序 |
發表人 |
論文類別(SCI/SSCI/研討會) |
論文 |
發表期刊/研討會 |
1 |
Ding-Jie Huang, Kai-Ting Yang, Wei-Chung Teng, Ge-Ming Chiu |
研討會 |
Design of Client Device Identification by Clock Skew in Clouds |
2014 IEEE International Conference on Automation Science and Engineering (CASE) |
2 |
Te-En Wei, Kuo-Ping Wu, Hahn-Ming Lee, Hsiao-Rong Tyan, Hong-Yuan Mark Liao |
研討會 |
Finding Spam Mail Patterns through Tensor Analysis |
24th Cryptology and Information Security Conference (CISC2014), , Taipei, Taiwan |
3 |
Pei-Chi Chen, Hahn-Ming Lee, Te-En Wei, Hsiao-Rong Tyan, Jain-Shing Wu |
研討會 |
Detecting spam on Twitter via message-passing based on retweet-relation |
The 2014 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2014), Taipei, Taiwan |
4 |
Pei-Chen Yeh, Hahn-Ming Lee, Hsiao-Rong Tyan, Kuo-Ping Wu |
研討會 |
Heap Spraying Revelation: Heap-spraying Detection based on Minimal Length Sequence and Argument Analysis |
International Computer Symposium, Taichung, Taiwan |
5 |
侯芊妤, 楊傳凱 |
研討會 |
3D立體點畫系統 |
Computer Graphics Workshop 2014
(CGW 2014) |
6 |
張冠中, 楊傳凱 |
研討會 |
基於Google Earth之自動導航系統 |
Computer Graphics Workshop 2014
(CGW 2014) |
7 |
楊傳凱, 康翔豪 |
研討會 |
雷射筆人機互動系統 |
Computer Graphics Workshop 2014
(CGW 2014) |
8 |
Li-Ping Tung, Ying-Dar Lin, Yu-Hsien Kuo, Yuan-Cheng Lai, and Krishna M. Sivalingam |
研討會 |
Minimizing Power Consumption in LTE Data Scheduling with the Constraints of Channel Condition and QoS |
Minimizing Power Consumption in LTE Data Scheduling with the Constraints of Channel Condition and QoS |
9 |
S.-M. Cheng, C.-H. Ho, S. Chen, and S.-H. Chang |
研討會 |
Distributed anonymous authentication in heterogeneous networks |
Proc. IWCMC 2014 |
10 |
Yuh-Jye Lee,Yu-Wei Chao, Yi-Ren Yeh, Yu-Wen Chen, Yu-Chiang Frank Wang |
研討會 |
Locality-constrained Group Sparse Representation for Robust Face Recognition. |
IEEE International Conference on Image Processing (ICIP), Brussels, Belgium. |
11 |
Nai-Wei Lo, I-Fan Wang, Yo-Hsuan Chuang |
研討會 |
RFID Multi-Ownership Transfer Protocol in VMI Environments |
2014 Workshop on RFID Security |
12 |
Kuo-Hui Yeh, Nai-Wei Lo, Chuan-Yen Fan |
研討會 |
An Analysis Framework for Information Loss and Privacy Leakage on Android Applications |
IEEE 3rd Global Conference on Consumer Electronics |
13 |
Yung-Piao Wu, Kuo-Ping Wu and Hahn-Ming Lee, |
SCI |
Stock Trend Prediction by Using K-Means and AprioriAll Algorithm for Sequential Chart Pattern Mining |
Journal of Information Science and Engineering (JISE), Vol 30, pp. 653-667 |
14 |
Chiun-How Kao, Junji Nakano, Sheau-Hue Shieh, Yin-Jing Tien, Han-Ming Wu, Chuan-kai Yang and Chun-houh Chen |
SCI |
Exploratory data analysis of interval-valued symbolic data with matrix visualization |
Computational Statistics & Data Analysis |
15 |
Hsing-Ching Chang and Chuan-Kai Yang |
SCI |
Fast Content-Aware Video Length Reduction |
Signal, Image and Video Processing |
16 |
Chuan-Kai Yang and Yu-Chih Yeh |
SCI |
Stain Removal in 2D Images with Globally-Varying Textures |
Signal, Image and Video Processing |
17 |
Li-Ping Tung, Ying-Dar Lin, Yu-Hsien Kuo, Yuan-Cheng Lai, and Krishna Sivalingam |
SCI |
Reducing Power Consumption in LTE Data Scheduling with the Constraints of Channel Condition and QoS |
Computer Networks, vol. 75, part A, pp. 149-159 |
18 |
Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, and Yuan-Cheng Lai |
SCI |
Automatic Analysis and Classification of Obfuscated Bot Binaries |
International Journal of Network Security, vol. 16, no. 6, pp. 506-515 |
19 |
Ying-Dar Lin, Jose F. Rojas, Edward T.-H. Chu, and Yuan-Cheng Lai |
SCI |
On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices |
IEEE Transactions on Software Engineering, vol. 40, no. 10, pp. 957-970 |
20 |
Yi-Hsuan Yeh, Yuan-Cheng Lai, Yen-Hung Chen, and Ching-Neng Lai |
SCI |
A Bandwidth Allocation Algorithm with Channel Quality and QoS Aware for IEEE 802.16 Base Stations |
International Journal of Communication Systems, vol. 27, no. 10, pp. 1601-1615 |
21 |
Yuan-Cheng Lai and Ling-Yen Hsiao |
SCI |
