Research Findings

Date Author/Presenter Article Journal
2017-05-06 Jyun-Yao Huang, Wei-Chih Hong, Po-Shin Tsai, I-En Liao A Model for Aggregation and Filtering on Encrypted XML Streams in Fog Computing International Journal of Distributed Sensor Networks, Vol. 13, No. 5, pp. 1-14, May 2017 (SCI)
2017-10-03~05 Jyun-Yao Huang, Po-Hsin Tsai, and I-En Liao* Implementing Publish/Subscribe Pattern for CoAP in Fog Computing Environment The 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference
2018-04-13~17 Pin-Han Wang, I-En Liao*, Kuo-Fong Kao, Jyun-Yao Huang An Intrusion Detection Method Based on Log Sequence Clustering of Honeypot for Modbus TCP Protocol IEEE International Conference on Applied System Innovation 2018
2018-04-13~17 Shao-Yu Peng, Wei-Chih Hong*, Jun-Ting Li, Sheng-Jun Huang Framework for Efficient SCA Resistance Verification of IoT Devices IEEE International Conference on Applied System Innovation 2018
2018-04-13~17 Yao-Chung Fan, Huan Chen* The Design and Implementation of Low-Cost Power Monitoring System for Campus Power Monitoring IEEE International Conference on Applied System Innovation 2018
2018-01-23 Chun-Wei Tsai * and Shi-Jui Liu An Effective IoT Service-to-Interface Assignment Algorithmvia Search Economics IEEE Internet of Things Journal(SCI)
2018-02-12 Po-Yen Lee, Chia-Mu Yu*, Tooska Dargahi, Mauro Conti, and Giuseppe Bianchi MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things IEEE Transactions on Information Forensics and Security(SCI)
2018-04-30~05-03 Pei-Shuan Lu, Pin-Yu Chen, and Chia-Mu Yu On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples International Conference on Learning Representations (ICLR)
2018-08-17~19 Ze-Hong Chen and Chun-Wei Tsai* An Effective Metaheuristic Algorithm for Intrusion Detection System IEEE International Conference on Smart Internet of Things
2018-08-29 Chun-Wei Tsai, Yong-Chun Ding, Shi-Jui Liu, Ming-Chao Chiang, Chu-SingYang A high-performance clustering algorithm based on searched experiences Computers in Human Behavior,vol. 100, pp. 231-241,2019(SCI)
2018-10-07~10 Yan-Rong Chen, Chun-Wei Tsai,  Ming-Chao Chiang ,  Chu-Sing Yang An Improved Quantum-Inspired Evolutionary Algorithm for Data Clustering IEEE International Conference on Systems, Man, and Cybernetics
2018-10-07~10 Yi-Chung Wang and Chun-Wei Tsai An Efficient Coral Reef Optimization with Substrate Layers for Clustering Problem on Spark IEEE International Conference on Systems, Man, and Cybernetics
2018-11-26~29 Chia-Yi Hsu, Pei-Shuan Lu, Pin-Yu Chen and Chia-Mu Yu On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces IEEE Global Conference on Signal and Information Processing (GlobalSIP)
2018-11-27~30 Tsung-Chiao Yu, Jyun-Yao Huang, I-En Liao*and Kuo-Fong Kao Mining Anomaly Communication Patterns for Industrial Control Systems 28th Australasian Universities Power Engineering Conference (AUPEC 2018), Auckland, New Zealand, Nov.27-30, 2018
2019-02 Ze-Hong Chen, Yi-Lin Chen, Wei-Yan Chang, and Chun-Wei Tsai A hybrid classification algorithm for intrusion detection system Communications of the CCISA, vol. 25, no. 1 , pp. 14-27
