scispace - formally typeset
J

Jiun-Long Huang

Researcher at National Chiao Tung University

Publications -  109
Citations -  1824

Jiun-Long Huang is an academic researcher from National Chiao Tung University. The author has contributed to research in topics: Mobile computing & Wireless sensor network. The author has an hindex of 20, co-authored 107 publications receiving 1582 citations. Previous affiliations of Jiun-Long Huang include National Taiwan University & Industrial Technology Research Institute.

Papers
More filters
Journal ArticleDOI

ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks

TL;DR: An anonymous batch authenticated and key agreement (ABAKA) scheme to authenticate multiple requests sent from different vehicles and establish different session keys for different vehicles at the same time is introduced.
Journal ArticleDOI

On efficiently mining high utility sequential patterns

TL;DR: Experimental results on some real and synthetic datasets show that HUS-Span and TKHUS- span with strategy BFS are able to generate less candidate sequences and thus outperform other prior algorithms in terms of mining efficiency.
Journal ArticleDOI

Cloud-Based Fine-Grained Health Information Access Control Framework for LightweightIoT Devices with Dynamic Auditing andAttribute Revocation

TL;DR: Security analysis and performance comparisons show that the proposed scheme is an excellent candidate for a cloud-based PHI system and defines and handles the cloud reciprocity problem wherein cloud service providers can help each other avoid fines resulting from data loss.
Journal ArticleDOI

Dependent data broadcasting for unordered queries in a multiple channel mobile environment

TL;DR: By analyzing the model of dependent data broadcasting, several theoretical properties for the average access time in a multiple channel environment are derived and a genetic algorithm is developed to generate broadcast programs of very high quality.
Journal ArticleDOI

Mining top-k frequent patterns in the presence of the memory constraint

TL;DR: This paper explores in this paper a practicably interesting mining task to retrieve top-k (closed) itemsets in the presence of the memory constraint, and shows the prominent advantage to be practical algorithms of mining frequent patterns.