2009 |
Managing IT Portfolios with Options, Synergies, and Balances: An Integrated Approach |
YU-JU TU、YU-JU TU、Shaw, M.J. |
conference |
|
2007-01 |
Modified HB Authentication Protocol |
YU-JU TU、YU-JU TU、Piramuthu, S. |
conference |
web page(224) |
2007 |
On Improving the Accuracy of RFID Tag Identification in Supply Chain Applications |
YU-JU TU、YU-JU TU、Piramuthu, S. |
conference |
|
2007-01 |
RFID Distance Bounding Protocols |
YU-JU TU、YU-JU TU、Piramuthu, S. |
conference |
web page(26) |
2018 |
The Value of e-Health Service Based on Multi-Stakeholder Perspectives |
YU-JU TU、YU-JU TU、Chang, H.L. |
conference |
web page(553) |
2019 |
以環境資訊和機器學習偵防RFID中繼攻擊 |
YU-JU TU、YU-JU TU、蔡承憲、魏銪志 |
conference |
web page(340) |
2016-07 |
A SCENARIO-BASED SIMULATION TOOL TO TEACH PRODUCT MANAGERS ORDER DECISION-MAKING IN THE ELECTRONIC COMPONENT INDUSTRY |
HSIN-LU CHANG、HSIN-LU CHANG、Tsaih, Yao-Hsien |
conference |
web page(305) |
2017-07 |
A Study of Gender Differences in Preferences of Tourism Facebook Fanpage Posts |
HSIN-LU CHANG、HSIN-LU CHANG、龔又嫻 |
conference |
web page(365) |
2019-08 |
Customer Co-Creation Practices and Brand Performance in Facebook Fan Pages |
HSIN-LU CHANG、HSIN-LU CHANG、彭雅瑄 |
conference |
web page(336) |
2018-06 |
How Design Features Lead to Visitors` Visit Intention through Virtual Reality Experience: The Case of National Palace Museum |
HSIN-LU CHANG、HSIN-LU CHANG、HSIN-LU CHANG、Wang, Kai、RUA-HUAN TSAIH、Pu, Lian |
conference |
web page(417) |
2016-08 |
IS portfolio characteristics and SCM capabilities |
HSIN-LU CHANG、HSIN-LU CHANG、YU-JU TU |
conference |
web page(373) |
2015-03 |
Toward a Maturity Model for Cloud Service Capability Assessment |
HSIN-LU CHANG、HSIN-LU CHANG、Chen, James、Wang, Kai |
conference |
|
2018-06 |
Using Virtual Reality for Museum Exhibitions: The Effects of Attention and Engagement for National Palace Museum |
HSIN-LU CHANG、HSIN-LU CHANG、HSIN-LU CHANG、Wang, Kai、RUA-HUAN TSAIH、Lin, Zhiyan |
conference |
web page(341) |
2019-12 |
AI-Based Online P2P Lending Risk Assessment On Social Network Data With Missing Value, |
SHUN-WEN HSIAO、SHUN-WEN HSIAO、Lam, Lok Ting |
conference |
web page(359) |
2018-07 |
ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps |
SHUN-WEN HSIAO、SHUN-WEN HSIAO、孫雅麗、陳建群、陳孟彰 |
conference |
web page(261) |
2019-12 |
IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis |
SHUN-WEN HSIAO、SHUN-WEN HSIAO、Chen, Cheng-Yu |
conference |
web page(368) |
2019-12 |
Mitigating DDoS with PoW and Game Theory |
SHUN-WEN HSIAO、SHUN-WEN HSIAO、Sung, Kun Yuan |
conference |
web page(275) |
2019-07 |
Tagging a Malware’s Intentions by using Attention-based Sequence-to-Sequence Neural Network |
SHUN-WEN HSIAO、SHUN-WEN HSIAO、Huang, Yi-Ting、Chen, Yu-Yuan、Yang, Chih-Chun、Sun, Yeali S.、Chen, Meng Chang |
conference |
web page(361) |
2019-01 |
環境資訊機器學習預測之RFID中繼攻擊預防 |
蔡承憲、YU-JU TU、魏銪志 |
conference |
|
2020-06 |
E-health Service Adoption: A Two-phase Analysis |
HSIN-LU CHANG、HSIN-LU CHANG、Lin, Hsien Tsung |
conference |
web page(391) |
2019-12 |
Investigating the Key Factor of Virtual Personal Brand in E-Commerce: A Case Study of “Myhomes” |
JIIN-TIAN CHYOU、Chyou, Jiin-Tian、Chen, Jiann-Horng、EUGENIA HUANG |
conference |
pdf(278) |
2020-03 |
A Cross-cultural Study on Information Architecture: Culture Differences on Attention Allocation to Web Components |
SHIH-YI CHIEN、JYI-SHANE LIU、Tang, Gao-Ming、Hu, Hsin-Yuan、Jeng, Wei |
conference |
web page(357) |
2020-09 |
Exploring the role of media richness to information disclosure |
SHIH-YI CHIEN、JYI-SHANE LIU、Luo, Jing-Ting、Lin, Yi-Ling |
conference |
pdf(272) |
2020-07 |
Preschool Safety Education with Digital Media-based Learning Application– Kinder |
SHIH-YI CHIEN、YI-LING LIN、JYI-SHANE LIU、 Lin, Yi-Ling、 Sun, Cheng-Feng、 Chan, Yao-Cheng、 Hsiao, I-Han |
conference |
web page(282) |
2020-09 |
Design Patterns for Blockchain-assisted Accountable Data Dissemination between IoT Devices and Edge Server |
CHUN-FENG LIAO、KUNG CHEN、CHUN-FENG LIAO、KUNG CHEN、Lin, Chun-An |
conference |
pdf(231) |