呂芳懌特聘教授- 專任教師 - 東海大學資訊工程學系--
文章推薦指數: 80 %
東海大學資訊工程學系, 特聘教授, 2018 年08 月至2019 年07 月. 東海大學資訊工程學系, 教授, 2010 年02 月至今. 東海大學資訊工程學系, 副教授, 1991 年08 月至2010 ...
專任教師
首頁
專任教師
專任教授
呂芳懌特聘教授
系所介紹
發展沿革
系所特色
教育目標
發展領域
學習活動
分組介紹
教師
榮譽講座教授
系主任
專任教授
兼任教授
合聘教授
退休教授
客座教授
研究員
實驗室
年度報告
年度報告書
東海大學資訊工程學系-專任教師-專任教授-呂芳懌特聘教授
林祝興教授
楊朝棟終身特聘教授
朱正忠終身特聘教授
黃育仁教授
蔡清欉教授
周忠信教授
朱允執副教授
陳隆彬副教授
黃宜豊副教授
石志雄副教授
劉榮春副教授
許瑞愷副教授
焦信達助理教授
賴俊鳴助理教授
許宏誌助理教授
陳仕偉助理教授
廖元勳助理教授
呂芳懌特聘教授Fang-YieLeu
※各分機請先撥本校總機:(04)23590121
基本資料
學術著作
研究計畫與獎勵
學術活動及獲獎
學術服務與產學
E-mail
實驗室
老師個人網站
[email protected]
資料庫與網路安全實驗室
http://dblab.csie.thu.edu.tw/boss.html
研究室位置
研究室分機
實驗室位置
實驗室分機
ST422
33815
ST425
33849
研究領域
物聯網、無線網路、網路安全與感測網路
最高學歷
國立台灣工業技術學院
電子所
博士
KnowledgeSystemsInstitute
ComputerandInform.Scinece
碩士
國立台灣工業技術學院
電子所
碩士
國立台灣工業技術學院
電子工程技術系
學士
經歷
服務單位
職稱
起迄年月
東海大學資訊工程學系
特聘教授
2018年08月至2019年07月
東海大學資訊工程學系
教授
2010年02月至今
東海大學資訊工程學系
副教授
1991年08月至2010年01月
龍華工專電子科
講師
1986年08月至1987年07月
明志工專電機科
助教
1983年08月至1984年07月
中區電信管理局電子交換機維護中心
高技員
1979年06月至1981年08月
期刊論文
順序
名稱
1
HeruSusanto,LeuFang-Yie,WahyuCaesarendra,FahmiIbrahim,P.K.Haghi,UusKhusniandAdamGlowacz,“ManagingCloudIntelligentSystemovertheDigitalEcosystem:RevealingAppsBehaviorduringPandemicCovid-19,”AppliedSystemInnovation,September7,2020.(非SCI)
2
HeruSusanto,LeuFangYie,DesiSetiana,YaniAsih,AmbarYoganingrum,SlametRiyantoandFadlyAkbarSaputra,“DigitalEcosystemSecurityIssuesforOrganizationsandGovernments:DigitalEthicsandPrivacy,”Chapter5ofthebookentitledWeb2.0andCloudTechnologiesforImplementingConnectedGovernment,August10,2021.
3
LeuFangYie,HeruSusantoandDesiSetiana,“CollaboratingDecisionSupportandBusinessIntelligencetoEnableGovernmentDigitalConnectivity,”Chapter5ofthebookentitledWeb2.0andCloudTechnologiesforImplementingConnectedGovernment,August10,2021.
4
HeruSusanto,LeuFangYie,DidiRosiyadi,AkbariIndraBasukiandDesiSetiana,“DataSecurityforConnectedGovernmentsandOrganisations:ManagingAutomationandArtificialIntelligence,”Chapter11ofthebookentitledWeb2.0andCloudTechnologiesforImplementingConnectedGovernment,August10,2021.
5
Fang-YieLeu,HeruSusanto,Kun-LinTsai,Chia-YinKo*,“AChannelAssignmentSchemeforMIMOonConcentric-Hexagon-basedMulti-ChannelWirelessNetworks,”InternationalJournalofAdHocandUbiquitousComputing(IJAHUC),acceptedonJune19,2020.(SCI,IF’18=0.56,149/155)
6
Chia-YinKoandFang-YieLeu*,“ExaminingSuccessfulAttributesforUndergraduateStudentsbyApplyingMachineLearningTechniques,”IEEETransactionsonEducation,acceptedonJune16,2020.(SCI,IF’18=2.214,15/41)
7
Chin-LingChen,Yuan-HaoLiao,Fang-YieLeu,IlsunYo,Kim-KwangRaymondChoo,Chia-YinKo,Ane-lotterysystemwithafairpurchasingenvironmentandanarbitrationmechanism,JournalofInternetTechnology(ISSN1607-9264),Vol.21No.3,pp.655-671,May2020,DOI:10.3966/160792642020052103004[SCIE,EI;2018Impactfactor:0.715,Q4.Telecommunications,Rank=39/89].
8
Fang-YieLeu*,Ping-JuiChiang,HeruSusanto,Rui-TingHung,Hui-LingHuang,“MobilePhysiologicalSensorCloudSystemforLong-termCare,”InternetofThings,vol.11,September2020,pp.?-?.(EI)
9
Li-LingHung,Fang-YieLeu,Kun-LinTsaiandCia-YinKo,“Energy-EfficientCooperativeRoutingSchemeforHeterogeneousWirelessSensorNetworks,”IEEEAccess,vol.8,March2020,pp.56321–56332,DOI:10.1109/ACCESS.2020.2980877.(SCI,IF’18=4.098,22/155)
10
Yao-ChungFan,Si-YingHuang,Yung-YuChen,Lun-ChiChen,Fang-YieLeu*,WordEmbeddingQuantizationforPersonalizedRecommendationonStorage-ConstrainedEdgeDevicesinaSmartStore,”MobileNetworksandApplications,acceptedonMarch14,2020.(SCI,IF’18=2.39,19/53)
11
Kun-LinTsai,Fang-YieLeu,Li-LingHung*,andChia-YIinKo,“SecureSessionKeyGenerationMethodforLoRaWANServers,"IEEEAccess,vol.8,March2020,pp.54631-54640.(SCI,IF’18=4.098,22/155)
12
Fang-YieLeu,Kun-LinTsai,HeruSusanto,Cheng-YanGu,IlsunYou*,“AFaultTolerantMechanismforUEAuthenticationin5GNetworks"MobileNetworksandApplications,acceptedonJanuary2020.(SCI,IF’18=2.39,19/53)
13
HeruSusanto,Fang-YieLeu,Chin-KangChenandFadzlinatiMohiddin,ManagingHumanCapitalinToday’sGlobalization:AManagementInformationSystemPerspective,AppleAcademicPress,TailorandFrancisGroup,Oct.2019.(Book)
14
Yi-LiHuang,Fang-YieLeu*,Ruey-KaiSheu,Jung-ChunLiu,HeruSusanto,“ASecureandEfficientWSNbyEmployingSymmetricKeyMatrixandRectangularFrameScheme,”ConcurrencyandComputation:PracticeandExperience,networkversiononNov.29,2019.(SCI,IF’18=1.167,59/105)
15
Kun-LinTsai,Fang-YieLeu,I.You,Shuo-WenChang,Shiung-JieHu,HoonyongPark,“LowPowerAESDataEncryptionArchitectureforLoRaWAN,”IEEEAccess,vol.7,issue1,December2019,pp.146348-146357.(SCI,IF’18=4.098,22/155)
16
Jeng-WeiLin,Shih-weiLiaoandFang-YieLeu*,“SensorDataCompressionUsingBoundedErrorPiecewiseLinearApproximationwithResolutionReduction,”Energies,vol.12,2523,June2019.(SCI,IF’18=2.707,56/103)
17
Fang-YieLeu*,Kun-LinTsai,Szu-YinLin,“E-ANDSF-basedBaseStationSelectionSchemebyusingMLPinUntrustedEnvironments,"IEEETransactionsonIndustrialInformatics,vol.15,no.10,October2019.(SCVI,IF’18=7.377,1/46)
18
HeruSusanto,LeuFang-YieandChinKangChen,BusinessProcessReengineering--AnICTApproach,AppleAcademicPress,April2019.
19
HeruSusanto,LeuFang-YieandChinKangChen,“GreenInformationandCommunicationTechnologyAwarenessasaCorporateStrategyforInformationSystems,”Chapter11ofthebookentitledTheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,AppleAcademicPress,Dec2018,pp.253-284.
20
ChinKangChen,HeruSusantoandLeuFang-Yie,“ManagingonlineLearning:BigdataSocialNetworks,cloudComputing,”Chapter10ofthebookentitledTheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,AppleAcademicPress,Dec2018,pp.229-252.
21
HeruSusanto,LeuFang-YieandChinKangChen,“EnablingOnlineEducation:AnAcademicAspect,”Chapter6ofthebookentitledTheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,AppleAcademicPress,Dec2018,pp.125-152.
22
HeruSusanto,andLeuFang-Yie,RevealingtheBig-datarevolutionasaDriverofScienceAchievementinTioday’sGlobalization,”Chapter3ofthebookentitledTheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,AppleAcademicPress,Dec2018,pp.49-64.
23
Kun-LinTsai,Yi-LiHuang,Fang-YieLeu,IlsunYou*,Yu-LingHuang,Cheng-HanTsai,“AES-128BasedSecureLowPowerCommunicationforLoRaWANIoTEnvironments,”IEEEACCESS,vol.6,issue1,2018,pp.45325-45334.(SCI,IF’18=4.098,22/155)
24
HeruSusanto,LeuFang-YieandChinKangChen,TheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,AppleAcademicPress,Dec2018.
25
IlsunYou*andFang-YieLeu,“Commentson“SPAM:ASecurePasswordAuthenticationMechanismforSeamlessHandoverinProxyMobileIPv6Networks,”IEEESystemsJournal,vol.12,no.1,pp.1038-1041,March2018.(SCI)
26
Jung-ChunLiu,Fang-YieLeu*,Guan-LiangLin,HeruSusanto,“AnMFCC-basedText-independentSpeakerIdentificationSystemforAccessControl,”ConcurrencyandComputation:PracticeandExperience,vol.30,issue2,2018,pp.1-16.SCI
27
MobileInternetSecurity,IlsunYou,Fang-YieLeu,Hsing-ChungChenandIgorKotenko(Eds.),CommunicationsinComputerandInformationScience797,Springer,2018.http://www.springer.com/series/7899
28
Xiu-ShuZhang,Fang-YieLeu*,Ching-WenYang,Lai-ShiunLai,“Healthcare-basedonCloudElectrocardiogramSystem:AMedicalCenterExperienceinMiddleTaiwan,”JournalofMedicalSystems,vol.42,issue3,March,2018,pp.1-13.(SCI)
29
VishalSharma,IlsunYou⁎,Fang-YieLeu,andMohammedAtiquzzaman,“Secureandefficientprotocolforfasthandoverin5GmobileXhaulnetworks,”JournalofNetworkandComputerApplications,vol.102,January2018,38–57.
30
Fang−YieLeu,Chia−YinKo,IlsunYou*,Kim-KwangRaymondChoo,Chi-LunHo,“ASmartphone-BasedWearableSensorsforMonitoringReal-TimePhysiologicalData,”ComputersandElectricalEngineering,vol.65,January2018,pp.376–392.(SCI,IF17=1.084).
31
Kun-LinTsai,andFang-YieLeu,“SecureData-sharingusingDistributedEnvironmentalMatchingKeys,”PervasiveandMobileComputing,vol.42,December2017,pp.513–525.
32
FatosXhafa,Fang-YieLeuandLi-LingHung,SmartSensorsNetworks--CommunicationTechnologiesandIntelligentApplications,EditedbyFatosXhafa,Fang-YieLeuandLi-LingHung,AcademicPress(Elsevier),LondonWall,LondonEC2Y5AS,UnitedKingdom,May2017.
33
Fang-YieLeu,Chia-YinKo,Yi-ChenLin,HeruSusanto,Hsin-ChunYu,“FALLDETECTIONANDMOTIONCLASSIFICATIONBYUSINGDECISIONTREEONMOBILEPHONE,”Chapter10ofthebookentitledSmartSensorsNetworks--CommunicationTechnologiesandIntelligentApplications,pp.205-237,May2017.
34
Jui-HungKao,ChienChan,FeiPeiLai,Bo-ChengLin,Wei-ZenSun,Kuan-WuChang,Fang-YieLeu,Jeng-WeiLin*,“SpatialanalysisanddataminingtechniquesforidentifyingriskfactorsofOut-of-HospitalCardiacArrest,”InternationalJournalofInformationManagement,Vol.37,Issue1,PartB,February2017,pp.1528-1538.(SCI,IF’18=5.063,1/89)
35
Jung-ChunLiu,Yi-LiHuang,Fang-YieLeu*,Feng-ChingChiang,Chao-TungYang,WilliamCheng-ChungChu,“ASquareKeyMatrixManagementSchemeinWirelessSensorNetworks,”ComputingandInformatics,Vol.36,May2017,1001–1017.(SCI,JCR’13=0.319,121/115)
36
Yao-ChungFan,HuanChen,Fang-YieLeu,IlsunYou*,“EnablingIn-NetworkAggregationbyDiffusionUnitsforUrbanScaleM2MNetworks,”JournalofNetworkandComputerApplications,vol.93,1September2017,pp.215–227.
37
Tzu-ChiangChiang,Pei-YunCheng,andFang-YieLeu*,“PredictionoftechnicalefficiencyandfinancialcrisisofTaiwan’sinformationandcommunicationtechnologyindustrywithdecisiontreeandDEA,”SoftComputing,vol.21,issue18,September2017,pp.5341-5353.(SCI)
38
Fang-YieLeu,Kun-LinTsai*,Yi-TingHsiao,andChao-TungYang,“AnInternalIntrusionDetectionandProtectionSystembyusingDataMiningandForensicTechniques,”IEEESystemsJournal,vol.11,no.2,June2017,pp.427-438.(SCI,IF’18=4.463)
39
Chao-TungYang,Jung-ChunLiu,Wei-ShengChen,Fang-YieLeuandWilliamCheng-ChungChu,“ImplementationofavirtualswitchmonitoringsystemusingOpenFlowoncloud,”InternationalJournalofAdHocandUbiquitousComputing,Vol.24,No.3,2017,pp.162-172.(SCI,JCR’13=0.90,81/135)
40
Chia-PingShen,Feng-ShengLin,AndyYan-YuLam,WeiChen,WeizhiZhou,Hsiao-YaSung,Yi-HueiKao,Ming-JangChiu,Jeng-WeiLin,Fang-YieLeu,andFeipeiLai,“GA-SVMmodelingofmulticlassseizuredetectorinepilepsyanalysissystemusingcloudcomputing,”SoftComputing,vol.21,Issue8,April2017,pp2139–2149.
41
HeruSusanto,ChenChinKangandFangYieLeu,“ALessonLearnfromITasEnableofBusinessProcessRe-Design,”InformationSystemandEconomicsandEJournal,acceptedinFebruary2016.
42
HeruSusanto,ChenChinKangandFangYieLeu,“RevealingtheRoleofICTforBusinessCoreRedesign,”InformationSystemandEconomicsandEJournal,acceptedFebruary2016.
43
Kun-LinTsai*,Fang-YieLeuandShun-HungTsai,“DataEncryptionMethodUsingEnvironmentalSecretKeywithServerAssistance,”IntelligentAutomation&SoftComputing,vol.22,Issue3,August2016,pp.423-430.(SCI)
44
Kun-LinTsai,Yi-LiHuang,Fang-YieLeu,andIlsunYou,“TTPbasedHigh-efficientMulti-KeyExchangeProtocol,”IEEEACCESS,vol.4,2016,pp.6261-6271.
45
Kun-LinTsai,Fang-YieLeu,andIlsunYou*,“ResidenceEnergyControlSystemBasedonWirelessSmartSocketandIoT,”IEEEACCESS,vol.4,2016,pp.2885-2896.
46
Kun-LinTsai,Fang-YieLeu,andJiu-SoonTan,“AnECC-basedSecureEMRTransmissionSystemwithDataLeakagePreventionScheme,”InternationalJournalofComputerMathematics,vol.93,no.2,February2016,pp.367-383.(SCI,2014,0.825)
47
Jia-ChunLin,Fang-Yie,LeuandYing-pingChen,“ImpactsofTaskRe-executionPolicyonMapReduceJobs,”TheComputerJournal,vol.59,issue5,2016,701-714.
48
IlsunYou,Fang-YieLeu,“AppliedCryptographyanditsPracticalApplicationstoSecureInternetServices,”EditorialofJournalofInternetTechnology,January2016.
49
Fuu-ChengJiang,IlsunYouandFang-YiLeu,“ApproachinggreenSensorFieldusingQueue-basedOptimizationTechnique,”JournalofNetworkandComputerApplications,vol.66,May2016,pp.128–136.
50
HeruSusanto,LeuFang-Yie,andChinKangChen,“AndroidvsiOSorOthers?SMD-OSSecurityIssues:GenerationYPerception,”InternationalJournalofTechnologyDiffusion(IJTD),vol.7,no.2,pp.1-18,2016.
51
MarekR.Ogiela,IlsunYou,Fang-YieLeu,andYu-CheeTseng,“Secureubiquitouscomputing,”PervasiveandMobileComputing,vol.24,December2016,pp.1-3.
52
Fang-YieLeu*,Chin-YuLiu,Jung-ChunLiu,Fuu-ChengJiang,“S-PMIPv6:anIntra-LMAmodelforIPv6Mobility,”JournalofNetworkandComputerApplications,Vol.58,December2015,pp.180–191.
53
Fang-YieLeu,Yi-LiHuang,Sheng-MaoWang,“ASecureM-CommerceSystembasedoncreditcardtransaction,”ElectronicCommerceResearchandApplications,vol.14,2015,pp.351-360.(SCI,IF=2.135)
54
Fang-YieLeu,Hsin-LiangChen,andChih-ChungCheng,“ImprovingMulti-pathCongestionControlforEvent-drivenWirelessSensorNetworksbyusingTDMA,”JournalofInternetServicesandInformationSecurity(JISIS),vol.5,no.4,November2015,pp.1-19.
55
Yi-LiHuang,I-LongLin,Fang-YieLeu*,Jung-ChunLiu,Fuu-ChengJiang,Cheng-ChungChu,Chao-TungYang,Miao-HengChen,“ASecureAuthenticationSystemforControllingTrafficLightsforAmbulances,”JournalofInternetTechnology,vol.16,no.1,January2015,pp.19-33.(SCI,JCR’12=0.418,68/78)
56
Chao-TungYang,Wen-ChungShih,Lung-TengChen,Cheng-TaKuo,Fuu-ChengJiang,Fang-YieLeu,“AccessingMedicalImageFilewithCo-allocationHDFSinCloud,”FutureGenerationComputerSystems,vol.43-44,February2015,pp.61-73.SCI
57
Yi-LiHuang,Cheng-RuDai,Fang-YieLeu,IlsunYou*,“ASecureDataEncryptionMethodEmployingaSequential-LogicStyleMechanismforaCloudSystem,”InternationalJournalofWebandGridServices,vol.11,no.1,January2015,pp.102-124.SCI,JCR’13=1.579,24/105.
58
Ming-ChangLee,Fang-YieLeu*,Ying-pingChen,“Pareto-basedCacheReplacementAlgorithmsforYouTube,”WorldWideWebJournal,vol.18,Issue6,pp.1523–1540,November2015.(SCI,JCR’13-1.623,20/105)
59
Jia-ChunLin,Fang-YieLeu,andYing-pingChen,“ImpactofMapReducePoliciesonJobCompletionReliabilityandJobEnergyConsumption,”IEEETransactionsonParallelandDistributedSystems,vol.26,issue5,May2015,pp.1364-1378.(SCI,JCR’13=2.173,10/102)
60
Chia-YinKo,Fang-YieLeuandI-TsenLin,“Usingsmartphoneasatrackandfalldetector:Anintelligentsupportsystemforpeoplewithdementia,”abookchapterofAdvancedTechnologicalSolutionsforDementiaPatientMonitoring,editedbyFatosXhafa,PhilipMooreandGeorgeTadros,IGIPublisher.
61
Jia-ChunLin,Fang-YieLeu,Ying-pingChen,“AnalyzingJobCompletionReliabilityandJobEnergyConsumptionforaHeterogeneousMapReduceClusterunderDifferentIntermediate-DataReplicationPolicies,”JournalofSupercomputing,vol.71,Issue5,pp1657-1677,May2015.(SCI,JCR’13=0.841,47/102)
62
Jia-ChunLin,Fang-YieLeu,Ying-pingChen,ReHRS:AHybridRedundantSystemforImprovingMapReduceReliabilityandAvailability,abookchapterofSpringerbookCompanyentitledModellingandProcessingforNextGenerationBigDataTechnologiesandApplications,2015,187-209.
63
Jia-ChunLin,Fang-YieLeu*,Ying-pingChen,“PAReS:AProactiveandAdaptiveRedundantSystemforMapReduce,”JournalofInformationScienceandEngineering,vol.31,no.5,pp.1797-1815,Sept.2015.(SCI,JCR’13=0.333,128/135)
64
Fang-YieLeuandYi-TingHsiao,“AGridSystemDetectingInternalMaliciousBehaviorsatSystemCallLevel,”JournalofInternetServicesandInformationSecurity(JISIS),vol.4,no.4,November2014,pp.14-24.
65
Fang-YieLeu,FatosXhafa,AnielloCastiglioneandYi-LiHuang,“EMERGINGWIRELESSANDSENSORNETWORKSANDTHEIRAPPLICATIONS,”InternationalJournalofCommunicationNetworksandDistributedSystems,vol.13,nos.3/4,2014,pp.241-243.(EI)
66
IlsunYou,Yi-LiHuang,Fang-YieLeu,Jung-chunLiu,Lih-JiunLo,“ASecureWirelessCommunicationSystemIntegratingPRNGandDiffie-HellmanPKDSbyUsingaDataConnectionCore,”JournalofInternetTechnology,vol.15,no.5,September2014,pp.713-726.(SCI,JCR’13=0.418,68/78)
67
Yi-LiHuang,Fang-YieLeu,Jian-HongChenandWilliamCheng-ChungChu,“ATrueRandom-NumberEncryptionMethodEmployingBlockCipherandPRNG,”ComputerScienceandInformationSystems(ComSIS),vol.11,issue3,pp.905–924,August2014.(SCI,JCR’13=0.575,101/135)
68
Fang-YieLeu,Jung-chunLiu,Ya-TingHsu,Yi-LiHuang,“TheSimulationofanEmotionalRobotImplementedwithFuzzyLogic,”SoftComputingJournal,Septembervol.18,Issue9,Sept.2014,pp.1729-1743.(SCI,JCR’13=1.304,59/121)
69
Kun-LinTsai,Fang-YieLeu,Tien-HanWu,Shin-shiuanChiou,Yu-WeiLiuandHan-YunLiu“ASecureECC-basedElectronicMedicalRecordSystem,”JournalofInternetServicesandInformationSecurity,vol.4,no.1,February2014,pp.47-57.
