呂芳懌特聘教授- 專任教師 - 東海大學資訊工程學系--

文章推薦指數: 80 %
投票人數:10人

東海大學資訊工程學系, 特聘教授, 2018 年08 月至2019 年07 月. 東海大學資訊工程學系, 教授, 2010 年02 月至今. 東海大學資訊工程學系, 副教授, 1991 年08 月至2010 ... 專任教師 首頁 專任教師 專任教授 呂芳懌特聘教授 系所介紹 發展沿革 系所特色 教育目標 發展領域 學習活動 分組介紹 教師 榮譽講座教授 系主任 專任教授 兼任教授 合聘教授 退休教授 客座教授 研究員 實驗室 年度報告 年度報告書 東海大學資訊工程學系-專任教師-專任教授-呂芳懌特聘教授 林祝興教授 楊朝棟終身特聘教授 朱正忠終身特聘教授 黃育仁教授 蔡清欉教授 周忠信教授 朱允執副教授 陳隆彬副教授 黃宜豊副教授 石志雄副教授 劉榮春副教授 許瑞愷副教授 焦信達助理教授 賴俊鳴助理教授 許宏誌助理教授 陳仕偉助理教授 廖元勳助理教授 呂芳懌特聘教授Fang-YieLeu ※各分機請先撥本校總機:(04)23590121 基本資料 學術著作 研究計畫與獎勵 學術活動及獲獎 學術服務與產學 E-mail 實驗室 老師個人網站 [email protected] 資料庫與網路安全實驗室 http://dblab.csie.thu.edu.tw/boss.html 研究室位置 研究室分機 實驗室位置 實驗室分機 ST422 33815 ST425 33849 研究領域 物聯網、無線網路、網路安全與感測網路 最高學歷 國立台灣工業技術學院 電子所 博士 KnowledgeSystemsInstitute ComputerandInform.Scinece 碩士 國立台灣工業技術學院 電子所 碩士 國立台灣工業技術學院 電子工程技術系 學士 經歷 服務單位 職稱 起迄年月 東海大學資訊工程學系 特聘教授 2018年08月至2019年07月 東海大學資訊工程學系 教授 2010年02月至今 東海大學資訊工程學系 副教授 1991年08月至2010年01月 龍華工專電子科 講師 1986年08月至1987年07月 明志工專電機科 助教 1983年08月至1984年07月 中區電信管理局電子交換機維護中心 高技員 1979年06月至1981年08月 期刊論文 順序 名稱 1 HeruSusanto,LeuFang-Yie,WahyuCaesarendra,FahmiIbrahim,P.K.Haghi,UusKhusniandAdamGlowacz,“ManagingCloudIntelligentSystemovertheDigitalEcosystem:RevealingAppsBehaviorduringPandemicCovid-19,”AppliedSystemInnovation,September7,2020.(非SCI) 2 HeruSusanto,LeuFangYie,DesiSetiana,YaniAsih,AmbarYoganingrum,SlametRiyantoandFadlyAkbarSaputra,“DigitalEcosystemSecurityIssuesforOrganizationsandGovernments:DigitalEthicsandPrivacy,”Chapter5ofthebookentitledWeb2.0andCloudTechnologiesforImplementingConnectedGovernment,August10,2021. 3 LeuFangYie,HeruSusantoandDesiSetiana,“CollaboratingDecisionSupportandBusinessIntelligencetoEnableGovernmentDigitalConnectivity,”Chapter5ofthebookentitledWeb2.0andCloudTechnologiesforImplementingConnectedGovernment,August10,2021. 4 HeruSusanto,LeuFangYie,DidiRosiyadi,AkbariIndraBasukiandDesiSetiana,“DataSecurityforConnectedGovernmentsandOrganisations:ManagingAutomationandArtificialIntelligence,”Chapter11ofthebookentitledWeb2.0andCloudTechnologiesforImplementingConnectedGovernment,August10,2021. 5 Fang-YieLeu,HeruSusanto,Kun-LinTsai,Chia-YinKo*,“AChannelAssignmentSchemeforMIMOonConcentric-Hexagon-basedMulti-ChannelWirelessNetworks,”InternationalJournalofAdHocandUbiquitousComputing(IJAHUC),acceptedonJune19,2020.(SCI,IF’18=0.56,149/155) 6 Chia-YinKoandFang-YieLeu*,“ExaminingSuccessfulAttributesforUndergraduateStudentsbyApplyingMachineLearningTechniques,”IEEETransactionsonEducation,acceptedonJune16,2020.(SCI,IF’18=2.214,15/41) 7 Chin-LingChen,Yuan-HaoLiao,Fang-YieLeu,IlsunYo,Kim-KwangRaymondChoo,Chia-YinKo,Ane-lotterysystemwithafairpurchasingenvironmentandanarbitrationmechanism,JournalofInternetTechnology(ISSN1607-9264),Vol.21No.3,pp.655-671,May2020,DOI:10.3966/160792642020052103004[SCIE,EI;2018Impactfactor:0.715,Q4.Telecommunications,Rank=39/89]. 8 Fang-YieLeu*,Ping-JuiChiang,HeruSusanto,Rui-TingHung,Hui-LingHuang,“MobilePhysiologicalSensorCloudSystemforLong-termCare,”InternetofThings,vol.11,September2020,pp.?-?.(EI) 9 Li-LingHung,Fang-YieLeu,Kun-LinTsaiandCia-YinKo,“Energy-EfficientCooperativeRoutingSchemeforHeterogeneousWirelessSensorNetworks,”IEEEAccess,vol.8,March2020,pp.56321–56332,DOI:10.1109/ACCESS.2020.2980877.(SCI,IF’18=4.098,22/155) 10 Yao-ChungFan,Si-YingHuang,Yung-YuChen,Lun-ChiChen,Fang-YieLeu*,WordEmbeddingQuantizationforPersonalizedRecommendationonStorage-ConstrainedEdgeDevicesinaSmartStore,”MobileNetworksandApplications,acceptedonMarch14,2020.(SCI,IF’18=2.39,19/53) 11 Kun-LinTsai,Fang-YieLeu,Li-LingHung*,andChia-YIinKo,“SecureSessionKeyGenerationMethodforLoRaWANServers,"IEEEAccess,vol.8,March2020,pp.54631-54640.(SCI,IF’18=4.098,22/155) 12 Fang-YieLeu,Kun-LinTsai,HeruSusanto,Cheng-YanGu,IlsunYou*,“AFaultTolerantMechanismforUEAuthenticationin5GNetworks"MobileNetworksandApplications,acceptedonJanuary2020.(SCI,IF’18=2.39,19/53) 13 HeruSusanto,Fang-YieLeu,Chin-KangChenandFadzlinatiMohiddin,ManagingHumanCapitalinToday’sGlobalization:AManagementInformationSystemPerspective,AppleAcademicPress,TailorandFrancisGroup,Oct.2019.(Book) 14 Yi-LiHuang,Fang-YieLeu*,Ruey-KaiSheu,Jung-ChunLiu,HeruSusanto,“ASecureandEfficientWSNbyEmployingSymmetricKeyMatrixandRectangularFrameScheme,”ConcurrencyandComputation:PracticeandExperience,networkversiononNov.29,2019.(SCI,IF’18=1.167,59/105) 15 Kun-LinTsai,Fang-YieLeu,I.You,Shuo-WenChang,Shiung-JieHu,HoonyongPark,“LowPowerAESDataEncryptionArchitectureforLoRaWAN,”IEEEAccess,vol.7,issue1,December2019,pp.146348-146357.(SCI,IF’18=4.098,22/155) 16 Jeng-WeiLin,Shih-weiLiaoandFang-YieLeu*,“SensorDataCompressionUsingBoundedErrorPiecewiseLinearApproximationwithResolutionReduction,”Energies,vol.12,2523,June2019.(SCI,IF’18=2.707,56/103) 17 Fang-YieLeu*,Kun-LinTsai,Szu-YinLin,“E-ANDSF-basedBaseStationSelectionSchemebyusingMLPinUntrustedEnvironments,"IEEETransactionsonIndustrialInformatics,vol.15,no.10,October2019.(SCVI,IF’18=7.377,1/46) 18 HeruSusanto,LeuFang-YieandChinKangChen,BusinessProcessReengineering--AnICTApproach,AppleAcademicPress,April2019. 19 HeruSusanto,LeuFang-YieandChinKangChen,“GreenInformationandCommunicationTechnologyAwarenessasaCorporateStrategyforInformationSystems,”Chapter11ofthebookentitledTheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,AppleAcademicPress,Dec2018,pp.253-284. 20 ChinKangChen,HeruSusantoandLeuFang-Yie,“ManagingonlineLearning:BigdataSocialNetworks,cloudComputing,”Chapter10ofthebookentitledTheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,AppleAcademicPress,Dec2018,pp.229-252. 21 HeruSusanto,LeuFang-YieandChinKangChen,“EnablingOnlineEducation:AnAcademicAspect,”Chapter6ofthebookentitledTheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,AppleAcademicPress,Dec2018,pp.125-152. 22 HeruSusanto,andLeuFang-Yie,RevealingtheBig-datarevolutionasaDriverofScienceAchievementinTioday’sGlobalization,”Chapter3ofthebookentitledTheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,AppleAcademicPress,Dec2018,pp.49-64. 23 Kun-LinTsai,Yi-LiHuang,Fang-YieLeu,IlsunYou*,Yu-LingHuang,Cheng-HanTsai,“AES-128BasedSecureLowPowerCommunicationforLoRaWANIoTEnvironments,”IEEEACCESS,vol.6,issue1,2018,pp.45325-45334.(SCI,IF’18=4.098,22/155) 24 HeruSusanto,LeuFang-YieandChinKangChen,TheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,AppleAcademicPress,Dec2018. 25 IlsunYou*andFang-YieLeu,“Commentson“SPAM:ASecurePasswordAuthenticationMechanismforSeamlessHandoverinProxyMobileIPv6Networks,”IEEESystemsJournal,vol.12,no.1,pp.1038-1041,March2018.(SCI) 26 Jung-ChunLiu,Fang-YieLeu*,Guan-LiangLin,HeruSusanto,“AnMFCC-basedText-independentSpeakerIdentificationSystemforAccessControl,”ConcurrencyandComputation:PracticeandExperience,vol.30,issue2,2018,pp.1-16.SCI 27 MobileInternetSecurity,IlsunYou,Fang-YieLeu,Hsing-ChungChenandIgorKotenko(Eds.),CommunicationsinComputerandInformationScience797,Springer,2018.http://www.springer.com/series/7899 28 Xiu-ShuZhang,Fang-YieLeu*,Ching-WenYang,Lai-ShiunLai,“Healthcare-basedonCloudElectrocardiogramSystem:AMedicalCenterExperienceinMiddleTaiwan,”JournalofMedicalSystems,vol.42,issue3,March,2018,pp.1-13.(SCI) 29 VishalSharma,IlsunYou⁎,Fang-YieLeu,andMohammedAtiquzzaman,“Secureandefficientprotocolforfasthandoverin5GmobileXhaulnetworks,”JournalofNetworkandComputerApplications,vol.102,January2018,38–57. 30 Fang−YieLeu,Chia−YinKo,IlsunYou*,Kim-KwangRaymondChoo,Chi-LunHo,“ASmartphone-BasedWearableSensorsforMonitoringReal-TimePhysiologicalData,”ComputersandElectricalEngineering,vol.65,January2018,pp.376–392.(SCI,IF17=1.084). 31 Kun-LinTsai,andFang-YieLeu,“SecureData-sharingusingDistributedEnvironmentalMatchingKeys,”PervasiveandMobileComputing,vol.42,December2017,pp.513–525. 32 FatosXhafa,Fang-YieLeuandLi-LingHung,SmartSensorsNetworks--CommunicationTechnologiesandIntelligentApplications,EditedbyFatosXhafa,Fang-YieLeuandLi-LingHung,AcademicPress(Elsevier),LondonWall,LondonEC2Y5AS,UnitedKingdom,May2017. 33 Fang-YieLeu,Chia-YinKo,Yi-ChenLin,HeruSusanto,Hsin-ChunYu,“FALLDETECTIONANDMOTIONCLASSIFICATIONBYUSINGDECISIONTREEONMOBILEPHONE,”Chapter10ofthebookentitledSmartSensorsNetworks--CommunicationTechnologiesandIntelligentApplications,pp.205-237,May2017. 34 Jui-HungKao,ChienChan,FeiPeiLai,Bo-ChengLin,Wei-ZenSun,Kuan-WuChang,Fang-YieLeu,Jeng-WeiLin*,“SpatialanalysisanddataminingtechniquesforidentifyingriskfactorsofOut-of-HospitalCardiacArrest,”InternationalJournalofInformationManagement,Vol.37,Issue1,PartB,February2017,pp.1528-1538.(SCI,IF’18=5.063,1/89) 35 Jung-ChunLiu,Yi-LiHuang,Fang-YieLeu*,Feng-ChingChiang,Chao-TungYang,WilliamCheng-ChungChu,“ASquareKeyMatrixManagementSchemeinWirelessSensorNetworks,”ComputingandInformatics,Vol.36,May2017,1001–1017.(SCI,JCR’13=0.319,121/115) 36 Yao-ChungFan,HuanChen,Fang-YieLeu,IlsunYou*,“EnablingIn-NetworkAggregationbyDiffusionUnitsforUrbanScaleM2MNetworks,”JournalofNetworkandComputerApplications,vol.93,1September2017,pp.215–227. 37 Tzu-ChiangChiang,Pei-YunCheng,andFang-YieLeu*,“PredictionoftechnicalefficiencyandfinancialcrisisofTaiwan’sinformationandcommunicationtechnologyindustrywithdecisiontreeandDEA,”SoftComputing,vol.21,issue18,September2017,pp.5341-5353.(SCI) 38 Fang-YieLeu,Kun-LinTsai*,Yi-TingHsiao,andChao-TungYang,“AnInternalIntrusionDetectionandProtectionSystembyusingDataMiningandForensicTechniques,”IEEESystemsJournal,vol.11,no.2,June2017,pp.427-438.(SCI,IF’18=4.463) 39 Chao-TungYang,Jung-ChunLiu,Wei-ShengChen,Fang-YieLeuandWilliamCheng-ChungChu,“ImplementationofavirtualswitchmonitoringsystemusingOpenFlowoncloud,”InternationalJournalofAdHocandUbiquitousComputing,Vol.24,No.3,2017,pp.162-172.(SCI,JCR’13=0.90,81/135) 40 Chia-PingShen,Feng-ShengLin,AndyYan-YuLam,WeiChen,WeizhiZhou,Hsiao-YaSung,Yi-HueiKao,Ming-JangChiu,Jeng-WeiLin,Fang-YieLeu,andFeipeiLai,“GA-SVMmodelingofmulticlassseizuredetectorinepilepsyanalysissystemusingcloudcomputing,”SoftComputing,vol.21,Issue8,April2017,pp2139–2149. 41 HeruSusanto,ChenChinKangandFangYieLeu,“ALessonLearnfromITasEnableofBusinessProcessRe-Design,”InformationSystemandEconomicsandEJournal,acceptedinFebruary2016. 42 HeruSusanto,ChenChinKangandFangYieLeu,“RevealingtheRoleofICTforBusinessCoreRedesign,”InformationSystemandEconomicsandEJournal,acceptedFebruary2016. 43 Kun-LinTsai*,Fang-YieLeuandShun-HungTsai,“DataEncryptionMethodUsingEnvironmentalSecretKeywithServerAssistance,”IntelligentAutomation&SoftComputing,vol.22,Issue3,August2016,pp.423-430.(SCI) 44 Kun-LinTsai,Yi-LiHuang,Fang-YieLeu,andIlsunYou,“TTPbasedHigh-efficientMulti-KeyExchangeProtocol,”IEEEACCESS,vol.4,2016,pp.6261-6271. 45 Kun-LinTsai,Fang-YieLeu,andIlsunYou*,“ResidenceEnergyControlSystemBasedonWirelessSmartSocketandIoT,”IEEEACCESS,vol.4,2016,pp.2885-2896. 46 Kun-LinTsai,Fang-YieLeu,andJiu-SoonTan,“AnECC-basedSecureEMRTransmissionSystemwithDataLeakagePreventionScheme,”InternationalJournalofComputerMathematics,vol.93,no.2,February2016,pp.367-383.(SCI,2014,0.825) 47 Jia-ChunLin,Fang-Yie,LeuandYing-pingChen,“ImpactsofTaskRe-executionPolicyonMapReduceJobs,”TheComputerJournal,vol.59,issue5,2016,701-714. 48 IlsunYou,Fang-YieLeu,“AppliedCryptographyanditsPracticalApplicationstoSecureInternetServices,”EditorialofJournalofInternetTechnology,January2016. 49 Fuu-ChengJiang,IlsunYouandFang-YiLeu,“ApproachinggreenSensorFieldusingQueue-basedOptimizationTechnique,”JournalofNetworkandComputerApplications,vol.66,May2016,pp.128–136. 50 HeruSusanto,LeuFang-Yie,andChinKangChen,“AndroidvsiOSorOthers?SMD-OSSecurityIssues:GenerationYPerception,”InternationalJournalofTechnologyDiffusion(IJTD),vol.7,no.2,pp.1-18,2016. 51 MarekR.Ogiela,IlsunYou,Fang-YieLeu,andYu-CheeTseng,“Secureubiquitouscomputing,”PervasiveandMobileComputing,vol.24,December2016,pp.1-3. 52 Fang-YieLeu*,Chin-YuLiu,Jung-ChunLiu,Fuu-ChengJiang,“S-PMIPv6:anIntra-LMAmodelforIPv6Mobility,”JournalofNetworkandComputerApplications,Vol.58,December2015,pp.180–191. 53 Fang-YieLeu,Yi-LiHuang,Sheng-MaoWang,“ASecureM-CommerceSystembasedoncreditcardtransaction,”ElectronicCommerceResearchandApplications,vol.14,2015,pp.351-360.(SCI,IF=2.135) 54 Fang-YieLeu,Hsin-LiangChen,andChih-ChungCheng,“ImprovingMulti-pathCongestionControlforEvent-drivenWirelessSensorNetworksbyusingTDMA,”JournalofInternetServicesandInformationSecurity(JISIS),vol.5,no.4,November2015,pp.1-19. 