跳至主導覽
跳至搜尋
跳過主要內容
國立陽明交通大學研發優勢分析平台 首頁
English
中文
首頁
人員
單位
研究成果
計畫
獎項
活動
貴重儀器
影響
按專業知識、姓名或所屬機構搜尋
查看斯高帕斯 (Scopus) 概要
黃 世昆
教授
資訊技術服務中心
https://orcid.org/0000-0002-6766-4683
電話
03-5712121#31703
電子郵件
skhuang
cs.nycu.edu
tw
網站
http://www.cs.nctu.edu.tw/~skhuang/
h-index
h10-index
h5-index
761
引文
11
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
121
引文
6
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
11
引文
2
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
1992 …
2020
每年研究成果
概覽
指紋
網路
計畫
(17)
研究成果
(51)
獎項
(1)
類似的個人檔案
(6)
如果您對這些純文本內容做了任何改變,很快就會看到。
指紋
查看啟用 Shih-Kun Huang 的研究主題。這些主題標籤來自此人的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
Engineering & Materials Science
Ant colony optimization
22%
Application programs
21%
Availability
19%
Big data
46%
Black-box testing
49%
Brain
14%
Broadcasting
17%
Coloring
20%
Computational efficiency
16%
Computer programming languages
34%
Computer software reusability
22%
Convolutional neural networks
15%
Costs
26%
Crime
20%
Cryptography
28%
Data privacy
17%
Defects
25%
Denial-of-service attack
43%
Education
14%
Electronic commerce
19%
Electronic document identification systems
31%
Engineers
23%
Engines
21%
Experiments
32%
Explosions
19%
Fish
18%
Graphical user interfaces
17%
Heuristic algorithms
16%
Hybrid systems
16%
Image watermarking
21%
Industry
22%
Information technology
15%
Machine learning
15%
Malware
18%
Mobile computing
14%
Modulation
20%
Multi agent systems
16%
Multicasting
21%
Object oriented programming
39%
Open Data
42%
Personal computers
16%
Recommender systems
17%
Scheduling
16%
Seed
17%
Software quality
78%
Software testing
84%
Static analysis
14%
Statistical methods
22%
Testing
100%
Watermarking
38%
Mathematics
Ant Colony System
13%
Attack
92%
Auctions
7%
Authenticated Encryption
28%
Certificate
21%
Confidentiality
29%
Configuration
26%
Corpus
22%
Crash
24%
Cryptosystem
9%
Delegation
9%
Demonstrate
10%
Denial of Service
64%
Digital Signature
8%
Electronic Commerce
26%
Fault
17%
Flow Control
7%
Framework
27%
Honeypot
12%
Image Watermarking
36%
Influence
14%
Java
23%
Lower bound
11%
Machine Learning
21%
Mining
21%
Modulation
25%
Multimedia
12%
Object-oriented
11%
Optimization Algorithm
18%
Overflow
14%
Programming
18%
Programming Languages
8%
Provable Security
27%
Proxy Signature
48%
Quality of Service
26%
Random Oracle Model
22%
Recommendation System
30%
Requirements
15%
Signature
22%
Signature Scheme
21%
Signcryption
59%
Software
29%
Software Components
29%
Software Quality
38%
Software Reuse
17%
Statistical Analysis
8%
Traffic
14%
Vision
21%
Watermark
59%
Watermarking
35%
Social Sciences
authenticity
8%
certification
14%
communication
9%
Confidentiality
34%
costs
19%
denial of services
52%
dispute
6%
electronic commerce
22%
engineer
5%
experiment
5%
integrity
7%
Internet
6%
learning
5%
neural network
20%
performance
6%
programming
30%
programming language
7%
recipient
14%
scheduling
9%
software
42%
threat
6%
time
5%
traffic
9%
traffic volume
8%
vulnerability
17%
vulnerable class
9%