Showing results 13 to 32 of 62
< previous
next >
Date | Title | Author(s) |
15-Sep-2017 | Investigating security mechanisms for ICT-enabled services of the National Palace Museum | 郁方; Yu, Fang |
19-Mar-2019 | Malware Family Characterization with Recurrent Neural Network and GHSOM using System Calls | 郁方; Yu, Fang; Liu, Chi-Feng; Hsiao, Shun-Wen |
9-Aug-2017 | Network-traffic anomaly detection with incremental majority learning | 郁方; Huang, Shin-Ying; Yu, Fang; Tsaih, Rua-Huan; Huang, Yennun; 蔡瑞煌 |
5-Oct-2023 | On searching information leakage of Python model execution to detect adversarial examples | 郁方; Yu, Fang;Guo, Cheng-Yao |
29-Aug-2017 | Optimal Sanitization Synthesis for Web Application Vulnerability Repair | 郁方; Yu, Fang; Shueh, Ching-Yuan; Lin, Chun-Han; Chen, Yu-Fang; Wang, Bow-Yaw; Bultan, Tevfik |
27-Aug-2015 | Patching vulnerabilities with sanitization synthesis | Yu, Fang;Alkhalaf, Muath;Bultan, Tevfik; 郁方 |
1-Jun-2021 | Python指令碼的符號化分析與條件生成 | 詹語昕; Jan, Yu-Shin |
2-Dec-2022 | python程式執行的資訊洩漏研究與應用 | 藍加良; Lan, Jia-Liang |
24-Jul-2018 | Quantitative quality estimation of cloud-based streaming services | 郁方; Yu, Fang; Wan, Yat-wah; 蔡瑞煌; Tsaih, Rua-huan |
22-Apr-2020 | Runtime Hook on Blockchain and Smart Contract Systems | 林韋廷; 郁方; 蕭舜文 |
16-Jun-2015 | Securing KVM-based cloud systems via virtualization introspection | Lee, Sheng Wei;Yu, Fang; 郁方 |
6-Jun-2016 | Simulating Time-Varying Demand Services with Queuing Models | 郁方; Chu, Hsuan-Kai;Cheny, Wan-Ping;Yu, Fang |
17-Dec-2015 | Space Connection: A New 3D Tele-Immersion Platform for Web-based Gesture-collaborative Games and Services | 郁方; Lin, Chun-Han;Sun, Pei-Yu;Yu, Fang |
22-Jun-2015 | String abstractions for string verification | Yu, Fang;Bultan, T.;Hardekopf, B.; 郁方 |
17-Aug-2018 | String Analysis for Software Verification and Security | Bultan, Tevfik; 郁方; Yu, Fang; Alkhalaf, Muath |
1-Sep-2017 | String analysis via automata manipulation with logic circuit representation | 郁方; Wang, Hung En; Tsai, Tzung Lin; Lin, Chun Han; Yu, Fang; Jiang, Jie-Hong Roland |
26-Dec-2013 | Symbolic Consistency Checking of OpenMP Parallel Programs | 郁方; Yu,Fang ; Yang,Shun-Ching ; Wang,Farn ; Chen,Guan-Cheng ; Chan,Che-Chang |
29-Nov-2018 | A Symbolic Model Checking Approach to the Analysis of String and Length Constraints | 郁方; Yu, Fang; Wang, Hung-En;Chen, Shih-Yu;Yu, Fang;Jiang, Jie-Hong R. |
1-Sep-2017 | VISO: Characterizing malicious behaviors of virtual machines with unsupervised clustering | 曾宇瑞; 郁方; Li, Yen Han; Tzeng, Yeu Ruey; Yu, Fang |
12-Feb-2019 | 二元主體學習技術研究與張量流實作 | 李佳倫; Lee, Chia-Lun |