Security aspects of mobile phone virus: a critical survey DH Shih, B Lin, HS Chiang, MH Shih Industrial Management & Data Systems 108 (4), 478-494, 2008 | 106 | 2008 |
Stratified Random Sampling from Streaming and Stored Data TD Nguyen, MH Shih, D Srivastava, S Tirthapura, B Xu | 71 | 2019 |
An APN model for Arrhythmic beat classification HS Chiang, DH Shih, B Lin, MH Shih Bioinformatics 30 (12), 1739-1746, 2014 | 25 | 2014 |
Personal mobility pattern mining and anomaly detection in the GPS era DH Shih, MH Shih, DC Yen, JH Hsu Cartography and Geographic Information Science 43 (1), 55-67, 2016 | 24 | 2016 |
An implementation and evaluation of recommender systems for traveling abroad DH Shih, DC Yen, HC Lin, MH Shih Expert Systems with Applications 38 (12), 15344-15355, 2011 | 24 | 2011 |
A flick biometric authentication mechanism on mobile devices DH Shih, CM Lu, MH Shih 2015 international conference on informative and cybernetics for …, 2015 | 23 | 2015 |
Preventing return fraud in reverse logistics—A case study of ESPRES solution by Ethereum DH Shih, FC Huang, CY Chieh, MH Shih, TW Wu Journal of Theoretical and Applied Electronic Commerce Research 16 (6), 2170 …, 2021 | 16 | 2021 |
Dysarthria speech detection using convolutional neural networks with gated recurrent unit DH Shih, CH Liao, TW Wu, XY Xu, MH Shih Healthcare 10 (10), 1956, 2022 | 15 | 2022 |
Explore dependency syndrome on mobile phone user DH Shih, CC Chen, HS Chiang, MH Shih International Journal of Mobile Communications 10 (5), 475-489, 2012 | 14 | 2012 |
A secure multi-item e-auction mechanism with bid privacy DH Shih, DC Yen, CH Cheng, MH Shih computers & security 30 (4), 273-287, 2011 | 14 | 2011 |
Hyperledger fabric access control for industrial internet of things DH Shih, TW Wu, MH Shih, GW Chen, DC Yen Applied Sciences 12 (6), 3125, 2022 | 12 | 2022 |
Random sampling for group-by queries TD Nguyen, MH Shih, SS Parvathaneni, B Xu, D Srivastava, S Tirthapura 2020 IEEE 36th International Conference on Data Engineering (ICDE), 541-552, 2020 | 12 | 2020 |
Design and analysis of high performance crypt-NoSQL MH Shih, JM Chang 2017 IEEE Conference on Dependable and Secure Computing, 52-59, 2017 | 7 | 2017 |
Privacy preserving and performance analysis on not only SQL database aggregation in bigdata era DH Shih, FC Huang, WH Lai, MH Shih 2017 IEEE 2nd International Conference on Cloud Computing and Big Data …, 2017 | 6 | 2017 |
An international federal hyperledger fabric verification framework for digital COVID-19 vaccine passport DH Shih, PL Shih, TW Wu, SH Liang, MH Shih Healthcare 10 (10), 1950, 2022 | 5 | 2022 |
A framework of global credit-scoring modeling using outlier detection and machine learning in a p2p lending platform DH Shih, TW Wu, PY Shih, NA Lu, MH Shih Mathematics 10 (13), 2282, 2022 | 4 | 2022 |
APN model construction for malicious email detection HS Chiang, DH Shih, MH Shih, JM Chang Expert Systems with Applications 42 (13), 5696-5704, 2015 | 4 | 2015 |
Data mining methods in the detection of spam. DH Shih, HS Chiang, CS Lin, MH Shih Journal of Business & Management 14 (2), 2008 | 4 | 2008 |
A novel βSA ensemble model for forecasting the number of confirmed COVID-19 cases in the US DH Shih, TW Wu, MH Shih, MJ Yang, DC Yen Mathematics 10 (5), 824, 2022 | 3 | 2022 |
A Novel Auction Blockchain System with Price Recommendation and Trusted Execution Environment DH Shih, TW Wu, MH Shih, WC Tsai, DC Yen Mathematics 9 (24), 3214, 2021 | 3 | 2021 |