臺大學術典藏 |
2021-11-21T23:19:41Z |
Joint Feature Disentanglement and Hallucination for Few-Shot Image Classification
|
Lin, Chia Ching; Chu, Hsin Li; Wang, Yu Chiang Frank; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-09-21T23:19:36Z |
How to design a secure anonymous authentication and key agreement protocol for multi-server environments and prove its security
|
Chuang, Yun Hsin; CHIN-LAUNG LEI; Shiu, Hung Jr |
臺大學術典藏 |
2021-09-21T23:19:36Z |
PUF Based Authenticated Key Exchange Protocol for IoT without Verifiers and Explicit CRPs
|
Chuang, Yun Hsin; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:06Z |
Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets
|
Tsai, Y.-C.; Wu, M.-E.; Syu, J.-H.; Lei, C.-L.; Wu, C.-S.; Ho, J.-M.; Wang, C.-J.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:06Z |
An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey
|
Chuang, Y.-H.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:06Z |
An improved key-agreement protocol for channels with small error rate
|
Guan, A.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
POSTER: Construct macOS Cyber Range for Red/Blue Teams
|
Chen, Y.-H.; Lin, Y.-D.; Chen, C.-K.; Lei, C.-L.; Huang, C.-Y.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines
|
Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme
|
Lei, C.-L.; Chuang, Y.-H.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
MigrateSDN: Efficient approach to integrate OpenFlow networks with STP-enabled networks
|
Chi, P.-W.; Wang, M.-H.; Guo, J.-W.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:28Z |
Modalities for Model Checking: Branching Time Strikes Back.
|
Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:27Z |
Firework search for location aided routing enhancement in mobile ad-hoc networks
|
Hsu, C.-C.;Lei, C.-L.; Hsu, C.-C.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:27Z |
Identifying MMORPG bots: A traffic analysis approach
|
Chen, K.-T.;Jiang, J.-W.;Huang, P.;Chu, H.-H.;Lei, C.-L.;Chen, W.-C.; Chen, K.-T.; Jiang, J.-W.; Huang, P.; Chu, H.-H.; Lei, C.-L.; Chen, W.-C.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:26Z |
Effect of network quality on player departure behavior in online games
|
Chen, K.-T.;Huang, P.;Lei, C.-L.; Chen, K.-T.; Huang, P.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:25Z |
An efficient password authentication scheme based on a unit circle
|
Liaw, H.-T.;Lei, C.-L.; Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:24Z |
Modalities for Model Checking: Branching Time Logic Strikes Back.
|
Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:24Z |
A dynamic cryptographic key assignment scheme in a tree structure
|
Liaw, H.T.;Wang, S.J.;Lei, C.L.; Liaw, H.T.; Wang, S.J.; Lei, C.L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:22Z |
Uncovering Internal Threats Based on Open-Source Intelligence
|
Tsai, M.-H.;Wang, M.-H.;Yang, W.-C.;Lei, C.-L.; Tsai, M.-H.; Wang, M.-H.; Yang, W.-C.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:22Z |
An optimal algorithm to assign cryptographic keys in a tree structure for access control
|
Liaw, H.-T.;Lei, C.-L.; Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:21Z |
Temporal Reasoning Under Generalized Fairness Constraints.
|
Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:20Z |
Understanding Potential MicrotaskWorkers for Paid Crowdsourcing.
|
Wang, Ming-Hung;Chen, Kuan-Ta;Wang, Shuo-Yang;Lei, Chin-Laung; Wang, Ming-Hung; Chen, Kuan-Ta; Wang, Shuo-Yang; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2019-10-31T07:46:53Z |
Look at Me! Correcting Eye Gaze in Live Video Communication
|
CHIN-LAUNG LEI;Kuan-Ta Chen;Chin-Laung Lei;Yu-Shuen Wang;Chih-Fan Hsu; Chih-Fan Hsu; Yu-Shuen Wang; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI |
臺大學術典藏 |
2019-10-31T07:46:52Z |
Efficient Key Agreement Protocol for Smart Sensors
|
CHIN-LAUNG LEI;Chin-Laung Lei;Albert Guan; Albert Guan; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2019-10-31T07:46:50Z |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
|
CHIN-LAUNG LEI;Chin-Luang Lei;Po-Wen Chi; Po-Wen Chi; Chin-Luang Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2019-10-31T07:46:46Z |
Enhanced Tame-based Key Predistribution Scheme for Sensor Networks
|
CHIN-LAUNG LEI;Chien-Hua Chiu;Yu-Shian Chen;Ying-I Ko;Chin-Laung Lei;Yen-Hwa Liao; Yen-Hwa Liao; Chin-Laung Lei; Ying-I Ko; Yu-Shian Chen; Chien-Hua Chiu; CHIN-LAUNG LEI |