Fang-Yie, Leu
Fang-Yie, Leu
Zweryfikowany adres z - Strona główna
Cytowane przez
Cytowane przez
Lifetime elongation for wireless sensor network using queue-based approaches
FC Jiang, DC Huang, CT Yang, FY Leu
The Journal of Supercomputing 59 (3), 1312-1335, 2012
Integrating grid with intrusion detection
FY Leu, JC Lin, MC Li, CT Yang, PC Shih
19th International Conference on Advanced Information Networking and …, 2005
Accessing medical image file with co-allocation HDFS in cloud
CT Yang, WC Shih, LT Chen, CT Kuo, FC Jiang, FY Leu
Future Generation Computer Systems 43, 61-73, 2015
PFRF: An adaptive data replication algorithm based on star-topology data grids
MC Lee, FY Leu, Y Chen
Future generation computer systems 28 (7), 1045-1057, 2012
A performance-based grid intrusion detection system
FY Leu, JC Lin, MC Li, CT Yang
29th Annual International Computer Software and Applications Conference …, 2005
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications
FY Leu
Journal of Network and Computer Applications 32 (5), 1073-1091, 2009
A smartphone-based wearable sensors for monitoring real-time physiological data
CLH Fang −Yie Leu, Chia −Yin Ko, Ilsun You, Kim-Kwang Raymond Choo
Computers and Electrical Engineering 65 (1), 376–392, 2018
Residence energy control system based on wireless smart socket and IoT
KL Tsai, FY Leu, I You
IEEE Access 4, 2885-2894, 2016
Detection workload in a dynamic grid-based intrusion detection environment
FY Leu, MC Li, JC Lin, CT Yang
Journal of Parallel and Distributed Computing 68 (4), 427-442, 2008
An internal intrusion detection and protection system by using data mining and forensic techniques
FY Leu, KL Tsai, YT Hsiao, CT Yang
IEEE Systems Journal 11 (2), 427-438, 2015
AES-128 based secure low power communication for LoRaWAN IoT environments
KL Tsai, YL Huang, FY Leu, I You, YL Huang, CH Tsai
IEEE Access 6, 45325-45334, 2018
Secure and efficient protocol for fast handover in 5G mobile Xhaul networks
V Sharma, I You, FY Leu, M Atiquzzaman
Journal of Network and Computer Applications 102, 38-57, 2018
Detecting dos and ddos attacks by using an intrusion detection and remote prevention system
FY Leu, ZY Li
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
A secure communication over wireless environments by using a data connection core
YL Huang, FY Leu, KC Wei
Mathematical and Computer Modelling 58 (5-6), 1459-1474, 2013
An MFCC‐based text‐independent speaker identification system for access control
JC Liu, FY Leu, GL Lin, H Susanto
Concurrency and Computation: Practice and Experience 30 (2), e4255, 2018
TTP based high-efficient multi-key exchange protocol
KL Tsai, YL Huang, FY Leu, I You
IEEE Access 4, 6261-6271, 2016
An MFCC-based speaker identification system
FY Leu, GL Lin
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
A secure data encryption method employing a sequential–logic style mechanism for a cloud system
YL Huang, CR Dai, FY Leu, I You
International Journal of Web and Grid Services 11 (1), 102-124, 2015
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.
YL Huang, FY Leu
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 96-107, 2011
A wandering path tracking and fall detection system for people with dementia
CY Ko, FY Leu, IT Lin
2014 Ninth International Conference on Broadband and Wireless Computing …, 2014
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20