default search action
Fang-Yie Leu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j86]Heru Susanto, Aida Sari, Fang-Yie Leu:
Innovative Business Process Reengineering Adoption: Framework of Big Data Sentiment, Improving Customers' Service Level Agreement. Big Data Cogn. Comput. 6(4): 151 (2022) - [j85]Lung-Pin Chen, Fang-Yie Leu, Hsin-Ta Chiao, Hung-Jr Shiu:
Adaptive resource management for spot workers in cloud computing environment. Int. J. Web Grid Serv. 18(4): 437-452 (2022) - [j84]Szu-Yin Lin, Yun-Ching Kung, Fang-Yie Leu:
Predictive intelligence in harmful news identification by BERT-based ensemble learning model with text sentiment analysis. Inf. Process. Manag. 59(2): 102872 (2022) - [j83]Yao-Chung Fan, Si-Ying Huang, Yung-Yu Chen, Lun-Chi Chen, Fang-Yie Leu:
Word Embedding Quantization for Personalized Recommendation on Storage-Constrained Edge Devices in a Smart Store. Mob. Networks Appl. 27(1): 70-83 (2022) - [j82]Shih-wei Liao, Cheng-Han Hsu, Jeng-Wei Lin, Yi-Ting Wu, Fang-Yie Leu:
A Deep Learning-Based Chinese Semantic Parser for the Almond Virtual Assistant. Sensors 22(5): 1891 (2022) - 2021
- [j81]Szu-Yin Lin, Fang-Yie Leu, Chia-Yin Ko, Ming-Chien Shih:
A deep learning-based indoor-positioning approach using received strength signal indication and carrying mode information. Concurr. Comput. Pract. Exp. 33(23) (2021) - [j80]Lidia Ogiela, Fang-Yie Leu, Ugo Fiore:
Transformative computing in security, big data analysis, and cloud computing applications. Concurr. Comput. Pract. Exp. 33(23) (2021) - [j79]Fang-Yie Leu, Kun-Lin Tsai, Heru Susanto, Cheng-Yan Gu, Ilsun You:
A Fault Tolerant Mechanism for UE Authentication in 5G Networks. Mob. Networks Appl. 26(4): 1650-1667 (2021) - [j78]Giovanni Pau, Hsing-Chung Chen, Fang-Yie Leu, Ilsun You:
Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019). Sensors 21(1): 265 (2021) - [j77]Chia-Yin Ko, Fang-Yie Leu:
Examining Successful Attributes for Undergraduate Students by Applying Machine Learning Techniques. IEEE Trans. Educ. 64(1): 50-57 (2021) - 2020
- [j76]Kun-Lin Tsai, Fang-Yie Leu, Li-Ling Hung, Chia-Yin Ko:
Secure Session Key Generation Method for LoRaWAN Servers. IEEE Access 8: 54631-54640 (2020) - [j75]Li-Ling Hung, Fang-Yie Leu, Kun-Lin Tsai, Chia-Yin Ko:
Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks. IEEE Access 8: 56321-56332 (2020) - [j74]Yi-Li Huang, Fang-Yie Leu, Ruey-Kai Sheu, Jung-Chun Liu, Heru Susanto:
A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j73]Fang-Yie Leu, Heru Susanto, Kun-Lin Tsai, Chia-Yin Ko:
A channel assignment scheme for MIMO on concentric-hexagon-based multi-channel wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 35(4): 205-221 (2020) - [j72]Fang-Yie Leu, Ping-Jui Chiang, Heru Susanto, Rui-Ting Hung, Hui-Ling Huang:
Mobile Physiological Sensor Cloud System for Long-term Care. Internet Things 11: 100209 (2020) - 2019
- [j71]Kun-Lin Tsai, Fang-Yie Leu, Ilsun You, Shuo-Wen Chang, Shiung-Jie Hu, Hoonyong Park:
Low-Power AES Data Encryption Architecture for a LoRaWAN. IEEE Access 7: 146348-146357 (2019) - [j70]Fang-Yie Leu, Kun-Lin Tsai, Szu-Yin Lin:
E-ANDSF-Based Base Station Selection Scheme by Using MLP in Untrusted Environments. IEEE Trans. Ind. Informatics 15(10): 5708-5714 (2019) - 2018
- [j69]Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Yu-Ling Huang, Cheng-Han Tsai:
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments. IEEE Access 6: 45325-45334 (2018) - [j68]Fang-Yie Leu, Chia-Yin Ko, Ilsun You, Kim-Kwang Raymond Choo, Chi-Lun Ho:
A smartphone-based wearable sensors for monitoring real-time physiological data. Comput. Electr. Eng. 65: 376-392 (2018) - [j67]Jung-Chun Liu, Fang-Yie Leu, Guan-Liang Lin, Heru Susanto:
An MFCC-based text-independent speaker identification system for access control. Concurr. Comput. Pract. Exp. 30(2) (2018) - [j66]Xiu-Shu Zhang, Fang-Yie Leu, Ching-Wen Yang, Lai-Shiun Lai:
Healthcare-based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan. J. Medical Syst. 42(3): 39:1-39:13 (2018) - [j65]Vishal Sharma, Ilsun You, Fang-Yie Leu, Mohammed Atiquzzaman:
Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. J. Netw. Comput. Appl. 102: 38-57 (2018) - [j64]Ilsun You, Fang-Yie Leu:
Comments on "SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks". IEEE Syst. J. 12(1): 1038-1041 (2018) - 2017
- [j63]Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu:
Square Key Matrix Management Scheme in Wireless Sensor Networks. Comput. Informatics 36(1): 169-185 (2017) - [j62]Chao-Tung Yang, Jung-Chun Liu, Wei-Sheng Chen, Fang-Yie Leu, William Cheng-Chung Chu:
Implementation of a virtual switch monitoring system using OpenFlow on cloud. Int. J. Ad Hoc Ubiquitous Comput. 24(3): 162-172 (2017) - [j61]Jui-Hung Kao, Ta-Chien Chan, Feipei Lai, Bo-Cheng Lin, Wei-Zen Sun, Kuan-Wu Chang, Fang-Yie Leu, Jeng-Wei Lin:
Spatial analysis and data mining techniques for identifying risk factors of Out-of-Hospital Cardiac Arrest. Int. J. Inf. Manag. 37(1): 1528-1538 (2017) - [j60]Yao-Chung Fan, Huan Chen, Fang-Yie Leu, Ilsun You:
Enabling in-network aggregation by diffusion units for urban scale M2M networks. J. Netw. Comput. Appl. 93: 215-227 (2017) - [j59]Kun-Lin Tsai, Fang-Yie Leu:
Secure data-sharing using distributed environmental matching keys. Pervasive Mob. Comput. 42: 513-525 (2017) - [j58]Fang-Yie Leu, Kun-Lin Tsai, Yi-Ting Hsiao, Chao-Tung Yang:
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques. IEEE Syst. J. 11(2): 427-438 (2017) - [j57]Chia-Ping Shen, Jeng-Wei Lin, Feng-Sheng Lin, Yan-Yu Lam, Wei Chen, Weizhi Zhou, Hsiao-Ya Sung, Yi-Hui Kao, Ming-Jang Chiu, Fang-Yie Leu, Feipei Lai:
GA-SVM modeling of multiclass seizure detector in epilepsy analysis system using cloud computing. Soft Comput. 21(8): 2139-2149 (2017) - [j56]Tzu-Chiang Chiang, Pei-Yun Cheng, Fang-Yie Leu:
Prediction of technical efficiency and financial crisis of Taiwan's information and communication technology industry with decision tree and DEA. Soft Comput. 21(18): 5341-5353 (2017) - 2016
- [j55]Kun Lin Tsai, Fang-Yie Leu, Ilsun You:
Residence Energy Control System Based on Wireless Smart Socket and IoT. IEEE Access 4: 2885-2894 (2016) - [j54]Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Ilsun You:
TTP Based High-Efficient Multi-Key Exchange Protocol. IEEE Access 4: 6261-6271 (2016) - [j53]Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen:
Impacts of Task Re-Execution Policy on MapReduce Jobs. Comput. J. 59(5): 701-714 (2016) - [j52]Kun-Lin Tsai, Fang-Yie Leu, Shun-Hung Tsai:
Data Encryption Method Using Environmental Secret Key with Server Assistance. Intell. Autom. Soft Comput. 22(3): 423-430 (2016) - [j51]Kun Lin Tsai, Fang-Yie Leu, Jiu Soon Tan:
An ECC-based secure EMR transmission system with data leakage prevention scheme. Int. J. Comput. Math. 93(2): 367-383 (2016) - [j50]Heru Susanto, Mohammad Nabil Almunawar, Fang-Yie Leu, Chen Chin Kang:
Android vs iOS or Others? SMD-OS Security Issues: Generation Y Perception. Int. J. Technol. Diffusion 7(2): 1-18 (2016) - [j49]Fang-Yie Leu:
Editorial. J. Internet Serv. Inf. Secur. 6(1): 1 (2016) - [j48]Fuu-Cheng Jiang, Ilsun You, Fang-Yie Leu:
Approaching green sensor field using queue-based optimization technique. J. Netw. Comput. Appl. 66: 128-136 (2016) - [j47]Ilsun You, Marek R. Ogiela, Fang-Yie Leu:
Special issue on natural and secure computing in modern soft computing application. Soft Comput. 20(5): 1667-1669 (2016) - 2015
- [j46]Fang-Yie Leu, Yi-Li Huang, Sheng-Mao Wang:
A Secure M-Commerce System based on credit card transaction. Electron. Commer. Res. Appl. 14(5): 351-360 (2015) - [j45]Chao-Tung Yang, Wen-Chung Shih, Lung-Teng Chen, Cheng-Ta Kuo, Fuu-Cheng Jiang, Fang-Yie Leu:
Accessing medical image file with co-allocation HDFS in cloud. Future Gener. Comput. Syst. 43-44: 61-73 (2015) - [j44]Marek R. Ogiela, Fang-Yie Leu:
Innovations in security and knowledge management. Int. J. Inf. Manag. 35(3): 377-378 (2015) - [j43]Yi-Li Huang, Cheng-Ru Dai, Fang-Yie Leu, Ilsun You:
A secure data encryption method employing a sequential-logic style mechanism for a cloud system. Int. J. Web Grid Serv. 11(1): 102-124 (2015) - [j42]Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen:
PAReS: A Proactive and Adaptive Redundant System for MapReduce. J. Inf. Sci. Eng. 31(5): 1775-1793 (2015) - [j41]Fang-Yie Leu, Hsin-Liang Chen, Chih-Chung Cheng:
Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA. J. Internet Serv. Inf. Secur. 5(4): 1-19 (2015) - [j40]Fang-Yie Leu, Chin-Yu Liu, Jung-Chun Liu, Fuu-Cheng Jiang, Heru Susanto:
S-PMIPv6: An intra-LMA model for IPv6 mobility. J. Netw. Comput. Appl. 58: 180-191 (2015) - [j39]Marek R. Ogiela, Ilsun You, Fang-Yie Leu, Yu-Chee Tseng:
Secure ubiquitous computing. Pervasive Mob. Comput. 24: 1-3 (2015) - [j38]Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen:
Analyzing job completion reliability and job energy consumption for a heterogeneous MapReduce cluster under different intermediate-data replication policies. J. Supercomput. 71(5): 1657-1677 (2015) - [j37]Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen:
Impact of MapReduce Policies on Job Completion Reliability and Job Energy Consumption. IEEE Trans. Parallel Distributed Syst. 26(5): 1364-1378 (2015) - [j36]Ming-Chang Lee, Fang-Yie Leu, Ying-Ping Chen:
Pareto-based cache replacement for YouTube. World Wide Web 18(6): 1523-1540 (2015) - 2014
- [j35]Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, William Cheng-Chung Chu:
A true Random-Number Encryption Method employing block cipher and PRNG. Comput. Sci. Inf. Syst. 11(3): 905-924 (2014) - [j34]Ilsun You, Fang-Yie Leu, Leonard Barolli:
Special Issue: Mobile Internet Technologies and Services - Editorial. Comput. Syst. Sci. Eng. 29(6) (2014) - [j33]Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu, Yi-Li Huang:
Designing A Healthcare Authorization Model Based On Cloud Authentication. Intell. Autom. Soft Comput. 20(3): 365-379 (2014) - [j32]Fang-Yie Leu, Fatos Xhafa, Aniello Castiglione, Yi-Li Huang:
Editorial. Int. J. Commun. Networks Distributed Syst. 13(3/4) (2014) - [j31]Kun-Lin Tsai, Fang-Yie Leu, Tien-Han Wu, Shin-shiuan Chiou, Yu-Wei Liu, Han-Yun Liu:
A Secure ECC-based Electronic Medical Record System. J. Internet Serv. Inf. Secur. 4(1): 47-57 (2014) - [j30]Fang-Yie Leu, Yi-Ting Hsiao:
A Grid System Detecting Internal Malicious Behaviors at System Call Level. J. Internet Serv. Inf. Secur. 4(4): 14-24 (2014) - [j29]Fang-Yie Leu, A Min Tjoa:
Guest Editorial: Emerging Software Reliability and System Security Technologies. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(1): 1-3 (2014) - [j28]Fang-Yie Leu, Jung-Chun Liu, Ya-Ting Hsu, Yi-Li Huang:
The simulation of an emotional robot implemented with fuzzy logic. Soft Comput. 18(9): 1729-1743 (2014) - [j27]Yi-Li Huang, Fang-Yie Leu, Ilsun You, Yao-Kuo Sun, William Cheng-Chung Chu:
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment. J. Supercomput. 67(3): 635-652 (2014) - 2013
- [j26]Marek R. Ogiela, Ilsun You, Fang-Yie Leu, Makoto Takizawa:
Modern cognitive and ubiquitous computing. Neurocomputing 122: 1-2 (2013) - [j25]Fang-Yie Leu, Chu-Hsing Lin, Aniello Castiglione:
Special issue on cloud, wireless and e-commerce security. J. Ambient Intell. Humaniz. Comput. 4(2): 207-208 (2013) - [j24]Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen:
Analyzing job completion reliability and job energy consumption for a general MapReduce infrastructure. J. High Speed Networks 19(3): 203-214 (2013) - [j23]Marek R. Ogiela, Ilsun You, Makoto Takizawa, Fang-Yie Leu:
Special Issue on "Advances in mobile, ubiquitous and cognitive computing". Math. Comput. Model. 58(5-6): 1138-1139 (2013) - [j22]Yi-Li Huang, Fang-Yie Leu, Ko-Chung Wei:
A secure communication over wireless environments by using a data connection core. Math. Comput. Model. 58(5-6): 1459-1474 (2013) - [j21]Fuu-Cheng Jiang, Hsiang-Wei Wu, Fang-Yie Leu, Chao-Tung Yang:
Toward green sensor field by optimizing power efficiency using D-policy M/G/1 queuing systems. Mob. Inf. Syst. 9(3): 241-260 (2013) - 2012
- [j20]Fang-Yie Leu, Keng-Yen Chao, Ming-Chang Lee, Jia-Chun Lin:
A Semi-Preemptive Computational Service System with Limited Resources and Dynamic Resource Ranking. Algorithms 5(1): 113-147 (2012) - [j19]Fang-Yie Leu, Fuu-Cheng Jiang, Chih-Cheng Lien, Sen-Tarng Lai, Shiuan-You Chiou:
A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates. Comput. Syst. Sci. Eng. 27(5) (2012) - [j18]Ming-Chang Lee, Fang-Yie Leu, Ying-Ping Chen:
PFRF: An adaptive data replication algorithm based on star-topology data grids. Future Gener. Comput. Syst. 28(7): 1045-1057 (2012) - [j17]Fuu-Cheng Jiang, Der-Chen Huang, Chao-Tung Yang, Fang-Yie Leu:
Lifetime elongation for wireless sensor network using queue-based approaches. J. Supercomput. 59(3): 1312-1335 (2012) - 2011
- [j16]Fang-Yie Leu, Fenq-Lin Jenq, Fuu-Cheng Jiang:
A path switching scheme for SCTP based on round trip delays. Comput. Math. Appl. 62(9): 3504-3523 (2011) - [j15]Chao-Tung Yang, Fang-Yie Leu, Sung-Yi Chen:
Resource brokering using a multi-site resource allocation strategy for computational grids. Concurr. Comput. Pract. Exp. 23(6): 573-594 (2011) - [j14]Fang-Yie Leu, Ilsun You, Yao-Tian Huang:
A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks. J. Netw. Comput. Appl. 34(2): 632-643 (2011) - [j13]Fang-Yie Leu:
Emerging Security Technologies and Applications. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(3): 1-3 (2011) - [j12]Yi-Li Huang, Fang-Yie Leu:
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(3): 96-107 (2011) - [j11]Yi-Li Huang, Fang-Yie Leu, Chao-Hong Chiu, I-Long Lin:
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. J. Univers. Comput. Sci. 17(6): 891-911 (2011) - [j10]Fang-Yie Leu, Ilsun You, Feilong Tang:
Emerging Wireless and Mobile Technologies. Mob. Inf. Syst. 7(3): 165-167 (2011) - [j9]Yi-Fu Ciou, Fang-Yie Leu, Yi-Li Huang, Kangbin Yim:
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks. Mob. Inf. Syst. 7(3): 241-269 (2011) - 2010
- [j8]Fang-Yie Leu, Chao-Tung Yang, Fuu-Cheng Jiang:
Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies. Future Gener. Comput. Syst. 26(4): 554-568 (2010) - [j7]Fang-Yie Leu, Lun-Ni Yang, Neng-Wen Lo, I-Long Lin:
Predicting vertebrate promoters using heterogeneous clusters. Int. J. Ad Hoc Ubiquitous Comput. 6(4): 216-234 (2010) - [j6]Fang-Yie Leu, Chih-Chieh Ko:
An Automated Term Definition Extraction System Using the Web Corpus in the Chinese Language. J. Inf. Sci. Eng. 26(2): 505-525 (2010) - [j5]Chao-Tung Yang, Fang-Yie Leu, Sung-Yi Chen:
Network Bandwidth-aware job scheduling with dynamic information model for Grid resource brokers. J. Supercomput. 52(3): 199-223 (2010) - 2009
- [j4]Fang-Yie Leu:
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications. J. Netw. Comput. Appl. 32(5): 1073-1091 (2009) - 2008
- [j3]Fang-Yie Leu, Ming-Chang Li, Jia-Chun Lin, Chao-Tung Yang:
Detection workload in a dynamic grid-based intrusion detection environment. J. Parallel Distributed Comput. 68(4): 427-442 (2008) - 2007
- [j2]Fang-Yie Leu, Guo-Cai Li:
A scalable sensor network using a polar coordinate system. Signal Process. 87(12): 2978-2990 (2007) - 1995
- [j1]Fang-Yie Leu, Shi-Kuo Chang, Chien-Chiao Yang:
A Validation Assistant for A Distributed Office Information System Modeled by Office Procedure Model. J. Inf. Sci. Eng. 11(2): 183-206 (1995)
Conference and Workshop Papers
- 2024
- [c184]Sen-Tarng Lai, Fang-Yie Leu:
Applying ChatGPT-Based Iterative Improvement Model for Improving Software Maintenance Efficiency. IMIS 2024: 348-358 - [c183]Chen-Hua Huang, Chuan-Hsin Wang, Yao-Chung Fan, Fang-Yie Leu:
Legal Case Retrieval by Essential Element Extraction Based on Reading Comprehension Model. IMIS 2024: 359-368 - [c182]Li-Wen Peng, Fang-Yie Leu, Heru Susanto:
Implementation of Switch Slicing in 5G/B5G/6G Networks. IMIS 2024: 369-378 - [c181]Yu-Han Chen, Fang-Yie Leu, Heru Susanto:
Base-Station Resource Allocation Based on Frame/Sub-Frame. IMIS 2024: 379-385 - 2023
- [c180]Sen-Tarng Lai, Fang-Yie Leu:
Applying High-Quality Test Case Management Mechanisms to Improve Regression Testing Speed and Quality. BWCCA 2023: 218-227 - [c179]Jeng-Wei Lin, Yi-Ting Lin, Fang-Yie Leu:
Case Study in Generating RFC Maps of IETF Standards. BWCCA 2023: 228-237 - [c178]Lung-Pin Chen, Fang-Yie Leu, Junrui Pan, Chia-Chen Kuo, Ming-Jen Wang:
Enhancing Resource Allocation for Cloud Computation Platform with Priority Based Scheduling. BWCCA 2023: 238-243 - [c177]Yu-Han Chen, Chao-Hsiang Hsu, Heru Susanto, Fang-Yie Leu:
5G Network Base Station Timeline Scheduling. BWCCA 2023: 244-252 - [c176]Tsung-Yu Su, Fang-Yie Leu:
