default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 52 matches
- 2020
- Daehyeon Bae, Jongbae Hwang, JaeCheol Ha:
Breaking a Masked AES Implementation Using a Deep Learning-based Attack. ICEA 2020: 22:1-22:5 - I Fang Chang, Ya-Hsueh Chuang, Tzer-Long Chen, Yi Ping Yin, Yen Ni Liu, Tzer-Shyong Chen:
A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus. ICEA 2020: 3:1-3:2 - Ying-Chih Chen, Kuo Cheng Chung:
Understand the public insurance purchase orientation through the triangle theory of love. ICEA 2020: 18:1-18:2 - Tzer-Long Chen, Nan-Kai Hsieh, Jhih-Chung Chang, Ming Chen Ho, Yu Ru Chang, Po-Ya Chuang:
The Implementation of Smart Aquarium System with Intelligent Sensors. ICEA 2020: 2:1-2:2 - Hung-Jen Chen, Chin-Chia Hsu, Chia-Hui Liu:
An intelligent patrol system for Industry 4.0 Smart Factory. ICEA 2020: 8:1-8:2 - Chou-Cheng Chen, Yao-Lung Kuo, Chi-Hui Chiang:
MiningBreastCancer: Selection of Candidate Gene Associated with Breast Cancer via Comparison between Data Mining of TCGA and Text Mining of PubMed. ICEA 2020: 7:1-7:6 - Hyunpyo Choi, Jiho Shin, Jung-Taek Seo:
A Study on the Digital Forensic Method for Decentralized Web Service. ICEA 2020: 37:1-37:6 - Yen-Chiao Chuang, Cheng-Lung Wu, I-Yun Chen, Chien-Hung Wu:
Construction of Diving Record Wearable Device Based on IOT. ICEA 2020: 15:1-15:3 - Kuo Cheng Chung, Silvia Wan-Ju Liang:
Building Sustainable Business Indices for Hotel Industry from Green Supply Chain Perspective. ICEA 2020: 17:1-17:2 - Daniel Gerbi Duguma, Jiyoon Kim, Bonam Kim, Ilsun You:
A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System. ICEA 2020: 36:1-36:6 - Zhi-Yan Fang, Zhe-Wei Xiao, Chun-Wei Tsai:
An Effective Multi-Swarm Algorithm for Optimizing Hyperparameters of DNN. ICEA 2020: 20:1-20:6 - Jaejun Heo, Yonas Engida Gebremariam, Hoonyong Park, Bonam Kim, Ilsun You:
Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis. ICEA 2020: 38:1-38:6 - Nan-Kai Hsieh, Tsan-Ching Kang, Tzer-Long Chen, Jhih-Chung Chang, Min Chien Wang, Tzer-Shyong Chen, Yu-Fang Chung:
The Implementation of IoT-based Smart Laboratory Management System. ICEA 2020: 1:1-1:3 - Wu-Chih Hu, Hsin-Te Wu, Jun-We Zhan, Ping-Hsin Hsieh:
Developing Intelligent Feeding Systems based on Deep Learning. ICEA 2020: 13:1-13:2 - Wesley Huang, Kuei-Shu Hsu, Chia-Sui Wang, Yih-Feng Chang, Chia-Mao Yei:
An Image Processing Approach for Improving the Recognition of Cluster-like Spheroidized Carbides. ICEA 2020: 50:1-50:3 - Yunsang Joo, Seungwon Lee, Hyoungju Kim, Pankoo Kim, Seongoun Hwang, Chang Choi:
Efficient healthcare service based on Stacking Ensemble. ICEA 2020: 28:1-28:5 - Daun Jung, Jiho Shin, Chaechang Lee, Kookheui Kwon, Jung-Taek Seo:
A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant. ICEA 2020: 44:1-44:7 - Namgyu Jung, Junho Yoon, Vially Kazadi Mutombo, Seungyeon Lee, Jusuk Lee, Chang Choi:
Efficient data processing method for edge intelligence based on SVM. ICEA 2020: 29:1-29:6 - Ki-Wan Kang, Ki-Woong Park:
Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration. ICEA 2020: 23:1-23:5 - Tzu-Tsai Kao, Chun-Wei Tsai, Ming-Chao Chiang:
An Effective Algorithm based on Search Economics for Multi-Objective Optimization. ICEA 2020: 24:1-24:6 - Janghoon Kim, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo:
Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning. ICEA 2020: 47:1-47:5 - Doyeon Kim, Taejin Lee:
Anomaly detection in time-series data environment. ICEA 2020: 30:1-30:3 - Sejin Kim, Taejin Lee:
XGBoost based Packer Identification study using Entry point. ICEA 2020: 45:1-45:3 - Jiyoon Kim, Sangmin Lee, Daniel Gerbi Duguma, Bonam Kim, Ilsun You:
Comments on "Securing implantable cardiac medical devices": Use of radio frequency energy harvesting. ICEA 2020: 34:1-34:5 - Seong-Jin Kim, Ki-Woong Park:
Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment. ICEA 2020: 33:1-33:3 - Junwon Kim, Jiho Shin, Jung-Taek Seo:
Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation. ICEA 2020: 35:1-35:7 - Namjun Kim, Chanmo Yang, Daebeom Cho, Seung Hyeon Geum, Ki-Woong Park:
CERT Training Platform over the Event-Recordable Container. ICEA 2020: 39:1-39:6 - Soonhong Kwon, Yangseo Choi, Jong-Hyouk Lee:
Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency. ICEA 2020: 48:1-48:6 - Soonhong Kwon, HeeDong Yang, Manhee Lee, Jong-Hyouk Lee:
Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset. ICEA 2020: 49:1-49:4 - Yueh-Shiu Lee, Yen-Chiao Chuang, Mei-Mei Chang, Mei-Wen Huang:
A Clicks-and-Mortar Smart System. ICEA 2020: 12:1-12:2
skipping 22 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-18 19:06 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint