215 results on '"Hwang, Ren-Hung"'
Search Results
2. Spatiotemporal Renewable Energy Techniques and Applications
3. Spatiotemporal Renewable Energy Techniques and Applications
4. Optimizing Resource Allocation with High-Reliability Constraint for Multicasting Automotive Messages in 5G NR C-V2X Networks
5. Towards the Age of Intelligent Vehicular Networks for Connected and Autonomous Vehicles in 6G
6. Two-stage multi-datasource machine learning for attack technique and lifecycle detection
7. Security and privacy for 6G: A survey on prospective technologies and challenges
8. Offloading Optimization with Delay Distribution in the 3-tier Federated Cloud, Edge, and Fog Systems
9. Intrusion Detection System Using Semi-supervised Learning with Hybrid Labeling Techniques
10. Sustainable and lightweight domain-based intrusion detection system for in-vehicle network
11. Host-based intrusion detection with multi-datasource and deep learning
12. Misbehavior detection system with semi-supervised federated learning
13. Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation
14. Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection
15. Intrusion Detection System Using Semi-supervised Learning with Hybrid Labeling Techniques
16. Preventing the attempts of abusing cheap-hosting Web-servers for monetization attacks
17. Domain-Specific Anomaly Detection for In-Vehicle Networks
18. ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions
19. Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics
20. CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection
21. Queue-Length-Based Offloading for Delay Sensitive Applications in Federated Cloud-Edge-Fog Systems
22. MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology
23. Two-Stage Multi-Datasource Machine Learning for Attack Technique and Lifecycle Detection
24. Uplink Access Control in Narrowband IoT
25. Imperceptible adversarial attack via spectral sensitivity of human visual system
26. Sustainable and lightweight domain-based intrusion detection system for in-vehicle network
27. Understanding Privacy Risks of High-accuracy Radio Positioning and Sensing in Wireless Networks
28. Live MPEG-DASH video streaming cache management with cognitive mobile edge computing
29. Physiological signals anticipatory computing for individual emotional state and creativity thinking
30. Improving Learning Achievement in Science Education for Elementary School Students via Blended Learning
31. Web attacks: defeating monetisation attempts
32. Efficient RRH Activation Management for 5G V2X
33. Dynamic Resource Allocation for Network Slicing with Multi-Tenants in 5G Two-Tier Networks
34. Toward the Age of Intelligent Vehicular Networks for Connected and Autonomous Vehicles in 6G
35. Cooperative Adaptive Driving for Platooning Autonomous Self Driving Based on Edge Computing
36. Uplink Access Control in Narrowband IoT
37. Inference of Learning Creative Characteristics by Analysis of EEG Signal
38. Innovative Project-Based Learning
39. Satisfaction Analysis for Agricultural Worker Digital Course Learning Platform
40. Detecting and Preventing DDoS Attacks in SDN-Based Data Center Networks
41. An Intelligent Concept Map for e-book via Automatic Keyword Extraction
42. Construction of Efficient Cloud-Based Digital Course Learning Platform for Agricultural Worker
43. Deep Learning-based Localization and Outlier Removal Integration Model for Indoor Surveillance
44. Deep Reinforcement Learning Based Resource Allocation for 5G V2V Groupcast Communications
45. Dual Pricing Optimization for Live Video Streaming in Mobile Edge Computing With Joint User Association and Resource Management
46. Intelligent Aerial Relay Deployment for Enhancing Connectivity in Emergency Communications
47. Understanding Privacy Risks of High-Accuracy Radio Positioning and Sensing in Wireless Networks
48. Artificial Intelligence for Internet of Things as a Service: Small or Big Data, Private or Public Model, Centralized or Federated Learning?
49. A Distributed Scheduling Algorithm for IEEE 802.15.4e Wireless Sensor Networks
50. SocialHide: A generic distributed framework for location privacy protection
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.