公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
1999 | Anonymous Channel and Authentication in Wireless Communications | W. S. Juang; C. L. Lei; C. Y. Chang; CHIN-LAUNG LEI | Computer Communications | | | |
2012 | Are all games equally cloud-gaming-friendly? An electromyographic approach | Yeng-Ting Lee; Kuan-Ta Chen; Han-I Su; CHIN-LAUNG LEI | 2012 International Workshop on Network and Systems Support for Games (NetGames 2012) | | | |
2013 | Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach | Yeng-Ting Lee; Kuan-Ta Chen; Han-I Su; CHIN-LAUNG LEI | IGCVP 2013 | | | |
2019 | Assessing the profitability of timely opening range breakout breakout on index futures markets | Yi-Cheng Tsai; Mu-En Wu; Chin-Laung Lei; Chung-Shu Wu; Jan-Ming Ho; Chuan-Ju Wang; CHIN-LAUNG LEI | IEEE Access | 5 | 14 | |
2019 | Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets | Tsai, Y.-C.; Wu, M.-E.; Syu, J.-H.; Lei, C.-L.; Wu, C.-S.; Ho, J.-M.; Wang, C.-J.; CHIN-LAUNG LEI | IEEE Access | | | |
1998 | ATM 網路安全管理之研究(III) | 雷欽隆 | | | | |
2015 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | Po-Wen Chi; CHIN-LAUNG LEI | IEEE Transactions on Cloud Computing | | | |
2018 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | Po-Wen Chi; Chin-Luang Lei; CHIN-LAUNG LEI | IEEE Transactions on Cloud Computing | 42 | 29 | |
2013 | Aura: An Anonymous Universal Relay Architecture over Structured Peer-To-Peer Networks | Jiunn-Jye Lee; Li-Yuan Lee; CHIN-LAUNG LEI | International Journal of Innovative Computing, Information and Control | 0 | | |
2005 | Automatic Generation of Conflict-Free IPSec Policies | C. L. Chang; Y. P. Chiu; CHIN-LAUNG LEI | International Conference on Formal Techniques for Networked and Distributed Systems | | | |
2017 | Automatic Test Pattern Generator for Fuzzing Based on Finite State Machines | Ming-Hung Wang; Han-Chi Wang; Chin-Laung Lei; CHIN-LAUNG LEI | Security and Communication Networks | 1 | 0 | |
1996 | Blind Threshold Signatures Based on Discrete Logarithm. | Juang, Wen-Shenq; CHIN-LAUNG LEI | Concurrency and Parallelism, Programming, Networking, and Security: Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996, Proceedings | | | |
2016 | Boosting Election Prediction Accuracy by Crowd Wisdom on Social Forums | Ming-Hung Wang; CHIN-LAUNG LEI | the 13th Annual IEEE Consumer Communications & Networking Conference | | | |
2007 | Bounding Peer-to-Peer Upload Traffic in Client Networks | Chun-Ying Huang; CHIN-LAUNG LEI | 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2007) | | | |
2008 | Broadcast Authentication in Sensor Networks using Compressed Bloom Filters | Yu-Shian Chen; I-Lun Lin; CHIN-LAUNG LEI | the 4th IEEE International Conference on Distributed Computing in Sensor Systems | | | |
2002 | Building E-marketplaces with Mobile Agents | C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI | The 2002 Conference on Technology and Management-Production-Commerce Integration and Collaborative Management in e-Era | | | |
2006 | Building High-Performance Reconfigurable Bandwidth Controllers with Adaptive Clustering | Chien-Hua Chiu; Chin-Yen Lee; Pan-Lung Tsai; Chun-Ying Huang; CHIN-LAUNG LEI | International Conference on Systems and Networks Communications (ICSNC 2006) | | | |
2022 | Building Machine Learning-based Threat Hunting System from Scratch | Chen, Chung Kuan; Lin, Si Chen; Huang, Szu Chun; Chu, Yung Tien; CHIN-LAUNG LEI ; Huang, Chun Ying | Digital Threats: Research and Practice | 1 | 0 | |
2017 | CAHR: Centrality-Aware Hybrid Replacement in Information-Centric Network | Hong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI | National Computer Symposium | | | |
2012 | Closed-Form Mortgage Pricing Formula with Outstanding Principal as Prepayment Value | Yi-Cheng Tsai; Zheng-Hui Chen; Jan-Ming Ho; Ming-Yang Kao; Chin-Laung Lei; Szu-Lang Liao; CHIN-LAUNG LEI | IEEE Computational Intelligence | | | |