Zobrazeno 1 - 10
of 835
pro vyhledávání: '"Jiann-Liang Chen"'
Publikováno v:
IEEE Access, Vol 12, Pp 71746-71760 (2024)
In the evolving landscape of cybersecurity, the prevalence of malicious Visual Basic for Applications (VBA) macros embedded in Office documents presents a formidable challenge. These macros, while integral to automation, have become potent vehicles f
Externí odkaz:
https://doaj.org/article/99837f517dc74742a632851a1de499a3
Autor:
Yi-Wei Ma, Chun-Yao Chang, Yen-Neng Chiang, Jiann-Liang Chen, Chih-Hung Chen, Wen-Tsung Chang, Shun-Ching Yang, Ying-Hsun Lai
Publikováno v:
IEEE Access, Vol 10, Pp 131386-131393 (2022)
In the age of information explosion, it is easy for people to receive many messages, and it is difficult to verify the authenticity of each message. Therefore, people often quickly and forward the acquired information and share anonymous information,
Externí odkaz:
https://doaj.org/article/849d4fe34ebe43b2aafb756d7b598dd0
Autor:
Yi-Xiang Luo, Jiann-Liang Chen
Publikováno v:
IEEE Access, Vol 10, Pp 110754-110760 (2022)
Forged videos are commonly spread online. Most have malicious content and cause serious information security problems. The most critical issue in deepfake detection is the identification of traces of tampering in fake videos. This study designs a Dua
Externí odkaz:
https://doaj.org/article/d4e8647ea10f44d39ba6d08169954f9d
Publikováno v:
IEEE Access, Vol 10, Pp 54029-54037 (2022)
The work develops a network threat detection system, AI@NTDS, that uses the behavioral features of attackers and intelligent techniques. The proposed AI@NTDS system combines data analysis, feature extraction, and feature evaluation to construct a det
Externí odkaz:
https://doaj.org/article/e129c8d2f31b45039fb500ebb599446d
Publikováno v:
Journal of Big Data, Vol 8, Iss 1, Pp 1-18 (2021)
Abstract Recent advances in Internet applications have facilitated information spreading and, thanks to a wide variety of mobile devices and the burgeoning 5G networks, users easily and quickly gain access to information. Great amounts of digital inf
Externí odkaz:
https://doaj.org/article/6c2ea66f24874836821577b06536009f
Publikováno v:
Frontiers in Psychology, Vol 12 (2021)
Owing to the rapid development of information and communication technologies, such as the Internet of Things, artificial intelligence, and computer vision, in recent years, the concept of smart sports has been proposed. A pitch fatigue detection meth
Externí odkaz:
https://doaj.org/article/aff65baa475d4941a4d7d9c4779e759d
Publikováno v:
Applied Sciences, Vol 12, Iss 21, p 10837 (2022)
This work proposes a novel malware identification model that is based on a graph neural network (GNN). The function call relationship and function assembly content obtained by analyzing the malware are used to generate a graph that represents the fun
Externí odkaz:
https://doaj.org/article/99051c24fe614390ac477e1df0a345d5
Autor:
Yi-Wei Ma Yi-Wei Ma, Jiann-Liang Chen Yi-Wei Ma, Yu-Liang Tang Jiann-Liang Chen, Kuan-Hung Lai Yu-Liang Tang
Publikováno v:
網際網路技術學刊. 23:1087-1097
This work proposes an adaptive resource orchestration system for a Wireless Local Area Network (WLAN) that is based on the operating principle of Cognitive Radio (CR) technology. By collecting environmental parameters, including the retransmission ra
Publikováno v:
IEEE Access, Vol 6, Pp 19407-19418 (2018)
The available 5G network is going to have various industrial applications. Mobile communication operators will be able more effectively to utilize their spectral assets, provide higher-speed data communication services, and increase network capacity.
Externí odkaz:
https://doaj.org/article/0fc3320e6c0c428593bc4b42f6987946
Publikováno v:
IT Professional. 24:74-80