711 results on '"Chen, Hsing-Chung"'
Search Results
102. Reconfigurable Intelligent Surface-Aided Cooperative NOMA with p-CSI Fading Channel toward 6G-Based IoT System
103. A cognitive RBAC model with handover functions in small heterogeneous networks
104. An adaptive capacity enhancement strategy for sector-based cellular systems
105. An Implementation of Trust Chain Framework with Hierarchical Content Identifier Mechanism by Using Blockchain Technology
106. A Smart Card-Based Three-Party Quantum Key Distribution Protocol
107. Tree-based Filtering in Pulse-Line Intersection Method Outputs for An Outlier-tolerant Data Processing
108. AlexNet Convolutional Neural Network for Disease Detection and Classification of Tomato Leaf
109. Generating Multi-Issued Session Key by Using Semi Quantum Key Distribution with Time-Constraint
110. Deep active reinforcement learning for privacy preserve data mining in 5G environments
111. A Distinguishing Arterial Pulse Waves Approach by Using Image Processing and Feature Extraction Technique
112. Grey Relational Analysis and Grey Prediction Model (1, 6) Approach for Analyzing the Electrode Distance and Mechanical Properties of Tandem MIG Welding Distortion.
113. Contract RBAC in cloud computing
114. A Secure Multicast Key Agreement Scheme
115. Heart Rate Monitoring System Using Feature Extraction in Electrocardiogram Signal by Convolutional Neural Network
116. An Approach for Detecting Flooding Attack Based on Integrated Entropy Measurement in E-Mail Server
117. Packet construction for secure conference call request in ad hoc network systems
118. Detection and Prevention of Cross-site Scripting Attack with Combined Approaches
119. Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019)
120. Enabling NOMA in Backscatter Reconfigurable Intelligent Surfaces-Aided Systems
121. Performance of computer examination items selection based on grey relational analysis
122. An online cognitive authentication and trust evaluation application programming interface for cognitive security gateway based on distributed massive Internet of Things network
123. Blockchain Technology Benefit in Tackling Online Shopping Transaction Revocation Issue
124. Updating high average-utility itemsets with pre-large concept
125. Deep active reinforcement learning for privacy preserve data mining in 5G environments.
126. Week-Wise Student Performance Early Prediction in Virtual Learning Environment Using a Deep Explainable Artificial Intelligence.
127. A Systematic Review of Federated Learning in the Healthcare Area: From the Perspective of Data Properties and Applications.
128. An online cognitive authentication and trust evaluation application programming interface for cognitive security gateway based on distributed massive Internet of Things network.
129. Smart Management Energy Systems in Industry 4.0
130. IEEE 802.11ba Wake-Up Radio: Performance Evaluation and Practical Designs
131. Analysis of using the tongue deviation angle as a warning sign of a stroke
132. Blockchain Technology Benefit in Tackling Online Shopping Transaction Revocation Issue.
133. IEEE Access Special Section Editorial: Recent Advances on Radio Access and Security Methods in 5G Networks
134. Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application
135. Secure OTT Service Scheme Based on Blockchain Technology
136. Active Detecting DDoS Attack Approach based on Entropy Measurement for the Next Generation Instant Messaging App on Smartphones
137. Intelligent approaches for security technologies
138. A fusion approach based on infrared finger vein transmitting model by using multi-light-intensity imaging
139. Topological dynamics of comparison-based fault identification in ad hoc networks
140. Design of a secure and effective medical cyber-physical system for ubiquitous telemonitoring pregnancy
141. TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks
142. IP-based seamless handover scheme using ANDSF in an untrusted environment
143. Study of the Patterns of Automatic Car Washing in the Era of Internet of Things
144. Implement of agent with role-based hierarchy access control for secure grouping IoTs
145. A negotiation-based cooperative RBAC scheme
146. A 3D encryption with shifting mapping substitution mechanism
147. Security Awareness Investigation for Mobile User Examined by Using Association Rule Mining Method
148. Intelligent Management Model Based on CBR-SDA Approach – An Example of Smart Life Recommendation System for Choosing Clothes and Accessories
149. Random Cladding with Feedback Mechanism for encrypting mobile messages
150. A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC Scheme
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.