公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
2006 | A 1.5-V 10-ppm/°C 2nd-order curvature-compensated CMOS bandgap reference with trimming | Hsiao, S.-W.; Huang, Y.-C.; Liang, D.; Chen, H.-W.K.; HSIN-SHU CHEN | Proceedings - IEEE International Symposium on Circuits and Systems | | | |
2018 | ANTSdroid: Automatic malware family behaviour generation and analysis for Android apps | YEALI SUN ; Chen, C.-C.; Hsiao, S.-W.; Chen, M.C. | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | | | |
2016 | Behavior grouping of Android malware family | Hsiao, S.-W.; YEALI SUN ; Chen, M.C. | 2016 IEEE International Conference on Communications, ICC 2016 | | | |
2010 | Behavior profiling for robust anomaly detection | Hsiao, S.-W.; YEALI SUN ; Chen, M.C.; Zhang, H. | 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010 | | | |
2013 | Combining dynamic passive analysis and active fingerprinting for effective bot malware detection in virtualized environments | Hsiao, S.-W.; Chen, Y.-N.; YEALI SUN ; Chen, M.C. | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | | | |
2013 | A cooperative botnet profiling and detection in virtualized environment | Hsiao, S.-W.; Chen, Y.-N.; YEALI SUN ; Chen, M.C. | 2013 IEEE Conference on Communications and Network Security, CNS 2013 | | | |
2010 | Cross-level behavioral analysis for robust early intrusion detection | Hsiao, S.-W.; YEALI SUN ; Chen, M.C.; Zhang, H. | 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security | | | |
2008 | A distributed channel access scheduling scheme with clean-air spatial reuse for wireless mesh networks | Lin, Y.-C.; Hsiao, S.-W.; Tung, L.-P.; YEALI SUN ; Chen, M.C. | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | | | |
2020 | Hardware-Assisted MMU Redirection for In-Guest Monitoring and API Profiling | Hsiao, S.-W.; YEALI SUN ; Chen, M.C. | IEEE Transactions on Information Forensics and Security | 9 | 6 | |
2010 | Interactions between chitosan and cells measured by AFM | Hsiao, S.-W.; Thien, D.V.H.; Ho, M.-H.; Hsieh, H.-J.; Li, C.-H.; Hung, C.-H.; Li, H.-H.; HSYUE-JEN HSIEH | Biomedical Materials | | | |
2020 | Large Photoresponsivity in the Amorphous‐TiO2/SrRuO3 Heterostructure | Liu, H.-J.; Huang, C.-H.; Chen, C.-Y.; Hsiao, S.-W.; Chen, Y.-S.; Lee, M.-H.; Chen, Y.-C.; Wu, P.-J.; Chu, M.-W.; Lin, J.G.; MING-WEN CHU ; JAUYN GRACE LIN | Physica Status Solidi - Rapid Research Letters | 5 | 3 | |
2016 | Minimization of regression and ranking losses with shallow neural networks on automatic sincerity evaluation | Lee, H.-S.; Tsao, Y.; Lee, C.-C.; Wang, H.-M.; Lin, W.-C.; Chen, W.-C.; Hsiao, S.-W.; SHYH-KANG JENG | Proceedings of the Annual Conference of the International Speech Communication Association, INTERSPEECH | | | |
2015 | Real-time and intelligent private data protection for the Android platform | Hung, S.-H.; Hsiao, S.-W.; Teng, Y.-C.; Chien, R.; SHIH-HAO HUNG | Pervasive and Mobile Computing | | | |
2011 | A secure proxy-based cross-domain communication for web mashups | Hsiao, S.-W.; YEALI SUN ; Ao, F.-C.; Chen, M.C. | 9th IEEE European Conference on Web Services, ECOWS 2011 | | | |
2019 | Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network | Huang, Y.-T.; Chen, Y.-Y.; Yang, C.-C.; YEALI SUN ; Hsiao, S.-W.; Chen, M.C. | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | | | |