2012
P. Chen, S. Cheng and K. Chen, "Smart attacks in smart grid communication networks", IEEE Communications Magazine, vol. 50, no. 8, 2012, pp. 24-29.
S. Wei, H. Hsieh and H. Su, "Enabling dense machine-to-machine communications through interference-controlled clustering", in 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 774-779.
H. Lai et al., "Exploiting and Evaluating MapReduce for Large-Scale Graph Mining", in 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 434-441.
Y. Lai et al., "Accelerometer-assisted 802.11 rate adaptation on mobile WiFi access", EURASIP Journal on Wireless Communications and Networking, vol. 2012, 05 2012, pp. .
H. Hsieh, C. Li and S. Lin, "Exploiting Large-Scale Check-in Data to Recommend Time-Sensitive Routes", in Proceedings of the ACM SIGKDD International Workshop on Urban Computing, New York, NY, USA: Association for Computing Machinery, 2012, pp. 55–62.
P. Schwabe, B. Yang and S. Yang, "SHA-3 on ARM11 Processors", in Progress in Cryptology - AFRICACRYPT 2012, A. Mitrokotsa, S. Vaudenay, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 324–341.
T. Kuo et al., "Exploiting Latent Information to Predict Diffusions of Novel Topics on Social Networks", in Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), Jeju Island, Korea: Association for Computational Linguistics, 2012, pp. 344–348.
C. Weng, C. Wang and J. Healey, "A segmentation and data association annotation system for laser-based multi-target tracking evaluation", in 2012 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), pp. 80-86.