2024-08 |
scGHSOM: Hierarchical clustering and visualization of single-cell and CRISPR data using growing hierarchical SOM |
conference |
pdf(47) |
2024-04 |
Sugar-coated poison defense on deepfake face-swapping attacks |
conference |
web page(96) |
2023-12 |
Facial Nerve Disorder Rehabilitation via Generative Adversarial Network |
conference |
web page(81) |
2023-07 |
On searching information leakage of Python model execution to detect adversarial examples |
conference |
web page(126) |
2023-05 |
DeepSHAP Summary for Adversarial Example Detection |
conference |
web page(196) |
2022-04 |
XFlag: Explainable Fake News Detection Model on Social Media |
article |
web page(228) |
2019-07 |
Runtime Hook on Blockchain and Smart Contract Systems |
conference |
pdf(396) |
2019-06 |
基於狀態的可修改智能合約 |
conference |
pdf(226) |
2019-06 |
智慧檢測IOS應用上不正當使用廣告套件行為 |
conference |
pdf(149) |
2019-06 |
基於合作學習的神經網路進行圖片轉換 |
conference |
pdf(186) |
2018-12 |
Malware Family Characterization with Recurrent Neural Network and GHSOM using System Calls |
conference |
web page(509) |
2018-07 |
Quantitative quality estimation of cloud-based streaming services |
article |
pdf(484) |
2018-07 |
Biparti Majority Learning with Tensors |
conference |
pdf(431) |
2018-07 |
A Symbolic Model Checking Approach to the Analysis of String and Length Constraints |
conference |
pdf(444) |
2017-12 |
String Analysis for Software Verification and Security |
book/chapter |
web page(690) |
2017-05-13 |
無所不在的手機爬蟲:手機裝置的共享經濟於 Facebook 內容的搜集應用 |
conference |
web page(730) |
2017-01 |
Gnafuy: A framework for ubiquitous mobile computation |
conference |
web page(652) |
2016-08 |
AppReco: Behavior-aware recommendation for iOS mobile applications |
conference |
pdf(406) |
2016-07 |
Optimal Sanitization Synthesis for Web Application Vulnerability Repair |
conference |
pdf(447) |
2016-05 |
Simulating Time-Varying Demand Services with Queuing Models |
conference |
pdf(416) |
2016-02 |
VISO: Characterizing malicious behaviors of virtual machines with unsupervised clustering |
conference |
web page(655) |
2016-02 |
Investigating security mechanisms for ICT-enabled services of the National Palace Museum |
book/chapter |
web page(744) |
2016 |
String analysis via automata manipulation with logic circuit representation |
conference |
pdf(419) |
2015-05 |
Space Connection: A New 3D Tele-Immersion Platform for Web-based Gesture-collaborative Games and Services |
conference |
pdf(674) |
2015 |
Network-traffic anomaly detection with incremental majority learning |
conference |
web page(580) |