Fang-Yie, Leu
Fang-Yie, Leu
Correu electrònic verificat a - Pàgina d'inici
TítolCitada perAny
Lifetime elongation for wireless sensor network using queue-based approaches
FC Jiang, DC Huang, CT Yang, FY Leu
The Journal of Supercomputing 59 (3), 1312-1335, 2012
PFRF: An adaptive data replication algorithm based on star-topology data grids
MC Lee, FY Leu, Y Chen
Future Generation Computer Systems 28 (7), 1045-1057, 2012
Integrating grid with intrusion detection
FY Leu, JC Lin, MC Li, CT Yang, PC Shih
19th International Conference on Advanced Information Networking and …, 2005
A performance-based grid intrusion detection system
FY Leu, JC Lin, MC Li, CT Yang
29th Annual International Computer Software and Applications Conference …, 2005
Accessing medical image file with co-allocation HDFS in cloud
CT Yang, WC Shih, LT Chen, CT Kuo, FC Jiang, FY Leu
Future Generation Computer Systems 43, 61-73, 2015
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications
FY Leu
Journal of Network and Computer Applications 32 (5), 1073-1091, 2009
Detection workload in a dynamic grid-based intrusion detection environment
FY Leu, MC Li, JC Lin, CT Yang
Journal of Parallel and Distributed Computing 68 (4), 427-442, 2008
Residence energy control system based on wireless smart socket and IoT
KL Tsai, FY Leu, I You
IEEE Access 4, 2885-2894, 2016
A smartphone-based wearable sensors for monitoring real-time physiological data
CLH Fang −Yie Leu, Chia −Yin Ko, Ilsun You, Kim-Kwang Raymond Choo
Computers and Electrical Engineering 65 (1), 376–392, 2018
Secure and efficient protocol for fast handover in 5G mobile Xhaul networks
V Sharma, I You, FY Leu, M Atiquzzaman
Journal of Network and Computer Applications 102, 38-57, 2018
A secure communication over wireless environments by using a data connection core
YL Huang, FY Leu, KC Wei
Mathematical and Computer Modelling 58 (5-6), 1459-1474, 2013
Detecting dos and ddos attacks by using an intrusion detection and remote prevention system
FY Leu, ZY Li
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
An internal intrusion detection and protection system by using data mining and forensic techniques
FY Leu, KL Tsai, YT Hsiao, CT Yang
IEEE Systems Journal 11 (2), 427-438, 2015
A secure data encryption method employing a sequential-logic style mechanism for a cloud system
YL Huang, CR Dai, FY Leu, I You
International Journal of Web and Grid Services 11 (1), 102-124, 2015
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.
YL Huang, FY Leu
JoWUA 2 (3), 96-107, 2011
AES-128 based secure low power communication for LoRaWAN IoT environments
KL Tsai, YL Huang, FY Leu, I You, YL Huang, CH Tsai
IEEE Access 6, 45325-45334, 2018
An MFCC-based speaker identification system
FY Leu, GL Lin
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
A wandering path tracking and fall detection system for people with dementia
CY Ko, FY Leu, IT Lin
2014 Ninth International Conference on Broadband and Wireless Computing …, 2014
Improving security level of LTE authentication and key agreement procedure
FY Leu, I You, YL Huang, K Yim, CR Dai
2012 IEEE Globecom Workshops, 1032-1036, 2012
Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies
FY Leu, CT Yang, FC Jiang
Future Generation Computer Systems 26 (4), 554-568, 2010
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20