Showing
1 - 14
results of
14
for search '
Kuo,Wen-Chung
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Kuo,Wen-Chung
Showing
1 - 14
results of
14
for search '
Kuo,Wen-Chung
'
, query time: 0.11s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
The study on Visual Design in Networt of Museum-In Example of Creative Design of「Betou Hot Spring Museum」
by
Kuo
-
wen
Chung
,
鍾國文
Published 2004
Get full text
Others
2
Research on Vulnerability Detection Platform for iOS Application
by
Qiu,Zhen-Yu
,
邱振宇
Published 2019
Other Authors:
“
...
Kuo
,
Wen
-
Chung
...
”
Get full text
Others
3
Secret Image Sharing Scheme Based on General Exploiting Modification Direction of Data Hiding
by
CHEN, YI-JIUN
,
陳怡君
Published 2019
Other Authors:
“
...
KUO
,
WEN
-
CHUNG
...
”
Get full text
Others
4
Study on Android Hybrid Malware Detection Based on Machine Learning
by
LIU, TSUNG-PING
,
劉宗評
Published 2018
Other Authors:
“
...
KUO
,
WEN
-
CHUNG
...
”
Get full text
Others
5
Research of Applying Convolutional Neural Network to Android Malware Detection
by
LIN, YU-PIN
,
林裕斌
Published 2018
Other Authors:
“
...
KUO
,
WEN
-
CHUNG
...
”
Get full text
Others
6
Study on Security Enhancing of Generalized Exploiting Modification Directions in Data Hiding
by
Ren-Jun Xiao
,
蕭任均
Published 2018
Other Authors:
“
...
Kuo
,
Wen
-
Chung
...
”
Get full text
Others
7
Steganography Based on Modulus Algorithms
by
TSAI, HAN-WEI
,
蔡瀚緯
Published 2017
Other Authors:
“
...
KUO
,
WEN
-
CHUNG
...
”
Get full text
Others
8
Study on Novel Adaptive Data Hiding Schemes
by
WENG, YI-CHUN
,
翁奕鈞
Published 2017
Other Authors:
“
...
KUO
,
WEN
-
CHUNG
...
”
Get full text
Others
9
A Novel Chaotic Maps Formula for Multi-users Environment Protocol
by
Tsai, Cheng-Chun
,
蔡政均
Published 2017
Other Authors:
“
...
Kuo
,
Wen
-
Chung
...
”
Get full text
Others
10
Authentication Protocol based on Lagrange Polynomial for a Multi-server Environment
by
Shih, Po-Wei
,
施博偉
Published 2014
Other Authors:
“
...
Kuo
,
Wen
-
Chung
...
”
Get full text
Others
11
Study on Developments and Applications of General Exploiting Modification Direction Steganography
by
Wang, Chun-Cheng
,
王軍証
Published 2017
Other Authors:
“
...
Kuo
,
Wen
-
Chung
...
”
Get full text
Others
12
Study on Android Dynamic Malicious Behavior Detection and Classification
by
Chen,Jhong-Sin
,
陳忠信
Published 2016
Other Authors:
“
...
Kuo
,
Wen
-
Chung
...
”
Get full text
Others
13
Study on the Adaptive Data Hiding Scheme Based on MGEMD
by
LI,JYUN-JIA
,
李峻嘉
Published 2016
Other Authors:
“
...
Kuo
,
Wen
-
Chung
...
”
Get full text
Others
14
Business strategy analysis for PCB industry:Under the recent operating environment in the areas of Taiwan & China
by
ChunChin Hsieh
,
謝春進
Published 2003
Other Authors:
“
...
Kuo
,
Wen
-
Chung
...
”
Get full text
Others
Search Tools:
Get RSS Feed
—
Email this Search
Loading...