1,338 results on '"Chen, Chien-Ming"'
Search Results
2. Superior persistence of ustekinumab compared to anti-TNF in vedolizumab-experienced inflammatory bowel diseases patients: a real-world cohort study
3. An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT
4. RETRACTED ARTICLE: An enhanced pairing-based authentication scheme for smart grid communications: An enhanced pairing-based AKE scheme
5. On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks
6. Towards Correlated Sequential Rules
7. Graph convolutional networks and deep reinforcement learning for intelligent edge routing in IoT environment
8. Advancing explainability of adversarial trained Convolutional Neural Networks for robust engineering applications
9. Smart System: Joint Utility and Frequency for Pattern Classification
10. Is there value in the routine inclusion of chest computed tomography for patients with gastrointestinal stromal tumor?
11. A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security
12. ERLNEIL-MDP: Evolutionary reinforcement learning with novelty-driven exploration for medical data processing
13. A novel mixture rule for multi-layer plates with thermal bending and twisting effects applied to FOCoS devices
14. Energy price uncertainty and renewable energy technological innovation: Evidence from listed Chinese firms
15. Open-world multi-modal machine learning decision model based on uncertain data analysis for fetal heart diagnosis
16. Towards Revenue Maximization with Popular and Profitable Products
17. Strength characterization of ultrathin chips by using large deflection theory of multi-layer plate for three-point bending tests
18. A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks
19. Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system
20. Anomaly Rule Detection in Sequence Data
21. Flexible Pattern Discovery and Analysis
22. Solder joint reliability performance study and shear characterization of low-Ag SAC lead-free solders for handheld application
23. Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption
24. Weighing in on the average weights: Measuring corporate social performance (CSP) score using DEA
25. Preparation of waste paper fiber-reinforced biodegradable polybutylene adipate terephthalates (PBATs) and their feasible evaluation for food package films with high oxygen barrier and antistatic performances
26. On the Construction of a Post-Quantum Blockchain for Smart City
27. Discovering High Utility-Occupancy Patterns from Uncertain Data
28. A Jumping Mining Attack and Solution
29. Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
30. Privileged Insider Attacks on Two Authentication Schemes
31. Metaverse for smart cities: A survey
32. Ultrasound tissue scatterer distribution imaging: An adjunctive diagnostic tool for shear wave elastography in characterizing focal liver lesions
33. Reinforcement Fuzzy Q-Learning Incorporated with Genetic Kinematics Analysis for Self-organizing Holonomic Motion Control of Six-Link Stewart Platforms
34. Comments on a Secure AKA Scheme for Multi-server Environments
35. Comments on a Secure and Efficient Three-Factor Authentication Protocol Using Honey List for WSN
36. Cryptanalysis of an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment
37. On the Security of a Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks
38. A CNN-Based Method for AAPL Stock Price Trend Prediction Using Historical Data and Technical Indicators
39. Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation
40. Time to shift the shift: Performance effects of within-day cumulative service encounters in retail stores
41. Comparative study of solder joint reliability assessment on fan-out CSP and flip-chip DCA package
42. An evolutionary simulation-optimization approach for the problem of order allocation with flexible splitting rule in semiconductor assembly
43. Systematic survey of mobile payments, protocols, and security infrastructure
44. A blockchain-based signature exchange protocol for metaverse
45. A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT
46. An QUasi-Affine TRansformation Evolution (QUATRE) Algorithm for Job-Shop Scheduling Problem by Mixing Different Strategies
47. Comments on 'A Robust User Authentication Protocol with Privacy-Preserving for Roaming Service in Mobility Environments'
48. A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment
49. Privileged Insider Attacks on Two Authentication Schemes
50. Study of robust package strength characterization of memory packages for handheld application
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.