|
???tair.name??? >
???browser.page.title.author???
|
"li j s"???jsp.browse.items-by-author.description???
Showing items 1-25 of 66 (3 Page(s) Totally) 1 2 3 > >> View [10|25|50] records per page
國立成功大學 |
2021 |
A communication system with equipment's characteristics
|
Lai, C.-C.;Liu, I.-H.;Wu, C.-C.;Li, J.-S.;Liu, C.-G. |
國立成功大學 |
2021 |
A Legacy Infrastructure-based Mechanism for Moving Target Defense
|
Huang, C.-W.;Liu, I.H.;Li, J.-S.;Wu, C.-C.;Li, C.-F.;Liu, C.-G. |
國立成功大學 |
2023 |
A Machine Learning-Based Anomaly Detection Method and Blockchain-Based Secure Protection Technology in Collaborative Food Supply Chain
|
Chen, Y.-M.;Chen, T.-Y.;Li, J.-S. |
國立成功大學 |
2022 |
A New Poisoning Attacks on Deep Neural Networks
|
Li, J.-S.;Peng, Y.-C.;Liu, I.-H.;Liu, C.-G. |
國立成功大學 |
2022 |
A Non-normal Warning System for Dam Operation Using Machine Learning
|
Chang, M.-W.;Liu, I.-H.;Liu, C.-K.;Lin, W.-M.;Su, Z.-Y.;Li, J.-S. |
國立成功大學 |
2020 |
A novel data deduplication scheme for encrypted cloud databases
|
Li, J.-S.;Liu, I.-H.;Lee, C.-Y.;Li, C.-F.;Liu, C.-G. |
國立成功大學 |
2017 |
A novel data structure for adversarial VNet embeddings attack in cloud
|
Liu, C.-G.;Fang, T.-J.;Liu, I.-H.;Li, J.-S.;Liang, Y.-C. |
國立成功大學 |
2022 |
A Robust Countermeasures for Poisoning Attacks on Deep Neural Networks of Computer Interaction Systems
|
Liu, I.-H.;Li, J.-S.;Peng, Y.-C.;Liu, C.-G. |
國立臺灣科技大學 |
2013 |
A study on buoyancy-driven flows in two series-connected chambers
|
Lin, Y.J.P.;Huang, J.J.;Li, J.S. |
國立成功大學 |
2019 |
A survey on SCADA security and honeypot in industrial control system
|
Lu, K.-C.;Liu, I.-H.;Sun, M.-W.;Li, J.-S. |
國立成功大學 |
2021 |
An emulation mechanism for PLC communication features
|
Liu, I.-H.;Lai, C.-C.;Li, J.-S.;Wu, C.-C.;Li, C.-F.;Liu, C.-G. |
國立成功大學 |
2023 |
Anomaly Detection on Network Traffic for the Healthcare Internet of Things †
|
Huang, Huang H.-C.;Liu, I.-H.;Lee, M.-H.;Li, J.-S. |
臺大學術典藏 |
2018-09-10T04:55:38Z |
Application of simulated annealing to groundwater parameter zonation
|
Tung, C.-P.;Chou, C.-C.;Hsu, S.-Y.;Hong, N.-M.;Li, J.-S.; Tung, C.-P.; Chou, C.-C.; Hsu, S.-Y.; Hong, N.-M.; Li, J.-S.; SHAO-YIU HSU; CHING-PIN TUNG |
國立成功大學 |
2022 |
Blockchain-based Verification Mechanism for Industrial Control System
|
Tsai, Y.-C.;Liu, I.-H.;Li, J.-S. |
國立成功大學 |
2022 |
Countermeasure of Polluting Health-Related Dataset for Data Mining
|
Liu, I.-H.;Li, J.-S.;Peng, Y.-C.;Lee, M.-H.;Liu, C.-G. |
國立成功大學 |
2023 |
Cyber Security in a 5G-Based Smart Healthcare Network: A Base Station Case Study †
|
Lee, M.-H.;Liu, I.-H.;Huang, Huang H.-C.;Li, J.-S. |
國立成功大學 |
2023 |
Cyber-Physical Security Testbed for River Basin Gate Control System
|
Chang, M.-W.;Liu, I.-H.;Li, J.-S. |
國立成功大學 |
2023 |
Dam Control System’s Cybersecurity Testbed
|
Liu, I.-H.;Chen, J.-S.;Su, K.-M.;Li, J.-S. |
國立成功大學 |
2022 |
Data Balanced Algorithm Based on Generative Adversarial Network
|
Liu, I.-H.;Hsieh, C.-E.;Lin, W.-M.;Li, J.-S.;Li, C.-F. |
國立成功大學 |
2017 |
Defending cloud computing environment against the challenge of DDoS attacks based on software defined network
|
Tsai, S.-C.;Liu, I.-H.;Lu, C.-T.;Chang, Chang C.-H.;Li, J.-S. |
國立成功大學 |
2014-06-02 |
Design a light pattern of multiple concentric circles for LED fishing lamps using Fourier series and an energy mapping method
|
Shen, S. C.; Li, J. S.; Huang, M. C. |
國立成功大學 |
2023 |
Device's Operation Tracking using Blockchain in Industrial Control System
|
Wu, C.-H.;Liu, I.-H.;Li, J.-S.;Li, C.-F. |
國立成功大學 |
2020 |
Differential Privacy Protection with Group Onion Routing based on AI-based URL Classification
|
Liu, I.-H.;Chang, Y.-L.;Li, J.-S.;Liu, C.-G. |
國立成功大學 |
2003-03 |
Digital redesign of continuous-time suboptimal tracker for two-dimensional systems
|
Li, J. S.; Tsai, Jason Sheng-Hong; Shieh, L. S. |
國立成功大學 |
2017 |
Distributed Log System in Cloud Digital Forensics
|
Jiang, C.-B.;Liu, I.-H.;Liu, C.-G.;Chen, Y.-C.;Li, J.-S. |
Showing items 1-25 of 66 (3 Page(s) Totally) 1 2 3 > >> View [10|25|50] records per page
|