跳至主導覽
跳至搜尋
跳過主要內容
國立臺灣師範大學 首頁
專家資料申請/更新
!!Link opens in a new tab
English
中文
在 國立臺灣師範大學 搜尋內容
首頁
個人檔案
研究單位
研究成果
研究計畫
新聞/媒體
資料集
學術活動
得獎記錄
學生論文
查看斯高帕斯 (Scopus) 概要
紀 博文
副教授
資訊工程學系
電話
(02)7749-6684
電子郵件
neokent
gapps.ntnu.edu
tw
h-index
h10-index
h5-index
376
引文
8
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
243
引文
7
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
84
引文
4
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
2008
2025
每年研究成果
概覽
指紋
網路
研究計畫
(2)
研究成果
(42)
類似的個人檔案
(1)
指紋
查看啟用 Po-Wen Chi 的研究主題。這些主題標籤來自此人的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
INIS
data
100%
computer codes
77%
cryptography
76%
clouds
34%
detection
30%
information
29%
control
29%
performance
26%
learning
26%
machine learning
24%
security
22%
storage
22%
design
21%
applications
20%
transmission
19%
devices
17%
switches
17%
internet
16%
losses
15%
algorithms
15%
datasets
15%
management
15%
evaluation
14%
environment
14%
architecture
13%
dynamics
12%
tools
11%
data transmission
10%
computers
10%
levels
9%
protection
8%
policy
7%
host
7%
migration
7%
people
7%
space
6%
implementation
6%
solutions
6%
defense
6%
injection
6%
streams
6%
taiwan
6%
testing
6%
specifications
6%
audits
6%
noise
6%
metering
6%
connections
6%
microwave radiation
6%
meters
6%
Computer Science
Privacy Preserving
44%
Software Defined Networking
36%
Encryption Scheme
29%
Software-Defined Networking
29%
User Privacy
20%
Software-Defined Network
19%
Fully Homomorphic Encryption
19%
Learning System
17%
Machine Learning
17%
Attribute-Based Encryption
16%
Ciphertext
16%
Spanning Tree
15%
Enabled Network
14%
Internet-Of-Things
14%
OpenFlow
14%
Network Manager
12%
Quality of Service
12%
Blockchain
12%
Application Detection
12%
Federated machine learning
12%
Attackers
11%
Anonymity
11%
Proof
11%
Detection Mechanism
11%
Data Privacy
10%
Cloud Storage
9%
Network Function
8%
Malware
7%
Legacy Network
7%
Knowledge Proof
6%
Industrial Internet of Things
6%
Key Management Scheme
6%
Broadcast Message
6%
Malicious Application
6%
Infrastructure System
6%
Threat Detection
6%
Emotion Detection
6%
Cloud Storage Provider
6%
Cyber Physical Systems
6%
Searchable Encryption Scheme
6%
Data Possession
6%
Learning Scheme
6%
Secret Sharing
6%
Euclidean Algorithm
6%
Transmission Control Protocol
6%
Data Center
6%
Handover Procedure
6%
Storage System
6%
Professional Army
6%
Multimedia Service
6%