2017-05-06
|
Jyun-Yao Huang, Wei-Chih Hong, Po-Shin
Tsai,
I-En Liao
|
A Model for Aggregation and Filtering on Encrypted XML
Streams
in Fog Computing
|
International Journal of Distributed Sensor Networks, Vol.
13,
No. 5, pp. 1-14, May 2017
(SCI)
|
2017-10-03~05
|
Jyun-Yao Huang, Po-Hsin Tsai, and I-En Liao*
|
Implementing Publish/Subscribe Pattern for CoAP in Fog
Computing
Environment
|
The 8th IEEE Annual Information Technology, Electronics and
Mobile Communication Conference
|
2018-04-13~17
|
Pin-Han Wang, I-En Liao*, Kuo-Fong Kao,
Jyun-Yao Huang
|
An Intrusion Detection Method Based on Log Sequence
Clustering
of Honeypot for Modbus TCP Protocol
|
IEEE International Conference on Applied System Innovation
2018
|
2018-04-13~17
|
Shao-Yu Peng, Wei-Chih Hong*, Jun-Ting Li,
Sheng-Jun Huang
|
Framework for Efficient SCA Resistance Verification of IoT
Devices
|
IEEE International Conference on Applied System Innovation
2018
|
2018-04-13~17
|
Yao-Chung Fan, Huan Chen*
|
The Design and Implementation of Low-Cost Power Monitoring
System for Campus Power Monitoring
|
IEEE International Conference on Applied System Innovation
2018
|
2018-01-23
|
Chun-Wei Tsai * and Shi-Jui Liu
|
An Effective IoT Service-to-Interface Assignment
Algorithmvia
Search Economics
|
IEEE Internet of Things Journal(SCI)
|
2018-02-12
|
Po-Yen Lee, Chia-Mu Yu*, Tooska Dargahi,
Mauro
Conti, and Giuseppe Bianchi
|
MDSClone: Multidimensional Scaling Aided Clone Detection in
Internet of Things
|
IEEE Transactions on Information Forensics and Security(SCI)
|
2018-04-30~05-03
|
Pei-Shuan Lu, Pin-Yu Chen, and Chia-Mu Yu
|
On the Limitation of Local Intrinsic Dimensionality for
Characterizing the Subspaces of Adversarial Examples
|
International Conference on Learning Representations (ICLR)
|
2018-08-17~19
|
Ze-Hong Chen and Chun-Wei Tsai*
|
An Effective Metaheuristic Algorithm for Intrusion Detection
System
|
IEEE International Conference on Smart Internet of Things
|
2018-08-29
|
Chun-Wei Tsai, Yong-Chun Ding, Shi-Jui Liu,
Ming-Chao Chiang, Chu-SingYang
|
A high-performance clustering algorithm based on searched
experiences
|
Computers in Human Behavior,vol. 100, pp. 231-241,2019(SCI)
|
2018-10-07~10
|
Yan-Rong Chen, Chun-Wei Tsai,
Ming-Chao
Chiang , Chu-Sing Yang
|
An Improved Quantum-Inspired Evolutionary Algorithm for Data
Clustering
|
IEEE International Conference on Systems, Man, and
Cybernetics
|
2018-10-07~10
|
Yi-Chung Wang and Chun-Wei Tsai
|
An Efficient Coral Reef Optimization with Substrate Layers
