2021-06 |
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model |
YI-FAN TSENG、Tseng, Yi-Fan、Fan, Chun-I |
article |
pdf(413) |
2021-05 |
Designated-ciphertext searchable encryption |
YI-FAN TSENG、Tseng, Yi-Fan、Liu, Zi-Yuan、RAY-LIN TSO、Mambo, Masahiro |
article |
pdf(350) |
2019-12 |
Identity-based Blind Multisignature from Lattices |
YI-FAN TSENG、Tseng, Yi-Fan、RAY-LIN TSO、Liu, Zi-Yuan |
article |
pdf(358) |
2021-02 |
Message Propagation in DTN Based on Virtual Contact of Behavior Model |
TZU-CHIEH TSAI、TZU-CHIEH TSAI、Chan, Ho-Hsiang |
article |
pdf(335) |
2020-12 |
Decision-making models for using multimedia marketing in enterprises |
PEI-HSUAN HSIEH、Hsieh, P. H.、Hsiung, Yu-Lu |
article |
pdf(369) |
2021-01 |
Online consumers` brain activities when purchasing second-hand versus new products that are brand-name or brand-less |
PEI-HSUAN HSIEH、Hsieh, P. H.、Chang, Fang-Ning |
article |
pdf(400) |
2020-12 |
On-site personnel`s use of mobile cloud computing applications— A case study of an LCD panel manufacturing company |
PEI-HSUAN HSIEH、Hsieh, P. H.、wang, Chih-Hao |
article |
pdf(303) |
2021-09 |
An Evaluation of Taiwan`s College Course Requirements in Information-Related Programs and the Competencies required by the Market |
PEI-HSUAN HSIEH、Hsieh, P. H.、游佳萍、Yu, Chia-ping、邱厚儕、Chiu, Hou-chai |
article |
pdf(286) |
2021-10 |
The Construction of Taiwan Hakka Corpus and Preliminary Analysis of Hakka Lexical Usage |
HUEI-LING LAI、葉秋杏、JYI-SHANE LIU、Lai, Huei-ling、Yeh, Chiou-shing、JYI-SHANE LIU |
article |
pdf(301) |
2022-02 |
HiCmapTools: a tool to access HiC contact maps |
JIA-MING CHANG、JIA-MING CHANG、Weng, Yi-Fu、Chang, Wei-Ting、Lin, Fu-An、Cavalli, Giacomo |
article |
web page(381) |
2022-03 |
Item Concept Network: Towards Concept-based Item Representation Learning |
MING-FENG TSAI、MING-FENG TSAI、Wang, Ting-Hsiang、Yang, Hsiu-Wei、CHIH-MING CHEN、MING-FENG TSAI |
article |
web page(303) |
2018-06 |
Leveraging Affective Hashtags for Ranking Music Recommendations |
MING-FENG TSAI、MING-FENG TSAI、Zangerle, Eva、CHIH-MING CHEN、Yang, Yi-Hsuan |
article |
web page(285) |
2021-10 |
Multi-stage Conversational Passage Retrieval: An Approach to Fusing Term Importance Estimation and Neural Query Rewriting |
MING-FENG TSAI、MING-FENG TSAI、Lin, Sheng-Chieh、Yang, Jheng-Hong、Nogueira, Rodrigo、MING-FENG TSAI、Lin, Jimmy |
article |
web page(296) |
2022-01 |
A Fast Two-Stage Bilateral Filter Using Constant Time O(1) Histogram Generation |
YAN TSUNG PENG、Peng, Yan-Tsung、Cheng, Sheng-Wei、Lin, Yi-Ting |
article |
web page(318) |
2021-09 |
Applying artificial intelligence (AI) techniques to implement a practical smart cage aquaculture management system |
YAN TSUNG PENG、Peng, Yan-Tsung、Chang, Chung-Cheng、Wang, Jung-Hua、Wu, Jenq-Lang、Hsieh, Yi-Zeng、Wu, Tzong-Dar、Cheng, Shyi-Chy、Chang, Chin-Chun、Juang, Jih-Gau、Liou, Chyng-Hwa、Hsu, Te-Hua、Huang, Yii-Shing、Huang, Cheng-Ting、Lin, Chen-Chou、Huang, Ren-Jie、Jhang, Jia-Yao、Liao, Yen-Hsiang、Lin, Chin-Yang |
article |
web page(435) |
2022-07 |
Applying Artificial Intelligence (AI) to improve fire response activities |
YAN TSUNG PENG、Peng, Yan-Tsung、Chang, Ray Hsienho、Choi, Seongchul、Cai, Changjie |
article |
web page(291) |
2021-10 |
Image Impulse Noise Removal Using Cascaded Filtering Based on Overlapped Adaptive Gaussian Smoothing and Convolutional Refinement Networks |
YAN TSUNG PENG、Peng, Yan-Tsung、Huang, Sha-Wo |
article |
web page(199) |
2022-02 |
Single Image Reflection Removal Based on Knowledge-Distilling Content Disentanglement |
YAN TSUNG PENG、Peng, Yan-Tsung、Cheng, Kai-Han、Fang, I-Sheng、Peng, Wen-Yi、Wu, Jr-Shian |
article |
web page(207) |
2021-12 |
Two-Exposure Image Fusion Based on Optimized Adaptive Gamma Correction |
YAN TSUNG PENG、Peng, Yan-Tsung、Liao, He-Hao、Chen, Ching-Fu |
article |
web page(195) |
2022-03 |
Underwater Image Enhancement Based on Histogram-Equalization Approximation Using Physics-Based Dichromatic Modeling |
YAN TSUNG PENG、Peng, Yan-Tsung、Chen, Yen-Rong、Chen, Zihao、Wang, Jung-Hua、Huang, Shih-Chia |
article |
web page(292) |
2021-09 |
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism |
YI-FAN TSENG、RAY-LIN TSO、Tseng, Yi-Fan、RAY-LIN TSO、Liu, Zi-Yuan |
article |
web page(274) |
2022-05 |
A Novel Undeniable (t, n)-Threshold Signature with Cheater Identification |
YI-FAN TSENG、Tseng, Yi-Fan、Lin, Yan-Bin |
article |
web page(249) |
2022-01 |
Decentralized Inner-Product Encryption with Constant-Size Ciphertext |
YI-FAN TSENG、Tseng, Yi-Fan、Gao, Shih-Jie |
article |
web page(260) |
2022-06 |
Extension of elliptic curve Qu–Vanstone certificates and their applications |
YI-FAN TSENG、RAY-LIN TSO、Tseng, Yi-Fan、RAY-LIN TSO、Liu, Zi-Yuan、Wang, Peter Shaojui、Su, Qin-Wen |
article |
web page(248) |
2022-11 |
Fast keyword search over encrypted data with short ciphertext in clouds |
YI-FAN TSENG、Tseng, Yi-Fan、Fan, Chun-I、Liu, Zi-Cheng |
article |
web page(552) |