default search action
Yi-Wei Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j34]Yi-Hao Tu, En-Cheng Lin, Chih-Heng Ke, Yi-Wei Ma:
Enhanced-SETL: A multi-variable deep reinforcement learning approach for contention window optimization in dense Wi-Fi networks. Comput. Networks 253: 110690 (2024) - [j33]Yi-Wei Ma, Chia-Wei Tsou:
A novel passive-active detection system for false data injection attacks in industrial control systems. Comput. Secur. 145: 103996 (2024) - [j32]Yi-Wei Ma, Yi-Hao Tu, Chih-Ting Shen:
DSACR: A defense-based system with adaptive cyber resilience for industrial control systems. Int. J. Crit. Infrastructure Prot. 45: 100662 (2024) - [j31]Yi-Wei Ma, Yen-Neng Chiang:
A Postdisaster Network Resource Allocation in a Mobile Communication Network. IT Prof. 26(4): 48-54 (2024) - [j30]Yi-Wei Ma, Jiann-Liang Chen, Li-Dong Chen, Yueh-Min Huang:
Intelligent Clickbait News Detection System Based on Artificial Intelligence and Feature Engineering. IEEE Trans. Engineering Management 71: 12509-12518 (2024) - 2023
- [j29]Chih-Heng Ke, Yi-Hao Tu, Yi-Wei Ma:
A reinforcement learning approach for widest path routing in software-defined networks. ICT Express 9(5): 882-889 (2023) - [j28]Hsiang-Yu Chuang, Jiann-Liang Chen, Yi-Wei Ma:
Malware Detection and Classification Based on Graph Convolutional Networks and Function Call Graphs. IT Prof. 25(3): 43-53 (2023) - [j27]Yi-Wei Ma, Jiann-Liang Chen, Yan-Ju Chen, Ying-Hsun Lai:
Explainable deep learning architecture for early diagnosis of Parkinson's disease. Soft Comput. 27(5): 2729-2738 (2023) - 2022
- [j26]Yi-Wei Ma, Chun-Yao Chang, Yen-Neng Chiang, Jiann-Liang Chen, Chih-Hung Chen, Wen-Tsung Chang, Shun-Ching Yang, Ying-Hsun Lai:
Analysis and Response Strategy of Cross-Community Rumors Using Mixed Multilayer Method for Enterprise Cyber Warriors. IEEE Access 10: 131386-131393 (2022) - [j25]Yi-Wei Ma, Jiann-Liang Chen, Wen-Han Kuo, Yu-Chen Chen:
[email protected]: An intelligent framework for defending against malware attacks. J. Inf. Secur. Appl. 65: 103092 (2022) - [j24]Jiann-Liang Chen, Hsin-Yun Chen, Yi-Wei Ma:
Intelligent LoRa-Based Positioning System. KSII Trans. Internet Inf. Syst. 16(9): 2961-2975 (2022) - [j23]Yi-Wei Ma, Jiann-Liang Chen, Chi-Sheng Shih:
An Automatic and Intelligent Internet of Things for Future Agriculture. IT Prof. 24(6): 74-80 (2022) - 2021
- [j22]Yu-Chen Chen, Jiann-Liang Chen, Yi-Wei Ma:
[email protected] Intelligent technical support scam detection system. J. Inf. Secur. Appl. 61: 102921 (2021) - 2020
- [j21]Bo Wang, Yi-Wei Ma, Hong-Tao Hu:
Hybrid model for Chinese character recognition based on Tesseract-OCR. Int. J. Internet Protoc. Technol. 13(2): 102-108 (2020) - [j20]Jiann-Liang Chen, Yi-Wei Ma, Kuan-Lung Huang:
Intelligent Visual Similarity-Based Phishing Websites Detection. Symmetry 12(10): 1681 (2020) - 2019
- [j19]Yi-Wei Ma, Jiann-Liang Chen, Zheng-Zhun Chen:
A high accuracy and efficiency indoor positioning system with visible light communication. Trans. Emerg. Telecommun. Technol. 30(2) (2019) - [j18]Yi-Wei Ma, Jiann-Liang Chen, Jia-Yi Jhou:
Adaptive service function selection for Network Function Virtualization networking. Future Gener. Comput. Syst. 91: 108-123 (2019) - [j17]Yi-Wei Ma, Jiann-Liang Chen, Yi-Lin Xie:
An Adaptive Data Center Manager for Data-Oriented Information Centric Networking. Wirel. Pers. Commun. 107(2): 1115-1133 (2019) - 2018
- [j16]Yi-Wei Ma, Jiann-Liang Chen, Chia-Ju Lin:
Automated Network Load Balancing and Capacity Enhancing Mechanism in Future Network. IEEE Access 6: 19407-19418 (2018) - [j15]Yi-Wei Ma, Jiann-Liang Chen, Chen-Chia Chang, Akihiro Nakao, Shu Yamamoto:
A novel dynamic resource adjustment architecture for virtual tenant networks in SDN. J. Syst. Softw. 143: 100-115 (2018) - 2017
- [j14]Yi-Wei Ma, Jiann-Liang Chen, Yao-Hong Tsai, Kui-He Cheng, Wen-Chien Hung:
Load-Balancing Multiple Controllers Mechanism for Software-Defined Networking. Wirel. Pers. Commun. 94(4): 3549-3574 (2017) - 2016
- [j13]Yi-Wei Ma, Jiann-Liang Chen, Fan-Sheng Chang, Chia-Lun Tang:
Novel fingerprinting mechanisms for indoor positioning. Int. J. Commun. Syst. 29(3): 638-656 (2016) - [j12]Yi-Wei Ma, Jiann-Liang Chen, Yung-Sheng Lee, Hsin-Yi Chang:
GreenIoT Architecture for Internet of Things Applications. KSII Trans. Internet Inf. Syst. 10(2): 444-461 (2016) - [j11]Jiann-Liang Chen, Yi-Wei Ma, Hung-Yi Kuo, Chu-Sing Yang, Wen-Chien Hung:
Software-Defined Network Virtualization Platform for Enterprise Network Resource Management. IEEE Trans. Emerg. Top. Comput. 4(2): 179-186 (2016) - 2015
- [j10]Yi-Wei Ma, Weihua Zhang, Han Long:
Intelligent guidance method based on differential geometric guidance command and fuzzy self-adaptive guidance law. J. Intell. Fuzzy Syst. 29(6): 2527-2536 (2015) - [j9]Yi-Wei Ma, Wei-Ting Cho, Jiann-Liang Chen, Yueh-Min Huang, Rongbo Zhu:
RFID-based mobility for seamless personal communication system in cloud computing. Telecommun. Syst. 58(3): 233-241 (2015) - 2014
- [j8]Yi-Wei Ma, Jiann-Liang Chen, Ching-Hesign Chou, Shyue-Kung Lu:
A Power Saving Mechanism for Multimedia Streaming Services in Cloud Computing. IEEE Syst. J. 8(1): 219-224 (2014) - 2012
- [j7]Yi-Wei Ma, Jiann-Liang Chen, Sy-Yen Kuo, Wen-Kuei Hsieh, Yueh-Min Huang:
An efficient code gateway for RFID seamless applications. Int. J. Netw. Manag. 22(2): 150-161 (2012) - 2011
- [j6]Chin-Feng Lai, Yi-Wei Ma, Sung-Yen Chang, Han-Chieh Chao, Yueh-Min Huang:
OSGi-based services architecture for Cyber-Physical Home Control Systems. Comput. Commun. 34(2): 184-191 (2011) - [j5]Yi-Wei Ma, Han-Chieh Chao, Jiann-Liang Chen, Cheng-Yen Wu:
Load-balancing mechanism for the RFID middleware applications over grid networking. J. Netw. Comput. Appl. 34(3): 811-820 (2011) - [j4]Yi-Wei Ma, Chin-Feng Lai, Jenq-Muh Hsu, Nong-Kun Chen, Yueh-Min Huang:
RFID-Based Positioning System for Telematics Location-Aware Applications. Wirel. Pers. Commun. 59(1): 95-108 (2011) - 2010
- [j3]Yi-Wei Ma, Jiann-Liang Chen, Yueh-Min Huang, Mei-Yu Lee:
An Efficient Management System for Wireless Sensor Networks. Sensors 10(12): 11400-11413 (2010) - 2009
- [j2]Yi-Wei Ma, Chin-Feng Lai, Chia-Cheng Hu, Ming-Chiao Chen, Yueh-Min Huang:
RFID-based seamless multimedia services for smart homes. Int. J. Internet Protoc. Technol. 4(4): 232-239 (2009) - [j1]Jiann-Liang Chen, Yi-Wei Ma, Chia-Ping Lai, Chia-Cheng Hu, Yueh-Min Huang:
Multi-Hop Routing Mechanism for Reliable Sensor Computing. Sensors 9(12): 10117-10135 (2009)
Conference and Workshop Papers
- 2024
- [c25]Chenglong Shao, Kazuya Tsukamoto, Yi-Wei Ma, Yingbo Hua, Xianpeng Wang:
CoWiL: Combating Cross-Technology Interference in LoRaWAN. ICCCN 2024: 1-6 - [c24]Jung-Erh Chang, Yi-Chen Chiu, Yi-Wei Ma, Zhi-Xiang Li, Cheng-Long Shao:
Packet Continuity DDoS Attack Detection for Open Fronthaul in ORAN System. NOMS 2024: 1-5 - 2023
- [c23]Chia-Wei Tsou, Yi-Wei Ma, Yi-Hao Tu, Jiann-Liang Chen:
Security Assist Mechanisms for Industrial Control Systems with Authentication. ICACT 2023: 186-188 - [c22]Yi-Hao Tu, Yi-Wei Ma, Zhi-Xiang Li, Jiann-Liang Chen, Kazuya Tsukamoto:
Applying Deep Reinforcement Learning for Self-organizing Network Architecture. ICKII 2023: 16-20 - 2022
- [c21]Shiang-Jiun Chen, Yu-Chun Pan, Yi-Wei Ma, Cheng-Mou Chiang:
The Impact of the Practical Security Test during the Software Development Lifecycle. ICACT 2022: 313-316 - [c20]Shiang-Jiun Chen, Yu-Chun Pan, Yi-Wei Ma, Cheng-Mou Chiang, Chi-Chin Tsai:
Trustworthy Software Development - practical view of security processes through MVP methodology. ICACT 2022: 412-416 - [c19]Chih-Ting Shen, Yu-Yi Xiao, Yi-Wei Ma, Jiann-Liang Chen, Cheng-Mou Chiang, Shiang-Jiun Chen, Yu-Chuan Pan:
Security Threat Analysis and Treatment Strategy for ORAN. ICACT 2022: 417-422 - [c18]Yao-Chung Chang, Yi-Wei Ma, Jiann-Liang Chen:
A High-Efficiency Mobility Load Balancing System Architecture for Hybrid Mobile Cell Network. SmartIoT 2022: 254-255 - 2021
- [c17]Yi-Wei Ma, Jiann-Liang Chen, Wei-Kuan Shih:
The Survey for Next Generation Mobile Networks Framework Applied to Intelligent Internet of Medical. SmartIoT 2021: 267-270 - 2020
- [c16]Wang-You Tsai, Tzu-Chuan Chou, Jiann-Liang Chen, Yi-Wei Ma, Chen-Jui Huang:
Blockchain as a Platform for Secure Cloud Computing Services. ICACT 2020: 155-158 - [c15]Yu-Chen Chen, Yi-Wei Ma, Jiann-Liang Chen:
Intelligent Malicious URL Detection with Feature Analysis. ISCC 2020: 1-5 - 2019
- [c14]Yi-Wei Ma, Jin-Qiu Shi, Jiann-Liang Chen, Chia-Chi Hsu, Chen-Hao Chuang:
Integration Agricultural Knowledge and Internet of Things for Multi-Agent Deficit Irrigation Control. ICACT 2019: 299-304 - [c13]Yi-Wei Ma, Dan-Ping Lin, Shiang-Jiun Chen, Hsiu-Yuan Chu, Jiann-Liang Chen:
System Design and Development for Robotic Process Automation. SmartCloud 2019: 187-189 - [c12]Yi-Wei Ma, Jiann-Liang Chen, Ying-Ting Chen, Chia-Chi Hsu, Chen-Hao Chuang:
Hybrid VLC-based Indoor Positioning System for Future Productivity 4.0. SNPD 2019: 158-161 - 2018
- [c11]Yi-Wei Ma, Jiann-Liang Chen, Hao-Kai Lin:
Mobility Robustness Optimization Based on Radio Link Failure Prediction. ICUFN 2018: 454-457 - 2017
- [c10]Yi-Wei Ma, Wei Yan, Jiann-Liang Chen:
Cross-Border E-Commerce Risk Analysis Platform Based on SDN and Cloud Virtualization Technology. TE 2017: 128-135 - 2016
- [c9]Yi-Wei Ma, Jiann-Liang Chen, Yao-Hong Tsai, Pen-Chan Chou, Shyue-Kung Lu, Sy-Yen Kuo:
Integrated Heterogeneous Infrastructure for Indoor Positioning. SpaCCS Workshops 2016: 249-256 - 2015
- [c8]Yao-Chung Chang, Jiann-Liang Chen, Yi-Wei Ma, Po-Sheng Chiu:
Vehicular Cloud Serving Systems with Software-Defined Networking. IOV 2015: 58-67 - 2014
- [c7]Jiann-Liang Chen, Yi-Wei Ma, Po-Sheng Chiu, Da-Wei Jiang:
SDNBroker: Heterogeneous cloud serving systems over software-defined networking. CITS 2014: 1-5 - 2013
- [c6]Ying-Xun Lai, Yi-Wei Ma, Yueh-Min Huang, Jiann-Liang Chen, Subhas Chandra Mukhopadhyay:
Ubiquitous motion sensing service using wearable shoe module and mobile device. I2MTC 2013: 1376-1379 - 2012
- [c5]Yanuarius Teofilus Larosa, Jiann-Liang Chen, Yi-Wei Ma, Sy-Yen Kuo:
Socio-organism inspired model forming multi-level computational scheme for integrated IoT service architecture. BCFIC 2012: 68-71 - [c4]Chin-Feng Lai, Man Lin, Yonggang Wen, Yi-Wei Ma, Jiann-Liang Chen:
Applied Lightweight Parallel Multi-Appliance Recognition on Smart Meter. CSE 2012: 361-366 - 2011
- [c3]Jiann-Liang Chen, Yanuarius Teofilus Larosa, Der-Jiunn Deng, Pei-Jia Yang, Yi-Wei Ma:
QoS-aware heterogeneous networking using distributed multiagent schemes. IWCMC 2011: 1713-1718 - 2009
- [c2]Chin-Feng Lai, Yi-Wei Ma, Chia-Cheng Hu, Yueh-Min Huang:
P2P Multimedia Streaming Schedule for Maximum Network Capacity. IIH-MSP 2009: 1228-1231 - 2008
- [c1]Jiann-Liang Chen, Shih-Hsien Wei, Yao-Chung Chang, Yi-Wei Ma:
Design and Implementation of an Embedded Linux-Based Mobile Router for Telematics Computing. AICT 2008: 238-243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint