臺大學術典藏 |
2021-11-21T23:19:41Z |
Joint Feature Disentanglement and Hallucination for Few-Shot Image Classification
|
Lin, Chia Ching; Chu, Hsin Li; Wang, Yu Chiang Frank; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-09-21T23:19:36Z |
How to design a secure anonymous authentication and key agreement protocol for multi-server environments and prove its security
|
Chuang, Yun Hsin; CHIN-LAUNG LEI; Shiu, Hung Jr |
臺大學術典藏 |
2021-09-21T23:19:36Z |
PUF Based Authenticated Key Exchange Protocol for IoT without Verifiers and Explicit CRPs
|
Chuang, Yun Hsin; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:06Z |
Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets
|
Tsai, Y.-C.; Wu, M.-E.; Syu, J.-H.; Lei, C.-L.; Wu, C.-S.; Ho, J.-M.; Wang, C.-J.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:06Z |
An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey
|
Chuang, Y.-H.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:06Z |
An improved key-agreement protocol for channels with small error rate
|
Guan, A.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
POSTER: Construct macOS Cyber Range for Red/Blue Teams
|
Chen, Y.-H.; Lin, Y.-D.; Chen, C.-K.; Lei, C.-L.; Huang, C.-Y.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines
|
Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme
|
Lei, C.-L.; Chuang, Y.-H.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
MigrateSDN: Efficient approach to integrate OpenFlow networks with STP-enabled networks
|
Chi, P.-W.; Wang, M.-H.; Guo, J.-W.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:28Z |
Modalities for Model Checking: Branching Time Strikes Back.
|
Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:27Z |
Firework search for location aided routing enhancement in mobile ad-hoc networks
|
Hsu, C.-C.;Lei, C.-L.; Hsu, C.-C.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:27Z |
Identifying MMORPG bots: A traffic analysis approach
|
Chen, K.-T.;Jiang, J.-W.;Huang, P.;Chu, H.-H.;Lei, C.-L.;Chen, W.-C.; Chen, K.-T.; Jiang, J.-W.; Huang, P.; Chu, H.-H.; Lei, C.-L.; Chen, W.-C.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:26Z |
Effect of network quality on player departure behavior in online games
|
Chen, K.-T.;Huang, P.;Lei, C.-L.; Chen, K.-T.; Huang, P.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:25Z |
An efficient password authentication scheme based on a unit circle
|
Liaw, H.-T.;Lei, C.-L.; Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:24Z |
Modalities for Model Checking: Branching Time Logic Strikes Back.
|
Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:24Z |
A dynamic cryptographic key assignment scheme in a tree structure
|
Liaw, H.T.;Wang, S.J.;Lei, C.L.; Liaw, H.T.; Wang, S.J.; Lei, C.L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:22Z |
Uncovering Internal Threats Based on Open-Source Intelligence
|
Tsai, M.-H.;Wang, M.-H.;Yang, W.-C.;Lei, C.-L.; Tsai, M.-H.; Wang, M.-H.; Yang, W.-C.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:22Z |
An optimal algorithm to assign cryptographic keys in a tree structure for access control
|
Liaw, H.-T.;Lei, C.-L.; Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:21Z |
Temporal Reasoning Under Generalized Fairness Constraints.
|
Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:20Z |
Understanding Potential MicrotaskWorkers for Paid Crowdsourcing.
|
Wang, Ming-Hung;Chen, Kuan-Ta;Wang, Shuo-Yang;Lei, Chin-Laung; Wang, Ming-Hung; Chen, Kuan-Ta; Wang, Shuo-Yang; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2019-10-31T07:46:53Z |
Look at Me! Correcting Eye Gaze in Live Video Communication
|
CHIN-LAUNG LEI;Kuan-Ta Chen;Chin-Laung Lei;Yu-Shuen Wang;Chih-Fan Hsu; Chih-Fan Hsu; Yu-Shuen Wang; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI |
臺大學術典藏 |
2019-10-31T07:46:52Z |
Efficient Key Agreement Protocol for Smart Sensors
|
CHIN-LAUNG LEI;Chin-Laung Lei;Albert Guan; Albert Guan; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2019-10-31T07:46:50Z |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
|
CHIN-LAUNG LEI;Chin-Luang Lei;Po-Wen Chi; Po-Wen Chi; Chin-Luang Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2019-10-31T07:46:46Z |
Enhanced Tame-based Key Predistribution Scheme for Sensor Networks
|
CHIN-LAUNG LEI;Chien-Hua Chiu;Yu-Shian Chen;Ying-I Ko;Chin-Laung Lei;Yen-Hwa Liao; Yen-Hwa Liao; Chin-Laung Lei; Ying-I Ko; Yu-Shian Chen; Chien-Hua Chiu; CHIN-LAUNG LEI |
臺大學術典藏 |
2019-09-09T00:55:14Z |
Uncovering Internal Threats Based on Open-Source Intelligence
|
Wang, Ming Hung;MENG-HAN TSAI;Yang, Wei Chieh;CHIN-LAUNG LEI; CHIN-LAUNG LEI; Yang, Wei Chieh; MENG-HAN TSAI; Wang, Ming Hung |
臺大學術典藏 |
2018-09-10T15:36:25Z |
Boosting Election Prediction Accuracy by Crowd Wisdom on Social Forums
|
Ming-Hung Wang;Chin-Laung Lei; Ming-Hung Wang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:25:59Z |
Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing
|
Yi-Cheng Tsai;Chin-Laung Lei;Jan-Ming Ho;Ming-Yang Kao;Szu-Lang Liao; Yi-Cheng Tsai; Chin-Laung Lei; Jan-Ming Ho; Ming-Yang Kao; Szu-Lang Liao; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:25:59Z |
How to Detect a Compromised SDN Switch
|
Po-Wen Chi;Chien-Ting Kuo;Jing-Wei Guo;Chin-Laung Lei; Po-Wen Chi; Chien-Ting Kuo; Jing-Wei Guo; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:25:59Z |
Discovery of De-identification Policies Considering Re-identification Risks and Information Loss
|
He-Ming Ruan;Ming-Hwa Tsai;Yen-Nun Huang;Yen-Hua Liao;Chin-Laung Lei; He-Ming Ruan; Ming-Hwa Tsai; Yen-Nun Huang; Yen-Hua Liao; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:25:59Z |
Efficient NFV Deployment in Data Center Networks
|
Po-Wen Chi;Yu-Cheng Huang;Jing-Wei Guo;Chin-Luang Lei; Po-Wen Chi; Yu-Cheng Huang; Jing-Wei Guo; Chin-Luang Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:25:59Z |
Modelling Articles Polarity and Identifying Influential Authors through Social Movements
|
Ming-Hung Wang;Chin-Laung Lei; Ming-Hung Wang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:25:58Z |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
|
CHIN-LAUNG LEI; Po-Wen Chi; Chin-Luang Lei; Po-Wen Chi;Chin-Luang Lei |
臺大學術典藏 |
2018-09-10T15:25:58Z |
Discovery of De-identification Policies Considering Re-identification Risks and Information Loss
|
He-Ming Ruan;Chin-Laung Lei; He-Ming Ruan; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:00:19Z |
Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies
|
Ming-Hung Wang;Chin-Laung Lei; Ming-Hung Wang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:00:19Z |
A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line
|
Chien-Ting Kuo;He-Ming Ruan;Shih-Jen Chen;Chin-Laung Lei; Chien-Ting Kuo; He-Ming Ruan; Shih-Jen Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:00:19Z |
Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure
|
He-Ming Ruan;Gan Wei Yeap;Chin-Laung Lei; He-Ming Ruan; Gan Wei Yeap; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:00:19Z |
Give Me a Broadcast-Free Network
|
Po-Wen Chi;Yu-Cheng Huang;Jing-Wei Guo;Chin-Luang Lei; Po-Wen Chi; Yu-Cheng Huang; Jing-Wei Guo; Chin-Luang Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:00:19Z |
Access Control System and Access Control Method Thereof
|
Chin-Laung Lei;Yung-Chih Liu;He-Ming Ruan; Chin-Laung Lei; Yung-Chih Liu; He-Ming Ruan; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:00:19Z |
存取控制系統及其存取控制方法
|
阮鶴鳴;雷欽隆;劉永之; 阮鶴鳴; 雷欽隆; 劉永之; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:00:18Z |
A Social Diffusion Model with an Application on Election Simulation
|
Jing-Kai Lou;Fu-Min Wang;Chin-Hua Tsai;San-Chuan Hung;Perng-Hwa Kung;Shou-De Lin;Kuan-Ta Chen;Chin-Laung Lei; Jing-Kai Lou; Fu-Min Wang; Chin-Hua Tsai; San-Chuan Hung; Perng-Hwa Kung; Shou-De Lin; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI; SHOU-DE LIN |
臺大學術典藏 |
2018-09-10T15:00:18Z |
A Reversible Acoustic Data Hiding Method Based on Analog Modulation
|
H. J. Shiu;S. Y. Tang;C. H. Huang;R .C. T. Lee;C. L. Lei; H. J. Shiu; S. Y. Tang; C. H. Huang; R .C. T. Lee; C. L. Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:00:18Z |
Stratus: Check and Share Encrypted Data among Heterogeneous Cloud Storage
|
Yu-Shian Chen;He-Ming Ruan;Chin-Laung Lei; Yu-Shian Chen; He-Ming Ruan; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:00:18Z |
Comparing Profitability of Day Trading Using ORB Strategies on Index Futures Markets in Taiwan, Hong-Kong and USA
|
CHIN-LAUNG LEI; Jan-Ming Ho; Chung-Shu Wu; Chin-Laung Lei; Mu-En Wu; Yi-Cheng Tsai; Yi-Cheng Tsai;Mu-En Wu;Chin-Laung Lei;Chung-Shu Wu;Jan-Ming Ho |
臺大學術典藏 |
2018-09-10T15:00:18Z |
Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage
|
He-Ming Ruan;Chin-Laung Lei; He-Ming Ruan; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T15:00:18Z |
An AMI Threat Detection Mechanism Based on SDN Networks
|
Po-Wen Chi;Chien-Ting Kuo;He-Ming Ruan;Shih-Jen Chen;Chin-Laung Lei; Po-Wen Chi; Chien-Ting Kuo; He-Ming Ruan; Shih-Jen Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T09:50:26Z |
Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework
|
Chen-Chi Wu;Kuan-Ta Chen;Yu-Chun Chang;Chin-Laung Lei; Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T09:50:26Z |
Aggregate message authentication codes (AMACs) with on-the-fly verification
|
Yu-Shian Chen;Chin-Laung Lei; Yu-Shian Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T09:50:26Z |
Gender Swapping and User Behaviors in Online Social Games
|
Jing-Kai Lou;Kunwoo Park;Meeyoung Cha;Juyong Park;Chin-Laung Lei;Kuan-Ta Chen; Jing-Kai Lou; Kunwoo Park; Meeyoung Cha; Juyong Park; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T09:50:26Z |
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
|
Chin-Laung Lei; CHIN-LAUNG LEI; Yeng-Ting Lee;Kuan-Ta Chen;Han-I Su;Chin-Laung Lei; Yeng-Ting Lee; Kuan-Ta Chen; Han-I Su |