<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://jasonln0711.github.io/</loc></url><url><loc>https://jasonln0711.github.io/about/</loc></url><url><loc>https://jasonln0711.github.io/blog/</loc></url><url><loc>https://jasonln0711.github.io/blog/cross-node-fraud-intelligence-minimal-disclosure/</loc></url><url><loc>https://jasonln0711.github.io/blog/flat-ui-to-spatial-interface/</loc></url><url><loc>https://jasonln0711.github.io/blog/investigation-and-trustworthy-ai/</loc></url><url><loc>https://jasonln0711.github.io/blog/speech-evidence-pipelines/</loc></url><url><loc>https://jasonln0711.github.io/contact/</loc></url><url><loc>https://jasonln0711.github.io/ja/</loc></url><url><loc>https://jasonln0711.github.io/ja/about/</loc></url><url><loc>https://jasonln0711.github.io/ja/blog/</loc></url><url><loc>https://jasonln0711.github.io/ja/blog/cross-node-fraud-intelligence-minimal-disclosure/</loc></url><url><loc>https://jasonln0711.github.io/ja/blog/flat-ui-to-spatial-interface/</loc></url><url><loc>https://jasonln0711.github.io/ja/blog/investigation-and-trustworthy-ai/</loc></url><url><loc>https://jasonln0711.github.io/ja/blog/speech-evidence-pipelines/</loc></url><url><loc>https://jasonln0711.github.io/ja/contact/</loc></url><url><loc>https://jasonln0711.github.io/ja/links/</loc></url><url><loc>https://jasonln0711.github.io/ja/projects/</loc></url><url><loc>https://jasonln0711.github.io/ja/projects/federated-learning-leakage-study/</loc></url><url><loc>https://jasonln0711.github.io/ja/projects/fraud-conversation-analysis-rag/</loc></url><url><loc>https://jasonln0711.github.io/ja/projects/speech-evidence-intelligence-pipeline/</loc></url><url><loc>https://jasonln0711.github.io/ja/research/</loc></url><url><loc>https://jasonln0711.github.io/ja/research/security-high-stakes-deployment/</loc></url><url><loc>https://jasonln0711.github.io/ja/research/speech-language-agent-workflows/</loc></url><url><loc>https://jasonln0711.github.io/ja/research/trustworthy-ai-agent-systems/</loc></url><url><loc>https://jasonln0711.github.io/ja/resume/</loc></url><url><loc>https://jasonln0711.github.io/ja/talks/</loc></url><url><loc>https://jasonln0711.github.io/ja/talks/regulated-ai-cybersecurity/</loc></url><url><loc>https://jasonln0711.github.io/links/</loc></url><url><loc>https://jasonln0711.github.io/projects/</loc></url><url><loc>https://jasonln0711.github.io/projects/federated-learning-leakage-study/</loc></url><url><loc>https://jasonln0711.github.io/projects/fraud-conversation-analysis-rag/</loc></url><url><loc>https://jasonln0711.github.io/projects/speech-evidence-intelligence-pipeline/</loc></url><url><loc>https://jasonln0711.github.io/research/</loc></url><url><loc>https://jasonln0711.github.io/research/security-high-stakes-deployment/</loc></url><url><loc>https://jasonln0711.github.io/research/speech-language-agent-workflows/</loc></url><url><loc>https://jasonln0711.github.io/research/trustworthy-ai-agent-systems/</loc></url><url><loc>https://jasonln0711.github.io/resume/</loc></url><url><loc>https://jasonln0711.github.io/talks/</loc></url><url><loc>https://jasonln0711.github.io/talks/regulated-ai-cybersecurity/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/about/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/blog/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/blog/cross-node-fraud-intelligence-minimal-disclosure/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/blog/flat-ui-to-spatial-interface/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/blog/investigation-and-trustworthy-ai/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/blog/speech-evidence-pipelines/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/contact/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/links/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/projects/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/projects/federated-learning-leakage-study/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/projects/fraud-conversation-analysis-rag/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/projects/speech-evidence-intelligence-pipeline/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/research/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/research/security-high-stakes-deployment/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/research/speech-language-agent-workflows/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/research/trustworthy-ai-agent-systems/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/resume/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/talks/</loc></url><url><loc>https://jasonln0711.github.io/zh-tw/talks/regulated-ai-cybersecurity/</loc></url></urlset>