55 Yi-LiHuang,I-LongLin,Fang-YieLeu*,Jung-ChunLiu,Fuu-ChengJiang,Cheng-ChungChu,Chao-TungYang,Miao-HengChen,“ASecureAuthenticationSystemforControllingTrafficLightsforAmbulances,”JournalofInternetTechnology,vol.16,no.1,January2015,pp.19-33.(SCI,JCR’12=0.418,68/78) 56 Chao-TungYang,Wen-ChungShih,Lung-TengChen,Cheng-TaKuo,Fuu-ChengJiang,Fang-YieLeu,“AccessingMedicalImageFilewithCo-allocationHDFSinCloud,”FutureGenerationComputerSystems,vol.43-44,February2015,pp.61-73.SCI 57 Yi-LiHuang,Cheng-RuDai,Fang-YieLeu,IlsunYou*,“ASecureDataEncryptionMethodEmployingaSequential-LogicStyleMechanismforaCloudSystem,”InternationalJournalofWebandGridServices,vol.11,no.1,January2015,pp.102-124.SCI,JCR’13=1.579,24/105. 58 Ming-ChangLee,Fang-YieLeu*,Ying-pingChen,“Pareto-basedCacheReplacementAlgorithmsforYouTube,”WorldWideWebJournal,vol.18,Issue6,pp.1523–1540,November2015.(SCI,JCR’13-1.623,20/105) 59 Jia-ChunLin,Fang-YieLeu,andYing-pingChen,“ImpactofMapReducePoliciesonJobCompletionReliabilityandJobEnergyConsumption,”IEEETransactionsonParallelandDistributedSystems,vol.26,issue5,May2015,pp.1364-1378.(SCI,JCR’13=2.173,10/102) 60 Chia-YinKo,Fang-YieLeuandI-TsenLin,“Usingsmartphoneasatrackandfalldetector:Anintelligentsupportsystemforpeoplewithdementia,”abookchapterofAdvancedTechnologicalSolutionsforDementiaPatientMonitoring,editedbyFatosXhafa,PhilipMooreandGeorgeTadros,IGIPublisher. 61 Jia-ChunLin,Fang-YieLeu,Ying-pingChen,“AnalyzingJobCompletionReliabilityandJobEnergyConsumptionforaHeterogeneousMapReduceClusterunderDifferentIntermediate-DataReplicationPolicies,”JournalofSupercomputing,vol.71,Issue5,pp1657-1677,May2015.(SCI,JCR’13=0.841,47/102) 62 Jia-ChunLin,Fang-YieLeu,Ying-pingChen,ReHRS:AHybridRedundantSystemforImprovingMapReduceReliabilityandAvailability,abookchapterofSpringerbookCompanyentitledModellingandProcessingforNextGenerationBigDataTechnologiesandApplications,2015,187-209. 63 Jia-ChunLin,Fang-YieLeu*,Ying-pingChen,“PAReS:AProactiveandAdaptiveRedundantSystemforMapReduce,”JournalofInformationScienceandEngineering,vol.31,no.5,pp.1797-1815,Sept.2015.(SCI,JCR’13=0.333,128/135) 64 Fang-YieLeuandYi-TingHsiao,“AGridSystemDetectingInternalMaliciousBehaviorsatSystemCallLevel,”JournalofInternetServicesandInformationSecurity(JISIS),vol.4,no.4,November2014,pp.14-24. 65 Fang-YieLeu,FatosXhafa,AnielloCastiglioneandYi-LiHuang,“EMERGINGWIRELESSANDSENSORNETWORKSANDTHEIRAPPLICATIONS,”InternationalJournalofCommunicationNetworksandDistributedSystems,vol.13,nos.3/4,2014,pp.241-243.(EI) 66 IlsunYou,Yi-LiHuang,Fang-YieLeu,Jung-chunLiu,Lih-JiunLo,“ASecureWirelessCommunicationSystemIntegratingPRNGandDiffie-HellmanPKDSbyUsingaDataConnectionCore,”JournalofInternetTechnology,vol.15,no.5,September2014,pp.713-726.(SCI,JCR’13=0.418,68/78) 67 Yi-LiHuang,Fang-YieLeu,Jian-HongChenandWilliamCheng-ChungChu,“ATrueRandom-NumberEncryptionMethodEmployingBlockCipherandPRNG,”ComputerScienceandInformationSystems(ComSIS),vol.11,issue3,pp.905–924,August2014.(SCI,JCR’13=0.575,101/135) 68 Fang-YieLeu,Jung-chunLiu,Ya-TingHsu,Yi-LiHuang,“TheSimulationofanEmotionalRobotImplementedwithFuzzyLogic,”SoftComputingJournal,Septembervol.18,Issue9,Sept.2014,pp.1729-1743.(SCI,JCR’13=1.304,59/121) 69 Kun-LinTsai,Fang-YieLeu,Tien-HanWu,Shin-shiuanChiou,Yu-WeiLiuandHan-YunLiu“ASecureECC-basedElectronicMedicalRecordSystem,”JournalofInternetServicesandInformationSecurity,vol.4,no.1,February2014,pp.47-57. 70 Chin-LingChen,Chun-YiWu,Fang-YieLeuandYi-LiHuang,“UsingRFIDYokingProoftoDesignaSupply-ChainApplicationsforCustomsCheck,”ITCoNvergencePRActice(INPRA),vol.1,no.2,June2013,pp.34-54. 71 Jia-ChunLin,Fang-YieLeu,andYing-pingChen,“AnalyzingjobcompletionreliabilityandjobenergyconsumptionforageneralMapReduceinfrastructure,”JournalofHighSpeedNetworks,vol.19,no.3,2013,pp.203–214.(EI) 72 CHIN-LINGCHEN,TSAI-TUNGYANG,FANG-YIELEUANDYI-LIHUANG,“DesigningaHealthcareAuthorizationModelBasedonCloudAuthentication,”IntelligentAutomationandSoftComputing,vol.20,no.3,pp.365-379,July2013.SCI=0.155. 73 Fuu-ChengJiang,Hsiang-WeiWu,Fang-YieLeu,andChao-TungYang,“TowardgreensensorfieldbyoptimizingpowerefficiencyusingD-policyM/G/1queuingsystems,”MobileInformationSystems,vol.9,no.3,January2013,pp.241-260. 74 Fuu-ChengJiang,Fang-YieLeu,Hsiang-WeiWu,Ching-HsienHsuandWilliamCheng-ChungChu,“TowardSustainableSensorFieldbyGreenerTechniqueofOptimizationwithQueue-basedApproach,”JournalofInternetTechnology,vol.14,no.4,July,2013,pp.619-630.(SCI,JCR’12=0.418,68/78) 75 Yi-LiHuang,Fang-YieLeu*,IlsunYou,Yao-KuoSun,andCheng-ChungChu,“ASecureWirelessCommunicationSystemIntegratingRSA,Diffie-HellmanPKDS,IntelligentProtection-keyChainsandaDataConnectionCoreina4GEnvironment,”JournalofSupercomputing,vol.67,no.3,March2014,pp.635-652.(SCI,JCR’12=0.917,39/100) 76 MarekR.Ogiela,IlsunYou,MakotoTakizawa,Fang-YieLeu,(GuestEditorial),“Advancesinmobile,ubiquitousandcognitivecomputing,”MathematicalandComputerModelling,vol.58,2013,pp.1138-1139. 77 Yi-LiHuang,Fang-YieLeu,Ko-ChungWei,“ASecureCommunicationoverWirelessEnvironmentsbyusingaDataConnectionCore,MathematicalandComputerModelling,vol.58,issue5-5,September2013,pp.1459–1474.(SCI,JCR’12=1.42,38/247) 78 Fang-YieLeu,Fuu-ChengJiang,Chih-ChengLien,Sen-TarngLaiandShiuan-YouChiou,“ARate-allocationBasedMulti-pathCongestionControlSchemeforEvent-DrivenWirelessSensorNetworks,”ComputerSystemsScienceandEngineering,vol.27,no.5,September2012,pp.(SCI,JCR-0.371,88/99) 79 Yi-LiHuang,Chu-HsingLinandFang-YieLeu*,“ABatchVerificationSchemebyusingtheMatrix-DetectionAlgorithm,”JournalofInternetTechnology,vol.13,no.4,July2012,pp.681-690.(SCI,JCR’12=0.481,61/78) 80 Fang-YieLeu,Keng-YenChao,Ming-ChangLeeandJia-ChunLin“ASemi-preemptiveComputationalServiceSystemwithlimitedResourcesandDynamicResourceRanking,”Algorithms,vol.5,issue1,March2012,pp.113-147. 81 Ming-ChangLee,Fang-YieLeu,Ying-pingChen,“PFRF:AnAdaptiveDataReplicationAlgorithmbasedonStar-basedDataGrids,”FutureGenerationComputerSystems,vol.28,issue7,July2012,pp.1045–1057.(SCI,JCR’12=1.864,15/100) 82 Fuu-ChengJiang,Der-ChenHuang,Chao-TungYangandFang-YiLeu,“LifetimeElongationforWirelessSensorNetworkusingQueue-basedApproaches,”JournalofSupercomputing,vol.59,Issue3,January2012,pp.1312-1335.(SCI,JCR’12=0.917,39/100) 83 Fang-YieLeu,(GuestEditorial),“EmergingSecurityTechnologiesandApplications,”JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,vol.2,no.3,September2011,pp.1-3. 84 Yi-LiHuangandFang-YieLeu,“ConstructingaSecurePoint-to-PointWirelessEnvironmentbyIntegratingDiffie-HellmanPKDSRSAandStreamCipheringforUsersKnowntoEachOther,”JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,vol.2,no.3,September2011,pp.96-107. 85 Fang-YieLeu,IlsunYouandFeilongTang,(GuestEditorial)“EmergingWirelessandMobileTechnologies,”MobileInformationSystems,vol.7,no.3,September2011,pp.165–167. 86 Yi-FuCiou,Fang-YieLeu,Yi-LiHuangandKangbinYim,“AHandoverSecurityMechanismEmployingDiffie-HellmanKeyExchangeApproachforIEEE802.16eWirelessNetworks,”MobileInformationSystems,vol.7,no.3,September2011,pp.241–269.(SCI,JCR’11=2.432,11/135) 87 Fang-YieLeu,Fenq-LinJenqandFuu-ChengJiang,“APathSwitchingSchemeforSCTPBasedonRoundTripDelays,”ComputersandMathematicswithApplications,vol.62,Issue9,November2011,pp.3504–3523.(SCI,JCR’12=2.069,11/247) 88 Yi-FungHuang,Fang-YieLeu,Chao-HongChiuandI-LongLin,“ImprovingSecurityLevelsofIEEE802.16eAuthenticationbyInvolvingDiffie-HellmanPKDS,”JournalofUniversalComputerScience,vol.17,no.6,March2011,pp.891--911.(SCI,JCR’11=0.398,85/104) 89 Fang-YieLeu,IlsunYouandYao-TienHuang,“ACoordinatedMultipleChannelAssignmentSchemeandAPDeploymentforChannelReuseinMetropolitanScaleWirelessNetworks,”JournalofNetworkandComputerApplications,vol.34,Issue2,March2011,pp.632-643.(SCI,JCR’11=1.065,21/50) 90 Chao-TungYang,Fang-YieLeu,andSung-YiChen,“ResourceBrokeringusingaMulti-siteResourceAllocationStrategyforComputationalGrids,”ConcurrencyandComputation:PracticeandExperience,vol.23,no.6,April2011,pp.573–594.(SCI,JCR’11=0.636,64/99) 91 Fang-YieLeu,Neng-WenLo,Lun-NiYang,I-LongLin,“PredictingVertebratePromotersUsingHeterogeneousClusters,”InternationalJournalofAdHocandUbiquitousComputing:aSpecialIssueon:"GridandCloudComputing,Vol.6,No.4,September2010,pp.216–234.(SCI,JCR’11=0.848,80/135) 92 Li-WenLiu,Li-JuJang,Fang-YieLeu,Jieh-JiuhWang,Shu-TwuWang,“FromanInterdisciplinaryApproachtoConstructaModelofCommunityDisasterManagementSupportSystem,”AustralasianJournalofDisasterandTraumaStudies,Vol.2-1-2,2010.(online).http://trauma.massey.ac.nz/issues/2010-2/contents.htm 93 林宜隆,邱獻民,呂芳懌,“數位證據同一性在法庭上之攻擊與防禦─以在網際網路蒐集之數位證據為中心,”中央警察大學學報第四十七期,民國99年七月,pp.363~377. 94 Chao-TungYang,Fang-YieLeuandSung-YiChen,“NetworkBandwidth-awareJobSchedulingwithDynamicInformationModelforGridResourceBrokers,”JournalofSupercomputing,vol.52,no.3,June2010,pp.199-223.(SCI,JCR’11=0.578,37/50) 95 Fang-YieLeu,I-LongLin,“ADoS/DDoSAttackDetectionSystemUsingChi-SquareStatisticApproach,”JournalofSystemics,CyberneticsandInformatics,vol.8,no.2,April2010,pp.41-51.(online).http://www.iiisci.org/Journal/sci/Contents.asp?var=&next=ISS8802 96 Fang-YieLeu,Chau-TungYang,Fuu-ChengJiang,“ImprovingReliabilityofaHeterogeneousGrid-basedIntrusionDetectionPlatformusingLevelsofRedundancies,”FutureGenerationComputerSystems,vol.26,issue4,April2010,pp.554-568.(SCI,JCR’11=1.978,9/99) 97 Fang-YieLeuandChih-ChiehKo,“AnAutomatedTermDefinitionExtractionSystemUsingtheWebCorpusintheChineseLanguage,”JournalofInformationScienceandEngineering,vol.26,no.2,March2010,pp.505-525.(SCI,JCR’11=0.175,132/135) 98 Chao-TungYang,Fang-YieLeuandMing-FengYang,“APeer-to-PeerVideoFileResourceSharingSystemforMobileDevices,”JournalofInternetTechnology,vol.11,no.1,February2010,pp.69-78.(SCI,JCR’11=0.508,57/89) 99 Fang-YieLeu,“IntrusionDetection,ForecastandTracebackAgainstDDoSAttacks,”JournalofInformation,TechnologyandSociety,vol.9,December2009,pp.19-44. 100 Fang-YieLeu,Der-JiunnDengand,Yi-FungHuang,“AnEfficientBandwidth-useSchemeoverWLANwiththeIEEE802.11eStandardDeployingaMulti-pollingMechanism,”InternationalTransactiononComputerScienceandEngineering,vol.56,no.1,October2009,pp.23-46. 101 Fang-YieLeu,“ANovelNetworkMobilityHandoffSchemeUsingSIPandSCTPforMultimediaApplications,”JournalofNetworkandComputerApplications,vol.32,issue5,September2009,pp.1073-1091.(SCI,JCR’11=1.065,21/50) 102 Fang-YieLeu,“AnInnerandIncomingIntrusionDetectionandRemoteProtectionSystem,”InternationalTransactiononComputerScienceandEngineering,vol.55,no.1,August2009,pp.81-96. 103 Fang-YieLeu,Wen-ChinWu,andHung-WeiHuang,“ARoutingAssistantSchemewithLocalizedMovementinUniformlyDistributedEvent-drivenWirelessSensorNetworks,”TheJointInternationalConferencesonAsia-PacificWebConference(APWeb)andWeb-AgeInformationManagement(WAIM),April2009.(LectureNotesinComputerScience,Springer-Verlag.),pp.576-583. 104 Fang-YieLeuandKai-WeiHu,“AReal-TimeIntrusionDetectionSystemusingDataMiningTechnique,”JournalofSystemics,CyberneticsandInformatics,vol.6,no.2,April2008,pp.36-41.(online).www.iiisci.org/journal/CV$/sci/pdfs/T171GTB.pdf 105 Fang-YieLeu,Ming-ChangLi,Jia-ChunLinandChao-TungYang,“DetectionWorkloadinaDynamicGrid-basedIntrusionDetectionEnvironment,”JournalofParallelandDistributedComputing,vol.68,issue4,April2008,pp.427-442.(SCI,JCR’11=0.859,40/99) 106 Fang-YieLeuandGuo-CaiLi,“AScalableSensorNetworkusingaPolarCoordinateSystem,”SignalProcessing,vol.87,issue12,December2007,pp.2978-2990.(SCI,JCR’11=1.503,79/245) 107 Fang-YieLeu,Yu-HsinChen,Ching-ChienKuanandDr-JiunnDeng,“AnImprovedBandwidth-useMethodonIEEE802.11eStandardoverWLAN,”theIFIPInternationalConferenceonNetworkandParallelComputing,DalianChina,September2007.(LectureNotesinComputerScience,Springer-Verlag.),pp.183-192. 108 Fang-YieLeu,Fuu-ChengJiang,Ming-ChangLi,andJia-ChunLin,“AnEnhancedDGIDEPlatformforIntrusionDetection,”TheInternationalConferenceonAutonomicandTrustedComputing,HongKong,China,July2007,(LectureNotesinComputerScience,Springer-Verlag.),pp.559-568. 109 Fang-YieLeuandWei-JieYang,“IntrusionDetectionwithCUSUMforTCP-basedDDoS,”TheFirstIFIPWorkshoponTrustedandAutonomicUbiquitousandEmbeddedSystems(TAUES’05),Nagasaki,Japan,December6-9,2005,pp.1255-1264.(LectureNotesinComputerScience,Springer-Verlag.),(SCI-E,JCR’05=0.402) 110 Fang-YieLeu,Shi-JieYanandWen-KuiChang,“Fuzzy-basedDynamicBandwidthAllocationSystem,”Proceedingsof2005theFirstInternationalConferenceonNaturalComputation&theSecondInternationalConferenceonFuzzySystemsandKnowledgeDiscovery,August2005,pp.911-920.(LectureNotesinComputerScience,Springer-Verlag.)(SCI-E,JCR’05=0.302) 111 Fang-YieLeu,et.al.,“FaceRecognitionUsingImagedatabase,”TungHaiScienceJournal,Vol.1,Nov.1999. 112 Fang-YieLeuandS.W.Zhao,“DistributedDatabaseArchitectureanditsQueryProcessing,”JournalofTungHaiUniversity,Oct.1997. 113 Fang-YieLeu,S.K.ChangandC.C.Yang,"AValidationAssistantforaDistributedOfficeInformationSystemModeledbyOfficeProcedureModel,"JournalofInformationScienceandEngineering,Vol.11,No.2,June1995,pp.183-206. 114 Fang-YieLeuandC.C.Yang,"AutomaticRuleBaseInspectionforData-AccessOrientedKnowledge-BasedSystems,"JournalofInformationScienceandEngineering,Vol.7,No.1,March1991,pp53-79. 會議論文 順序 名稱 1 Shih-TingChiuFang-YieLeu,“UsingCUSUM-AlgorithmtoDetectDoSandDDoSAttack,”The23rdInternationalConferenceonNetwork-BasedInformationSystems(NBiS-2020),August2020,pp.?-?. 2 HungRuiTing,LeuFang-Yie,“OptimizedLoRaModuleforIOT,”The14thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing(BWCCA-2020),July2020,pp.?-?. 3 Szu-YinLin,Fang-YieLeu,Chia-YinK,Ming-ChienShih,"AHybridInformation-basedSmartphoneIndoor-PositionApproach,"The14thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2020,pp.?-?. 4 Bing-HongTsai,Yao-ChungFan,andFang-YieLeu,“ExtractiveSummarizationbyRougeScoreRegressionbasedonBERT,”The14thInternationalConferenceonComplex,Intelligent,andSoftwareIntensiveSystems,(CCISC-2020),July2020,pp.?-?. 5 Yi-HsunLu,Fang-YieLeu,“DynamicRoutingandBandwidthProvisionBasedonReinforcementLearninginSDNNetworks,”Proceedingsofthe34thInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2020),Caserta,Italy,April2020,pp.1-11. 6 Wei-ShengChen,Fang-YieLeu,“TheStudyonAUSFFaultTolerance,”The8-thInternationalConferenceonEmergingInternet,Data&WebTechnologies(EIDWT-2020),February24-26,2020,pp.406-415. 7 Ping-JuiChiang,HeruSusanto,Fang-YieLeu,andHui-LingHuang,“MobilePhysiologicalSensorCloudSystemforLong-TermCare,”the14thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November7-9,2019,pp.698-710. 8 Zhi-QianHong,Fang-YieLeu,andHeruSusanto,“NewsCollectionandAnalysisonPublicPoliticalOpinions,”the14thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November7-9,2019,pp.688-697. 9 Wei-ShengChen,Fang-YieLeu,andHeruSusanto,“SystemImplementationofAUSFFaultTolerance,”the14thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November7-9,2019,pp.678-687. 10 J.-W.Lin,S.-.Liao,F.-Y.Leu,“ANovelBounded-ErrorPiecewiseLinearApproximationAlgorithmforStreamingSensorDatainEdgeComputing,”the11-thInternationalConferenceonIntelligentNetworkingandCollaborativeSystemsINCoS-2019,OitaUniversity,Oita,Japan,September5-7,2019,pp.123-132. 11 Mei-YuWu,Fang-YieLeu,“MIHandCRRMHandoverinTrustedorUntrustedEnvironments,”The13-thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2019,pp.526-536. 12 Fang-YieLeuandJia-ShengHo,“AirpollutionsourceidentificationbyusingNeuralNetworkwithBayesianOptimization,”The13-thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2019,pp.514-524. 13 Sheng-ZhengLin,Fang-YieLeu,“FirewallservicesprovidedbyEdgeComputerunderAMFandgNBin5Genvironments,”The13-thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2019,pp.503-513. 14 Kun-LinTsai,Fang-YieLeu,Shuo-WenChang,Jiun-YiLin,Huei-TangLuo,“ALoRaWANbasedEnergyEfficientDataEncryptionMethod,”The13-thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2019,pp.493-502. 15 HeruSusanto,Fang-YieLeu,DidiRosiyadiandChinKangChen,“RevealingStorageandSpeedTransmissionEmergingTechnologyofBigData,”The33rdIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2019),Japan,March2019,pp.571-583. 16 Kun-LinTsai,Fang-YieLeu,andShuo-WenChang,“Self-parameterBasedBilateralSessionKeyExchangeMethod,”the13thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,Oct.27-28,2018,pp.611-620. 17 HeruSusanto,LeuFang-Yie,andChinKangChen,“HighPerformanceGridComputing:ChallengesandOpportunitiesofHighSpeedNetworking,”the13thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,Oct.27-28,2018,pp.597-610. 18 Fang-YieLeu,HeruSusanto,Ping-HungChou,andJeng-WeiLin,“MigrationofEdgeComputingServicesin5GNetworks–FirewallasaServiceExample,”the13thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,Oct.27-28,2018,pp.578-585. 19 Sen-TarngLai,Fang-YieLeu,andJeng-WeiLin,“ABankingChatbotSecurityControlProcedureforProtectingUserDataSecurityandPrivacy,”the13thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,Oct.27-28,2018,pp.561-571. 20 Fang-YieLeu,Chen-YianKu,“TheStudyofMMEPoolManagementandFaultTolerancein5GNetworkswithSDNControllers,”2018the12thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2018,pp.585-595. 21 Fang-YieLeu,Bin-HornChou,“AStudyonFirewallServiceswithEdgeComputersofvEPCin5GNetworks,”2018the12thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2018,pp.576-584. 22 Sen-TarngLai,Fang-YieLeu,“AMicroServiceQualityMeasurementModelforImprovingtheEfficiencyandQualityofDevOps,”2018the12thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2018,pp.565-575. 23 Chia-YinKoandFang-YieLeu,“Analyzingattributesofsuccessfullearnersbyusingmachinelearninginanundergraduatecomputercourse,”The32ndIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2018),Krakow,Poland,2018,pp.801-806. 24 Zong-YingYang,Fang-YieLeu,“RelayBase-StationHandoverina5GEnvironment,”the12thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November8–10,2017,Spain,pp.803-810.(EI) 25 Chien-HsiangKao,Fang-YieLeu,“PredictingVideoStreamFragmentsinaReactiveModeChien-HsiangKao,Fang-YieLeu4.RelayBase-StationHandoverina5GEnvironment,”the12thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November8–10,2017,Spain,pp.796-802.(EI) 26 Kun-LinTsai,Fang-YieLeu,Tung-HungSu,Yi-ChenChang,“ALightWeightDataEncryptionMethodforWSNCommunication,”the12thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November8–10,2017,Spain,pp.788-795.(EI) 27 Sen-TarngLai,Fang-YieLeu,“ACriticalQualityMeasurementModelforManagingandControllingBigDataProjectRisks,”the12thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November8–10,2017,Spain,pp.777-787.(EI) 28 Jia-JiaLiu,Yi-LiHuang,Fang-YieLeu,Xing-YouPan,andLi-RenChen,“GeneratingDynamicBoxbyusinganInputString,”MobiSec2017,JejuIsland,Korea,2017,pp.?-?..LNCS. 29 Xiu-ShuZhang,Fang-YieLeuandChing-WenYang,“HealthcarebasedonCloudElectrocardiogramSystem:AMedicalCenterExperienceinMiddleTaiwan,”201711thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2017,pp.473-482. 30 Sen-TarngLaiandFang-YieLeu,“AnIterativeandIncrementalDataPreprocessingProcedureforImprovingtheRiskofBigDataProject,”201711thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2017,pp.483-492. 31 Chien-HsiangKaoandFang-YieLeu,“PredictionoftheFragmentofvideostreamedtomobilephonesundera5Gnetworkbasestation,”201711thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2017,pp.493-501. 32 Fang-YieLeuandChih-ChungCheng,“MIH-basedCongestionControlwithSeamlessHandoverinUntrustedNetworks,”201711thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2017,pp.502-512. 33 Po-YuTsai,Leu,Fang-Yie,IlsunYou,Hsing-ChunChen,“ANDSF-basedCongestionControlwithSeamlessHandovertoTargetAPinHeterogeneousWirelessNetworks,”Infocom2017. 34 Fang-YieLeu,Guan-LiangLin,“AnMFCC-basedSpeakerIdentificationSystem,”The31stIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2017),pp.1055-1062. 35 Hsing-ChungChen,Chia-HuiChang,Fang-YieLeu,“ImplementofAgentwithRole-basedHierarchyAccessControlforSecureGroupingIoTs,”The5thIEEECCNCInternationalWorkshoponSecurityandCognitiveInformaticsforHomelandDefense(SeCIHD2017)8January2017,LasVegas,USA,pp.120-125. 36 Yi-LiHuang,Fang-YieLeu,IlsunYou,Rong-YiSu,Po-HaoSu,Hsing-ChungChen,“A3DEncryptionwithShiftingMappingSubstitutionMechanism,”The5thIEEECCNCInternationalWorkshoponSecurityandCognitiveInformaticsforHomelandDefense(SeCIHD2017)8January2017,LasVegas,USA,pp.126-131. 37 Jung-ChunLiu,Yi-LiHuang,Fang-YieLeu,“EnhancingSecurityofLTEusingaDoubleMaskingTechnique,”the11thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November5–7,2016,Korea,pp.747-754.(EI) 38 Cheng-YingHsu,Shang-EnYang,Hung-YuanChen,Fang-YieLeu,Yao-ChungFan,“InferringSmartphoneUserDemographicsfromWi-FitraceLogs:AStudyofUsers’PrivacyConcerns”the11thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November5–7,2016,Korea,pp.739-746.(EI) 39 Sen-TarngLaiandFang-YieLeu,“DataPreprocessingQualityManagementProcedureforImprovingBigDataApplicationsEfficiencyandPracticality,”the11thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November5–7,2016,Korea,pp.731-738.(EI) 40 Kun-LinTsai,Fang-YieLeuandKing-ShingYip,“DeviceParameterbasedSecureUserAuthentication,”the11thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications,November5–7,2016,Korea,pp.721-730.(EI) 41 Xia-YunGuo,Chin-LingChen,Chang-QingGongandFang-YieLeu,“ASecureOfficialVehicleCommunicationProtocolforVANET,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2016,pp.482-485.(EI) 42 Kun-LinTsai,Fang-YieLeu,Yi-FungHuang,ChiYang,Cheng-HsinChang,King-ShingYip,YuchenXue,andGuan-ChiLai,“CloudEncryptionUsingDistributedEnvironmentalKeys,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2016,pp.476-481.(EI) 43 Yi-LiHuang,Fang-YieLeu,Po-HaoSu,Ti-HsunSung,Sin-ChengLiu,“ASecureandHighPerformanceWirelessSensorNetworkBasedonSymmetricKeyMatrix,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,pp.470-475.(EI) 44 Sen-TarngLaiandFang-YieLeu,“AVersionControl-BasedContinuousTestingFrameforImprovingtheIIDProcessEfficiencyandQuality,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2016,pp.464-469.(EI) 45 Fang-YieLeuandYi-TingHsiao,“FiniteStateMachineBasedRealTimeSchedulingforMicrochip,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2016,pp.458-463.(EI) 46 WooSeokHyun,IlsunYou,JoungSoonJangandFang-YieLeu,“AWirelessBodySensorNetworkandItsApplications:RehearsalwithaSmartphone,”201610thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,July2016,pp.415-418.(EI) 47 Yi-LiHuangandFang-YieLeu,IlsunYou,Hsing-ChungChen,ChishyanLiawandJung-ChunLiu,“RandomCladdingwithFeedbackMechanismforEncryptingMobileMessages,”2016IEEEConferenceonComputerCommunicationsWorkshops(INFOCOMWKSHPS),SanFrancisco,CA,USA,2016,pp.970-975.(EI) 48 Chia-YinKoandFang-YieLeu,“Applyingdataminingtoexplorestudents’self-regulationinlearningcontexts,”IEEE30thInternationalConferenceonAdvancedInformationNetworkingandApplications,March2016,pp.74-78.(EI) 49 Sen-TarngLaiandFang-YieLeu,“ApplyingContinuousIntegrationforReducingWebApplicationsDevelopmentRisks,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,Krakow,Poland,November4-6November2015,pp.386-391.(EI) 50 Fang-YieLeuandSheng-ChiehChuang,“EstablishingaRoutingPathwithRedundantLinkMinimizationinWirelessSensorNetworks,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,Krakow,Poland,4-6November2015,pp.380-385.(EI) 51 Kun-LinTsai,MengYuanYeandFang-YieLeu,“SecurePowerManagementSchemeforWSN,”TheACMConferenceonComputerandCommunicationsSecurity(CCS)/ManagingInsiderSecurityThreats(MIST)2015,Denver,USA,12-16October2015,pp.63-68(poster).(EI) 52 Chi-LunHo,andFang-YieLeu,“AWirelessPhysiologicalSensorAreaNetwork,”InternationalConferenceonNetwork-BasedInformationSystems,TaipeiTaiwan,2-4September2015,pp.14-19.(EI) 53 Tien-ShengLin,I-LongLinandFang-YieLeu,“ConstructingMilitarySmartphoneUsageCriterionofCloud-DEFSOPforMobileSecurity,”theInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,Blumenau,RegionalUniversityofBlumenau(FURB),BlumenauBrazil,8-10July2015,pp.420-425.(EI) 54 Sen-TarngLaiandFang-YieLeu,“ASecurityThreatsMeasurementModelforReducingCloudComputingSecurityRisk,”theInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,Blumenau,Brazil,8-10July2015,pp.414-419.(EI) 55 Yu-JenChang,Fang-YieLeu,Shih-ChiehChenandHei-LamWong,“ApplyingWebCrawlerstoDevelopaSaleManagementSystemforOnlineMalls,”theInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,Blumenau,Brazil,8-10July2015,pp.408-413.(EI) 56 Fong-MaoJhuang,Chi-FuHung,Chiu-ChingTuan,Yi-ChaoWuandFang-YieLeu,“AnAPSelectionwithRSSStandardDeviationforIndoorPositioninginWi-Fi,”theInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,Blumenau,Brazil,8-10July2015,pp.403-407.(EI) 57 Ming-ChangLee,Fang-YieLeu,andYing-pingChen,“ReMBF:AReliableMulticastBrute-ForceCo-AllocationSchemeforMulti-userDataGrids,”The39thAnnualInternationalComputers,Software&ApplicationsConference,TaichungTaiwan,1-5July2015,pp.774-783.