{"id":446,"date":"2022-12-02T13:46:26","date_gmt":"2022-12-02T05:46:26","guid":{"rendered":"https:\/\/tanet2022.ntub.edu.tw\/?page_id=446"},"modified":"2022-12-12T20:58:33","modified_gmt":"2022-12-12T12:58:33","slug":"%e6%b5%b7%e5%a0%b1%e7%99%bc%e8%a1%a8%e4%b8%89","status":"publish","type":"page","link":"https:\/\/tanet2022.ntub.edu.tw\/?page_id=446","title":{"rendered":"\u6d77\u5831\u767c\u8868(\u4e09)"},"content":{"rendered":"\n<p>12\/17 (\u516d) 11:00~12:00 (\u6d77\u5831\u767c\u8868 P-03)<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>P-03<\/td><td>10080<\/td><td>1.1 5G\u7db2\u8def\u901a\u8a0a\u30015G\u5275\u65b0\u670d\u52d9\u53ca\u61c9\u7528<\/td><td>Advanced Shutter Glasses Design for Three Dimensional Display<\/td><td>Chih-I Lu, Jian-Hong Chen, and Yu-Cheng Fan<\/td><\/tr><tr><td>P-03<\/td><td>10316<\/td><td>1.1 5G\u7db2\u8def\u901a\u8a0a\u30015G\u5275\u65b0\u670d\u52d9\u53ca\u61c9\u7528<\/td><td>\u57fa\u65bc\u85cd\u7259\u4fe1\u6a19\u4e4b\u667a\u6167\u90f5\u7bb1\u7cfb\u7d71<\/td><td>\u66fe\u96cd\u76db \u6797\u5176\u8abc \u6797\u838a\u5091<\/td><\/tr><tr><td>P-03<\/td><td>10391<\/td><td>1.2 \u7121\u7dda\u901a\u8a0a\u7db2\u8def\u3001\u7da0\u80fd\u901a\u8a0a\u3001\u91cf\u5b50\u901a\u8a0a<\/td><td>\u7da0\u80fd\u8702\u5de2\u5f0f\u7db2\u8def\u4e4b\u5373\u6642\u7d30\u80de\u7e2e\u653e\u6280\u8853Real-Time Cell Zooming for Green Cellular Networks<\/td><td>\u5468\u5b5c\u71e6 \u6797\u5cb3\u92d2<\/td><\/tr><tr><td>P-03<\/td><td>10462<\/td><td>1.2 \u7121\u7dda\u901a\u8a0a\u7db2\u8def\u3001\u7da0\u80fd\u901a\u8a0a\u3001\u91cf\u5b50\u901a\u8a0a<\/td><td>On Decoding a Large Class of Binary Double-Error-Correcting BCH-Like Codes<\/td><td>Chong-Dao Lee, Yan-Haw Chen, Chao-Yu Chang<\/td><\/tr><tr><td>P-03<\/td><td>9891<\/td><td>1.3 \u7269\u806f\u7db2\u3001\u8eca\u8f09\u7db2\u8def\u3001\u4eba\u5de5\u667a\u6167\u7269\u806f\u7db2 (AIoT) \u6280\u8853\u8207\u61c9\u7528<\/td><td>\u63a2\u8a0e Beacon \u667a\u6167\u7269\u806f\u7db2\u7cfb\u7d71<br>\u5c0d\u65bc\u7121\u4eba\u5546\u5e97\u61c9\u7528\u4e4b\u7814\u7a76<\/td><td>\u9ec3\u671d\u66e6 \u90b1\u923a\u921e \u9ec3\u656c\u4e2d \u738b\u5b50\u6e90 \u738b\u7fbd\u5f64 \u6797\u6631\u9a30<\/td><\/tr><tr><td>P-03<\/td><td>10355<\/td><td>1.3 \u7269\u806f\u7db2\u3001\u8eca\u8f09\u7db2\u8def\u3001\u4eba\u5de5\u667a\u6167\u7269\u806f\u7db2 (AIoT) \u6280\u8853\u8207\u61c9\u7528<\/td><td>\u667a\u6167\u5c45\u5bb6\u5b89\u5168\u7167\u660e\u7cfb\u7d71<\/td><td>\u5289\u5b8f\u7165 \u7f85\u5b87\u822a<\/td><\/tr><tr><td>P-03<\/td><td>10122<\/td><td>1.5 \u884c\u52d5\u8a08\u7b97\u8207\u7121\u7dda\u901a\u8a0a<\/td><td>\u9053\u8def\u7db2\u8def\u4e2d\u9130\u8fd1\u7269\u9ad4\u7d44\u5408\u67e5\u8a62\u4e4b\u5206\u6563\u5f0f\u8655\u7406<\/td><td>\u9ec3\u6df5\u79d1 \u4f59\u4f51\u6069 \u6797\u806f\u767c<\/td><\/tr><tr><td>P-03<\/td><td>10465<\/td><td>1.5 \u884c\u52d5\u8a08\u7b97\u8207\u7121\u7dda\u901a\u8a0a<\/td><td>\u7269\u806f\u7db2\u7121\u7dda\u6280\u8853\u61c9\u7528\u65bc\u8eca\u8f09\u96a8\u610f\u884c\u52d5\u7db2\u8def\u4e4b\u670d\u52d9<\/td><td>\u9ec3\u5a01\u8a8c \u5289\u50b3\u9298<\/td><\/tr><tr><td>P-03<\/td><td>10466<\/td><td>1.5 \u884c\u52d5\u8a08\u7b97\u8207\u7121\u7dda\u901a\u8a0a<\/td><td>\u5728\u4e0d\u78ba\u5b9a\u8cc7\u6599\u6d41\u4e0a\u53cd\u5411\u5929\u969b\u7dda\u67e5\u8a62<\/td><td>\u53f8\u5f92\u80b2 \u5289\u67cf\u946b \u5289\u50b3\u9298<\/td><\/tr><tr><td>P-03<\/td><td>10497<\/td><td>1.5 \u884c\u52d5\u8a08\u7b97\u8207\u7121\u7dda\u901a\u8a0a<\/td><td>\u5177\u5099\u624b\u52e2\u63a7\u5236\u53ca\u76ee\u6a19\u9060\u8ddd\u89c0\u5bdf\u8207\u8ddf\u8e64\u529f\u80fd\u4e4b\u667a\u6167\u7121\u4eba\u6a5f<\/td><td>\u502a\u6698\u658c \u9673\u9707\u5b87<\/td><\/tr><tr><td>P-03<\/td><td>10504<\/td><td>1.5 \u884c\u52d5\u8a08\u7b97\u8207\u7121\u7dda\u901a\u8a0a<\/td><td>\u6a5f\u8eca\u505c\u8eca\u7a7a\u4f4d\u7cfb\u7d71<\/td><td>\u8a31\u54f2\u745c \u5468\u5efa\u5b87 \u694a\u54f2\u65fb \u5289\u51a0\u6a19 \u9673\u9707\u5b87<\/td><\/tr><tr><td>P-03<\/td><td>10582<\/td><td>1.5 \u884c\u52d5\u8a08\u7b97\u8207\u7121\u7dda\u901a\u8a0a<\/td><td>\u81ea\u8d70\u8eca AGV \u53ca AI \u5f71\u50cf\u8fa8\u8b58\u4e4b\u61c9\u7528:\u5716\u66f8\u9928\u5716\u66f8\u81ea\u52d5\u7ba1\u7406\u6a5f<\/td><td>\u8a31\u6649\u69ae \u9673\u9707\u5b87<\/td><\/tr><tr><td>P-03<\/td><td>9907<\/td><td>4.1 \u524d\u77bb\u8cc7\u5b89\u6280\u8853\u3001\u7db2\u8def\u5b89\u5168\u3001IoT\u5b89\u5168\u3001\u5f8c\u91cf\u5b50\u52a0\u5bc6\u3001\u61c9\u7528\u5bc6\u78bc\u3001\u751f\u7269\u7279\u5fb5\u6280\u8853\u3001\u500b\u4eba\u8cc7\u6599\u5b89\u5168\u4fdd\u8b77\u7ba1\u7406<\/td><td>Ultra Secure and Reliable Private Key Recovery by Separating Permission and Possession<\/td><td>Wei-Hsin Chang, Ren-Song Tsay<\/td><\/tr><tr><td>P-03<\/td><td>10487<\/td><td>4.1 \u524d\u77bb\u8cc7\u5b89\u6280\u8853\u3001\u7db2\u8def\u5b89\u5168\u3001IoT\u5b89\u5168\u3001\u5f8c\u91cf\u5b50\u52a0\u5bc6\u3001\u61c9\u7528\u5bc6\u78bc\u3001\u751f\u7269\u7279\u5fb5\u6280\u8853\u3001\u500b\u4eba\u8cc7\u6599\u5b89\u5168\u4fdd\u8b77\u7ba1\u7406<\/td><td>\u57fa\u65bc\u806f\u90a6\u5f0f\u5b78\u7fd2\u7684\u60e1\u610f\u6d41\u91cf\u653b\u64ca\u4e4b\u5075\u6e2c<\/td><td>\u9ec3\u67cf\u5b78 \u9673\u67cf\u4f51 \u5289\u5efa\u660c \u5468\u7acb\u5fb7<\/td><\/tr><tr><td>P-03<\/td><td>10015<\/td><td>4.2 \u7269\u806f\u7db2\u8cc7\u5b89\u3001\u96f2\u7aef\u5b89\u5168\u8207\u96b1\u79c1\u3001\u7db2\u8def\u61c9\u7528\u670d\u52d9\u5b89\u5168<\/td><td>\u7aef\u5c0d\u7aef\u7fa4\u7d44\u52a0\u5bc6\u901a\u8a71\u4e4b\u5be6\u969b\u61c9\u7528\u89e3\u6c7a\u65b9\u6848<\/td><td>\u8b1d\u4f73\u80b2 \u6797\u9038\u4fee \u674e\u4fca\u5112 \u5ed6\u52dd\u5ec9 \u9023\u555f\u5b8f<\/td><\/tr><tr><td>P-03<\/td><td>10020<\/td><td>4.2 \u7269\u806f\u7db2\u8cc7\u5b89\u3001\u96f2\u7aef\u5b89\u5168\u8207\u96b1\u79c1\u3001\u7db2\u8def\u61c9\u7528\u670d\u52d9\u5b89\u5168<\/td><td>\u81ea\u52d5\u5316\u670d\u52d9\u8b58\u5225\u6280\u8853\u8207\u8cc7\u7522\u66dd\u96aa\u5206\u6790\u2014\u4ee530\u5bb6\u4f01\u696d\u70ba\u4f8b<\/td><td>\u9673\u5143\u88d5 \u7f85\u7fca\u840d<\/td><\/tr><tr><td>P-03<\/td><td>9943<\/td><td>4.3 \u6578\u4f4d\u5075\u67e5\u8207\u8cc7\u5b89\u9451\u8b58<\/td><td>\u57fa\u65bcMITRE ATT&amp;CK\u6a21\u578b\u53caSOC\u8cc7\u5b89\u901a\u5831\u7e3d\u5408\u5206\u6790\u4e4b\u8cc7\u5b89\u4fdd\u96aa\u98a8\u96aa\u8a55\u4f30<\/td><td>\u5f35\u5b8f\u660c \u9ec3\u88d5\u5091 \u53e4\u6771\u660e<\/td><\/tr><tr><td>P-03<\/td><td>10315<\/td><td>4.3 \u6578\u4f4d\u5075\u67e5\u8207\u8cc7\u5b89\u9451\u8b58<\/td><td>Analysis of Miner from Network Flow in TANet<\/td><td>Chien-Ta Fan, Zan-Bin Hong, Chang-Kai Tseng, Zih-Sing You, Hung-Yun Hsieh<\/td><\/tr><tr><td>P-03<\/td><td>10238<\/td><td>4.4 \u7db2\u8def\u653b\u64ca\u53ca\u9632\u79a6\u3001\u8cc7\u5b89\u806f\u9632<\/td><td>SP-ISAC \u57f7\u884c\u73fe\u6cc1\u53ca\u670d\u52d9\u512a\u5316\u4e4b\u63a8\u52d5<\/td><td>\u912d\u6b23\u606c \u90ed\u61ff\u8431 \u9b91\u601d\u7a4e \u9673\u5fd7\u540d \u674e\u67cf\u6bc5<\/td><\/tr><tr><td>P-03<\/td><td>10285<\/td><td>4.4 \u7db2\u8def\u653b\u64ca\u53ca\u9632\u79a6\u3001\u8cc7\u5b89\u806f\u9632<\/td><td>\u5229\u7528 Stacked LSTM \u6a21\u578b\u5075\u6e2c\u76ee\u6a19\u5f0f\u653b\u64ca<\/td><td>\u6b50\u96c5\u60e0 \u9673\u5609\u73ab \u6797\u4fca\u543e<\/td><\/tr><tr><td>P-03<\/td><td>9937<\/td><td>4.5 \u6578\u4f4d\u9451\u8b58\u3001\u91ab\u7642\u79c1\u5bc6\u8207\u7db2\u99ed\u5b89\u5168<\/td><td>\u4e00\u7a2e\u7121\u9700\u53c3\u8003\u8868\u7684\u50cf\u7d20\u7d44\u8cc7\u8a0a\u5d4c\u5165\u6280\u8853<\/td><td>\u674e\u5efa\u4f51 \u6d2a\u7dad\u6069 \u9673\u6c11\u679d \u9673\u540c\u5b5d<\/td><\/tr><tr><td>P-03<\/td><td>9969<\/td><td>4.5 \u6578\u4f4d\u9451\u8b58\u3001\u91ab\u7642\u79c1\u5bc6\u8207\u7db2\u99ed\u5b89\u5168<\/td><td>\u904b\u7528\u6df1\u5ea6\u53ef\u5206\u96e2\u5377\u7a4d\u65bc\u6df1\u507d\u5f71\u7247\u5075\u6e2c\u4e4b\u7814\u6790<\/td><td>\u6797\u9773\u539f \u674e\u4ec1\u8ecd \u6c5f\u4e2d\u7188 \u5468\u5146\u9f8d<\/td><\/tr><tr><td>P-03<\/td><td>10077<\/td><td>4.5 \u6578\u4f4d\u9451\u8b58\u3001\u91ab\u7642\u79c1\u5bc6\u8207\u7db2\u99ed\u5b89\u5168<\/td><td>\u4ee5 OODA \u6c7a\u7b56\u6a21\u7d44\u70ba\u57fa\u790e\u63d0\u5347\u96f7\u64ca\u9810\u8b66\u6a5f\u5236<\/td><td>\u5f90\u745e\u9038 \u694a\u5a77\u5a77<\/td><\/tr><tr><td>P-03<\/td><td>9857<\/td><td>6.2 \u6559\u80b2\u79d1\u6280\u7684\u5275\u65b0\u8207\u61c9\u7528<\/td><td>\u4e92\u52d5\u5f0f\u81e8\u5e8a\u53e3\u8154\u8a3a\u65b7\u5b78\u6559\u6750\u8a2d\u8a08<\/td><td>\u4f59\u6b0a\u822a<\/td><\/tr><tr><td>P-03<\/td><td>10011<\/td><td>6.2 \u6559\u80b2\u79d1\u6280\u7684\u5275\u65b0\u8207\u61c9\u7528<\/td><td>\u4ee5\u5716\u5f62\u7e6a\u88fd\u70ba\u4e3b\u984c\u4e4b\u7a4d\u6728\u5f0f\u7a0b\u5f0f\u6e2c\u9a57\u7cfb\u7d71<\/td><td>\u9673\u5a01\u8aa0 \u65bd\u502b\u9594 \u5f35\u9867\u8000 \u9ec3\u7acb\u5ead<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>12\/17 (\u516d) 11:00~12:0&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-446","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/tanet2022.ntub.edu.tw\/index.php?rest_route=\/wp\/v2\/pages\/446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tanet2022.ntub.edu.tw\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tanet2022.ntub.edu.tw\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tanet2022.ntub.edu.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tanet2022.ntub.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=446"}],"version-history":[{"count":6,"href":"https:\/\/tanet2022.ntub.edu.tw\/index.php?rest_route=\/wp\/v2\/pages\/446\/revisions"}],"predecessor-version":[{"id":664,"href":"https:\/\/tanet2022.ntub.edu.tw\/index.php?rest_route=\/wp\/v2\/pages\/446\/revisions\/664"}],"wp:attachment":[{"href":"https:\/\/tanet2022.ntub.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}