2021-06 |
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model |
曾一凡、Tseng, Yi-Fan、Fan, Chun-I |
article |
pdf(261) |
2021-05 |
Designated-ciphertext searchable encryption |
曾一凡、Tseng, Yi-Fan、Liu, Zi-Yuan、Tso, Raylin、Mambo, Masahiro |
article |
pdf(233) |
2019-12 |
Identity-based Blind Multisignature from Lattices |
曾一凡、Tseng, Yi-Fan、Tso, Raylin、Liu, Zi-Yuan |
article |
pdf(219) |
2021-02 |
Message Propagation in DTN Based on Virtual Contact of Behavior Model |
蔡子傑、Tsai, Tzu-Chieh、Chan, Ho-Hsiang |
article |
pdf(220) |
2020-12 |
Decision-making models for using multimedia marketing in enterprises |
謝佩璇、Hsieh, P. H.、Hsiung, Yu-Lu |
article |
pdf(227) |
2021-01 |
Online consumers` brain activities when purchasing second-hand versus new products that are brand-name or brand-less |
謝佩璇、Hsieh, P. H.、Chang, Fang-Ning |
article |
pdf(265) |
2020-12 |
On-site personnel`s use of mobile cloud computing applications— A case study of an LCD panel manufacturing company |
謝佩璇、Hsieh, P. H.、wang, Chih-Hao |
article |
pdf(226) |
2021-09 |
An Evaluation of Taiwan`s College Course Requirements in Information-Related Programs and the Competencies required by the Market |
謝佩璇、Hsieh, P. H.、游佳萍、Yu, Chia-ping、邱厚儕、Chiu, Hou-chai |
article |
pdf(185) |
2021-10 |
The Construction of Taiwan Hakka Corpus and Preliminary Analysis of Hakka Lexical Usage |
賴惠玲、葉秋杏、劉吉軒、Lai, Huei-ling、Yeh, Chiou-shing、Liu, Jyi-shane |
article |
pdf(202) |
2022-02 |
HiCmapTools: a tool to access HiC contact maps |
張家銘、Chang, Jia-Ming、Weng, Yi-Fu、Chang, Wei-Ting、Lin, Fu-An、Cavalli, Giacomo |
article |
說明頁(259) |
2022-03 |
Item Concept Network: Towards Concept-based Item Representation Learning |
蔡銘峰、Tsai, Ming-Feng、Wang, Ting-Hsiang、Yang, Hsiu-Wei、Chen, Chih-Ming、Wang, Chuan-Ju |
article |
說明頁(191) |
2018-06 |
Leveraging Affective Hashtags for Ranking Music Recommendations |
蔡銘峰、Tsai, Ming-Feng、Zangerle, Eva、Chen, Chih-Ming、Yang, Yi-Hsuan |
article |
說明頁(151) |
2021-10 |
Multi-stage Conversational Passage Retrieval: An Approach to Fusing Term Importance Estimation and Neural Query Rewriting |
蔡銘峰、Tsai, Ming-Feng、Lin, Sheng-Chieh、Yang, Jheng-Hong、Nogueira, Rodrigo、Wang, Chuan-Ju、Lin, Jimmy |
article |
說明頁(178) |
2022-01 |
A Fast Two-Stage Bilateral Filter Using Constant Time O(1) Histogram Generation |
彭彥璁、Peng, Yan-Tsung、Cheng, Sheng-Wei、Lin, Yi-Ting |
article |
說明頁(157) |
2021-09 |
Applying artificial intelligence (AI) techniques to implement a practical smart cage aquaculture management system |
彭彥璁、Peng, Yan-Tsung、Chang, Chung-Cheng、Wang, Jung-Hua、Wu, Jenq-Lang、Hsieh, Yi-Zeng、Wu, Tzong-Dar、Cheng, Shyi-Chy、Chang, Chin-Chun、Juang, Jih-Gau、Liou, Chyng-Hwa、Hsu, Te-Hua、Huang, Yii-Shing、Huang, Cheng-Ting、Lin, Chen-Chou、Huang, Ren-Jie、Jhang, Jia-Yao、Liao, Yen-Hsiang、Lin, Chin-Yang |
article |
說明頁(313) |
2022-07 |
Applying Artificial Intelligence (AI) to improve fire response activities |
彭彥璁、Peng, Yan-Tsung、Chang, Ray Hsienho、Choi, Seongchul、Cai, Changjie |
article |
說明頁(180) |
2021-10 |
Image Impulse Noise Removal Using Cascaded Filtering Based on Overlapped Adaptive Gaussian Smoothing and Convolutional Refinement Networks |
彭彥璁、Peng, Yan-Tsung、Huang, Sha-Wo |
article |
說明頁(100) |
2022-02 |
Single Image Reflection Removal Based on Knowledge-Distilling Content Disentanglement |
彭彥璁、Peng, Yan-Tsung、Cheng, Kai-Han、Fang, I-Sheng、Peng, Wen-Yi、Wu, Jr-Shian |
article |
說明頁(106) |
2021-12 |
Two-Exposure Image Fusion Based on Optimized Adaptive Gamma Correction |
彭彥璁、Peng, Yan-Tsung、Liao, He-Hao、Chen, Ching-Fu |
article |
說明頁(91) |
2022-03 |
Underwater Image Enhancement Based on Histogram-Equalization Approximation Using Physics-Based Dichromatic Modeling |
彭彥璁、Peng, Yan-Tsung、Chen, Yen-Rong、Chen, Zihao、Wang, Jung-Hua、Huang, Shih-Chia |
article |
說明頁(174) |
2021-09 |
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism |
曾一凡、左瑞麟、Tseng, Yi-Fan、Tso, Raylin、Liu, Zi-Yuan |
article |
說明頁(129) |
2022-05 |
A Novel Undeniable (t, n)-Threshold Signature with Cheater Identification |
曾一凡、Tseng, Yi-Fan、Lin, Yan-Bin |
article |
說明頁(123) |
2022-01 |
Decentralized Inner-Product Encryption with Constant-Size Ciphertext |
曾一凡、Tseng, Yi-Fan、Gao, Shih-Jie |
article |
說明頁(131) |
2022-06 |
Extension of elliptic curve Qu–Vanstone certificates and their applications |
曾一凡、 左瑞麟、Tseng, Yi-Fan、 Tso, Raylin、Liu, Zi-Yuan、Wang, Peter Shaojui、Su, Qin-Wen |
article |
說明頁(119) |
2022-11 |
Fast keyword search over encrypted data with short ciphertext in clouds |
曾一凡、Tseng, Yi-Fan、Fan, Chun-I、Liu, Zi-Cheng |
article |
說明頁(243) |