2019-04-03 Chun-Wei Tsai, Wei-Yan Chang, Yi-Chung Wang and Huan Chen A high-performance parallel coral reef optimization for data clustering Soft Computing,vol. 23, no. 19, pp.9327-9340, 2019(SCI)
2019-06-15 Jia-You Hsieh, Chun-Hung Fan, Jian-Zhi Liao, Jyh-Yih Hsu and Huan Chen Study on the application of indoor positioning based on low power Bluetooth device combined with Kalman filter and machine learning International Conference on Innovative Computing and Management Science
2019-06-15 Jia-You Hsieh, Wei Huang, Hsin-Tieh Yang, Chia-Chieh Lin, Yo-Chung Fan and Huan Chen Building the Rice Blast Disease Prediction Model based on Machine Learning and Neural Networks International Conference on Innovative Computing and Management Science
2019-06-21 Xuebin Ren, Shuyang Wang, Xianhua Yao, Chia-Mu Yu, Wei Yu and Xinyu Yang Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee International Conference on Wireless Algorithms, Systems, and Applications
2019-08-26~27 Chia-Wei Wu, Shu-Fen Chiou, I-En Liao Cyber Security Vulnerabilities Alert System Based on Information from Twitter and CVE 第24屆行動計算研討會,聯合大學,2019年8月26~27日。
2019-08-26~27 徐昀汝、許雯絞、廖宜恩 基於序列樣式探勘之電力系統干擾與網絡攻擊分類 第24屆行動計算研討會,聯合大學,2019年8月26~27日。
2019-08-26~27 李明翰、邱淑芬、廖宜恩 基於DBSCAN之工業控制系統異常偵測 第24屆行動計算研討會,聯合大學,2019年8月26~27日。
2019-09-19~21 Chun-Pi Chang, Wen-Chiao Hsu, I-En Liao Anomaly Detection for Industrial Control Systems Using K-Means and Convolutional Autoencoder 27th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2019), Split, Croatia, Sep. 19-21, 2019
2019-07-09~12 Chia-Yi Hsu, Pin-Yu Chen, and Chia-Mu Yu Characterizing Adversarial Subspaces by Mutual Information ACM Conference on Computer and Communications Security
2019-06-26~28 Yu-Chia Chang, Huan Chen and Chun-Wei Tsai An Effective Deep Learning Framework for Detecting Misconduct of the Trucker The 9th International Conference on Web Intelligence, Mining and Semantics
2019-07-19~22 Jia-Ying Chuang, Bing-Jie Ji, Wei-Chih Hong, Chu-Hsiang Lee, Jeng-Da Huang and Huang-Kai Huang Design and Implementation of Smart Contract Based IoT Service International Conference on Innovative Computing and Management Science
2019-10-06~09 Chun-Hung Fan, Huan Chen, Chun-Wei Tsai SHEAS:A Novel Metaheuristic Algorithm for Home Appliances Scheduling in Smart Grid IEEE International Conference on Systems, Man, and Cybernetics
2020-05-21 Yi-Lin Chen, Huan Chen and Chun-Wei Tsai An Effective Deep Learning Algorithm for Intrusion Detection International Conference on Innovative Computing and Management Science
2020-07-07 Wei-Chih Hong, Ding-Ray Huang, Chih-Lung Chen and Jung-Jyh-Yih HsuSan Lee Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks IEEE Access, vol. 8, pp. 123297-123309, 2020, doi: 10.1109/ACCESS.2020.3007609 (SCI)
2020-07-10 Huan Chen, Yue-Hsien Wang,Chun-Hung Fan A convolutional autoencoder‑based approach with batch normalization for energy disaggregation The Journal of Supercomputing volume 77, pages2961–2978(2021) (SCI)
2020-09-01~04 陳奕翔、許雯絞、廖宜恩 使用隨機森林與卷積神經網路之工業控制系統網路攻擊分類方法 第30屆全國資訊安全會議
2020-09-01~04 林侑儀、許雯絞、廖宜恩 用於工業控制系統入侵偵測方法的堆疊集成模型 第30屆全國資訊安全會議
2020-09-21 Wen-Chiao Hsu, I-En Liao UCIS-X: An Updatable Compact Indexing Scheme for Efficient Extensible Markup Language Document Updating and Query Evaluation IEEE Access, vol. 8, pp. 176375-176392, 2020, doi: 10.1109/ACCESS.2020.3025566 (SCI)
2020-12-17~18 Sying-Jyan Wang, Cheng Xuan Cai, Yen-Wen Tseng and Katherine Shu-Min Li Feature Selection for Malicious Traffic Detection with Machine Learning International Computer Symposium 2020
2021-2-26 Sying-Jyan Wang, Yu-Sheng Chen, and Katherine Shu-Min Li Modeling Attack Resistant PUFs Based on Adversarial Attack against Machine Learning IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol 11, pp. 306-318, 2021, doi:10.1109/JETCAS.2021.3062413
2021-04-19~22 Sying-Jyan Wang, Tzu-Heng Chang, Katherine Shu-Min Li Machine Learning Assisted Challenge Selection for Modeling Attack Resistance in Strong PUFs 2021 International Symposium on VLSI Design, Automation and Test (VLSI-DAT)
2021-06 Sying-Jyan Wang, Yu-Sheng Chen and Katherine Shu-Min Li Modeling Attack Resistant PUFs Based on Adversarial Attack Against Machine Learning IEEE Journal on Emerging and Selected Topics in Circuits and Systems, Vol. 11, Issue: 2, pp. 306 - 318
2021-08-05~06 Chien-Lung Wang, Yi-Chieh Liao and I-En Liao A Federated Learning Study of Privacy-Preserving Secret Sharing based on Deep Neural Network 第31屆全國資訊安全會議Cryptology and Information Security Conference 2021 (CISC2021)
2021-08-16 Chia-Wei Tsai, Jason Lin, Lung Chiu and Chun-Wei Yang Cryptanalysis and Improvement in Multi-Party Quantum Key Distribution Protocol with New Bell States Encoding Mode International Journal of Theoretical Physics, 60(9), 3599-3608
2022-01-08 Iuon-Chang Lin, Ching-Chun Chang and Chih-Hsiang Peng An Anomaly-Based IDS Framework Using Centroid-Based Classification Symmetry, 14(1), 105; https://doi.org/10.3390/sym14010105
2022-01-20 Chia-Wei Tsai, Chun-Wei Yang and Jason Lin Multiparty Mediated Quantum Secret Sharing Protocol Quantum Information Processing, 21(2), 1-17
2022-01-26 Iuon-Chang Lin, Chin-Chen Chang and Yu-Sung Chang Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA Symmetry, 14(2), 237; https://doi.org/10.3390/sym14020237.
2022-3-8 Yun-Chien Tseng, Mu-Hua Yang, Yao-Chung Fan , Wen-Chih Peng, Chih-Chieh Hung Template-Based Headline Generator for Multiple Documents IEEE Access(10)
2022-04-15 Jason Lin,Chia-Wei Tsai, Chun-Wei Yang, Kuan-Hung Liu A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix Symmetry 2022, 14(2), 828 https://www.mdpi.com/2073-8994/14/4/828.
2022-04-10 Hung-Wen Wang, Chia-Wei Tsai, Jason Lin, Yu-Yun Huang, Chun-Wei Yang Efficient and secure measure-resend authenticated semi-quantum key distribution protocol against reflecting attack Mathematics 2022, 10(8), 1241 https://www.mdpi.com/2227-7390/10/8/1241.
2022-04-18~21 Sying-Jyan Wang, Y.-C. Shih and Katherine Shu-Min Li Improving IJTAG Test Efficiency and Securityning 2022 International Symposium on VLSI Design, Automation and Test (2022 VLSI-DAT)
2022-04-30 Chia-Wei Tsai, Kuei-Chun Chiang, Hsin-Yuan Hsieh, Chun-Wei Yang, Jason Lin, Yao-Chung Chang Feature Extraction of Anomaly Electricity Usage Behavior in Residence Using Autoencoder Electronics 2022, 11(9), 1450 https://www.mdpi.com/2079-9292/11/9/1450.
