| 2026-04 |
Agentic Taxation Optimization via LLM SMT-Constraint Reasoning |
conference |
pdf(10) |
| 2025-11 |
Neuro-Symbolic Compliance: Integrating LLMs and SMT for Automated Financial Legal Analysis |
conference |
pdf(14) |
| 2025-08 |
DeRAG: Black-box Adversarial Attacks on Multiple Retrieval-Augmented Generation Applications via Prompt Injection |
conference |
pdf(129) |
| 2025-08 |
A Hybrid Framework for Financial Regulatory Compliance: Integrating LLMs and SMT Solvers for Automated Legal Analysis |
conference |
pdf(180) |
| 2024-08 |
scGHSOM: Hierarchical clustering and visualization of single-cell and CRISPR data using growing hierarchical SOM |
conference |
pdf(349) |
| 2024-07 |
Concolic Testing on Individual Fairness of Neural Network Models |
conference |
pdf(321) |
| 2024-04 |
Sugar-coated poison defense on deepfake face-swapping attacks |
conference |
說明頁(453) |
| 2023-12 |
Facial Nerve Disorder Rehabilitation via Generative Adversarial Network |
conference |
說明頁(394) |
| 2023-07 |
On searching information leakage of Python model execution to detect adversarial examples |
conference |
說明頁(375) |
| 2023-05 |
DeepSHAP Summary for Adversarial Example Detection |
conference |
說明頁(534) |
| 2019-07 |
Runtime Hook on Blockchain and Smart Contract Systems |
conference |
pdf(719) |
| 2019-06 |
智慧檢測IOS應用上不正當使用廣告套件行為 |
conference |
pdf(149) |
| 2019-06 |
基於狀態的可修改智能合約 |
conference |
pdf(226) |
| 2019-06 |
基於合作學習的神經網路進行圖片轉換 |
conference |
pdf(186) |
| 2018-12 |
Malware Family Characterization with Recurrent Neural Network and GHSOM using System Calls |
conference |
說明頁(873) |
| 2018-07 |
A Symbolic Model Checking Approach to the Analysis of String and Length Constraints |
conference |
pdf(711) |
| 2018-07 |
Biparti Majority Learning with Tensors |
conference |
pdf(431) |
| 2017-01 |
Gnafuy: A framework for ubiquitous mobile computation |
conference |
說明頁(997) |
| 2016-08 |
AppReco: Behavior-aware recommendation for iOS mobile applications |
conference |
pdf(776) |
| 2016-07 |
Optimal Sanitization Synthesis for Web Application Vulnerability Repair |
conference |
pdf(743) |
| 2016-05 |
Simulating Time-Varying Demand Services with Queuing Models |
conference |
pdf(416) |
| 2016-02 |
VISO: Characterizing malicious behaviors of virtual machines with unsupervised clustering |
conference |
說明頁(1143) |
| 2016 |
String analysis via automata manipulation with logic circuit representation |
conference |
pdf(672) |
| 2015-05 |
Space Connection: A New 3D Tele-Immersion Platform for Web-based Gesture-collaborative Games and Services |
conference |
pdf(674) |
| 2015 |
Network-traffic anomaly detection with incremental majority learning |
conference |
說明頁(969) |