跳至主導覽
跳至搜尋
跳過主要內容
國立陽明交通大學研發優勢分析平台 首頁
English
中文
首頁
人員
單位
研究成果
計畫
獎項
活動
貴重儀器
影響
按專業知識、姓名或所屬機構搜尋
查看斯高帕斯 (Scopus) 概要
黃 育綸
副教授
電控工程研究所
https://orcid.org/0000-0001-7618-0114
h-index
h10-index
h5-index
1246
引文
13
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
66
引文
4
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
7
引文
2
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
1999
2023
每年研究成果
概覽
指紋
網路
計畫
(33)
研究成果
(46)
獎項
(1)
類似的個人檔案
(6)
指紋
查看啟用 Yu-Lun Huang 的研究主題。這些主題標籤來自此人的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
Keyphrases
Analytic Hierarchy Process
100%
Obfuscation
96%
Embedded Operating System
78%
Process-based
72%
Industrial Internet of Things (IIoT)
72%
Control Flow Obfuscation
60%
Authentication Protocol
58%
Subscriber
55%
Risk Estimation
53%
Capability-Based Access Control (CapBAC)
48%
Secure Authentication
48%
Virtualization
48%
Key Distribution Scheme
48%
Risk Assessment Methods
48%
Universal Mobile Telecommunication System
48%
Risk Assessment
48%
Control System
48%
Virtual Machine
47%
Authentication Key Agreement Protocol
43%
Obfuscation Techniques
42%
Engineering Education System
36%
Cloud System
36%
Risk Assessment System
36%
Internet of Things
35%
Control Flow
35%
Channel Protection
33%
Pay TV
32%
Systems Engineering
32%
Machine Learning Models
32%
Process Control System
31%
Cloud Security
30%
Token
30%
IoT Cloud
30%
Virtualization Technology
29%
Computing Power
29%
Mobile Networks
27%
Authentication Server
27%
Access Control Model
26%
Physical Machine
26%
Bandwidth Utilization
25%
Vulnerability
24%
Secure Access Control
24%
Dual-autoencoder
24%
Key Delegation
24%
Authenticated Key Agreement
24%
Key Agreement Scheme
24%
Critical Environments
24%
Optimized Link State Routing
24%
Merchants
24%
Electronic Payment
24%
Computer Science
Analytic Hierarchy Process
100%
Embedded Operating System
78%
Assessment Model
77%
Obfuscation
77%
Authentication
72%
Control Flow
72%
Industrial Internet of Things
72%
Internet-Of-Things
62%
System Risk Assessment
60%
Virtual Machine
59%
Authentication Protocol
58%
Key Distribution
56%
Authentication Key
48%
Virtualizations
48%
Telecommunication System
48%
Assessment Method
48%
Virtualization Technology
39%
Engineering Education
36%
cloud system
36%
Mobile Network
32%
Control Engineer
32%
Testbed
32%
Wireless Network
32%
Cloud Security
30%
Access Control Policies
29%
Computing Power
29%
Real Time Performance
29%
Denial-of-Service
27%
Cloud Computing
27%
Reverse Engineering
25%
Network Address
24%
Electronic Content
24%
Electronic Payment
24%
Active Learning
24%
Control Parameter
24%
Cognitive Scientist
24%
Industrial Designer
24%
handover delay
24%
Intelligent Robots
24%
Security protocols
24%
Firefox
24%
Request Message
24%
Engineering Student
24%
Time Constraint
24%
Augmented Reality
24%
Computer Scientist
24%
Computer Control
24%
Intrusion Detection System
24%
Analytical Hierarchy Process
24%
Software Architecture
24%