| 2025-08 |
DeRAG: Black-box Adversarial Attacks on Multiple Retrieval-Augmented Generation Applications via Prompt Injection |
conference |
pdf(118) |
| 2025-08 |
A Hybrid Framework for Financial Regulatory Compliance: Integrating LLMs and SMT Solvers for Automated Legal Analysis |
conference |
pdf(161) |
| 2025-07 |
scGHSOM: A Hierarchical Framework for Single-Cell Data Clustering and Visualization |
article |
web page(227) |
| 2025-03 |
Concolic Testing on Individual Fairness of Neural Network Models |
article |
web page(375) |
| 2024-08 |
scGHSOM: Hierarchical clustering and visualization of single-cell and CRISPR data using growing hierarchical SOM |
conference |
pdf(341) |
| 2024-07 |
Concolic Testing on Individual Fairness of Neural Network Models |
conference |
pdf(309) |
| 2024-04 |
Sugar-coated poison defense on deepfake face-swapping attacks |
conference |
web page(433) |
| 2023-12 |
Facial Nerve Disorder Rehabilitation via Generative Adversarial Network |
conference |
web page(369) |
| 2023-07 |
On searching information leakage of Python model execution to detect adversarial examples |
conference |
web page(365) |
| 2023-05 |
DeepSHAP Summary for Adversarial Example Detection |
conference |
web page(508) |
| 2022-04 |
XFlag: Explainable Fake News Detection Model on Social Media |
article |
web page(595) |
| 2019-07 |
Runtime Hook on Blockchain and Smart Contract Systems |
conference |
pdf(701) |
| 2019-06 |
基於狀態的可修改智能合約 |
conference |
pdf(226) |
| 2019-06 |
基於合作學習的神經網路進行圖片轉換 |
conference |
pdf(186) |
| 2019-06 |
智慧檢測IOS應用上不正當使用廣告套件行為 |
conference |
pdf(149) |
| 2018-12 |
Malware Family Characterization with Recurrent Neural Network and GHSOM using System Calls |
conference |
web page(858) |
| 2018-07 |
Quantitative quality estimation of cloud-based streaming services |
article |
pdf(868) |
| 2018-07 |
A Symbolic Model Checking Approach to the Analysis of String and Length Constraints |
conference |
pdf(705) |
| 2018-07 |
Biparti Majority Learning with Tensors |
conference |
pdf(431) |
| 2017-12 |
String Analysis for Software Verification and Security |
book/chapter |
web page(1136) |
| 2017-01 |
Gnafuy: A framework for ubiquitous mobile computation |
conference |
web page(969) |
| 2016-08 |
AppReco: Behavior-aware recommendation for iOS mobile applications |
conference |
pdf(760) |
| 2016-07 |
Optimal Sanitization Synthesis for Web Application Vulnerability Repair |
conference |
pdf(732) |
| 2016-05 |
Simulating Time-Varying Demand Services with Queuing Models |
conference |
pdf(416) |
| 2016-02 |
Investigating security mechanisms for ICT-enabled services of the National Palace Museum |
book/chapter |
web page(1271) |