default search action
ICEA 2020: Gangwon, Korea
- ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12 - 15, 2020. ACM 2020, ISBN 978-1-4503-8304-2
- Nan-Kai Hsieh, Tsan-Ching Kang, Tzer-Long Chen, Jhih-Chung Chang, Min Chien Wang, Tzer-Shyong Chen, Yu-Fang Chung:
The Implementation of IoT-based Smart Laboratory Management System. 1:1-1:3 - Tzer-Long Chen, Nan-Kai Hsieh, Jhih-Chung Chang, Ming Chen Ho, Yu Ru Chang, Po-Ya Chuang:
The Implementation of Smart Aquarium System with Intelligent Sensors. 2:1-2:2 - I Fang Chang, Ya-Hsueh Chuang, Tzer-Long Chen, Yi Ping Yin, Yen Ni Liu, Tzer-Shyong Chen:
A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus. 3:1-3:2 - Ya-Hui Ou, Yu-Hsin Yu, Yu-Xi Chen, Zhen-Yu Wu:
Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks. 4:1-4:2 - Chuan-Gang Liu, Chin-Jui Wu, I-Hsien Liu, Chi-Che Wu, Jung-Shian Li:
Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems. 5:1-5:6 - I-Hsien Liu, Yung-Lin Chang, Jung-Shian Li, Chuan-Gang Liu:
Differential Privacy Protection with Group Onion Routing based on AI-based URL Classification. 6:1-6:6 - Chou-Cheng Chen, Yao-Lung Kuo, Chi-Hui Chiang:
MiningBreastCancer: Selection of Candidate Gene Associated with Breast Cancer via Comparison between Data Mining of TCGA and Text Mining of PubMed. 7:1-7:6 - Hung-Jen Chen, Chin-Chia Hsu, Chia-Hui Liu:
An intelligent patrol system for Industry 4.0 Smart Factory. 8:1-8:2 - O-Joun Lee, Jin-Taek Kim, Eun-Soon You:
Towards Story-based Summarization of Narrative Multimedia. 9:1-9:5 - Yueh-Shiu Lee, Chang-Yi Yang, Tsai-Yu Lai, Tzu-Hsuan Lin:
BlockChain Develops Student Positioning System on Campus. 10:1-10:2 - Yueh-Shiu Lee, I-Yun Chen, Tsung-Yao Lin, Yen-Chiao Chuang, Hsu-Jung Liu:
Developing a Model to Explore Consumer Buying Behaviors through Long Short-Term Memory. 11:1-11:3 - Yueh-Shiu Lee, Yen-Chiao Chuang, Mei-Mei Chang, Mei-Wen Huang:
A Clicks-and-Mortar Smart System. 12:1-12:2 - Wu-Chih Hu, Hsin-Te Wu, Jun-We Zhan, Ping-Hsin Hsieh:
Developing Intelligent Feeding Systems based on Deep Learning. 13:1-13:2 - Jo-Hung Yu, Meng-Tsung Lee, Jao-Chuan Lin, Chien-Hung Wu:
Training Analysis of Double Canoe Based on IOT. 14:1-14:3 - Yen-Chiao Chuang, Cheng-Lung Wu, I-Yun Chen, Chien-Hung Wu:
Construction of Diving Record Wearable Device Based on IOT. 15:1-15:3 - Ying Ling, Jo-Hung Yu, Chih-Chien Shen, Chien-Hung Wu:
On the Establishment of E-referee for Sailing Ships Based on Deep Learning. 16:1-16:3 - Kuo Cheng Chung, Silvia Wan-Ju Liang:
Building Sustainable Business Indices for Hotel Industry from Green Supply Chain Perspective. 17:1-17:2 - Ying-Chih Chen, Kuo Cheng Chung:
Understand the public insurance purchase orientation through the triangle theory of love. 18:1-18:2 - Chia-Wen Tsai, Kuo Cheng Chung:
Understanding users' switching behavior of hypermarket marketing methods: An empirical study from the perspective of push-pull-mooring framework. 19:1-19:2 - Zhi-Yan Fang, Zhe-Wei Xiao, Chun-Wei Tsai:
An Effective Multi-Swarm Algorithm for Optimizing Hyperparameters of DNN. 20:1-20:6 - Zhe-Wei Xiao, Zhi-Yan Fang, Chun-Wei Tsai:
An Effective Optimizer based on Global and Local Searched Experiences for Short-term Electricity Consumption Forecasting. 21:1-21:6 - Daehyeon Bae, Jongbae Hwang, JaeCheol Ha:
Breaking a Masked AES Implementation Using a Deep Learning-based Attack. 22:1-22:5 - Ki-Wan Kang, Ki-Woong Park:
Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration. 23:1-23:5 - Tzu-Tsai Kao, Chun-Wei Tsai, Ming-Chao Chiang:
An Effective Algorithm based on Search Economics for Multi-Objective Optimization. 24:1-24:6 - Lie Yang, Shi-Xuan Shao, Chien-Erh Weng, Yung-Cheng Yao:
The Development of UAV-based Air Quality Monitor System. 25:1-25:2 - Yung-Cheng Yao, Xing-Rui Huang, Cheng-Yi Liu, Po-Wei Lin:
Intelligent Controlling System in Aquaculture. 26:1-26:2 - Yung-Cheng Yao, Yang-Chen Fan, Hsin-Fu Yu, Shih-Pang Chen:
A Smart Monitoring System in Fish Farm. 27:1-27:2 - Yunsang Joo, Seungwon Lee, Hyoungju Kim, Pankoo Kim, Seongoun Hwang, Chang Choi:
Efficient healthcare service based on Stacking Ensemble. 28:1-28:5 - Namgyu Jung, Junho Yoon, Vially Kazadi Mutombo, Seungyeon Lee, Jusuk Lee, Chang Choi:
Efficient data processing method for edge intelligence based on SVM. 29:1-29:6 - Doyeon Kim, Taejin Lee:
Anomaly detection in time-series data environment. 30:1-30:3 - Zhang-Han Zhuang, Ming-Chao Chiang:
The Whale Optimization Algorithm for Hyperparameter Optimization in Network-Wide Traffic Speed Prediction. 31:1-31:6 - Han-Byeol Park, Bo-Yeon Sim, Dong-Guk Han:
Machine Learning-Based Profiling Attack Method in RSA Prime Multiplication. 32:1-32:6 - Seong-Jin Kim, Ki-Woong Park:
Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment. 33:1-33:3 - Jiyoon Kim, Sangmin Lee, Daniel Gerbi Duguma, Bonam Kim, Ilsun You:
Comments on "Securing implantable cardiac medical devices": Use of radio frequency energy harvesting. 34:1-34:5 - Junwon Kim, Jiho Shin, Jung-Taek Seo:
Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation. 35:1-35:7 - Daniel Gerbi Duguma, Jiyoon Kim, Bonam Kim, Ilsun You:
A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System. 36:1-36:6 - Hyunpyo Choi, Jiho Shin, Jung-Taek Seo:
A Study on the Digital Forensic Method for Decentralized Web Service. 37:1-37:6 - Jaejun Heo, Yonas Engida Gebremariam, Hoonyong Park, Bonam Kim, Ilsun You:
Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis. 38:1-38:6 - Namjun Kim, Chanmo Yang, Daebeom Cho, Seung Hyeon Geum, Ki-Woong Park:
CERT Training Platform over the Event-Recordable Container. 39:1-39:6 - HanSeop Lim, Taeho Lee, Seonghyuck Lim, Jaeseong Han, Bo-Yeon Sim, Dong-Guk Han:
Fault Injection Method for Hardware-implemented AES without Artificial Triggering. 40:1-40:6 - Hyun Cheol Park, Sang-Woong Lee:
Reunion Block for High Magnification Histopathology Microscopic Image Analysis. 41:1-41:2 - Sahadev Poudel, Sang-Woong Lee:
Whole Slide Image Classification and Segmentation using Deep Learning. 42:1-42:2 - Mingyu Lee, Hanbyeol Kang, Junbeom Kwak, Donghyun Kim, Hyeonho Jeong, Jung-Taek Seo:
Proposed On-site Document Sharing System using FIDO. 43:1-43:6 - Daun Jung, Jiho Shin, Chaechang Lee, Kookheui Kwon, Jung-Taek Seo:
A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant. 44:1-44:7 - Sejin Kim, Taejin Lee:
XGBoost based Packer Identification study using Entry point. 45:1-45:3 - Joochan Lee, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo:
Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic. 46:1-46:6 - Janghoon Kim, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo:
Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning. 47:1-47:5 - Soonhong Kwon, Yangseo Choi, Jong-Hyouk Lee:
Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency. 48:1-48:6 - Soonhong Kwon, HeeDong Yang, Manhee Lee, Jong-Hyouk Lee:
Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset. 49:1-49:4 - Wesley Huang, Kuei-Shu Hsu, Chia-Sui Wang, Yih-Feng Chang, Chia-Mao Yei:
An Image Processing Approach for Improving the Recognition of Cluster-like Spheroidized Carbides. 50:1-50:3 - Sae-Bom Lee, Joon Shik Lim, Jin-Soo Cho, Sang Yeob Oh, Taeg Keun Whangbo, Chang Choi:
A Classification method of Fake News based on Ensemble Learning. 51:1-51:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.