|
???tair.name??? >
???browser.page.title.author???
|
"hsiao h c"???jsp.browse.items-by-author.description???
Showing items 1-25 of 67 (3 Page(s) Totally) 1 2 3 > >> View [10|25|50] records per page
臺大學術典藏 |
2021-06-02T05:43:33Z |
Catalytic transfer hydrogenation and anticancer activity of arene-ruthenium compounds incorporating bi-dentate precursors
|
Chang Y.-H.; Leu W.-J.; Datta A.; Hsiao H.-C.; Lin C.-H.; JIH-HWA GUH; Huang J.-H. |
臺大學術典藏 |
2021-06-02T05:43:31Z |
Synthesis and characterization of ruthenium compounds incorporating keto-amine ligands. The applications of catalytic transfer hydrogenation and cancer cell inhibition
|
Lin T.-H.; Das K.; Datta A.; Leu W.-J.; Hsiao H.-C.; Lin C.-H.; JIH-HWA GUH; Huang J.-H. |
臺大學術典藏 |
2021-01-04T05:52:15Z |
An investigation of cyber autonomy on government websites
|
Hsiao, H.-C.;Chang, C.-M.;Kim, T.H.-J.;Chen, H.-F.;Ku, Y.-M.;Chen, Y.-J.;Wang, C.-W.;Jeng, W.; Hsiao, H.-C.; Chang, C.-M.; Kim, T.H.-J.; Chen, H.-F.; Ku, Y.-M.; Chen, Y.-J.; Wang, C.-W.; Jeng, W.; Wei Jeng |
臺大學術典藏 |
2021-01-04T05:52:15Z |
A decentralized framework for cultivating research lifecycle transparency
|
Jeng, W.;Wang, S.-H.;Chen, H.-W.;Huang, P.-W.;Chen, Y.-J.;Hsiao, H.-C.; Jeng, W.; Wang, S.-H.; Chen, H.-W.; Huang, P.-W.; Chen, Y.-J.; Hsiao, H.-C.; Wei Jeng |
臺大學術典藏 |
2020-06-16T06:30:43Z |
Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems
|
Wang, P.S.;Lai, F.;Hsiao, H.-C.;Wu, J.-L.; Wang, P.S.; Lai, F.; Hsiao, H.-C.; Wu, J.-L.; JA-LING WU |
臺大學術典藏 |
2020-05-04T07:56:30Z |
Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems
|
Wang, P.S.;Lai, F.;Hsiao, H.-C.;Wu, J.-L.; Wang, P.S.; Lai, F.; Hsiao, H.-C.; Wu, J.-L.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:29Z |
Securing data planes in software-defined networks
|
Chao, T.-W.;Ke, Y.-M.;Chen, B.-H.;Chen, J.-L.;Hsieh, C.J.;Lee, S.-C.;Hsiao, H.-C.; Chao, T.-W.; Ke, Y.-M.; Chen, B.-H.; Chen, J.-L.; Hsieh, C.J.; Lee, S.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:29Z |
Decapitation via digital epidemics: A bio-inspired transmissive attack
|
Chen, P.-Y.; Lin, C.-C.; Cheng, S.-M.; Hsiao, H.-C.; Huang, C.-Y.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:29Z |
CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks
|
Ke, Y.-M.;Chen, C.-W.;Hsiao, H.-C.;Perrig, A.;Sekar, V.; Ke, Y.-M.; Chen, C.-W.; Hsiao, H.-C.; Perrig, A.; Sekar, V.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:29Z |
A secure authorization system in PHR based on CP-ABE
|
Chung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C.; Lai, F.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:28Z |
CLEF: Limiting the damage caused by large flows in the internet core
|
Wu, H.; Hsiao, H.-C.; Asoni, D.E.; Scherrer, S.; Perrig, A.; Hu, Y.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:28Z |
Traffic-aware patching for cyber security in mobile IoT
|
Cheng, S.-M.; Chen, P.-Y.; Lin, C.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:28Z |
SandUSB: An installation-free sandbox for USB peripherals
|
Loe, E.L.; Hsiao, H.-C.; Kim, T.H.-J.; Lee, S.-C.; Cheng, S.-M.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:28Z |
Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes
|
Yeh, J.-R.;Hsiao, H.-C.;Pang, A.-C.; Yeh, J.-R.; Hsiao, H.-C.; Pang, A.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:27Z |
GroupIt: Lightweight Group Key Management for Dynamic IoT Environments
|
Kung, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:27Z |
SDNProbe: Lightweight fault localization in the error-prone environment
|
Ke, Y.-M.; Hsiao, H.-C.; Kim, T.H.-J.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:27Z |
DAMUP: Practical and privacy-aware cloud-based DDoS mitigation
|
Lin, S.-C.; Huang, P.-W.; Wang, H.-Y.; Hsiao, H.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:27Z |
A generic web application testing and attack data generation method
|
Shih, H.-Y.; Lu, H.-L.; Yeh, C.-C.; Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:26Z |
SafeChain: Securing Trigger-Action Programming from Attack Chains
|
Hsu, K.-H.;Chiang, Y.-H.;Hsiao, H.-C.; Hsu, K.-H.; Chiang, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:26Z |
An investigation of cyber autonomy on government websites
|
Ku, Y.-M.; Chen, Y.-J.; Wang, C.-W.; Jeng, W.; HSU-CHUN HSIAO; Hsiao, H.-C.;Chang, C.-M.;Kim, T.H.-J.;Chen, H.-F.;Ku, Y.-M.;Chen, Y.-J.;Wang, C.-W.;Jeng, W.; Hsiao, H.-C.; Chang, C.-M.; Kim, T.H.-J.; Chen, H.-F. |
臺大學術典藏 |
2020-05-04T07:56:26Z |
On the Feasibility of Rerouting-Based DDoS Defenses
|
Tran, M.;Kang, M.S.;Hsiao, H.-C.;Chiang, W.-H.;Tung, S.-P.;Wang, Y.-S.; Tran, M.; Kang, M.S.; Hsiao, H.-C.; Chiang, W.-H.; Tung, S.-P.; Wang, Y.-S.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:26Z |
Dynamic Path Pruning in Symbolic Execution
|
Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO; Wu, C.-Y.; Chen, W.-N.; Chen, Y.-S.; Chen, Y.-S.;Chen, W.-N.;Wu, C.-Y.;Hsiao, H.-C.;Huang, S.-K. |
臺大學術典藏 |
2020-04-16T02:34:46Z |
A secure authorization system in PHR based on CP-ABE
|
FEI-PEI LAI; Lai, F.; Chung, H.H.;Wang, P.S.;Ho, T.-W.;Hsiao, H.-C.;Lai, F.; Chung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C. |
臺大學術典藏 |
2020-04-16T02:34:46Z |
Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems
|
Wang, P.S.;Lai, F.;Hsiao, H.-C.;Wu, J.-L.; Wang, P.S.; Lai, F.; Hsiao, H.-C.; Wu, J.-L.; FEI-PEI LAI |
臺大學術典藏 |
2019-07-11T00:31:02Z |
Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes
|
Pang A.-C.;Hsiao H.-C.;Yeh J.-R.; Yeh J.-R.; Hsiao H.-C.; Pang A.-C. |
Showing items 1-25 of 67 (3 Page(s) Totally) 1 2 3 > >> View [10|25|50] records per page
|