Showing results 592 to 611 of 936
< previous
next >
Date | Title | Author(s) |
27-May-2010 | Phonological and logographic influences on errors in written Chinese words | 劉昭麟; Liu, Chao-Lin; Tien, Kan-Wen; Lai, Min-Hua; Chuang, Yi-Hsuan; Wu, Shih-Hung |
22-Jun-2015 | Physically-based virtual glove puppet | Huang, Ssu Shin;Chi, Ming-Te;Li, Tsai-Yen; 黃嗣心;紀明德;李蔡彥 |
16-Jun-2015 | Pitfalls in an ultra-lightweight authentication protocol for low-cost RFID | Chen, C.M.;Pan, J.S.;Tso, Ray-Lin;Huang, Szu Wei;Wu, M.E.; 左瑞麟 |
15-Jan-2016 | PKE-AET: Public Key Encryption with Authorized Equality Test | HUANG, KAIBIN;TSO, RAYLIN;CHEN, YU-CHI;RAHMAN, SK MD MIZANUR;ALMOGREN, AHMAD;ALAMRI, ATIF; 左瑞麟 |
17-Apr-2015 | Placement of control network for mobile agents over opportunistic networks | Lien, Yao-Nan;Lin, Yi-Shiuan; 連耀南;林怡萱 |
11-Apr-2016 | Popularity Prediction of Social Multimedia Based on Concept Drift | Jheng, S. H.;Li, C. T.;Shan, M. K.; 沈錳坤 |
21-May-2015 | Popularity spray and utility-based forwarding scheme with message priority scheduling in delay tolerant networks | Tsai, Tzu-Chieh; 蔡子傑; Chen, Ying Ming; 陳英明 |
24-Aug-2015 | Post-Modern Portfolio Theory for Information Retrieval | Tsai, Ming-Feng;Wang, Chuan-Ju; 蔡銘峰 |
27-Oct-2021 | Practical Inner Product Encryption with Constant Private Key | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin |
9-Dec-2021 | Practical Predicate Encryption for Inner Product | 左瑞麟; 曾一凡; Tso, Raylin; Tseng, Yi-Fan; Liu, Zi-Yuan |
26-Jan-2021 | Predicting Neurodegenerative Diseases Using a Novel Blood Biomarkers-based Model by Machine Learning | 邱淑怡; Chiu, Shu-i; Lin, Chin-Hsien; Lim, Wee Shin; Chiu, Ming-Jang |
13-Jul-2015 | Predicting trends of stock prices with text classification techniques | Chen, Jiun Da;Wang, T.-P.;Liu, Chao-Lin; 陳俊達;劉昭麟 |
27-Apr-2016 | Prediction of nuclear proteins using nuclear translocation signals proposed by probabilistic latent semantic indexing | Su, Emily Chia-Yu; 張家銘; Hsu, Wen-Lian; Sung, Ting-Yi; Cheng, Cheng-Wei; Chang, Jia-Ming |
21-Aug-2014 | Prediction of Web Page Accesses by Proxy Server Log | 陳良弼; Wu,Yi-Hung;Chen,Arbee L. P. |
24-Aug-2015 | Privacy preserving itemset mining through noisy items | Lin, Jun-Lin;Cheng, Yung-Wei; 鄭雍瑋 |
6-Feb-2023 | Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT | 曾一凡; 左瑞麟; Tseng, Yi-Fan; Tso, Raylin; Lee, Cheng-Yi;Liu, Zi-Yuan |
15-Dec-2016 | Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud | Tso, Raylin;Alelaiwi, Abdulhameed;Rahman, Sk Md Mizanur;Wu, Mu-En;Hossain, M. Shamim; 左瑞麟 |
11-Apr-2016 | Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web | Hu, Yuh-Jong; 胡毓忠 |
23-Dec-2021 | Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function | 左瑞麟; 曾一凡; Tso, Raylin; Tseng, Yi-Fan; Liu, Zi-Yuan; Hsu, Jen-Chieh |
23-Dec-2021 | PrivGRU: Privacy-preserving GRU inference using additive secret sharing | 左瑞麟; Tso, Raylin |