(EI) 58 Chin-YuLiu,Fang-YieLeu,IlsunYou,AnielloCastiglioneandFrancescoPalmieri,“TheUntrustedHandoverSecurityoftheS-PMIPv6onLTE-A,”6thIEEEINFOCOMInternationalWorkshoponMobilityManagementintheNetworksoftheFutureWorld(MobiWorld2015),April2015,pp.161-166.(EI) 59 Chin-YuLiu,Fang-YieLeu,IlsunYou,AnielloCastiglioneandFrancescoPalmieri,“Heterogeneousnetworkhandoverusing3GPPANDSF,”The29thIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2015),Gwangju,Korea,March25-27,2015,pp.171-175.(EI) 60 Fang-YieLeuandYi-TingHsiao,"AGridSystemDetectingInternalMaliciousBehaviorsatSystemCallLevel,"The6thInternationalWorkshoponManagingInsiderSecurityThreats,2014,pp.14-24. 61 Chia-YinKo,Fang-YieLeuandI-TsenLin,“UsingSmartPhoneasaTrackandFallDetectorforPeoplewithDementia,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,2014,pp.306-311.(EI) 62 Fang-YieLeu,Jung-ChunLiuandHsin-LiangChen,“ImprovingMulti-pathCongestionControlforEvent-drivenWirelessSensorNetworksbyusingTDMA,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,2014,pp.300-305.(EI) 63 Sen-TarngLai,Fang-YieLeu,Chao-TungYangandWilliamCheng-ChungChu,“CombiningIIDwithBDDtoEnhancetheCriticalQualityofSecurityFunctionalRequirements,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,2014,pp.291-299.(EI) 64 Fang-YieLeu,Jung-ChunLiuandChin-YuLiu,“S-PMIPv6:EfficientHandoverinProxyMobileIPv6DomainbyusingSCTP,”InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,2014,pp.287-291.(EI) 65 Yi-LiHuang,Fang-YieLeu,Jing-HaoYang,“BuildinganInitializationCipherBlockwithTwo-DimensionalOperationandRandomParameters,”The9thInternationalConferenceonAvailability,ReliabilityandSecurity,2014,pp.166–171.(EI) 66 Ming-ChangLee,Fang-YieLeu,andYing-pingChen,“EvaluatingResponseTimeandReliabilityofCo-AllocationSchemesfromMulti-UserPerspectivesonaStar-TopologyDataGrid,”The6thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems,2014,pp.242-248.(EI) 67 Yi-LiHuang,Shih-HanChen,Fang-YieLeu,Chia-YinKo,Jung-ChunLiu,“Anefficienttrafficcontrolsystemwithemergencyhandlingforambulances,”The6thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems,2014,pp.356-361.(EI) 68 Yi-LiHuang,Sheng-MaoWang,Fang-YieLeu,Jung-ChunLiu,andChia-YinKo,“Asecuremobileshoppingsystembasedoncreditcardtransaction,”The6thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems,2014,pp.336-341.(EI) 69 Kun-LinTsai,Jiu-SoonTan,Fang-YieLeuandYi-LiHuang,“AGroupFileEncryptionMethodusingDynamicSystemEnvironmentKey,”TheInternationalConferenceonNetwork-BasedInformationSystems(NBiS),2014,pp.476-483.(EI) 70 Sen-TarngLai,Fang-YieLeuandWilliamCheng-ChungChu,“AMulti-LayerSecurePreventionSchemeforImprovingE-commerceSecurity,”InternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,July2014,pp.505-510.(EI) 71 Chin-LingChen,Tsai-TungYang,Fang-YieLeu,“Asecureauthenticationschemeofhealthcarebasedonthecloud,”InternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,July2014,pp.499-504.(EI) 72 Kun-LinTsai,Fang-YieLeu,Yi-LiHuang,Jiu-SoonTanandMengYuanYe,“High-efficientMulti-KeyExchangeProtocolbasedonThree-partyAuthentication,”InternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,July2014,pp.487-492.(EI) 73 Lung-PinChen,Chih-WeiHsiehandFang-YieLeu,“MinimumCostContentObjectReconstructioninMulti-TierServers,”InternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,July2014,pp.523-528.(EI) 74 I-LongLin,Yun-ShengYen,andFang-YieLeu,“ResearchonComparisonandAnalysisoftheDEFSOP,NISTCellSOPandISO27037SOP,”InternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,July2014,pp.511-516.(EI) 75 Ming-ChangLee,Fang-YieLeu,andYing-pingChen,“CacheReplacementAlgorithmsforYouTube,”The28thIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2014),May2014,pp.743-750.(EI)–ConferenceBestPaperAward 76 Jia-ChunLin,Fang-YieLeu,Ying-pingChenandWaqaasMunawar,“ImpactofMapReduceTaskRe-executionPolicyonJobCompletionReliabilityandJobCompletionTime,”The28thIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2014),May2014,pp.712-718.(EI) 77 Fang-YieLeu*,Yi-TingHsiao,“AReal-TimeIntrusionDetectionandProtectionSystemonSystemCallLevelbyusingDataMiningandProfilingTechniquesUndertheAssistanceofaGrid,”The2014AsianConferenceonAvailability,ReliabilityandSecurity(AsiaARES2014),April2014,pp.375-385.(EI) 78 Yi-LiHuang,Fang-YieLeu,Jung-ChunLiu,IlsunYou,KangbinYim,Jian-HongChen,“ARandomWrappingEncryptionMethod,”InternationalWorkshoponMobilityManagementintheNetworksoftheFutureWorld,January2014,pp.353-358.(EI) 79 Chin-LingChen,Wei-ChenTasiandFang-YieLeu,“ImproveTwoRemoteUserAuthenticationSchemeUsingSmartCard,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.404-407.(EI) 80 SuemingHsu,YalanChan,Kai-IHuangandFang-YieLeu,“AnInterdisciplinaryAnalysisofServitizationandActiveAginginTaiwan’sSeniorCareMarket:ACaseStudyofFitnessEquipmentIndustry,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.378-381.(EI) 81 Sen-TarngLai,Fang-YieLeu,WilliamCheng-ChungChu,“ASoftwareSecurityRequirementQualityImprovementProceduretoIncreaseE-CommerceSecurity,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.366-371.(EI) 82 Yu-ShinHuang,Fang-YieLeuandYi-LiHuang,“AhandoverschemeforLTEbasedontheassistanceofGPS,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.399-403.(EI) 83 Yi-LiHuang,Fang-YieLeu,Jung-chunLiu,Lih-JiunLo,WilliamCheng-ChungChu,“ASecureWirelessCommunicationSystemIntegratingPRNGandDiffie-HellmanPKDS,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.360-365.(EI) 84 Ya-TingHsu,Fang-YieLeu,Jung-chunLiu,Yi-LiHuang,“TheSimulationofanEmotionalRobotImplementedwithFuzzyLogic,”TheInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October28-30,2013,pp.382-386.(EI) 85 FrancescoPalmieri,UgoFiore,AnielloCastiglione,Fang-YieLeu,andAlfredoDeSantis,“AnalyzingtheInternetStabilityinPresenceofDisasters,”The8thInternationalConferenceonAvailability,ReliabilityandSecurity,Regensburg,Germany,September2-6,2013,pp.253-268.(EI) 86 Jung-ChunLiu,Yi-LiHuang,Fang-YieLeu*,Feng-ChingChiang,Chao-TungYang,andWilliamCheng-ChungChu“AMultiple-keyManagementSchemeinWirelessSensorNetworks,”The8thInternationalConferenceonAvailability,ReliabilityandSecurity,Regensburg,Germany,September2-6,2013,pp.337-344.