- Privacy-Preserving Technologies in Data
- Advanced Authentication Protocols Security
- Radiomics and Machine Learning in Medical Imaging
- Cryptography and Data Security
- Internet Traffic Analysis and Secure E-voting
- User Authentication and Security Systems
- Biometric Identification and Security
- Lung Cancer Diagnosis and Treatment
- Innovative Teaching Methods
- Caching and Content Delivery
- Educational Games and Gamification
- Smart Grid Security and Resilience
- Engineering Applied Research
- Child Development and Digital Technology
- Integrated Circuits and Semiconductor Failure Analysis
- Education and Critical Thinking Development
- Semiconductor materials and devices
- Software-Defined Networks and 5G
- Advancements in Semiconductor Devices and Circuit Design
- Security in Wireless Sensor Networks
- IPv6, Mobility, Handover, Networks, Security
- HIV, Drug Use, Sexual Risk
- Advanced Memory and Neural Computing
- Mobile Health and mHealth Applications
- Child and Animal Learning Development
Taichung Veterans General Hospital
2023-2025
National Yang Ming Chiao Tung University
2025
National Central University
2022-2024
Guangdong University of Technology
2023
National Taiwan Normal University
2012-2022
Taiwan Nurses Association
2019
National Sun Yat-sen University
2006-2018
Institute of Information Science, Academia Sinica
2014-2018
National Chung Shan Institute of Science and Technology
2017
Academia Sinica
2015
<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> A three-factor authentication scheme combines biometrics with passwords and smart cards to provide high-security remote authentication. Most existing schemes, however, rely on verify biometric characteristics. The advantage of this approach is that the user's data not shared server. But disadvantage server must trust card perform proper which leads various vulnerabilities. To achieve truly secure...
The accurate diagnosis and staging of lymph node metastasis (LNM) are crucial for determining the optimal treatment strategy head neck cancer patients. We aimed to develop a 3D Resnet model investigate its prediction value in detecting LNM. This study enrolled 156 patients analyzed 342 nodes segmented from surgical pathologic reports. patients' clinical pathological data related primary tumor site pathology T N stages were collected. To predict LNM, we developed dual-pathway incorporating...
It is necessary to authenticate users who attempt access resources in Wireless Local Area Networks (WLANs). Extensible Authentication Protocol (EAP) an authentication framework widely used WLANs. mechanisms built on EAP are called methods. The requirements for methods WLAN have been defined RFC 4017. To achieve user efficiency and robust security, lightweight computation forward secrecy, excluded 4017, desired authentication. However, all protocols designed WLANs so far do not satisfy of the...
Researchers suggest that game-based learning (GBL) can be used to facilitate mathematics learning. However, empirical GBL research targets young children is still limited. The purposes of the study develop a scenario-based digital game promote children's route-planning ability, empirically explore performance in route planning through game, and probe technology acceptance game. A total 71 participated study, both qualitative quantitative approaches were used, including an interview analysis...
Local user access is important to machine-to-machine (M2M) communication because it possesses unique advantages over remote in that offers instant services, provides reliable connection, and offloads the traffic of M2M networks. control also essential for authorized users devices. In this paper, we propose a local authentication scheme (LACS), which allows devices locally verify rights privileges users. particular, property device heterogeneity considered our LACS. The resource-constrained...
Our study aimed to harness the power of CT scans, observed over time, in predicting how lung adenocarcinoma patients might respond a treatment known as EGFR-TKI. Analyzing scans from 322 advanced stage cancer patients, we identified distinct image-based patterns. By integrating these patterns with comprehensive clinical information, such gene mutations and regimens, our predictive capabilities were significantly enhanced. Interestingly, precision predictions, particularly related radiomics...
Purpose Bulky tumor remains as a challenge to surgery, chemotherapy and conventional radiation therapy. Hence, in efforts overcome this challenge, we designed novel therapeutic paradigm via strategy of Stereotactic Central/Core Ablative Radiation Therapy (SCART).), which is based on the principles SBRT (stereotactic body therapy spatially fractionated (SFRT). We intend safely deliver an ablative dose core with low at edge. The purpose phase 1 study was determine dose-limiting toxicities...
Software-Defined Networking and Network Function Virtualisation (SDN/NFV) can provide flexible resource allocation to support innovative security solutions in a central manner. To mitigate HTTP DDoS attacks, shuffling-based moving target defense has been regarded as one of the most effective ways by redirecting user traffic among group virtualized service functions. However, previous work did not notice that frequent changes will significantly intensify control overhead SDN. In this paper,...
Deep packet filtering (DPF) has been demonstrated as an essential technique for effective fine-grained access controls, but it is commonly recognized that the may invade individual privacy of users. Secure computation can address tradeoff between and DPF functionality, current solutions limit scalability network due to intensive overheads large connection setup delay, especially latest paradigm, function virtualisation (NFV) software-defined (SDN). In this paper, therefore, we propose a...
More and more researchers combine biometrics with passwords smart cards to design remote authentication schemes for the purpose of high-degree security. However, in most these proposed literature so far, biometric characteristics are verified only, not servers, during processes. Although this kind can prevent data users from being known it will result that they real three-factor therefore some security flaws may occur since servers do indeed verify factor biometrics. In paper we propose a...
Articulation problems seriously reduce speech intelligent and communication affect person's interpersonal communication, personality, social adaptive capacity, learning ability. In the clinical protocol, language therapist utilizes experience to individualized assessment, treatment, training. However, manpower of therapists assistant instruments are insufficient. this paper, an articulation assessment training system is proposed assist disorders. The errors in phonetic analyzed modeled by...
The privacy issue of online social networks (OSNs) has been getting attention from the public, especially when data caused disagreement between users and OSN providers. While providers utilize users' as a commercial usage to make profit; on other hand, feel their violated by such behavior. In this paper, we propose preserving protocol for sharing in OSNs, where provider cannot retrieve content while can efficiently add or remove contact flexibly perform access control. Moreover, prove that...
With the ubiquity of social networks and mobile devices, various new applications for impromptu group formation communications have emerged recently, such as Meetup, Plancast, Yahoo! Upcoming, Eventbrite Epinions. Among those important applications, finding a dense subgraph in network plays crucial role, but current algorithms are only designed online networks. Different from networks, no central repository is available (MSNs). Finding distributed manner without compromising individual...
There are increasing opportunities for learners and instructors in different education level to engage Internet-based or Internet assisted learning instruction, therefore, it is important explore pre-service in-service preschool teachers' attitudes self-efficacy. This paper explores 1210 Taiwanese teachers, including 673 teachers 537 Attitude Scale (IAS) Self-efficacy (ISS) were conducted assess their self-efficacy toward the Internet. Exploratory factor analyses indicated adequate...
We investigate the inorganic/organic hybrid vertical phototransistor (VPT) by integrating an atomic layer deposition-processed ZnO (ALD-ZnO) transistor with a prototype poly(3-hexylthiophene):[6,6]-phenyl-C
A double HfZrO <inf xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</inf> (HZO) ferroelectric field-effect transistor (FeFET) is demonstrated with ultra-low operating voltage as |V xmlns:xlink="http://www.w3.org/1999/xlink">P/E</inf> | = 3 V to achieve multilevel cell (MLC) nonvolatile memory (NVM). Compared a single FE-HZO FeFET, the metal/ferroelectric/metal/ferroelectric/Si (MFMFS) structure results not only in reduction of , but also provides...
With the improvement of internet technology in health applications, utilization and social media as new survey methodologies recruitment source for research participants have been encouraged, yet evidence feasibility people living with HIV (PLHIV) study is still lacking. We conducted a cross-sectional to determine whether there are differences among PLHIV recruited from networks health-care systems using an stigma discrimination questionnaire. The result revealed that were younger, more...
The assistive hearing devices are the only aids to help subjects with loss use their residual hearing. However, performance of those is closely dependent on auditory training. To develop handheld based personal training system perceptional discrimination analysis and automatic test item generation very helpful for loss. Besides, it would ease burden speech-language pathologists in developing a In this study, mel-frequency cepstrum coefficients speech recognition applied objectively estimate...
The contact process optimization of 40nm node has been achieved through co-optimization etch process, wet clean and glue layer film stack. In this study, it is found that the optimized can improve queue time window from to prevent polymer buildup inside for yield loss. wafer improvement strip reduce protrusion at interface ILD oxide CESL SiN, one root causes potential reliability issue due poly shorting. And increase thickness will square resistance, but lead high resistance shared on poly....
This paper proposes an energy-efficient private matching for secure two-party computation, called SafeMatch, in mobile social networks (MSNs). The proposed SafeMatch utilizes locality sensitive hashing (LSH) to sample the data and protects samples with cryptographic hash functions one-time padding. Given acceptable tolerance rate error rate, our provides lightweight computation cost regardless size of set. To guarantee soundness we define its privacy prove security. Empirical experiment...