著作 (Publications)
國際期刊 (International Journal)
Lo-Yao Yeh*, Wan-Hsin Hsu, and Chih-Ya Shen, "GDPR-Compliant Personal Health Record Sharing Mechanism with Redactable Blockchain and Revocable IPFS," Accepted by IEEE Transactions on Dependable and Secure Computing. (IF=7.3, Rank: 6/108, Q1, COMPUTER SCIENCE, SOFTWARE ENGINEERING)
Bay-Yuan Hsu , Lo-Yao Yeh , Ming-Yi Chang, Chih-Ya Shen, "Willingness Maximization for Ego Network Data Extraction in Multiple Online Social Networks," IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 8, pp. 8672-8686, 1 Aug. 2023 (IF = 9.235, Rank: 10/164, Q1, COMPUTER SCIENCE, INFORMATION SYSTEMS.)
Lo-Yao Yeh, Nong-Xiang Shen, and Ren-Hung Hwang, "Blockchain-Based Privacy-Preserving and Sustainable Data Query Service Over 5G-VANETs," IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 9, pp. 15909-15921, Sept. 2022 (IF = 6.492, Rank: 5/137=3.65%, 2020 Q1, ENGINEERING, CIVIL.)
C. -C. Chang, M. -Y. Chang, J. -Y. Jhang, L. -Y. Yeh and C. -Y. Shen, "Learning to Extract Expert Teams in Social Networks," IEEE Transactions on Computational Social Systems, vol. 9, no. 5, pp. 1552-1562, Oct. 2022 (IF= 5.0, Rank: 6/24, Q1, COMPUTER SCIENCE, CYBERNETICS)
Lo-Yao Yeh*, Chih-Ya Shen, Wei-Chiao Huang, Wan-Hsin Hsu, and Hsien-Chu Wu, "GDPR-Aware Revocable P2P File-Sharing System Over Consortium Blockchain," IEEE Systems Journal, vol. 16, no. 4, pp. 5234-5245, Dec. 2022, (IF = 3.931, Rank: 63/273=23%, 2020 Q1, ENGINEERING, ELECTRICAL & ELECTRONIC.)
Lo-Yao Yeh*, Hsien-Chu Wu, “Efficient Extraction of Target Users for Package Promotion in Big Social Networks,” IEEE Transactions on Computational Social Systems, Vol. 7, No. 5, pp. 1111-1122, Oct. 2020. (IF= 5.0, Rank: 6/24, Q1, COMPUTER SCIENCE, CYBERNETICS)
Lo-Yao Yeh*, Peggy Joy Lu, Szu-Hao Huang, Jiun-Long Huang, "SOChain: A Privacy-preserving DDoS Data Exchange Service over SOC Consortium Blockchain," IEEE Transactions on Engineering Management, Vol. 67, No. 4, pp. 1487-1500, Nov 2020. (SSCI, SCI) (IF=2.784, Rank: 12/49= 24.4%, 2020, Q1, COMPUTER SCIENCE, INFORMATION SYSTEMS)
Jen-Wei Hu, Lo-Yao Yeh*, Shih-Wei Liao, Chu-Sing Yang, “An Autonomous and Malware-proof Blockchain-based Firmware Update Platform with Efficient Batch Verification for IoT Devices,” Computers & Security, Vol. 86, pp. 238-252, June 2019. (SCI) (IF=3.062, Rank: 43/155= 27.7%, 2018, Q2, COMPUTER SCIENCE, INFORMATION SYSTEMS)
Woei-Jiunn Tsaur, Lo-Yao Yeh*,” DANS: A Secure and Efficient Driver-Abnormal Notification Scheme with IoT Devices over IoV,” IEEE Systems Journal, vol. 13, no. 2, pp. 1628-1639, June 2019. (IF = 3.987, Rank: 17/83=20.4%, 2019 Q1, OPERATIONS RESEARCH & MANAGEMENT SCIENCE)
Lo-Yao Yeh, Pei-Yu Chiang, Yi-Lang Tsai, and Jiun-Long Huang, ”Cloud-based Fine-grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation,” IEEE Transactions on Cloud Computing, vol. 6, no. 2, pp. 532-544, 1 April-June 2018. (SCI IF = 7.928, Rank: 3/148=2%, 2017 Q1, COMPUTER SCIENCE,INFORMATION SYSTEMS)
Lo-Yao Yeh*, Woei-Jiunn Tsaur, and Hsin-Han Huang, “Secure IoT-based, Incentive-aware Emergency Personnel Dispatching Scheme with Weighted Fine-grained Access Control,” ACM Transactions on Intelligent Systems and Technology, Volume 9, Issue 1, No: 10, pp 1–23, 2017. (SCI, EI)(IF = 2.414, Rank: 20/144=13%, 2015 Q1, COMPUTER SCIENCE,INFORMATION SYSTEMS)
Lo-Yao Yeh*, Yu-Cheng Lin,” A Proxy-based Authentication and Billing Scheme with Incentive-aware multihop Forwarding for Vehicular Networks,” IEEE Transactions on Intelligent Transportation Systems, Vol. 15, No. 4, 2014. (SCI, EI)(IF = 2.472, Rank: 8/124=6%, 2013 Q1, ENGINEERING, CIVIL)
Lo-Yao Yeh, and Jiun-Long Huang, “PBS: A Portable Billing Scheme with Fine-Grained Access Control for Service-Oriented Vehicular Networks,” IEEE Transactions on Mobile Computing, Vol. 13, No. 11, 2014. (SCI, EI)(IF = 2.912, Rank: 6/78=7%, 2013 Q1, TELECOMMUNICATIONS)
Lo-Yao Yeh, and Jiun-Long Huang, “A Conditional Access System with Efficient Key Distribution and Revocation for Mobile Pay-TV Systems,” ACM Transactions on Multimedia Computing Communications and Applications, Vol 9, No.3, 2013. (SCI, EI)(IF = 0.935, Rank:37/100=37%, 2012 Q2, COMPUTER SCIENCE, THEORY & METHODS)
Chen-Che Huang, Lo-Yao Yeh, Jiun-Long Huang, “EDG: An Energy-Efficient Data Gathering Scheme in Wireless Sensor Networks,” INFORMATION - International Information Institute, Vol 16, No. 7, pp. 5007-5018, 2013. (SCI)
Lo-Yao Yeh*, and Woei-Jiunn Tsaur, “A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 14, No. 6, 2012. (SCI, EI)(IF = 1.935, Rank: 7/104=6%, 2011 Q1, COMPUTER SCIENCE, SOFTWARE ENGINEERING)
Lo-Yao Yeh*, Yu-Lun Huang, Anthony D. Joseph, Shiuhpyng Shieh, and Woei-Jiunn Tsaur, “A Batch Authenticated and Key Agreement Framework for P2P-based Online Social Networks,” IEEE Transactions on Vehicular Technology., Vol 61, No.4, 2012. (SCI, EI) ((IF = 1.921, Rank: 16/79=22%, 2011 Q1, TELECOMMUNICATIONS)
Lo-Yao Yeh*, Chun-Chuan Yang, Jee-Gong Chang, and Yi-Lang Tsai, “A Secure and Efficient Batch Binding Update Scheme for Route Optimization of Nested NEtwork MObility (NEMO) in VANETs,” Journal of Network and Computer Applications., Vol. 36, No. 1, 2013. (SCI)(IF=1.467, Rank 24/105=22%, 2012 Q1, Computer Science, Software Engineering)
Chen-Che Huang, Tsun-Tse Huang, Jiun-Long Huang*, Lo-Yao Yeh, “Hierarchical role-based data dissemination in wireless sensor networks,” Journal of Supercomputing, Vol. 5, 2013. (SCI)
Lo-Yao Yeh, Yen-Cheng Chen, and Jiun-Long Huang,"ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks," IEEE Journal on Selected Areas in Communications special issue on Vehicular Communications and Networks, Vol. 29, No. 3, 2011. (SCI)( IF = 4.232, Rank: 1/80 =1%, 2010 Q1 , TELECOMMUNICATIONS)
Jiun-Long Huang, Lo-Yao Yeh, Hung-Yu Chien, "ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-added Services in Vehicular Ad Hoc Networks," IEEE Transactions on Vehicular Technology, Vol. 60, No. 1, 2011. (SCI, EI)(IF = 1.912, Rank: 18/80=22%, 2010 Q1, TELECOMMUNICATIONS)
Lo-Yao Yeh*, Jee-Gong Chang, and Yi-Lang Tsai, “A Fine-grained Access Control Scheme for Secure Video Multicast,” ICIC Express Letters, Part B: Applications-An international Journal of Research and Surveys, Vol 2, No. 6, 2011. (EI)
Woei-Jiunn Tsaur and Lo-Yao Yeh ,"A Novel Mobile Agent Authentication Scheme for Multi-host Environments Using Self-certified Pairing-based Public Key Cryptosystem," International Journal of Innovative Computing, Information and Control , Vol. 7, No. 4, 2011. (SCI, EI)(IF = 1.667, Rank: 12/60=20%, 2010 Q1, AUTOMATION & CONTROL SYSTEMSTELECOMMUNICATIONS)
Lo-Yao Yeh*, Yen-Cheng Chen, and Jiun-Long Huang," PAACP: A Portable Privacy-Preserving Authentication and Access Control Protocol in Vehicular Ad hoc Networks," Computer Communications, Vol. 34, No.3, 2011. (SCI, EI) (IF = 0.816, 2010 Q2)
Lo-Yao Yeh*, Chen-Che Huang, Cheng-En Wu, and Jiun-Long Huang," ALM: An Adaptive Location Management Scheme for Approximate Location Queries in Wireless Sensor Networks," Computer Communications, Vol. 33, No. 16, 2010. (SCI, EI) (IF = 0.933, 2009 Q2)
Yen-Cheng Chen, Shu-Chuan Chuang, Lo-Yao Yeh, and Jiun-Long Huang, "A Practical Authentication Protocol with Anonymity for Wireless Access Networks," Wireless Communications and Mobile Computing, on-line version, 2010. (SCI, EI) (IF = 1.016, 2009 Q2)
Yen-Cheng Chen and Lo-Yao Yeh, "A Portable Integrated Authentication and Access Control Scheme for Distributed Embedded Systems," International Journal of Innovative Computing, Information and Control , Vol. 6, No.2, 2010. (SCI, EI)(IF=2.932, Rank: 14/103 = 13%, 2009 Q1, COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE)
Yen-Cheng Chen and Lo-Yao Yeh,"An Efficient Nonce-Based Authentication Scheme with Key Agreement," Applied Mathematics and Computation, 169, pp. 982-994, 2005. (SCI, EI) (IF = 1.536, Rank: 29/236=12%)
國際會議論文(International Conference)
Lo-Yao Yeh, Jun-Qian Jian and Jen-Wei Hu, Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting, IEEE Conference on Dependable and Secure Computing (IEEE DSC), Nov 2023.
Sheng-Po Tseng, Lo-Yao Yeh, Lee-Chi Wu, Pei-Yu Tsai, Analyzing Federated Learning with Enhanced Privacy Preservation, 2022 23rd IEEE International Conference on Mobile Data Management (MDM), June 2022.
Sheng-Po Tseng, Jan-Yue Lin, Wei-Chien Cheng, Lo-Yao Yeh, Chih-Ya Shen, Decentralized Federated Learning with Enhanced Privacy Preservation, IEEE International Conference on Multimedia and Expo Workshops (ICMEW), July 2022.
Peggy Joy Lu, Lo-Yao Yeh, Jiun-Long Huang,“An Privacy-preserving Cross-organizational Authentication/Authorization/Accounting System using Blockchain Technology,” IEEE ICC 2018.
Lo-Yao Yeh, Woei-Jiunn Tsaur, Shih-Wei Liao, Cheng-Feng Huang, Jen-Chun Chang, Ching-Ching Lin, “E-university Applications: A Privacy-Preserving Diploma Notarization Platform in Taiwan,” 17th International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE’18), 2018.
Lo-Yao Yeh, Peggy Joy Lu and Jen-Wei Hu, "NCHC Blockchain Construction Platform (NBCP): Rapidly Constructing Blockchain Nodes around Taiwan," ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL), 2017.
Lo-Yao Yeh, “A Practical Third-Party Auditor Prototype for Cloud Storage Service,” 7th IEEE International Conference on Software Engineering and Service Science (IEEE ICSESS’16), 2016.
Hsin-Han Huang, Lo-Yao Yeh, and Woei-Jiunn Tsaur, "Ultra-Lightweight Mutual Authentication and Ownership Transfer Protocol with PUF for Gen2 v2 RFID Systems," International MultiConference of Engineers and Computer Scientists (DATICS-IMECS 2016), 2016.
Lo-Yao Yeh, and Yi-Lang Tsai, “An Automated Framework for Command and Control Server Connection and Malicious Mail Detection,” The Eleventh International Conference on Networking and Services (ICNS), 2015.
Lo-Yao Yeh, Yi-Lang Tsai, and Jee-Gong Chang “A User-centric Botnet Malware Prevention and Collection System”, The Thirteenth International Conference on Networks (ICN, 2014.), 2014.
Lo-Yao Yeh, Yi-Lang Tsai, Bo-Yi Lee, and Jee-Gong Chang “An automated security framework for malware detection and infection notification,” The Ninth International Conference on Internet Monitoring and Protection (ICIMP 2014).
Lo-Yao Yeh, Yi-Lang Tsai, Bo-Yi Lee, and Jee-Gong Chang “An Automatic Botnet Detection and Notification System in Taiwan”, International Conference on Security and Management (SAM'13), 2013.
Lo-Yao Yeh, Jee-Gong Chang, Weicheng Huang, and Yi-Lang Tsai, “A localized authentication and billing scheme for proxy mobile IPv6 in VANETs,” IEEE ICC 2012.
Yi-Lang Tsai, Lo-Yao Yeh, Bo-Yi Lee, and Jee-Gong Chang, “Automated Malware Analysis Framework with Honeynet Technology in Taiwan Campuses,” IEEE ICPADS 2012.
Woei-Jiunn Tsaur, Lo-Yao Yeh, “Identifying Rootkit Infections Using a New Windows Hidden-driver-based Rootkit, “ accepted by The 2012 International Conference on Security and Management (SAM'12)
C.-C. Huang, J.-L. Huang, J.-A. Yan and L.-Y. Yeh, "An In-Network Approximate Data Gathering Algorithm Exploiting Spatial Correlation in Wireless Sensor Networks," Proceedings of the 27th ACM Symposium on Applied Computing (SAC-12), March 26-30, 2012. (8/36=22%)
G.-H. Ye, Lo-Yao Yeh and J.-L. Huang, "Hierarchical Role-based Data Dissemination for Large-Scale Wireless Sensor Networks with Mobile Sinks," IEEE PerCom Workshop, 2010.
Y. L. Huang, J. D. Tygar, H. Y. Lin, Lo-Yao Yeh, H. Y. Tsai, K. Sklower, S. P. Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, "SWOON: A Testbed for Secure Wireless Overlay Networks," USENIX Workshop on Cyber Security Experimentation and Test, 2008.
Yen-Cheng Chen, and Lo-Yao Yeh, "An Efficient Authentication and Access Control Scheme Using Smart Cards," IEEE ICPADS, Fukuoka, Japan, July 20 - 22, 2005.
國內期刊論文 (Domestic Journals)
葉羅堯、吳宗儒,"NFT-based 車輛與零件履歷驗證平台",電子商務學報(Journal of e-Business),2022. (TSSCI)
專利 (patent)
葉羅堯、盧沛怡、洪嘉賢,分散式儲存系統之同步刪除方法,專利號碼:I710238,中華民國專利.
Lo-Yao Yeh, Peggy Joy Lu, and Chia-Hsien Hung, Method of synchronous deletion for distributed storage system, US11416449B2 (美國專利).