44 results on '"Chen, Hsing-Chung"'
Search Results
2. Performance of Sub-optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction
3. A Secure Color-Code Key Exchange Protocol for Mobile Chat Application
4. Performance on Clustering Routing for Naturally Deployed Wireless Sensor Networks
5. A Generalized Data Inconsistency Detection Model for Wireless Sensor Networks
6. A Frame-Based Approach to Generating Insider Threat Test Suite on Cloud File-Sharing
7. Performance of Sub-optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction
8. End-to-End 3D Face Model Reconstruction Method Based on Fusion-CNN
9. Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model
10. Improved Collaborative Filtering Algorithm Based on Stacked Denoising AutoEncoders
11. Reduction of Data Leakage Using Software Streaming
12. Improved Security Schemes for Efficient Traffic Management in Vehicular Ad-Hoc Network
13. Digital Watermarking for Enriched Video Streams in Edge Computing Architectures Using Chaotic Mixtures and Physical Unclonable Functions
14. A Hidden File Extraction Scheme Defeating Malware Using Android Dynamic Loading
15. Power-Efficient Big.LITTLE Core Assignment Scheme for Task Graph Based Real-Time Smartphone Applications
16. Adaptive Touch Interface: Application for Mobile Internet Security
17. Role Mining: Survey and Suggestion on Role Mining in Access Control
18. EAP-Based Bootstrapping for Secondary Service Authentication to Integrate IoT into 5G Networks
19. Aggregate Authentication for Massive Internet of Things in 5G Networks
20. LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server
21. Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies
22. Voronoi Maps for Planar Sensor Networks Visualization
23. Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems
24. Steganalysis Method for Detecting Embedded Coefficients of Discrete-Wavelet Image Transformation into High-Frequency Domains
25. Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small Payloads
26. FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile Device
27. SAAS: A Secure Anonymous Authentication Scheme for PMIPv6
28. Generating Dynamic Box by Using an Input String
29. Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines
30. An SDN-Based Secure Mobility Model for UAV-Ground Communications
31. User Keystroke Authentication Based on Convolutional Neural Network
32. An Efficient Facebook Place Information Extraction Strategy
33. A Policy Management System Based on Multi-dimensional Attribution Label
34. An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components
35. A Discrete Wavelet Transformation Based Fast and Secure Transmission of Images for Group Communication
36. Personal Identification Using Time and Frequency Domain Features of ECG Lead-I
37. Design and Implementation of SPEEX Speech Technology on ARM Processor
38. Building a Frame-Based Cyber Security Learning Game
39. Mobile Security Assurance for Automotive Software Through ArchiMate
40. Security Analysis Oriented Physical Components Modeling in Quantum Key Distribution
41. A Novel Hybrid Architecture for High Speed Regular Expression Matching
42. Access Control for Cross-Border Transfer of Sensor Data
43. The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs
44. Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.