70
Chin-LingChen,Chun-YiWu,Fang-YieLeuandYi-LiHuang,“UsingRFIDYokingProoftoDesignaSupply-ChainApplicationsforCustomsCheck,”ITCoNvergencePRActice(INPRA),vol.1,no.2,June2013,pp.34-54.
71
Jia-ChunLin,Fang-YieLeu,andYing-pingChen,“AnalyzingjobcompletionreliabilityandjobenergyconsumptionforageneralMapReduceinfrastructure,”JournalofHighSpeedNetworks,vol.19,no.3,2013,pp.203–214.(EI)
72
CHIN-LINGCHEN,TSAI-TUNGYANG,FANG-YIELEUANDYI-LIHUANG,“DesigningaHealthcareAuthorizationModelBasedonCloudAuthentication,”IntelligentAutomationandSoftComputing,vol.20,no.3,pp.365-379,July2013.SCI=0.155.
73
Fuu-ChengJiang,Hsiang-WeiWu,Fang-YieLeu,andChao-TungYang,“TowardgreensensorfieldbyoptimizingpowerefficiencyusingD-policyM/G/1queuingsystems,”MobileInformationSystems,vol.9,no.3,January2013,pp.241-260.
74
Fuu-ChengJiang,Fang-YieLeu,Hsiang-WeiWu,Ching-HsienHsuandWilliamCheng-ChungChu,“TowardSustainableSensorFieldbyGreenerTechniqueofOptimizationwithQueue-basedApproach,”JournalofInternetTechnology,vol.14,no.4,July,2013,pp.619-630.(SCI,JCR’12=0.418,68/78)
75
Yi-LiHuang,Fang-YieLeu*,IlsunYou,Yao-KuoSun,andCheng-ChungChu,“ASecureWirelessCommunicationSystemIntegratingRSA,Diffie-HellmanPKDS,IntelligentProtection-keyChainsandaDataConnectionCoreina4GEnvironment,”JournalofSupercomputing,vol.67,no.3,March2014,pp.635-652.(SCI,JCR’12=0.917,39/100)
76
MarekR.Ogiela,IlsunYou,MakotoTakizawa,Fang-YieLeu,(GuestEditorial),“Advancesinmobile,ubiquitousandcognitivecomputing,”MathematicalandComputerModelling,vol.58,2013,pp.1138-1139.
77
Yi-LiHuang,Fang-YieLeu,Ko-ChungWei,“ASecureCommunicationoverWirelessEnvironmentsbyusingaDataConnectionCore,MathematicalandComputerModelling,vol.58,issue5-5,September2013,pp.1459–1474.(SCI,JCR’12=1.42,38/247)
78
Fang-YieLeu,Fuu-ChengJiang,Chih-ChengLien,Sen-TarngLaiandShiuan-YouChiou,“ARate-allocationBasedMulti-pathCongestionControlSchemeforEvent-DrivenWirelessSensorNetworks,”ComputerSystemsScienceandEngineering,vol.27,no.5,September2012,pp.(SCI,JCR-0.371,88/99)
79
Yi-LiHuang,Chu-HsingLinandFang-YieLeu*,“ABatchVerificationSchemebyusingtheMatrix-DetectionAlgorithm,”JournalofInternetTechnology,vol.13,no.4,July2012,pp.681-690.(SCI,JCR’12=0.481,61/78)
80
Fang-YieLeu,Keng-YenChao,Ming-ChangLeeandJia-ChunLin“ASemi-preemptiveComputationalServiceSystemwithlimitedResourcesandDynamicResourceRanking,”Algorithms,vol.5,issue1,March2012,pp.113-147.
81
Ming-ChangLee,Fang-YieLeu,Ying-pingChen,“PFRF:AnAdaptiveDataReplicationAlgorithmbasedonStar-basedDataGrids,”FutureGenerationComputerSystems,vol.28,issue7,July2012,pp.1045–1057.(SCI,JCR’12=1.864,15/100)
82
Fuu-ChengJiang,Der-ChenHuang,Chao-TungYangandFang-YiLeu,“LifetimeElongationforWirelessSensorNetworkusingQueue-basedApproaches,”JournalofSupercomputing,vol.59,Issue3,January2012,pp.1312-1335.(SCI,JCR’12=0.917,39/100)
83
Fang-YieLeu,(GuestEditorial),“EmergingSecurityTechnologiesandApplications,”JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,vol.2,no.3,September2011,pp.1-3.
84
Yi-LiHuangandFang-YieLeu,“ConstructingaSecurePoint-to-PointWirelessEnvironmentbyIntegratingDiffie-HellmanPKDSRSAandStreamCipheringforUsersKnowntoEachOther,”JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,vol.2,no.3,September2011,pp.96-107.
85
Fang-YieLeu,IlsunYouandFeilongTang,(GuestEditorial)“EmergingWirelessandMobileTechnologies,”MobileInformationSystems,vol.7,no.3,September2011,pp.165–167.
86
Yi-FuCiou,Fang-YieLeu,Yi-LiHuangandKangbinYim,“AHandoverSecurityMechanismEmployingDiffie-HellmanKeyExchangeApproachforIEEE802.16eWirelessNetworks,”MobileInformationSystems,vol.7,no.3,September2011,pp.241–269.(SCI,JCR’11=2.432,11/135)
87
Fang-YieLeu,Fenq-LinJenqandFuu-ChengJiang,“APathSwitchingSchemeforSCTPBasedonRoundTripDelays,”ComputersandMathematicswithApplications,vol.62,Issue9,November2011,pp.3504–3523.(SCI,JCR’12=2.069,11/247)
88
Yi-FungHuang,Fang-YieLeu,Chao-HongChiuandI-LongLin,“ImprovingSecurityLevelsofIEEE802.16eAuthenticationbyInvolvingDiffie-HellmanPKDS,”JournalofUniversalComputerScience,vol.17,no.6,March2011,pp.891--911.(SCI,JCR’11=0.398,85/104)
89
Fang-YieLeu,IlsunYouandYao-TienHuang,“ACoordinatedMultipleChannelAssignmentSchemeandAPDeploymentforChannelReuseinMetropolitanScaleWirelessNetworks,”JournalofNetworkandComputerApplications,vol.34,Issue2,March2011,pp.632-643.(SCI,JCR’11=1.065,21/50)
90
Chao-TungYang,Fang-YieLeu,andSung-YiChen,“ResourceBrokeringusingaMulti-siteResourceAllocationStrategyforComputationalGrids,”ConcurrencyandComputation:PracticeandExperience,vol.23,no.6,April2011,pp.573–594.(SCI,JCR’11=0.636,64/99)
91
Fang-YieLeu,Neng-WenLo,Lun-NiYang,I-LongLin,“PredictingVertebratePromotersUsingHeterogeneousClusters,”InternationalJournalofAdHocandUbiquitousComputing:aSpecialIssueon:"GridandCloudComputing,Vol.6,No.4,September2010,pp.216–234.(SCI,JCR’11=0.848,80/135)
92
Li-WenLiu,Li-JuJang,Fang-YieLeu,Jieh-JiuhWang,Shu-TwuWang,“FromanInterdisciplinaryApproachtoConstructaModelofCommunityDisasterManagementSupportSystem,”AustralasianJournalofDisasterandTraumaStudies,Vol.2-1-2,2010.(online).http://trauma.massey.ac.nz/issues/2010-2/contents.htm
93
林宜隆,邱獻民,呂芳懌,“數位證據同一性在法庭上之攻擊與防禦─以在網際網路蒐集之數位證據為中心,”中央警察大學學報第四十七期,民國99年七月,pp.363~377.
94
Chao-TungYang,Fang-YieLeuandSung-YiChen,“NetworkBandwidth-awareJobSchedulingwithDynamicInformationModelforGridResourceBrokers,”JournalofSupercomputing,vol.52,no.3,June2010,pp.199-223.(SCI,JCR’11=0.578,37/50)
95
Fang-YieLeu,I-LongLin,“ADoS/DDoSAttackDetectionSystemUsingChi-SquareStatisticApproach,”JournalofSystemics,CyberneticsandInformatics,vol.8,no.2,April2010,pp.41-51.(online).http://www.iiisci.org/Journal/sci/Contents.asp?var=&next=ISS8802
96
Fang-YieLeu,Chau-TungYang,Fuu-ChengJiang,“ImprovingReliabilityofaHeterogeneousGrid-basedIntrusionDetectionPlatformusingLevelsofRedundancies,”FutureGenerationComputerSystems,vol.26,issue4,April2010,pp.554-568.(SCI,JCR’11=1.978,9/99)
97
Fang-YieLeuandChih-ChiehKo,“AnAutomatedTermDefinitionExtractionSystemUsingtheWebCorpusintheChineseLanguage,”JournalofInformationScienceandEngineering,vol.26,no.2,March2010,pp.505-525.(SCI,JCR’11=0.175,132/135)
98
Chao-TungYang,Fang-YieLeuandMing-FengYang,“APeer-to-PeerVideoFileResourceSharingSystemforMobileDevices,”JournalofInternetTechnology,vol.11,no.1,February2010,pp.69-78.(SCI,JCR’11=0.508,57/89)
99
Fang-YieLeu,“IntrusionDetection,ForecastandTracebackAgainstDDoSAttacks,”JournalofInformation,TechnologyandSociety,vol.9,December2009,pp.19-44.
100
Fang-YieLeu,Der-JiunnDengand,Yi-FungHuang,“AnEfficientBandwidth-useSchemeoverWLANwiththeIEEE802.11eStandardDeployingaMulti-pollingMechanism,”InternationalTransactiononComputerScienceandEngineering,vol.56,no.1,October2009,pp.23-46.
101
Fang-YieLeu,“ANovelNetworkMobilityHandoffSchemeUsingSIPandSCTPforMultimediaApplications,”JournalofNetworkandComputerApplications,vol.32,issue5,September2009,pp.1073-1091.(SCI,JCR’11=1.065,21/50)
102
Fang-YieLeu,“AnInnerandIncomingIntrusionDetectionandRemoteProtectionSystem,”InternationalTransactiononComputerScienceandEngineering,vol.55,no.1,August2009,pp.81-96.
103
Fang-YieLeu,Wen-ChinWu,andHung-WeiHuang,“ARoutingAssistantSchemewithLocalizedMovementinUniformlyDistributedEvent-drivenWirelessSensorNetworks,”TheJointInternationalConferencesonAsia-PacificWebConference(APWeb)andWeb-AgeInformationManagement(WAIM),April2009.(LectureNotesinComputerScience,Springer-Verlag.),pp.576-583.
104
Fang-YieLeuandKai-WeiHu,“AReal-TimeIntrusionDetectionSystemusingDataMiningTechnique,”JournalofSystemics,CyberneticsandInformatics,vol.6,no.2,April2008,pp.36-41.(online).www.iiisci.org/journal/CV$/sci/pdfs/T171GTB.pdf
105
Fang-YieLeu,Ming-ChangLi,Jia-ChunLinandChao-TungYang,“DetectionWorkloadinaDynamicGrid-basedIntrusionDetectionEnvironment,”JournalofParallelandDistributedComputing,vol.68,issue4,April2008,pp.427-442.(SCI,JCR’11=0.859,40/99)
106
Fang-YieLeuandGuo-CaiLi,“AScalableSensorNetworkusingaPolarCoordinateSystem,”SignalProcessing,vol.87,issue12,December2007,pp.2978-2990.(SCI,JCR’11=1.503,79/245)
107
Fang-YieLeu,Yu-HsinChen,Ching-ChienKuanandDr-JiunnDeng,“AnImprovedBandwidth-useMethodonIEEE802.11eStandardoverWLAN,”theIFIPInternationalConferenceonNetworkandParallelComputing,DalianChina,September2007.(LectureNotesinComputerScience,Springer-Verlag.),pp.183-192.
108
Fang-YieLeu,Fuu-ChengJiang,Ming-ChangLi,andJia-ChunLin,“AnEnhancedDGIDEPlatformforIntrusionDetection,”TheInternationalConferenceonAutonomicandTrustedComputing,HongKong,China,July2007,(LectureNotesinComputerScience,Springer-Verlag.),pp.559-568.
109
Fang-YieLeuandWei-JieYang,“IntrusionDetectionwithCUSUMforTCP-basedDDoS,”TheFirstIFIPWorkshoponTrustedandAutonomicUbiquitousandEmbeddedSystems(TAUES’05),Nagasaki,Japan,December6-9,2005,pp.1255-1264.(LectureNotesinComputerScience,Springer-Verlag.),(SCI-E,JCR’05=0.402)
110
Fang-YieLeu,Shi-JieYanandWen-KuiChang,“Fuzzy-basedDynamicBandwidthAllocationSystem,”Proceedingsof2005theFirstInternationalConferenceonNaturalComputation&theSecondInternationalConferenceonFuzzySystemsandKnowledgeDiscovery,August2005,pp.911-920.(LectureNotesinComputerScience,Springer-Verlag.)(SCI-E,JCR’05=0.302)
111
Fang-YieLeu,et.al.,“FaceRecognitionUsingImagedatabase,”TungHaiScienceJournal,Vol.1,Nov.1999.
112
Fang-YieLeuandS.W.Zhao,“DistributedDatabaseArchitectureanditsQueryProcessing,”JournalofTungHaiUniversity,Oct.1997.
113
Fang-YieLeu,S.K.ChangandC.C.Yang,"AValidationAssistantforaDistributedOfficeInformationSystemModeledbyOfficeProcedureModel,"JournalofInformationScienceandEngineering,Vol.11,No.2,June1995,pp.183-206.
114
Fang-YieLeuandC.C.Yang,"AutomaticRuleBaseInspectionforData-AccessOrientedKnowledge-BasedSystems,"JournalofInformationScienceandEngineering,Vol.7,No.1,March1991,pp53-79.
會議論文
順序
名稱
1
Shih-TingChiuFang-YieLeu,“UsingCUSUM-AlgorithmtoDetectDoSandDDoSAttack,”The23rdInternationalConferenceonNetwork-BasedInformationSystems(NBiS-2020),August2020,pp.?-?.
2
HungRuiTing,LeuFang-Yie,“OptimizedLoRaModuleforIOT,”The14thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing(BWCCA-2020),July2020,pp.?-?.
3
Szu-YinLin,Fang-YieLeu,Chia-YinK,Ming-ChienShih,"AHybridInformation-basedSmartphoneIndoor-PositionApproach,"The14thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2020,pp.?-?.
4
Bing-HongTsai,Yao-ChungFan,andFang-YieLeu,“ExtractiveSummarizationbyRougeScoreRegressionbasedonBERT,”The14thInternationalConferenceonComplex,Intelligent,andSoftwareIntensiveSystems,(CCISC-2020),July2020,pp.?-?.
5
Yi-HsunLu,Fang-YieLeu,“DynamicRoutingandBandwidthProvisionBasedonReinforcementLearninginSDNNetworks,”Proceedingsofthe34thInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2020),Caserta,Italy,April2020,pp.1-11.
6
Wei-ShengChen,Fang-YieLeu,“TheStudyonAUSFFaultTolerance,”The8-thInternationalConferenceonEmergingInternet,Data&WebTechnologies(EIDWT-2020),February24-26,2020,pp.406-415.
7
Ping-JuiChiang,HeruSusanto,Fang-YieLeu,andHui-LingHuang,“MobilePhysiologicalSensorCloudSystemforLong-TermCare,”the14thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November7-9,2019,pp.698-710.
8
Zhi-QianHong,Fang-YieLeu,andHeruSusanto,“NewsCollectionandAnalysisonPublicPoliticalOpinions,”the14thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November7-9,2019,pp.688-697.
9
Wei-ShengChen,Fang-YieLeu,andHeruSusanto,“SystemImplementationofAUSFFaultTolerance,”the14thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November7-9,2019,pp.678-687.
10
J.-W.Lin,S.-.Liao,F.-Y.Leu,“ANovelBounded-ErrorPiecewiseLinearApproximationAlgorithmforStreamingSensorDatainEdgeComputing,”the11-thInternationalConferenceonIntelligentNetworkingandCollaborativeSystemsINCoS-2019,OitaUniversity,Oita,Japan,September5-7,2019,pp.123-132.
11
Mei-YuWu,Fang-YieLeu,“MIHandCRRMHandoverinTrustedorUntrustedEnvironments,”The13-thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2019,pp.526-536.
12
Fang-YieLeuandJia-ShengHo,“AirpollutionsourceidentificationbyusingNeuralNetworkwithBayesianOptimization,”The13-thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2019,pp.514-524.
13
Sheng-ZhengLin,Fang-YieLeu,“FirewallservicesprovidedbyEdgeComputerunderAMFandgNBin5Genvironments,”The13-thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2019,pp.503-513.
14
Kun-LinTsai,Fang-YieLeu,Shuo-WenChang,Jiun-YiLin,Huei-TangLuo,“ALoRaWANbasedEnergyEfficientDataEncryptionMethod,”The13-thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2019,pp.493-502.
15
HeruSusanto,Fang-YieLeu,DidiRosiyadiandChinKangChen,“RevealingStorageandSpeedTransmissionEmergingTechnologyofBigData,”The33rdIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2019),Japan,March2019,pp.571-583.
16
Kun-LinTsai,Fang-YieLeu,andShuo-WenChang,“Self-parameterBasedBilateralSessionKeyExchangeMethod,”the13thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,Oct.27-28,2018,pp.611-620.
17
HeruSusanto,LeuFang-Yie,andChinKangChen,“HighPerformanceGridComputing:ChallengesandOpportunitiesofHighSpeedNetworking,”the13thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,Oct.27-28,2018,pp.597-610.
18
Fang-YieLeu,HeruSusanto,Ping-HungChou,andJeng-WeiLin,“MigrationofEdgeComputingServicesin5GNetworks–FirewallasaServiceExample,”the13thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,Oct.27-28,2018,pp.578-585.
19
Sen-TarngLai,Fang-YieLeu,andJeng-WeiLin,“ABankingChatbotSecurityControlProcedureforProtectingUserDataSecurityandPrivacy,”the13thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,Oct.27-28,2018,pp.561-571.
20
Fang-YieLeu,Chen-YianKu,“TheStudyofMMEPoolManagementandFaultTolerancein5GNetworkswithSDNControllers,”2018the12thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2018,pp.585-595.
21
Fang-YieLeu,Bin-HornChou,“AStudyonFirewallServiceswithEdgeComputersofvEPCin5GNetworks,”2018the12thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2018,pp.576-584.
22
Sen-TarngLai,Fang-YieLeu,“AMicroServiceQualityMeasurementModelforImprovingtheEfficiencyandQualityofDevOps,”2018the12thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2018,pp.565-575.
23
Chia-YinKoandFang-YieLeu,“Analyzingattributesofsuccessfullearnersbyusingmachinelearninginanundergraduatecomputercourse,”The32ndIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2018),Krakow,Poland,2018,pp.801-806.
24
Zong-YingYang,Fang-YieLeu,“RelayBase-StationHandoverina5GEnvironment,”the12thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November8–10,2017,Spain,pp.803-810.(EI)
25
Chien-HsiangKao,Fang-YieLeu,“PredictingVideoStreamFragmentsinaReactiveModeChien-HsiangKao,Fang-YieLeu4.RelayBase-StationHandoverina5GEnvironment,”the12thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November8–10,2017,Spain,pp.796-802.(EI)
26
Kun-LinTsai,Fang-YieLeu,Tung-HungSu,Yi-ChenChang,“ALightWeightDataEncryptionMethodforWSNCommunication,”the12thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November8–10,2017,Spain,pp.788-795.(EI)
27
Sen-TarngLai,Fang-YieLeu,“ACriticalQualityMeasurementModelforManagingandControllingBigDataProjectRisks,”the12thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November8–10,2017,Spain,pp.777-787.(EI)
28
Jia-JiaLiu,Yi-LiHuang,Fang-YieLeu,Xing-YouPan,andLi-RenChen,“GeneratingDynamicBoxbyusinganInputString,”MobiSec2017,JejuIsland,Korea,2017,pp.?-?..LNCS.
29
Xiu-ShuZhang,Fang-YieLeuandChing-WenYang,“HealthcarebasedonCloudElectrocardiogramSystem:AMedicalCenterExperienceinMiddleTaiwan,”201711thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2017,pp.473-482.
30
Sen-TarngLaiandFang-YieLeu,“AnIterativeandIncrementalDataPreprocessingProcedureforImprovingtheRiskofBigDataProject,”201711thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2017,pp.483-492.
31
Chien-HsiangKaoandFang-YieLeu,“PredictionoftheFragmentofvideostreamedtomobilephonesundera5Gnetworkbasestation,”201711thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2017,pp.493-501.
32
Fang-YieLeuandChih-ChungCheng,“MIH-basedCongestionControlwithSeamlessHandoverinUntrustedNetworks,”201711thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2017,pp.502-512.
33
Po-YuTsai,Leu,Fang-Yie,IlsunYou,Hsing-ChunChen,“ANDSF-basedCongestionControlwithSeamlessHandovertoTargetAPinHeterogeneousWirelessNetworks,”Infocom2017.
34
Fang-YieLeu,Guan-LiangLin,“AnMFCC-basedSpeakerIdentificationSystem,”The31stIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2017),pp.1055-1062.
35
Hsing-ChungChen,Chia-HuiChang,Fang-YieLeu,“ImplementofAgentwithRole-basedHierarchyAccessControlforSecureGroupingIoTs,”The5thIEEECCNCInternationalWorkshoponSecurityandCognitiveInformaticsforHomelandDefense(SeCIHD2017)8January2017,LasVegas,USA,pp.120-125.
36
Yi-LiHuang,Fang-YieLeu,IlsunYou,Rong-YiSu,Po-HaoSu,Hsing-ChungChen,“A3DEncryptionwithShiftingMappingSubstitutionMechanism,”The5thIEEECCNCInternationalWorkshoponSecurityandCognitiveInformaticsforHomelandDefense(SeCIHD2017)8January2017,LasVegas,USA,pp.126-131.
37
Jung-ChunLiu,Yi-LiHuang,Fang-YieLeu,“EnhancingSecurityofLTEusingaDoubleMaskingTechnique,”the11thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November5–7,2016,Korea,pp.747-754.(EI)
38
Cheng-YingHsu,Shang-EnYang,Hung-YuanChen,Fang-YieLeu,Yao-ChungFan,“InferringSmartphoneUserDemographicsfromWi-FitraceLogs:AStudyofUsers’PrivacyConcerns”the11thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November5–7,2016,Korea,pp.739-746.(EI)
39
Sen-TarngLaiandFang-YieLeu,“DataPreprocessingQualityManagementProcedureforImprovingBigDataApplicationsEfficiencyandPracticality,”the11thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November5–7,2016,Korea,pp.731-738.(EI)
40
Kun-LinTsai,Fang-YieLeuandKing-ShingYip,“DeviceParameterbasedSecureUserAuthentication,”the11thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November5–7,2016,Korea,pp.721-730.(EI)
41
Xia-YunGuo,Chin-LingChen,Chang-QingGongandFang-YieLeu,“ASecureOfficialVehicleCommunicationProtocolforVANET,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2016,pp.482-485.(EI)
42
Kun-LinTsai,Fang-YieLeu,Yi-FungHuang,ChiYang,Cheng-HsinChang,King-ShingYip,YuchenXue,andGuan-ChiLai,“CloudEncryptionUsingDistributedEnvironmentalKeys,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2016,pp.476-481.(EI)
43
Yi-LiHuang,Fang-YieLeu,Po-HaoSu,Ti-HsunSung,Sin-ChengLiu,“ASecureandHighPerformanceWirelessSensorNetworkBasedonSymmetricKeyMatrix,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,pp.470-475.(EI)
44
Sen-TarngLaiandFang-YieLeu,“AVersionControl-BasedContinuousTestingFrameforImprovingtheIIDProcessEfficiencyandQuality,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2016,pp.464-469.(EI)
45
Fang-YieLeuandYi-TingHsiao,“FiniteStateMachineBasedRealTimeSchedulingforMicrochip,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2016,pp.458-463.(EI)
46
WooSeokHyun,IlsunYou,JoungSoonJangandFang-YieLeu,“AWirelessBodySensorNetworkandItsApplications:RehearsalwithaSmartphone,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2016,pp.415-418.(EI)
47
Yi-LiHuangandFang-YieLeu,IlsunYou,Hsing-ChungChen,ChishyanLiawandJung-ChunLiu,“RandomCladdingwithFeedbackMechanismforEncryptingMobileMessages,”2016IEEEConferenceonComputerCommunicationsWorkshops(INFOCOMWKSHPS),SanFrancisco,CA,USA,2016,pp.970-975.(EI)
48
Chia-YinKoandFang-YieLeu,“Applyingdataminingtoexplorestudents’self-regulationinlearningcontexts,”IEEE30thInternationalConferenceonAdvancedInformationNetworkingandApplications,March2016,pp.74-78.(EI)
49
Sen-TarngLaiandFang-YieLeu,“ApplyingContinuousIntegrationforReducingWebApplicationsDevelopmentRisks,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,Krakow,Poland,November4-6November2015,pp.386-391.(EI)
50
Fang-YieLeuandSheng-ChiehChuang,“EstablishingaRoutingPathwithRedundantLinkMinimizationinWirelessSensorNetworks,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,Krakow,Poland,4-6November2015,pp.380-385.(EI)
51
Kun-LinTsai,MengYuanYeandFang-YieLeu,“SecurePowerManagementSchemeforWSN,”TheACMConferenceonComputerandCommunicationsSecurity(CCS)/ManagingInsiderSecurityThreats(MIST)2015,Denver,USA,12-16October2015,pp.63-68(poster).(EI)
52
Chi-LunHo,andFang-YieLeu,“AWirelessPhysiologicalSensorAreaNetwork,”InternationalConferenceonNetwork-BasedInformationSystems,TaipeiTaiwan,2-4September2015,pp.14-19.(EI)
53
Tien-ShengLin,I-LongLinandFang-YieLeu,“ConstructingMilitarySmartphoneUsageCriterionofCloud-DEFSOPforMobileSecurity,”theInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,Blumenau,RegionalUniversityofBlumenau(FURB),BlumenauBrazil,8-10July2015,pp.420-425.(EI)
54
Sen-TarngLaiandFang-YieLeu,“ASecurityThreatsMeasurementModelforReducingCloudComputingSecurityRisk,”theInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,Blumenau,Brazil,8-10July2015,pp.414-419.(EI)
55
Yu-JenChang,Fang-YieLeu,Shih-ChiehChenandHei-LamWong,“ApplyingWebCrawlerstoDevelopaSaleManagementSystemforOnlineMalls,”theInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,Blumenau,Brazil,8-10July2015,pp.408-413.(EI)
56
Fong-MaoJhuang,Chi-FuHung,Chiu-ChingTuan,Yi-ChaoWuandFang-YieLeu,“AnAPSelectionwithRSSStandardDeviationforIndoorPositioninginWi-Fi,”theInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,Blumenau,Brazil,8-10July2015,pp.403-407.(EI)
57
Ming-ChangLee,Fang-YieLeu,andYing-pingChen,“ReMBF:AReliableMulticastBrute-ForceCo-AllocationSchemeforMulti-userDataGrids,”The39thAnnualInternationalComputers,Software&ApplicationsConference,TaichungTaiwan,1-5July2015,pp.774-783.(EI)
58
Chin-YuLiu,Fang-YieLeu,IlsunYou,AnielloCastiglioneandFrancescoPalmieri,“TheUntrustedHandoverSecurityoftheS-PMIPv6onLTE-A,”6thIEEEINFOCOMInternationalWorkshoponMobilityManagementintheNetworksoftheFutureWorld(MobiWorld2015),April2015,pp.161-166.(EI)
59
Chin-YuLiu,Fang-YieLeu,IlsunYou,AnielloCastiglioneandFrancescoPalmieri,“Heterogeneousnetworkhandoverusing3GPPANDSF,”The29thIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2015),Gwangju,Korea,March25-27,2015,pp.171-175.(EI)
60
Fang-YieLeuandYi-TingHsiao,"AGridSystemDetectingInternalMaliciousBehaviorsatSystemCallLevel,"The6thInternationalWorkshoponManagingInsiderSecurityThreats,2014,pp.14-24.
61
Chia-YinKo,Fang-YieLeuandI-TsenLin,“UsingSmartPhoneasaTrackandFallDetectorforPeoplewithDementia,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,2014,pp.306-311.(EI)
62
Fang-YieLeu,Jung-ChunLiuandHsin-LiangChen,“ImprovingMulti-pathCongestionControlforEvent-drivenWirelessSensorNetworksbyusingTDMA,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,2014,pp.300-305.(EI)
63
Sen-TarngLai,Fang-YieLeu,Chao-TungYangandWilliamCheng-ChungChu,“CombiningIIDwithBDDtoEnhancetheCriticalQualityofSecurityFunctionalRequirements,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,2014,pp.291-299.(EI)
64
Fang-YieLeu,Jung-ChunLiuandChin-YuLiu,“S-PMIPv6:EfficientHandoverinProxyMobileIPv6DomainbyusingSCTP,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,2014,pp.287-291.(EI)
65
Yi-LiHuang,Fang-YieLeu,Jing-HaoYang,“BuildinganInitializationCipherBlockwithTwo-DimensionalOperationandRandomParameters,”The9thInternationalConferenceonAvailability,ReliabilityandSecurity,2014,pp.166–171.(EI)
66
Ming-ChangLee,Fang-YieLeu,andYing-pingChen,“EvaluatingResponseTimeandReliabilityofCo-AllocationSchemesfromMulti-UserPerspectivesonaStar-TopologyDataGrid,”The6thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems,2014,pp.242-248.(EI)
67
Yi-LiHuang,Shih-HanChen,Fang-YieLeu,Chia-YinKo,Jung-ChunLiu,“Anefficienttrafficcontrolsystemwithemergencyhandlingforambulances,”The6thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems,2014,pp.356-361.(EI)
68
Yi-LiHuang,Sheng-MaoWang,Fang-YieLeu,Jung-ChunLiu,andChia-YinKo,“Asecuremobileshoppingsystembasedoncreditcardtransaction,”The6thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems,2014,pp.336-341.(EI)
69
Kun-LinTsai,Jiu-SoonTan,Fang-YieLeuandYi-LiHuang,“AGroupFileEncryptionMethodusingDynamicSystemEnvironmentKey,”TheInternationalConferenceonNetwork-BasedInformationSystems(NBiS),2014,pp.476-483.(EI)
70
Sen-TarngLai,Fang-YieLeuandWilliamCheng-ChungChu,“AMulti-LayerSecurePreventionSchemeforImprovingE-commerceSecurity,”InternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,July2014,pp.505-510.(EI)
71
Chin-LingChen,Tsai-TungYang,Fang-YieLeu,“Asecureauthenticationschemeofhealthcarebasedonthecloud,”InternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,July2014,pp.499-504.(EI)
72
Kun-LinTsai,Fang-YieLeu,Yi-LiHuang,Jiu-SoonTanandMengYuanYe,“High-efficientMulti-KeyExchangeProtocolbasedonThree-partyAuthentication,”InternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,July2014,pp.487-492.(EI)
73
Lung-PinChen,Chih-WeiHsiehandFang-YieLeu,“MinimumCostContentObjectReconstructioninMulti-TierServers,”InternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,July2014,pp.523-528.(EI)
74
I-LongLin,Yun-ShengYen,andFang-YieLeu,“ResearchonComparisonandAnalysisoftheDEFSOP,NISTCellSOPandISO27037SOP,”InternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,July2014,pp.511-516.(EI)
75
Ming-ChangLee,Fang-YieLeu,andYing-pingChen,“CacheReplacementAlgorithmsforYouTube,”The28thIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2014),May2014,pp.743-750.(EI)–ConferenceBestPaperAward
76
Jia-ChunLin,Fang-YieLeu,Ying-pingChenandWaqaasMunawar,“ImpactofMapReduceTaskRe-executionPolicyonJobCompletionReliabilityandJobCompletionTime,”The28thIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2014),May2014,pp.712-718.(EI)
77
Fang-YieLeu*,Yi-TingHsiao,“AReal-TimeIntrusionDetectionandProtectionSystemonSystemCallLevelbyusingDataMiningandProfilingTechniquesUndertheAssistanceofaGrid,”The2014AsianConferenceonAvailability,ReliabilityandSecurity(AsiaARES2014),April2014,pp.375-385.(EI)
78
Yi-LiHuang,Fang-YieLeu,Jung-ChunLiu,IlsunYou,KangbinYim,Jian-HongChen,“ARandomWrappingEncryptionMethod,”InternationalWorkshoponMobilityManagementintheNetworksoftheFutureWorld,January2014,pp.353-358.(EI)
79
Chin-LingChen,Wei-ChenTasiandFang-YieLeu,“ImproveTwoRemoteUserAuthenticationSchemeUsingSmartCard,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.404-407.(EI)
80
SuemingHsu,YalanChan,Kai-IHuangandFang-YieLeu,“AnInterdisciplinaryAnalysisofServitizationandActiveAginginTaiwan’sSeniorCareMarket:ACaseStudyofFitnessEquipmentIndustry,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.378-381.(EI)
81
Sen-TarngLai,Fang-YieLeu,WilliamCheng-ChungChu,“ASoftwareSecurityRequirementQualityImprovementProceduretoIncreaseE-CommerceSecurity,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.366-371.(EI)
82
Yu-ShinHuang,Fang-YieLeuandYi-LiHuang,“AhandoverschemeforLTEbasedontheassistanceofGPS,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.399-403.(EI)
83
Yi-LiHuang,Fang-YieLeu,Jung-chunLiu,Lih-JiunLo,WilliamCheng-ChungChu,“ASecureWirelessCommunicationSystemIntegratingPRNGandDiffie-HellmanPKDS,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.360-365.(EI)
84
Ya-TingHsu,Fang-YieLeu,Jung-chunLiu,Yi-LiHuang,“TheSimulationofanEmotionalRobotImplementedwithFuzzyLogic,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.382-386.(EI)
85
FrancescoPalmieri,UgoFiore,AnielloCastiglione,Fang-YieLeu,andAlfredoDeSantis,“AnalyzingtheInternetStabilityinPresenceofDisasters,”The8thInternationalConferenceonAvailability,ReliabilityandSecurity,Regensburg,Germany,September2-6,2013,pp.253-268.(EI)
86
Jung-ChunLiu,Yi-LiHuang,Fang-YieLeu*,Feng-ChingChiang,Chao-TungYang,andWilliamCheng-ChungChu“AMultiple-keyManagementSchemeinWirelessSensorNetworks,”The8thInternationalConferenceonAvailability,ReliabilityandSecurity,Regensburg,Germany,September2-6,2013,pp.337-344.(EI)
87
Ming-ChangLee,Fang-YieLeu,Ying-pingChen,“TSR:TopologyReductionfromTreetoStarDataGrids,”TheSeventhInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2013,pp.678-683.(EI)
88
Yi-LiHuang,Fang-YieLeu,Jian-HongChen,Cheng-ChungChu,Chao-TungYang,“ATrueRandom-NumberEncryptionMethod,”TheSeventhInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2013,pp.654-659.(EI)
89
Yi-LiHuang,Fang-YieLeu,Yao-KuoSun,Cheng-ChungChu,Chao-TungYang,“ASecureWirelessCommunicationSystembyIntegratingRSAandDiffie-HellmanPKDSin4GEnvironmentsandanIntelligentProtection-keyChainwithaDataConnectionCore,”theIEEEInternationalSymposiumonIndustrialElectronics,2013,pp.1-6.(EI)
90
Yi-LiHuang,Fang-YieLeu,Jung-ChunLiu,Jing-HaoYang,Chih-WeiYu,Cheng-ChungChu,Chao-TungYang,“Buildingablockciphermodeofoperationwithfeedbackkeys,”theIEEEInternationalSymposiumonIndustrialElectronics,2013,pp.1-4.(EI)
91
Yi-LiHuang,Fang-YieLeu,Jing-HaoYang,“BuildingablockciphermodeofoperationwithDualkeys,”TheAsianConferenceonAvailability,ReliabilityandSecurity(AsiaARES2013).LectureNotesofComputerScience–LNCS7804,March2013,pp.392-398.(EI)
92
Jia-ChunLin,Fang-YieLeu,Ying-pingChen,“DerivingJobCompletionReliabilityandJobEnergyConsumptionforaGeneralMapReduceInfrastructurefromSingle-JobPerspective,”theIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications,March2013,Barcelona,Spain,pp.1642-1647.(EI)
93
Fang-YieLeu,IlSunYou,Yi-LiHuang,KangbinYim,Cheng-RuDai,“ImprovingSecurityLevelofLTEAuthenticationandKeyAgreementProcedure,”theInternationalWorkshoponMobilityManagementintheNetworksoftheFutureWorld(MobiWorld2012),December2012,pp.1032-1036.(EI)
94
Fang-YieLeu,Yi-LiHuang,Chien-NanChen,“TheIPSecSecurityProblemsandaCross-layerSecurityMechanismforPMIPv6HandoverwhenanIPSecSecurityAssociationisEstablishedonanL2DirectLink,”theIEEEInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,November12-14,2012,Victoria,Canada,pp.452~457.(EI)
95
Fang-YieLeu,Miao-HengChen,Yi-LiHuang,Chung-ChiLin,“ControllingTrafficLightsforAmbulances,”theInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,November12-14,2012,Victoria,Canada,pp.462~467.(EI)
96
Yi-LiHuang,Fang-YieLeu,Cheng-RuDai,“ASecureDataEncryptionMethodbyEmployingaFeedbackEncryptionMechanismandThree-DimensionalOperation,”InternationalWorkshoponSecurityandCognitiveInformaticsforHomelandDefense,August2012,pp.578-592.LectureNotesofComputerScience–LNCS7465.(EI)
97
Ko-ChungWei,Yi-LiHuang,Fang-YieLeu,“ASecureCommunicationoverWirelessEnvironmentsbyusingaDataConnectionCore,”TheIEEEInternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,Palermo,Italy,4-6July2012,pp.570-575.(EI)
98
Fang-YieLeu,Ming-ChangLee,Ying-pingChen,“ImprovingDataGridPerformancebyusingPopularFileReplicateFirstAlgorithm,”TheIEEEInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October24-26.2011,Barcelona,Spain,pp.416~421.(EI)
99
Fang-YieLeu,Yi-FuCiou,Yi-LiHuang,“AHandoverSecurityMechanismEmployingDiffie-HellmanPKDSforIEEE802.16eWirelessNetworks,”InternationalWorkshoponSecurityandCognitiveInformaticsforHomelandDefense,August2011,pp.255-270.LectureNotesofComputerScience–LNCS-67908(EI)
100
Fenq-LinJenq,Tang-JenLiuandFang-YieLeu,“AnACLEDSmartLightingSystemwithVisibleLightTime-DivisionMultiplexingFreeSpaceOpticalCommunication,”TheIEEEInternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity2011,June/July2011,SeoulKorea,pp.589-593.(EI)
101
Fang-YieLeu,andKeng-YenChao,“ASemi-preemptiveAdHocWirelessCloudServiceSystemwithlimitedResourcestoSupportNodeMobility,”TheIEEEInternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity2011,June/July2011,SeoulKorea,pp.577-582.(EI)
102
Fang-YieLeu,andKuo-ChiLiang,“ALocation-basedHandoffSchemebasedonIEEE802.21inHeterogeneousWirelessNetworks,”TheIEEEInternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity2011,June/July2011,SeoulKorea,pp.571-576.(EI)
103
Fang-YieLeuandShiuan-YouChiou,“ARate-allocationBasedMulti-pathCongestionControlSchemeforEvent-DrivenWirelessSensorNetworks,”theInternationalConferenceonDataCompression,CommunicationsandProcessing,June2011,Italy,pp.293-298.(EI)
104
Yi-LiHuang,Chu-HsingLin,andFang-YieLeu,“VerificationofaBatchofBadSignaturesbyusingtheMatrix-DetectionAlgorithm,”theInternationalConferenceonDataCompression,CommunicationsandProcessing,June2011,Italy,pp.299-306.(EI)
105
Fang-YieLeu,Yi-FungHuang,Chao-HongChiu,“MutualAuthenticationwithDynamicKeysinanIEEE802.16ePKMEnvironmentwithoutPriorAuthenticationConnection,”TheIEEEInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,Nov.2010,Fukuoka,Japan,pp.441-446.(EI)
106
Fang-YieLeuandHung-WeiHuang,“AnEvent-DrivenMobileAssistantControlProtocolforWirelessSensorNetworks,”theIEEEInternationalSymposiumonFrontiersinUbiquitousComputing,NetworkingandApplications,Sept.,2010,Takayama,Japan,pp.521-526.(EI)
107
Fang-YieLeuandPei-ShiunLiu,“AChannelAssignmentandAPDeploymentSchemeforConcentric-HexagonbasedMulti-ChannelWirelessNetworks,”theIEEEInternationalSymposiumonFrontiersinUbiquitousComputing,NetworkingandApplications,Sept.,2010,Takayama,Japan,pp.504-509.(EI)
108
Fang-YieLeu,Yi-FungHuang,Chao-HongChiu,“ImprovingsecuritylevelsofIEEE802.16eauthenticationbyInvolvingDiffie-HellmanPKDS,”theInternationalConferenceonComplex,IntelligentandSoftwareIntensiveSystems,Feb.2010,Krakow,Poland,pp.391-397.(EI)
109
Yi-FungHuang,Ko-ChungWei,Fang-YieLeu,“ConstructingaSecurePoint-to-PointWirelessEnvironmentsbyIntegratingDiffie-HellmanPKDSandStreamCipheringWithoutCertificateAuthorities,”theInternationalConferenceonComplex,IntelligentandSoftwareIntensiveSystems,Feb.2010,Krakow,Poland,pp.384-390.(EI)
110
Fang-YieLeuandYong-LonChen,“APathSwitchingSchemeforSCTPBasedonRoundTripDelayandundertheAssistanceofNetworkManagementSchemes,”theInternationalConferenceonComputerScienceanditsApplications,Dec.2009,Jeju,Korea,pp.103-108.(EI)
111
Fang-YieLeu,Yao-TienHuang,“ACoordinatingMultipleChannelAssignmentSchemeandAPDeploymentinAWirelessNetwork,”The2009IEEE/IFIPInternationalSymposiumonEmbeddedandPervasiveSystems,Vancouver,Canada,August2009,pp.440-445.(EI)
112
Fang-YieLeuandZhi-YangLi,“AnInnerDoS/DDoSAttackDetectionSystem,”the6thInternationalConferenceonCyberneticsandInformationTechnologies,SystemsandApplications(CITSA2009),July2009,Florida,USA,pp.41-46.
113
Fang-YieLeuandZhi-YangLi,“DetectingDoSandDDoSAttacksbyUsinganIntrusionDetectionandRemotePreventionSystem,”theFifthInternationalConferenceonInformationAssuranceandSecurity,August2009,Xian,China,pp.255-258.(EI)
114
Fang-YieLeuandChia-ChiPai,“DetectingDoS&DDoSAttacksUsingChi-Square,”theFifthInternationalConferenceonInformationAssuranceandSecurity,August2009,Xian,China,pp.251-254.(EI)
115
Chao-TungYang,Fang-YieLeu,andSung-YiChen,“NetworkBandwidth-awareJobSchedulingwithDynamicInformationModelforGridResourceBrokers,”InternationalConferenceonAsia-PacificServicesComputingConference,2008,pp.775-780.(EI)
116
L.W.LiuandFang-YieLeu,“UseofGISandDataMiningTechniquesintheDesigningofCommunity-BasedServicesfortheElderly,”TheInternationalConferenceontheGerontologicalSocietyofAmerica’s61thAnnualMeeting,WashingtonDC,November2008.
117
Fang-YieLeu,andYao-TienHuang,“SoftwareToolsDevelopedandEmployedforSurveyonCentralTaiwanScienceParkandDataAnalyses,”InternationalConferenceonTerritorialIntelligence,Besancon,Oct.2008.
118
Fang-YieLeu,Shu-RenLeeModelingandSimulationofEnergyProducingProcessofFatsMetabolismbyUsingPetriNets,”InternationalConferenceonComputerGraphicsandImageandMultimediaProcessing,2008.
119
Fang-YieLeu,Guo-CaiLiandWen-ChinWu,“AnAutonomousEnergy-AwareRoutingScheme:aSupplementaryRoutingApproachforPath-PreservingWirelessSensorNetworks,”TheIFIPAnnualMediterraneanAdHocNetworkingWorkshop,2008,pp.49-60.
120
Fang-YieLeu,Zhen-JiaKo,“ANovelNetworkMobilitySchemeUsingSIPandSCTPforMultimediaApplications,”InternationalConferenceonIntelligentMultimediaInformationSystem,2008.pp.564-569.(EI)
121
Fang-YieLeuandYu-TingHuang,“MaximumCapacityinChain-TopologyWirelessMeshNetworks,”WirelessTelecommunicationsSymposium,CA,2008,pp.250-259.(EI)
122
Fang-YieLeu,“AnalyzingSurveyDataConcerningtheConstructionofCentralTaiwanScienceParkusingAssociationRulesandGeographicalInformationSystems,”InternationalConferenceonTerritorialIntelligence,Huelva,Spain,Oct.2007.
123
Fang-YieLeuandChih-ChiehKo,“AnAutomatedTermDefinitionExtractionusingtheWebCorpusinChineseLanguage,”theIEEEInternationalConferenceonNaturalLanguageProcessingandKnowledgeEngineering,BeijingChina,August/September2007,pp.435-440.(EI).
124
Fang-YieLeuandKai-WeiHu,“AReal-TimeIntrusionDetectionSystemusingDataMiningandForensicTechniques,”theInternationalWorkshoponSecurity,October2007,pp.137-152.
125
Fang-YieLeuandKai-WeiHu,“AReal-TimeIntrusionDetectionandIdentificationSystemonCommand-Line-InterfaceComputersusingDataMiningandForensicTechniquesinanIntranet,”theInternationalConferenceonComputing,CommunicationsandControlTechnologies,FloridaUSA,July2007,pp.148-153.
126
Fang-YieLeu,andKuo-WeiLee,“ATransmissionCostModelofDataRetrievalfromaClusterSystemonanOne-NodeOne-Fragment,One-NodeOne-TaskandRandomAllocationEnvironmentusingnoGlobalDirectory,”theWorldMulti-ConferenceonSystemics,CyberneticsandInformatics,FloridaUSA,July2007,pp.112-116.
127
Fang-YieLeu,Yu-HsinChen,Ching-ChienKuan,“AnEfficientBandwidth-usingSchemeoverWLANwithIEEE802.11eStandard,”theIEEEInternationalWorkshoponBroadbandConvergenceNetworks,MunichGermany,May2007.(EI)
128
Fang-YieLeuandTai-ShiangWang,“DataAnalysisUsingGISandDataMining,”InternationalConferenceonTerritorialIntelligence,AlbaIulia,Romania,Oct.2006.
129
Fang-YieLeu,Ming-ChangLi,andJia-ChunLin,“IntrusionDetectionbasedonGrid,”InternationalMulti-ConferenceonComputingintheGlobalInformationTechnology,Romania,Aug.2006,pp.62-67.
130
Fang-YieLeuandTai-ShiangWang,“IntegratingMobileAgentswithaWirelessGridPlatform,”theIEEE-ACISInternationalConferenceonSoftwareEngineering,ArtificialIntelligence,Networking,andParallel/DistributedComputing,June2006,pp.139-144.
131
Fang-YieLeu,Ming-ChangLi,Jia-ChunLin,“AnIntrusionDetectionSystemonDynamicDetectionEnvironment,”InternationalConferenceonComputationalScienceandItsApplications,May2006.
132
L.W.Liu,R.M.Tsay,J.ShiangandFang-YieLeu,“PromotingTechnicalInnovation:TheApplicationofGISforIn-HomeServices,”theFourthNationalGerontologicalSocialWorkConference,Chicago,Illinois,February16–19,2006.
133
Fang-YieLeuandWei-JieYang,“CUSUMIntrusionDetection&TracebackSystem,”TheInternationalForensicScienceSymposium,Taipei,Taiwan,Nov.2005.
134
Fang-YieLeuandKai-WaiHu,“AReal-TimeIntrusionDetectionandIdentificationSystemwithDataMiningandForensicTechniques,”TheInternationalForensicScienceSymposium,Taipei,Taiwan,Nov.2005.
135
Fang-YieLeu,Neng-WenLo,Lun-NiYang,“PredictingVertebratePromoterswithHomogeneousClusterComputing,”TheInternationalConferenceonSignal-ImageTechnology&Internet–BasedSystems,Yaound?Cameroon,Nov.2005,pp.143-148.
136
Fang-YieLeu,Ching-ChienKuan,Der-JiunnDengandYu-Hsin,Chen,“GuaranteedNonDroppingMechanismDeployingIEEE802.11eStandard,”TheInternationalConferenceonSignal-ImageTechnology&Internet–BasedSystems,Yaound?Cameroon,Nov.2005,pp.170-175.
137
Fang-YieLeu,Jia-ChunLin,Ming-ChangLi,Chao-TungYang,“APerformance-BasedGridIntrusionDetectionSystem,”Proceedingsofthe29thInternationalComputerSoftwareandApplicationsConference(COMPSAC2005),Edinburgh,Scotland,July26-28,2005.(EI)
138
Hsiao-HongTsai,Fang-YieLeuandWen-KuiChang,”DistributedSendBoxSchemeforMobileAgentCommunication,”2005IEEEthe4thInternationalConferenceonMobileBusiness(ICMB2005),Sydney,Australia,July2005.(EI),pp.545-550.
139
Fang-YieLeu,Ching-ChienKuan,Dr-JiunnDengandWen-KuiChang,“QualityofServiceforVoiceoverWirelessLANbyDeployingMultipollinginIEEE802.11eStandard,”2005IEEEInternationalSymposiumonMultimediaOverWireless.(EI)
140
Fang-YieLeuandWei-JieYang,“IFTS:IntrusionForecastandTracebackbasedonUnionDefenseEnvironment,”the11thInternationalConferenceonParallelandDistributedSystems(ICPADS2005),July20-22,2005,pp.716-722.(EI)
141
Hsiao-HongTsai,Fang-YieLeuandWen-KuiChang,“MobileAgentCommunicationUsingSIP,”IEEE2005InternationalSymposiumonApplicationsandtheInternet(SAINT2005),Trento,Italy,January2005,pp.274-279.(EI)
142
Fang-YieLeu,Jia-ChunLin,Ming-ChangLi,Chao-TungYang,Bo-QiShi,“IntegratingGridwithIntrusionDetection,”theIEEE19thInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA2005),TaipeiTaiwan,March2005,pp.304-309.(EI)
143
Leu,Fang-YieandYao-ChungFan,“CompressinganInvertedFilewithLCS,”IEEECOMPSAC2004,Sept.,2004,HongKong,pp.60-61.(EI)
144
呂芳懌,楊惟傑,林佳純,李明昌,“網路安全分析與趨勢”2004年資訊科技與人文管理教育論壇-數位內容數位教育與管理政策研討會,2004年7月,pp.277-293.
145
Leu,Fang-YieandYao-ChungFan,“DealingwiththeStructureofRealWorldGraphs,”The2ndInternationalConferenceonComputerScienceanditsApplications(ICCSA-2004),June2004,California,USA,2004,pp.40-49.
146
F.Y.LeuandK.W.Lee,“TransmissionCostModelsofData-RetrievalbasedonSpecificDataAllocationswithoutDirectoryonClusterSystems,”IntheProceedingsofthe8thWorldMulticonferenceonSystemics,CyberneticsandInformatics(SCI2004),Orlando,USA,2004,pp.167-172.
147
Leu,Fang-YieandYao-ChungFan,“CompressingaDirectedMassiveGraphusingSmallWorldModel,”IEEEDataCompressionConference,March2004.Poster.
148
呂芳懌,楊惟傑,鄭真真,洪嘉鴻,”UDIFT:具預警功能與入侵追蹤之區域聯防系統,”2003年「網際空間:科技、犯罪與法律社會」學術研究暨實務研討會,12月,2003年,pp.140-148。
149
呂芳懌,鄭真真,洪嘉鴻,管清健,林佳純,李明昌,”以分散式平行入侵偵測系統從事區域聯防,2003年「網際空間:科技、犯罪與法律社會」學術研究暨實務研討會,12月,2003年,pp.129-139。
150
F.Y.LeuandT.Y.Yang,”AHost-BasedReal-TimeIntrusionDetectionSystemwithDataMiningandForensicTechniques,”IEEE2003InternationalCarnahanConferenceonSecurityTechnology,Taiwan,ROC,Oct.14-16,2003,pp.580-586.
151
呂芳懌,洪嘉鴻,鄭真真,”UDAIDTS:以Hash為基礎的主動式區域聯防入侵偵測與追蹤系統,”第十四屆國際資訊管理學術研討會,2003年7月12日,pp.1090-1097.
152
呂芳懌,顏義樺,”以聯想法則概念網路為基礎之文章概念探索及相似比對,”第十四屆國際資訊管理學術研討會,2003年7月12日,pp.330-336.
153
呂芳懌,顏義樺,”以事件聯想為基礎之文章相似性比對,”2003年資訊技術應用與發展研討會,2003年6月28日,pp.61-67.
154
呂芳懌,施政瑋,”以詞義概念為基礎的文件檢索與比對,”2003年資訊技術應用與發展研討會,2003年6月28日,pp.667-673.
155
呂芳懌,蘇俊維,許惟翔,”內部網路安全威脅分析與防制,”2003年電子商務與數位生活研討會,2003年4月11-12日,pp.166-166(摘要,本文在光碟片中未編頁碼)。
156
呂芳懌,黃品璁,楊子逸,胡凱威,“低負載隱形式網路異常偵測器,”2003年電子商務與數位生活研討會,2003年4月11-12日,pp.165-165(摘要,本文在光碟片中未編頁碼)。
157
呂芳懌,楊子逸,“IIS伺服器漏洞剖析與防備,”第四屆2002年網際空間:資訊、法律與社會,2002年11月29日。
158
呂芳懌,黃文鴻,“能提供及追蹤行車最短路徑之分散式系統,”2002中華地理資訊學會暨學術研討會,2002年9月
159
呂芳懌,蘇俊維,”網路入侵與防禦策略探討,”第三屆網際網路應用與發展研討會,2002年5月
160
呂芳懌,顏義樺,施政瑋,”以網頁特性為基礎之重要性排名,’2002年第六屆資訊管理學術及警政資訊實務研討會,2002年5月,pp.489-495.
161
呂芳懌,歐建暉,邱維埠,”大學校園寬頻網路運用研究—東海數位村—寬頻網路監測,”,2002年電子商務與數位生活研討會,2002年3月,pp.489-495。
162
呂芳懌,顏義樺,施政瑋,”探查疑似不法資訊網站之分散式網路巡邏系統,’2001年網際空間:資訊、法律與社會,2001年12月24日。
163
呂芳懌,楊子逸,“IIS網頁伺服器Unicode漏洞探討,”第五屆資訊管理學術及警政資訊實務研討會,2001年6月。
164
呂芳懌,林晁立,“以臉部器官形狀、寬度、相對位置從事人臉影像辨識,”第十一屆物件導向技術及應用研討會,2000年九月。
165
呂芳懌,林厚誼,“物件導向竊盜犯罪案件相似性比對,”第十一屆物件導向技術及應用研討會,2000年九月。
166
呂芳懌,黃文鴻,“協助查詢有地緣關係之前科犯資訊的地理資訊系統,”第四屆資訊管理學術及警政資訊實務研討會,2000年5月,pp.115-123。
167
呂芳懌,黃文鴻,“協助查詢有地緣關係之前科犯資訊的地理資訊系統,”大業學報,第九卷,第一期,八十九年。
168
呂芳懌等,“影像資料庫在人臉辨識上的應用—前科犯資料庫,”東海科學第一捲,東海大學,中華民國八十八年七月。
169
呂芳懌,林厚誼,“協助犯罪偵察之前科犯資料庫績效品質改善,”第三十五屆品質管制研討會,中華民國八十八年十一月.
170
呂芳懌,余少棠,許閔雄,林晁立,蔡清欉“影像資料庫在人臉辨識上的應用—前科犯資料庫,”,第十屆國際資訊管理學術研討會,1999年6月,台灣台北pp.863-870
171
呂芳懌,林厚誼,黃文鴻,邱聖斌,朱峻德,龔俊杰“文字資料庫在犯罪偵察之應用—竊盜犯罪手法之比對,”,第十屆國際資訊管理學術研討會,1999年6月,台灣台北pp.935-943
172
Fang-YieLeu(呂芳懌),Shiang-WeiChao,Dec.1997,“ADistributedDatabaseArchitectureanditsQuery,”ProceedingsofNationalComputerSymposium1997,Taiwan,pp.A38-A42.
173
F.Y.LeuandS.W.Zhao,“TheQueryandIntegrationAlgorithmsinaDistributedDatabase,“Proceedingofthe14thWorkshoponCombinatorialMathematicsandComputationTheory,Taichung,Taiwan,June1997,pp.114-117.
174
呂芳懌資料庫之管理人力與發展雜誌第二十七~二十九期中華民國八十五年四~六月
175
呂芳懌資料庫之應用人力與發展雜誌第二十六期中華民國八十五年三月
176
呂芳懌資料庫相關人員人力與發展雜誌第二十五期中華民國八十五年二月
177
呂芳懌資料庫管理人員之角色人力與發展雜誌第二十四期中華民國八十五年一月
178
呂芳懌 資料庫之功能 人力與發展雜誌 第二十三期 中華民國八十四年十二月
179
呂芳懌 資料庫之演進 人力與發展雜誌 第二十二期 中華民國八十四年十一月
180
呂芳懌 資料表示法 人力與發展雜誌 第二十一期 中華民國八十四年十月
181
呂芳懌 資料庫與生活 人力與發展雜誌 第二十期 中華民國八十四年九月
182
F.Y.LeuandC.C.Yang,"RuleBaseInspectionUsingAlgorithmicApproachforData-AccessOrientedKnowledge-BasedSystems,"IEEECOMPSAC,Chicago,1990,pp.155-160.
183
F.Y.LeuandS.K.Chang,"AnInternalProtocolAssistantforDistributedSystems,"Proc.ofSPIEConference,Orlando,FL,1991.
184
楊鍵樵,呂芳懌,"智慧型網管系統資料庫之研究與雛型系統之開發之研究",資策會委託研究計畫,中華民國八十四年六月
185
楊鍵樵,呂芳懌,連志誠等"支援智慧型網路管理系統之物件導向資料庫雛形系統"INTC'95,台北,中華民國八十四年十月
186
F.Y.Leu,"AnInternalInspectionofaDistributedOfficeInformationSystem"Ph.DDissertationofNationalTaiwanInstituteofTechnology,Taipei,Taiwan,ROC,July1991.
專書著作
順序
名稱
1
HeruSusanto,Fang-YieLeu,Chin-KangChen,FadzlinatiMohiddin,ManagingHumanCapitalinTodaysGlobalization:AManagementInformationSystemPerspective,2019-10,AppleAcademicPress,Tailor&FrancisGroup.
2
HeruSusanto,LeuFang-Yie,ChinKangChen,BusinessProcessReengineering--AnICTApproach,2019-04,AppleAcademicPress.
3
HeruSusanto,LeuFang-YieandChinKangChen,TheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,2018-04,AppleAcademicPress.
4
FatosXhafa,Fang-YieLeu,Li-LingHung(編輯者),SmartSensorsNetworks--CommunicationTechnologiesandIntelligentApplications,2017-05,AcademicPress(Elsevier).
5
張文貴呂芳懌,軟體開發技術文件—指引手冊,2002年,經濟部工業局。
6
張文貴呂芳懌,軟體規劃與維護技術文件—指引手冊,2002年,經濟部工業局。
7
呂芳懌等,計算機概論與基礎資訊教育,2001年,全華科技圖書公司。
8
呂芳懌,MS-DOS使用手冊,1986年,全華科技圖書公司。
9
呂芳懌,MD-150自動控制使用手冊,1984年,全華科技圖書公司。
專利/技術報告
順序
名稱
1
發明人與專利權人:黃宜豊呂芳懌林正基,“具有三維運算、反饋控制與動態置換盒設計的加密方法”發明第I459784號
2
發明人與專利權人:黃宜豊呂芳懌,“在無線/有線環境下安全金鑰交換的方法”發明第I434577號
3
發明人與專利權人:黃宜豊呂芳懌,“具有動態金要雙向認證之無線通訊方法”發明第I425845號
4
發明人與專利權人:呂芳懌黃耀田,“部署基地台之方法”發明第I415485號
研究計畫
順序
計畫名稱
計畫所屬機構
計畫編號
計畫日期
1
緊密耦合卸載與大象流/老鼠流卸載之連線安全與QoS之研製
科技部計畫
MOST108-2221-E-029-009-
108/08/01
2
行動寬頻課程推廣計畫--智慧基站與行動計算
教育部計畫
107/12/01
3
5G網路VPN、NAT、防火牆/IDS/IPS之服務方式及傳遞頻寬改善之研究
科技部計畫
107-2221-E-029-010-
107/08/01
4
在SCTP通訊協定下以ANDSF與MIH/CRRM協定協助網路卸載與跨網路換手之研究
科技部計畫
106-2221-E-029-004-
106/08/01
5
行動寬頻尖端技術課程推廣計畫--物聯網感測網路技術
教育部計畫
105/12/01
6
植基於靜態協同雲端資料中心之影視傳輸回覆時間與能量耗費之研究
科技部計畫
MOST105-2221-E-029-017-
105/08/01
7
第9屆國際展能節職業技能競賽(電腦程式設計職類)國手培訓
其他政府部會計畫
104/09/16
8
單一整合型計畫-以問題導向學習模式發展K-16節能減碳教育成效評估及教具研發(3/3)
科技部
102-3113-S-029-001-
2013/4/1
9
建構一個植基於多使用者星狀拓樸資料網格的群播協同檔案傳送機制
科技部
101-2221-E-029-003-MY3
2012/8/1
10
單一整合型計畫-以問題導向學習模式發展K-16節能減碳教育成效評估及教具研發(2/3)
科技部
101-3113-S-029-001-
2012/4/1
11
在多使用者資料網格環境下建構一個低回覆時間和高度可靠性之動態資料複製演算法協同傳送機制
科技部
100-2221-E-029-018-
2011/8/1
12
單一整合型計畫-以問題導向學習模式發展K-16節能減碳教育成效評估及教具研發(1/3)
科技部
100-3113-S-029-001-
2011/4/1
13
考量信號干擾及STDMA之無線網路鏈狀拓撲的單向資料傳遞最大throughput之研究
科技部
2010/8/1
14
以資料探勘與Forensic技術研製ㄧ個身份辨認與即時偵測入侵行為之系統
科技部
97229
2008/8/1
15
資訊化社會的治理與永續發展:歐盟FP6CAENTI取向--歐洲領土智慧網絡協調計畫(FP6CAENTI)的應用:歐盟與台灣的比較
科技部
2007/8/1
16
資訊化社會的治理與永續發展:歐盟FP6CAENTI的取向--數位化治理與傳統治理的競合:FP6架構下歐盟與台灣的比較
科技部
2007/8/1
17
資訊化社會的治理與永續發展:歐盟FP6CAENTI的取向--領土智慧資訊整合與分析平台之研製:歐盟FP6CAENTI的取向
科技部
97528
2007/8/1
18
社區防救災的社會支持體系建構與災害風險管理--子計畫:社區災害空間分析與監視系統之建構(I)
科技部
96372
2007/8/1
19
全球化、都市發展與社區生活:領土智慧的分析取向(2/2)
科技部
2006/8/1
20
整合無線網路、行動代理人與網格之無線校園網格系統之研製(I)
科技部
95748
2006/8/1
21
整合式定位與偵測系統之研製
科技部
95247
2005/8/1
22
全球化、都市發展與社區生活:領土智慧的分析取向(1/2)
科技部
2005/8/1
23
結合第三代行動通訊與無線網路之開放式多媒體服務平台
科技部
2005/8/1
24
整合格網與入侵偵測
科技部
95245
2005/8/1
25
安全的身份鑑別式加密法
科技部
2005/8/1
國內外演講記錄
順序
作品名稱/活動名稱/主題
邀請單位
地點
日期
1
5G Networkand ITs securityProblems
MobileNetworkSecurity(MobiSec)2017大會
韓國濟州島
2017/10/20
2
RandomCladdingwithFeedbackEncryptionforMobileTransmissionandCloudSystems
中國大陸東北大學
瀋陽
2016/09/13
3
HowDataReplicationandFetch-timePoliciesImpactMapReduceJobCompletionReliabilityandEnergyConsumption
福岡工業大學
福岡,日本
2016/07/06
4
S-PMIPv6:anIntra-LMAmodelforIPv6Mobility
DepartmentofComputerEngineering,ChoSunUniversity,Korea
DepartmentofComputerEngineering,ChoSunUniversity
2015/03/26
參與學術活動
順序
作品名稱/活動名稱/主題
頒獎單位
日期
1
The33rdInternationalConferenceonAdvancedInformationNetworkingandApplications
出席國際學術會議
2019/03/27
2
The3rdInternationalSymposiumonMobileInternetSecurity
出席國際學術會議
2018/08/29
3
The12thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing(IMIS-2018)
出席國際學術會議
2018/07/04
4
"The32ndIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(IEEEAINA-2018)"
出席國際學術會議
2018/05/16
5
The12thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications
出席國際學術會議
2017/11/10
6
The11thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing(IMIS-2017)
出席國際學術會議
2017/07/10
7
IEEEInternationalConferenceonComputerCommunications(INFOCOM2017)
出席國際學術會議
2017/05/01
8
The5thIEEECCNCInternationalWorkshoponSecurityandCognitiveInformaticsforHomelandDefense
出席國際學術會議
2017/01/08
9
the11thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications
出席國際學術會議
2016/11/05
10
2016IEEEConferenceonComputerCommunicationsWorkshops(INFOCOMWKSHPS)
出席國際學術會議
2016/04/10
11
第九屆國際展能節(the9thInternationalAbilympics)
擔任國際學術組織要員
2016/03/25
12
InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications(BWCCA2015)
出席國際學術會議
2015/11/04
13
TheACMConferenceonComputerandCommunicationsSecurity(CCS2015)/ManagingInsiderSecurityThreats(MIST2015)
出席國際學術會議
2015/10/12
14
InternationalConferenceonNetwork-BasedInformationSystems,,2-4September2015
出席國際學術會議
2015/09/02
15
theInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing(IMIs/MCNCS2015)
出席國際學術會議
2015/07/08
16
The39thAnnualInternationalComputers,Software&ApplicationsConference(COMPSAC2015)
出席國際學術會議
2015/07/01
17
6thIEEEINFOCOMInternationalWorkshoponMobilityManagementintheNetworksoftheFutureWorld(INFOCOM/MobiWorld2015)
出席國際學術會議
2015/04/26
18
The29thIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2015)
出席國際學術會議
2015/03/25
19
The6thInternationalWorkshoponManagingInsiderSecurityThreats(MIST2014)
出席國際學術會議
2014/11/21
20
The6thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems(InCOS/NBIS2014)
出席國際學術會議
2014/09/10
21
The9thInternationalConferenceonAvailability,ReliabilityandSecurity(ARES2014)
出席國際學術會議
2014/09/08
回列表
2015©AllRightsReserved.
PrivacyPolicy|TermsofService
延伸文章資訊
- 1楊朝棟終身特聘教授- 專任教師 - 東海大學資訊工程學系--
楊朝棟終身特聘教授 ; 中華大學資訊工程系, 兼任副教授, 1998 年02 月至2002 年01 月 ; 國家實驗研究院國家太空中心地面系統組, 副研究員, 1996 年10 月至2001 年...
- 2师资 - 東海大學資訊工程學系--
师资 · 林祝兴教授 · 杨朝栋特聘教授 · 朱正忠特聘教授 · 吕芳怿特聘教授 · 黃育仁教授 · 蔡清欉教授 · 周忠信教授 · 江辅政教授 ...
- 3專任教師-專任教授 - 東海大學資訊工程學系--
專任教師 · 林祝興教授 · 楊朝棟終身特聘教授 · 朱正忠終身特聘教授 · 黃育仁教授 · 蔡清欉教授 · 周忠信教授 · 朱允執副教授 · 陳隆彬副教授 ...
- 4黃育仁教授- 專任教師 - 東海大學資訊工程學系--
東海大學資訊工程學系, 系主任, 2013 年08 月至2016年07月 ; 東海大學資訊工程學系, 副教授, 2005 年08 月至2009 年07 月 ; 東海大學資訊工程學系, 助理...
- 5許瑞愷副教授- 專任教師 - 東海大學資訊工程學系--
經歷. 服務單位, 職稱, 起迄年月. 東海大學資訊工程學系, 副教授, 2020 年02 月至今. 東海大學資訊工程學系, 助理教授, 2014 年08 月至2020年01月 ...