default search action
I-En Liao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Chun-Tsai Chien, Chien-Lung Wang, I-En Liao, Sying-Jyan Wang:
Implementing OIML R46 Communication Unit for DLMS/COSEM Security Suite 1 and Passing CTT V3.1 Test. ICNSC 2023: 1-6 - [c23]Tzu-Hsuan Huang, Chun-Tsai Chien, Chien-Lung Wang, I-En Liao:
The Implementation of an HSM-Based Smart Meter for Supporting DLMS/COSEM Security Suite 1. IoTBDS 2023: 123-130 - 2020
- [j29]Wen-Chiao Hsu, I-En Liao:
UCIS-X: An Updatable Compact Indexing Scheme for Efficient Extensible Markup Language Document Updating and Query Evaluation. IEEE Access 8: 176375-176392 (2020)
2010 – 2019
- 2019
- [c22]Chun-Pi Chang, Wen-Chiao Hsu, I-En Liao:
Anomaly Detection for Industrial Control Systems Using K-Means and Convolutional Autoencoder. SoftCOM 2019: 1-6 - 2018
- [j28]Xinyu Hu, Pei-Yun Sabrina Hsueh, Ching-Hua Chen, Keith M. Diaz, Faith Parsons, I-En Liao, M. Qian, Ying-Kuen K. Cheung:
An interpretable health behavioral intervention policy for mobile device users. IBM J. Res. Dev. 62(1): 4:1-4:6 (2018) - 2017
- [j27]Jyun-Yao Huang, Wei-Chih Hong, Po-Shin Tsai, I-En Liao:
A model for aggregation and filtering on encrypted XML streams in fog computing. Int. J. Distributed Sens. Networks 13(5) (2017) - 2016
- [j26]I-Hui Li, I-En Liao, Jin-Han Lin, Jyun-Yao Huang:
An Efficient Ensemble Sequence Classifier. J. Softw. 11(2): 133-147 (2016) - 2015
- [j25]Lun-Chi Chen, Ping-Jen Kuo, I-En Liao:
Ontology-based library recommender system using MapReduce. Clust. Comput. 18(1): 113-121 (2015) - [c21]Ren-Hao Pan, Lin-Yu Tseng, I-En Liao, Chien-Lung Chan, K. Robert Lai, Kai-Biao Lin:
Design of an NGS MicroRNA predictor using multilayer hierarchical MapReduce framework. DSAA 2015: 1-8 - 2014
- [j24]Ke-Chung Lin, I-En Liao, Tsui-Ping Chang, Shu-Fan Lin:
A frequent itemset mining algorithm based on the Principle of Inclusion-Exclusion and transaction mapping. Inf. Sci. 276: 278-289 (2014) - [j23]I-Hui Li, Jyun-Yao Huang, I-En Liao:
Mining Sequential Pattern Changes. J. Inf. Sci. Eng. 30(4): 973-990 (2014) - [j22]Sheng-Da Hsu, Yu-Ting Tseng, Sirjana Shrestha, Yu-Ling Lin, Anas Khaleel, Chih-Hung Chou, Chao-Fang Chu, Hsi-Yuan Huang, Ching-Min Lin, Shu-Yi Ho, Ting-Yan Jian, Feng-Mao Lin, Tzu-Hao Chang, Shun-Long Weng, Kuang-Wen Liao, I-En Liao, Chun-Chi Liu, Hsien-Da Huang:
miRTarBase update 2014: an information resource for experimentally validated miRNA-target interactions. Nucleic Acids Res. 42(Database-Issue): 78-85 (2014) - [j21]David T. W. Tzeng, Yu-Ting Tseng, Matthew Ung, I-En Liao, Chun-Chi Liu, Chao Cheng:
DPRP: a database of phenotype-specific regulatory programs derived from transcription factor binding data. Nucleic Acids Res. 42(Database-Issue): 178-183 (2014) - [c20]Lun-Chi Chen, I-En Liao, Chi-Hao Chen:
News Event Detection Using Random Walk with Restart. ICS 2014: 611-620 - 2013
- [j20]Jen-Yan Huang, I-En Liao, Yu-Fang Chung, Kuen-Tzung Chen:
Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. Inf. Sci. 231: 32-44 (2013) - [j19]Wen-Chiao Hsu, I-En Liao:
CIS-X: A compacted indexing scheme for efficient query evaluation of XML documents. Inf. Sci. 241: 195-211 (2013) - [c19]Wen-Chiao Hsu, Jyun-Yao Huang, Chi-Hao Chen, Chien-Yu Su, Hsiao-Chen Shih, Tzu-Ya Liao, I-En Liao:
A cloud service for the evaluation of company's financial health using XBRL-based financial statements. IEEE BigData 2013: 10-14 - [c18]Lun-Chi Chen, Ping-Jen Kuo, I-En Liao, Jyun-Yao Huang:
Scaling Out Recommender System for Digital Libraries with MapReduce. GPC 2013: 40-47 - [c17]Jyun-Yao Huang, Cheng-Kang Chiang, I-En Liao:
An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage Environment. GPC 2013: 453-463 - [c16]I-Hui Li, Jyun-Yao Huang, I-En Liao, Jin-Han Lin:
A Sequence Classification Model Based on Pattern Coverage Rate. GPC 2013: 737-745 - [c15]I-En Liao, Wen-Chiao Hsu, Chia-Fang Li:
EFilter: An Efficient Filter for Supporting Twig Query Patterns in XML Streams. DCNET/ICE-B/OPTICS 2013: 75-82 - 2012
- [j18]Shu-Ling Shieh, I-En Liao:
A new approach for data clustering and visualization using self-organizing maps. Expert Syst. Appl. 39(15): 11924-11933 (2012) - [c14]Wen-Chiao Hsu, I-En Liao, Hsiao-Chen Shih:
A Cloud Computing Implementation of XML Indexing Method Using Hadoop. ACIIDS (3) 2012: 256-265 - [c13]Wen-Chiao Hsu, I-En Liao, Pei-Hua Lu:
Supporting Efficient XML Query Evaluation Using Double Indexes. AINA Workshops 2012: 197-202 - 2011
- [j17]Jen-Yan Huang, I-En Liao, Hao-Wen Tang:
A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j16]Ke-Chung Lin, I-En Liao, Zhi-Sheng Chen:
An improved frequent pattern growth method for mining association rules. Expert Syst. Appl. 38(5): 5154-5161 (2011) - [j15]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
On the Security of Self-Certified Public Keys. Int. J. Inf. Secur. Priv. 5(2): 54-60 (2011) - [j14]Hsien-Wei Yang, I-En Liao, Chaur-Chin Chen:
Reversible Data Hiding Based on Median Difference Histogram. J. Inf. Sci. Eng. 27(2): 577-593 (2011) - [j13]Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang:
An efficient authentication protocol for mobile communications. Telecommun. Syst. 46(1): 31-41 (2011) - [c12]Jyun-Yao Huang, I-En Liao, Cheng-Kang Chiang:
Efficient Identity-Based Key Management for Configurable Hierarchical Cloud Computing Environment. ICPADS 2011: 883-887 - 2010
- [j12]I-En Liao, Wen-Chiao Hsu, Ming-Shen Cheng, Li-Ping Chen:
A library recommender system based on a personal ontology model and collaborative filtering technique for English collections. Electron. Libr. 28(3): 386-400 (2010) - [c11]Kuo-Fong Kao, I-En Liao, Jia-Siang Lyu:
An indoor location-based service using access points as signal strength data collectors. IPIN 2010: 1-6 - [c10]Kuo-Fong Kao, I-En Liao, Jia-Siang Lyu:
An indoor location-based service using access points as signal strength data collectors. IPIN 2010: 1 - [c9]I-En Liao, Wen-Chiao Hsu, Yu-Lin Chen:
An Efficient Indexing and Compressing Scheme for XML Query Processing. NDT (1) 2010: 70-84
2000 – 2009
- 2009
- [j11]Kuo-Fong Kao, I-En Liao, Yueh-Chia Li:
Detecting rogue access points using client-side bottleneck bandwidth analysis. Comput. Secur. 28(3-4): 144-152 (2009) - [j10]Shu-Chuan Liao, Kuo-Fong Kao, I-En Liao, Hui-Lin Chen, Shu-O Huang:
PORE: a personal ontology recommender system for digital libraries. Electron. Libr. 27(3): 496-508 (2009) - [j9]Shu-Ling Shieh, I-En Liao, Kuo-Feng Hwang, Heng-Yu Chen:
An Efficient Initialization Scheme for SOM Algorithm Based on Reference Point and Filters. IEICE Trans. Inf. Syst. 92-D(3): 422-432 (2009) - [j8]Shu-Ling Shieh, I-En Liao:
A New Clustering Validity Index for Cluster Analysis Based on a Two-Level SOM. IEICE Trans. Inf. Syst. 92-D(9): 1668-1674 (2009) - [j7]Kuo-Fong Kao, I-En Liao:
An index selection method without repeated optimizer estimations. Inf. Sci. 179(13): 2263-2272 (2009) - [c8]I-En Liao, Ke-Chung Lin, Hong-Bin Chen:
Mining Frequent Itemsets by Transaction Decomposition with Itemset Clustering. DMIN 2009: 18-24 - [c7]Hsien-Wei Yang, I-En Liao, Chaur-Chin Chen:
Reversible data hiding based on grayscale value histogram with optimal multiple pairs of crests and troughs. ICOIN 2009: 1-5 - 2008
- [j6]I-En Liao, Kuo-Fong Kao:
Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information. Inf. Sci. 178(4): 1049-1068 (2008) - [j5]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
A new authentication protocol based on pointer forwarding for mobile communications. Wirel. Commun. Mob. Comput. 8(5): 661-672 (2008) - [c6]I-En Liao, Shu-Ling Shieh, Hui-Ching Chen:
An Evolutionary Classifier Based on Adaptive Resonance Theory Network II and Genetic Algorithm. ISDA (1) 2008: 318-322 - [c5]I-Hui Li, I-En Liao, Feng-Nien Wu:
A traffic load-aware energy efficient protocol for wireless sensor networks. Mobility Conference 2008: 5 - 2006
- [j4]I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang:
A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4): 727-740 (2006) - [j3]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments. IEEE Trans. Ind. Electron. 53(5): 1683-1687 (2006) - [c4]I-En Liao, Kuo-Fong Kao, Ke-An Chen:
WLAN Location-Aware Application Based on Accumulated Orientation Strength Algorithm. EuroSSC 2006: 204-217 - [c3]I-En Liao, Shu-Chuan Liao, Kuo-Fong Kao, Ine-Fei Harn:
A Personal Ontology Model for Library Recommendation System. ICADL 2006: 173-182 - [c2]I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang:
Identity-based deniable authentication protocol from pairings. IMSA 2006: 112-114 - 2005
- [j2]Kuo-Feng Hwang, I-En Liao:
Two attacks on a user friendly remote authentication scheme with smart cards. ACM SIGOPS Oper. Syst. Rev. 39(2): 94-96 (2005) - 2004
- [j1]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
A server assisted authentication protocol for detecting error vectors. ACM SIGOPS Oper. Syst. Rev. 38(2): 93-96 (2004)
1980 – 1989
- 1989
- [c1]I-En Liao, Ming T. Liu:
Incremental Protocol Verfication Using Deductive Database Systems. ICDE 1989: 216-223
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint