公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2017 | Landmark-based summarized messages for flood warning | Chang, Ya-Hui ; Liu, Yu-Te; Tan, Yi-Yuan | T GIS | 3 | |
2017 | Large-Scale Analysis of Antimicrobial Activities in Relation to Amphipathicity and Charge Reveals Novel Characterization of Antimicrobial Peptides | Wang, C. K.; Shih, L. Y.; Kuan Y. Chang | Molecules | 23 | |
2015 | A Large-Scale Structural Classification of Antimicrobial Peptides | Lee, H. T.; Lee, C. C.; Yang, J. R.; Lai, J. Z. C.; Kuan Y. Chang | Biomed Research International | | |
2016 | Latent semantic learning with time-series cross correlation analysis for video scene detection and classification | Shyi-Chyi Cheng ; Su, J. Y.; Hsiao, K. F.; Rashvand, H. F. | Multimedia Tools and Applications | | |
2019 | Layered manufacturing for medical imaging data | Shyh-Kuang Ueng ; Huang, H. C.; Chou, C. S.; Huang, H. K. | Advances in Mechanical Engineering | | |
1998 | The Leafage of a Chordal Graph | 林英仁 | | | |
2015 | Leakage-Free ID-Based Signature | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Computer Journal | 8 | |
2022 | Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model | Tsai, Tung-Tso ; Tseng, Yuh-Min; Huang, Sen-Shan; Xie, Jia-Yi; Hung, Ying-Hao | IEEE ACCESS | 0 | |
2022 | Leakage-resilient certificate-based authenticated key exchange protocol | Tung-Tso Tsai ; Sen-Shan Huang; Yuh-Min Tseng; Yun-Hsin Chuang; Ying-Hao Hung | | | |
2020 | Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage | Jui-Di Wu; Yuh-Min Tseng; Sen-Shan Huang; Tung-Tso Tsai | | | |
2019 | Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Ieee Access | 7 | |
2021 | A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism | Tsai, Tung-Tso ; Chuang, Yun-Hsin; Tseng, Yuh-Min; Huang, Sen-Shan; Hung, Ying-Hao | IEEE ACCESS | 3 | |
2020 | Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server | Yuh-Min Tseng; Jui-Di Wu; Sen-Shan Huang; Tung-Tso Tsai | | | |
2022 | Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority | Tseng, Yuh-Min; Huang, Sen-Shan; Tsai, Tung-Tso ; Chuang, Yun-Hsin; Hung, Ying-Hao | INFORMATICA | 2 | |
2020 | Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Informatica | 6 | |
2016 | Learning Textual Entailment Classification from a Chinese RITE Dataset Specialized for Linguistic Phenomena | Chi-Ting Liu; Shao-Heng Chen; Chuan-Jie Lin | | | |
2011 | Learning through Network-Based Simulations for Epidemiology Education | Chung-Yuan Huang; Yu-Shiuan Tsai ; Tzai-Hung Wen | | | |
2009 | Learning to Build Network-Oriented Epidemic Simulation Models in Epidemiology Education | Ji-Lung Hsieh; Chung-Yuan Huang; Chuen-Tsai Sun; Yu-Shiuan Tsai ; Gloria Yi-Ming Kao | | | |
2017 | A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise Attacks | Han-Yu Lin ; Leo-Fan Yang; Yao-Min Hung | | | |
2005 | Limit distribution of the number of consecutive records | Hua-Huai Chern ; Hwang, H. K. | Random Structures & Algorithms | | |