跳至主導覽
跳至搜尋
跳過主要內容
國立陽明交通大學研發優勢分析平台 首頁
English
中文
首頁
人員
單位
研究成果
計畫
獎項
活動
貴重儀器
影響
按專業知識、姓名或所屬機構搜尋
查看斯高帕斯 (Scopus) 概要
黃 育綸
副教授
電控工程研究所
https://orcid.org/0000-0001-7618-0114
h-index
h10-index
h5-index
1258
引文
13
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
67
引文
4
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
8
引文
2
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
1999
2023
每年研究成果
概覽
指紋
網路
計畫
(33)
研究成果
(46)
獎項
(1)
類似的個人檔案
(6)
指紋
查看啟用 Yu-Lun Huang 的研究主題。這些主題標籤來自此人的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
Keyphrases
Access Control Model
26%
Analytic Hierarchy Process
100%
Authenticated Key Agreement
24%
Authentication Key Agreement Protocol
43%
Authentication Protocol
58%
Authentication Server
27%
Bandwidth Utilization
25%
Capability-Based Access Control (CapBAC)
48%
Channel Protection
33%
Cloud Security
30%
Cloud System
36%
Computing Power
29%
Control Flow
35%
Control Flow Obfuscation
60%
Control System
48%
Critical Environments
24%
Dual-autoencoder
24%
Electronic Payment
24%
Embedded Operating System
78%
Engineering Education System
36%
Industrial Internet of Things (IIoT)
72%
Internet of Things
35%
IoT Cloud
30%
Key Agreement Scheme
24%
Key Delegation
24%
Key Distribution Scheme
48%
Machine Learning Models
32%
Merchants
24%
Mobile Networks
27%
Obfuscation
96%
Obfuscation Techniques
42%
Optimized Link State Routing
24%
Pay TV
32%
Physical Machine
26%
Process Control System
31%
Process-based
72%
Risk Assessment
48%
Risk Assessment Methods
48%
Risk Assessment System
36%
Risk Estimation
53%
Secure Access Control
24%
Secure Authentication
48%
Subscriber
55%
Systems Engineering
32%
Token
30%
Universal Mobile Telecommunication System
48%
Virtual Machine
47%
Virtualization
48%
Virtualization Technology
29%
Vulnerability
24%
Computer Science
Access Control Policies
29%
Active Learning
24%
Analytic Hierarchy Process
100%
Analytical Hierarchy Process
24%
Assessment Method
48%
Assessment Model
77%
Augmented Reality
24%
Authentication
72%
Authentication Key
48%
Authentication Protocol
58%
Cloud Computing
27%
Cloud Security
30%
cloud system
36%
Cognitive Scientist
24%
Computer Control
24%
Computer Scientist
24%
Computing Power
29%
Control Engineer
32%
Control Flow
72%
Control Parameter
24%
Denial-of-Service
27%
Electronic Content
24%
Electronic Payment
24%
Embedded Operating System
78%
Engineering Education
36%
Engineering Student
24%
Firefox
24%
handover delay
24%
Industrial Designer
24%
Industrial Internet of Things
72%
Intelligent Robots
24%
Internet-Of-Things
62%
Intrusion Detection System
24%
Key Distribution
56%
Mobile Network
32%
Network Address
24%
Obfuscation
77%
Real Time Performance
29%
Request Message
24%
Reverse Engineering
25%
Security protocols
24%
Software Architecture
24%
System Risk Assessment
60%
Telecommunication System
48%
Testbed
32%
Time Constraint
24%
Virtual Machine
59%
Virtualization Technology
39%
Virtualizations
48%
Wireless Network
32%