公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
---|---|---|---|---|---|---|
2007 | Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking | C. M. Yu; C. S. Lu; S. Y. Kuo; SY-YEN KUO | 4th IEEE International Symposium on Wireless Communication Systems (ISWCS'07) | 3 | 0 | |
2017 | Impact Analysis for Dos and Integrity Attacks on IoT Systems | N. Berjab; C. M. Yu; S. Y. Kuo; H. Yokota; SY-YEN KUO | 2017 7th International Conference on Information Systems and Technologies (ICIST-2017) | |||
2007 | Improving the Network Flow Problem using Quantum Search | C. M. Yu; I. M. Tsai; Y. H. Chou; Sy-Yen Kuo; SY-YEN KUO | 2007 IEEE Conference on Nanotechnology (IEEE-NANO 2007) | 2 | 0 | |
2009 | Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning | C. Y. Chen; Y. S. Liang; C. M. Yu; C. H. Ho; S. Y. Kuo; SY-YEN KUO | 2009 Pacific Rim International Symposium on Dependable Computing (PRDC'09) | |||
2017 | Key Management in Internet of Things via Kronecker Product | I. C. Tsai; C. M. Yu; H. Yokota; S. Y. Kuo; SY-YEN KUO | 2017 Pacific Rim International Symposium on Dependable Computing (PRDC'17) | 19 | 0 | |
2012 | Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks | C. M. Yu; C. S. Lu; S. Y. Kuo; SY-YEN KUO | IEEE PerCom Workshop (IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing) | 34 | 27 | |
2013 | Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks | C. M. Yu; Y. T. Tsou; C. S. Lu; S. Y. Kuo; SY-YEN KUO | IEEE Transactions on Information Forensics and Security | 34 | 27 | |
2015 | Locating Stuck-at Error in Quantum Boolean Circuits | T. H. Chang; C. M. Yu; W. H. Chung; S. Y. Kuo; SY-YEN KUO | 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2015) | |||
2010 | Non-Interactive Pairwise Key Establishment for Sensor Networks | C. M. Yu; C. S. Lu; S. Y. Kuo; SY-YEN KUO | IEEE Transactions on Information Forensics and Security | 39 | 28 | |
2011 | Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks | C. M. Yu; Y. T. Tsou; C. S. Lu; S. Y. Kuo; SY-YEN KUO | IEEE Transactions on Information Forensics and Security | 33 | 27 | |
2014 | Privacy-Preserving Power Request in Smart Grid Networks | C. M. Yu; C. Y. Chen; S. Y. Kuo; H. C. Chao; SY-YEN KUO | IEEE Systems Journal | 32 | 23 | |
2011 | Secure transcoding for compressive multimedia sensing | L. W. Kang; H. W. Chen; C. M. Yu; C. S. Lu; C. Y. Hsu; S. C. Pei; SOO-CHANG PEI | 18th IEEE International Conference on Image Processing, ICIP 2011 | 5 | 0 | |
2013 | Top-k Query Result Completeness Verification in Sensor Networks | C. M. Yu; K. K. Ni; I. Y. Chen; E. Gelenbe; S. Y. Kuo; SY-YEN KUO | 2013 IEEE International Conference on Communications (ICC 2013) | 11 | 0 | |
2014 | Top-k Query Result Completeness Verification in Tiered Sensor Networks | C. M. Yu; G. K. Ni; I. Y. Chen; E. Gelenbe; S. Y. Kuo; SY-YEN KUO | IEEE Transactions on Information Forensics and Security | 43 | 36 |