Su, Ming-Yang
55273  results:
Search for persons X
?
2

Applying Super Resolution and Optical Flow to Implement a R..:

, In: 2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan),
Su, Ming-Yang ; Xu, Wang-Di - p. 169-170 , 2023
 
?
3

An URL Protection Approach for Apps on Smartphone by Built-..:

, In: 2023 9th International Conference on Applied System Innovation (ICASI),
Su, Ming-Yang ; Lu, Yu-Hung ; Lu, Hung-Yang.. - p. 71-73 , 2023
 
?
7

Applying episode mining and pruning to identify malicious o..:

Su, Ming-Yang
Computers & Electrical Engineering.  59 (2017)  - p. 180-188 , 2017
 
?
8

A two-dimensional layered CdIIcoordination polymer with a t..:

Huang, Qiu-Ying ; Su, Ming-Yang ; Meng, Xiang-Ru
Acta Crystallographica Section C Structural Chemistry.  71 (2015)  6 - p. 474-478 , 2015
 
?
9

An efficient and secure approach for a cloud collaborative ..:

Yeh, Sheng-Cheng ; Su, Ming-Yang ; Chen, Hui-Hui.
Journal of Network and Computer Applications.  36 (2013)  6 - p. 1632-1641 , 2013
 
?
10

Prevention of selective black hole attacks on mobile ad hoc..:

Su, Ming-Yang
Computer Communications.  34 (2011)  1 - p. 107-117 , 2011
 
?
11

A novel intrusion detection system based on hierarchical cl..:

Horng, Shi-Jinn ; Su, Ming-Yang ; Chen, Yuan-Hsin...
Expert Systems with Applications.  38 (2011)  1 - p. 306-313 , 2011
 
?
12

Using clustering to improve the KNN-based classifiers for o..:

Su, Ming-Yang
Journal of Network and Computer Applications.  34 (2011)  2 - p. 722-730 , 2011
 
?
13

Real-time anomaly detection systems for Denial-of-Service a..:

Su, Ming-Yang
Expert Systems with Applications.  38 (2011)  4 - p. 3492-3498 , 2011
 
?
14

Discovery and prevention of attack episodes by frequent epi..:

Su, Ming-Yang
Journal of Network and Computer Applications.  33 (2010)  2 - p. 156-167 , 2010
 
?
15

WARP: A wormhole-avoidance routing protocol by anomaly dete..:

Su, Ming-Yang
Computers & Security.  29 (2010)  2 - p. 208-224 , 2010
 
1-15