| 2026-04 |
Agentic Taxation Optimization via LLM SMT-Constraint Reasoning |
conference |
pdf(10) |
| 2025-11 |
Neuro-Symbolic Compliance: Integrating LLMs and SMT for Automated Financial Legal Analysis |
conference |
pdf(14) |
| 2025-08 |
DeRAG: Black-box Adversarial Attacks on Multiple Retrieval-Augmented Generation Applications via Prompt Injection |
conference |
pdf(129) |
| 2025-08 |
A Hybrid Framework for Financial Regulatory Compliance: Integrating LLMs and SMT Solvers for Automated Legal Analysis |
conference |
pdf(180) |
| 2025-07 |
scGHSOM: A Hierarchical Framework for Single-Cell Data Clustering and Visualization |
article |
說明頁(264) |
| 2025-03 |
Concolic Testing on Individual Fairness of Neural Network Models |
article |
說明頁(397) |
| 2024-08 |
scGHSOM: Hierarchical clustering and visualization of single-cell and CRISPR data using growing hierarchical SOM |
conference |
pdf(349) |
| 2024-07 |
Concolic Testing on Individual Fairness of Neural Network Models |
conference |
pdf(321) |
| 2024-04 |
Sugar-coated poison defense on deepfake face-swapping attacks |
conference |
說明頁(452) |
| 2023-12 |
Facial Nerve Disorder Rehabilitation via Generative Adversarial Network |
conference |
說明頁(390) |
| 2023-07 |
On searching information leakage of Python model execution to detect adversarial examples |
conference |
說明頁(373) |
| 2023-05 |
DeepSHAP Summary for Adversarial Example Detection |
conference |
說明頁(529) |
| 2022-04 |
XFlag: Explainable Fake News Detection Model on Social Media |
article |
說明頁(624) |
| 2019-07 |
Runtime Hook on Blockchain and Smart Contract Systems |
conference |
pdf(719) |
| 2019-06 |
基於狀態的可修改智能合約 |
conference |
pdf(226) |
| 2019-06 |
基於合作學習的神經網路進行圖片轉換 |
conference |
pdf(186) |
| 2019-06 |
智慧檢測IOS應用上不正當使用廣告套件行為 |
conference |
pdf(149) |
| 2018-12 |
Malware Family Characterization with Recurrent Neural Network and GHSOM using System Calls |
conference |
說明頁(872) |
| 2018-07 |
Quantitative quality estimation of cloud-based streaming services |
article |
pdf(878) |
| 2018-07 |
A Symbolic Model Checking Approach to the Analysis of String and Length Constraints |
conference |
pdf(711) |
| 2018-07 |
Biparti Majority Learning with Tensors |
conference |
pdf(431) |
| 2017-12 |
String Analysis for Software Verification and Security |
book/chapter |
說明頁(1156) |
| 2017-01 |
Gnafuy: A framework for ubiquitous mobile computation |
conference |
說明頁(994) |
| 2016-08 |
AppReco: Behavior-aware recommendation for iOS mobile applications |
conference |
pdf(776) |
| 2016-07 |
Optimal Sanitization Synthesis for Web Application Vulnerability Repair |
conference |
pdf(743) |