Adaptive Frame on Binary Splitting for radio frequency identification |
International Journal of Communication Systems, vol. 27, no. 10, pp. 1672-1685 |
22 |
Ying-Dar Lin, Ekarat Rattagan, Yuan-Cheng Lai, Li-Pin Chang, Yun-Chien Yo, Cheng-Yuan Ho, and Shun-Lee Chang |
SCI |
Calibrating Parameters and Formulas for Process-level Energy Consumption Profiling in Smartphones |
Journal of Network and Computer Applications, vol. 44, pp. 106-119 |
23 |
Jian-Wei Lin, Yuan-Cheng Lai, Yu-Chin Szu, Ching-Neng Lai, Yuh-Shy Chuang, Yen-Hung Chen |
SCI |
Development and Evaluation of Across-unit Diagnostic Feedback Mechanism for Online Learning |
Educational Technology & Society, vol. 17, no. 3, pp. 138-153 |
24 |
Jian-Wei Lin and Yuan-Cheng Lai |
SCI |
Using Collaborative Annotating and Data Mining on Formative Assessments to Enhance Learning Efficiency |
Computer Applications in Engineering Education, vol. 22, is. 2, pp. 364-374 |
25 |
Ying-Dar Lin, Po-Ching Lin, Yu-An Lin, and Yuan-Cheng Lai |
SCI |
On-The-Fly Capture and Replay Mechanisms for Multi-port Network Devices in Operational Networks |
IEEE Transactions on Network and Service Management. vol. 11, no. 2, pp. 158-171 |
26 |
Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu, and Yuan-Chen Lai |
SCI |
Secure and Transparent Network Traffic Replay, Redirect and Relay in a Dynamic Malware Analysis Environment |
Security and Communication Networks, vol. 7, no. 3, pp. 626-640 |
27 |
Ying-Dar Lin, Edward T.-H. Chu, Shang-Che Yu, and Yuan-Cheng Lai |
SCI |
Improving the Accuracy of Automated GUI Testing for Embedded Systems |
IEEE Software, vol. 31, no. 1, pp. 39-45 |
28 |
P.-Y. Chen, S.-M. Cheng |
SSCI |
Information fusion to defend intentional attack in Internet of Things |
IEEE Internet of Things Journal |
29 |
P.-Y. Chen, H.-F. Lin, K.-H. Hsu, and S.-M. Cheng |
SSCI |
Modeling dynamics of malware with incubation period from the view of individual |
Proc. IEEE VTC 2014-Spring |
30 |
J.L. Chen, Y.W. Ma, H.Y. Kuo, C.S. Yang and W.C. Hung |
SCI |
Software-Defined Network Virtualization Platform for Enterprise Network Resource Management |
IEEE Transactions on Emerging Topics in Computing |
31 |
H.C. Hsieh, K. Chang, V. Wang, J.L. Chen and H.C. Chao |
SCI |
ScriptIoT: A Script Framework for Internet of Things Applications |
IEEE Internet-of-Things Journal |
32 |
Y.W. Ma, J.L. Chen, F.S. Chang and C.L. Tang |
SCI |
Novel Fingerprinting Mechanisms for Indoor Positioning |
International Journal of Communication Systems |
33 |
C.Y. Yang, C.H. Ke and J.L. Chen |
SCI |
Frame-based Mapping Mechanism for Energy-Efficient MPEG-4 Video Transmission over IEEE 802.11e Networks with Better Quality of Delivery |
Journal of Network and Computer Applications |
34 |
Ying-Dar Lin, Po-Ching Lin, Sheng-Hao Wang, I-Wei Chen, and Yuan-Cheng Lai |
SCI |
PCAPLib: A System of Extracting, Classifying, and Anonymizing Real Packet Traces |
IEEE Systems Journal |
35 |
Ying-Dar Lin, Yuan-Cheng Lai, Chun-Nan Lu, Jui-Tsun Hung, and Chun-Pin Shao |
SCI |
Traffic Diversity and Code Coverage: A Preliminary Analysis |
International Journal of Communication Systems |
36 |
Xing-Yu Chen, Hsing-Kuo Pao, and Yuh-Jye Lee. |
IEEE |
Efficient Traffic Speed Forecasting Based on Massive Heterogeneous Historical Data |
IEEE International Conference on Big Data |
37 |
Erliyah Nurul Jannah and Hsing-Kuo Pao. |
IEEE |
Sensor Reading Prediction using Anisotropic Kernel Gaussian Process Regression |
IEEE International Conference on Internet of Things |
38 |
Nai-Wei Lo, Kuo-Hui Yeh, Chuan-Yen Fan |
SCI |
Leakage-detection and Risk-assessment on Privacy for Android Applications: LRPdroid |
IEEE Systems Journal |
39 |
Kuo-Hui Yeh, Nai-Wei Lo, Pei-Yun Liu |
SCI |
An Efficient Resource Allocation Scheme for Cloud Federations |
Information technology and control |
40 |
Shi-Cho Cha, Jyun Fu Chen, Chih-Teng Tseng |
SCI |
On Privacy-Preserving E-Invoicing in Physical Channels via NFC |
Radio Frequency Identification System Security |