Publications- All

Showing 1-25 of 46
Date Title Type Full Text
2025-08 DeRAG: Black-box Adversarial Attacks on Multiple Retrieval-Augmented Generation Applications via Prompt Injection conference pdf(118)
2025-08 A Hybrid Framework for Financial Regulatory Compliance: Integrating LLMs and SMT Solvers for Automated Legal Analysis conference pdf(161)
2025-07 scGHSOM: A Hierarchical Framework for Single-Cell Data Clustering and Visualization article web page(227)
2025-03 Concolic Testing on Individual Fairness of Neural Network Models article web page(375)
2024-08 scGHSOM: Hierarchical clustering and visualization of single-cell and CRISPR data using growing hierarchical SOM conference pdf(341)
2024-07 Concolic Testing on Individual Fairness of Neural Network Models conference pdf(309)
2024-04 Sugar-coated poison defense on deepfake face-swapping attacks conference web page(433)
2023-12 Facial Nerve Disorder Rehabilitation via Generative Adversarial Network conference web page(369)
2023-07 On searching information leakage of Python model execution to detect adversarial examples conference web page(365)
2023-05 DeepSHAP Summary for Adversarial Example Detection conference web page(508)
2022-04 XFlag: Explainable Fake News Detection Model on Social Media article web page(595)
2019-07 Runtime Hook on Blockchain and Smart Contract Systems conference pdf(701)
2019-06 基於狀態的可修改智能合約 conference pdf(226)
2019-06 基於合作學習的神經網路進行圖片轉換 conference pdf(186)
2019-06 智慧檢測IOS應用上不正當使用廣告套件行為 conference pdf(149)
2018-12 Malware Family Characterization with Recurrent Neural Network and GHSOM using System Calls conference web page(858)
2018-07 Quantitative quality estimation of cloud-based streaming services article pdf(868)
2018-07 A Symbolic Model Checking Approach to the Analysis of String and Length Constraints conference pdf(705)
2018-07 Biparti Majority Learning with Tensors conference pdf(431)
2017-12 String Analysis for Software Verification and Security book/chapter web page(1136)
2017-01 Gnafuy: A framework for ubiquitous mobile computation conference web page(969)
2016-08 AppReco: Behavior-aware recommendation for iOS mobile applications conference pdf(760)
2016-07 Optimal Sanitization Synthesis for Web Application Vulnerability Repair conference pdf(732)
2016-05 Simulating Time-Varying Demand Services with Queuing Models conference pdf(416)
2016-02 Investigating security mechanisms for ICT-enabled services of the National Palace Museum book/chapter web page(1271)