| Issue Date | Title | Author(s) | Source | scopus | WOS | Fulltext/Archive link |
| 2009 | REST2SOAP: a Framework to Integrate SOAP Services and RESTful Services | Yu-Yen Peng; Shang-Pin Ma ; Jonathan Lee | 2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA) | | | |
| 2017 | Retrieval of Web Service Components using UML Modeling and Term Expansion | Lee, W. T.; Shang-Pin Ma ; Tsai, Y. Y. | Journal of Information Science and Engineering | | | |
| 2014 | A Review of the Automatic Web Service Composition Surveys | Yang Syu; Yong-Yi FanJiang; Jong-Yih Kuo; Shang-Pin Ma | 2014 IEEE International Conference on Semantic Computing | | | |
| 2008 | Revisit Bayesian approaches for Spam Detection | Chun-Chao Yeh ; Soun-Jan Chiang | | | | |
| 2024/10/1 | Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments | Lin, Han-Yu ; Chen, Pei-Ru | SENSORS | | | |
| 2015 | Revocable Certificateless Public Key Encryption | Tsai, T. T ; Tseng, Y. M. | Ieee Systems Journal | | 26 | |
| 2022 | Revocable certificateless public key encryption with equality test | Tung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai | | | | |
| 2022 | Revocable Certificateless Public Key Encryption with Equality Test | Tsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-Ching | INFORMATION TECHNOLOGY AND CONTROL | | | |
| 2024/1/1 | A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification | Lin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-Lun | IEEE ACCESS | | | |
| 2012 | A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants | Wu, T. Y.; Tseng, Y. M.; Tsai, T. T | Computer Networks | | 32 | |
| 2014 | Revocable ID-based mutual authentication and key agreement protocol for multi-server environments | Jia-Hua Ke; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang | | | | |
| 2012 | Revocable ID-based signature scheme with batch verifications | Tsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng | | | | |
| 2012 | A revocable ID-based signcryption scheme | Tsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng | | | | |
| 2014 | RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Informatica | | | |
| 2018 | RNA-Seq-mediated transcriptomic analysis of heat stress response in a polar Chlorella sp. (Trebouxiophyceae, Chlorophyta) | Poong, Sze-Wan; Lee, Kok-Keong; Lim, Phaik-Eem; Pai, Tun-Wen; Wong, Chiew-Yen; Phang, Siew-Moi; Chen, Chien-Ming; Yang, Cing-Han; Liu, Chun-Cheng | J APPL PHYCOL | | 11 | |
| 2020 | Robotic Arm Assistance System Based on Simple Stereo Matching and Q-Learning Optimization | Yi-Zeng Hsieh ; Shih-Syun Lin | Ieee Sensors Journal | | 12 | |
| 2014 | A Robust Convertible Multi-Authenticated Encryption Scheme with One-Way Hash Function | Chung-Fu Lu; Chien-Lung Hsu; Han-Yu Lin ; Chien-Hui Su | | | | |
| 2004 | Robust Key Authentication Scheme Resistant to Public Key Substitution Attacks | Tzong-Sun Wu; Han-Yu Lin | | | | |
| 2019 | Robust Method for Generating Aesthetic QR Codes | Yu-Fan Chang; Shih-Syun Lin ; Chia-Wei Tang; Yi-Xuan Huang | | | | |
| 2015 | Robust Rear Light Status Recognition Using Symmetrical SURFs | Li-Chih Chen; Jun-Wei Hsieh; Shyi-Chyi Cheng ; Zi-Ran Yang | | | | |