2022-5-12 Ting-Wei Chang; Yao-Chung Fan; Arbee L. P. Chen Emotion-cause pair extraction based on machine reading comprehension model Multimedia Tools and Applications volume 81, 40653–40673
2022-06-16~17 應瑞傑;蔡國裕;李榮三;周澤捷 基於聲譽清單之可移動式路側單元集群協定 第三十二屆全國資訊安全會議(CISC 2022) Cryptology and Information Security Conference 2022
2022-06-16~17 籃若瑜;蔡國裕;賴俊鳴;王銘宏 短文本論述萃取演算法 第三十二屆全國資訊安全會議(CISC 2022) Cryptology and Information Security Conference 2022
2022-07-18~23 Chih-Shuo Tsai, Ying-Hong Chan, Yao-Chung Fan Hierarchical Cache Transformer: Dynamic Early Exit for Language Translation 2022 International Joint Conference on Neural Networks (IJCNN)
2022-7-23~29 Lei Hsiung, Yun-Yun Tsai, Pin-Yu Chen, Tsung-Yi Ho CARBEN: Composite Adversarial Robustness Benchmark The 31st International Joint Conference on Artificial Intelligence (IJCAI 2022) Demo Track
2022-09-22 Shu-Yu Kuo, Kuo-Chun Tseng, Yao-Hsin Chou, Fan-Hsun Tseng, Quantum Oblivious Transfer with Reusable Bell State Computers, Materials & Continua 2023, 74(1), 915-932
2022-10-10 Jason Lin; Chia-Wei Tsai; Chun-Wei Yang Cryptanalysis and Improvement of the Measurement-Device-Independent Quantum Key Distribution with Hyper-Encoding Modern Physics Letters A , Vol. 37, No. 31, 2250212 (2022)
2022-10-14~16 Sying-Jyan Wang, Yi-Chi Lin, Chen-Yeh Lin, Song-Kong Chong, Katherine Shu-Min Li Automatic Alignment for Side-Channel Attack Against Cryptographic Modules 2022 IET International Conference on Engineering Technologies and Applications
2022-10-14~16 Chun-Tsai Chien, Chien Lung Wang and Sying-Jyan Wang Zero Payload Enhanced AES Cryptography Against Side-Channel Attacks 2022 IET International Conference on Engineering Technologies and Applications
2022-10-14~16 Chien-Lung Wang; Iuon-Chang Lin; Chun-Tsai Chien; Sying-Jyan Wang ;Jou-An Shih; I-En Liao An Evaluation of Cybersecurity Risks of DLMS/COSEM Smart Meter Using Fuzzing Testing 2022 IET International Conference on Engineering Technologies and Applications
2022-10-27~29 Shih-Wei Guo, Tzu-Chi Chen, Hui-Juan Wang, Fang-Yie Leu, Yao-Chung Fan Generating Personalized Phishing Emails for Social Engineering Training Based on Neural Language Models. BWCCA 2022: Advances on Broad-Band Wireless Computing, Communication and Applications
2022-11-21~23 S. -J. Wang, K. S. -M.Li,C. -Y. Lin and S. -K.Chong Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication 31st Asian Test Symposium (ATS)
2022-12-15~17 施語涵;黃詩軒;蔡家緯;張耀中;盧韻文;王李品檠 基於用電負載情境預測冰水主機負載及電力能耗預測 2022 臺灣網際網路研討會TANET
2022-12-15~17 謝欣原;蔣貴君;蔡家緯 使用集成學習策略於住宅用戶異常用電行為辨識之研究 2022 臺灣網際網路研討會TANET
2023-01-14 Chun-Wei Yang; Hung-Wen Wang; Jason Lin; Chia-Wei Tsai Semi-quantum Identification without Information Leakage Mathematics 2023, 11(2), 452
2023-4-21~23 Tzu-Hsuan Huang, Chun-Tsai Chien, Chien-Lung Wang and I-En Liao The Implementation of an HSM-Based Smart Meter for Supporting DLMS/COSEM Security Suite 1 IoTBDS 2023
2023-4-21~25 Chia-Wei Tsai, Jyun-Jie Hong, Yun-Hao Lee, Jason Lin, Chun-Wei Yang Semi-quantum Private Comparison Protocol with Graph state 9th IEEE International Conference on Applied System Innovation 2023
2023-4-21~25 Yu-Xiang Zou; Jason Lin; Chia-Wei Tsai; Chun-Wei Yang Alpha-Boost: A Fast Algorithm for Mining Workflow Nets 9th IEEE International Conference on Applied System Innovation 2023
2023-5-4 Chun-Wei Yang ; Jason Lin; Chia-Wei Tsai; Kai-Lin Wang; Chia-Wei Tsai Cryptanalysis and improvement of a controlled quantum secure direct communication with authentication protocol based on five-particle cluster state Quantum Information Processing volume 22, Article number: 196 (2023)
2023-6-1~2 翁偉銘;蔡國裕;郭崇韋 基於DAE之旁通道攻擊實作與分析 第三十三屆全國資訊安全會議(CISC 2023) Cryptology and Information Security Conference 2023
2023-10-25~27 Chun-Tsai Chien, Chien-Lung Wang, I-En Liao, Sying-Jyan Wang Implementing OIML R46 Communication Unit for DLMS/COSEM Security Suite 1 and Passing CTT V3.1 Test ICNSC 2023: 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL