跳至主導覽
跳至搜尋
跳過主要內容
國立陽明交通大學研發優勢分析平台 首頁
English
中文
首頁
人員
單位
研究成果
計畫
獎項
活動
貴重儀器
影響
按專業知識、姓名或所屬機構搜尋
查看斯高帕斯 (Scopus) 概要
李 奇育
教授
Degree Program of Information and Communication for Technology Crime Investigation
開源智能聯網研究中心
https://orcid.org/0000-0002-1077-6801
h-index
h10-index
h5-index
811
引文
17
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
590
引文
14
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
172
引文
8
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
2007
2024
每年研究成果
概覽
指紋
網路
計畫
(11)
研究成果
(68)
獎項
(3)
類似的個人檔案
(6)
指紋
查看啟用 Chi-Yu Li 的研究主題。這些主題標籤來自此人的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
Keyphrases
Vulnerability
75%
Cellular Networks
74%
4G LTE
61%
Insecurity
46%
Wi-Fi
43%
Security Threats
41%
Mobile Edge Computing
38%
UAV
38%
Rate Adaptation
36%
Low Latency
35%
IP multimedia Subsystem
31%
Wi-Fi Networks
29%
Mobile Users
28%
VoLTE
26%
Software-defined Networking
25%
802.11n
23%
Control Plane Protocols
22%
Voice Call
22%
Edge Computing System
21%
Adversary
20%
Energy Saving
20%
IoT Devices
18%
Traffic Volume
18%
Mobile Data
18%
LTE Network
18%
Mobile Networks
18%
Smartphone
17%
Security Defense
17%
Circuit Switching
17%
4G Systems
17%
Edge-based
16%
WiGig
16%
Denial-of-service Attack
16%
Data Access
16%
Security Issues
16%
Internet of Things Devices
16%
World Wide Web
15%
Security Vulnerabilities
15%
Control Plane
15%
Latency-aware
15%
Data Service
15%
Multimedia Services
14%
Design Defects
14%
5G Smartphone
14%
Application Mobility
14%
Cellular IoT
14%
Migration Protocol
14%
Service Migration
14%
Single User
14%
Multiple Devices
14%
Computer Science
Cellular Network
100%
Wi-Fi
55%
Multi-Access Edge Computing
53%
Unmanned Aerial Vehicle
39%
Rate Adaptation
36%
Mobile Network
35%
Internet-Of-Things
34%
Data Access
33%
Authentication
31%
Multimedia
31%
Control-plane Protocol
22%
Software-Defined Networking
22%
Edge Computing
21%
Control Plane
20%
Denial-of-Service Attack
20%
Multimedia Service
19%
Data Services
18%
Global Positioning System
18%
Security Vulnerability
18%
Computing Platform
15%
Service Attack
15%
Internet of Things Device
14%
Security Design
14%
Multiple Device
14%
Wireless Mesh Network
14%
Fog Computing
14%
System Calls
14%
Artificial Intelligence
14%
Load Balancing
14%
Mobility Support
13%
Case Study
13%
Application Service
12%
Voice over Internet Protocol (VoIP)
11%
Evaluation Result
11%
Machine Learning
11%
Learning System
11%
Commercial off the Shelf
11%
Security Perspective
11%
Fundamental Problem
11%
Attackers
11%
Software-Defined Network
11%
spam
10%
Energy Efficient
10%
Experimental Result
10%
Wireless Networks
9%
Switched Domain
9%
Communication Network
9%
Model Checking
9%
Access Point
9%
Privacy Leakage
9%