跳至主導覽
跳至搜尋
跳過主要內容
國立中央大學 首頁
說明與常見問題
English
中文
首頁
人才檔案
研究單位
研究計畫
研究成果
資料集
榮譽/獲獎
學術活動
新聞/媒體
影響
按專業知識、姓名或所屬機構搜尋
查看斯高帕斯 (Scopus) 概要
陳 奕明
教授
資訊管理學系
電子郵件
cym
mgt.ncu.edu
tw
網站
https://cis.ncu.edu.tw/iTeacher/home/0x682b34dabbdcf4e7aea4453ec7a82bc0
h-index
501
引文
13
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
2003
2022
每年研究成果
概覽
指紋
網路
研究成果
(70)
類似的個人檔案
(6)
如果您對這些純文本內容做了任何改變,很快就會看到。
指紋
查看啟用 Yi-Ming Chen 的研究主題。這些主題標籤來自此人的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
Engineering & Materials Science
Malware
100%
Broadcasting
98%
Internet
46%
Bandwidth
44%
Vehicular ad hoc networks
38%
Game theory
32%
Servers
31%
Authentication
25%
Proxy caches
23%
Network protocols
23%
Access control
22%
Intrusion detection
21%
Ad hoc networks
19%
Virtual machine
17%
Routing protocols
14%
Cloud computing
13%
Websites
12%
Petri nets
11%
Industry
11%
World Wide Web
11%
Security of data
10%
Feature extraction
10%
Costs
10%
Femtocell
9%
Congestion control (communication)
9%
Logic design
9%
Experiments
9%
National security
9%
Network architecture
9%
Machine learning
9%
Adaptive boosting
8%
Broadband networks
8%
Video on demand
8%
Long Term Evolution (LTE)
8%
Software defined networking
8%
Law enforcement
8%
Application programming interfaces (API)
8%
Video streaming
8%
Mobile computing
8%
Decision making
8%
HTTP
8%
Deep learning
7%
Linux
7%
Security systems
7%
Hidden Markov models
7%
Search engines
7%
Navigation systems
7%
State feedback
7%
Managers
7%
Testbeds
7%
Mathematics
Malware
60%
Broadcasting
40%
Vehicular Ad Hoc Networks
30%
Bandwidth
28%
Access Control
25%
Location Privacy
23%
Authentication
20%
Attack
18%
Video Streaming
16%
Ad Hoc Networks
15%
Trust Management
14%
Mobile Computing
14%
Security Policy
14%
Virtual Machine
14%
Privacy
13%
Privacy Preserving
13%
Intrusion Detection
13%
Cloud Computing
12%
Routing Protocol
12%
Harmonic
12%
Energy Efficient
12%
Safety
11%
Linux
11%
Waiting Time
11%
Search Engine
11%
Quality of Service
11%
Congestion Control
11%
Cryptanalysis
11%
Feature Extraction
11%
Anticipation
11%
Requirements
10%
Emergency
10%
Information Flow
10%
Interleaving
9%
Query
9%
Resources
9%
Intrusion Detection System
9%
Game Theory
8%
Traffic
7%
Training
7%
Broadcast
7%
Energy Consumption
7%
Strategy
7%
Vehicular Networks
7%
Game
6%
Learning
6%
Simulation
6%
Authorization
6%
Target
6%
N-gram
6%
Business & Economics
Ad Hoc Networks
12%
Anomaly Detection
12%
Feature Extraction
11%
Data Augmentation
11%
Web Pages
11%
Knowledge Discovery
9%
Trust Management
9%
Networking
8%
Wavelets
8%
World Wide Web
8%
Placement
7%
Enhancement
7%
Integrity
7%
Clustering
6%
Privacy
6%
Machine Learning
6%
Decision Making
6%
Deep Learning
6%
Trustworthiness
5%
Software
5%
Experiment
5%