Your browser does not support JavaScript!
發表人 論文類別(SCI/SSCI/研討會) 論文 發表期刊/研討會
1 Te-En Wei, Hahn-Ming Lee, Hsiao-Rong Tyan, Hong-Yuan Mark Liao, Albert B. Jeng, Jiunn-Chin Wang 研討會 DroidExec: Root Exploit Malware Recognition Against Wide Variability via Folding Redundant Function-relation Graph 17th IEEE International Conference on Advanced Communication Techonogly(ICACT) , Park ,KOREA
2 Ismail Altaharwa, Hahn-Ming Lee, Albert Jeng, Cheng-Seen Ho, Shyi-Ming Chen and Kuo-Ping Wu 研討會 Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15) , Helsinki, Finland.
3 Yen-Lin Chen, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei 研討會 DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-based Mobile Apps The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP 2015) , Helsinki, Finland.
4 查士朝、蔡育軒、呂紹剛、劉子慶、鍾珮珊、王晨芳、徐肇陽 研討會 PathDrawoid: 能呈現 Android 應用程式敏感資料流向的動態分析平台 Cryptology and Information Security Conference 2015 (CISC2015)
5 Siang-Hao Kang and Chuan-Kai Yang 研討會 Laser-Pointer Human Computer Interaction System"  IEEE International Conference on Multimedia & Expo Workshops, (ICMEW 2015)
6 林孟儒, 楊傳凱 研討會 基於形狀特徵的三維模型正面判斷研究 Computer Graphics Workshop 2015 (CGW 2015)
7 張思敏, 楊傳凱 研討會 基於自身相似性的多比例因子圖像及影像超解析 Computer Graphics Workshop 2015 (CGW 2015)
8 楊承翰, 楊傳凱 研討會 基於字幕與使用者回饋之影片推薦與回顧 Computer Graphics Workshop 2015 (CGW 2015)
9 Komang Oka Saputra, Wei-Chung Teng, and Yi-Hao Chu 研討會 A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time 2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)
10 賴源正、林伯慎、王偲帆、王士豪、張凱傑 研討會 巨量資料:概觀及趨勢 2015國際資訊管理暨實務研討會及第十三屆管理學術研討會, Taichung, Taiwan
11 Ying-Dar Lin, Feng-Ze Liao, Shih-Kun Huang, and Yuan-Cheng Lai 研討會 Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models International Carnahan Conference on Security Technology (ICCST), Taipei, Taiwan
12 Yen-Hung Chen, Ching-Neng Lai, Yuan-Cheng Lai, Yang-Chi Li 研討會 A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks International Conference on Wireless Algorithms, Systems, and Applications, Qufu, China
13 Yen-Hung Chen, Yuan-Cheng Lai, Ching-Neng Lai, Yu-Chin Szu, and Jian-Wei Lin 研討會 Modeling Machine to Machine Vehicular Safety Communication International Conference on Circuits, Systems, Communications and Computers, Zakynthos, Greece
14 Ekarat Rattagan, Edward, T.-H. Chu, Ying-Dar Lin, and Yuan-Cheng Lai 研討會 Semi-online Power Estimation For Smartphone Hardware Components IEEE International Symposium on Industrial Embedded Systems (SIES), Siegen, Germany
15 賴源正, 劉筱俞, 王偲帆 研討會 長照保險下之長照服務其資訊安全評估 11屆知識社群國際研討會, Taipei, Taiwan
16 Nai-Wei Lo and Cheng Tsung Liu 研討會 An Accountable Identity-based Billing Protocol for Cloud Environment Proceedings of the Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing
17 Nai-Wei Lo, Yu-Chen Cheng, Tzong-Chen Wu, Shih-Jen Chen and Ming-Yuan Hsu 研討會 Security Analysis on Yu et al.’s Group Certificate Digital Signature Scheme for EMR Authentication Process Proceedings of the 3rd International Conference on Advances in Intelligent Systems in Bioinformatics, Chem-Infomatics, Business Intelligence, Social Media and Cybernetics 2015
18 Kuo-Hui Yeh, Nai-Wei Lo, Lin-Chih Chen and Ping-Hsien Lin 研討會 A Fraud Detection System for Real-time Messaging Communication on Android Facebook Messenger Proceedings of 2015 IEEE 4th Global Conference on Consumer Electronics
19 Nai-Wei Lo, Meng-Chih Chiang and Chao Yang Hsu 研討會 Hash-based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks Proceedings of the 10th Asia Joint Conference on Information Security
20 Nai-Wei Lo, Chi-Kai Yu and Chao Yang Hsu 研討會 Intelligent Display Auto-lock Scheme for Mobile Devices Proceedings of the 10th Asia Joint Conference on Information Security
21 羅乃維, 陳伶貞,
譚學勇, 唐偲瑋,
呂紹綱, 莊祐軒
研討會 Android平台上實現App完整性偵測機制 第二十五屆全國資訊安全會議
22 P.-Y. Chen, S.-M. Cheng, P.-S. Ting, C.-W. Lien, and F.-J. Chu 研討會 When crowdsourcing meets mobile sensing: A social network perspective IEEE Communications Magazines 2015
23 P.-Y. Chen and S.-M. Cheng 研討會 Sequential defense against random and intentional attacks in complex networks Physical Review E
24 Y.-C. Li, C.-C. Lin, S.-C. Chen and S.-M. Cheng 研討會 On exploiting ring signature to preserve privacy in wearable Internet of Things Proc. CISC 2015
25 K.-C. Wang and S.-M. Cheng 研討會 The detection and prevention of network crawlers Proc. CISC 2015
26 S.K. Lu, J.L. Chen SCI Address Scrambling and Data Inversion Techniques for Yield Enhancement of NROM-Based ROMs IEEE Transactions on Computers
27 Ismail Adel AL-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Cheng-Seen Ho, Shyi-Ming Chen, SCI JSOD: JavaScript Obfuscation Detector Security and Communication Networks , Volume 8, Issue 6, Pages: 1092–1107
28 Yuan-Hao Lai and Chuan-kai Yang SCI Video Object Retrieval by Trajectory and Appearance IEEE Transactions on Circuits and Systems for Video Technology
29 Chuan-Kai Yang and Yu-Chun Chen SCI A HCI interface based on hand gestures Signal, Image and Video Processing
30 Komang Oka Saputra, Wei-Chung Teng, Tsung-Han Chen SCI Hough Transform-Based Clock Skew Measurement Over Network IEEE Transactions on Instrumentation and Measurement
31 Ying-Dar Lin, Edward T.-H. Chu, Yuan-Cheng Lai, and Ting-Jun Huang SCI Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds IEEE Systems Journal, vol. 9, no. 2, pp. 393-405
32 Ying-Dar Lin, Yuan-Cheng Lai, Chun-Nan Lu, Peng-Kai Hsu, and Chia-Yin Lee SCI Three-phase Behavior-based Detection and Classification of Known and Unknown Malware Security and Communication Networks, vol. 8, is. 11, pp. 2004-2015
33 Ying-Dar Lin, Minh-Tuan Thai, Chih-Chiang Wang, and Yuan-Cheng Lai SCI Two-tier Project and Job Scheduling for SaaS Cloud Service Providers Journal of Network and Computer Applications, vol. 52, pp. 26-36
34 Ying-Dar Lin, Po-Ching Lin, Chi-Hung Yeh, Yao-Chun Wang, and Yuan-Cheng Lai SCI An Extended SDN Architecture for Network Function Virtualization with a Case Study on Intrusion Prevention IEEE Network, vol. 29, no. 3, pp. 48-53
35 Chun-Ying Huang, Ying-Dar Lin, Peng-Yu Liao, and Yuan-Cheng Lai SCI Stateful Traffic Replay for Web Application Proxies Security and Communication Networks, vol. 8, is. 6, pp. 970-981
36 Yuan-Cheng Lai, Ling-Yen Hsiao, and Bor-Shen Lin SCI Optimal Slot Assignment for Binary Tracking Tree Protocol in RFID Tag Identification IEEE/ACM Transactions on Networking, vol. 23, no. 1, pp. 255-268



屬性10 : 1
  • 友善列印
  • 新增到收藏夾