The Design and Implementation of a Weapon Detection System Based on the YOLOv5 Object Detection Algorithm. IMIS 2023: 283-293 - [c175]Zhi-Wei Tong, Yao-Chung Fan, Fang-Yie Leu:
DR.QG: Enhancing Closed-Domain Question Answering via Retrieving Documents for Question Generation. IMIS 2023: 294-305 - [c174]Chia-Wen Chang, Fang-Yie Leu:
QoS-Oriented Uplink OFDMA Random Access Scheme for IEEE 802.11be. IMIS 2023: 306-315 - [c173]Sen-Tarng Lai, Fang-Yie Leu:
Regression Testing Measurement Model to Improve CI/CD Process Quality and Speed. IMIS 2023: 316-326 - 2022
- [c172]Sen-Tarng Lai, Fang-Yie Leu:
Applying CI/CD Process to Improve the Speed and Critical Quality of Perfective Maintenance. BWCCA 2022: 259-269 - [c171]Shih-Wei Guo, Tzu-Chi Chen, Hui-Juan Wang, Fang-Yie Leu, Yao-Chung Fan:
Generating Personalized Phishing Emails for Social Engineering Training Based on Neural Language Models. BWCCA 2022: 270-281 - [c170]Jung-Bin Li, Szu-Yin Lin, Fang-Yie Leu, Yen-Chu Chu:
Stock Price Trend Prediction Using LSTM and Sentiment Analysis on News Headlines. BWCCA 2022: 282-291 - [c169]Lung-Pin Chen, Fang-Yie Leu, Chia-Chen Kuo, Tzu-Ching Lin, Ming-Jen Wang:
Efficient Weighted and Balanced Resource Allocation for High-Performance Render Farms. BWCCA 2022: 292-300 - [c168]Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu:
Detection and Defense of DDoS Attack and Flash Events by Using Shannon Entropy. IMIS 2022: 307-314 - [c167]Yi-Cheng Jian, Meng-Shao Chung, Heru Susanto, Fang-Yie Leu:
5G Base Station Scheduling. IMIS 2022: 315-324 - [c166]Yu-Syuan Lu, Heru Susanto, Fang-Yie Leu:
Asymmetric Cryptography Among Different 5G Core Networks. IMIS 2022: 325-333 - [c165]Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu:
Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense. MobiSec 2022: 243-253 - [c164]Fang-Yie Leu, Chi-Jan Huang, Cheng-Jan Chi, Wei-Tzu Hung:
Hybrid AI-Based iBeacon Indoor Positioning Cybersecurity Attacks and Defenses Thereof. SGIoT 2022: 65-71 - 2021
- [c163]Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu:
Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure. BWCCA 2021: 197-205 - [c162]Pei-Hua Yu, Heru Susanto, Li-Xuan Liu, Shang-Jie Wu, Fang-Yie Leu:
The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks. BWCCA 2021: 206-215 - [c161]Pei-Xuan Cai, Yao-Chung Fan, Fang-Yie Leu:
Compare Encoder-Decoder, Encoder-Only, and Decoder-Only Architectures for Text Generation on Low-Resource Datasets. BWCCA 2021: 216-225 - [c160]Lung-Bin Chen, Fang-Yie Leu:
Efficient Execution of Malleable Applications in Desktop Grids Using Credit Damping. BWCCA 2021: 226-233 - [c159]Ting-Wei Yeh, Fang-Yie Leu:
Using Object Detection Technology to Measure the Accuracy of the TFT-LCD Printing Process by Using Deep Learning. EIDWT 2021: 358-369 - [c158]Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu:
Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance. IMIS 2021: 362-372 - [c157]Lung-Pin Chen, Fang-Yie Leu, Hsin-Ta Chiao, Hung-Jr Shiu:
Efficient Adaptive Resource Management for Spot Workers in Cloud Computing Environment. IMIS 2021: 373-382 - [c156]Li-Gang Jiang, Yi-Hong Chan, Yao-Chung Fan, Fang-Yie Leu:
You Draft We Complete: A BERT-Based Article Generation by Keyword Supplement. IMIS 2021: 383-392 - [c155]Zhi-Qian Hong, Heru Susanto, Fang-Yie Leu:
A Q-Learning Based Downlink Scheduling Algorithm for Multiple Traffics in 5G NR Systems. IMIS 2021: 393-402 - [c154]Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, Chuan-Tian Wu:
Secure LoRaWAN Root Key Update Scheme for IoT Environment. MobiSec 2021: 3-15 - 2020
- [c153]Yi-Hsun Lu, Fang-Yie Leu:
Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN Networks. AINA 2020: 1-11 - [c152]Kun-Lin Tsai, Fang-Yie Leu, Tz-Yuan Huang, Hao-En Yang:
IoT Device Power Management Based on PSM and EDRX Mechanisms. BWCCA 2020: 244-253 - [c151]Sen-Tarng Lai, Fang-Yie Leu:
Combining Agile with Traditional Software Development for Improvement Maintenance Efficiency and Quality. BWCCA 2020: 254-264 - [c150]Siang Yun Yoong, Yao-Chung Fan, Fang-Yie Leu:
On Text Tiling for Documents: A Neural-Network Approach. BWCCA 2020: 265-274 - [c149]Li-Ling Hung, Fang-Yie Leu:
A High Sensing Accuracy Mechanism for Wireless Sensor Networks. BWCCA 2020: 275-283 - [c148]Bing-Hong Tsai, Yao-Chung Fan, Fang-Yie Leu:
Extractive Summarization by Rouge Score Regression Based on BERT. CISIS 2020: 156-165 - [c147]Wei-Sheng Chen, Fang-Yie Leu:
The Study on AUSF Fault Tolerance. EIDWT 2020: 406-415 - [c146]Szu-Yin Lin, Fang-Yie Leu, Chia-Yin Ko, Ming-Chien Shih, Wei-Jia Tang:
A Hybrid Information-Based Smartphone Indoor-Position Approach. IMIS 2020: 56-64 - [c145]Shih-Ting Chiu, Fang-Yie Leu:
Detecting DoS and DDoS Attacks by Using CuSum Algorithm in 5G Networks. NBiS 2020: 1-9 - [c144]Hung-Jr Shiu, Fang-Yie Leu, Chun-Ming Lai, Yu-Chun Huang:
Novel Reversible Acoustic Steganography Based on Carrier Orthogonality. WISA 2020: 112-123 - 2019
- [c143]Heru Susanto, Fang-Yie Leu, Didi Rosiyadi, Chen Chin Kang:
Revealing Storage and Speed Transmission Emerging Technology of Big Data. AINA 2019: 571-583 - [c142]Wei-Sheng Chen, Fang-Yie Leu, Heru Susanto:
System Implementation of AUSF Fault Tolerance. BWCCA 2019: 678-687 - [c141]Zhi-Qian Hong, Fang-Yie Leu, Heru Susanto:
News Collection and Analysis on Public Political Opinions. BWCCA 2019: 688-697 - [c140]Ping-Jui Chiang, Heru Susanto, Fang-Yie Leu, Hui-Ling Huang:
Mobile Physiological Sensor Cloud System for Long-Term Care. BWCCA 2019: 698-707 - [c139]Fang-Yie Leu:
Keynote: Air pollution source identification by using Neural Network with Bayesian Optimization. IC3INA 2019: 82 - [c138]Kun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang, Jiun-Yi Lin, Huei-Tang Luo:
A LoRaWAN Based Energy Efficient Data Encryption Method. IMIS 2019: 493-502 - [c137]Sheng-Zheng Lin, Fang-Yie Leu:
Firewall Services Provided by Edge Computers Under AMF and gNB in 5G. IMIS 2019: 503-513 - [c136]Fang-Yie Leu, Jia-Sheng Ho:
Air Pollution Source Identification by Using Neural Network with Bayesian Optimization. IMIS 2019: 514-524 - [c135]Mei-Yu Wu, Fang-Yie Leu:
MIH and CRRM Handover in Trusted or Untrusted Environments. IMIS 2019: 525-536 - [c134]Jeng-Wei Lin, Shih-wei Liao, Fang-Yie Leu:
A Novel Bounded-Error Piecewise Linear Approximation Algorithm for Streaming Sensor Data in Edge Computing. INCoS 2019: 123-132 - [c133]Kun-Lin Tsai, Fang-Yie Leu, Li-Chun Yang, Chi Li, Jhih-Yan Liu:
LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server. MobiSec 2019: 23-33 - [c132]Che-Hsuan Yu, Hung-Yuan Chen, Fang-Yie Leu, Yao-Chung Fan:
Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNs. WiCON 2019: 51-61 - 2018
- [c131]Chia-Yin Ko, Fang-Yie Leu:
Analyzing Attributes of Successful Learners by Using Machine Learning in an Undergraduate Computer Course. AINA 2018: 801-806 - [c130]Sen-Tarng Lai, Fang-Yie Leu, Jeng-Wei Lin:
A Banking Chatbot Security Control Procedure for Protecting User Data Security and Privacy. BWCCA 2018: 561-571 - [c129]Fang-Yie Leu, Heru Susanto, Ping-Hung Chou, Jeng-Wei Lin:
Migration of Edge Computing Services in 5G Networks - Firewall as a Service Example. BWCCA 2018: 578-585 - [c128]Heru Susanto, Fang-Yie Leu, Chen Chin Kang:
High Performance Grid Computing: Challenges and Opportunities of High Speed Networking. BWCCA 2018: 597-610 - [c127]Kun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang:
Self-parameter Based Bilateral Session Key Exchange Method. BWCCA 2018: 611-620 - [c126]Vorakit Vorakitphan, Fang-Yie Leu, Yao-Chung Fan:
Clickbait Detection Based on Word Embedding Models. IMIS 2018: 557-564 - [c125]Sen-Tarng Lai, Fang-Yie Leu:
A Micro Services Quality Measurement Model for Improving the Efficiency and Quality of DevOps. IMIS 2018: 565-575 - [c124]Fang-Yie Leu, Ping-Hung Chou:
A Study on Firewall Services with Edge Computers of vEPC in 5G Networks. IMIS 2018: 576-584 - [c123]Fang-Yie Leu, Cheng-Yan Gu:
The Study of MME Pool Management and Fault Tolerance in 5G Networks with SDN Controllers. IMIS 2018: 585-595 - [c122]Fang-Yie Leu, Kun-Lin Tsai, Rui-Ting Hung:
MIH-Based eNB Selection for Untrusted Networks. WICON 2018: 129-140 - 2017
- [c121]Fang-Yie Leu, Guan-Liang Lin:
An MFCC-Based Speaker Identification System. AINA 2017: 1055-1062 - [c120]Sen-Tarng Lai, Fang-Yie Leu:
A Critical Quality Measurement Model for Managing and Controlling Big Data Project Risks. BWCCA 2017: 777-787 - [c119]Kun-Lin Tsai, Fang-Yie Leu, Tung-Hung Su, Yi-Chen Chang:
A Light Weight Data Encryption Method for WSN Communication. BWCCA 2017: 788-795 - [c118]Chien-Hsiang Kao, Fang-Yie Leu:
Predicting Video Stream Fragments in a Reactive Mode. BWCCA 2017: 796-802 - [c117]Zong-Ying Yang, Fang-Yie Leu:
Relay Base-Station Handover in a 5G Environment. BWCCA 2017: 803-810 - [c116]Hsing-Chung Chen, Chia-Hui Chang, Fang-Yie Leu:
Implement of agent with role-based hierarchy access control for secure grouping IoTs. CCNC 2017: 1-6 - [c115]Yi-Li Huang, Fang-Yie Leu, Ilsun You, Rong-Yi Su, Po-Hao Su, Hsing-Chung Chen:
A 3D encryption with shifting mapping substitution mechanism. CCNC 2017: 1-6 - [c114]Hsing-Chung Chen, Chia-Hui Chang, Fang-Yie Leu:
Implement of agent with role-based hierarchy access control for secure grouping IoTs. CCNC 2017: 120-125 - [c113]Xiu-Shu Zhang, Fang-Yie Leu, Ching-Wen Yang:
Healthcare Based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan. IMIS 2017: 473-482 - [c112]Sen-Tarng Lai, Fang-Yie Leu:
An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project. IMIS 2017: 483-492 - [c111]Chien-Hsiang Kao, Fang-Yie Leu:
Prediction of the Fragment of Video Streamed to Mobile Phones Under a 5G Network Base Station. IMIS 2017: 493-501 - [c110]Fang-Yie Leu, Chih-Chung Cheng:
MIH-Based Congestion Control with Seamless Handover in Untrusted Networks. IMIS 2017: 502-510 - [c109]Fang-Yie Leu, Po-Yu Tsai, Ilsun You, Hsing-Chung Chen:
IP-based seamless handover scheme using ANDSF in an untrusted environment. INFOCOM Workshops 2017: 595-600 - [c108]Vishal Sharma, Jiyoon Kim, Soonhyun Kwon, Ilsun You, Fang-Yie Leu:
An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework. IoTaaS 2017: 64-72 - [c107]Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu, Xing-You Pan, Li-Ren Chen:
Generating Dynamic Box by Using an Input String. MobiSec 2017: 17-29 - 2016
- [c106]Chia-Yin Ko, Fang-Yie Leu:
Applying Data Mining to Explore Students' Self-Regulation in Learning Contexts. AINA 2016: 74-78 - [c105]Kun-Lin Tsai, Fang-Yie Leu, King-Shing Yip:
Device Parameter based Secure User Authentication. BWCCA 2016: 721-730 - [c104]Sen-Tarng Lai, Fang-Yie Leu:
Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality. BWCCA 2016: 731-738 - [c103]Cheng-Ying Hsu, Shang-En Yang, Hung-Yuan Chen, Fang-Yie Leu, Yao-Chung Fan:
Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users' Privacy Concerns. BWCCA 2016: 739-746 - [c102]Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu:
Enhancing Security of LTE using a Double Masking Technique. BWCCA 2016: 747-754 - [c101]WooSeok Hyun, Ilsun You, JoungSoon Jang, Fang-Yie Leu:
A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone. IMIS 2016: 415-418 - [c100]Fang-Yie Leu, Yi-Ting Hsiao:
Finite State Machine Based Real Time Scheduling for Microchip. IMIS 2016: 458-463 - [c99]Sen-Tarng Lai, Fang-Yie Leu:
A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and Quality. IMIS 2016: 464-469 - [c98]Yi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu:
A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix. IMIS 2016: 470-475 - [c97]Kun-Lin Tsai, Fang-Yie Leu, Yi-Fung Huang, Chi Yang, Cheng-Hsin Chang, King-Shing Yip, Yuchen Xue, Guan-Chi Lai:
Cloud Encryption Using Distributed Environmental Keys. IMIS 2016: 476-481 - [c96]Xia-Yun Guo, Chin-Ling Chen, Chang-Qing Gong, Fang-Yie Leu:
A Secure Official Vehicle Communication Protocol for VANET. IMIS 2016: 482-485 - [c95]Yi-Li Huang, Fang-Yie Leu, Ilsun You, Hsing-Chung Chen, Chishyan Liaw, Jung-Chun Liu:
Random Cladding with Feedback Mechanism for encrypting mobile messages. INFOCOM Workshops 2016: 970-975 - [c94]Hsing-Chung Chen, Heri Wijayanto, Chia-Hui Chang, Fang-Yie Leu, Kangbin Yim:
Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem. INFOCOM Workshops 2016: 980-984 - 2015
- [c93]Chao-Tung Yang, Wei-Hsiang Lien, Yu-Chuan Shen, Fang-Yie Leu:
Implementation of a Software-Defined Storage Service with Heterogeneous Storage Technologies. AINA Workshops 2015: 102-107 - [c92]Chin-Yu Liu, Fang-Yie Leu, Jung-Chun Liu, Aniello Castiglione, Francesco Palmieri:
Heterogeneous Network Handover Using 3GPP ANDSF. AINA 2015: 171-175 - [c91]Fang-Yie Leu, Sheng-Chieh Chuang:
Cluster-RLM: Establishing a Routing Path with Cluster-Based Redundant Link Minimization in Wireless Sensor Networks. BWCCA 2015: 380-385 - [c90]Sen-Tarng Lai, Fang-Yie Leu:
Applying Continuous Integration for Reducing Web Applications Development Risks. BWCCA 2015: 386-391 - [c89]Kun Lin Tsai, Mengyuan Ye, Fang-Yie Leu:
Secure Power Management Scheme for WSN. MIST@CCS 2015: 63-66 - [c88]Chien-Chih Chen, Chao-Tung Yang, Shuo-Tsung Chen, Fang-Yie Leu, Jung-Chun Liu:
Construction of a Green Power Virtual Machine Management Method on OpenStack. COMPSAC Workshops 2015: 627-630 - [c87]Ming-Chang Lee, Fang-Yie Leu, Ying-Ping Chen:
ReMBF: A Reliable Multicast Brute-Force Co-allocation Scheme for Multi-user Data Grids. COMPSAC 2015: 774-783 - [c86]Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu, Fang-Yie Leu:
An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi. IMIS 2015: 403-407 - [c85]Yu-Jen Chang, Fang-Yie Leu, Shih-Chieh Chen, Hei-Lam Wong:
Applying Web Crawlers to Develop a Sale Management System for Online Malls. IMIS 2015: 408-413 - [c84]Sen-Tarng Lai, Fang-Yie Leu:
A Security Threats Measurement Model for Reducing Cloud Computing Security Risk. IMIS 2015: 414-419 - [c83]Tien-Sheng Lin, I. Long Lin, Fang-Yie Leu:
Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security. IMIS 2015: 420-425 - [c82]Chin-Yu Liu, Fang-Yie Leu, Ilsun You, Aniello Castiglione, Francesco Palmieri:
The untrusted handover security of the S-PMIPv6 on LTE-A. INFOCOM Workshops 2015: 161-166 - [c81]Chi-Lun Ho, Fang-Yie Leu:
A Wireless Physiological Sensor Area Network. NBiS 2015: 14-19 - 2014
- [c80]Yi-Li Huang, Fang-Yie Leu, Ilsun You, Jing-Hao Yang:
Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters. CD-ARES 2014: 166-171 - [c79]Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen, Waqaas Munawar:
Impact of MapReduce Task Re-execution Policy on Job Completion Reliability and Job Completion Time. AINA 2014: 712-718 - [c78]Ming-Chang Lee, Fang-Yie Leu, Ying-Ping Chen:
Cache Replacement Algorithms for YouTube. AINA 2014: 743-750 - [c77]Chin-Yu Liu, Fang-Yie Leu, Jung-Chun Liu:
S-PMIPv6: Efficient Handover of Proxy Mobile IPv6 by Using SCTP. BWCCA 2014: 287-291 - [c76]Sen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu:
Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements. BWCCA 2014: 292-299 - [c75]Fang-Yie Leu, Hsin-Liang Chen, Jung-Chun Liu:
Improving Multi-path Congestion Control for Event-Driven Wireless Sensor Networks by Using TDMA. BWCCA 2014: 300-305 - [c74]Chia-Yin Ko, Fang-Yie Leu, I-Tsen Lin:
A Wandering Path Tracking and Fall Detection System for People with Dementia. BWCCA 2014: 306-311 - [c73]Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Ilsun You, Kangbin Yim, Jian-Hong Chen, William Cheng-Chung Chu:
A random wrapping encryption method. CCNC 2014: 151-156 - [c72]Fang-Yie Leu, Yi-Ting Hsiao, Kangbin Yim, Ilsun You:
A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid. ICT-EurAsia 2014: 375-385 - [c71]Kun Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Jiu Soon Tan, Mengyuan Ye:
High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication. IMIS 2014: 487-492 - [c70]Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu:
A Secure Authentication Scheme of Health Care Based on the Cloud. IMIS 2014: 499-504 - [c69]Sen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu:
A Multi-layer Secure Prevention Scheme for Improving e-Commerce Security. IMIS 2014: 505-510 - [c68]I-Long Lin, Yun-Sheng Yen, Fang-Yie Leu:
Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP. IMIS 2014: 511-516 - [c67]Lung-Pin Chen, Chih-Wei Hsieh, Fang-Yie Leu:
Minimum Cost Content Object Reconstruction in Multi-tier Servers. IMIS 2014: 523-528 - [c66]Ming-Chang Lee, Fang-Yie Leu, Ying-Ping Chen:
Developing a Performance-Analysis Model for a Star-Topology Data Grid from Multi-user Perspective. INCoS 2014: 242-248 - [c65]Yi-Li Huang, Sheng-Mao Wang, Fang-Yie Leu, Jung-Chun Liu, Chia-Yin Ko:
A Secure Mobile Shopping System Based on Credit Card Transaction. INCoS 2014: 336-341 - [c64]Yi-Li Huang, Shih-Han Chen, Fang-Yie Leu, Chia-Yin Ko, Jung-Chun Liu:
