| Issue | Title | |
| Vol 23, No 1 (2022) | Edge Based Lightweight Authentication Architecture Using Deep Learning for Vehicular Networks | Abstract PDF |
| Hyunhee Park | ||
| Vol 23, No 6 (2022) | Edge Computing Offloading at Middle-sea Scenario for Maritime Video Surveillances | Abstract PDF |
| Ziyang Gong, Ziyi Wang, Xin Su, Chang Choi | ||
| Vol 11, No 7 (2010) | Edge-and-Motion-Based Video Object Extraction and Application to Scene Composition | Abstract |
| Yih-Haw Jan | ||
| Vol 19, No 1 (2018) | Editorial: Research Activities in Future Internet Technologies | Abstract PDF |
| Syed Hassan Ahmed, Safdar Hussain Bouk, Waleed Ejaz, Houbing Song | ||
| Vol 19, No 4 (2018) | Editorial: Special Issue on “Selected Papers from MobiSec 2016” | Abstract PDF |
| Ilsun You, Hsing-Chung Chen, Fang-Yie Leu | ||
| Vol 19, No 4 (2018) | Editorial: The 10th International Conference on Network and System Security (NSS 2016) | Abstract PDF |
| Kuo-Hui Yeh, Chunhua Su, Jiageng Chen, Nai-Wei Lo | ||
| Vol 21, No 2 (2020) | EEQRPI-MRP: A Quality of Service Based Interference Aware Multipath Routing Protocol for MANETs | Abstract PDF |
| A. Kingsly Jabakumar, S. Sasipriya | ||
| Vol 21, No 1 (2020) | Effect of Behavior Patterns of Accessing Learning Materials on Learning Performance in Student-generated Question Activities | Abstract PDF |
| Pham Duc Tho, Chih-Hung Lai, Ondrej Navratil | ||
| Vol 20, No 6 (2019) | Effect of Facebook Social Comparison on Well-being: A Meta-Analysis | Abstract PDF |
| Fu-Rung Yang, Chih-Fen Wei, Jih-Hsin Tang | ||
| Vol 23, No 3 (2022) | Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection | Abstract PDF |
| Su-Gyeong Yu, So-Eui Kim, Kun Ha Suh, Eui Chul Lee | ||
| Vol 8, No 3 (2007) | Effective and Efficient Approach to Web Accounts Management and Authentication Minimizing Password Compromise Risk and Possible Loss | Abstract |
| Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang | ||
| Vol 22, No 5 (2021) | Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data | Abstract PDF |
| Shuji Yamaguchi, Hidehito Gomi, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi | ||
| Vol 23, No 5 (2022) | Effective Radio Resource Allocation for IoT Random Access by Using Reinforcement Learning | Abstract |
| Yen-Wen Chen, Ji-Zheng You | ||
| Vol 20, No 7 (2019) | Effective Tag Identification Algorithm for Dynamic Radio Frequency Identification Systems | Abstract PDF |
| Cheng-Huang Chang, Chen-Chuan Wu, Chiu-Kuo Liang | ||
| Vol 15, No 5 (2014) | Effectively Mining Network Traffic Intelligence to Detect Malicious Stealthy Port Scanning to Cloud Servers | Abstract |
| Yan-Zhen Qu, Qi-Kai Lu | ||
| Vol 25, No 6 (2024) | Effects of Facial Recognition and Text Semantic Recognition on Affective Tutoring System | Abstract |
| Hsin-Lan Liu, Chin-Feng Lai, Hao-Chiang Koong Lin | ||
| Vol 18, No 3 (2017) | Effi cient Algorithm for Data Retrieval Problem with Multi-Item Request in Wireless Data Broadcast | Abstract |
| Ping He, Hong Shen, Shuli Luan | ||
| Vol 24, No 6 (2023) | Efficiency Evaluation of Business in IoT Supply Chains by Network DEA | Abstract |
| Han-Ying Kao, Chien-Hao Lan, Chia-Hsien Hsu | ||
| Vol 25, No 4 (2024) | Efficient Analysis and Detection of Intelligent Security Threats in Cloud Environment | Abstract |
| Ji Su Park | ||
| Vol 19, No 4 (2018) | Efficient and Publicly Verifiable Outsourcing of Large-scale Matrix Multiplication | Abstract PDF |
| Gang Sheng, Chunming Tang, Wei Gao, Ying Yin, Yunlu Cai | ||
| Vol 22, No 6 (2021) | Efficient Barrage Video Recommendation Algorithm Based on Convolutional and Recursive Neural Network | Abstract PDF |
| Ping He, Siyuan Ma, Weidong Li | ||
| Vol 20, No 4 (2019) | Efficient Certificate Based One-pass Authentication Protocol for IMS | Abstract PDF |
| Humaira Ashraf, Ata Ullah, Shireen Tahira, Muhammad Sher | ||
| Vol 18, No 5 (2017) | Efficient Certificate-Based Signature Scheme for Electronic Commerce Security Using Bilinear Pairing | Abstract |
| Libing Wu, Yubo Zhang, Yongjun Ren, Debiao He | ||
| Vol 15, No 7 (2014) | Efficient Clustering Simulator for Hierarchical Management of High-Risk with Wellness | Abstract |
| Young-Sik Jeong, Hyun-Woo Kim, Doo-Soon Park, Jong Hyuk Park | ||
| Vol 13, No 5 (2012) | Efficient Content-Based Publish/Subscribe Systems over Peer-to-Peer Networks | Abstract |
| Shou-Chih Lo | ||
| 1201 - 1225 of 2731 Items | << < 44 45 46 47 48 49 50 51 52 53 > >> | |
