| 年度 | 
				
			
			篇名 | 
				
			
			期刊等級 | 
				
			
			期刊名稱 | 
				
			
			第一作者 | 
				
			
			共同作者 | 
				
			
			卷期 | 
				
			
			起始頁 | 
				
			
			結束頁 | 
				
			
			總頁數 | 
				
			
			語言 | 
				
			
			相關網址 | 
				
		
	
				
			
					
				
				| 2024 | 
					
				
				Detecting Adversarial Examples of Fake News via the Neurons Activation State | 
					
				
				SCIE | 
					
				
				IEEE Transactions on Computational Social Systems | 
					
				
				Fan-Hsun Tseng | 
					
				
				Jiang-Yi Zeng, Hsin-Hung Cho, Kuo-Hui Yeh, Chi-Yuan Chen | 
					
				
				Vol. 11, No. 4 | 
					
				
				5199 | 
					
				
				5209 | 
					
				
				11 | 
					
				
				 | 
					
				
				 | 
					
		
	
				
			
					
				
				| 2024 | 
					
				
				Effective Adversarial Examples Detection Improves Screw Detection in Dust Pollution within Industry System | 
					
				
				SCIE | 
					
				
				IEEE Transactions on Consumer Electronics | 
					
				
				Fan-Hsun Tseng | 
					
				
				Jiang-Yi Zeng, Chi-Yuan Chen and Hsin-Hung Cho | 
					
				
				Vol. 70, No. 1 | 
					
				
				1963 | 
					
				
				1971 | 
					
				
				9 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2024 | 
					
				
				Wireless Device Identification Based on Transfer Learning | 
					
				
				SCIE | 
					
				
				Human-centric Computing and Information Sciences | 
					
				
				Chi-Yuan Chen | 
					
				
				Li-Hsien Lin | 
					
				
				Vol. 14, No. 27 | 
					
				
				1 | 
					
				
				16 | 
					
				
				16 | 
					
				
				 | 
					
				
				 | 
					
		
	
				
			
					
				
				| 2023 | 
					
				
				MiniNet: Dense Squeeze with Depthwise Separable Convolutions for Image Classification in Resource-constrained Autonomous Systems | 
					
				
				SCIE | 
					
				
				ISA Transactions | 
					
				
				Fan-Hsun Tseng | 
					
				
				Kuo-Hui Yeh, Fan-Yi Kao, and Chi-Yuan Chen | 
					
				
				Vol. 132 | 
					
				
				120 | 
					
				
				130 | 
					
				
				11 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2022 | 
					
				
				Improving Randomness of Symmetric Encryption for Consumer Privacy using Metaheuristic-based Framework | 
					
				
				SCIE | 
					
				
				IEEE Consumer Electronics Magazine | 
					
				
				Hsin-Hung Cho | 
					
				
				Min-Yan Tsai, Fan-Hsun Tseng, Hsin-Te Wu and Chi-Yuan Chen | 
					
				
				Vol. 11, No. 1 | 
					
				
				42 | 
					
				
				49 | 
					
				
				0 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2022 | 
					
				
				NetDAO: Toward Trustful and Secure IoT Networks without Central Gateways | 
					
				
				SCIE | 
					
				
				Symmetry | 
					
				
				Gang Liu | 
					
				
				Chi-Yuan Chen, Jing-Yuan Han, Yi Zhou and Guo-Biao He | 
					
				
				Vol. 14, No. 9 | 
					
				
				1 | 
					
				
				15 | 
					
				
				0 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2021 | 
					
				
				Detecting LDoS in NB-IoTs by using Metaheuristic-based CNN | 
					
				
				SCIE | 
					
				
				International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) | 
					
				
				Chi-Yuan Chen | 
					
				
				Hsin-Hung Cho, Min-Yan Tsai, Augustine Ho Hann Sii and Han-Chieh Chao | 
					
				
				vol. 37, no. 2 | 
					
				
				74 | 
					
				
				84 | 
					
				
				10 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2020 | 
					
				
				Emergency-level-based healthcare information offloading over fog network | 
					
				
				SCIE | 
					
				
				Peer-to-Peer Networking and Applications | 
					
				
				Cong Zhang | 
					
				
				Hsin-Hung Cho | 
					
				
				Vol. 13 | 
					
				
				16 | 
					
				
				26 | 
					
				
				10 | 
					
				
				 | 
					
				
				 | 
					
		
	
				
			
					
				
				| 2020 | 
					
				
				Fuzzy-Based 3-D Stream Traffic Lightweighting Over Mobile P2P Network | 
					
				
				SCIE | 
					
				
				IEEE Systems Journal | 
					
				
				Cong Zhang | 
					
				
				Hsin-Hung Cho, Timothy K. Shih and Han-Chieh Chao | 
					
				
				Vol. 14, No. 2 | 
					
				
				1840 | 
					
				
				1851 | 
					
				
				11 | 
					
				
				 | 
					
				
				 | 
					
		
	
				
			
					
				
				| 2020 | 
					
				
				Wifi Device Identification through Neural Network based on Channel State Information | 
					
				
				其他 | 
					
				
				Communications of the CCISA | 
					
				
				Li-Hsien Lin | 
					
				
				Hsin-Hung Cho, Chi-Yuan Chen | 
					
				
				Vol. 26, No. 4 | 
					
				
				34 | 
					
				
				47 | 
					
				
				13 | 
					
				
				 | 
					
				
				 | 
					
		
	
				
			
					
				
				| 2019 | 
					
				
				Bacteria-Inspired Network for 5G Mobile Communication | 
					
				
				SCIE | 
					
				
				IEEE Network | 
					
				
				Han-Chieh Chao | 
					
				
				Hsin-Hung Cho, Timothy K. Shih and Chi-Yuan Chen | 
					
				
				Vol. 33, No. 4 | 
					
				
				138 | 
					
				
				145 | 
					
				
				7 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2019 | 
					
				
				Multi-Objective Optimization for Heterogeneous Cellular Network Planning | 
					
				
				SCIE | 
					
				
				IET Communications | 
					
				
				Fan-Hsun Tseng | 
					
				
				Chi-Yuan Chen, and Han-Chieh Chao | 
					
				
				Vol. 13, No. 3 | 
					
				
				322 | 
					
				
				330 | 
					
				
				8 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2018 | 
					
				
				An Adaptive Emergency Broadcast Strategy for Vehicular Ad hoc Networks | 
					
				
				SCIE | 
					
				
				IEEE Sensors Journal | 
					
				
				Yao-Hsin Chou | 
					
				
				Ting-Hui Chu, Shu-Yu Kuo, and Chi-Yuan Chen | 
					
				
				Vol. 18, No. 12 | 
					
				
				4814 | 
					
				
				4821 | 
					
				
				7 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2018 | 
					
				
				Low energy aware communication process in IoT using the green computing approach | 
					
				
				EI | 
					
				
				IET Networks | 
					
				
				Suresh Kallam | 
					
				
				Rajasekhara Babu Madda, Chi-Yuan Chen, Rizwan Patan, Dhanaraj Cheelu | 
					
				
				Vol. 7, No. 4 | 
					
				
				258 | 
					
				
				264 | 
					
				
				6 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2018 | 
					
				
				Software Defined Wireless Sensor Networks (SDWSN): A Review on Efficient Resources, Applications and Technologies | 
					
				
				SCIE | 
					
				
				Journal of Internet Technology | 
					
				
				Babedi Betty Letswamotse | 
					
				
				Reza Malekian, Chi-Yuan Chen, and Kgotlaetsile Mathews Modieginyane | 
					
				
				Vol. 19, No. 5 | 
					
				
				1303 | 
					
				
				1313 | 
					
				
				10 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2018 | 
					
				
				Software defined wireless sensor networks and efficient congestion control | 
					
				
				EI | 
					
				
				IET Networks | 
					
				
				Babedi Betty Letswamotse | 
					
				
				Reza Malekian, Chi-Yuan Chen, and Kgotlaetsile Mathews Modieginyane | 
					
				
				Vol. 7, No. 6 | 
					
				
				460 | 
					
				
				464 | 
					
				
				4 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2017 | 
					
				
				Intelligent Vertical Handoff Decision Strategy Based On Network Performance Prediction and Consumer Surplus Value for Next Generation Wireless Networks | 
					
				
				EI | 
					
				
				IET Networks | 
					
				
				Dhanaraj Cheelu | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2017 | 
					
				
				Practical Integrity Preservation for Data Streaming in Cloud-Assisted Healthcare Sensor Systems | 
					
				
				SCI | 
					
				
				Computer Networks | 
					
				
				Chi-Yuan Chen | 
					
				
				Hsin-Min Wu, Lei Wang, and Chia-Mu Yu | 
					
				
				Vol. 129, No. 2017 | 
					
				
				472 | 
					
				
				480 | 
					
				
				8 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2017 | 
					
				
				Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data | 
					
				
				SCI | 
					
				
				IEEE Systems Journal | 
					
				
				Chia-Mu Yu | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2017 | 
					
				
				Quantum-Inspired Algorithm for Cyber-Physical Visual Surveillance Deployment Systems | 
					
				
				SCI | 
					
				
				Computer Networks | 
					
				
				Shu-Yu Kuo | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2017 | 
					
				
				Service Oriented Cloud VM Placement Strategy for Internet of Things | 
					
				
				SCIE | 
					
				
				IEEE Access | 
					
				
				Yi-Hsuan Chen | 
					
				
				 | 
					
				
				Vol. 5 | 
					
				
				25396 | 
					
				
				25407 | 
					
				
				11 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2015 | 
					
				
				CogIMS: An Active Service-oriented Cognitive Networks over IP Multimedia Subsystems | 
					
				
				SCI | 
					
				
				Cluster Computing | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2015 | 
					
				
				Hybrid Architecture Performance Analysis for Device-to-Device communication in 5G Cellular Network | 
					
				
				SCI | 
					
				
				ACM/Springer Mobile Networks and Applications (MONET) | 
					
				
				Zhijian Lin | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2015 | 
					
				
				Network Planning for Mobile Multi-hop Relay Networks | 
					
				
				SCI | 
					
				
				Wireless Communications and Mobile Computing | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2015 | 
					
				
				Proof of Ownership in Deduplicated Cloud Storage with Mobile Device Efficiency | 
					
				
				SCI | 
					
				
				IEEE Network | 
					
				
				Chia-Mu Yu | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2015 | 
					
				
				Quantum Cryptography and Its Applications over the Internet | 
					
				
				SCI | 
					
				
				IEEE Network | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2015 | 
					
				
				Service-Oriented Virtual Machine Placement Optimization for Green Data Center | 
					
				
				SCI | 
					
				
				ACM/Springer Mobile Networks and Applications (MONET) | 
					
				
				Fan-Hsun Tseng | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2015 | 
					
				
				Verifiable, Privacy-Assured, and Accurate Signal Collection for Cloud-Assisted Wireless Sensor Networks | 
					
				
				SCI | 
					
				
				IEEE Communications Magazine | 
					
				
				Chia-Mu Yu | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2014 | 
					
				
				A Rule-Based Dynamic Decision-Making Stock Trading System Based on Quantum-Inspired Tabu Search Algorithm | 
					
				
				SCI | 
					
				
				IEEE Access | 
					
				
				Yao-Hsin Chou | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2014 | 
					
				
				A Survey of Key Distribution in Wireless Sensor Networks | 
					
				
				SCI | 
					
				
				Security and Communication Networks | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2014 | 
					
				
				Controlled Bidirectional Quantum Secure Direct Communication | 
					
				
				其他 | 
					
				
				The Scientific World Journal | 
					
				
				Yao-Hsin Chou | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2014 | 
					
				
				Privacy-Preserving Power Request in Smart Grid Networks | 
					
				
				SCI | 
					
				
				IEEE Systems Journal | 
					
				
				Chia-Mu Yu | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2014 | 
					
				
				QoS-based active dropping mechanism for NGN video streaming optimization | 
					
				
				SCI | 
					
				
				The Knowledge Engineering Review (KER) | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2014 | 
					
				
				Quantum Secure Communication Network Protocol with Entangled Photons for Mobile Communications | 
					
				
				SCI | 
					
				
				ACM/Springer Mobile Networks and Applications (MONET) | 
					
				
				Yao-Hsin Chou | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2014 | 
					
				
				Survey on underwater delay/disruption tolerant wireless sensor network routing | 
					
				
				EI | 
					
				
				IET Wireless Sensor Systems | 
					
				
				Hsin-Hung Cho | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2013 | 
					
				
				Using GHZ-state for Multiparty Quantum Secret Sharing without Code Table | 
					
				
				SCI | 
					
				
				The Computer Journal | 
					
				
				Yao-Hsin Chou | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2012 | 
					
				
				Advanced Path-Migration Mechanism for Enhancing Signaling Efficiency in IP Multimedia Subsystem | 
					
