English  |  正體中文  |  简体中文  |  2817097  
???header.visitor??? :  27687156    ???header.onlineuser??? :  1476
???header.sponsordeclaration???
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
???ui.leftmenu.abouttair???

???ui.leftmenu.bartitle???

???index.news???

???ui.leftmenu.copyrighttitle???

???ui.leftmenu.link???

"lei chin laung"???jsp.browse.items-by-author.description???

???jsp.browse.items-by-author.back???
???jsp.browse.items-by-author.order1??? ???jsp.browse.items-by-author.order2???

Showing items 1-25 of 89  (4 Page(s) Totally)
1 2 3 4 > >>
View [10|25|50] records per page

Institution Date Title Author
國立高雄第一科技大學 Winter 2002 / 03 Privacy and Anonymity Protection with Blind Threshold Signatures Juang, Wen-Shenq;Lei, Chin-Laung;Liaw, Horng-Twu; 莊文勝
臺大學術典藏 2020-06-11T06:51:28Z Modalities for Model Checking: Branching Time Strikes Back. Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:24Z Modalities for Model Checking: Branching Time Logic Strikes Back. Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:21Z Temporal Reasoning Under Generalized Fairness Constraints. Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:20Z Understanding Potential MicrotaskWorkers for Paid Crowdsourcing. Wang, Ming-Hung;Chen, Kuan-Ta;Wang, Shuo-Yang;Lei, Chin-Laung; Wang, Ming-Hung; Chen, Kuan-Ta; Wang, Shuo-Yang; Lei, Chin-Laung; CHIN-LAUNG LEI
臺大學術典藏 2020-06-04T07:55:34Z Semantics-Guided Data Hallucination for Few-Shot Visual Classification. Lin, Chia-Ching;Wang, Yu-Chiang Frank;Lei, Chin-Laung;Chen, Kuan-Ta; Lin, Chia-Ching; Wang, Yu-Chiang Frank; Lei, Chin-Laung; Chen, Kuan-Ta; YU-CHIANG WANG
臺大學術典藏 2020-05-04T08:08:54Z Identifying MMORPG bots: a traffic analysis approach. Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin; WEN-CHIN CHEN
臺大學術典藏 2020-05-04T08:05:10Z What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information. Lou, Jing-Kai;Lin, Shou-De;Chen, Kuan-Ta;Lei, Chin-Laung; Lou, Jing-Kai; Lin, Shou-De; Chen, Kuan-Ta; Lei, Chin-Laung; SHOU-DE LIN
國立交通大學 2019-10-05T00:09:42Z Is Foveated Rendering Perceivable in Virtual Reality? Exploring the Efficiency and Consistency of Quality Assessment Methods Hsu, Chih-Fan; Chen, Anthony; Hsu, Cheng-Hsin; Huang, Chun-Ying; Lei, Chin-Laung; Chen, Kuan-Ta
國立交通大學 2019-09-02T07:46:19Z Look at Me! Correcting Eye Gaze in Live Video Communication Hsu, Chih-Fan; Wang, Yu-Shuen; Lei, Chin-Laung; Chen, Kuan-Ta
國立交通大學 2019-04-02T06:04:24Z Realizing the Real-time Gaze Redirection System with Convolutional Neural Network Hsu, Chih-Fan; Chen, Yu-Cheng; Wang, Yu-Shuen; Lei, Chin-Laung; Chen, Kuan-Ta
臺大學術典藏 2018-09-10T07:42:16Z Identifying MMORPG Bots: A Traffic Analysis Approach (Extended) Chen, Wen-Chin; POLLY HUANG; CHIN-LAUNG LEI; Chen, Kuan-Ta;Jiang, Jhih-Wei;Huang, Polly;Chu, Hao-Hua;Lei, Chin-Laung;Chen, Wen-Chin; Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin
國立交通大學 2018-08-21T05:56:24Z Data Hiding on Social Media Communications Using Text Steganography Shiu, Hung-Jr; Lin, Bor-Shing; Lin, Bor-Shyh; Huang, Po-Yang; Huang, Chien-Hung; Lei, Chin-Laung
國立臺灣大學 2012 TAME POOL-BASED PAIRWISE KEY PREDISTRIBUTION FOR LARGE-SCALE SENSOR NETWORKS Liao, Yen-Hua; Lei, Chin-Laung; Wang, Ai-Nung; Tsai, Wen-Chi
國立高雄第一科技大學 2011.07 Provably secure and efficient identification and key agreement protocol with user anonymity Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝
國立高雄第一科技大學 2011.03 Robust authentication and key agreement scheme preserving the privacy of secret key Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝
國立高雄第一科技大學 2010.11 SMART CARD-BASED SECURE WEB SERVICES IN THE THREE-PARTY SETTING Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝
國立高雄第一科技大學 2010.02 ROBUST AND EFFICIENT THREE-PARTY USER AUTHENTICATION AND KEY AGREEMENT USING BILINEAR PAIRINGS Juang, Wen-Shenq;Lei, Chin-Laung;Liaw, Horng-Twu;Nien, Wei-Ken; 莊文勝
國立臺灣大學 2010 Quadrant of Euphoria: A Crowdsourcing Platform for QoE Assessment Chen, Kuan-Ta; Chang, Chi-Jui; Wu, Chen-Chi; Chang, Yu-Chun; Lei, Chin-Laung
國立臺灣大學 2010 Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings Juang, Wen-Shenq; Lei, Chin-Laung; Liaw, Horng-Twu; Nien, Wei-Ken
國立臺灣大學 2010 A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems Wang, Ren-Chiun; Juang, Wen-Shenq; Lei, Chin-Laung
國立高雄第一科技大學 2009.04 A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝
國立高雄第一科技大學 2009.02 User authentication scheme with privacy-preservation for multi-server environment Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝
國立臺灣大學 2009 Identifying MMORPG Bots: A Traffic Analysis Approach Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin
國立臺灣大學 2009 On the Challenges and Designs of Transport Protocols for MMORPGs Wu, Chen-Chi; Chen, Kuan-Ta; Chen, Chih-Ming; Huang, Polly; Lei, Chin-Laung

Showing items 1-25 of 89  (4 Page(s) Totally)
1 2 3 4 > >>
View [10|25|50] records per page