Lee, Kuei-Fang
84  results:
Search for persons X
?
1

A Situation-Based Dialogue Classification Model for Emergen..:

, In: 2017 International Conference on Platform Technology and Service (PlatCon),
 
?
2

CITS 2024 General Chairs' Message:

, In: 2024 International Conference on Computer, Information and Telecommunication Systems (CITS),
 
?
3

EL-FAM: Power System Intrusion Detection with Ensemble Lear..:

, In: 2024 International Conference on Computer, Information and Telecommunication Systems (CITS),
Bhavsar, Ansh ; Agvan, Sezan ; Ramoliya, Fenil... - p. 1-5 , 2024
 
?
4

A Study on "Blockchain-Enabled Digital Twins: The Next Wave..:

, In: 2024 International Conference on Computer, Information and Telecommunication Systems (CITS),
 
?
5

SLA-SCA: Secure and Lightweight Authentication and Key Agre..:

, In: 2023 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI),
 
?
6

A Robust Remote Client Password Authentication Technique fo..:

, In: 2023 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI),
 
?
7

A Survey of DDoS Attacks Detection Schemes in SDN Environme..:

, In: 2023 International Conference on Computer, Information and Telecommunication Systems (CITS),
 
?
 
?
9

An Efficient Digital Short Signature Scheme using CCM for H..:

, In: 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI),
 
?
10

An Efficient Authentication Technique using Convolution Che..:

, In: 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI),
 
?
11

RAKI:A Robust ECC Based Three-party Authentication and Key ..:

, In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference,
Zhou, Yousheng ; Li, Lunhao ; Obaidat, Mohammad S.... - p. 1175-1180 , 2022
 
?
12

Internet-of-Explainable-Digital-Twins: A Case Study of Vers..:

, In: 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI),
 
?
13

BeHAutH: A KNN-Based Classification Scheme for Behavior-Bas..:

, In: 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI),
 
?
14

On the security of authenticated key agreement schemes for ..:

, In: 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI),
 
?
15

A Privacy-preserving Data Transmission Protocol with Consta..:

, In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference,
Yang, Huijie ; Shen, Jian ; Obaidat, Mahammad.. - p. 2248-2253 , 2022
 
1-15