國立高雄第一科技大學 |
Winter 2002 / 03 |
Privacy and Anonymity Protection with Blind Threshold Signatures
|
Juang, Wen-Shenq;Lei, Chin-Laung;Liaw, Horng-Twu; 莊文勝 |
臺大學術典藏 |
2020-06-11T06:51:28Z |
Modalities for Model Checking: Branching Time Strikes Back.
|
Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:24Z |
Modalities for Model Checking: Branching Time Logic Strikes Back.
|
Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:21Z |
Temporal Reasoning Under Generalized Fairness Constraints.
|
Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:20Z |
Understanding Potential MicrotaskWorkers for Paid Crowdsourcing.
|
Wang, Ming-Hung;Chen, Kuan-Ta;Wang, Shuo-Yang;Lei, Chin-Laung; Wang, Ming-Hung; Chen, Kuan-Ta; Wang, Shuo-Yang; Lei, Chin-Laung; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-04T07:55:34Z |
Semantics-Guided Data Hallucination for Few-Shot Visual Classification.
|
Lin, Chia-Ching;Wang, Yu-Chiang Frank;Lei, Chin-Laung;Chen, Kuan-Ta; Lin, Chia-Ching; Wang, Yu-Chiang Frank; Lei, Chin-Laung; Chen, Kuan-Ta; YU-CHIANG WANG |
臺大學術典藏 |
2020-05-04T08:08:54Z |
Identifying MMORPG bots: a traffic analysis approach.
|
Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin; WEN-CHIN CHEN |
臺大學術典藏 |
2020-05-04T08:05:10Z |
What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information.
|
Lou, Jing-Kai;Lin, Shou-De;Chen, Kuan-Ta;Lei, Chin-Laung; Lou, Jing-Kai; Lin, Shou-De; Chen, Kuan-Ta; Lei, Chin-Laung; SHOU-DE LIN |
國立交通大學 |
2019-10-05T00:09:42Z |
Is Foveated Rendering Perceivable in Virtual Reality? Exploring the Efficiency and Consistency of Quality Assessment Methods
|
Hsu, Chih-Fan; Chen, Anthony; Hsu, Cheng-Hsin; Huang, Chun-Ying; Lei, Chin-Laung; Chen, Kuan-Ta |
國立交通大學 |
2019-09-02T07:46:19Z |
Look at Me! Correcting Eye Gaze in Live Video Communication
|
Hsu, Chih-Fan; Wang, Yu-Shuen; Lei, Chin-Laung; Chen, Kuan-Ta |
國立交通大學 |
2019-04-02T06:04:24Z |
Realizing the Real-time Gaze Redirection System with Convolutional Neural Network
|
Hsu, Chih-Fan; Chen, Yu-Cheng; Wang, Yu-Shuen; Lei, Chin-Laung; Chen, Kuan-Ta |
臺大學術典藏 |
2018-09-10T07:42:16Z |
Identifying MMORPG Bots: A Traffic Analysis Approach (Extended)
|
Chen, Wen-Chin; POLLY HUANG; CHIN-LAUNG LEI; Chen, Kuan-Ta;Jiang, Jhih-Wei;Huang, Polly;Chu, Hao-Hua;Lei, Chin-Laung;Chen, Wen-Chin; Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin |
國立交通大學 |
2018-08-21T05:56:24Z |
Data Hiding on Social Media Communications Using Text Steganography
|
Shiu, Hung-Jr; Lin, Bor-Shing; Lin, Bor-Shyh; Huang, Po-Yang; Huang, Chien-Hung; Lei, Chin-Laung |
國立臺灣大學 |
2012 |
TAME POOL-BASED PAIRWISE KEY PREDISTRIBUTION FOR LARGE-SCALE SENSOR NETWORKS
|
Liao, Yen-Hua; Lei, Chin-Laung; Wang, Ai-Nung; Tsai, Wen-Chi |
國立高雄第一科技大學 |
2011.07 |
Provably secure and efficient identification and key agreement protocol with user anonymity
|
Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝 |
國立高雄第一科技大學 |
2011.03 |
Robust authentication and key agreement scheme preserving the privacy of secret key
|
Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝 |
國立高雄第一科技大學 |
2010.11 |
SMART CARD-BASED SECURE WEB SERVICES IN THE THREE-PARTY SETTING
|
Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝 |
國立高雄第一科技大學 |
2010.02 |
ROBUST AND EFFICIENT THREE-PARTY USER AUTHENTICATION AND KEY AGREEMENT USING BILINEAR PAIRINGS
|
Juang, Wen-Shenq;Lei, Chin-Laung;Liaw, Horng-Twu;Nien, Wei-Ken; 莊文勝 |
國立臺灣大學 |
2010 |
Quadrant of Euphoria: A Crowdsourcing Platform for QoE Assessment
|
Chen, Kuan-Ta; Chang, Chi-Jui; Wu, Chen-Chi; Chang, Yu-Chun; Lei, Chin-Laung |
國立臺灣大學 |
2010 |
Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings
|
Juang, Wen-Shenq; Lei, Chin-Laung; Liaw, Horng-Twu; Nien, Wei-Ken |
國立臺灣大學 |
2010 |
A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems
|
Wang, Ren-Chiun; Juang, Wen-Shenq; Lei, Chin-Laung |
國立高雄第一科技大學 |
2009.04 |
A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
|
Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝 |
國立高雄第一科技大學 |
2009.02 |
User authentication scheme with privacy-preservation for multi-server environment
|
Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝 |
國立臺灣大學 |
2009 |
Identifying MMORPG Bots: A Traffic Analysis Approach
|
Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin |
國立臺灣大學 |
2009 |
On the Challenges and Designs of Transport Protocols for MMORPGs
|
Wu, Chen-Chi; Chen, Kuan-Ta; Chen, Chih-Ming; Huang, Polly; Lei, Chin-Laung |
國立臺灣大學 |
2009 |
Fair anonymous rewarding based on electronic cash
|
Fan, Chun-I; Huang, Shi-Yuan; Ho, Pei-Hsiu; Lei, Chin-Laung |
國立臺灣大學 |
2009 |
A Robust Authentication Scheme with User Anonymity for Wireless Environments
|
Wang, Ren-Chiun; Juang, Wen-Shenq; Lei, Chin-Laung |
國立臺灣大學 |
2009 |
User Authentication Scheme with Privacy-preservation for Multi-server Environment
|
Wang, Ren-Chiun; Juang, Wen-Shenq; Lei, Chin-Laung |
國立高雄第一科技大學 |
2008-04 |
A Web Metering Scheme for Fair Advertisement Transactions
|
Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝 |
國立高雄第一科技大學 |
2008-03 |
An Anonymous and Deniable Conversation for a Thin Client
|
Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝 |
國立臺灣大學 |
2008 |
Effect of Network Quality on Player Departure Behavior in Online Games
|
Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung |
國立臺灣大學 |
2008 |
A Generalizable Methodology for Quantifying User Satisfaction
|
Huang, Te-Yuan; Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung |
國立臺灣大學 |
2008 |
Identifying MMORPG Bots: A Traffic Analysis Approach (Extended)
|
Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin |
國立臺灣大學 |
2008 |
A Web Metering Scheme for Fair Advertisement Transactions
|
Wang, Ren-Chiun; Juang, Wen-Shenq; Lei, Chin-Laung |
臺大學術典藏 |
2008 |
Effect of Network Quality on Player Departure Behavior in Online Games
|
Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung; Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung |
臺大學術典藏 |
2008 |
A Generalizable Methodology for Quantifying User Satisfaction
|
Huang, Te-Yuan; Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung; Huang, Te-Yuan; Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung |
國立高雄第一科技大學 |
2007.12 |
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem
|
Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝 |
國立高雄第一科技大學 |
2007-12 |
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem
|
Wang, Ren-Chiun;Juang, Wen-Shenq;Lei, Chin-Laung; 莊文勝 |
國立高雄第一科技大學 |
2007-04 |
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments
|
Wang, Ren-Chiun;Juang, Wen-Shenq;Wu, Chen-Chi;Lei, Chin-Laung; 莊文勝 |
國立臺灣大學 |
2007 |
Secure multicast in dynamic environments
|
Huang, Chun-Ying; Chiu, Yun-Peng; Chen, Kuan-Ta; Lei, Chin-Laung |
國立臺灣大學 |
2007 |
A Survey of Secure Data Aggregation on Sensor Networks
|
Chen, Yu-Shian; Hsiao, Hsu-Chun; Lei, Chin-Laung |
國立臺灣大學 |
2006-11 |
VOIP SECURITY (IN COLLECTED PAPERS ON INFORMATION AND COMMUNICATION SECURITY)
|
Juang, Wen-Shenq; Chen, Sian-Teng; Lei, Chin-Laung |
臺大學術典藏 |
2006-11 |
VOIP SECURITY (IN COLLECTED PAPERS ON INFORMATION AND COMMUNICATION SECURITY)
|
Juang, Wen-Shenq; Chen, Sian-Teng; Lei, Chin-Laung; Juang, Wen-Shenq; Chen, Sian-Teng; Lei, Chin-Laung |
國立臺灣大學 |
2006 |
Identifying MMORPG Bots: A Traffic Analysis Approach
|
Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin |
國立臺灣大學 |
2006 |
How sensitive are online gamers to network quality?
|
Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung |
國立臺灣大學 |
2006 |
Game traffic analysis: An MMORPG perspective
|
Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung |
國立臺灣大學 |
2006 |
Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters
|
Tsai, Pan-Lung; Lei, Chin-Laung |
臺大學術典藏 |
2006 |
Identifying MMORPG Bots: A Traffic Analysis Approach
|
Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin; Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin |
臺大學術典藏 |
2006 |
How sensitive are online gamers to network quality?
|
Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung; Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung |
臺大學術典藏 |
2006 |
Game traffic analysis: An MMORPG perspective
|
Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung; Chen, Kuan-Ta; Huang, Polly; Lei, Chin-Laung |