| 嘉南藥理大學 |
2019 |
A novel tag searching protocol with time efficiency and searching accuracy in RFID systems
|
Liu, Chuan-Gang; Liu, I-Hsien; Lin, Chang-De; Li, Jung-Shian |
| 國立成功大學 |
2016-08-15 |
Efficient tag reading protocol for large-scale RFID systems with pre-reading
|
Tsai, Shuen-Chih;Hu, Yu-Min;Chai, Chen-Hsun;Li, Jung-Shian |
| 國立成功大學 |
2016-05 |
Novel intrusion prediction mechanism based on honeypot log similarity
|
Jiang, Ci-Bin; Liu, I-Hsien; Chung, Yao-Nien; Li, Jung-Shian |
| 嘉南藥理大學 |
2015-12 |
K-anonymity against neighborhood attacks in weighted social networks
|
Liu, Chuan-Gang; Liu, I-Hsien; Yao, Wun-Sheng; Li, Jung-Shian |
| 國立成功大學 |
2015-12 |
K-anonymity against neighborhood attacks in weighted social networks
|
Liu, Chuan-Gang; Liu, I-Hsien; Yao, Wun-Sheng; Li, Jung-Shian |
| 國立成功大學 |
2015-07 |
Hybrid Blocking Algorithm for Identification of Overlapping Staying Tags Between Multiple Neighboring Readers in RFID Systems
|
Hu, Yu-Min; Chang, Iang-Chong; Li, Jung-Shian |
| 國立成功大學 |
2014-12 |
Resource allocation in cloud virtual machines based on empirical service traces
|
Lin, Ching-Huang; Lu, Chien-Tung; Chen, Ying-Hsien; Li, Jung-Shian |
| 國立成功大學 |
2014-11 |
JPEG forensics scheme for signature embedding and packet-level detection
|
Hsieh, Che-Jen; Weng, Chi-Tien; Li, Jung-Shian |
| 國立成功大學 |
2014-07-04 |
A multi-hop resource scheduling algorithm for IEEE 802.16j relay networks
|
Liu, I-Hsien; Liu, Chuan-Gang; Lu, Chien-Tung; Kuo, Yi-Tsen; Li, Jung-Shian |
| 嘉南藥理大學 |
2014-07 |
A multi-hop resource scheduling algorithm for IEEE 802.16j relay networks
|
Liu, I-Hsien; Liu, Chuan-Gang; Lu, Chien-Tung; Kuo, Yi-Tsen; Li, Jung-Shian |
| 國立成功大學 |
2014-01 |
Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks
|
Su, Yi-Sheng; Su, Szu-Lin; Li, Jung-Shian |
| 國立成功大學 |
2013-12 |
A hierarchical mobile-agent-based security operation center
|
Li, Jung-Shian; Hsieh, Che-Jen; Lin, Husan-Yeh |
| 國立成功大學 |
2013-11 |
Intelligent Adjustment Forwarding: A compromise between end-to-end and hop-by-hop transmissions in VANET environments
|
Li, Jung-Shian; Liu, I-Hsien; Kao, Chuan-Kai; Tseng, Chao-Ming |
| 國立成功大學 |
2013-10 |
Distributed key management scheme for peer-to-peer live streaming services
|
Li, Jung-Shian; Hsieh, Che-Jen; Wang, Yu-Kai |
| 國立成功大學 |
2013-10 |
Novel distributed key revocation scheme for wireless sensor networks
|
Chao, Chih-Hung; Yang, Ching-Fang; Lin, Po-Ting; Li, Jung-Shian |
| 國立成功大學 |
2013-08 |
A lightweight identity authentication protocol for vehicular networks
|
Li, Jung-Shian; Liu, Kun-Hsuan |
| 國立成功大學 |
2013-06 |
An Efficient Time-Bound Collision Prevention Scheme for RFID Re-Entering Tags
|
Li, Jung-Shian; Huo, Yu-Min |
| 國立成功大學 |
2013-06 |
Digital evidence collection for web image access
|
Hsieh, Che-Jen; Li, Jung-Shian; Liu, Wei-Cheng |
| 嘉南藥理大學 |
2012-12 |
Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks
|
Liu, Chuan-Gang; Chao, Chih-Hung; Leou, Chih-Wen; Li, Jung-Shian |
| 國立成功大學 |
2012-12 |
Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks
|
Liu, Chuan-Gang; Chao, Chih-Hung; Leou, Chih-Wen; Li, Jung-Shian |
| 國立成功大學 |
2012-10 |
Minimizing multiplayer interactive delay in multihop wireless networks
|
Liu, Kun-Hsuan; Li, Jung-Shian; Wang, Chun-Yen; Chilamkurti, Naveen; Vasilakos, Athanasios V. |
| 國立成功大學 |
2012-09 |
MSS: Use File Format Conversion for Suppress Malicious Scripts in Multimedia
|
Lin, Ching-Huang; Ma, Jian-Yuan; Laih, Chi-Sung; Li, Jung-Shian |
| 國立成功大學 |
2012-07 |
Network-coding-based cache policy for loss recovery enhancement in reliable multicast
|
Li, Jung-Shian; Liu, Kun-Hsuan |
| 國立成功大學 |
2012-06-01 |
Efficient group multicast node scheduling schemes in multi-hop wireless networks
|
Li, Jung-Shian; Liu, Kun-Hsuan; Wu, Chien-Hung |
| 國立高雄大學 |
2011-10 |
An Efficient Diversity-Driven Selective Forwarding Approach for Replicated Data Queries in Wireless Sensor Networks
|
Chao, Chih-Hung; Li, I-Hui; Yang, Chong-Yi; Li, Jung-Shian |