Ting-Hsuan Chen, Ph.D. - Publications

2012 Mechanical and Aerospace Engineering University of California, Los Angeles, Los Angeles, CA 

136 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2021 Wang WM, Yu CH, Chang JY, Chen TH, Chen YC, Sun YT, Wang SH, Jao SC, Cheng RP. Insertion of Pro-Hyp-Gly provides 2 kcal mol stability but attenuates the specific assembly of ABC heterotrimeric collagen triple helices. Organic & Biomolecular Chemistry. PMID 33565556 DOI: 10.1039/d0ob02190c  0.32
2021 Chen TH, Hong JY, Liu CC, Chen CC, Jan JT, Wu SC. Production of Multi-Subtype Influenza Virus-Like Particles by Molecular Fusion with BAFF or APRIL for Vaccine Development. Methods in Molecular Biology (Clifton, N.J.). 2248: 139-153. PMID 33185873 DOI: 10.1007/978-1-0716-1130-2_10  0.4
2020 Hartanto H, Wu M, Lam ML, Chen TH. Microfluidic immunoassay for detection of serological antibodies: A potential tool for rapid evaluation of immunity against SARS-CoV-2. Biomicrofluidics. 14: 061507. PMID 33343783 DOI: 10.1063/5.0031521  0.32
2020 Tang N, Lu CY, Sue SC, Chen TH, Jan JT, Huang MH, Huang CH, Chen CC, Chiang BL, Huang LM, Wu SC. Type IIb Heat Labile Enterotoxin B Subunit as a Mucosal Adjuvant to Enhance Protective Immunity against H5N1 Avian Influenza Viruses. Vaccines. 8. PMID 33266210 DOI: 10.3390/vaccines8040710  0.4
2020 Bao Y, Wu S, Chu LT, Kwong HK, Hartanto H, Huang Y, Lam ML, Lam RHW, Chen TH. Early Committed Clockwise Cell Chirality Upregulates Adipogenic Differentiation of Mesenchymal Stem Cells. Advanced Biosystems. e2000161. PMID 32864891 DOI: 10.1002/adbi.202000161  0.32
2020 Chen TH, Chen CC, Huang MH, Huang CH, Jan JT, Wu SC. Use of PELC/CpG Adjuvant for Intranasal Immunization with Recombinant Hemagglutinin to Develop H7N9 Mucosal Vaccine. Vaccines. 8. PMID 32455704 DOI: 10.3390/vaccines8020240  0.4
2019 Kwong HK, Huang Y, Bao Y, Lam ML, Chen TH. Remnant Effects of Culture Density on Cell Chirality After Reseeding. Acs Biomaterials Science & Engineering. 5: 3944-3953. PMID 33417759 DOI: 10.1021/acsbiomaterials.8b01364  0.32
2019 Tang N, Lin SW, Chen TH, Jan JT, Wu HY, Wu SC. Highly Pathogenic Avian Influenza H5 Hemagglutinin Fused with the A Subunit of Type IIb Heat Labile Enterotoxin Elicited Protective Immunity and Neutralization by Intranasal Immunization in Mouse and Chicken Models. Vaccines. 7. PMID 31766677 DOI: 10.3390/vaccines7040193  0.4
2019 Chen TH, Liu WC, Chen IC, Liu CC, Huang MH, Jan JT, Wu SC. Recombinant hemagglutinin produced from Chinese Hamster Ovary (CHO) stable cell clones and a PELC/CpG combination adjuvant for H7N9 subunit vaccine development. Vaccine. PMID 31383491 DOI: 10.1016/j.vaccine.2019.02.040  0.4
2019 Wu PY, Chen CY, Li JH, Lin JK, Chen TH, Huang SL, Huang SJ, Cheng RP. Effect of arginine deimination and citrulline side chain length on secondary structure formation. Chembiochem : a European Journal of Chemical Biology. PMID 31071235 DOI: 10.1002/cbic.201900231  0.56
2019 Hong JY, Chen TH, Chen YJ, Liu CC, Jan JT, Wu SC. Highly immunogenic influenza virus-like particles containing B-cell-activating factor (BAFF) for multi-subtype vaccine development. Antiviral Research. PMID 30738089 DOI: 10.1016/j.antiviral.2019.02.004  0.4
2018 Chen TH, Chen JS, Ko YC, Chen JW, Chu HY, Lu CS, Chu CW, Hsu HH, Tseng FG. A Microfluidic Platform for Investigating Transmembrane Pressure-Induced Glomerular Leakage. Micromachines. 9. PMID 30424161 DOI: 10.3390/mi9050228  0.32
2018 Chen TH, Liu WC, Lin CY, Liu CC, Jan JT, Spearman M, Butler M, Wu SC. Glycan-masking hemagglutinin antigens from stable CHO cell clones for H5N1 avian influenza vaccine development. Biotechnology and Bioengineering. PMID 30080931 DOI: 10.1002/bit.26810  0.56
2018 Bao Y, Huang Y, Lam ML, Xu T, Zhu N, Guo Z, Cui X, Lam RHW, Chen TH. Retraction of "Substrate Stiffness Regulates the Development of Left-Right Asymmetry in Cell Orientation". Acs Applied Materials & Interfaces. PMID 30028586 DOI: 10.1021/acsami.8b10621  0.32
2018 Huang Y, Bao Y, Kwong HK, Chen TH, Lam ML. Outline-etching image segmentation reveals enhanced cell chirality through intercellular alignment. Biotechnology and Bioengineering. PMID 29959862 DOI: 10.1002/bit.26783  0.32
2018 Hu S, Chen TH, Zhao Y, Wang Z, Lam RHW. Protein-Substrate Adhesion in Microcontact Printing Regulates Cell Behaviors. Langmuir : the Acs Journal of Surfaces and Colloids. PMID 29304548 DOI: 10.1021/acs.langmuir.7b02935  0.48
2017 Chen TH, Liu YY, Jan JT, Huang MH, Spearman M, Butler M, Wu SC. Recombinant hemagglutinin proteins formulated in a novel PELC/CpG adjuvant for H7N9 subunit vaccine development. Antiviral Research. 146: 213-220. PMID 28947234 DOI: 10.1016/j.antiviral.2017.09.014  0.4
2017 Zhao Z, Bao Y, Chu LT, Ho JKL, Chieng CC, Chen TH. Microfluidic bead trap as a visual bar for quantitative detection of oligonucleotides. Lab On a Chip. PMID 28869261 DOI: 10.1039/c7lc00836h  0.32
2017 Zhu X, Gojgini S, Chen TH, Fei P, Dong S, Ho CM, Segura T. Directing three-dimensional multicellular morphogenesis by self-organization of vascular mesenchymal cells in hyaluronic acid hydrogels. Journal of Biological Engineering. 11: 12. PMID 28392831 DOI: 10.1186/s13036-017-0055-6  0.48
2017 Xu T, Lam ML, Chen TH. Discrete Element Model for Suppression of Coffee-Ring Effect. Scientific Reports. 7: 42817. PMID 28216639 DOI: 10.1038/srep42817  0.32
2016 Zhu X, Gojgini S, Chen TH, Teng F, Fei P, Dong S, Segura T, Ho CM. Three dimensional tubular structure self-assembled by vascular mesenchymal cells at stiffness interfaces of hydrogels. Biomedicine & Pharmacotherapy = Biomedecine & Pharmacotherapie. 83: 1203-1211. PMID 27562720 DOI: 10.1016/j.biopha.2016.08.018  0.48
2016 Liu WC, Liu YY, Chen TH, Liu CC, Jan JT, Wu SC. Multi-subtype influenza virus-like particles incorporated with flagellin and granulocyte-macrophage colony-stimulating factor for vaccine design. Antiviral Research. PMID 27491439 DOI: 10.1016/j.antiviral.2016.07.021  0.4
2016 Liu WC, Jan JT, Huang YJ, Chen TH, Wu SC. Unmasking stem-specific neutralizing epitopes by abolishing N-linked glycosylation sites of influenza hemagglutinin proteins for vaccine design. Journal of Virology. PMID 27440889 DOI: 10.1128/JVI.00880-16  0.4
2016 Liu W, Bao Y, Lam ML, Xu T, Xie K, Man HS, Chan EY, Zhu N, Lam RH, Chen TH. Nanowire Magnetoscope Reveals a Cellular Torque with Left-Right Bias. Acs Nano. PMID 27389867 DOI: 10.1021/acsnano.6b01142  0.48
2016 Bao Y, Huang Y, Lam ML, Xu T, Zhu N, Guo Z, Cui X, Lam RH, Chen TH. Substrate Stiffness Regulates the Development of Left-Right Asymmetry in Cell Orientation. Acs Applied Materials & Interfaces. PMID 27359036 DOI: 10.1021/acsami.6b06789  0.48
2016 Zhou H, Zhao S, Yin D, Chen X, Xu Q, Chen T, Li X, Wang J, Li H, Peng C, Lin D, Wei S. Optic neuritis: a 5-year follow-up study of Chinese patients based on aquaporin-4 antibody status and ages. Journal of Neurology. PMID 27159992 DOI: 10.1007/s00415-016-8155-7  0.44
2016 Xue L, Geng Y, Li M, Jin YF, Ren HX, Li X, Wu F, Wang B, Cheng WY, Chen T, Chen YJ. The effects of D3R on TLR4 signaling involved in the regulation of METH-mediated mast cells activation. International Immunopharmacology. 36: 187-198. PMID 27156126 DOI: 10.1016/j.intimp.2016.04.030  0.44
2016 Nan J, Yao M, Chen T, Li S, Wang Z, Feng G. Breakage and regrowth of flocs formed by sweep coagulation using additional coagulant of poly aluminium chloride and non-ionic polyacrylamide. Environmental Science and Pollution Research International. PMID 27155836 DOI: 10.1007/s11356-016-6805-z  0.48
2016 Wu JX, Chen GC, Wu MJ, Lin CH, Chen T. Bilateral photoplethysmography for arterial steal detection in arteriovenous fistula using a fractional-order decision-making quantizer. Medical & Biological Engineering & Computing. PMID 27154237 DOI: 10.1007/s11517-016-1503-z  0.88
2016 Chen DY, Mao CT, Tsai ML, Chen SW, Lin YS, Hsieh IC, Hung MJ, Wang CH, Wen MS, Cherng WJ, Chen TH. Clinical outcomes of drug-eluting stents versus bare-metal stents in patients with cardiogenic shock complicating acute myocardial infarction. International Journal of Cardiology. 215: 98-104. PMID 27111168 DOI: 10.1016/j.ijcard.2016.04.014  0.48
2016 Ma T, Chen T, Li P, Ye Z, Zhai W, Jia L, Chen W, Sun A, Huang Y, Wei S, Li Z. Heme Oxygenase-1 (HO-1) Protects Human Lens Epithelial Cells (SRA01/04) against Hydrogen Peroxide (H2O2)-Induced Oxidative Stress and Apoptosis. Experimental Eye Research. PMID 26992777 DOI: 10.1016/j.exer.2016.02.013  0.32
2016 Wang X, Raghavan A, Chen T, Qiao L, Zhang Y, Ding Q, Musunuru K. CRISPR-Cas9 Targeting of PCSK9 in Human Hepatocytes In Vivo. Arteriosclerosis, Thrombosis, and Vascular Biology. PMID 26941020 DOI: 10.1161/ATVBAHA.116.307227  0.44
2016 Quan YY, Qin GQ, Huang H, Liu YH, Wang XP, Chen TS. Dominant roles of Fenton reaction in sodium nitroprusside-induced chondrocyte apoptosis. Free Radical Biology & Medicine. PMID 26923801 DOI: 10.1016/j.freeradbiomed.2016.02.026  0.52
2016 Chen TH, Chou SM, Tang CH, Chen CY, Meng PJ, Ko FC, Cheng JO. Endocrine disrupting effects of domestic wastewater on reproduction, sexual behavior, and gene expression in the brackish medaka Oryzias melastigma. Chemosphere. PMID 26919805 DOI: 10.1016/j.chemosphere.2016.02.057  0.32
2016 Li J, Chen T, Li K, Yan H, Li X, Yang Y, Zhang Y, Su B, Li F. Neurolytic celiac plexus block enhances skeletal muscle insulin signaling and attenuates insulin resistance in GK rats Experimental and Therapeutic Medicine. 11: 2033-2041. DOI: 10.3892/etm.2016.3087  0.44
2016 Liao Y, Chen T, Luo X, Fu Z, Li X, Li W. Cycling performance improvement of polypropylene supported poly(vinylidene fluoride-co-hexafluoropropylene)/maleic anhydride-grated-polyvinylidene fluoride based gel electrolyte by incorporating nano-Al2O3 for full batteries Journal of Membrane Science. 507: 126-134. DOI: 10.1016/j.memsci.2016.02.001  0.44
2016 Tong J, Qu Y, Li K, Chen TF, Yang JZ. The molar surface Gibbs energy of the aqueous solution of the ionic liquid [C6mim][OAc] Journal of Chemical Thermodynamics. 97: 362-366. DOI: 10.1016/j.jct.2016.02.001  0.44
2016 Chen TH, Lee YS, Lin CH. On the difficulty of aligning VSS random grids Signal Processing: Image Communication. 44: 101-107. DOI: 10.1016/j.image.2016.03.006  0.92
2016 Lang W, Chen T, Li X. A new style of urbanization in China: Transformation of urban rural communities Habitat International. 55: 1-9. DOI: 10.1016/j.habitatint.2015.10.009  0.44
2016 Cui L, Pan G, Li L, Bian R, Liu X, Yan J, Quan G, Ding C, Chen T, Liu Y, Yin C, Wei C, Yang Y, Hussain Q. Continuous immobilization of cadmium and lead in biochar amended contaminated paddy soil: A five-year field experiment Ecological Engineering. 93: 1-8. DOI: 10.1016/j.ecoleng.2016.05.007  0.44
2016 Chen T, Lin H, Guan B, Gong X, Li K, Huang Z. Promoting the low temperature activity of Ti-V-O catalysts by premixed flame synthesis Chemical Engineering Journal. 296: 45-55. DOI: 10.1016/j.cej.2015.08.115  0.44
2016 Shi Y, Zhong L, Chen T, Yu H. Tourism competitiveness evaluation and spatio-temporal characteristics of Chinese border counties Chinese Geographical Science. 1-12. DOI: 10.1007/s11769-016-0822-1  0.48
2016 Nguyen MH, Nguyen HB, Nguyen TH, Vu XM, Lai JR, Tseng FG, Chen TC, Lee MC. SU-8 Lenses: Simple Methods of Fabricationand Application in Optical Interconnection BetweenFiber/LED and Microstructures Journal of Electronic Materials. 1-7. DOI: 10.1007/s11664-016-4408-6  0.32
2016 Huang JC, Jeng FG, Chen TH. A new buyer-seller watermarking protocol without multiple watermarks insertion Multimedia Tools and Applications. 1-13. DOI: 10.1007/s11042-016-3573-1  0.92
2016 Wang T, Wu J, Chen T, Li F, Zuo T, Liu S. Surface roughness analysis and thermal bonding of microfluidic chips fabricated by CD/DVD manufacturing technology Microsystem Technologies. 1-5. DOI: 10.1007/s00542-016-2957-5  0.4
2016 Jeng FG, Huang JC, Chen TH. An improved anonymous buyer-reseller watermarking protocol International Journal of Network Security. 18: 728-735.  0.92
2016 Jeng FG, Lin SY, Wang BJ, Wang CH, Chen TH. On the security of privacy-preserving keyword searching for cloud storage services International Journal of Network Security. 18: 597-600.  0.92
2015 Chen S, Chu LT, Yeung PP, Zhao Z, Bao Y, Chan MS, Lo PK, Chen TH. Enzyme-Free Amplification by Nano-"Sticky Balls" for Visual Detection of ssDNA/RNA Oligonucleotides. Acs Applied Materials & Interfaces. PMID 26430877 DOI: 10.1021/acsami.5b05018  0.48
2015 Lam ML, Chen B, Chen TH. Optimization of Combinatory Nicking Endonucleases for Accurate Identification of Nucleic Acids in Low Abundance. Journal of Laboratory Automation. PMID 25732353 DOI: 10.1177/2211068215573190  0.48
2015 Chen T, Xu Y, Wang D, Shi W, Cui F. The impact of recycling sludge on water quality in coagulation for treating low-turbidity source water Desalination and Water Treatment. DOI: 10.1080/19443994.2015.1070762  0.48
2015 Lin CH, Lee YS, Chen TH. Friendly progressive random-grid-based visual secret sharing with adaptive contrast Journal of Visual Communication and Image Representation. 33: 31-41. DOI: 10.1016/j.jvcir.2015.08.018  0.92
2015 Jeng FG, Huang WL, Chen TH. Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes Signal Processing: Image Communication. 34: 45-51. DOI: 10.1016/j.image.2015.03.003  0.92
2015 Tsao KH, Shyu SJ, Lin CH, Lee YS, Chen TH. Visual multiple-secret sharing for flexible general access structure by random grids Displays. 39: 80-92. DOI: 10.1016/j.displa.2015.09.001  0.92
2015 Jeng FG, Wu YT, Chen TH. A multi-watermarking protocol for health information management Multimedia Tools and Applications. DOI: 10.1007/s11042-015-2728-9  0.92
2015 Li CL, Lin CY, Chen TH. Efficient compression-jointed quality controllable scrambling method for H.264/SVC International Journal of Network Security. 17: 290-297.  0.92
2014 Hsu KF, Chou HH, Huang CY, Fu HC, Chiang AJ, Tsai HW, Chen JR, Cheng WF, Ke YM, Chang CC, Chen TH, Lin SH, Ho CM. Prognostic factors and treatment outcomes for patients with surgically staged uterine clear cell carcinoma focusing on the early stage: A Taiwanese Gynecologic Oncology Group study. Gynecologic Oncology. 134: 516-22. PMID 25019570 DOI: 10.1016/j.ygyno.2014.07.005  0.48
2014 Chen TH. Tissue regeneration: from synthetic scaffolds to self-organizing morphogenesis. Current Stem Cell Research & Therapy. 9: 432-43. PMID 24804887  0.48
2014 Guo Y, Chen TH, Zeng X, Warburton D, Boström KI, Ho CM, Zhao X, Garfinkel A. Branching patterns emerge in a mathematical model of the dynamics of lung development. The Journal of Physiology. 592: 313-24. PMID 24247979 DOI: 10.1113/jphysiol.2013.261099  0.48
2014 Leea WB, Chen TH, Sun WR, Ho KIJ. An S/Key-like one-time password authentication scheme using smart cards for smart meter Proceedings - 2014 Ieee 28th International Conference On Advanced Information Networking and Applications Workshops, Ieee Waina 2014. 281-286. DOI: 10.1109/WAINA.2014.78  0.92
2014 Lin CH, Chen TH, Wu YT, Tsao KH, Lin KS. Multi-factor cheating prevention in visual secret sharing by hybrid codebooks Journal of Visual Communication and Image Representation. 25: 1543-1557. DOI: 10.1016/j.jvcir.2014.06.011  0.92
2014 Jeng FG, Lin KS, Lin CH, Chen TH. Visual multi-secret sharing with friendliness Journal of Shanghai Jiaotong University (Science). 19: 455-465. DOI: 10.1007/s12204-014-1525-3  0.92
2014 Lin KS, Chen TH, Lin CH, Chang SS. A tailor-made encryption scheme for high-dynamic range images Advances in Intelligent Systems and Computing. 238: 183-192. DOI: 10.1007/978-3-319-01796-9_19  0.92
2014 Chang SS, Lin CH, Chen TH, Lin KS. Robust watermarking for multiple images and users based on visual cryptography Advances in Intelligent Systems and Computing. 238: 175-182. DOI: 10.1007/978-3-319-01796-9_18  0.92
2013 Lin CH, Lin SY, Chen TH. Dynamic range optimization by flexible local contrast enhancement using luminance map Proceedings of Spie - the International Society For Optical Engineering. 8878. DOI: 10.1117/12.2031720  0.92
2013 Lin CH, Chen TH, Wu CS. A batch image encryption scheme based on chaining random grids Scientia Iranica. 20: 670-681. DOI: 10.1016/j.scient.2013.05.003  0.92
2013 Chen TH, Lee YS, Huang WL, Juan JST, Chen YY, Li MJ. Quality-adaptive visual secret sharing by random grids Journal of Systems and Software. 86: 1267-1274. DOI: 10.1016/j.jss.2012.12.022  0.92
2013 Chen TH, Wang BJ, Lee YS. A random grid-based cyclic access structure VSS scheme for multiple secret images Displays. 34: 380-387. DOI: 10.1016/j.displa.2013.09.005  0.92
2013 Lin CH, Chen TH, Chiu CW. Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern Displays. 34: 59-68. DOI: 10.1016/j.displa.2012.11.004  0.92
2013 Chen TH, Wang BJ, Tu TY, Wang CH. A security-enhanced key agreement protocol based on chaotic maps Security and Communication Networks. 6: 108-114. DOI: 10.1002/sec.537  0.92
2012 Wong MN, Nguyen TP, Chen TH, Hsu JJ, Zeng X, Saw A, Demer EM, Zhao X, Tintut Y, Demer LL. Preferred mitotic orientation in pattern formation by vascular mesenchymal cells. American Journal of Physiology. Heart and Circulatory Physiology. 303: H1411-7. PMID 23064835 DOI: 10.1152/ajpheart.00625.2012  0.48
2012 Chen TH, Zhu X, Pan L, Zeng X, Garfinkel A, Tintut Y, Demer LL, Zhao X, Ho CM. Directing tissue morphogenesis via self-assembly of vascular mesenchymal cells. Biomaterials. 33: 9019-26. PMID 23010575 DOI: 10.1016/j.biomaterials.2012.08.067  0.48
2012 Chen TH, Guo C, Zhao X, Yao Y, Boström KI, Wong MN, Tintut Y, Demer LL, Ho CM, Garfinkel A. Patterns of periodic holes created by increased cell motility. Interface Focus. 2: 457-64. PMID 22649581 DOI: 10.1098/rsfs.2012.0001  0.48
2012 Chen TH, Hsu JJ, Zhao X, Guo C, Wong MN, Huang Y, Li Z, Garfinkel A, Ho CM, Tintut Y, Demer LL. Left-right symmetry breaking in tissue morphogenesis via cytoskeletal mechanics. Circulation Research. 110: 551-9. PMID 22223355 DOI: 10.1161/CIRCRESAHA.111.255927  0.48
2012 Tu TY, Wang CH, Chen TH. A high-capacity data hiding scheme by vector quantization index with search-order coding Advanced Science Letters. 9: 822-827. DOI: 10.1166/asl.2012.2640  0.92
2012 Chen TH, Tsao KH, Lee YS. Yet another multiple-image encryption by rotating random grids Signal Processing. 92: 2229-2237. DOI: 10.1016/j.sigpro.2012.02.015  0.92
2012 Lin CY, Prangjarote P, Kang LW, Huang WL, Chen TH. Joint fingerprinting and decryption with noise-resistant for vector quantization images Signal Processing. 92: 2159-2171. DOI: 10.1016/j.sigpro.2012.02.002  0.92
2012 Lee YS, Chen TH. Insight into collusion attacks in random-grid-based visual secret sharing Signal Processing. 92: 727-736. DOI: 10.1016/j.sigpro.2011.09.015  0.92
2012 Chen TH, Li KC. Multi-image encryption by circular random grids Information Sciences. 189: 255-265. DOI: 10.1016/j.ins.2011.11.026  0.92
2012 Jeng FG, Lin SY, Wang BJ, Lin CH, Chen TH. On the security of time-bound hierarchical key management scheme for secure broadcasting Icic Express Letters. 6: 2541-2544.  0.92
2012 Chen TH, Lee YS. A new random-grid-based visual secret sharing by edge enhancement Journal of Computational Information Systems. 8: 1507-1513.  0.92
2011 Wong TS, Chen TH, Shen X, Ho CM. Nanochromatography driven by the coffee ring effect. Analytical Chemistry. 83: 1871-3. PMID 21288015 DOI: 10.1021/ac102963x  0.48
2011 Chen TH, Tsao KH. User-friendly random-grid-based visual secret sharing Ieee Transactions On Circuits and Systems For Video Technology. 21: 1693-1703. DOI: 10.1109/TCSVT.2011.2133470  0.92
2011 Chen TH, Wu CS. Efficient multi-secret image sharing based on Boolean operations Signal Processing. 91: 90-97. DOI: 10.1016/j.sigpro.2010.06.012  0.92
2011 Chen TH, Tsao KH. Threshold visual secret sharing by random grids Journal of Systems and Software. 84: 1197-1208. DOI: 10.1016/j.jss.2011.02.023  0.92
2011 Chen TH, Li CL. An enhanced threshold authenticated encryption scheme with convertibility International Journal of Innovative Computing, Information and Control. 7: 6177-6185.  0.92
2010 Chen TH, Wu YT. A new protocol of wide use for e-mail with perfect forward secrecy Journal of Zhejiang University: Science C. 11: 74-78. DOI: 10.1631/jzus.A0910126  0.92
2010 Chen TH, Huang WL, Lin CY. Chaos-based image integrity authentication code Proceedings - 2010 6th International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iihmsp 2010. 13-16. DOI: 10.1109/IIHMSP.2010.11  0.92
2010 Lin CY, Huang WL, Chen TH. Noise-resistant joint fingerprinting and decryption based on vector quantization Proceedings - 2010 International Conference On Broadband, Wireless Computing Communication and Applications, Bwcca 2010. 463-468. DOI: 10.1109/BWCCA.2010.115  0.92
2010 Chen TH, Lee YS, Li CL. High-capacity multi-secret sharing by random grid Proceedings - 2010 International Conference On Broadband, Wireless Computing Communication and Applications, Bwcca 2010. 459-462. DOI: 10.1109/BWCCA.2010.114  0.92
2010 Chen TH, Huang JC. A novel user-participating authentication scheme Journal of Systems and Software. 83: 861-867. DOI: 10.1016/j.jss.2009.12.022  0.92
2010 Chen TH, Wu CS. Compression-unimpaired batch-image encryption combining vector quantization and index compression Information Sciences. 180: 1690-1701. DOI: 10.1016/j.ins.2009.12.021  0.92
2010 Chen TH, Hung TH, Wu YT. Lightweight key management of drm systems International Journal of Innovative Computing, Information and Control. 6: 5657-5664.  0.92
2010 Wang HL, Chen TH, Li LS, Wu YT, Chen J. An authenticated key exchange protocol for mobile stations from two distinct home networks International Journal of Innovative Computing, Information and Control. 6: 4125-4132.  0.92
2010 Chen T, Chiu C. A new hierarchical digital image authentication method for tamper detection and recovery against microdotting attacks Journal of Computational Information Systems. 6: 1705-1715.  0.92
2010 Wang C, Chen T, Chiu C, Wei S. Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment Journal of Computational Information Systems. 6: 1737-1742.  0.92
2010 Chen T. Remarks on some watermarking schemes based on DWT Journal of Computational Information Systems. 6: 1571-1575.  0.92
2009 Chen TH, Tsao KH, Yang YT. Friendly color visual secret sharing by random grids Fundamenta Informaticae. 96: 61-70. DOI: 10.3233/FI-2009-167  0.92
2009 Chang CC, Chen TH, Liu LJ. Preventing cheating in computational visual cryptography Fundamenta Informaticae. 92: 27-42. DOI: 10.3233/FI-2009-0064  0.92
2009 Leea WB, Li JH, Chena SC, Chen TH. An authenticated secure image hiding scheme Imaging Science Journal. 57: 109-117. DOI: 10.1179/174313109X406722  0.92
2009 Chen TH, Wu YT, Lin YR. Medical video encryption based on H.264/AVC with near-lossless compression Iih-Msp 2009 - 2009 5th International Conference On Intelligent Information Hiding and Multimedia Signal Processing. 889-892. DOI: 10.1109/IIH-MSP.2009.139  0.92
2009 Chen TH, Lee YS. Yet another friendly progressive visual secret sharing scheme Iih-Msp 2009 - 2009 5th International Conference On Intelligent Information Hiding and Multimedia Signal Processing. 353-356. DOI: 10.1109/IIH-MSP.2009.135  0.92
2009 Chen TH, Tsao KH. Visual secret sharing by random grids revisited Pattern Recognition. 42: 2203-2217. DOI: 10.1016/j.patcog.2008.11.015  0.92
2009 Tsai DS, Horng G, Chen TH, Huang YT. A novel secret image sharing scheme for true-color images with size constraint Information Sciences. 179: 3247-3254. DOI: 10.1016/j.ins.2009.05.020  0.92
2009 Chen TH, Chang CC, Wu CS, Lou DC. On the security of a copyright protection scheme based on visual cryptography Computer Standards and Interfaces. 31: 1-5. DOI: 10.1016/j.csi.2007.09.001  0.92
2009 Chen TH, Lee WB, Chen HB. A self-verification authentication mechanism for mobile satellite communication systems Computers and Electrical Engineering. 35: 41-48. DOI: 10.1016/j.compeleceng.2008.05.003  0.92
2009 Chen TH, Wang CH, Hung TH, Huang JC. Remarks on a dynamic key management scheme for user hierarchical access control Journal of Computational Information Systems. 5: 1501-1504.  0.92
2009 Horng G, Wang CL, Chen TH. An efficient concealed data aggregation scheme for sensor networks based on secret sharing International Journal of Innovative Computing, Information and Control. 5: 3085-3097.  0.92
2009 Lin RD, Chen TH, Huang CC, Lee WB, Chen WSE. A secure image authentication scheme with tampering proof and remedy based on hamming code International Journal of Innovative Computing, Information and Control. 5: 2603-2617.  0.92
2009 Chen TH. An Authentication protocol with billing non-repudiation to personal communication systems International Journal of Innovative Computing, Information and Control. 5: 2657-2664.  0.92
2009 Chen H, Chen T, Chang C, Lee W. A new E-coupon system with security and efficiency in mobile commerce Journal of Computational Information Systems. 5: 1059-1065.  0.92
2009 Chen TH, Wu CS. Integrated batch encryption to still images Chung Cheng Ling Hsueh Pao/Journal of Chung Cheng Institute of Technology. 37: 81-87.  0.92
2008 Tsai DS, Chen T, Horng G. On generating meaningful shares in visual secret sharing scheme Imaging Science Journal. 56: 49-55. DOI: 10.1179/174313107X214330  0.92
2008 Chen TH, Tsao KH, Wei KC. Multiple-image encryption by rotating random grids Proceedings - 8th International Conference On Intelligent Systems Design and Applications, Isda 2008. 3: 252-256. DOI: 10.1109/ISDA.2008.141  0.92
2008 Yeh JS, Yang SR, Chang CC, Chen TH. Assigning keys in a hierarchy Proceedings - 2008 4th International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iih-Msp 2008. 1363-1366. DOI: 10.1109/IIH-MSP.2008.60  0.92
2008 Chen TH, Lee WB, Chen HB. A round- and computation-efficient three-party authenticated key exchange protocol Journal of Systems and Software. 81: 1581-1590. DOI: 10.1016/j.jss.2007.11.720  0.92
2008 Chen HB, Chen TH, Lee WB, Chang CC. Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks Computer Standards and Interfaces. 30: 95-99. DOI: 10.1016/j.csi.2007.08.010  0.92
2008 Chen TH, Lee WB. A new method for using hash functions to solve remote user authentication Computers and Electrical Engineering. 34: 53-62. DOI: 10.1016/j.compeleceng.2007.01.001  0.92
2008 Chen TH, Tsao KH, Wu CS. Multi-secrets visual secret sharing 2008 14th Asia-Pacific Conference On Communications, Apcc 2008 0.92
2008 Chen TH, Hung TH, Horng G, Chang CM. Multiple watermarking based on visual secret sharing International Journal of Innovative Computing, Information and Control. 4: 3005-3026.  0.92
2008 Chen T, Huang J. Simple and secure AKE protocol with perfect forward secrecy Journal of Computational Information Systems. 4: 1385-1391.  0.92
2008 Chen TH, Horng G, Yang CS. Public key authentication schemes for local area networks Informatica. 19: 3-16.  0.92
2007 Chen TH, Wu CS, Lee WB. A novel subliminal channel found in visual cryptography and its application to image hiding Proceedings - 3rd International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iihmsp 2007.. 1: 421-425. DOI: 10.1109/IIH-MSP.2007.51  0.92
2007 Tsai CC, Liao KC, Chen TH, Lee WB. Security enhancement of a novel proxy key generation protocol Proceedings - International Computer Software and Applications Conference. 2: 681-685. DOI: 10.1109/COMPSAC.2007.186  0.92
2007 Tsai DS, Chen TH, Horng G. A cheating prevention scheme for binary visual cryptography with homogeneous secret images Pattern Recognition. 40: 2356-2366. DOI: 10.1016/j.patcog.2007.01.013  0.92
2007 Chen TH, Horng G. A lightweight and anonymous copyright-protection protocol Computer Standards and Interfaces. 29: 229-237. DOI: 10.1016/j.csi.2006.03.010  0.92
2007 Chen TH, Hung TH. An adaptive and transient authentication protocol for mobile device Wmsci 2007 - the 11th World Multi-Conference On Systemics, Cybernetics and Informatics, Jointly With the 13th International Conference On Information Systems Analysis and Synthesis, Isas 2007 - Proc.. 3: 147-151.  0.92
2007 Chen HB, Chen TH, Lee WB, Lin RD. Security analysis of a password-based simple three-party key exchange protocol Wseas Transactions On Information Science and Applications. 4: 1371-1377.  0.92
2007 Chen TH, Horng G, Wu KC. A secure YS-like user authentication scheme Informatica. 18: 27-36.  0.92
2006 Lee WB, Chen TH, Lee CC. Security of new encryption algorithm for image cryptosystems Imaging Science Journal. 54: 178-187. DOI: 10.1179/174313106X93723  0.92
2006 Chen TH, Tsai DS. Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol Pattern Recognition. 39: 1530-1541. DOI: 10.1016/j.patcog.2006.02.009  0.92
2006 Horng G, Chen T, Tsai DS. Cheating in visual cryptography Designs, Codes, and Cryptography. 38: 219-236. DOI: 10.1007/s10623-005-6342-0  0.92
2006 Lee WB, Chen TH, Lo JW, Chang CY. An efficient group signature based on PSS-R Wseas Transactions On Information Science and Applications. 3: 1804-1809.  0.92
2005 Chen TH, Horng G, Lee WB. A publicly verifiable copyright-proving scheme resistant to malicious attacks Ieee Transactions On Industrial Electronics. 52: 327-334. DOI: 10.1109/TIE.2004.841083  0.92
2005 Chen TH, Lee WB, Horng G. Remarks on some signature schemes based on factoring and discrete logarithms Applied Mathematics and Computation. 169: 1070-1075. DOI: 10.1016/j.amc.2004.11.007  0.92
2005 Chen TH, Horng G, Tsai D. An anonymous buyer-reseller watermarking protocol Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series a/Chung-Kuo Kung Ch'Eng Hsuch K'An. 28: 535-538.  0.92
2004 Chen TH, Lee WB, Horng G. Secure SAS-like password authentication schemes Computer Standards and Interfaces. 27: 25-31. DOI: 10.1016/j.csi.2004.02.004  0.92
Show low-probability matches.