien Chang and
               Min{-}Shiang Hwang},
  title     = {Research on Malware Detection and Classification Based on Artificial
               Intelligence},
  journal   = {Int. J. Netw. Secur.},
  volume    = {22},
  number    = {5},
  pages     = {717--727},
  year      = {2020},
  url       = {http://ijns.femto.com.tw/contents/ijns-v22-n5/ijns-2020-v22-n5-p717-727.pdf},
  timestamp = {Tue, 18 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HuangCH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangCH18,
  author    = {Li{-}Chin Huang and
               Ting{-}Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A Conference Key Scheme Based on the Diffie-Hellman Key Exchange},
  journal   = {Int. J. Netw. Secur.},
  volume    = {20},
  number    = {6},
  pages     = {1221--1226},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1221-1226.pdf},
  timestamp = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HuangCH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/HuangLH13,
  author    = {Li{-}Chin Huang and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {A n2+n {MQV} key agreement protocol},
  journal   = {Int. Arab J. Inf. Technol.},
  volume    = {10},
  number    = {2},
  pages     = {137--142},
  year      = {2013},
  url       = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=85\&\#38;Itemid=350},
  timestamp = {Wed, 27 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iajit/HuangLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HuangHT13,
  author    = {Li{-}Chin Huang and
               Min{-}Shiang Hwang and
               Lin{-}Yu Tseng},
  title     = {Reversible and High-Capacity Data Hiding in High Quality Medical Images},
  journal   = {{KSII} Trans. Internet Inf. Syst.},
  volume    = {7},
  number    = {1},
  pages     = {132--148},
  year      = {2013},
  url       = {https://doi.org/10.3837/tiis.2013.01.009},
  doi       = {10.3837/tiis.2013.01.009},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/itiis/HuangHT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HuangTH13,
  author    = {Li{-}Chin Huang and
               Lin{-}Yu Tseng and
               Min{-}Shiang Hwang},
  title     = {A reversible data hiding method by histogram shifting in high quality
               medical images},
  journal   = {J. Syst. Softw.},
  volume    = {86},
  number    = {3},
  pages     = {716--727},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.jss.2012.11.024},
  doi       = {10.1016/j.jss.2012.11.024},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/HuangTH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangTH12,
  author    = {Li{-}Chin Huang and
               Lin{-}Yu Tseng and
               Min{-}Shiang Hwang},
  title     = {The Study of Data Hiding in Medical Images},
  journal   = {Int. J. Netw. Secur.},
  volume    = {14},
  number    = {6},
  pages     = {301--309},
  year      = {2012},
  url       = {http://ijns.femto.com.tw/contents/ijns-v14-n6/ijns-2012-v14-n6-p301-309.pdf},
  timestamp = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HuangTH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc/TsengH10,
  author    = {Lin{-}Yu Tseng and
               Li{-}Chin Huang},
  title     = {Automatic fissure detection in {CT} images based on the genetic algorithm},
  booktitle = {International Conference on Machine Learning and Cybernetics, {ICMLC}
               2010, Qingdao, China, July 11-14, 2010, Proceedings},
  pages     = {2583--2588},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/ICMLC.2010.5580871},
  doi       = {10.1109/ICMLC.2010.5580871},
  timestamp = {Wed, 30 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icmlc/TsengH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics