2020-01 |
Digital Humanities Research on Urban Awareness Network: Take the Reports on Shenzhenin People’s Daily (1946-2016) as an Example |
劉昭麟、Chaolin, Liu、邱伟云、Weiyun, Chiu |
article |
pdf(203) |
2020-12 |
Practical Inner Product Encryption with Constant Private Key |
曾一凡、Tseng, Yi-Fan、Liu, Zi-Yuan、Tso, Raylin |
article |
pdf(294) |
2021-03 |
Supervised Word Sense Disambiguation on Polysemy with Neural Network Models: A Case Study of BUN in Taiwan Hakka |
劉吉軒、Liu , Jyi-Shane、Lai, Huei-Ling、Hsu, Hsiao-Ling、Lin, Chia-Hung、Chen, Yanhong |
article |
說明頁(375) |
2021-05 |
Designated-ciphertext searchable encryption |
左瑞麟、Tso, Raylin、Zi-YuanLiu、Yi-FanTseng、MasahiroMambo |
article |
pdf(139) |
2020-08 |
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing |
左瑞麟、Tso, Raylin、Huang, Kaibin、Chen, Yu-Chi、RAHMAN, SK MD MIZANUR、Wu, Tsu-Yang |
article |
pdf(199) |
2020-11 |
Intelligence-led response: turning theory into law enforcement practice in cyber security incidents |
左瑞麟、Tso, Raylin、Kao, Da-Yu、Hsiao, Shou-Ching |
article |
說明頁(206) |
2021-02 |
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function |
左瑞麟、 曾一凡、Tso, Raylin、 Tseng, Yi-Fan、 Liu, Zi-Yuan、 Hsu, Jen-Chieh |
article |
pdf(227) |
2020-05 |
PrivGRU: Privacy-preserving GRU inference using additive secret sharing |
左瑞麟、Tso, Raylin |
article |
說明頁(234) |
2021-01 |
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks |
左瑞麟、Tso, Raylin、Wu, Tsu‑Yang 、Lee, Zhiyuan、Yang, Lei |
article |
pdf(252) |
2021-08 |
An Advanced Noise Reduction and Edge Enhancement Algorithm |
彭彥璁、Peng, Yan-Tsung、Huang, Shih-Chia、Hoang, Quoc-Viet、Le, Trung-Hieu、Huang, Ching-Chun |
article |
pdf(258) |
2021-06 |
Automatic Intermediate Generation With Deep Reinforcement Learning for Robust Two-Exposure Image Fusion |
彭彥璁、Peng, Yan-Tsung、Yin, Jia-Li、Chen, Bo-Hao、Hwang, Hau |
article |
pdf(188) |
2021-05 |
Image Denoising Using Adaptive and Overlapped Average Filtering and Mixed-Pooling Attention Refinement Networks |
彭彥璁、Peng, Yan-Tsung、Lin, Ming-Hao、Hou, Zhi-Xiang、Cheng, Kai-Han、Wu, Chin-Hsien |
article |
pdf(180) |
2021-06 |
Two Exposure Fusion Using Prior-Aware Generative Adversarial Network |
彭彥璁、Peng, Yan-Tsung、Yin, Jia-Li、Chen, Bo-Hao |
article |
pdf(150) |
2021-06 |
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model |
曾一凡、Tseng, Yi-Fan、Fan, Chun-I |
article |
pdf(262) |
2021-05 |
Designated-ciphertext searchable encryption |
曾一凡、Tseng, Yi-Fan、Liu, Zi-Yuan、Tso, Raylin、Mambo, Masahiro |
article |
pdf(234) |
2021-02 |
Message Propagation in DTN Based on Virtual Contact of Behavior Model |
蔡子傑、Tsai, Tzu-Chieh、Chan, Ho-Hsiang |
article |
pdf(224) |
2020-12 |
Decision-making models for using multimedia marketing in enterprises |
謝佩璇、Hsieh, P. H.、Hsiung, Yu-Lu |
article |
pdf(228) |
2021-01 |
Online consumers` brain activities when purchasing second-hand versus new products that are brand-name or brand-less |
謝佩璇、Hsieh, P. H.、Chang, Fang-Ning |
article |
pdf(265) |
2020-12 |
On-site personnel`s use of mobile cloud computing applications— A case study of an LCD panel manufacturing company |
謝佩璇、Hsieh, P. H.、wang, Chih-Hao |
article |
pdf(226) |
2021-09 |
An Evaluation of Taiwan`s College Course Requirements in Information-Related Programs and the Competencies required by the Market |
謝佩璇、Hsieh, P. H.、游佳萍、Yu, Chia-ping、邱厚儕、Chiu, Hou-chai |
article |
pdf(186) |
2021-10 |
The Construction of Taiwan Hakka Corpus and Preliminary Analysis of Hakka Lexical Usage |
賴惠玲、葉秋杏、劉吉軒、Lai, Huei-ling、Yeh, Chiou-shing、Liu, Jyi-shane |
article |
pdf(204) |
2022-02 |
HiCmapTools: a tool to access HiC contact maps |
張家銘、Chang, Jia-Ming、Weng, Yi-Fu、Chang, Wei-Ting、Lin, Fu-An、Cavalli, Giacomo |
article |
說明頁(260) |
2022-03 |
Item Concept Network: Towards Concept-based Item Representation Learning |
蔡銘峰、Tsai, Ming-Feng、Wang, Ting-Hsiang、Yang, Hsiu-Wei、Chen, Chih-Ming、Wang, Chuan-Ju |
article |
說明頁(192) |
2021-10 |
Multi-stage Conversational Passage Retrieval: An Approach to Fusing Term Importance Estimation and Neural Query Rewriting |
蔡銘峰、Tsai, Ming-Feng、Lin, Sheng-Chieh、Yang, Jheng-Hong、Nogueira, Rodrigo、Wang, Chuan-Ju、Lin, Jimmy |
article |
說明頁(181) |
2022-01 |
A Fast Two-Stage Bilateral Filter Using Constant Time O(1) Histogram Generation |
彭彥璁、Peng, Yan-Tsung、Cheng, Sheng-Wei、Lin, Yi-Ting |
article |
說明頁(161) |