| 國立交通大學 |
2020-07-01T05:22:13Z |
Big Data Platform Configuration Using Machine Learning
|
Yeh, Chao-Chun; Lu, Han-Lin; Zhou, Jiazheng; Chang, Sheng-An; Lin, Xuan-Yi; Sun, Yi-Chiao; Huang, Shih-Kun |
| 臺大學術典藏 |
2020-05-04T07:56:31Z |
Dynamic Path Pruning in Symbolic Execution.
|
Chen, Ying-Shen; Chen, Wei-Ning; Wu, Che-Yu; Hsiao, Hsu-Chun; Huang, Shih-Kun; HSU-CHUN HSIAO |
| 國立交通大學 |
2019-05-02T00:26:48Z |
Dynamic Path Pruning in Symbolic Execution
|
Chen, Ying-Shen; Chen, Wei-Ning; Wu, Che-Yu; Hsiao, Hsu-Chun; Huang, Shih-Kun |
| 國立交通大學 |
2019-04-02T06:04:47Z |
CRAXTriage: A Coverage Based Triage System
|
Yeh, Chao-Chun; Lu, Han-Lin; Lee, Yi-Hsuan; Chou, Wei-Sheng; Huang, Shih-Kun |
| 國立交通大學 |
2019-04-02T06:04:33Z |
A Multi-Agent Intelligence Hybrid System Technique for Detection and Defense of DDoS Attacks
|
Chen, Hsia-Hsiang; Huang, Shih-Kun |
| 國立交通大學 |
2019-04-02T06:04:33Z |
On the Effectiveness of Scheduling Fuzz Testing
|
Chen, Wei-Jun; Tyan, Hsiao-Rong; Huang, Shih-Kun |
| 國立交通大學 |
2019-04-02T05:58:35Z |
Efficient proxy signcryption scheme with provable CCA and CMA security
|
Lin, Han-Yu; Wu, Tzong-Sun; Huang, Shih-Kun; Yeh, Yi-Shiung |
| 國立交通大學 |
2019-04-02T05:58:13Z |
A Novel Massive Deployment Solution Based on the Peer-to-Peer Protocol
|
Shiau, Steven J. H.; Huang, Yu-Chiang; Yen, Ching-Hsuan; Tsai, Yu-Chin; Sun, Chen-Kai; Juang, Jer-Nan; Huang, Chi-Yo; Huang, Ching-Chun; Huang, Shih-Kun |
| 國立交通大學 |
2018-08-21T05:56:51Z |
A Scalable Privacy Preserving System for Open Data
|
Yeh, Chao-Chun; Wang, Pang-Chieh; Pan, Yu-Hsuan; Kao, Ming-Chih; Huang, Shih-Kun |
| 國立交通大學 |
2018-08-21T05:56:51Z |
Spectrum-Base Fault Localization by Exploiting the Failure Path
|
Lu, Han-Lin; Gao, Ruizhi; Huang, Shih-Kun; Wong, W. Eric |
| 國立交通大學 |
2018-08-21T05:56:50Z |
BigExplorer: A Configuration Recommendation System for Big Data Platform
|
Yeh, Chao-Chun; Zhou, Jiazheng; Chang, Sheng-An; Lin, Xuan-Yi; Sun, Yichiao; Huang, Shih-Kun |
| 國立交通大學 |
2018-08-21T05:56:24Z |
Path Exploration Based on Monte Carlo Tree Search for Symbolic Execution
|
Yeh, Chao-Chun; Lu, Han-Lin; Yeh, Jia-Jun; Huang, Shih-Kun |
| 國立交通大學 |
2018-01-24T07:43:23Z |
網路錯誤與網路威脅診斷之蟻群優化研究
|
陳夏祥; 黃世昆; Chen, Hsia-Hsiang; Huang, Shih-Kun |
| 國立交通大學 |
2018-01-24T07:40:27Z |
軟體除錯與符號執行整合互動
|
陳威伯; 黃世昆; Chen, Wei-Bo; Huang, Shih-Kun |
| 國立交通大學 |
2018-01-24T07:39:45Z |
多樣化 Web 程式攻擊生成方法
|
施筱瑜; 黃世昆; Shih, Hsiao-Yu; Huang, Shih-Kun |
| 國立交通大學 |
2018-01-24T07:39:44Z |
基於調適性隨機序列之模糊測試
|
孫建宇; 黃世昆; Sun Jian-Yu; Huang, Shih-Kun |
| 國立交通大學 |
2018-01-24T07:39:44Z |
路徑限制式排程優化 Web 程式測試效能
|
蘇翌帆; 黃世昆; Sue, Yi-Fan; Huang, Shih-Kun |
| 國立交通大學 |
2018-01-24T07:39:37Z |
互動式 Web 程式測試與攻擊生成環境
|
陳柏宇; 黃世昆; Chen, Po-Yu; Huang, Shih-Kun |
| 國立交通大學 |
2018-01-24T07:39:37Z |
基於蒙地卡羅樹搜尋法之符號執行路徑探索機制
|
葉家郡; 黃世昆; Yeh, Jia-Jun; Huang, Shih-Kun |
| 國立交通大學 |
2018-01-24T07:37:54Z |
藉由錯誤程式碼定位方法進行模糊測試的失誤分類
|
李苡璇; 黃世昆; Lee, Yi-Hsuan; Huang,Shih-Kun |
| 國立交通大學 |
2018-01-24T07:37:54Z |
利用錯誤定位與自動修補技術達成自動化防禦
|
鄭達群; 黃世昆; Zheng, Da-Qun; Huang, Shih-Kun |
| 國立交通大學 |
2017-04-21T06:56:38Z |
LDDoS Attack Detection by Using Ant Colony Optimization Algorithms
|
Chen, Hsia-Hsiang; Huang, Shih-Kun |
| 國立交通大學 |
2017-04-21T06:55:56Z |
A Unified Ant Agent Framework for Solving DoS and QoS Problems
|
Chen, Hsia-Hsiang; Lee, Chien-Hua; Huang, Shih-Kun |
| 國立交通大學 |
2017-04-21T06:49:29Z |
CovDroid: A Black-Box Testing Coverage System for Android
|
Yeh, Chao-Chun; Huang, Shih-Kun |
| 國立交通大學 |
2017-04-21T06:49:26Z |
Effective Test Generation for Combinatorial Decision Coverage
|
Gao, Ruizhi; Hu, Linghuan; Wong, W. Eric; Lu, Han-Lin; Huang, Shih-Kun |