| 國立政治大學 |
2014.07 |
Defence Expenditures: Theory and Empirics
|
林義鈞 |
| 國立臺灣科技大學 |
2009 |
Defendant firms and response to legal crises: Effect on shareholder value
|
Jang W.-Y.; Chen C.-T. |
| 朝陽科技大學 |
2018-05-31 |
Defender
|
藍云暄 |
| 臺大學術典藏 |
2020-02-11T02:34:53Z |
Defending against Distributed Denial-of-Service (DDoS) attacks using routing assignments and resource allocation strategies under Quality-of-Service (QoS) constraints
|
Lin, F.Y.-S;Tsang, P.-H;Kuo, C.-B.; Lin, F.Y.-S; Tsang, P.-H; Kuo, C.-B.; YEONG-SUNG LIN |
| 國立交通大學 |
2014-12-08T15:18:20Z |
Defending against spoofed DDoS attacks with path fingerprint
|
Lee, FY; Shieh, S |
| 國立成功大學 |
2017 |
Defending cloud computing environment against the challenge of DDoS attacks based on software defined network
|
Tsai, S.-C.;Liu, I.-H.;Lu, C.-T.;Chang, Chang C.-H.;Li, J.-S. |
| 國立中正大學 |
2012 |
Defending Minimalist Republicanism : Realizing the project of Public Justification Robustly
|
劉俊麟; 辯護極小化的共和主義-穩健實現公共證成計畫 |
| 臺北醫學大學 |
2011 |
Defending Particularism from Supervenience/Resultance Attack
|
PSH, Tsu |
| 臺北醫學大學 |
2011 |
Defending Particularism from Supervenience/Resultance Attack
|
PSH, Tsu |
| 臺大學術典藏 |
2021-03-16T01:22:00Z |
Defending Philosophy: The Myth of Er
|
I-Kai Jeng; I-KAI JENG |
| 淡江大學 |
2003 |
Defending Taiwan: Future Conditional
|
Chen, York Wen-jenq; Edmonds, Martin |
| 國立臺灣科技大學 |
2009-12 |
Defending Traffic Analysis with Communication Cycles in Wireless Sensor Networks
|
Hou-Jie Wang;Tien-Ruey Hsiang |
| 國立臺灣科技大學 |
2009 |
Defending traffic analysis with communication cycles in wireless sensor networks
|
Wang H.-J.; Hsiang T.-R. |
| 臺大學術典藏 |
2021-05-21T11:41:00Z |
Defending Your Voice: Adversarial Attack on Voice Conversion
|
Huang, Chien Yu; Lin, Yist Y.; HUNG-YI LEE; LIN-SHAN LEE |
| 臺大學術典藏 |
2021-09-02T00:05:13Z |
Defending Your Voice: Adversarial Attack on Voice Conversion
|
Huang C.-Y;Lin Y.Y;Lee H.-Y;Lee L.-S.; Huang C.-Y; Lin Y.Y; Lee H.-Y; Lee L.-S.; HUNG-YI LEE |
| 臺大學術典藏 |
2021-09-02T00:05:13Z |
Defense Against Adversarial Attacks on Spoofing Countermeasures of ASV
|
Wu H;Liu S;Meng H;Lee H.-Y.; Wu H; Liu S; Meng H; Lee H.-Y.; HUNG-YI LEE |
| 國立臺灣大學 |
2008 |
Defense against Distributed Denial-of-Service (DDoS) Attacks Using Routing Assignments and Resource Allocation Strategies under Quality-of-Service (QoS) Constraints
|
Lin, F.Y.S.; Tsang, P.H.; Kuo, C.B. |
| 淡江大學 |
2017-06 |
Defense and Social Welfare Expenditures' Effects on Taiwan's Economic Growth (1964-2015)
|
Shaw, Johnny;Yu, Hsiao-Yun;Hsieh, Yen-Wei;Wang, Chien-Wen |
| 育達商業科技大學 |
2010 |
Defense automatic malicious tools based on navigation behavior
|
Kai-Yung , Lin;林, 開榮;Jin-Cherng , Lin;Jan-Min , Chen;Tsung-Che , Wu |
| 國立政治大學 |
1997-05 |
Defense Conversion of the Aviation Industry in Mainland China and Taiwan
|
Ding, Arthur S. |
| 國立政治大學 |
2004 |
Defense Cooperation and Security in East Asia: a North-South Contrast
|
李瓊莉; Lee, Chyungly |
| 亞洲大學 |
2007-05 |
Defense Expenditure, Armaments Imports and Endogenous Growth
|
曹海濤;Hai-Tao, Tsao |
| 國立政治大學 |
1991 |
Defense Expenditures and Economic Growth: The Externality Effect
|
黃紀;Mintz; Huang, Chi |
| 國立政治大學 |
1990 |
Defense Expenditures, Economic Growth and the 'Peace Dividend"
|
黃紀;Mintz Alex; Huang, Chi |
| 臺大學術典藏 |
2021-09-02T00:05:13Z |
Defense for black-box attacks on anti-spoofing models by self-supervised learning
|
Wu H;Liu A.T;Lee H.-Y.; Wu H; Liu A.T; Lee H.-Y.; HUNG-YI LEE |