default search action
Dong-Her Shih
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Dong-Her Shih, Yi-Huei Wu, Ting-Wei Wu, Huei-Ying Chu, Ming-Hung Shih:
Stroke Prediction Using Deep Learning and Transfer Learning Approaches. IEEE Access 12: 130091-130104 (2024) - [j39]Dong-Her Shih, Yi-Huei Wu, Ting-Wei Wu, Yi-Kai Wang, Ming-Hung Shih:
Classifying Dementia Severity Using MRI Radiomics Analysis of the Hippocampus and Machine Learning. IEEE Access 12: 160030-160051 (2024) - [j38]Dong-Her Shih, Cheng-Yu Yang, Ting-Wei Wu, Ming-Hung Shih:
Investigating a Machine Learning Approach to Predicting White Pixel Defects in Wafers - A Case Study of Wafer Fabrication Plant F. Sensors 24(10): 3144 (2024) - 2023
- [j37]I-Chiu Chang, Win-Ming Shiau, Chih-Yu Lin, Dong-Her Shih:
Consumer Intentions to Switch On-Demand Food Delivery Platforms: A Perspective from Push-Pull-Mooring Theory. J. Theor. Appl. Electron. Commer. Res. 18(4): 2217-2232 (2023) - 2021
- [j36]Dong-Her Shih, Feng-Chuan Huang, Chia-Yi Chieh, Ming-Hung Shih, Ting-Wei Wu:
Preventing Return Fraud in Reverse Logistics - A Case Study of ESPRES Solution by Ethereum. J. Theor. Appl. Electron. Commer. Res. 16(6): 2170-2191 (2021) - 2020
- [j35]Dong-Her Shih, Ting-Wei Wu, Tzu-Hsin Hsu, Po-Yuan Shih, David C. Yen:
Verification of Cryptocurrency Mining Using Ethereum. IEEE Access 8: 120351-120360 (2020) - [j34]Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, Chin-Ling Chen, Cheng-Chi Lee:
A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System. IEEE Access 8: 173904-173917 (2020)
2010 – 2019
- 2017
- [c10]Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang:
On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment. ICISA 2017: 241-248 - 2016
- [c9]Po-Yuan Shih, Dong-Her Shih, An-Chung Liu:
A colored Petri Net for stock trading signal detection. CEC 2016: 4551-4554 - [c8]Po-Yuan Shih, Dong-Her Shih, Ming-Hung Shih:
Stock Trading Point Decision with Petri Nets. PACIS 2016: 194 - 2015
- [j33]Hsiu-Sen Chiang, Dong-Her Shih, Ming-Hung Shih, J. Morris Chang:
APN model construction for malicious email detection. Expert Syst. Appl. 42(13): 5696-5704 (2015) - [j32]Dong-Her Shih, Ming-Hung Shih, David C. Yen, Che-Lun Chang:
A robust copyright and ownership protection mechanism for music. Multim. Tools Appl. 74(18): 7489-7514 (2015) - [j31]Po-Ling Sun, Cheng-Yuan Ku, Dong-Her Shih:
An implementation framework for E-Government 2.0. Telematics Informatics 32(3): 504-520 (2015) - 2014
- [j30]Hsiu-Sen Chiang, Dong-Her Shih, Binshan Lin, Ming-Hung Shih:
An APN model for Arrhythmic beat classification. Bioinform. 30(12): 1739-1746 (2014) - [c7]Jao-Hong Cheng, Dong-Her Shih:
The Influence of Moral Orientation and Relational Risk on Knowledge Sharing in Supply Chains. PACIS 2014: 174 - 2013
- [j29]Dong-Her Shih, Hsiu-Sen Chiang, David C. Yen, Shin-Chuan Huang:
An intelligent embedded system for malicious email filtering. Comput. Stand. Interfaces 35(5): 557-565 (2013) - [j28]Shing-Han Li, Shi-Ming Huang, David C. Yen, Dong-Her Shih, Hsiang-Yuan Hsueh:
Business-to-government application integration framework: A case study of the high technology industry in Taiwan. Comput. Stand. Interfaces 35(6): 582-595 (2013) - [c6]Dong-Her Shih, Hsiu-Sen Chiang, Ming-Hung Shih:
ECG identification of arrhythmias by using an associative Petri net. CLUSTER 2013: 1-2 - 2012
- [j27]Chia-Chia Lin, Huan-Ming Chuang, Dong-Her Shih:
Development Stage and Relationship of MIS and TQM in the E-business ERA. Int. J. Electron. Bus. Manag. 10(1): 50-60 (2012) - [j26]Dong-Her Shih, Sheng-Fei Hsu, David C. Yen, Chia-Chia Lin:
Exploring the Individual's Behavior on Self-Disclosure Online. Int. J. Hum. Comput. Interact. 28(10): 627-645 (2012) - [j25]Dong-Her Shih, Ching-Chiang Chen, Hsiu-Sen Chiang, Ming-Hung Shih:
Explore dependency syndrome on mobile phone user. Int. J. Mob. Commun. 10(5): 475-489 (2012) - 2011
- [j24]Dong-Her Shih, David C. Yen, Chih-Hung Cheng, Ming-Hung Shih:
A secure multi-item e-auction mechanism with bid privacy. Comput. Secur. 30(4): 273-287 (2011) - [j23]Dong-Her Shih, David C. Yen, Ho-Cheng Lin, Ming-Hung Shih:
An implementation and evaluation of recommender systems for traveling abroad. Expert Syst. Appl. 38(12): 15344-15355 (2011) - 2010
- [j22]I-Ching Chen, Dong-Her Shih, Shueh-Cheng Hu:
Augmenting a Web-Based Learning Environment through Blending Formative Assessment Services. J. Web Eng. 9(1): 48-65 (2010) - [j21]Dong-Her Shih, Hsiu-Sen Chiang, Binshan Lin, Shih-Bin Lin:
An embedded mobile ECG reasoning system for elderly patients. IEEE Trans. Inf. Technol. Biomed. 14(3): 854-865 (2010) - [c5]Kuo-Sheng Cheng, Deng-Chuan Cai, Tsorng-Juu Liang, Meng-Hui Hsu, Chun-Lin Lu, Ji-Jer Huang, Dong-Her Shih:
A Web-based Light Electric Vehicle for Homecare Use - A Pilot Study. CASoN 2010: 175-178
2000 – 2009
- 2009
- [c4]I-Ching Chen, Shueh-Cheng Hu, Dong-Her Shih:
A platform for syndicating and manipulating instrumentation and measurement data on the Web. VECIMS 2009: 38-42 - 2008
- [j20]She-I Chang, Chih-Fong Tsai, Dong-Her Shih, Chia-Ling Hwang:
The development of audit detection risk assessment system: Using the fuzzy theory and audit risk model. Expert Syst. Appl. 35(3): 1053-1067 (2008) - [j19]Dong-Her Shih, Hsiu-Sen Chiang, Binshan Lin:
Collaborative spam filtering with heterogeneous agents. Expert Syst. Appl. 35(4): 1555-1566 (2008) - [j18]Yi-Min Lin, Dong-Her Shih:
Deconstructing mobile commerce service with continuance intention. Int. J. Mob. Commun. 6(1): 67-87 (2008) - [j17]Jui-Chi Shen, Dong-Her Shih, Han-Chuan Wei, Chiao-Chu Li:
Differential quality-of-service provision in mobile networks. Int. J. Mob. Commun. 6(1): 133-150 (2008) - [j16]Dong-Her Shih, Binshan Lin, Hsiu-Sen Chiang, Ming-Hung Shih:
Security aspects of mobile phone virus: a critical survey. Ind. Manag. Data Syst. 108(4): 478-494 (2008) - [j15]Dong-Her Shih, Yuh-Wen Chiu, She-I Chang, David C. Yen:
An Empirical Study of Factors Affecting RFID's Adoption in Taiwan. J. Glob. Inf. Manag. 16(2): 58-80 (2008) - [c3]I-Ching Chen, Shueh-Cheng Hu, Dong-Her Shih:
Provision of Pedagogical Resources in Service-Oriented Instructional Environments. APSCC 2008: 435-438 - 2007
- [j14]Dong-Her Shih, Binshan Lin, Shin-Yi Huang:
MoRVAM: A reverse Vickrey auction system for mobile commerce. Expert Syst. Appl. 32(4): 1113-1123 (2007) - [j13]Jui-Chi Shen, Dong-Her Shih, Hsiu-Sen Chiang, Shih-Bin Lin:
A mobile physiological monitoring system for patient transport. J. High Speed Networks 16(1): 51-68 (2007) - [j12]Dong-Her Shih, Hsiu-Sen Chiang, Binshan Lin:
A Generalized Associative Petri Net for Reasoning. IEEE Trans. Knowl. Data Eng. 19(9): 1241-1251 (2007) - [c2]Sheng-Fei Hsu, Dong-Her Shih, Hui-Ling Yu:
Exploring the Relationships between Personal Characteristics, Aims, and Reasons of Learning in Further Education by Associating Rule Mining. CIS 2007: 456-460 - [c1]Dong-Her Shih, Chih-Hung Cheng, Jui-Chi Shen:
A Secure Protocol of Reverse Discriminatory Auction with Bid Privacy. ICMB 2007: 52 - 2006
- [j11]Dong-Her Shih, Po-Ling Sun, David C. Yen, Shi-Ming Huang:
Taxonomy and survey of RFID anti-collision protocols. Comput. Commun. 29(11): 2150-2166 (2006) - [j10]Dong-Her Shih, Shin-Yi Huang, Binshan Lin:
Linking secure reverse auction with web service. Int. J. Serv. Stand. 2(1): 15-31 (2006) - [j9]Dong-Her Shih, Hsin-Yi Huang, David C. Yen:
A secure reverse Vickrey auction scheme with bid privacy. Inf. Sci. 176(5): 550-564 (2006) - 2005
- [j8]Dong-Her Shih, Shin-Yi Huang, David C. Yen:
A new reverse auction agent system for m-commerce using mobile agents. Comput. Stand. Interfaces 27(4): 383-395 (2005) - [j7]Dong-Her Shih, Ching-Yi Lin, Binshan Lin:
RFID tags: privacy and security aspects. Int. J. Mob. Commun. 3(3): 214-230 (2005) - [j6]Dong-Her Shih, Po-Ling Sun, Binshan Lin:
Securing industry-wide EPCglobal Network with WS-Security. Ind. Manag. Data Syst. 105(7): 972-996 (2005) - [j5]Dong-Her Shih, Hsiu-Sen Chiang, David C. Yen:
Classification methods in the detection of new malicious emails. Inf. Sci. 172(1-2): 241-261 (2005) - 2004
- [j4]Andrew Dursch, David C. Yen, Dong-Her Shih:
Bluetooth technology: an exploratory study of the analysis and implementation frameworks. Comput. Stand. Interfaces 26(4): 263-277 (2004) - [j3]Dong-Her Shih, Zah-Qiang Lin:
Bandwidth saturation QoS provisioning for adaptive multimedia in wireless/mobile networks. Comput. Stand. Interfaces 26(4): 279-288 (2004) - [j2]Dong-Her Shih, Hsiu-Sen Chiang, Chun-Yuan Chan, Binshan Lin:
Internet security: malicious e-mails detection and protection. Ind. Manag. Data Syst. 104(7): 613-623 (2004) - [j1]Dong-Her Shih, Hsiu-Sen Chiang:
E-mail viruses: how organizations can protect their e-mails. Online Inf. Rev. 28(5): 356-366 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 01:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint