This page has only limited features, please log in for full access.

Prof. Dr. Chin-Ling Chen
Chaoyang University of Technology, Taiwan

Basic Info


Research Keywords & Expertise

0 Authentication
0 Computer Security
0 Information Security
0 Network Security
0 Security

Fingerprints

Security
Authentication
mutual authentication
Will
anonymity
Digital Signature
Smart Contract
mobile device
Information Security
certificate
Key Agreement Protocol
Blockchain Security

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

Chin-Ling Chen received his PhD from National Chung Hsing University, Taiwan in 2005. From 1979 to 2005, he was a senior engineer at Chunghwa Telecom Co. Ltd. He is currently a distinguished professor. His research interests include cryptography, network security, and electronic commerce. He has published over 120 articles in SCI/SSCI international journals.

Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 21 August 2021 in Sustainability
Reads 0
Downloads 0

In the current medical insurance claims process, there are problems of low efficiency and complex services. When a patient applies for medical insurance claims, he/she must go to the hospital to apply for a diagnosis certificate and receipt and then send the relevant application documents to the insurance company. The patient will not receive compensation until the company completes the verification with the patient’s hospital. However, we can improve the current dilemma through blockchain technology. Blockchain technology can effectively open up the information channels of the insurance industry and medical institutions, promote industry integration, and enhance the ability of insurance companies to obtain information. In this research, we used blockchain and smart contract technology to make the following contributions to the development of Internet insurance. First, blockchain and smart contract technology can effectively solve the problem of online underwriting. Second, it is conducive to improving supervision. Third, it is conducive to solving risk control problems. Fourth, it is conducive to effective anti-money laundering. The proposed scheme fulfills the following security requirements: mutual authentication of identities, non-repudiation between each of two roles, and other major blockchain-based security requirements. In the event of a dispute, we also proposed an arbitration mechanism to divide responsibilities.

ACS Style

Chin-Ling Chen; Yong-Yuan Deng; Woei-Jiunn Tsaur; Chun-Ta Li; Cheng-Chi Lee; Chih-Ming Wu. A Traceable Online Insurance Claims System Based on Blockchain and Smart Contract Technology. Sustainability 2021, 13, 9386 .

AMA Style

Chin-Ling Chen, Yong-Yuan Deng, Woei-Jiunn Tsaur, Chun-Ta Li, Cheng-Chi Lee, Chih-Ming Wu. A Traceable Online Insurance Claims System Based on Blockchain and Smart Contract Technology. Sustainability. 2021; 13 (16):9386.

Chicago/Turabian Style

Chin-Ling Chen; Yong-Yuan Deng; Woei-Jiunn Tsaur; Chun-Ta Li; Cheng-Chi Lee; Chih-Ming Wu. 2021. "A Traceable Online Insurance Claims System Based on Blockchain and Smart Contract Technology." Sustainability 13, no. 16: 9386.

Journal article
Published: 26 June 2021 in Applied Sciences
Reads 0
Downloads 0

Text detection in natural scenes is a current research hotspot. The Efficient and Accurate Scene Text (EAST) detector model has fast detection speed and good performance but is ineffective in detecting long text regions owing to its small receptive field. In this study, we built upon the EAST model by improving the bounding box’s shrinking algorithm to make the model more accurate in predicting short edges of text regions; altering the loss function from balanced cross-entropy to Focal loss; improving the model’s learning ability on hard, positive examples; and adding a feature enhancement module (FEM) to increase the receptive field of the EAST model and enhance its detection ability for long text regions. The improved EAST model achieved better detection results on both the ICDAR2015 dataset and the Street Sign Text Detection (SSTD) dataset proposed in this paper. The precision and F1 scores of the model also demonstrated advantages over other models on the ICDAR2015 dataset. A comparison of the text detection effects between the improved EAST model and the EAST model showed that the proposed FEM was more effective in increasing the EAST detector’s receptive field, which indicates that it can improve the detection of long text regions.

ACS Style

Manhuai Lu; Yuanxiang Mou; Chin-Ling Chen; Qiting Tang. An Efficient Text Detection Model for Street Signs. Applied Sciences 2021, 11, 5962 .

AMA Style

Manhuai Lu, Yuanxiang Mou, Chin-Ling Chen, Qiting Tang. An Efficient Text Detection Model for Street Signs. Applied Sciences. 2021; 11 (13):5962.

Chicago/Turabian Style

Manhuai Lu; Yuanxiang Mou; Chin-Ling Chen; Qiting Tang. 2021. "An Efficient Text Detection Model for Street Signs." Applied Sciences 11, no. 13: 5962.

Journal article
Published: 27 May 2021 in Applied Sciences
Reads 0
Downloads 0

Tobacco products are an addictive commodity. According to the World Health Organization’s (WHO) latest statistics data, tobacco kills more than eight million people each year. In 2003, the WHO proposed the Framework Convention on Tobacco Control (FCTC) to provide an effective framework for the control of tobacco products to governments around the world. In the field of tobacco products, the hardest problem is how to prevent counterfeit tobacco products and smuggling. To solve the problems, we proposed a blockchain-based traceable and verifiable logistics system for tobacco products with global positioning system (GPS) and radio-frequency identification (RFID) Technologies. In this research, we provide an overview of system architecture, and also define the protocol and the smart contract in every phase that stores data into the blockchain center. We realized a decentralized database and authentication system that uses blockchain and smart contract technology; every protocol in every phase was designed to achieve the integrity of data and non-repudiation of message. Every tobacco product’s shipping record will be completed by scanning the RFID tag and retrieving the GPS with a mobile reader, where the record will be updated and validated in the blockchain center. In the end, the security and costs of the system were analyzed, and a comparison was made with the EU’s (European Commission) method. Our system is more flexible for transportation, more secure in the communication protocol, and more difficult to tamper and forge data. In general, the proposed scheme solved the problem of tobacco products counterfeiting and tracking issues.

ACS Style

Chin-Ling Chen; Zi-Yi Lim; Hsien-Chou Liao; Yong-Yuan Deng; Peizhi Chen. A Traceable and Verifiable Tobacco Products Logistics System with GPS and RFID Technologies. Applied Sciences 2021, 11, 4939 .

AMA Style

Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao, Yong-Yuan Deng, Peizhi Chen. A Traceable and Verifiable Tobacco Products Logistics System with GPS and RFID Technologies. Applied Sciences. 2021; 11 (11):4939.

Chicago/Turabian Style

Chin-Ling Chen; Zi-Yi Lim; Hsien-Chou Liao; Yong-Yuan Deng; Peizhi Chen. 2021. "A Traceable and Verifiable Tobacco Products Logistics System with GPS and RFID Technologies." Applied Sciences 11, no. 11: 4939.

Research article
Published: 07 May 2021 in Wireless Communications and Mobile Computing
Reads 0
Downloads 0

Traditionally, the channelization structures of wireless technologies (802.11/ZigBee/BLE) have been fixed. Each node content for the spectrum is assigned one channel with a specific bandwidth. However, classical channel-based spectrum sensing and sharing algorithms have great limitations to further optimize spectrum utilization when multiple IoT with different wireless technologies coexisting in the same environment. Therefore, exploring the fine-grained spectrum sensing algorithm becomes an essential work to further improve the spectrum utilization efficiency, especially in the Industrial Scientific Medical (ISM) band. This paper proposes Subcarrier-Sniffer, a novel subcarrier-level spectrum sensing and sharing method, which utilizes channel state information (CSI) to sense the fine-grained status of each subcarrier of the traditional channel. To evaluate the performance of Subcarrier-Sniffer, we implemented Subcarrier-Sniffer by USRP B200min, and the experimental results show that the accuracy of subcarrier-level spectrum sensing could achieve 100% in our settings that the distance between Subcarrier-Sniffer and the monitor is not greater than 7 m. Subcarrier-Sniffer could be applied in WiFi and ZigBee, WiFi and BLE, and WiFi and LTE-U coexisted environments for better spectrum utilization.

ACS Style

Zheng Lu; Handong Wang; Hongyu Sun; Chin-Ling Chen; Zhenjiang Tan. A Novel Subcarrier-Level Spectrum Sensing Method by Utilizing Fine-Grained Channel State Information in Wireless Networks. Wireless Communications and Mobile Computing 2021, 2021, 1 -12.

AMA Style

Zheng Lu, Handong Wang, Hongyu Sun, Chin-Ling Chen, Zhenjiang Tan. A Novel Subcarrier-Level Spectrum Sensing Method by Utilizing Fine-Grained Channel State Information in Wireless Networks. Wireless Communications and Mobile Computing. 2021; 2021 ():1-12.

Chicago/Turabian Style

Zheng Lu; Handong Wang; Hongyu Sun; Chin-Ling Chen; Zhenjiang Tan. 2021. "A Novel Subcarrier-Level Spectrum Sensing Method by Utilizing Fine-Grained Channel State Information in Wireless Networks." Wireless Communications and Mobile Computing 2021, no. : 1-12.

Research article
Published: 05 May 2021 in Journal of Healthcare Engineering
Reads 0
Downloads 0

The automatic diagnosis of various retinal diseases based on fundus images is important in supporting clinical decision-making. Convolutional neural networks (CNNs) have achieved remarkable results in such tasks. However, their high expression ability possibly leads to overfitting. Therefore, data augmentation (DA) techniques have been proposed to prevent overfitting while enriching datasets. Recent CNN architectures with more parameters render traditional DA techniques insufficient. In this study, we proposed a new DA strategy based on multimodal fusion (DAMF) which could integrate the standard DA method, data disrupting method, data mixing method, and autoadjustment method to enhance the image data in the training dataset to create new training images. In addition, we fused the results of the classifier by voting on the basis of DAMF, which further improved the generalization ability of the model. The experimental results showed that the optimal DA mode could be matched to the image dataset through our DA strategy. We evaluated DAMF on the iChallenge-PM dataset. At last, we compared training results between 12 DAMF processed datasets and the original training dataset. Compared with the original dataset, the optimal DAMF achieved an accuracy increase of 2.85% on iChallenge-PM.

ACS Style

Jianfeng Cui; Xiaoyun Zhang; Feibing Xiong; Chin-Ling Chen. Pathological Myopia Image Recognition Strategy Based on Data Augmentation and Model Fusion. Journal of Healthcare Engineering 2021, 2021, 1 -15.

AMA Style

Jianfeng Cui, Xiaoyun Zhang, Feibing Xiong, Chin-Ling Chen. Pathological Myopia Image Recognition Strategy Based on Data Augmentation and Model Fusion. Journal of Healthcare Engineering. 2021; 2021 ():1-15.

Chicago/Turabian Style

Jianfeng Cui; Xiaoyun Zhang; Feibing Xiong; Chin-Ling Chen. 2021. "Pathological Myopia Image Recognition Strategy Based on Data Augmentation and Model Fusion." Journal of Healthcare Engineering 2021, no. : 1-15.

Journal article
Published: 22 March 2021 in Applied Sciences
Reads 0
Downloads 0

Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Things (IoTs) device in the client’s house and connect it with the IoT main controller; then, the IoT main controller connects to the security control center (SCC). Once there is an event triggered (e.g., a break-in or fire incident) by the IoTs device, the controller sends a message to the SCC. The SCC allocates a security guard (SG) to the incident scene immediately. After the task is accomplished, the SG sends a message to the SCC. All of these record the messages and events chained in the blockchain center. The proposed scheme makes security event records have the following characteristics: authenticated, traceable, and integral. The proposed scheme is proved by a security analysis with mutual authentication, traceability, integrity, and non-repudiation. The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. Threat models in the communication phase can also be avoided. Finally, computation cost, communication performance, and comparison with related works are also discussed to prove its applicability. We also provide an arbitration mechanism, so that the proposed scheme can reduce disputes between private security companies and the client.

ACS Style

Chin-Ling Chen; Zi-Yi Lim; Hsien-Chou Liao; Yong-Yuan Deng. A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain. Applied Sciences 2021, 11, 2843 .

AMA Style

Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao, Yong-Yuan Deng. A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain. Applied Sciences. 2021; 11 (6):2843.

Chicago/Turabian Style

Chin-Ling Chen; Zi-Yi Lim; Hsien-Chou Liao; Yong-Yuan Deng. 2021. "A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain." Applied Sciences 11, no. 6: 2843.

Journal article
Published: 12 March 2021 in Symmetry
Reads 0
Downloads 0

In recent years, with the rapid levels of economic development, there have been more and more problems in property inheritance and distribution. In today’s society, people still have many taboos when writing a will. Writing a will not only involves various laws and regulations but also costs a lot of money and time, which can be daunting. However, with the development of the Internet, blockchain technology has gradually been applied to many applications. Blockchain technology uses consensus algorithms to ensure consistency and records transaction information in blocks to ensure the effectiveness of transactions. In this paper, we use the cryptography mechanism to propose an online will system based on blockchain and smart contract technology. The architecture considers effectiveness and cost reduction. By combining this with blockchain technology, will assets are saved in blocks, which provides comprehensive will security and non-tamperable security protection. In addition, combined with a smart contract, it realizes the method of automatic property distribution. At the same time, this mechanism also proposes an arbitration solution when there are disputes over wills, and ensures the integrity of data, public verifiability, unforgeability, nonrepudiation, irreversibility of information, and the ability to resist counterfeiting attacks.

ACS Style

Chin-Ling Chen; Ching-Ying Lin; Mao-Lun Chiang; Yong-Yuan Deng; Peizhi Chen; Yi-Jui Chiu. A Traceable Online Will System Based on Blockchain and Smart Contract Technology. Symmetry 2021, 13, 466 .

AMA Style

Chin-Ling Chen, Ching-Ying Lin, Mao-Lun Chiang, Yong-Yuan Deng, Peizhi Chen, Yi-Jui Chiu. A Traceable Online Will System Based on Blockchain and Smart Contract Technology. Symmetry. 2021; 13 (3):466.

Chicago/Turabian Style

Chin-Ling Chen; Ching-Ying Lin; Mao-Lun Chiang; Yong-Yuan Deng; Peizhi Chen; Yi-Jui Chiu. 2021. "A Traceable Online Will System Based on Blockchain and Smart Contract Technology." Symmetry 13, no. 3: 466.

Journal article
Published: 08 March 2021 in Symmetry
Reads 0
Downloads 0

In some liberal democracies, governments allow people to legally own guns to protect their lives and property. However, gun crime has been increasing in recent years. Taking the United States, for example, a report pointed out that Americans are 10 times more likely to be shot than citizens of other countries. Murder using guns in the United States is 25 times more than that in the other 22 high-income countries. Most of these guns came from other cities. These illegally circulating guns are directly linked to deadly street violence. This means that effective firearm management can reduce deadly violence. In the past few years, Radio Frequency IDentification (RFID) technology was often used to track the supply chain. However, in the traditional supply chain, only the participants of the supply chain can query information. Furthermore, only the participants can verify the correctness of the data. This result causes information to be not transparent. On the other hand, blockchain technology, with a unique combination of features such as distributed notes, decentralized structure, consensus algorithm, storage mechanism, asymmetric encryption, and smart contract, ensures network visibility, transparency, and security. Therefore, we combine blockchain and RFID technology to propose a traceable firearm management system based on blockchain and Internet of Things (IoT) technology. The proposed method achieves several goals. First of all, the characteristic data through the blockchain can be publicly verified and the information will not be modified. The traceability of the data and the application of RFID can effectively manage the production chain. In addition, we used Burrows–Abadi–Needham logic (BAN logic) logic to prove mutual authentication, and the nonrepudiation and integrity method can also be achieved in our proposed scheme.

ACS Style

Chin-Ling Chen; Mao-Lun Chiang; Yong-Yuan Deng; Wei Weng; Kunhao Wang; Ching-Cheng Liu. A Traceable Firearm Management System Based on Blockchain and IoT Technology. Symmetry 2021, 13, 439 .

AMA Style

Chin-Ling Chen, Mao-Lun Chiang, Yong-Yuan Deng, Wei Weng, Kunhao Wang, Ching-Cheng Liu. A Traceable Firearm Management System Based on Blockchain and IoT Technology. Symmetry. 2021; 13 (3):439.

Chicago/Turabian Style

Chin-Ling Chen; Mao-Lun Chiang; Yong-Yuan Deng; Wei Weng; Kunhao Wang; Ching-Cheng Liu. 2021. "A Traceable Firearm Management System Based on Blockchain and IoT Technology." Symmetry 13, no. 3: 439.

Journal article
Published: 18 February 2021 in Applied Sciences
Reads 0
Downloads 0

Surface defects on bearings can directly affect the service life and reduce the performance of equipment. At present, the detection of bearing surface defects is mostly done manually, which is labor-intensive and results in poor stability. To improve the inspection speed and the defect recognition rate, we proposed a bearing surface defect detection and classification method using machine vision technology. The method makes two main contributions. It proposes a local multi-neural network (Lc-MNN) image segmentation algorithm with the wavelet transform as the classification feature. The precision segmentation of the defect image is accomplished in three steps: wavelet feature extraction, Lc-MNN region division, and Lc-MNN classification. It also proposes a feature selection algorithm (SCV) that makes comprehensive use of scalar feature selection, correlation analysis, and vector feature selection to first remove similar features through correlation analysis, further screen the results with a scalar feature selection algorithm, and finally select the classification features using a feature vector selection algorithm. Using 600 test samples with three types of defect in the experiment, an identification rate of 99.5% was achieved without the need for large-scale calculation. The comparison tests indicated that the proposed method can achieve efficient feature selection and defect classification.

ACS Style

Manhuai Lu; Chin-Ling Chen. Detection and Classification of Bearing Surface Defects Based on Machine Vision. Applied Sciences 2021, 11, 1825 .

AMA Style

Manhuai Lu, Chin-Ling Chen. Detection and Classification of Bearing Surface Defects Based on Machine Vision. Applied Sciences. 2021; 11 (4):1825.

Chicago/Turabian Style

Manhuai Lu; Chin-Ling Chen. 2021. "Detection and Classification of Bearing Surface Defects Based on Machine Vision." Applied Sciences 11, no. 4: 1825.

Journal article
Published: 14 February 2021 in Sustainability
Reads 0
Downloads 0

The digital rights management of museums is a mechanism that protects digital content from being abused by controlling and managing its usage rights. Traditional museums attach importance to the collection, display, research, and education functions of “objects”. In response to natural or man-made disasters, people are often caught off guard, destroying material, intangible assets, and spiritual symbolism. Therefore, with the advancement of digital technology, this research is based on the mechanism of blockchain, through the authorization of cryptographic proxy re-encryption, and proposes a new method for the preservation and authorization of digital content in museums, which can effectively display, store, and promote “important cultural relics and digital archives”. In this research, the Elliptic Curve Digital Signature Algorithm (ECDSA), blockchain, and smart contracts are used to design a sustainable and traceable cultural relic exhibition mechanism. The proposed scheme achieves publicly verifiable, transparency, unforgeability, traceability, non-repudiation, standardization of stored data, timeliness, etc., goals. It is the museum’s preservation and innovation approach for the unpredictable future. Through appropriate preservation and management mechanisms, it has extremely important practical significance for the protection of museum collections, the inheritance of historical and cultural heritage, and the expansion of social education.

ACS Style

Yun-Ciao Wang; Chin-Ling Chen; Yong-Yuan Deng. Museum-Authorization of Digital Rights: A Sustainable and Traceable Cultural Relics Exhibition Mechanism. Sustainability 2021, 13, 2046 .

AMA Style

Yun-Ciao Wang, Chin-Ling Chen, Yong-Yuan Deng. Museum-Authorization of Digital Rights: A Sustainable and Traceable Cultural Relics Exhibition Mechanism. Sustainability. 2021; 13 (4):2046.

Chicago/Turabian Style

Yun-Ciao Wang; Chin-Ling Chen; Yong-Yuan Deng. 2021. "Museum-Authorization of Digital Rights: A Sustainable and Traceable Cultural Relics Exhibition Mechanism." Sustainability 13, no. 4: 2046.

Journal article
Published: 25 January 2021 in Applied Sciences
Reads 0
Downloads 0

In addition to the exhibition, collection, research, and educational functions of the museum, the development of a future museum includes the trend of leisure and sightseeing. Although the museum is a non-profit organization, if it can provide digital exhibits and collections under the premises of “intellectual property rights” and “cultural assets protection”, and licensing and adding value in various fields, it can generate revenue from digital licensing and handle the expenses of museum operations. This will be a new trend in the sustainable development of museum operations. Especially since the outbreak of COVID-19 at the beginning of this year (2020), the American Alliance of Museums (AAM) recently stated that nearly a third of the museums in the United States may be permanently closed since museum operations are facing “extreme financial difficulties.” This research is aimed at museums using the business model of “digital authorization”. It proposes an authorization mechanism based on blockchain technology protecting the museums’ digital rights in the business model and the application of cryptography. The signature and time stamp mechanism achieve non-repudiation and timeless mechanism, which combines blockchain and smart contracts to achieve verifiability, un-forgery, decentralization, and traceability, as well as the non-repudiation of the issue of cash flow with signatures and digital certificates, for the digital rights of museums in business. The business model proposes achievable sustainable development. Museums not only achieve the goal of promoting social education, but also solve their financial problems.

ACS Style

Yun-Ciao Wang; Chin-Ling Chen; Yong-Yuan Deng. Authorization Mechanism Based on Blockchain Technology for Protecting Museum-Digital Property Rights. Applied Sciences 2021, 11, 1085 .

AMA Style

Yun-Ciao Wang, Chin-Ling Chen, Yong-Yuan Deng. Authorization Mechanism Based on Blockchain Technology for Protecting Museum-Digital Property Rights. Applied Sciences. 2021; 11 (3):1085.

Chicago/Turabian Style

Yun-Ciao Wang; Chin-Ling Chen; Yong-Yuan Deng. 2021. "Authorization Mechanism Based on Blockchain Technology for Protecting Museum-Digital Property Rights." Applied Sciences 11, no. 3: 1085.

Article
Published: 08 January 2021 in The Journal of Supercomputing
Reads 0
Downloads 0

In recent years, with the rapid development of e-commerce and network technologies, many people do online shopping through the Internet. If a physical product is bought by a client, the store will entrust their logistics to deliver the goods to the client. However, there have been many cases of switched goods which were purchased by clients recently. Some scholars proposed a security mechanism with a subliminal channel for E-cash and digital content previously. Only the designated sender and the designated receiver know the subliminal message which was hidden in the signature. Thus, it can be applied to solve the switched package issue. According to the WTO (World Trade Organization) forum, blockchain-related logistics applications have gradually emerged in recent days. Blockchain technology is essentially a decentralized database maintained by the collective. It has the characteristics of high reliability and high confidentiality and has a good prospect in effectively solving the trust problem between the two parties. In short, blockchain information will be publicly verifiable and cannot be tampered with, which provides solutions for traditional logistics. It realizes trust and cooperation between multiple entities, and create a modernized logistics environment. In this paper, we attach a sensor to monitor the situation of the delivery object and tag on the package to be an IoT object. The proposed scheme is a blockchain-based intelligent anti-switch package in tracing the logistics system. The client can check the GPS (Global Positioning System) location, the temperature, and humidity sensing data of the package any time during the delivery process, and the IoT-related intelligent logistics can be achieved. The proposed scheme also achieves data integrity, resisting replay attack, forward and backward secrecy, non-repudiation, and mutual authentication.

ACS Style

Chin-Ling Chen; Yong-Yuan Deng; Wei Weng; Ming Zhou; Hongyu Sun. A blockchain-based intelligent anti-switch package in tracing logistics system. The Journal of Supercomputing 2021, 77, 7791 -7832.

AMA Style

Chin-Ling Chen, Yong-Yuan Deng, Wei Weng, Ming Zhou, Hongyu Sun. A blockchain-based intelligent anti-switch package in tracing logistics system. The Journal of Supercomputing. 2021; 77 (7):7791-7832.

Chicago/Turabian Style

Chin-Ling Chen; Yong-Yuan Deng; Wei Weng; Ming Zhou; Hongyu Sun. 2021. "A blockchain-based intelligent anti-switch package in tracing logistics system." The Journal of Supercomputing 77, no. 7: 7791-7832.

Journal article
Published: 09 November 2020 in IEEE Access
Reads 0
Downloads 0

With the rapid development of the social economy, our lives are flooded with all kinds of counterfeit products. The public’s attitude of greedy for petty and cheap has encouraged unscrupulous manufacturers to take advantage of the opportunity to provide low-cost counterfeit products, suppress the profits of legitimate manufacturers, and also make the public lose confidence in the quality of the products. At present, the most widely used anti-counterfeiting system based on QR codes on the market. However, existing traceability systems are still mostly built in a centralized manner, and the central agency provides trust guarantees, but the public still has great doubts about the credibility of the central agency. The introduction of blockchain technology can perfectly solve the lack of existing architecture and the environment. In this research, we propose an IoT-based traceable drug anti-counterfeiting management system, a comprehensive plan from drug research and development, certification, production to sales. The framework we propose meets the requirements of information security for data integrity, resistance to replay attacks, irreversible information, and non-repudiation.

ACS Style

Chin-Ling Chen; Yong-Yuan Deng; Chun-Ta Li; Shunzhi Zhu; Yi-Jui Chiu; Pei-Zhi Chen. An IoT-Based Traceable Drug Anti-Counterfeiting Management System. IEEE Access 2020, 8, 224532 -224548.

AMA Style

Chin-Ling Chen, Yong-Yuan Deng, Chun-Ta Li, Shunzhi Zhu, Yi-Jui Chiu, Pei-Zhi Chen. An IoT-Based Traceable Drug Anti-Counterfeiting Management System. IEEE Access. 2020; 8 (99):224532-224548.

Chicago/Turabian Style

Chin-Ling Chen; Yong-Yuan Deng; Chun-Ta Li; Shunzhi Zhu; Yi-Jui Chiu; Pei-Zhi Chen. 2020. "An IoT-Based Traceable Drug Anti-Counterfeiting Management System." IEEE Access 8, no. 99: 224532-224548.

Journal article
Published: 22 September 2020 in IEEE Access
Reads 0
Downloads 0

In recent years, due to the rapid development of information techniques and network technologies, more and more medical documents have been replaced by electronic files for sharing and transmitting in real time. However, medical data transmitted over public communication channels may suffer from security attacks and privacy threats. Blockchain technology has been gotten many attentions in different areas due to its unique properties such as anonymity, verifiability, immutability and decentralization. In order to secure patient privacy and provide more personal healthcare services, in this paper, we propose a data aggregation scheme based on Blockchain technology for medical environments. Moreover, in order to implement remote medical monitoring, we design a group authentication mechanism for multiple authorized users (such as patient, doctors, caregivers, family and friends) to freely access patient’s personal health records. The authorized group members in a group will agree on a group session key and use it to protect patient’s sensitive information. In case of a new member joins the medical group or an old member leaves the medical group, the group session key needs to be updated at any time. Finally, the electronic medical system will become more secure, reliable and useful by our proposed scheme.

ACS Style

Chun-Ta Li; Dong-Her Shih; Chun-Cheng Wang; Chin-Ling Chen; Cheng-Chi Lee. A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System. IEEE Access 2020, 8, 173904 -173917.

AMA Style

Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, Chin-Ling Chen, Cheng-Chi Lee. A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System. IEEE Access. 2020; 8 (99):173904-173917.

Chicago/Turabian Style

Chun-Ta Li; Dong-Her Shih; Chun-Cheng Wang; Chin-Ling Chen; Cheng-Chi Lee. 2020. "A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System." IEEE Access 8, no. 99: 173904-173917.

Journal article
Published: 19 July 2020 in Applied Sciences
Reads 0
Downloads 0

In recent years, blockchain-related technologies and applications have gradually emerged. Blockchain technology is essentially a decentralized database maintained by the collective, and it is now widely applied in various fields. At the same time, with the growth of medical technology, medical information is becoming increasingly important in terms of patient identity background, medical payment records, and medical history. Medical information can be the most private information about a person, but due to issues such as operation errors within the network or a hacking attack by a malicious person, there have been major leaks of sensitive personal information in the past. In any case, this has become an issue worth studying to ensure the privacy of patients and protect these medical materials. On the other hand, under the current medical system, the patient’s EMR (electronic medical record) cannot be searched across the hospital. When the patient attends the hospital for treatment, repeated examinations will occur, resulting in a waste of medical resources. Therefore, we propose a blockchain-based secure inter-hospital EMR sharing system in this article. Through the programmatic authorization mechanism by smart contracts, the security of EMR is guaranteed. In addition to the essential mutual authentication, the proposed scheme also provides and guarantees data integrity, nonrepudiation, user untraceability, forward and backward secrecy, and resistance to replay attack.

ACS Style

Chin-Ling Chen; Yong-Yuan Deng; Wei Weng; Hongyu Sun; Ming Zhou. A Blockchain-Based Secure Inter-Hospital EMR Sharing System. Applied Sciences 2020, 10, 4958 .

AMA Style

Chin-Ling Chen, Yong-Yuan Deng, Wei Weng, Hongyu Sun, Ming Zhou. A Blockchain-Based Secure Inter-Hospital EMR Sharing System. Applied Sciences. 2020; 10 (14):4958.

Chicago/Turabian Style

Chin-Ling Chen; Yong-Yuan Deng; Wei Weng; Hongyu Sun; Ming Zhou. 2020. "A Blockchain-Based Secure Inter-Hospital EMR Sharing System." Applied Sciences 10, no. 14: 4958.

Journal article
Published: 25 June 2020 in IEEE Access
Reads 0
Downloads 0

Task offloading could optimize computational resource utilization in edge computing environments. However, how to assign and offload tasks for different behavior users is an essential problem since the systems dynamic, intelligent application diversity, and user personality. With user behavior prediction, this paper proposes soCoM, a semi-online Computational Offloading Model. We explore the user behaviors in sophisticated action space by reinforcement learning for catching unknown environment information. With Dueling Deep-Q Network, both the prediction accuracy of users’ behaviors and the server load balance are well-considered, while increasing the computational efficiency and decreasing the resource costing. We propose a dynamic simulation environment of edge computing to demonstrate that user behavior is the critical factor for impacting system utilization. As the action space increasing, Dueling DQN performs better than state-of-art DQN and other improved strategies, and also load balance in multiple different server scenario.

ACS Style

ShiNan Song; Zhiyi Fang; Zhanyang Zhang; Chin-Ling Chen; Hongyu Sun. Semi-Online Computational Offloading by Dueling Deep-Q Network for User Behavior Prediction. IEEE Access 2020, 8, 118192 -118204.

AMA Style

ShiNan Song, Zhiyi Fang, Zhanyang Zhang, Chin-Ling Chen, Hongyu Sun. Semi-Online Computational Offloading by Dueling Deep-Q Network for User Behavior Prediction. IEEE Access. 2020; 8 ():118192-118204.

Chicago/Turabian Style

ShiNan Song; Zhiyi Fang; Zhanyang Zhang; Chin-Ling Chen; Hongyu Sun. 2020. "Semi-Online Computational Offloading by Dueling Deep-Q Network for User Behavior Prediction." IEEE Access 8, no. : 118192-118204.

Article
Published: 08 May 2020 in Wireless Personal Communications
Reads 0
Downloads 0

In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because there is no immediate treatment. Elderly care has become an important issue. According to this issue, we want to monitor the physiological data of the elderly, such as heartbeat, blood pressure, etc., through wearable devices. Once an abnormal condition is detected, the wearable device can be used to immediately request treatment from a nearby clinic or hospital. In order to improve the network quality of this service, we use the architecture of the mobile edge computing. The mobile edge computing provides features such as immediacy, low latency, proximity etc. However, the process of data transmission on the mobile edge computing has the risk of being stolen and identity authentication is also an important issue. Therefore, we propose a secure protocol based on cryptography to protect personal information with lightweight authentication. The proposed scheme aims to achieve mutual authentication, non-repudiation, integrity, user privacy, and defend against known attacks.

ACS Style

Chin-Ling Chen; Mao-Lun Chiang; Hui-Ching Hsieh; Ching-Cheng Liu; Yong-Yuan Deng. A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing. Wireless Personal Communications 2020, 113, 575 -598.

AMA Style

Chin-Ling Chen, Mao-Lun Chiang, Hui-Ching Hsieh, Ching-Cheng Liu, Yong-Yuan Deng. A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing. Wireless Personal Communications. 2020; 113 (1):575-598.

Chicago/Turabian Style

Chin-Ling Chen; Mao-Lun Chiang; Hui-Ching Hsieh; Ching-Cheng Liu; Yong-Yuan Deng. 2020. "A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing." Wireless Personal Communications 113, no. 1: 575-598.

Special issue article
Published: 27 March 2020 in Transactions on Emerging Telecommunications Technologies
Reads 0
Downloads 0

As the network technologies have rapidly developed in recent years, many Internet of Things (IoT) based services and applications have walked into our daily lives; one of these is the medical information system. In the early days, medical information was recorded and stored in article form. It contains a patient identity background, past medical history, and records of medical payment. With the development of medical technology, medical information is now stored and transmitted electronically. Medical information may be a person's most private information, but due to network operation errors or hacking attacks, there has been a crisis of large‐scale leakage of these personal privacy data in the past. In any cases, how to protect this medical information and ensure the privacy of patients has become a topic worthy of research. Therefore, many kinds of literature discussed how to improve medical information systems. In addition, how to effectively treat patients when accidents happen is also a topic worthy of research. Therefore, combined with IoT technologies and medical devices, it has been opened a whole new future for medical information system. This study focuses on security and privacy issues to design a security scheme for healthcare environments when a person encountered physical emergency. Mobile devices and cloud computing are combined into the proposed platform. The proposed scheme can defend against impersonation attack, man‐in‐middle attack, and replay attack. The modal logic is used to verify the proposed scheme. By using digital signature and SVO logic mechanism, the proposed scheme is proven with nonrepudiation.

ACS Style

Chin‐Ling Chen; Tsai‐Tung Yang; Yong-Yuan Deng; Chi‐Hua Chen. A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism. Transactions on Emerging Telecommunications Technologies 2020, 32, 1 .

AMA Style

Chin‐Ling Chen, Tsai‐Tung Yang, Yong-Yuan Deng, Chi‐Hua Chen. A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism. Transactions on Emerging Telecommunications Technologies. 2020; 32 (5):1.

Chicago/Turabian Style

Chin‐Ling Chen; Tsai‐Tung Yang; Yong-Yuan Deng; Chi‐Hua Chen. 2020. "A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism." Transactions on Emerging Telecommunications Technologies 32, no. 5: 1.

Journal article
Published: 13 March 2020 in IEEE Access
Reads 0
Downloads 0

Multi-label classification tackles the problems in which each instance is associated with multiple labels. Due to the interdependence among labels, exploiting label correlations is the main means to enhance the performances of classifiers and a variety of corresponding multi-label algorithms have been proposed. Among those algorithms Classifier Chains (CC) is one of the most effective methods. It induces binary classifiers for each label, and these classifiers are linked in a chain. In the chain, the labels predicted by previous classifiers are used as additional features for the current classifier. The original CC has two shortcomings which potentially decrease classification performances: random label ordering, noise in original and additional features. To deal with these problems, we propose a novel and effective algorithm named LSF-CC, i.e. Label Specific Features based Classifier Chain for multi-label classification. At first, a feature estimating technique is employed to produce a list of most relevant features and labels for each label. According to these lists, we define a chain to guarantee that the most frequent labels that appear in these lists are top-ranked. Then, label specific features can be selected from the original feature space and label space. Based on these label specific features, corresponding binary classifiers are learned for each label. Experiments on several multi-label data sets from various domains have shown that the proposed method outperforms well-established approaches.

ACS Style

Wei Weng; Da-Han Wang; Chin-Ling Chen; Juan Wen; Shun-Xiang Wu. Label Specific Features-Based Classifier Chains for Multi-Label Classification. IEEE Access 2020, 8, 51265 -51275.

AMA Style

Wei Weng, Da-Han Wang, Chin-Ling Chen, Juan Wen, Shun-Xiang Wu. Label Specific Features-Based Classifier Chains for Multi-Label Classification. IEEE Access. 2020; 8 (99):51265-51275.

Chicago/Turabian Style

Wei Weng; Da-Han Wang; Chin-Ling Chen; Juan Wen; Shun-Xiang Wu. 2020. "Label Specific Features-Based Classifier Chains for Multi-Label Classification." IEEE Access 8, no. 99: 51265-51275.

Journal article
Published: 21 February 2020 in Electronics
Reads 0
Downloads 0

As the network technology continues to grow at a high rate of speed, the traditional network topology is improved with novel distributed topologies such as the Cloud computing network. A cloud computing environment consists of a huge number of processors and memories, high-speed networks, and various application services to provide a lot of services over the Internet for users. However, many services need to search for suitable service nodes, and the workload of each node can be unbalanced. Based on the reason above, the Reference Queue based Cloud Service Architecture (RQCSA) and Fitness Service Queue Selection Mechanism (FSQSM) are proposed to handle more tasks, lower the makespan and queue waiting time, and improve efficiency. Moreover, the tasks can be distributed more evenly to avoid overloading cluster managers and lower the efficiency of the system.

ACS Style

Chin-Ling Chen; Mao-Lun Chiang; Chuan-Bi Lin. The High Performance of a Task Scheduling Algorithm Using Reference Queues for Cloud- Computing Data Centers. Electronics 2020, 9, 371 .

AMA Style

Chin-Ling Chen, Mao-Lun Chiang, Chuan-Bi Lin. The High Performance of a Task Scheduling Algorithm Using Reference Queues for Cloud- Computing Data Centers. Electronics. 2020; 9 (2):371.

Chicago/Turabian Style

Chin-Ling Chen; Mao-Lun Chiang; Chuan-Bi Lin. 2020. "The High Performance of a Task Scheduling Algorithm Using Reference Queues for Cloud- Computing Data Centers." Electronics 9, no. 2: 371.