Fang-Yie, Leu
Fang-Yie, Leu
Verified email at - Homepage
Cited by
Cited by
Lifetime elongation for wireless sensor network using queue-based approaches
FC Jiang, DC Huang, CT Yang, FY Leu
The Journal of Supercomputing 59 (3), 1312-1335, 2012
Integrating grid with intrusion detection
FY Leu, JC Lin, MC Li, CT Yang, PC Shih
19th International Conference on Advanced Information Networking and …, 2005
Accessing medical image file with co-allocation HDFS in cloud
CT Yang, WC Shih, LT Chen, CT Kuo, FC Jiang, FY Leu
Future Generation Computer Systems 43, 61-73, 2015
A smartphone-based wearable sensors for monitoring real-time physiological data
CLH Fang −Yie Leu, Chia −Yin Ko, Ilsun You, Kim-Kwang Raymond Choo
Computers and Electrical Engineering 65 (1), 376–392, 2018
PFRF: An adaptive data replication algorithm based on star-topology data grids
MC Lee, FY Leu, Y Chen
Future generation computer systems 28 (7), 1045-1057, 2012
A performance-based grid intrusion detection system
FY Leu, JC Lin, MC Li, CT Yang
29th Annual International Computer Software and Applications Conference …, 2005
AES-128 based secure low power communication for LoRaWAN IoT environments
KL Tsai, YL Huang, FY Leu, I You, YL Huang, CH Tsai
IEEE Access 6, 45325-45334, 2018
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications
FY Leu
Journal of Network and Computer Applications 32 (5), 1073-1091, 2009
Residence energy control system based on wireless smart socket and IoT
KL Tsai, FY Leu, I You
IEEE Access 4, 2885-2894, 2016
Detection workload in a dynamic grid-based intrusion detection environment
FY Leu, MC Li, JC Lin, CT Yang
Journal of Parallel and Distributed Computing 68 (4), 427-442, 2008
An internal intrusion detection and protection system by using data mining and forensic techniques
FY Leu, KL Tsai, YT Hsiao, CT Yang
IEEE Systems Journal 11 (2), 427-438, 2015
Secure and efficient protocol for fast handover in 5G mobile Xhaul networks
V Sharma, I You, FY Leu, M Atiquzzaman
Journal of Network and Computer Applications 102, 38-57, 2018
An MFCC‐based text‐independent speaker identification system for access control
JC Liu, FY Leu, GL Lin, H Susanto
Concurrency and Computation: Practice and Experience 30 (2), e4255, 2018
An MFCC-based speaker identification system
FY Leu, GL Lin
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
Detecting dos and ddos attacks by using an intrusion detection and remote prevention system
FY Leu, ZY Li
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
A secure communication over wireless environments by using a data connection core
YL Huang, FY Leu, KC Wei
Mathematical and Computer Modelling 58 (5-6), 1459-1474, 2013
TTP based high-efficient multi-key exchange protocol
KL Tsai, YL Huang, FY Leu, I You
IEEE Access 4, 6261-6271, 2016
A wandering path tracking and fall detection system for people with dementia
CY Ko, FY Leu, IT Lin
2014 Ninth International Conference on Broadband and Wireless Computing …, 2014
A secure data encryption method employing a sequential–logic style mechanism for a cloud system
YL Huang, CR Dai, FY Leu, I You
International Journal of Web and Grid Services 11 (1), 102-124, 2015
A Secure ECC-based Electronic Medical Record System.
KL Tsai, FY Leu, TH Wu, S Chiou, YW Liu, HY Liu
J. Internet Serv. Inf. Secur. 4 (1), 47-57, 2014
The system can't perform the operation now. Try again later.
Articles 1–20