for
Clustering Problem on Spark
|
IEEE International Conference on Systems, Man, and
Cybernetics
|
2018-11-26~29
|
Chia-Yi Hsu, Pei-Shuan Lu, Pin-Yu Chen and Chia-Mu
Yu
|
On The Utility of Conditional Generation Based Mutual
Information for Characterizing Adversarial Subspaces
|
IEEE Global Conference on Signal and Information Processing
(GlobalSIP)
|
2018-11-27~30
|
Tsung-Chiao Yu, Jyun-Yao Huang, I-En Liao*and
Kuo-Fong Kao
|
Mining Anomaly Communication Patterns for Industrial Control
Systems
|
28th Australasian Universities Power Engineering Conference
(AUPEC 2018), Auckland, New Zealand, Nov.27-30, 2018
|
2019-02
|
Ze-Hong Chen, Yi-Lin Chen, Wei-Yan Chang, and
Chun-Wei
Tsai
|
A hybrid classification algorithm for intrusion detection
system
|
Communications of the CCISA, vol. 25, no. 1 , pp. 14-27
|
2019-04-03
|
Chun-Wei Tsai, Wei-Yan Chang, Yi-Chung Wang
and
Huan Chen
|
A high-performance parallel coral reef optimization for data
clustering
|
Soft Computing,vol. 23, no. 19, pp.9327-9340, 2019(SCI)
|
2019-06-15
|
Jia-You Hsieh, Chun-Hung Fan, Jian-Zhi Liao, Jyh-Yih Hsu and
Huan Chen
|
Study on the application of indoor positioning based on low
power Bluetooth device combined with Kalman filter and
machine
learning
|
International Conference on Innovative Computing and
Management
Science
|
2019-06-15
|
Jia-You Hsieh, Wei Huang, Hsin-Tieh Yang, Chia-Chieh Lin,
Yo-Chung Fan and Huan Chen
|
Building
the Rice Blast Disease Prediction Model based on Machine
Learning and Neural Networks
|
International Conference on Innovative Computing and
Management
Science
|
2019-06-21
|
Xuebin Ren, Shuyang Wang, Xianhua Yao, Chia-Mu Yu,
Wei Yu and Xinyu Yang
|
Differentially Private Event Sequences over Infinite Streams
with Relaxed Privacy Guarantee
|
International Conference on Wireless Algorithms, Systems,
and
Applications
|
2019-08-26~27
|
Chia-Wei Wu, Shu-Fen Chiou, I-En Liao
|
Cyber Security Vulnerabilities Alert System Based on
Information
from Twitter and CVE
|
第24屆行動計算研討會,聯合大學,2019年8月26~27日。
|
2019-08-26~27
|
徐昀汝、許雯絞、廖宜恩
|
基於序列樣式探勘之電力系統干擾與網絡攻擊分類
|
第24屆行動計算研討會,聯合大學,2019年8月26~27日。
|
2019-08-26~27
|
李明翰、邱淑芬、廖宜恩
|
基於DBSCAN之工業控制系統異常偵測
|
第24屆行動計算研討會,聯合大學,2019年8月26~27日。
|
2019-09-19~21
|
Chun-Pi Chang, Wen-Chiao Hsu, I-En Liao
|
Anomaly Detection for Industrial Control Systems Using
K-Means
and Convolutional Autoencoder
|
27th International Conference on Software,
Telecommunications
and Computer Networks (SoftCOM 2019), Split, Croatia, Sep.
19-21, 2019
|
2019-07-09~12
|
Chia-Yi Hsu, Pin-Yu Chen, and Chia-Mu Yu
|
Characterizing Adversarial Subspaces by Mutual Information
|
ACM Conference on Computer and Communications Security
|
2019-06-26~28
|
Yu-Chia Chang, Huan Chen and Chun-Wei Tsai
|
An Effective Deep Learning Framework for Detecting
Misconduct of
the Trucker
|
The 9th International Conference on Web Intelligence, Mining
and
Semantics
|
2019-07-19~22
|
Jia-Ying Chuang, Bing-Jie Ji, Wei-Chih Hong,
Chu-Hsiang Lee, Jeng-Da Huang and Huang-Kai Huang
|
Design and Implementation of Smart Contract Based IoT
Service
|
International Conference on Innovative Computing and
Management
Science
|
2019-10-06~09
|
Chun-Hung Fan, Huan Chen, Chun-Wei Tsai
|
SHEAS:A Novel Metaheuristic Algorithm for Home Appliances
Scheduling in Smart Grid
|
IEEE International Conference on Systems, Man, and
Cybernetics
|
2020-05-21
|
Yi-Lin Chen, Huan Chen and Chun-Wei Tsai
|
An Effective Deep Learning Algorithm for Intrusion Detection
|
International Conference on Innovative Computing and
Management
Science
|
2020-07-07
|
Wei-Chih Hong, Ding-Ray Huang, Chih-Lung
Chen
and Jung-Jyh-Yih HsuSan Lee
|
Towards Accurate and Efficient Classification of Power
System
Contingencies and Cyber-Attacks Using Recurrent Neural
Networks
|
IEEE Access, vol. 8, pp. 123297-123309, 2020, doi:
10.1109/ACCESS.2020.3007609
(SCI)
|
2020-07-10
|
Huan Chen, Yue-Hsien Wang,Chun-Hung Fan
|
A convolutional autoencoder‑based approach with batch
normalization for energy disaggregation
|
The Journal of Supercomputing volume 77,
pages2961–2978(2021)
(SCI)
|
2020-09-01~04
|
陳奕翔、許雯絞、廖宜恩
|
使用隨機森林與卷積神經網路之工業控制系統網路攻擊分類方法
|
第30屆全國資訊安全會議
|
2020-09-01~04
|
林侑儀、許雯絞、廖宜恩
|
用於工業控制系統入侵偵測方法的堆疊集成模型
|
第30屆全國資訊安全會議
|
2020-09-21
|
Wen-Chiao Hsu, I-En Liao
|
UCIS-X: An Updatable Compact Indexing Scheme for Efficient
Extensible Markup Language Document Updating and Query
Evaluation
|
IEEE Access, vol. 8, pp. 176375-176392, 2020, doi:
10.1109/ACCESS.2020.3025566
(SCI)
|
2020-12-17~18
|
Sying-Jyan Wang, Cheng Xuan Cai, Yen-Wen Tseng and Katherine Shu-Min Li
|
Feature Selection for Malicious Traffic Detection with Machine Learning
|
International Computer Symposium 2020
|
2021-2-26
|
Sying-Jyan Wang, Yu-Sheng Chen, and Katherine Shu-Min Li
|
Modeling Attack Resistant PUFs Based on Adversarial Attack against Machine Learning
|
IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol 11, pp. 306-318, 2021, doi:10.1109/JETCAS.2021.3062413
|
2021-04-19~22
|
Sying-Jyan Wang, Tzu-Heng Chang, Katherine Shu-Min Li
|
Machine Learning Assisted Challenge Selection for Modeling Attack Resistance in Strong PUFs
|
2021 International Symposium on VLSI Design, Automation and Test (VLSI-DAT)
|
2021-06
|
Sying-Jyan Wang, Yu-Sheng Chen and Katherine Shu-Min Li
|
Modeling Attack Resistant PUFs Based on Adversarial Attack Against Machine Learning
|
IEEE Journal on Emerging and Selected Topics in Circuits and Systems, Vol. 11, Issue: 2, pp. 306 - 318
|
2021-08-05~06
|
Chien-Lung Wang, Yi-Chieh Liao and I-En Liao
|
A Federated Learning Study of Privacy-Preserving Secret Sharing based on Deep Neural Network
|
第31屆全國資訊安全會議Cryptology and Information Security Conference 2021 (CISC2021)
|
2021-08-16
|
Chia-Wei Tsai, Jason Lin, Lung Chiu and Chun-Wei Yang
|
Cryptanalysis and Improvement in Multi-Party Quantum Key Distribution Protocol with New Bell States Encoding Mode
|
International Journal of Theoretical Physics, 60(9), 3599-3608
|
2022-01-08
|
Iuon-Chang Lin, Ching-Chun Chang and Chih-Hsiang Peng
|
An Anomaly-Based IDS Framework Using Centroid-Based Classification
|
Symmetry, 14(1), 105; https://doi.org/10.3390/sym14010105
|
2022-01-20
|
Chia-Wei Tsai, Chun-Wei Yang and Jason Lin
|
Multiparty Mediated Quantum Secret Sharing Protocol
|
Quantum Information Processing, 21(2), 1-17
|
2022-01-26
|
Iuon-Chang Lin, Chin-Chen Chang and Yu-Sung Chang
|
Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA
|
Symmetry, 14(2), 237; https://doi.org/10.3390/sym14020237.
|
2022-3-8
|
Yun-Chien Tseng, Mu-Hua Yang, Yao-Chung Fan , Wen-Chih Peng, Chih-Chieh Hung
|
Template-Based Headline Generator for Multiple Documents
|
IEEE Access(10)
|
2022-04-15
|
Jason Lin,Chia-Wei Tsai, Chun-Wei Yang, Kuan-Hung Liu
|
A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix
|
Symmetry 2022, 14(2), 828 https://www.mdpi.com/2073-8994/14/4/828.
|
2022-04-10
|
Hung-Wen Wang, Chia-Wei Tsai, Jason Lin, Yu-Yun Huang, Chun-Wei Yang
|
Efficient and secure measure-resend authenticated semi-quantum key distribution protocol against reflecting attack
|
Mathematics 2022, 10(8), 1241 https://www.mdpi.com/2227-7390/10/8/1241.
|
2022-04-18~21
|
Sying-Jyan Wang, Y.-C. Shih and Katherine Shu-Min Li
|
Improving IJTAG Test Efficiency and Securityning
|
2022 International Symposium on VLSI Design, Automation and Test (2022 VLSI-DAT)
|
2022-04-30
|
Chia-Wei Tsai, Kuei-Chun Chiang, Hsin-Yuan Hsieh, Chun-Wei Yang, Jason Lin, Yao-Chung Chang
|
Feature Extraction of Anomaly Electricity Usage Behavior in Residence Using Autoencoder
|
Electronics 2022, 11(9), 1450 https://www.mdpi.com/2079-9292/11/9/1450.
|
2022-5-12
|
Ting-Wei Chang; Yao-Chung Fan; Arbee L. P. Chen
|
Emotion-cause pair extraction based on machine reading comprehension model
|
Multimedia Tools and Applications volume 81, 40653–40673
|
2022-06-16~17
|
應瑞傑;蔡國裕;李榮三;周澤捷
|
基於聲譽清單之可移動式路側單元集群協定
|
第三十二屆全國資訊安全會議(CISC 2022) Cryptology and Information Security Conference 2022
|
2022-06-16~17
|
籃若瑜;蔡國裕;賴俊鳴;王銘宏
|
短文本論述萃取演算法
|
第三十二屆全國資訊安全會議(CISC 2022) Cryptology and Information Security Conference 2022
|
2022-07-18~23
|
Chih-Shuo Tsai, Ying-Hong Chan, Yao-Chung Fan
|
Hierarchical Cache Transformer: Dynamic Early Exit for Language Translation
|
2022 International Joint Conference on Neural Networks (IJCNN)
|
2022-7-23~29
|
Lei Hsiung, Yun-Yun Tsai, Pin-Yu Chen, Tsung-Yi Ho
|
CARBEN: Composite Adversarial Robustness Benchmark
|
The 31st International Joint Conference on Artificial Intelligence (IJCAI 2022) Demo Track
|
2022-09-22
|
Shu-Yu Kuo, Kuo-Chun Tseng, Yao-Hsin Chou, Fan-Hsun Tseng,
|
Quantum Oblivious Transfer with Reusable Bell State
|
Computers, Materials & Continua 2023, 74(1), 915-932
|
2022-10-10
|
Jason Lin; Chia-Wei Tsai; Chun-Wei Yang
|
Cryptanalysis and Improvement of the Measurement-Device-Independent Quantum Key Distribution with Hyper-Encoding
|
Modern Physics Letters A , Vol. 37, No. 31, 2250212 (2022)
|
2022-10-14~16
|
Sying-Jyan Wang, Yi-Chi Lin, Chen-Yeh Lin, Song-Kong Chong, Katherine Shu-Min Li
|
Automatic Alignment for Side-Channel Attack Against Cryptographic Modules
|
2022 IET International Conference on Engineering Technologies and Applications
|
2022-10-14~16
|
Chun-Tsai Chien, Chien Lung Wang and Sying-Jyan Wang
|
Zero Payload Enhanced AES Cryptography Against Side-Channel Attacks
|
2022 IET International Conference on Engineering Technologies and Applications
|
2022-10-14~16
|
Chien-Lung Wang; Iuon-Chang Lin; Chun-Tsai Chien; Sying-Jyan Wang ;Jou-An Shih; I-En Liao
|
An Evaluation of Cybersecurity Risks of DLMS/COSEM Smart Meter Using Fuzzing Testing
|
2022 IET International Conference on Engineering Technologies and Applications
|
2022-10-27~29
|
Shih-Wei Guo, Tzu-Chi Chen, Hui-Juan Wang, Fang-Yie Leu, Yao-Chung Fan
|
Generating Personalized Phishing Emails for Social Engineering Training Based on Neural Language Models.
|
BWCCA 2022: Advances on Broad-Band Wireless Computing, Communication and Applications
|
2022-11-21~23
|
S. -J. Wang, K. S. -M.Li,C. -Y. Lin and S. -K.Chong
|
Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication
|
31st Asian Test Symposium (ATS)
|
2022-12-15~17
|
施語涵;黃詩軒;蔡家緯;張耀中;盧韻文;王李品檠
|
基於用電負載情境預測冰水主機負載及電力能耗預測
|
2022 臺灣網際網路研討會TANET
|
2022-12-15~17
|
謝欣原;蔣貴君;蔡家緯
|
使用集成學習策略於住宅用戶異常用電行為辨識之研究
|
2022 臺灣網際網路研討會TANET
|
2023-01-14
|
Chun-Wei Yang; Hung-Wen Wang; Jason Lin; Chia-Wei Tsai
|
Semi-quantum Identification without Information Leakage
|
Mathematics 2023, 11(2), 452
|
2023-4-21~23
|
Tzu-Hsuan Huang, Chun-Tsai Chien, Chien-Lung Wang and I-En Liao
|
The Implementation of an HSM-Based Smart Meter for Supporting DLMS/COSEM Security Suite 1
|
IoTBDS 2023
|
2023-4-21~25
|
Chia-Wei Tsai, Jyun-Jie Hong, Yun-Hao Lee, Jason Lin, Chun-Wei Yang
|
Semi-quantum Private Comparison Protocol with Graph state
|
9th IEEE International Conference on Applied System Innovation 2023
|
2023-4-21~25
|
Yu-Xiang Zou; Jason Lin; Chia-Wei Tsai; Chun-Wei Yang
|
Alpha-Boost: A Fast Algorithm for Mining Workflow Nets
|
9th IEEE International Conference on Applied System Innovation 2023
|
2023-5-4
|
Chun-Wei Yang ; Jason Lin; Chia-Wei Tsai; Kai-Lin Wang; Chia-Wei Tsai
|
Cryptanalysis and improvement of a controlled quantum secure direct communication with authentication protocol based on five-particle cluster state
|
Quantum Information Processing volume 22, Article number: 196 (2023)
|
2023-6-1~2
|
翁偉銘;蔡國裕;郭崇韋
|
基於DAE之旁通道攻擊實作與分析
|
第三十三屆全國資訊安全會議(CISC 2023) Cryptology and Information Security Conference 2023
|
2023-10-25~27
|
Chun-Tsai Chien, Chien-Lung Wang, I-En Liao, Sying-Jyan Wang
|
Implementing OIML R46 Communication Unit for DLMS/COSEM Security Suite 1 and Passing CTT V3.1 Test
|
ICNSC 2023: 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL
|