				
				SCI | 
					
				
				KSII Transactions on Internet and Information Systems | 
					
				
				Kai-Di Chang | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2012 | 
					
				
				Classical and Quantum-Inspired Electromagnetism-like Mechanism and its applications | 
					
				
				SCI | 
					
				
				IET Control Theory & Applications | 
					
				
				Yao-Hsin Chou | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2012 | 
					
				
				Cloud-based Image Processing System with Priority-based Data Distribution Mechanism | 
					
				
				SCI | 
					
				
				Computer Communications | 
					
				
				Tin-Yu Wu | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2012 | 
					
				
				Distributed quantum entanglement sharing model for high-performance real-time system | 
					
				
				SCI | 
					
				
				Soft Computing | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2012 | 
					
				
				Enhanced Multiparty Quantum Secret Sharing of Classical Messages by using Entanglement Swapping | 
					
				
				SCI | 
					
				
				IET Information Security | 
					
				
				Yao-Hsin Chou | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2012 | 
					
				
				Establish a Secure and Trustworthy ICT Environment for Educational Systems: A Case Study | 
					
				
				SCI | 
					
				
				Journal of Intelligent Manufacturing | 
					
				
				Yu-Hsiu Chuang | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2012 | 
					
				
				Extending Emergency Services Coverage in Cooperative IMS Networks | 
					
				
				其他 | 
					
				
				International Journal of Autonomous and Adaptive Communications Systems (IJAACS) | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2012 | 
					
				
				Secure Centralized Spectrum Sensing for Cognitive Radio Networks | 
					
				
				SCI | 
					
				
				ACM/Springer Wireless Networks (WINET) | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2011 | 
					
				
				IoT-IMS Communication Platform for Future Internet | 
					
				
				其他 | 
					
				
				International Journal of Adaptive, Resilient and Autonomic Systems (IJARAS) | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2011 | 
					
				
				Quantum Entanglement and Non-Locality based Secure Computation for Future Communication | 
					
				
				SCI | 
					
				
				IET Information Security | 
					
				
				Yao-Hsin Chou | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2011 | 
					
				
				Resolving Inter-Domain Routing Policy Disputes at Run-time with Scalability Consideration | 
					
				
				SCI | 
					
				
				Information Fusion | 
					
				
				Huaming Guo | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2011 | 
					
				
				Transaction-Pattern-Based Anomaly Detection Algorithm for IP Multimedia Subsystem | 
					
				
				SCI | 
					
				
				IEEE Transactions on Information Forensics and Security | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2010 | 
					
				
				Acquiring Authentic Data in Unattended Wireless Sensor Networks | 
					
				
				SCI | 
					
				
				Sensors | 
					
				
				Chia-Mu Yu | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2010 | 
					
				
				Challenges to Next Generation Services in IP Multimedia Subsystem | 
					
				
				其他 | 
					
				
				Journal of Information Processing Systems | 
					
				
				Kai-Di Chang | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2010 | 
					
				
				Reconfigurable Software Defined Radio and its Applications | 
					
				
				EI | 
					
				
				Tamkang Journal of Science and Engineering (TKJSE) | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2009 | 
					
				
				Increasing Service Availability in a Wireless Home Network Environment | 
					
				
				SCI | 
					
				
				the Computer Journal | 
					
				
				Chi-Yi Lin | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2008 | 
					
				
				An Efficient End-to-end Security Mechanism for IP Multimedia Subsystem | 
					
				
				SCI | 
					
				
				Computer Communications | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  | 
					
		
	
				
			
					
				
				| 2008 | 
					
				
				Rule-based Intrusion Detection Mechanism for IP Multimedia Subsystem | 
					
				
				EI | 
					
				
				Journal of Internet Technology | 
					
				
				Chi-Yuan Chen | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
		
	
				
			
					
				
				| 2007 | 
					
				
				Cross-layer AAA for Various Heterogeneous Systems over the 4G Core Network Environments | 
					
				
				EI | 
					
				
				Journal of Internet Technology | 
					
				
				Tin-Yu Wu | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
		
	
				
			
					
				
				| 2007 | 
					
				
				Pave the Way to Future Smart Living Space - Cross-layer Enhanced AAA for 4G Core Network | 
					
				
				其他 | 
					
				
				International Journal of Smart Home (IJSH) | 
					
				
				Tin-Yu Wu | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				 | 
					
				
				  |