2017-05-06
|
Jyun-Yao Huang, Wei-Chih Hong, Po-Shin
Tsai,
I-En Liao
|
A Model for Aggregation and Filtering on Encrypted XML
Streams
in Fog Computing
|
International Journal of Distributed Sensor Networks, Vol.
13,
No. 5, pp. 1-14, May 2017
(SCI)
|
2017-10-03~05
|
Jyun-Yao Huang, Po-Hsin Tsai, and I-En Liao*
|
Implementing Publish/Subscribe Pattern for CoAP in Fog
Computing
Environment
|
The 8th IEEE Annual Information Technology, Electronics and
Mobile Communication Conference
|
2018-04-13~17
|
Pin-Han Wang, I-En Liao*, Kuo-Fong Kao,
Jyun-Yao Huang
|
An Intrusion Detection Method Based on Log Sequence
Clustering
of Honeypot for Modbus TCP Protocol
|
IEEE International Conference on Applied System Innovation
2018
|
2018-04-13~17
|
Shao-Yu Peng, Wei-Chih Hong*, Jun-Ting Li,
Sheng-Jun Huang
|
Framework for Efficient SCA Resistance Verification of IoT
Devices
|
IEEE International Conference on Applied System Innovation
2018
|
2018-04-13~17
|
Yao-Chung Fan, Huan Chen*
|
The Design and Implementation of Low-Cost Power Monitoring
System for Campus Power Monitoring
|
IEEE International Conference on Applied System Innovation
2018
|
2018-01-23
|
Chun-Wei Tsai * and Shi-Jui Liu
|
An Effective IoT Service-to-Interface Assignment
Algorithmvia
Search Economics
|
IEEE Internet of Things Journal(SCI)
|
2018-02-12
|
Po-Yen Lee, Chia-Mu Yu*, Tooska Dargahi,
Mauro
Conti, and Giuseppe Bianchi
|
MDSClone: Multidimensional Scaling Aided Clone Detection in
Internet of Things
|
IEEE Transactions on Information Forensics and Security(SCI)
|
2018-04-30~05-03
|
Pei-Shuan Lu, Pin-Yu Chen, and Chia-Mu Yu
|
On the Limitation of Local Intrinsic Dimensionality for
Characterizing the Subspaces of Adversarial Examples
|
International Conference on Learning Representations (ICLR)
|
2018-08-17~19
|
Ze-Hong Chen and Chun-Wei Tsai*
|
An Effective Metaheuristic Algorithm for Intrusion Detection
System
|
IEEE International Conference on Smart Internet of Things
|
2018-08-29
|
Chun-Wei Tsai, Yong-Chun Ding, Shi-Jui Liu,
Ming-Chao Chiang, Chu-SingYang
|
A high-performance clustering algorithm based on searched
experiences
|
Computers in Human Behavior,vol. 100, pp. 231-241,2019(SCI)
|
2018-10-07~10
|
Yan-Rong Chen, Chun-Wei Tsai,
Ming-Chao
Chiang , Chu-Sing Yang
|
An Improved Quantum-Inspired Evolutionary Algorithm for Data
Clustering
|
IEEE International Conference on Systems, Man, and
Cybernetics
|
2018-10-07~10
|
Yi-Chung Wang and Chun-Wei Tsai
|
An Efficient Coral Reef Optimization with Substrate Layers
for
Clustering Problem on Spark
|
IEEE International Conference on Systems, Man, and
Cybernetics
|
2018-11-26~29
|
Chia-Yi Hsu, Pei-Shuan Lu, Pin-Yu Chen and Chia-Mu
Yu
|
On The Utility of Conditional Generation Based Mutual
Information for Characterizing Adversarial Subspaces
|
IEEE Global Conference on Signal and Information Processing
(GlobalSIP)
|
2018-11-27~30
|
Tsung-Chiao Yu, Jyun-Yao Huang, I-En Liao*and
Kuo-Fong Kao
|
Mining Anomaly Communication Patterns for Industrial Control
Systems
|
28th Australasian Universities Power Engineering Conference
(AUPEC 2018), Auckland, New Zealand, Nov.27-30, 2018
|
2019-02
|
Ze-Hong Chen, Yi-Lin Chen, Wei-Yan Chang, and
Chun-Wei
Tsai
|
A hybrid classification algorithm for intrusion detection
system
|
Communications of the CCISA, vol. 25, no. 1 , pp. 14-27
|
2019-04-03
|
Chun-Wei Tsai, Wei-Yan Chang, Yi-Chung Wang
and
Huan Chen
|
A high-performance parallel coral reef optimization for data
clustering
|
Soft Computing,vol. 23, no. 19, pp.9327-9340, 2019(SCI)
|
2019-06-15
|
Jia-You Hsieh, Chun-Hung Fan, Jian-Zhi Liao, Jyh-Yih Hsu and
Huan Chen
|
Study on the application of indoor positioning based on low
power Bluetooth device combined with Kalman filter and
machine
learning
|
International Conference on Innovative Computing and
Management
Science
|
2019-06-15
|
Jia-You Hsieh, Wei Huang, Hsin-Tieh Yang, Chia-Chieh Lin,
Yo-Chung Fan and Huan Chen
|
Building
the Rice Blast Disease Prediction Model based on Machine
Learning and Neural Networks
|
International Conference on Innovative Computing and
Management
Science
|
2019-06-21
|
Xuebin Ren, Shuyang Wang, Xianhua Yao, Chia-Mu Yu,
Wei Yu and Xinyu Yang
|
Differentially Private Event Sequences over Infinite Streams
with Relaxed Privacy Guarantee
|
International Conference on Wireless Algorithms, Systems,
and
Applications
|
2019-08-26~27
|
Chia-Wei Wu, Shu-Fen Chiou, I-En Liao
|
Cyber Security Vulnerabilities Alert System Based on
Information
from Twitter and CVE
|
第24屆行動計算研討會,聯合大學,2019年8月26~27日。
|
2019-08-26~27
|
徐昀汝、許雯絞、廖宜恩
|
基於序列樣式探勘之電力系統干擾與網絡攻擊分類
|
第24屆行動計算研討會,聯合大學,2019年8月26~27日。
|
2019-08-26~27
|
李明翰、邱淑芬、廖宜恩
|
基於DBSCAN之工業控制系統異常偵測
|
第24屆行動計算研討會,聯合大學,2019年8月26~27日。
|
2019-09-19~21
|
Chun-Pi Chang, Wen-Chiao Hsu, I-En Liao
|
Anomaly Detection for Industrial Control Systems Using
K-Means
and Convolutional Autoencoder
|
27th International Conference on Software,
Telecommunications
and Computer Networks (SoftCOM 2019), Split, Croatia, Sep.
19-21, 2019
|
2019-07-09~12
|
Chia-Yi Hsu, Pin-Yu Chen, and Chia-Mu Yu
|
Characterizing Adversarial Subspaces by Mutual Information
|
ACM Conference on Computer and Communications Security
|
2019-06-26~28
|
Yu-Chia Chang, Huan Chen and Chun-Wei Tsai
|
An Effective Deep Learning Framework for Detecting
Misconduct of
the Trucker
|
The 9th International Conference on Web Intelligence, Mining
and
Semantics
|
2019-07-19~22
|
Jia-Ying Chuang, Bing-Jie Ji, Wei-Chih Hong,
Chu-Hsiang Lee, Jeng-Da Huang and Huang-Kai Huang
|
Design and Implementation of Smart Contract Based IoT
Service
|
International Conference on Innovative Computing and
Management
Science
|
2019-10-06~09
|
Chun-Hung Fan, Huan Chen, Chun-Wei Tsai
|
SHEAS:A Novel Metaheuristic Algorithm for Home Appliances
Scheduling in Smart Grid
|
IEEE International Conference on Systems, Man, and
Cybernetics
|
2020-05-21
|
Yi-Lin Chen, Huan Chen and Chun-Wei Tsai
|
An Effective Deep Learning Algorithm for Intrusion Detection
|
International Conference on Innovative Computing and
Management
Science
|
2020-07-07
|
Wei-Chih Hong, Ding-Ray Huang, Chih-Lung
Chen
and Jung-Jyh-Yih HsuSan Lee
|
Towards Accurate and Efficient Classification of Power
System
Contingencies and Cyber-Attacks Using Recurrent Neural
Networks
|
IEEE Access, vol. 8, pp. 123297-123309, 2020, doi:
10.1109/ACCESS.2020.3007609
(SCI)
|
2020-07-10
|
Huan Chen, Yue-Hsien Wang,Chun-Hung Fan
|
A convolutional autoencoder‑based approach with batch
normalization for energy disaggregation
|
The Journal of Supercomputing volume 77,
pages2961–2978(2021)
(SCI)
|
2020-09-01~04
|
陳奕翔、許雯絞、廖宜恩
|
使用隨機森林與卷積神經網路之工業控制系統網路攻擊分類方法
|
第30屆全國資訊安全會議
|
2020-09-01~04
|
林侑儀、許雯絞、廖宜恩
|
用於工業控制系統入侵偵測方法的堆疊集成模型
|
第30屆全國資訊安全會議
|
2020-09-21
|
Wen-Chiao Hsu, I-En Liao
|
UCIS-X: An Updatable Compact Indexing Scheme for Efficient
Extensible Markup Language Document Updating and Query
Evaluation
|
IEEE Access, vol. 8, pp. 176375-176392, 2020, doi:
10.1109/ACCESS.2020.3025566
(SCI)
|
2020-12-17~18
|
Sying-Jyan Wang, Cheng Xuan Cai, Yen-Wen Tseng and Katherine Shu-Min Li
|
Feature Selection for Malicious Traffic Detection with Machine Learning
|
International Computer Symposium 2020
|
2021-2-26
|
Sying-Jyan Wang, Yu-Sheng Chen, and Katherine Shu-Min Li
|
Modeling Attack Resistant PUFs Based on Adversarial Attack against Machine Learning
|
IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol 11, pp. 306-318, 2021,
doi:10.1109/JETCAS.2021.3062413
|
2021-04-19~22
|
Sying-Jyan Wang, Tzu-Heng Chang, Katherine Shu-Min Li
|
Machine Learning Assisted Challenge Selection for Modeling Attack Resistance in Strong PUFs
|
2021 International Symposium on VLSI Design, Automation and Test (VLSI-DAT)
|
2021-06
|
Sying-Jyan Wang, Yu-Sheng Chen and Katherine Shu-Min Li
|
Modeling Attack Resistant PUFs Based on Adversarial Attack Against Machine Learning
|
IEEE Journal on Emerging and Selected Topics in Circuits and Systems, Vol. 11, Issue: 2, pp. 306 - 318
|
2021-08-05~06
|
Chien-Lung Wang, Yi-Chieh Liao and I-En Liao
|
A Federated Learning Study of Privacy-Preserving Secret Sharing based on Deep Neural Network
|
第31屆全國資訊安全會議Cryptology and Information Security Conference 2021 (CISC2021)
|
2021-08-16
|
Chia-Wei Tsai, Jason Lin, Lung Chiu and Chun-Wei Yang
|
Cryptanalysis and Improvement in Multi-Party Quantum Key Distribution Protocol with New Bell States Encoding
Mode
|
International Journal of Theoretical Physics, 60(9), 3599-3608
|
2022-01-08
|
Iuon-Chang Lin, Ching-Chun Chang and Chih-Hsiang Peng
|
An Anomaly-Based IDS Framework Using Centroid-Based Classification
|
Symmetry, 14(1), 105; https://doi.org/10.3390/sym14010105
|
2022-01-20
|
Chia-Wei Tsai, Chun-Wei Yang and Jason Lin
|
Multiparty Mediated Quantum Secret Sharing Protocol
|
Quantum Information Processing, 21(2), 1-17
|
2022-01-26
|
Iuon-Chang Lin, Chin-Chen Chang and Yu-Sung Chang
|
Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA
|
Symmetry, 14(2), 237; https://doi.org/10.3390/sym14020237.
|
2022-3-8
|
Yun-Chien Tseng, Mu-Hua Yang, Yao-Chung Fan , Wen-Chih Peng, Chih-Chieh Hung
|
Template-Based Headline Generator for Multiple Documents
|
IEEE Access(10)
|
2022-04-15
|
Jason Lin,Chia-Wei Tsai, Chun-Wei Yang, Kuan-Hung Liu
|
A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix
|
Symmetry 2022, 14(2), 828 https://www.mdpi.com/2073-8994/14/4/828.
|
2022-04-10
|
Hung-Wen Wang, Chia-Wei Tsai, Jason Lin, Yu-Yun Huang, Chun-Wei Yang
|
Efficient and secure measure-resend authenticated semi-quantum key distribution protocol against reflecting
attack
|
Mathematics 2022, 10(8), 1241 https://www.mdpi.com/2227-7390/10/8/1241.
|
2022-04-18~21
|
Sying-Jyan Wang, Y.-C. Shih and Katherine Shu-Min Li
|
Improving IJTAG Test Efficiency and Securityning
|
2022 International Symposium on VLSI Design, Automation and Test (2022 VLSI-DAT)
|
2022-04-30
|
Chia-Wei Tsai, Kuei-Chun Chiang, Hsin-Yuan Hsieh, Chun-Wei Yang, Jason Lin,
Yao-Chung Chang
|
Feature Extraction of Anomaly Electricity Usage Behavior in Residence Using Autoencoder
|
Electronics 2022, 11(9), 1450 https://www.mdpi.com/2079-9292/11/9/1450.
|
2022-5-12
|
Ting-Wei Chang; Yao-Chung Fan; Arbee L. P. Chen
|
Emotion-cause pair extraction based on machine reading comprehension model
|
Multimedia Tools and Applications volume 81, 40653–40673
|
2022-06-16~17
|
應瑞傑;蔡國裕;李榮三;周澤捷
|
基於聲譽清單之可移動式路側單元集群協定
|
第三十二屆全國資訊安全會議(CISC 2022) Cryptology and Information Security Conference 2022
|
2022-06-16~17
|
籃若瑜;蔡國裕;賴俊鳴;王銘宏
|
短文本論述萃取演算法
|
第三十二屆全國資訊安全會議(CISC 2022) Cryptology and Information Security Conference 2022
|
2022-07-18~23
|
Chih-Shuo Tsai, Ying-Hong Chan, Yao-Chung Fan
|
Hierarchical Cache Transformer: Dynamic Early Exit for Language Translation
|
2022 International Joint Conference on Neural Networks (IJCNN)
|
2022-7-23~29
|
Lei Hsiung, Yun-Yun Tsai, Pin-Yu Chen, Tsung-Yi Ho
|
CARBEN: Composite Adversarial Robustness Benchmark
|
The 31st International Joint Conference on Artificial Intelligence (IJCAI 2022) Demo Track
|
2022-09-22
|
Shu-Yu Kuo, Kuo-Chun Tseng, Yao-Hsin Chou, Fan-Hsun Tseng,
|
Quantum Oblivious Transfer with Reusable Bell State
|
Computers, Materials & Continua 2023, 74(1), 915-932
|
2022-10-10
|
Jason Lin; Chia-Wei Tsai; Chun-Wei Yang
|
Cryptanalysis and Improvement of the Measurement-Device-Independent Quantum Key Distribution with
Hyper-Encoding
|
Modern Physics Letters A , Vol. 37, No. 31, 2250212 (2022)
|
2022-10-14~16
|
Sying-Jyan Wang, Yi-Chi Lin, Chen-Yeh Lin, Song-Kong Chong, Katherine Shu-Min
Li
|
Automatic Alignment for Side-Channel Attack Against Cryptographic Modules
|
2022 IET International Conference on Engineering Technologies and Applications
|
2022-10-14~16
|
Chun-Tsai Chien, Chien Lung Wang and Sying-Jyan Wang
|
Zero Payload Enhanced AES Cryptography Against Side-Channel Attacks
|
2022 IET International Conference on Engineering Technologies and Applications
|
2022-10-14~16
|
Chien-Lung Wang; Iuon-Chang Lin; Chun-Tsai Chien; Sying-Jyan Wang ;Jou-An Shih; I-En Liao
|
An Evaluation of Cybersecurity Risks of DLMS/COSEM Smart Meter Using Fuzzing Testing
|
2022 IET International Conference on Engineering Technologies and Applications
|
2022-10-27~29
|
Shih-Wei Guo, Tzu-Chi Chen, Hui-Juan Wang, Fang-Yie Leu, Yao-Chung Fan
|
Generating Personalized Phishing Emails for Social Engineering Training Based on Neural Language Models.
|
BWCCA 2022: Advances on Broad-Band Wireless Computing, Communication and Applications
|
2022-11-21~23
|
S. -J. Wang, K. S. -M.Li,C. -Y. Lin and S. -K.Chong
|
Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication
|
31st Asian Test Symposium (ATS)
|
2022-12-15~17
|
施語涵;黃詩軒;蔡家緯;張耀中;盧韻文;王李品檠
|
基於用電負載情境預測冰水主機負載及電力能耗預測
|
2022 臺灣網際網路研討會TANET
|
2022-12-15~17
|
謝欣原;蔣貴君;蔡家緯
|
使用集成學習策略於住宅用戶異常用電行為辨識之研究
|
2022 臺灣網際網路研討會TANET
|
2023-01-14
|
Chun-Wei Yang; Hung-Wen Wang; Jason Lin; Chia-Wei Tsai
|
Semi-quantum Identification without Information Leakage
|
Mathematics 2023, 11(2), 452
|
2023-4-21~23
|
Tzu-Hsuan Huang, Chun-Tsai Chien, Chien-Lung Wang and I-En Liao
|
The Implementation of an HSM-Based Smart Meter for Supporting DLMS/COSEM Security Suite 1
|
IoTBDS 2023
|
2023-4-21~25
|
Chia-Wei Tsai, Jyun-Jie Hong, Yun-Hao Lee, Jason Lin, Chun-Wei Yang
|
Semi-quantum Private Comparison Protocol with Graph state
|
9th IEEE International Conference on Applied System Innovation 2023
|
2023-4-21~25
|
Yu-Xiang Zou; Jason Lin; Chia-Wei Tsai; Chun-Wei Yang
|
Alpha-Boost: A Fast Algorithm for Mining Workflow Nets
|
9th IEEE International Conference on Applied System Innovation 2023
|
2023-5-4
|
Chun-Wei Yang ; Jason Lin; Chia-Wei Tsai; Kai-Lin Wang; Chia-Wei Tsai
|
Cryptanalysis and improvement of a controlled quantum secure direct communication with authentication protocol
based on five-particle cluster state
|
Quantum Information Processing volume 22, Article number: 196 (2023)
|
2023-5
|
Iuon-Chang Lin, Yu-Wen Wang, Ting-Xuan Tai
|
A Grid-Based Key Pre-Distribution Scheme Using Dependent Keys in Wireless Sensor Networks
|
Journal of Information Science and Engineering, vol. 39, no. 3, pp. 459-472, (SCI).
|
2023-6-1~2
|
Iuon-Chang Lin; Pin Hsiang Chen
|
A Data Preservation Architecture for IOT Using Distributed Ledger Technology
|
第三十三屆全國資訊安全會議,6/1-6/2 2023, 嘉義中正大學
|
2023-6-1~2
|
翁偉銘;蔡國裕;郭崇韋
|
基於DAE之旁通道攻擊實作與分析
|
第三十三屆全國資訊安全會議(CISC 2023) Cryptology and Information Security Conference 2023
|
2023-6-23~25
|
Guan-Yu Chen and Iuon-Chang Lin
|
Using Blockchain to Achieve Self-Sovereign Identity (SSI) and Access Control for Customers in Financial
Institutions
|
Proceedings of 5th International Conference on Computer Communication and the Internet (ICCCI 2023), June
23-25, 2023 Fujisawa, Japan.
|
2023-7-19
|
Iuon-Chang Lin, Pai-Ching, Tseng, Yu-Sung Chang, and Tzu-Ching Weng
|
IOTA Data Preservation Implementation for Industrial Automation and Control Systems
|
Processes 2023, 11, 2160. https://doi.org/10.3390/pr11072160 (SCI)
|
2023-8-15~16
|
Iuon-Chang Lin, Jing-Yuan Huang, Jason Lin
|
A Certificate Management Mechanism Using Distributed Ledger
|
The 18th Asia Joint Conference on Information Security(AsiaJCIS2023), Aug.15-16, 2023, Tokyo, Japan
|
2023-8-16
|
Jason Lin, Chen-Yu Chang
|
Efficient Fault-tolerant Quantum Dialogue Protocols Using a Quantum Reordering Circuit of EPR Pairs
|
Physica Scripta, 98, 095110
|
2023-8-22
|
Jason Lin, Kuan-Hung Liu, Cih-Lian Lin
|
A Novel Data Hiding Scheme Based on Multidimensional Reference Tensors
|
Multimedia Tools and Applications, 83, pp. 25695–25712
|
2023-10-5
|
Chia-Wei Tsai and Chun-Hsiang Wang
|
Efficient Mediated Quantum Secret sharing protocol in a Restricted Quantum Environment
|
Annalen der Physik, 535, (11) 2300116
|
2023-10-25~27
|
Chun-Tsai Chien, Chien-Lung Wang, I-En Liao, Sying-Jyan Wang
|
Implementing OIML R46 Communication Unit for DLMS/COSEM Security Suite 1 and Passing CTT V3.1 Test
|
ICNSC 2023: 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL
|
2023-12-7~9
|
Chia-Wei Tsai, Jason Lin, Chun-Wei Yang, Fu-Nie Loo
|
Feasibility Analysis Study on Constructing a Grid Intrusion Detection System Using Semi-Supervised Learning
Models
|
2023 International Conference on Security and Information Technologies with AI, Internet Computing and
Big-data Applications (SITAIBA 2023), Dec. 7-9, 2023, New Taipei City, Taiwan.
|
2023-12-7~9
|
Chia-Chen Lin, Aristophane Nshimiyimana, Wei-Liang Tai and Morteza Sa-beriKamarposhti
|
An Object-based Multi-level Authentication Framework for AR e-book
|
2023 International Conference on Security and Information Technologies with AI, Internet Computing and
Big-data Applications (SITAIBA 2023), Dec. 7-9, 2023, New Taipei City, Taiwan.
|
2023-12-7~9
|
Iuon-Chang Lin and Yu-Chun Chan
|
Analysis and Detection of Abnormal Transactions on Ethereum
|
2023 International Conference on Security and Information Technologies with AI, Internet Computing and
Big-data Applications(SITAIBA 2023), Dec. 7-9, 2023, New Taipei City, Taiwan.
|
2024-1-3
|
Chen-Yu Chang, Jason Lin
|
Efficient Fault-Tolerant Quantum Dialogue Protocols Based on Dictionary Encoding without Decoy Photons
|
Quantum Information Processing, 23, 12
|
2024-1-26
|
Iuon-Chang Lin, Yi-Hsuan Kuo, Ching-Chun Chang, Jui-Chuan Liu, and Chin-Chen Chang
|
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring
Confidentiality
|
Symmetry 2024, 16(2), 147; https://doi.org/10.3390/sym16020147 (SCI)
|
2024-2
|
Yijie Lin, Chia-Chen Lin, Jui‐Chuan Liu, Chin‐Chen Chang
|
Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix
|
Journal of Information Security and Application (IF: 5.6), 2024/2/1, Vol. 80,
https://doi.org/10.1016/j.jisa.2023.103679
|
2024-2-7~9
|
I. C. Lin, P. C. Tseng, P. H. Chen and S. J. Chiou
|
Securing Industrial Control Systems: Enhancing Data Preservation in IoT with Streamlined IOTA Integration
|
Proceedings of 4th IFSA Winter Conference on Automation, Robotics & Communications for Industry 4.0 / 5.0,
(ARCI’ 2024), 7-9 February 2024, Innsbruck, Austria.
|
2024-2-16
|
Chia-Wei Tsai, Jason Lin, Chun-Wei Yang*
|
Cryptanalysis and Improvement of Quantum Secure Multi-Party Summation Using Single Photons
|
Physica Scripta, 99, 035114
|
2024-2-27
|
Katherine Shu-Min Li, Fang-Chi Wu, Jian-De Li, Sying-Jyan Wang
|
Reinforcement Learning Double DQN for Chip-Level Synthesis of Paper-Based Digital Microfluidic Biochips
|
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD)
|
2024-3-15
|
Jason Lin, Chang-Chi Chen, Chung-Yung Huang*
|
Efficient Dynamic Quantum Secret Sharing in Pre-Measurement and Post-Measurement Phases
|
Physica A: Statistical Mechanics and its Applications, 638, 129615
|
2024-3-18
|
Chit-Jie Chew; Wei-Bin Lee; Tzu-Hao Chen; Iuon-Chang Lin; Jung-San Lee
|
Log Preservation in Custody Dual Blockchain with Energy Regime and Obfuscation Shuffle
|
IEEE Transactions on Network Science and Engineering, 2024-03, 10.1109/TNSE.2024.3375921. (SCI)
|
2024-3-22
|
Che-Hao Chang, Jason Lin, Jia-Wei Chang, Yu-Shun Huang, Ming-Hsin Lai, Yen-Jen Chang
|
Hybrid Deep Neural Networks with Multi-Tasking for Rice Yield Prediction Using Remote Sensing Data
|
Agriculture, 14(4), 513
|
2024-4-17~21
|
Fu-Nie Loo, Tung-Shou Chen, Chia-Wei Tsai, Jason Lin, and Chun-Wei Yang
|
Feasibility Study of Semi-supervised Intrusion Detection Systems for Industrial Control Systems
|
2024 IEEE 10th International Conference on Applied System Innovation, April 17-21, Kyoto, Japan
|
2024-5-17~19
|
C.-F. Lee, T.-Y. Kang, and I.-C. Lin
|
Dual Medical-Image Reversible Data Embedding Method with Vector Directions
|
Proceedings of 2024 8th International Conference on Medical and Health Informatics (ICMHI 2024), Yokohama,
Japan, May 17-19, 2024.
|
2024-5-17~19
|
C.-F. Lee, T.-C. Tsai, and I.-C. Lin
|
The Study of Reversible Data Hiding with Contrast Enhancement for Medical Images
|
Proceedings of 2024 8th International Conference on Medical and Health Informatics (ICMHI 2024), Yokohama,
Japan, May 17-19, 2024.
|
2024-6-4~6
|
Yeong Kang Lai, Yi An Chen
|
Enhancing RFID Security through Integrated Physical Unclonable Functions and Lightweight Cryptography
|
IEEE RFID 2024:18th Annual International Conference on RFID, JUNE 4-6, 2024, BOSTON, MA.
|
2024-7-2~4
|
Yuan-Cheng Yu; Yen-Chieh Ouyang; Ling-Wei Wu; Chun-An Lin; Kuo-Yu Tsai
|
Multivariate Time-Series Anomaly Detection in IoT with a Bi-Dual GM GRU Autoencoder
|
COMPSAC 2024: 48th IEEE International Conference on Computers, Software, and Applications
|
2024-7-9~11
|
Yi-An Chen, Yi-Chiao Chen, Hong-Zhe Chen, Yeong-Kang La
|
A Data Encryption System Utilizing Physical Unclonable Functions Pseudorandom Functions and Ascon
|
2024 ICCE-TW(IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN), July 9-11,2024, Taichung, Taiwan.
|