跳至主導覽
跳至搜尋
跳過主要內容
國立臺灣師範大學 首頁
專家資料申請/更新
English
中文
首頁
個人檔案
研究單位
研究成果
研究計畫
新聞/媒體
資料集
學術活動
得獎記錄
學生論文
按專業知識、姓名或所屬機構搜尋
查看斯高帕斯 (Scopus) 概要
紀 博文
副教授
資訊工程學系
電話
(02)7749-6684
電子郵件
neokent
gapps.ntnu.edu
tw
h-index
h10-index
h5-index
326
引文
8
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
306
引文
8
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
62
引文
4
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
2008
2024
每年研究成果
概覽
指紋
網路
研究計畫
(2)
研究成果
(41)
類似的個人檔案
(2)
指紋
查看啟用 Po-Wen Chi 的研究主題。這些主題標籤來自此人的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
INIS
data
100%
computer codes
78%
cryptography
69%
information
32%
clouds
31%
control
30%
learning
29%
machine learning
27%
detection
26%
performance
26%
security
22%
applications
22%
transmission
21%
storage
21%
design
20%
devices
19%
switches
19%
losses
17%
datasets
17%
management
16%
evaluation
16%
environment
16%
architecture
14%
dynamics
14%
tools
12%
data transmission
12%
internet
11%
levels
10%
algorithms
10%
computers
9%
policy
8%
host
8%
migration
8%
protection
7%
defense
7%
injection
7%
streams
7%
taiwan
7%
testing
7%
specifications
7%
audits
7%
noise
7%
metering
7%
connections
7%
microwave radiation
7%
meters
7%
eyes
7%
additives
7%
aggregation
7%
synthesis
7%
Computer Science
Attribute-Based Encryption
18%
Encryption Scheme
17%
Privacy Preserving
15%
Ciphertext
14%
Software Defined Networking
12%
User Privacy
11%
Network Manager
10%
Spanning Tree
10%
Encryption
9%
Federated Learning
8%
Scrambling
7%
Prevention Approach
7%
Attack
7%
Knowledge Proof
7%
Industrial Internet of Things
7%
Key Management Scheme
7%
Broadcast Message
7%
Malicious Application
7%
Outsourcing
7%
OpenFlow
7%
Infrastructure System
7%
Threat Detection
7%
Software-Defined Network
7%
Malware
7%
Emotion Detection
7%
Customer Premise
7%
Wimax
7%
Wide Area Network
7%
Infrastructure Network
7%
Handover Procedure
7%
Cloud Storage Provider
7%
Steganography
7%
Blockchain
7%
Enabled Network
7%
Cyber Physical Systems
7%
Searchable Encryption Scheme
7%
Cloud Storage
7%
Information Storage
7%
Data Possession
7%
Fully Homomorphic Encryption
7%
Application Detection
7%
Learning Scheme
7%
Secret Sharing
7%
Quality of Service
7%
Attackers
6%
User
6%
Legacy Network
5%
Design
5%
Retransmission
5%