| Issue Date | Title | Author(s) | Source | scopus | WOS | Fulltext/Archive link |
| 2011 | New identity-based key-insulated convertible multi-authenticated encryption scheme | Hsu, C. L.; Han-Yu Lin | Journal of Network and Computer Applications | | | |
| 2001 | A New Multi-Channel MAC Protocol with On-Demand Channel Assignment for Mobile Ad Hoc Networks | S.-L. Wu; Chih-Yu Lin ; Y.-C. Tseng; J.-P. Sheu | | | | |
| 2014 | A New NAT Traversal Mechanism Design and Implementation | Chun-Chao Yeh ; Chung-Wei Huang; Ting-Hsiang Lin | | | | |
| 1988 | A New Preprocessor for Isolated Word Recognition System | E.-F. Huang; Pei-Yih Ting ; C.-J. Huang | | | | |
| 1988 | New Speech Recognition Approaches Based Upon Finite State Vector Quantization with Structural Constraints | Pei-Yih Ting ; C.-Y. Tseng; L.-S. Lee | | | | |
| 2019 | NICP: Node-RED-based and IoT-enabled Chatbot Platform | Shuo-Hung Tai; Shang-Pin Ma ; Jiun-Ting Lin; Wan-Lin You | | | | |
| 2008 | Noisy image enhancement on smooth function spaces | Mong-Shu Lee | International Journal of Computer Mathematics | | 1 | |
| 2013 | Non-Interactive Authenticated Key Agreement over the Mobile Communication Network | Wu, T. S.; Han-Yu Lin | Mobile Networks & Applications | | | |
| 2008 | A Novel (t, n) Threshold Convertible Authenticated Encryption Scheme | Han-Yu Lin ; Yi-Shiung Yeh | | | | |
| 2010 | A novel 3D mesh compression using mesh segmentation with multiple principal plane analysis | Shyi-Chyi Cheng ; Kuo, C. T.; Wu, D. C. | Pattern Recognition | | | |
| 2009 | A Novel Broadcast Paradigm in Supporting Power-Saving Mobile Stations | Haw-Yun Shin ; Mao-Hsu Yen | | | | |
| 2019 | A Novel CCA Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH Assumptions | Han-Yu Lin | Information Technology and Control | | | |
| 2010 | A Novel Classification Processing Based on The Spatial Information and The Concept of Adaboost for Hyperspectral Image Classification | Bor-Chen Kuo; Shih-Syun Lin ; Huey-Min Wu; Chun-Hsiang Chuang | | | 0 | |
| 2019 | A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking Services | Han-Yu Lin | Applied Sciences-Basel | | | |
| 2018 | A Novel GMM-Based Behavioral Modeling Approach for Smartwatch-Based Driver Authentication | Ching-Han Yang; Chin-Chun Chang ; Deron Liang | Sensors | | 7 | |
| 2015 | A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices | Tseng, Y. M.; Huang, S. S.; Tsai, T. T ; Tseng, L. | International Journal of Distributed Sensor Networks | | 7 | |
| 2011 | A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME | Han-Yu Lin ; Hsu, C. L. | International Journal of Foundations of Computer Science | | | |
| 2013 | Novel Identity-Based Key-Insulated Strong Designated Verifier Signature Scheme | Han-Yu Lin ; Chi-Kuang Yeh | | | | |
| 2011 | A Novel Load-Balanced Switch in Planar Switching Network | Haw-Yun Shin ; 吳鎮昌 | | | | |
| 2011 | A novel low-power 64-point pipelined FFT/IFFT processor for OFDM applications | Chu Yu; Yi-Ting Liao; Mao-Hsu Yen ; Pao-Ann Hsiung; Sao-Jie Chen | | | | |