跳至主導覽
跳至搜尋
跳過主要內容
國立中央大學 首頁
說明與常見問題
English
中文
首頁
人才檔案
研究單位
研究計畫
研究成果
資料集
榮譽/獲獎
學術活動
新聞/媒體
影響
按專業知識、姓名或所屬機構搜尋
查看斯高帕斯 (Scopus) 概要
陳 奕明
教授
資訊管理學系
電子郵件
cym
mgt.ncu.edu
tw
網站
https://cis.ncu.edu.tw/iTeacher/home/0x682b34dabbdcf4e7aea4453ec7a82bc0
h-index
570
引文
14
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
2003
2024
每年研究成果
概覽
指紋
網路
研究計畫
(1)
研究成果
(74)
類似的個人檔案
(6)
指紋
查看啟用 Yi-Ming Chen 的研究主題。這些主題標籤來自此人的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
Keyphrases
Vehicular Ad Hoc Networks
100%
Broadcast Scheme
77%
Malware
53%
Location Privacy
50%
Android Malware Detection
32%
Game Theoretic Approach
32%
Trust Management System
29%
Staircase
29%
World Wide Web
27%
Waiting Time
24%
Popular
23%
Privacy-enhanced
21%
Variable Bit Rate
21%
Authentication Scheme
19%
Access Control Mechanism
19%
Silent Period
18%
Beacon-based
18%
Malware Detection
18%
Trust Management
16%
Frequency Splitting
16%
Interaction Profiling
16%
Graph Mining
16%
Bipartite Graph
16%
Advanced Persistent Threat
14%
Virtual Machine
14%
Video Broadcasting
13%
Event Message
13%
Trustworthiness
13%
Traffic Safety
13%
Loss Anticipation
12%
Routing Protocol
12%
User-centric
12%
Cloud Computing
12%
Malware Attacks
12%
Proxy Cache
12%
P2P Network
12%
Privacy Enhancement
12%
Internal Attacks
12%
Malicious Domains
12%
Shapley Value
12%
False Positive Rate
11%
Live Video
11%
Long Sequence
10%
Android Application
10%
Bandwidth Limitation
10%
Transfer Rate
10%
High Resilience
10%
Network Traffic
10%
Cybercrime
10%
Collusion Attack
10%
Computer Science
Malware
50%
Location Privacy
50%
Trust Management
45%
Android Malware
43%
Experimental Result
42%
Vehicular Ad Hoc Network
40%
Malware Detection
40%
Bandwidth Requirement
31%
vehicular ad-hoc network
27%
ad-hoc network
24%
Video-on-Demand
23%
Broadband Network
23%
Variable Bit Rate
21%
authentication scheme
19%
Control Protocol
19%
Access Control
19%
Attackers
18%
Vehicular Network
16%
Bipartite Graph
16%
Malicious Domain
15%
Threat Intelligence
15%
P2P network
15%
Advanced Persistent Threat
15%
Machine Learning
14%
Learning System
14%
Virtual Machine
14%
Strategy Nash Equilibrium
14%
Network Traffic
13%
Video Broadcasting
13%
Peak Bandwidth
12%
Routing Protocol
12%
Intrusion Detection
12%
Traffic Analysis
12%
Loss of Packet
12%
Urban Environment
12%
Multimedia
12%
Cloud Computing
12%
Feature Extraction
12%
Web Page
12%
False Positive Rate
12%
Deep Learning Method
11%
System Calls
11%
Detection Rate
11%
Security Incident
10%
Android Application
10%
Colored Petri Net
9%
Wireless Networks
9%
Control Domain
9%
Cyber Attack
9%
Privacy Preserving
9%