I-Te Chen, Yu-Hsien Chiu, Han-Chun Liao, Jer-Min Tsai, Wen-Hsien Ho, Chen-Sen Ouyang*, “Multisensors-based Verification Mechanism with Encryption and Decryption on Fault-tolerant databases,” Sensors and Materials, Volume:32, Number: 6(3), pp.2187-2197, June 30, 2020. (IF=0.599, Instruments & Instrumentation 59/64 =92.19%) [SCI]
Chun-I Fan, Jheng-Jia Huang, Shang-Wei Tseng and I-Te Chen* "Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach," IEEE Transactions on Cloud Computing, doi:10.1109/TCC.2018.2871181, September, 2018. (IF=5.967, Computer Science/ Information systems 6/155=3.87%) [SCI]
Chun-I Fan, I-Te Chen*, Chen-Kai Cheng, Jheng-Jia Huang, and Wen-Tsuen Chen, "FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Non-Designated Receivers," IEEE System Journal, Volume:22, Issue:1, pp.473 - 484, March, 2018. (IF=4.463, Computer Science/Information systems 15/155= 9.68%) [SCI]
Jer-Min Tsai, I-Te Chen, Ying-Fong Huang and Cheng-Che Lin*, "Watermarking Technique for Improved Management of Digital Medical Images," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 18, No. 6, pp.785-799, December, 2015. [EI]
Fu-I Chou, Yi-Lung Chiang, I-Te Chen and Jinn-Tsong Tsai*, "Genetic Algorithm for Optimal Resolution Planning in DOE-based Taguchi Method," Journal of Chinese Society of Mechanical Engineers, Vol.36, No.6, pp.481~490, Dec, 2015. (IF=0.274, Engineering, Mechanical 114/125) [SCI]
Shi HY, Hwang SL, Lee IC, Chen IT, Lee KT,* Lin CL, "Trends and Outcome Predictors after Traumatic Brain Injury Surgery: A Nationwide Population-Based Study in Taiwan," Journal of Neurosurgery, Accepted 2014.(SCI, 1st Revision, IF=3.148, SURGERY 21/198)
I-Te Chen “Random Numbers Generated from Audio and Video Sources,” Vol. 2013, Article ID: 285373, Mathematical Problems in Engineering, 2013. IF: 1.383, ranking: 23/90 (25.56%) [SCI]
I-Te Chen, Jinn-Tsong Tsai, Ching-Feng Wen and Wen-Hsien Ho*, “Artificial neural network with hybrid Taguchi-genetic algorithm for nonlinear MIMO model of machining processes”, Int. J. of Innovative Computing, Information and Control, Vol. 9, No.4, pp.1455-1475, April, 2013. [SCIE]
I-Te Chen, Jer-Min Tsai, and Jengnan Tzeng*, “Re-encryption method designed by Row Complete Matrix,” Mathematical Problems in Engineering, Vol. 2012, Article ID 402890. [SCI] IF: 0.777, ranking: 42/90 (46.67%)
Jer-Min Tsai, Jengnan Tzeng, and I-Te Chen*, "Random Number Generated from white noise of Video," ICIC Express Letter, Vol.6, No.7, pp. 1827-1832, 2012. [EI]
Wen-Hsien Ho, Shinn-Horng Chen, I-Te Chen, Jyh-Horng Chou and Chun-Chin Shuk, "Design of Stable and Quadratic-Optimal Static Output Feedback Controllers for TS-Fuzzy-Model- Based Control Systems: An Integrative Computational Approach," International Journal of Innovative Computing, Information and Control, (IJICIC-10-09039), Vol.8, No.1(A), pp. 403-418, January 2012,. [SCIE]
Chieh-Fan Chen, Wen-Hsien Ho, Shu-Mei Yang, I-Te Chen and Hon-Yi Shi*, "Long-term prediction of emergency department revenue and visitor volume using autoregressive integrated moving average model", Computational and Mathematical Methods in Medicine, 2011, Article ID 395690. [SCI, EI] IF:0.814
Ming-Hsin Chang, I-Te Chen*, and Ming-Te Chen, "Design of Proxy signature in ECDSA," Journal of Information Assurance and Security (JIAS), Vol.5 Issue 1, pp. 360-366. 2010.
Yi-Shiung Yeh, Ting-Yu Huang, I-Te Chen, and Shih-Chin Chou,
“Analyze SHA-1 in message schedule,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 10(2007), No. 1, pp.1-7. Feb. 2007.
Yi-Shiung Yeh, I-Te Chen, Ting-Yu Huang, and Chan-Chi Wang, “
Dynamic Extended DES,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9(2006), No.2, pp.321-330, Aug. 2006.
I-Te Chen, Ming-Hsin Chang, and Yi-Shiung Yeh “
Design of proxy signature schemes in the Digital Signature Algorithm (DSA)”Journal of
Information Science and Engineering, Vol. 22 No. 4, pp. 965-973 (July 2006)[SCIE/EI]
I-Te Chen, and Yi-Shiung Yeh “
Security analysis of Transformed-Key Asymmetric Watermarking System,” IEEE Signal Processing Letters, Vol. 13,
Issue 4, pp.213- 215, April 2006. [SCIE/EI]
Yi-Shiung Yeh, I-Te Chen, and Chan-Chi Wang, “
Randomizing Encryption Mode,” Journal of Discrete Mathematical Sciences & Cryptography. Vol.
8(2005), No.3, pp.355-364.
I-Te Chen, and Yi-Shiung Yeh, “
Proxy Signature Scheme Based on Quadratic Residues,” Asian Journal of Information Technology, Vol. 4 No. 5,
pp. 541-549, May, 2005.
Yi-Shiung Yeh, Ming-Hsin Chang, I-Te Chen and I-Chen Wu “
Schnorr Blind Signature Scheme based on Elliptic Curves, ” Asian Journal of Information
Technology, Vol. 2 No. 3, pp.130-134, July-September, 2003.
Yi-Shiung Yeh, Wei Shen Lai, and I-Te Chen, “ An N-D Cryptoscheme ,”
Journal of Information & Optimization Sciences, Vol. 23, No.1, pp. 19-36,2002. [EI]