Kuo, Wen-Chung
17087  results:
Search for persons X
?
1

Malware Detection Based on Image Conversion:

, In: 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications; Smart Innovation, Systems and Technologies,
Kuo, Wen-Chung ; Chen, Yu-Ting ; Huang, Yu-Chih. - p. 180-190 , 2022
 
?
2

3D-Playfair Encrypted Message Verification Technology based..:

, In: 2020 15th Asia Joint Conference on Information Security (AsiaJCIS),
 
?
3

A Progressive Secret Image Sharing Scheme Based on GEMD Dat..:

, In: Advances in Intelligent Systems and Computing; Security with Intelligent Computing and Big-Data Services 2019,
 
?
4

Malware Detection Method Based on CNN:

, In: Communications in Computer and Information Science; New Trends in Computer Technologies and Applications,
Kuo, Wen-Chung ; Lin, Yu-Pin - p. 608-617 , 2019
 
?
5

Study on Security Enhancing of Generalized Exploiting Modif..:

, In: Security with Intelligent Computing and Big-data Services; Advances in Intelligent Systems and Computing,
Kuo, Wen-Chung ; Xiao, Ren-Jun ; Wang, Chun-Cheng. - p. 103-115 , 2019
 
?
6

A high capacity data hiding scheme based on re-adjusted GEM:

Wang, Chun-Cheng ; Kuo, Wen-Chung ; Huang, Yu-Chih.
Multimedia Tools and Applications.  77 (2017)  5 - p. 6327-6341 , 2017
 
?
9

Signed digit data hiding scheme:

Kuo, Wen-Chung ; Wang, Chun-Cheng ; Hou, Hong-Ching
Information Processing Letters.  116 (2016)  2 - p. 183-191 , 2016
 
?
10

Secure multi-group data hiding based on gemd map:

Kuo, Wen-Chung ; Chang, Sheng-Yi ; Wang, Chun-Cheng.
Multimedia Tools and Applications.  76 (2016)  2 - p. 1901-1919 , 2016
 
?
12

Binary power data hiding scheme:

Kuo, Wen-Chung ; Wang, Chun-Cheng ; Huang, Yu-Chih
AEU - International Journal of Electronics and Communications.  69 (2015)  11 - p. 1574-1581 , 2015
 
?
13

Enhancement key agreement scheme based on chaotic maps:

Chain, Kai ; Kuo, Wen-Chung ; Chang, Kuei-Hu
International Journal of Computers and Applications.  37 (2015)  2 - p. 67-72 , 2015
 
?
14

An efficient and secure anonymous mobility network authenti..:

Kuo, Wen-Chung ; Wei, Hong-Ji ; Cheng, Jiin-Chiou
Journal of Information Security and Applications.  19 (2014)  1 - p. 18-24 , 2014
 
?
15

A new digital signature scheme based on chaotic maps:

Chain, Kai ; Kuo, Wen-Chung
Nonlinear Dynamics.  74 (2013)  4 - p. 1003-1012 , 2013
 
1-15