


default search action
ICEA 2020: Gangwon, Korea
- ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12 - 15, 2020. ACM 2020, ISBN 978-1-4503-8304-2

- Nan-Kai Hsieh, Tsan-Ching Kang, Tzer-Long Chen, Jhih-Chung Chang, Min Chien Wang, Tzer-Shyong Chen, Yu-Fang Chung:

The Implementation of IoT-based Smart Laboratory Management System. 1:1-1:3 - Tzer-Long Chen, Nan-Kai Hsieh, Jhih-Chung Chang, Ming Chen Ho, Yu Ru Chang, Po-Ya Chuang:

The Implementation of Smart Aquarium System with Intelligent Sensors. 2:1-2:2 - I Fang Chang, Ya-Hsueh Chuang, Tzer-Long Chen, Yi Ping Yin, Yen Ni Liu, Tzer-Shyong Chen:

A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus. 3:1-3:2 - Ya-Hui Ou, Yu-Hsin Yu, Yu-Xi Chen, Zhen-Yu Wu:

Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks. 4:1-4:2 - Chuan-Gang Liu, Chin-Jui Wu, I-Hsien Liu

, Chi-Che Wu, Jung-Shian Li:
Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems. 5:1-5:6 - I-Hsien Liu

, Yung-Lin Chang, Jung-Shian Li, Chuan-Gang Liu:
Differential Privacy Protection with Group Onion Routing based on AI-based URL Classification. 6:1-6:6 - Chou-Cheng Chen, Yao-Lung Kuo, Chi-Hui Chiang:

MiningBreastCancer: Selection of Candidate Gene Associated with Breast Cancer via Comparison between Data Mining of TCGA and Text Mining of PubMed. 7:1-7:6 - Hung-Jen Chen, Chin-Chia Hsu, Chia-Hui Liu:

An intelligent patrol system for Industry 4.0 Smart Factory. 8:1-8:2 - O-Joun Lee

, Jin-Taek Kim, Eun-Soon You
:
Towards Story-based Summarization of Narrative Multimedia. 9:1-9:5 - Yueh-Shiu Lee, Chang-Yi Yang, Tsai-Yu Lai, Tzu-Hsuan Lin:

BlockChain Develops Student Positioning System on Campus. 10:1-10:2 - Yueh-Shiu Lee, I-Yun Chen, Tsung-Yao Lin, Yen-Chiao Chuang, Hsu-Jung Liu:

Developing a Model to Explore Consumer Buying Behaviors through Long Short-Term Memory. 11:1-11:3 - Yueh-Shiu Lee, Yen-Chiao Chuang, Mei-Mei Chang, Mei-Wen Huang:

A Clicks-and-Mortar Smart System. 12:1-12:2 - Wu-Chih Hu, Hsin-Te Wu, Jun-We Zhan, Ping-Hsin Hsieh:

Developing Intelligent Feeding Systems based on Deep Learning. 13:1-13:2 - Jo-Hung Yu, Meng-Tsung Lee, Jao-Chuan Lin, Chien-Hung Wu:

Training Analysis of Double Canoe Based on IOT. 14:1-14:3 - Yen-Chiao Chuang, Cheng-Lung Wu, I-Yun Chen, Chien-Hung Wu:

Construction of Diving Record Wearable Device Based on IOT. 15:1-15:3 - Ying Ling, Jo-Hung Yu, Chih-Chien Shen

, Chien-Hung Wu:
On the Establishment of E-referee for Sailing Ships Based on Deep Learning. 16:1-16:3 - Kuo Cheng Chung, Silvia Wan-Ju Liang:

Building Sustainable Business Indices for Hotel Industry from Green Supply Chain Perspective. 17:1-17:2 - Ying-Chih Chen, Kuo Cheng Chung:

Understand the public insurance purchase orientation through the triangle theory of love. 18:1-18:2 - Chia-Wen Tsai, Kuo Cheng Chung:

Understanding users' switching behavior of hypermarket marketing methods: An empirical study from the perspective of push-pull-mooring framework. 19:1-19:2 - Zhi-Yan Fang, Zhe-Wei Xiao, Chun-Wei Tsai:

An Effective Multi-Swarm Algorithm for Optimizing Hyperparameters of DNN. 20:1-20:6 - Zhe-Wei Xiao, Zhi-Yan Fang, Chun-Wei Tsai:

An Effective Optimizer based on Global and Local Searched Experiences for Short-term Electricity Consumption Forecasting. 21:1-21:6 - Daehyeon Bae, Jongbae Hwang, JaeCheol Ha:

Breaking a Masked AES Implementation Using a Deep Learning-based Attack. 22:1-22:5 - Ki-Wan Kang, Ki-Woong Park:

Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration. 23:1-23:5 - Tzu-Tsai Kao, Chun-Wei Tsai, Ming-Chao Chiang:

An Effective Algorithm based on Search Economics for Multi-Objective Optimization. 24:1-24:6 - Lie Yang, Shi-Xuan Shao, Chien-Erh Weng, Yung-Cheng Yao:

The Development of UAV-based Air Quality Monitor System. 25:1-25:2 - Yung-Cheng Yao, Xing-Rui Huang, Cheng-Yi Liu, Po-Wei Lin:

Intelligent Controlling System in Aquaculture. 26:1-26:2 - Yung-Cheng Yao, Yang-Chen Fan, Hsin-Fu Yu, Shih-Pang Chen:

A Smart Monitoring System in Fish Farm. 27:1-27:2 - Yunsang Joo, Seungwon Lee

, Hyoungju Kim, Pankoo Kim, Seongoun Hwang, Chang Choi:
Efficient healthcare service based on Stacking Ensemble. 28:1-28:5 - Namgyu Jung, Junho Yoon

, Vially Kazadi Mutombo, Seungyeon Lee, Jusuk Lee, Chang Choi:
Efficient data processing method for edge intelligence based on SVM. 29:1-29:6 - Doyeon Kim, Taejin Lee:

Anomaly detection in time-series data environment. 30:1-30:3 - Zhang-Han Zhuang, Ming-Chao Chiang:

The Whale Optimization Algorithm for Hyperparameter Optimization in Network-Wide Traffic Speed Prediction. 31:1-31:6 - Han-Byeol Park, Bo-Yeon Sim, Dong-Guk Han:

Machine Learning-Based Profiling Attack Method in RSA Prime Multiplication. 32:1-32:6 - Seong-Jin Kim, Ki-Woong Park:

Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment. 33:1-33:3 - Jiyoon Kim, Sangmin Lee, Daniel Gerbi Duguma

, Bonam Kim, Ilsun You:
Comments on "Securing implantable cardiac medical devices": Use of radio frequency energy harvesting. 34:1-34:5 - Junwon Kim, Jiho Shin, Jung-Taek Seo:

Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation. 35:1-35:7 - Daniel Gerbi Duguma

, Jiyoon Kim, Bonam Kim, Ilsun You:
A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System. 36:1-36:6 - Hyunpyo Choi

, Jiho Shin, Jung-Taek Seo:
A Study on the Digital Forensic Method for Decentralized Web Service. 37:1-37:6 - Jaejun Heo, Yonas Engida Gebremariam, Hoonyong Park, Bonam Kim, Ilsun You:

Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis. 38:1-38:6 - Namjun Kim, Chanmo Yang, Daebeom Cho, Seung Hyeon Geum, Ki-Woong Park:

CERT Training Platform over the Event-Recordable Container. 39:1-39:6 - HanSeop Lim, Taeho Lee, Seonghyuck Lim

, Jaeseong Han, Bo-Yeon Sim, Dong-Guk Han:
Fault Injection Method for Hardware-implemented AES without Artificial Triggering. 40:1-40:6 - Hyun Cheol Park, Sang-Woong Lee:

Reunion Block for High Magnification Histopathology Microscopic Image Analysis. 41:1-41:2 - Sahadev Poudel, Sang-Woong Lee:

Whole Slide Image Classification and Segmentation using Deep Learning. 42:1-42:2 - Mingyu Lee, Hanbyeol Kang, Junbeom Kwak, Donghyun Kim, Hyeonho Jeong, Jung-Taek Seo:

Proposed On-site Document Sharing System using FIDO. 43:1-43:6 - Daun Jung, Jiho Shin, Chaechang Lee, Kookheui Kwon, Jung-Taek Seo:

A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant. 44:1-44:7 - Sejin Kim, Taejin Lee:

XGBoost based Packer Identification study using Entry point. 45:1-45:3 - Joochan Lee, Hyunpyo Choi

, Jiho Shin, Jung-Taek Seo:
Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic. 46:1-46:6 - Janghoon Kim, Hyunpyo Choi

, Jiho Shin, Jung-Taek Seo:
Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning. 47:1-47:5 - Soonhong Kwon, Yangseo Choi, Jong-Hyouk Lee:

Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency. 48:1-48:6 - Soonhong Kwon, HeeDong Yang

, Manhee Lee, Jong-Hyouk Lee:
Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset. 49:1-49:4 - Wesley Huang, Kuei-Shu Hsu, Chia-Sui Wang, Yih-Feng Chang, Chia-Mao Yei:

An Image Processing Approach for Improving the Recognition of Cluster-like Spheroidized Carbides. 50:1-50:3 - Sae-Bom Lee, Joon Shik Lim, Jin-Soo Cho, Sang Yeob Oh, Taeg Keun Whangbo, Chang Choi:

A Classification method of Fake News based on Ensemble Learning. 51:1-51:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














