Research Findings

Date Author/Presenter Article Journal
2017-05-06 Jyun-Yao Huang, Wei-Chih Hong, Po-Shin Tsai, I-En Liao A Model for Aggregation and Filtering on Encrypted XML Streams in Fog Computing International Journal of Distributed Sensor Networks, Vol. 13, No. 5, pp. 1-14, May 2017 (SCI)
2017-10-03~05 Jyun-Yao Huang, Po-Hsin Tsai, and I-En Liao* Implementing Publish/Subscribe Pattern for CoAP in Fog Computing Environment The 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference
2018-04-13~17 Pin-Han Wang, I-En Liao*, Kuo-Fong Kao, Jyun-Yao Huang An Intrusion Detection Method Based on Log Sequence Clustering of Honeypot for Modbus TCP Protocol IEEE International Conference on Applied System Innovation 2018
2018-04-13~17 Shao-Yu Peng, Wei-Chih Hong*, Jun-Ting Li, Sheng-Jun Huang Framework for Efficient SCA Resistance Verification of IoT Devices IEEE International Conference on Applied System Innovation 2018
2018-04-13~17 Yao-Chung Fan, Huan Chen* The Design and Implementation of Low-Cost Power Monitoring System for Campus Power Monitoring IEEE International Conference on Applied System Innovation 2018
2018-01-23 Chun-Wei Tsai * and Shi-Jui Liu An Effective IoT Service-to-Interface Assignment Algorithmvia Search Economics IEEE Internet of Things Journal(SCI)
2018-02-12 Po-Yen Lee, Chia-Mu Yu*, Tooska Dargahi, Mauro Conti, and Giuseppe Bianchi MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things IEEE Transactions on Information Forensics and Security(SCI)
2018-04-30~05-03 Pei-Shuan Lu, Pin-Yu Chen, and Chia-Mu Yu On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples International Conference on Learning Representations (ICLR)
2018-08-17~19 Ze-Hong Chen and Chun-Wei Tsai* An Effective Metaheuristic Algorithm for Intrusion Detection System IEEE International Conference on Smart Internet of Things
2018-08-29 Chun-Wei Tsai, Yong-Chun Ding, Shi-Jui Liu, Ming-Chao Chiang, Chu-SingYang A high-performance clustering algorithm based on searched experiences Computers in Human Behavior,vol. 100, pp. 231-241,2019(SCI)
2018-10-07~10 Yan-Rong Chen, Chun-Wei Tsai,  Ming-Chao Chiang ,  Chu-Sing Yang An Improved Quantum-Inspired Evolutionary Algorithm for Data Clustering IEEE International Conference on Systems, Man, and Cybernetics
2018-10-07~10 Yi-Chung Wang and Chun-Wei Tsai An Efficient Coral Reef Optimization with Substrate Layers for Clustering Problem on Spark IEEE International Conference on Systems, Man, and Cybernetics
2018-11-26~29 Chia-Yi Hsu, Pei-Shuan Lu, Pin-Yu Chen and Chia-Mu Yu On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces IEEE Global Conference on Signal and Information Processing (GlobalSIP)
2018-11-27~30 Tsung-Chiao Yu, Jyun-Yao Huang, I-En Liao*and Kuo-Fong Kao Mining Anomaly Communication Patterns for Industrial Control Systems 28th Australasian Universities Power Engineering Conference (AUPEC 2018), Auckland, New Zealand, Nov.27-30, 2018
2019-02 Ze-Hong Chen, Yi-Lin Chen, Wei-Yan Chang, and Chun-Wei Tsai A hybrid classification algorithm for intrusion detection system Communications of the CCISA, vol. 25, no. 1 , pp. 14-27
2019-04-03 Chun-Wei Tsai, Wei-Yan Chang, Yi-Chung Wang and Huan Chen A high-performance parallel coral reef optimization for data clustering Soft Computing,vol. 23, no. 19, pp.9327-9340, 2019(SCI)
2019-06-15 Jia-You Hsieh, Chun-Hung Fan, Jian-Zhi Liao, Jyh-Yih Hsu and Huan Chen Study on the application of indoor positioning based on low power Bluetooth device combined with Kalman filter and machine learning International Conference on Innovative Computing and Management Science
2019-06-15 Jia-You Hsieh, Wei Huang, Hsin-Tieh Yang, Chia-Chieh Lin, Yo-Chung Fan and Huan Chen Building the Rice Blast Disease Prediction Model based on Machine Learning and Neural Networks International Conference on Innovative Computing and Management Science
2019-06-21 Xuebin Ren, Shuyang Wang, Xianhua Yao, Chia-Mu Yu, Wei Yu and Xinyu Yang Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee International Conference on Wireless Algorithms, Systems, and Applications
2019-08-26~27 Chia-Wei Wu, Shu-Fen Chiou, I-En Liao Cyber Security Vulnerabilities Alert System Based on Information from Twitter and CVE 第24屆行動計算研討會,聯合大學,2019年8月26~27日。
2019-08-26~27 徐昀汝、許雯絞、廖宜恩 基於序列樣式探勘之電力系統干擾與網絡攻擊分類 第24屆行動計算研討會,聯合大學,2019年8月26~27日。
2019-08-26~27 李明翰、邱淑芬、廖宜恩 基於DBSCAN之工業控制系統異常偵測 第24屆行動計算研討會,聯合大學,2019年8月26~27日。
2019-09-19~21 Chun-Pi Chang, Wen-Chiao Hsu, I-En Liao Anomaly Detection for Industrial Control Systems Using K-Means and Convolutional Autoencoder 27th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2019), Split, Croatia, Sep. 19-21, 2019
2019-07-09~12 Chia-Yi Hsu, Pin-Yu Chen, and Chia-Mu Yu Characterizing Adversarial Subspaces by Mutual Information ACM Conference on Computer and Communications Security
2019-06-26~28 Yu-Chia Chang, Huan Chen and Chun-Wei Tsai An Effective Deep Learning Framework for Detecting Misconduct of the Trucker The 9th International Conference on Web Intelligence, Mining and Semantics
2019-07-19~22 Jia-Ying Chuang, Bing-Jie Ji, Wei-Chih Hong, Chu-Hsiang Lee, Jeng-Da Huang and Huang-Kai Huang Design and Implementation of Smart Contract Based IoT Service International Conference on Innovative Computing and Management Science
2019-10-06~09 Chun-Hung Fan, Huan Chen, Chun-Wei Tsai SHEAS:A Novel Metaheuristic Algorithm for Home Appliances Scheduling in Smart Grid IEEE International Conference on Systems, Man, and Cybernetics
2020-05-21 Yi-Lin Chen, Huan Chen and Chun-Wei Tsai An Effective Deep Learning Algorithm for Intrusion Detection International Conference on Innovative Computing and Management Science
2020-07-07 Wei-Chih Hong, Ding-Ray Huang, Chih-Lung Chen and Jung-Jyh-Yih HsuSan Lee Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks IEEE Access, vol. 8, pp. 123297-123309, 2020, doi: 10.1109/ACCESS.2020.3007609 (SCI)
2020-07-10 Huan Chen, Yue-Hsien Wang,Chun-Hung Fan A convolutional autoencoder‑based approach with batch normalization for energy disaggregation The Journal of Supercomputing volume 77, pages2961–2978(2021) (SCI)
2020-09-01~04 陳奕翔、許雯絞、廖宜恩 使用隨機森林與卷積神經網路之工業控制系統網路攻擊分類方法 第30屆全國資訊安全會議
2020-09-01~04 林侑儀、許雯絞、廖宜恩 用於工業控制系統入侵偵測方法的堆疊集成模型 第30屆全國資訊安全會議
2020-09-21 Wen-Chiao Hsu, I-En Liao UCIS-X: An Updatable Compact Indexing Scheme for Efficient Extensible Markup Language Document Updating and Query Evaluation IEEE Access, vol. 8, pp. 176375-176392, 2020, doi: 10.1109/ACCESS.2020.3025566 (SCI)
2020-12-17~18 Sying-Jyan Wang, Cheng Xuan Cai, Yen-Wen Tseng and Katherine Shu-Min Li Feature Selection for Malicious Traffic Detection with Machine Learning International Computer Symposium 2020
2021-2-26 Sying-Jyan Wang, Yu-Sheng Chen, and Katherine Shu-Min Li Modeling Attack Resistant PUFs Based on Adversarial Attack against Machine Learning IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol 11, pp. 306-318, 2021, doi:10.1109/JETCAS.2021.3062413
2021-04-19~22 Sying-Jyan Wang, Tzu-Heng Chang, Katherine Shu-Min Li Machine Learning Assisted Challenge Selection for Modeling Attack Resistance in Strong PUFs 2021 International Symposium on VLSI Design, Automation and Test (VLSI-DAT)
2021-06 Sying-Jyan Wang, Yu-Sheng Chen and Katherine Shu-Min Li Modeling Attack Resistant PUFs Based on Adversarial Attack Against Machine Learning IEEE Journal on Emerging and Selected Topics in Circuits and Systems, Vol. 11, Issue: 2, pp. 306 - 318
2021-08-05~06 Chien-Lung Wang, Yi-Chieh Liao and I-En Liao A Federated Learning Study of Privacy-Preserving Secret Sharing based on Deep Neural Network 第31屆全國資訊安全會議Cryptology and Information Security Conference 2021 (CISC2021)
2021-08-16 Chia-Wei Tsai, Jason Lin, Lung Chiu and Chun-Wei Yang Cryptanalysis and Improvement in Multi-Party Quantum Key Distribution Protocol with New Bell States Encoding Mode International Journal of Theoretical Physics, 60(9), 3599-3608
2022-01-08 Iuon-Chang Lin, Ching-Chun Chang and Chih-Hsiang Peng An Anomaly-Based IDS Framework Using Centroid-Based Classification Symmetry, 14(1), 105; https://doi.org/10.3390/sym14010105
2022-01-20 Chia-Wei Tsai, Chun-Wei Yang and Jason Lin Multiparty Mediated Quantum Secret Sharing Protocol Quantum Information Processing, 21(2), 1-17
2022-01-26 Iuon-Chang Lin, Chin-Chen Chang and Yu-Sung Chang Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA Symmetry, 14(2), 237; https://doi.org/10.3390/sym14020237.
2022-3-8 Yun-Chien Tseng, Mu-Hua Yang, Yao-Chung Fan , Wen-Chih Peng, Chih-Chieh Hung Template-Based Headline Generator for Multiple Documents IEEE Access(10)
2022-04-15 Jason Lin,Chia-Wei Tsai, Chun-Wei Yang, Kuan-Hung Liu A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix Symmetry 2022, 14(2), 828 https://www.mdpi.com/2073-8994/14/4/828.
2022-04-10 Hung-Wen Wang, Chia-Wei Tsai, Jason Lin, Yu-Yun Huang, Chun-Wei Yang Efficient and secure measure-resend authenticated semi-quantum key distribution protocol against reflecting attack Mathematics 2022, 10(8), 1241 https://www.mdpi.com/2227-7390/10/8/1241.
2022-04-18~21 Sying-Jyan Wang, Y.-C. Shih and Katherine Shu-Min Li Improving IJTAG Test Efficiency and Securityning 2022 International Symposium on VLSI Design, Automation and Test (2022 VLSI-DAT)
2022-04-30 Chia-Wei Tsai, Kuei-Chun Chiang, Hsin-Yuan Hsieh, Chun-Wei Yang, Jason Lin, Yao-Chung Chang Feature Extraction of Anomaly Electricity Usage Behavior in Residence Using Autoencoder Electronics 2022, 11(9), 1450 https://www.mdpi.com/2079-9292/11/9/1450.
2022-5-12 Ting-Wei Chang; Yao-Chung Fan; Arbee L. P. Chen Emotion-cause pair extraction based on machine reading comprehension model Multimedia Tools and Applications volume 81, 40653–40673
2022-06-16~17 應瑞傑;蔡國裕;李榮三;周澤捷 基於聲譽清單之可移動式路側單元集群協定 第三十二屆全國資訊安全會議(CISC 2022) Cryptology and Information Security Conference 2022
2022-06-16~17 籃若瑜;蔡國裕;賴俊鳴;王銘宏 短文本論述萃取演算法 第三十二屆全國資訊安全會議(CISC 2022) Cryptology and Information Security Conference 2022
2022-07-18~23 Chih-Shuo Tsai, Ying-Hong Chan, Yao-Chung Fan Hierarchical Cache Transformer: Dynamic Early Exit for Language Translation 2022 International Joint Conference on Neural Networks (IJCNN)
2022-7-23~29 Lei Hsiung, Yun-Yun Tsai, Pin-Yu Chen, Tsung-Yi Ho CARBEN: Composite Adversarial Robustness Benchmark The 31st International Joint Conference on Artificial Intelligence (IJCAI 2022) Demo Track
2022-09-22 Shu-Yu Kuo, Kuo-Chun Tseng, Yao-Hsin Chou, Fan-Hsun Tseng, Quantum Oblivious Transfer with Reusable Bell State Computers, Materials & Continua 2023, 74(1), 915-932
2022-10-10 Jason Lin; Chia-Wei Tsai; Chun-Wei Yang Cryptanalysis and Improvement of the Measurement-Device-Independent Quantum Key Distribution with Hyper-Encoding Modern Physics Letters A , Vol. 37, No. 31, 2250212 (2022)
2022-10-14~16 Sying-Jyan Wang, Yi-Chi Lin, Chen-Yeh Lin, Song-Kong Chong, Katherine Shu-Min Li Automatic Alignment for Side-Channel Attack Against Cryptographic Modules 2022 IET International Conference on Engineering Technologies and Applications
2022-10-14~16 Chun-Tsai Chien, Chien Lung Wang and Sying-Jyan Wang Zero Payload Enhanced AES Cryptography Against Side-Channel Attacks 2022 IET International Conference on Engineering Technologies and Applications
2022-10-14~16 Chien-Lung Wang; Iuon-Chang Lin; Chun-Tsai Chien; Sying-Jyan Wang ;Jou-An Shih; I-En Liao An Evaluation of Cybersecurity Risks of DLMS/COSEM Smart Meter Using Fuzzing Testing 2022 IET International Conference on Engineering Technologies and Applications
2022-10-27~29 Shih-Wei Guo, Tzu-Chi Chen, Hui-Juan Wang, Fang-Yie Leu, Yao-Chung Fan Generating Personalized Phishing Emails for Social Engineering Training Based on Neural Language Models. BWCCA 2022: Advances on Broad-Band Wireless Computing, Communication and Applications
2022-11-21~23 S. -J. Wang, K. S. -M.Li,C. -Y. Lin and S. -K.Chong Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication 31st Asian Test Symposium (ATS)
2022-12-15~17 施語涵;黃詩軒;蔡家緯;張耀中;盧韻文;王李品檠 基於用電負載情境預測冰水主機負載及電力能耗預測 2022 臺灣網際網路研討會TANET
2022-12-15~17 謝欣原;蔣貴君;蔡家緯 使用集成學習策略於住宅用戶異常用電行為辨識之研究 2022 臺灣網際網路研討會TANET
2023-01-14 Chun-Wei Yang; Hung-Wen Wang; Jason Lin; Chia-Wei Tsai Semi-quantum Identification without Information Leakage Mathematics 2023, 11(2), 452
2023-4-21~23 Tzu-Hsuan Huang, Chun-Tsai Chien, Chien-Lung Wang and I-En Liao The Implementation of an HSM-Based Smart Meter for Supporting DLMS/COSEM Security Suite 1 IoTBDS 2023
2023-4-21~25 Chia-Wei Tsai, Jyun-Jie Hong, Yun-Hao Lee, Jason Lin, Chun-Wei Yang Semi-quantum Private Comparison Protocol with Graph state 9th IEEE International Conference on Applied System Innovation 2023
2023-4-21~25 Yu-Xiang Zou; Jason Lin; Chia-Wei Tsai; Chun-Wei Yang Alpha-Boost: A Fast Algorithm for Mining Workflow Nets 9th IEEE International Conference on Applied System Innovation 2023
2023-5-4 Chun-Wei Yang ; Jason Lin; Chia-Wei Tsai; Kai-Lin Wang; Chia-Wei Tsai Cryptanalysis and improvement of a controlled quantum secure direct communication with authentication protocol based on five-particle cluster state Quantum Information Processing volume 22, Article number: 196 (2023)
2023-5 Iuon-Chang Lin, Yu-Wen Wang, Ting-Xuan Tai A Grid-Based Key Pre-Distribution Scheme Using Dependent Keys in Wireless Sensor Networks Journal of Information Science and Engineering, vol. 39, no. 3, pp. 459-472, (SCI).
2023-6-1~2 Iuon-Chang Lin; Pin Hsiang Chen A Data Preservation Architecture for IOT Using Distributed Ledger Technology 第三十三屆全國資訊安全會議,6/1-6/2 2023, 嘉義中正大學
2023-6-1~2 翁偉銘;蔡國裕;郭崇韋 基於DAE之旁通道攻擊實作與分析 第三十三屆全國資訊安全會議(CISC 2023) Cryptology and Information Security Conference 2023
2023-6-23~25 Guan-Yu Chen and Iuon-Chang Lin Using Blockchain to Achieve Self-Sovereign Identity (SSI) and Access Control for Customers in Financial Institutions Proceedings of 5th International Conference on Computer Communication and the Internet (ICCCI 2023), June 23-25, 2023 Fujisawa, Japan.
2023-7-19 Iuon-Chang Lin, Pai-Ching, Tseng, Yu-Sung Chang, and Tzu-Ching Weng IOTA Data Preservation Implementation for Industrial Automation and Control Systems Processes 2023, 11, 2160. https://doi.org/10.3390/pr11072160 (SCI)
2023-8-15~16 Iuon-Chang Lin, Jing-Yuan Huang, Jason Lin A Certificate Management Mechanism Using Distributed Ledger The 18th Asia Joint Conference on Information Security(AsiaJCIS2023), Aug.15-16, 2023, Tokyo, Japan
2023-8-16 Jason Lin, Chen-Yu Chang Efficient Fault-tolerant Quantum Dialogue Protocols Using a Quantum Reordering Circuit of EPR Pairs Physica Scripta, 98, 095110
2023-8-22 Jason Lin, Kuan-Hung Liu, Cih-Lian Lin A Novel Data Hiding Scheme Based on Multidimensional Reference Tensors Multimedia Tools and Applications, 83, pp. 25695–25712
2023-10-5 Chia-Wei Tsai and Chun-Hsiang Wang Efficient Mediated Quantum Secret sharing protocol in a Restricted Quantum Environment Annalen der Physik, 535, (11) 2300116
2023-10-25~27 Chun-Tsai Chien, Chien-Lung Wang, I-En Liao, Sying-Jyan Wang Implementing OIML R46 Communication Unit for DLMS/COSEM Security Suite 1 and Passing CTT V3.1 Test ICNSC 2023: 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL
2023-12-7~9 Chia-Wei Tsai, Jason Lin, Chun-Wei Yang, Fu-Nie Loo Feasibility Analysis Study on Constructing a Grid Intrusion Detection System Using Semi-Supervised Learning Models 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023), Dec. 7-9, 2023, New Taipei City, Taiwan.
2023-12-7~9 Chia-Chen Lin, Aristophane Nshimiyimana, Wei-Liang Tai and Morteza Sa-beriKamarposhti An Object-based Multi-level Authentication Framework for AR e-book 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023), Dec. 7-9, 2023, New Taipei City, Taiwan.
2023-12-7~9 Iuon-Chang Lin and Yu-Chun Chan Analysis and Detection of Abnormal Transactions on Ethereum 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications(SITAIBA 2023), Dec. 7-9, 2023, New Taipei City, Taiwan.
2024-1-3 Chen-Yu Chang, Jason Lin Efficient Fault-Tolerant Quantum Dialogue Protocols Based on Dictionary Encoding without Decoy Photons Quantum Information Processing, 23, 12
2024-1-26 Iuon-Chang Lin, Yi-Hsuan Kuo, Ching-Chun Chang, Jui-Chuan Liu, and Chin-Chen Chang Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality Symmetry 2024, 16(2), 147; https://doi.org/10.3390/sym16020147 (SCI)
2024-2 Yijie Lin, Chia-Chen Lin, Jui‐Chuan Liu, Chin‐Chen Chang Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix Journal of Information Security and Application (IF: 5.6), 2024/2/1, Vol. 80, https://doi.org/10.1016/j.jisa.2023.103679
2024-2-7~9 I. C. Lin, P. C. Tseng, P. H. Chen and S. J. Chiou Securing Industrial Control Systems: Enhancing Data Preservation in IoT with Streamlined IOTA Integration Proceedings of 4th IFSA Winter Conference on Automation, Robotics & Communications for Industry 4.0 / 5.0, (ARCI’ 2024), 7-9 February 2024, Innsbruck, Austria.
2024-2-16 Chia-Wei Tsai, Jason Lin, Chun-Wei Yang* Cryptanalysis and Improvement of Quantum Secure Multi-Party Summation Using Single Photons Physica Scripta, 99, 035114
2024-2-27 Katherine Shu-Min Li, Fang-Chi Wu, Jian-De Li, Sying-Jyan Wang Reinforcement Learning Double DQN for Chip-Level Synthesis of Paper-Based Digital Microfluidic Biochips IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD)
2024-3-15 Jason Lin, Chang-Chi Chen, Chung-Yung Huang* Efficient Dynamic Quantum Secret Sharing in Pre-Measurement and Post-Measurement Phases Physica A: Statistical Mechanics and its Applications, 638, 129615
2024-3-18 Chit-Jie Chew; Wei-Bin Lee; Tzu-Hao Chen; Iuon-Chang Lin; Jung-San Lee Log Preservation in Custody Dual Blockchain with Energy Regime and Obfuscation Shuffle IEEE Transactions on Network Science and Engineering, 2024-03, 10.1109/TNSE.2024.3375921. (SCI)
2024-3-22 Che-Hao Chang, Jason Lin, Jia-Wei Chang, Yu-Shun Huang, Ming-Hsin Lai, Yen-Jen Chang Hybrid Deep Neural Networks with Multi-Tasking for Rice Yield Prediction Using Remote Sensing Data Agriculture, 14(4), 513
2024-4-17~21 Fu-Nie Loo, Tung-Shou Chen, Chia-Wei Tsai, Jason Lin, and Chun-Wei Yang Feasibility Study of Semi-supervised Intrusion Detection Systems for Industrial Control Systems 2024 IEEE 10th International Conference on Applied System Innovation, April 17-21, Kyoto, Japan
2024-5-17~19 C.-F. Lee, T.-Y. Kang, and I.-C. Lin Dual Medical-Image Reversible Data Embedding Method with Vector Directions Proceedings of 2024 8th International Conference on Medical and Health Informatics (ICMHI 2024), Yokohama, Japan, May 17-19, 2024.
2024-5-17~19 C.-F. Lee, T.-C. Tsai, and I.-C. Lin The Study of Reversible Data Hiding with Contrast Enhancement for Medical Images Proceedings of 2024 8th International Conference on Medical and Health Informatics (ICMHI 2024), Yokohama, Japan, May 17-19, 2024.
2024-6-4~6 Yeong Kang Lai, Yi An Chen Enhancing RFID Security through Integrated Physical Unclonable Functions and Lightweight Cryptography IEEE RFID 2024:18th Annual International Conference on RFID, JUNE 4-6, 2024, BOSTON, MA.
2024-7-2~4 Yuan-Cheng Yu; Yen-Chieh Ouyang; Ling-Wei Wu; Chun-An Lin; Kuo-Yu Tsai Multivariate Time-Series Anomaly Detection in IoT with a Bi-Dual GM GRU Autoencoder COMPSAC 2024: 48th IEEE International Conference on Computers, Software, and Applications
2024-7-9~11 Yi-An Chen, Yi-Chiao Chen, Hong-Zhe Chen, Yeong-Kang La A Data Encryption System Utilizing Physical Unclonable Functions Pseudorandom Functions and Ascon 2024 ICCE-TW(IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN), July 9-11,2024, Taichung, Taiwan.