A Secure Traffic Control System with Emergency Handling for Ambulances. INCoS 2014: 356-361 - [c63]Chao-Tung Yang, Jung-Chun Liu, Yun-Ting Wang, Chia-Cheng Wu, Fang-Yie Leu:
An Environmental Monitoring System for Air Quality Control. ICS 2014: 1386-1395 - [c62]Kun Lin Tsai, Jiu Soon Tan, Fang-Yie Leu, Yi-Li Huang:
A Group File Encryption Method using Dynamic System Environment Key. NBiS 2014: 476-483 - [c61]Chao-Tung Yang, Jung-Chun Liu, Yun-Ting Wang, Chia-Cheng Wu, Fang-Yie Leu:
Implementation of an environmental quality and harmful gases monitoring system. SMARTCOMP 2014: 81-86 - 2013
- [c60]Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo De Santis:
Analyzing the Internet Stability in Presence of Disasters. CD-ARES Workshops 2013: 253-268 - [c59]Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu:
A Multiple-Key Management Scheme in Wireless Sensor Networks. CD-ARES Workshops 2013: 337-344 - [c58]Jia-Chun Lin, Fang-Yie Leu, Ming-Chang Lee, Ying-Ping Chen:
Deriving Job Completion Reliability and Job Energy Consumption for a General MapReduce Infrastructure from Single-Job Perspective. AINA Workshops 2013: 1642-1647 - [c57]Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Lih-Jiun Lo, William Cheng-Chung Chu:
A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core. BWCCA 2013: 360-365 - [c56]Sen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu:
A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security. BWCCA 2013: 366-371 - [c55]Sueming Hsu, Yalan Chan, Kai-I Huang, Fang-Yie Leu:
An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan's Senior Care Market: A Case Study of Fitness Equipment Industry. BWCCA 2013: 378-381 - [c54]Ya-Ting Hsu, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, William Cheng-Chung Chu:
The Simulation of a Robot with Emotions Implemented with Fuzzy Logic. BWCCA 2013: 382-386 - [c53]Yu-Shin Huang, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, William Cheng-Chung Chu:
A Handover Scheme for LTE Wireless Networks under the Assistance of GPS. BWCCA 2013: 399-403 - [c52]Chin-Ling Chen, Wei-Chen Tsai, Fang-Yie Leu:
Improve Two Remote User Authentication Scheme Using Smart Card. BWCCA 2013: 404-407 - [c51]Chao-Tung Yang, Kuan-Lung Huang, William Cheng-Chung Chu, Fang-Yie Leu, Shao-Feng Wang:
Implementation of Cloud IaaS for Virtualization with Live Migration. GPC 2013: 199-207 - [c50]Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang:
A Block Cipher Mode of Operation with Two Keys. ICT-EurAsia 2013: 392-398 - [c49]Chao-Tung Yang, Wei-Sheng Chen, Yi-Wei Su, Yao-Yu Yang, Jung-Chun Liu, Fang-Yie Leu, William C. Chu:
Implementation of a Virtual Switch Monitor System Using OpenFlow on Cloud. IMIS 2013: 283-290 - [c48]Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, William Cheng-Chung Chu, Chao-Tung Yang:
A True Random-Number Encryption Method. IMIS 2013: 654-659 - [c47]Ming-Chang Lee, Fang-Yie Leu, Ying-Ping Chen:
TSR: Topology Reduction from Tree to Star Data Grids. IMIS 2013: 678-683 - [c46]Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang, Chih-Wei Yu, Cheng-Chung Chu, Chao-Tung Yang:
Building a block cipher mode of operation with feedback keys. ISIE 2013: 1-4 - [c45]Yi-Li Huang, Fang-Yie Leu, Yao-Kuo Sun, William Cheng-Chung Chu, Chao-Tung Yang:
A secure wireless communication system by integrating RSA and Diffie-Hellman PKDS in 4G environments and an intelligent protection-key chain with a data connection core. ISIE 2013: 1-6 - [c44]Chao-Tung Yang, Jung-Chun Liu, Chi-Jui Liao, Chia-Cheng Wu, Fang-Yie Leu:
On Construction of an Intelligent Environmental Monitoring System for Healthcare. PDCAT 2013: 246-253 - 2012
- [c43]Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai:
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation. CD-ARES 2012: 578-592 - [c42]Fang-Yie Leu, Yi-Li Huang, Chien-Nan Chen:
The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link. BWCCA 2012: 452-457 - [c41]Fang-Yie Leu, Miao-Heng Chen, Yi-Li Huang, Chung-Chi Lin:
Controlling Traffic Lights for Ambulances. BWCCA 2012: 462-467 - [c40]Fang-Yie Leu, Ilsun You, Yi-Li Huang, Kangbin Yim, Cheng-Ru Dai:
Improving security level of LTE authentication and key agreement procedure. GLOBECOM Workshops 2012: 1032-1036 - [c39]Ko-Chung Wei, Yi-Li Huang, Fang-Yie Leu:
A Secure Communication over Wireless Environments by Using a Data Connection Core. IMIS 2012: 570-575 - 2011
- [c38]Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang:
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks. ARES 2011: 255-270 - [c37]Fang-Yie Leu, Ming-Chang Lee, Jia-Chun Lin:
Improving Data Grids Performance by Using Popular File Replicate First Algorithm. BWCCA 2011: 416-421 - [c36]Yi-Li Huang, Chu-Hsing Lin, Fang-Yie Leu:
Verification of a Batch of Bad Signatures by Using the Matrix-Detection Algorithm. CCP 2011: 299-306 - [c35]Chin-Ling Chen, Yu-Fan Lin, Fang-Yie Leu:
An Improvement of Chen Et al.'s Scheme for Mobile Pay-TV. IMIS 2011: 555-560 - [c34]Fang-Yie Leu, Kuo-Chi Liang:
A Location-Based Handoff Scheme Based on IEEE 802.21 in Heterogeneous Wireless Networks. IMIS 2011: 571-576 - [c33]Fang-Yie Leu, Keng-Yen Chao:
A Semi-preemptive Ad Hoc Computational Service System with Limited Resources. IMIS 2011: 577-582 - [c32]Fenq-Lin Jenq, Tang-Jen Liu, Fang-Yie Leu:
An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication. IMIS 2011: 589-593 - 2010
- [c31]Yi-Fung Huang, Fang-Yie Leu, Chao-Hong Chiu:
Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM Environment. BWCCA 2010: 441-446 - [c30]Yi-Fung Huang, Fang-Yie Leu, Ko-Chung Wei:
Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering. CISIS 2010: 384-390 - [c29]Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu:
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. CISIS 2010: 391-397 - [c28]Fang-Yie Leu, Pei-Shiun Liu:
A Channel Assignment and AP Deployment Scheme for Concentric-Hexagon Based Multi-channel Wireless Networks. NBiS 2010: 504-509 - [c27]Fang-Yie Leu, Hung-Wei Huang:
An Event-Driven Mobile Assistant Control Protocol for Wireless Sensor Networks. NBiS 2010: 521-526 - 2009
- [c26]Fang-Yie Leu, Yong-Lon Chen:
A Path Switching Scheme for SCTP Based on Round Trip Delay. CSA 2009: 1-6 - [c25]Fang-Yie Leu, Zhi-Yang Li:
Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System. IAS 2009: 251-254 - [c24]Fang-Yie Leu, Chia-Chi Pai:
Detecting DoS and DDoS Attacks Using Chi-Square. IAS 2009: 255-258 - [c23]Fang-Yie Leu, Yao-Tian Huang, Pei-Xun Leu:
A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless Networks. CSE (2) 2009: 440-445 - [c22]Fang-Yie Leu, Wen-Chin Wu, Hung-Wei Huang:
A Routing Scheme with Localized Movement in Event-Driven Wireless Sensor Networks. APWeb/WAIM 2009: 576-583 - 2008
- [c21]Chao-Tung Yang, Fang-Yie Leu, Wen-Jen Hu:
A Network Bandwidth-Aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers. APSCC 2008: 775-780 - [c20]Fang-Yie Leu, Guo-Cai Li, Wen-Chin Wu:
An Autonomous Energy-Aware Routing Scheme: a Supplementary Routing Approach for Path-Preserving Wireless Sensor Networks. Med-Hoc-Net 2008: 49-60 - [c19]Fang-Yie Leu, Zhen-Jia Ko:
A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia Applications. MUE 2008: 564-569 - [c18]Fang-Yie Leu, Yu-Ting Huang:
Maximum capacity in chain-topology wireless mesh networks. WTS 2008: 250-259 - 2007
- [c17]Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, Jia-Chun Lin:
An Enhanced DGIDE Platform for Intrusion Detection. ATC 2007: 559-568 - [c16]Fang-Yie Leu, Kai-Wei Hu, Fuu-Cheng Jiang:
Intrusion Detection and Identification System Using Data Mining and Forensic Techniques. IWSEC 2007: 137-152 - [c15]Fang-Yie Leu, Yu-Hsin Chen, Ching-Chien Kuan:
An Improved Bandwidth-Use Method on IEEE 802.11e Standard over Wireless LAN. NPC 2007: 183-192 - 2006
- [c14]Fang-Yie Leu, Tai-Shiang Wang:
A Wireless Grid Service Platform Using SIP and Agents. SNPD 2006: 139-144 - 2005
- [c13]Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Po-Chi Shih:
Integrating Grid with Intrusion Detection. AINA 2005: 304-309 - [c12]Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang:
A Performance-Based Grid Intrusion Detection System. COMPSAC (1) 2005: 525-530 - [c11]Fang-Yie Leu, Wei-Jie Yang:
Intrusion Detection with CUSUM for TCP-Based DDoS. EUC Workshops 2005: 1255-1264 - [c10]Fang-Yie Leu, Shi-Jie Yan, Wen-Kui Chang:
Fuzzy-Based Dynamic Bandwidth Allocation System. FSKD (2) 2005: 911-920 - [c9]Fang-Yie Leu, Hsiao-Hong Tsai, Wen-Kui Chang:
Distributed Sendbox Scheme for Mobile Agent Communication. ICMB 2005: 545-550 - [c8]Fang-Yie Leu, Wei-Jie Yang, Wen-Kui Chang:
IFTS: Intrusion Forecast and Traceback based on Union Defense Environment. ICPADS (1) 2005: 716-722 - [c7]Hsiao-Hong Tsai, Fang-Yie Leu, Wen-Kui Chang:
Mobile Agent Communication Using SIP. SAINT 2005: 274-279 - [c6]Fang-Yie Leu, Neng-Wen Lo, Lun-Ni Yang:
Predicting vertebrate promoters with heterogeneous cluster computing. SITIS 2005: 143-148 - [c5]Fang-Yie Leu, Ching-Chien Kuan, Der-Jiunn Deng, Yu-Hsin Chen:
Garanteed non dropping mechanism deploying IEEE802.11e standard. SITIS 2005: 170-175 - 2004
- [c4]Fang-Yie Leu, Yao-Chung Fan:
Compressing an Inverted File with LCS. COMPSAC Workshops 2004: 60-61 - [c3]Fang-Yie Leu, Yao-Chung Fan:
Compressing a Directed Massive Graph using Small World Model. Data Compression Conference 2004: 550 - 1990
- [c2]Fang-Yie Leu, Chien-Chiao Yang:
Rule base inspection using algorithmic approach for data-access oriented knowledge-based systems. COMPSAC 1990: 155-160 - [c1]Fang-Yie Leu, Chien-Chiao Yang:
Automatic Rule Base Inspection for Data-Access Oriented Knowledge-based Systems. SEKE 1990: 116-121
Editorship
- 2020
- [e5]Ilsun You, Hsing-Chung Chen, Fang-Yie Leu, Igor V. Kotenko:
Mobile Internet Security - 4th International Symposium, MobiSec 2019, Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers. Communications in Computer and Information Science 1121, Springer 2020, ISBN 978-981-15-9608-7 [contents] - 2019
- [e4]Fatos Xhafa, Fang-Yie Leu, Massimo Ficco, Chao-Tung Yang:
Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings of the 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC-2018, Taichung, Taiwan, 27-29 October. Lecture Notes on Data Engineering and Communications Technologies 24, Springer 2019, ISBN 978-3-030-02606-6 [contents] - [e3]Leonard Barolli, Fang-Yie Leu, Tomoya Enokido, Hsing-Chung Chen:
Advances on Broadband and Wireless Computing, Communication and Applications, Proceedings of the 13th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2018, Taichung, Taiwan, October 27-29, 2018. Lecture Notes on Data Engineering and Communications Technologies 25, Springer 2019, ISBN 978-3-030-02612-7 [contents] - 2018
- [e2]Ilsun You, Fang-Yie Leu, Hsing-Chung Chen, Igor V. Kotenko:
Mobile Internet Security - First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers. Communications in Computer and Information Science 797, Springer 2018, ISBN 978-981-10-7849-1 [contents] - 2013
- [e1]Leonard Barolli, Ilsun You, Fatos Xhafa, Fang-Yie Leu, Hsing-Chung Chen:
Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013, Taichung, Taiwan, July 3-5, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-4974-3 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint