Tsai, Kuo-Yu
21548  results:
Search for persons X
?
2

Optimization of machine learning method combined with brain..:

Wang, Chi-Hung ; Tsai, Kuo-Yu
Journal of Physical Therapy Science.  34 (2022)  5 - p. 379-385 , 2022
 
?
3

Medical blockchain: Data sharing and privacy preserving of ..:

Lee, Jung-San ; Chew, Chit-Jie ; Liu, Jo-Yun..
Journal of Information Security and Applications.  65 (2022)  - p. 103117 , 2022
 
?
6

Preserving Tenacious DDoS Vitality via Resurrection Social ..:

, In: Advances in Intelligent Systems and Computing; Security with Intelligent Computing and Big-Data Services 2019,
Lee, Jung-San ; Chew, Chit-Jie ; Chen, Ying-Chin.. - p. 39-45 , 2020
 
?
7

Practical Authentication Scheme Preserving Privacy Protecti..:

, In: Advances in Intelligent Systems and Computing; Security with Intelligent Computing and Big-Data Services 2019,
Tsai, Kuo-Yu ; Lai, Ching-Wei ; Fu, Chen-Hua.. - p. 351-360 , 2020
 
?
8

Microstructure overlapping image application with optical d..:

Wang, Chi-Hung ; Hwang, Yuh-Shyan ; Wang, Hsi-Chun..
Journal of the Optical Society of America A.  37 (2020)  8 - p. 1361 , 2020
 
?
9

A geographic map-based middleware framework to obfuscate sm..:

Luo, Jia-Ning ; Yang, Ming-Hour ; Tsai, Kuo-Yu
Multimedia Tools and Applications.  78 (2019)  20 - p. 28877-28902 , 2019
 
?
11

Nuclear Power Plant Construction Scheduling Problem with Ti..:

Chen, Shang-Kuan ; Ti, Yen-Wu ; Tsai, Kuo-Yu
Science and Technology of Nuclear Installations.  2016 (2016)  - p. 1-9 , 2016
 
?
12

Robust Distributed Reprogramming Protocol of Wireless Senso..:

Tsai, Kuo-Yu
International Journal of Distributed Sensor Networks.  11 (2015)  11 - p. 139874 , 2015
 
?
13

A Novel RFID Tag Identification Protocol: Adaptive $$n$$ n ..:

Yeh, Kuo-Hui ; Lo, Nai-Wei ; Tsai, Kuo-Yu..
Wireless Personal Communications.  77 (2014)  3 - p. 1775-1800 , 2014
 
?
14

An efficient certificateless signature scheme without bilin..:

Yeh, Kuo-Hui ; Tsai, Kuo-Yu ; Fan, Chuan-Yen
Multimedia Tools and Applications.  74 (2014)  16 - p. 6519-6530 , 2014
 
?
15

Two ID-based authenticated schemes with key agreement for m..:

Chou, Chih-Ho ; Tsai, Kuo-Yu ; Lu, Chung-Fu
The Journal of Supercomputing.  66 (2013)  2 - p. 973-988 , 2013
 
1-15