Showing results 1 to 20 of 29
next >
Date | Title | Author(s) |
5-Oct-2023 | A Genetic Algorithm Based Consensus Reaching Method on Malware Labels | 蕭舜文; Hsiao, Shun-Wen;Wang, Shih-Yu |
24-Jun-2020 | AI-Based Online P2P Lending Risk Assessment On Social Network Data With Missing Value, | 蕭舜文; Hsiao, Shun-Wen; Lam, Lok Ting |
24-Jun-2020 | ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps | 蕭舜文; Hsiao, Shun-Wen; 孫雅麗; 陳建群; 陳孟彰 |
8-Sep-2023 | Based on Attention Mechanism to Explain Consumer Purchase Intention in Live Streaming Commerce | 蕭舜文 |
5-Sep-2019 | filterNN: 基於神經網路之序列資料特徵選取方法 | 吳皓銘; Wu, Hao-Ming |
31-Jan-2023 | Fintech趨勢與前瞻-區塊鏈發展趨勢與應用 | 蕭舜文; 周樹林;黃思皓;周維忠;吳顯東;李震華;童啟晟;陳凱迪;彭采薇;ELECTRONICS, NIKKEI |
27-May-2020 | Hardware-Assisted MMU Redirection for In-guest Monitoring and API Profiling | 蕭舜文; Hsiao, Shun-Wen ; 孫雅麗; 陳孟彰 |
24-Jun-2020 | IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis | 蕭舜文; Hsiao, Shun-Wen; Chen, Cheng-Yu |
31-Jan-2023 | Learning Dynamic Malware Representation from Common Behavior | 蕭舜文; Hsiao, Shun-Wen; Huang, Yi-Ting;Chen, Ting-Yi;Sun, Yeali S. |
24-Jun-2020 | Mitigating DDoS with PoW and Game Theory | 蕭舜文; Hsiao, Shun-Wen; Sung, Kun Yuan |
22-Apr-2020 | Runtime Hook on Blockchain and Smart Contract Systems | 林韋廷; 郁方; 蕭舜文 |
6-Sep-2017 | A Secure Proxy-Based Cross-Domain Communication for Web Mashup | 蕭舜文; 孫雅麗; 陳孟彰; Hsiao, Shun-Wen; Sun, Yeali S.; Ao, Fu-Chi; Chen, Meng Chang |
17-Feb-2023 | Sequence-Based Malware Behavior Analysis by Recurrent Neural Networks | 蕭舜文 |
24-Jun-2020 | Tagging a Malware’s Intentions by using Attention-based Sequence-to-Sequence Neural Network | 蕭舜文; Hsiao, Shun-Wen; Huang, Yi-Ting; Chen, Yu-Yuan; Yang, Chih-Chun; Sun, Yeali S.; Chen, Meng Chang |
31-Jan-2023 | 以區塊鏈技術、流程安全與選民隱私設計之去中心化投票架構 | 蕭舜文; Hsiao, Shun-wen; 黃建勛; Huang, Chien-shiun |
2-Sep-2020 | 以工作量證明與賽局理論減輕售票系統的DDoS-like請求與黃牛行為 | 宋昆原; Sung, Kun-Yuan |
2-Sep-2021 | 以成對共識分數評估多個分類器中含雜亂標籤的分類結果 | 陳璿心; Chen, Hsuan-Hsin |
27-May-2020 | 使用動態分析資料於卷積神經網路上進行惡意程式家族分類 | 蕭舜文; Hsiao, Shun-Wen |
2-Mar-2020 | 具長短期記憶之序列特徵選取方法 | 李宜臻; Lee, Yi-Jen |
1-Sep-2023 | 利用 HTTP 封包採取非監督式深度學習演算法進行網路攻擊樣態分析 | 陳唯哲; Chen, Wei-Zhe |