(EI) 87 Ming-ChangLee,Fang-YieLeu,Ying-pingChen,“TSR:TopologyReductionfromTreetoStarDataGrids,”TheSeventhInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2013,pp.678-683.(EI) 88 Yi-LiHuang,Fang-YieLeu,Jian-HongChen,Cheng-ChungChu,Chao-TungYang,“ATrueRandom-NumberEncryptionMethod,”TheSeventhInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing,2013,pp.654-659.(EI) 89 Yi-LiHuang,Fang-YieLeu,Yao-KuoSun,Cheng-ChungChu,Chao-TungYang,“ASecureWirelessCommunicationSystembyIntegratingRSAandDiffie-HellmanPKDSin4GEnvironmentsandanIntelligentProtection-keyChainwithaDataConnectionCore,”theIEEEInternationalSymposiumonIndustrialElectronics,2013,pp.1-6.(EI) 90 Yi-LiHuang,Fang-YieLeu,Jung-ChunLiu,Jing-HaoYang,Chih-WeiYu,Cheng-ChungChu,Chao-TungYang,“Buildingablockciphermodeofoperationwithfeedbackkeys,”theIEEEInternationalSymposiumonIndustrialElectronics,2013,pp.1-4.(EI) 91 Yi-LiHuang,Fang-YieLeu,Jing-HaoYang,“BuildingablockciphermodeofoperationwithDualkeys,”TheAsianConferenceonAvailability,ReliabilityandSecurity(AsiaARES2013).LectureNotesofComputerScience–LNCS7804,March2013,pp.392-398.(EI) 92 Jia-ChunLin,Fang-YieLeu,Ying-pingChen,“DerivingJobCompletionReliabilityandJobEnergyConsumptionforaGeneralMapReduceInfrastructurefromSingle-JobPerspective,”theIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications,March2013,Barcelona,Spain,pp.1642-1647.(EI) 93 Fang-YieLeu,IlSunYou,Yi-LiHuang,KangbinYim,Cheng-RuDai,“ImprovingSecurityLevelofLTEAuthenticationandKeyAgreementProcedure,”theInternationalWorkshoponMobilityManagementintheNetworksoftheFutureWorld(MobiWorld2012),December2012,pp.1032-1036.(EI) 94 Fang-YieLeu,Yi-LiHuang,Chien-NanChen,“TheIPSecSecurityProblemsandaCross-layerSecurityMechanismforPMIPv6HandoverwhenanIPSecSecurityAssociationisEstablishedonanL2DirectLink,”theIEEEInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,November12-14,2012,Victoria,Canada,pp.452~457.(EI) 95 Fang-YieLeu,Miao-HengChen,Yi-LiHuang,Chung-ChiLin,“ControllingTrafficLightsforAmbulances,”theInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,November12-14,2012,Victoria,Canada,pp.462~467.(EI) 96 Yi-LiHuang,Fang-YieLeu,Cheng-RuDai,“ASecureDataEncryptionMethodbyEmployingaFeedbackEncryptionMechanismandThree-DimensionalOperation,”InternationalWorkshoponSecurityandCognitiveInformaticsforHomelandDefense,August2012,pp.578-592.LectureNotesofComputerScience–LNCS7465.(EI) 97 Ko-ChungWei,Yi-LiHuang,Fang-YieLeu,“ASecureCommunicationoverWirelessEnvironmentsbyusingaDataConnectionCore,”TheIEEEInternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity,Palermo,Italy,4-6July2012,pp.570-575.(EI) 98 Fang-YieLeu,Ming-ChangLee,Ying-pingChen,“ImprovingDataGridPerformancebyusingPopularFileReplicateFirstAlgorithm,”TheIEEEInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,October24-26.2011,Barcelona,Spain,pp.416~421.(EI) 99 Fang-YieLeu,Yi-FuCiou,Yi-LiHuang,“AHandoverSecurityMechanismEmployingDiffie-HellmanPKDSforIEEE802.16eWirelessNetworks,”InternationalWorkshoponSecurityandCognitiveInformaticsforHomelandDefense,August2011,pp.255-270.LectureNotesofComputerScience–LNCS-67908(EI) 100 Fenq-LinJenq,Tang-JenLiuandFang-YieLeu,“AnACLEDSmartLightingSystemwithVisibleLightTime-DivisionMultiplexingFreeSpaceOpticalCommunication,”TheIEEEInternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity2011,June/July2011,SeoulKorea,pp.589-593.(EI) 101 Fang-YieLeu,andKeng-YenChao,“ASemi-preemptiveAdHocWirelessCloudServiceSystemwithlimitedResourcestoSupportNodeMobility,”TheIEEEInternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity2011,June/July2011,SeoulKorea,pp.577-582.(EI) 102 Fang-YieLeu,andKuo-ChiLiang,“ALocation-basedHandoffSchemebasedonIEEE802.21inHeterogeneousWirelessNetworks,”TheIEEEInternationalWorkshoponMobileCommerce,CloudComputing,NetworkandCommunicationSecurity2011,June/July2011,SeoulKorea,pp.571-576.(EI) 103 Fang-YieLeuandShiuan-YouChiou,“ARate-allocationBasedMulti-pathCongestionControlSchemeforEvent-DrivenWirelessSensorNetworks,”theInternationalConferenceonDataCompression,CommunicationsandProcessing,June2011,Italy,pp.293-298.(EI) 104 Yi-LiHuang,Chu-HsingLin,andFang-YieLeu,“VerificationofaBatchofBadSignaturesbyusingtheMatrix-DetectionAlgorithm,”theInternationalConferenceonDataCompression,CommunicationsandProcessing,June2011,Italy,pp.299-306.(EI) 105 Fang-YieLeu,Yi-FungHuang,Chao-HongChiu,“MutualAuthenticationwithDynamicKeysinanIEEE802.16ePKMEnvironmentwithoutPriorAuthenticationConnection,”TheIEEEInternationalWorkshoponCloud,Wirelessande-CommerceSecurity,Nov.2010,Fukuoka,Japan,pp.441-446.(EI) 106 Fang-YieLeuandHung-WeiHuang,“AnEvent-DrivenMobileAssistantControlProtocolforWirelessSensorNetworks,”theIEEEInternationalSymposiumonFrontiersinUbiquitousComputing,NetworkingandApplications,Sept.,2010,Takayama,Japan,pp.521-526.(EI) 107 Fang-YieLeuandPei-ShiunLiu,“AChannelAssignmentandAPDeploymentSchemeforConcentric-HexagonbasedMulti-ChannelWirelessNetworks,”theIEEEInternationalSymposiumonFrontiersinUbiquitousComputing,NetworkingandApplications,Sept.,2010,Takayama,Japan,pp.504-509.(EI) 108 Fang-YieLeu,Yi-FungHuang,Chao-HongChiu,“ImprovingsecuritylevelsofIEEE802.16eauthenticationbyInvolvingDiffie-HellmanPKDS,”theInternationalConferenceonComplex,IntelligentandSoftwareIntensiveSystems,Feb.2010,Krakow,Poland,pp.391-397.(EI) 109 Yi-FungHuang,Ko-ChungWei,Fang-YieLeu,“ConstructingaSecurePoint-to-PointWirelessEnvironmentsbyIntegratingDiffie-HellmanPKDSandStreamCipheringWithoutCertificateAuthorities,”theInternationalConferenceonComplex,IntelligentandSoftwareIntensiveSystems,Feb.2010,Krakow,Poland,pp.384-390.(EI) 110 Fang-YieLeuandYong-LonChen,“APathSwitchingSchemeforSCTPBasedonRoundTripDelayandundertheAssistanceofNetworkManagementSchemes,”theInternationalConferenceonComputerScienceanditsApplications,Dec.2009,Jeju,Korea,pp.103-108.(EI) 111 Fang-YieLeu,Yao-TienHuang,“ACoordinatingMultipleChannelAssignmentSchemeandAPDeploymentinAWirelessNetwork,”The2009IEEE/IFIPInternationalSymposiumonEmbeddedandPervasiveSystems,Vancouver,Canada,August2009,pp.440-445.(EI) 112 Fang-YieLeuandZhi-YangLi,“AnInnerDoS/DDoSAttackDetectionSystem,”the6thInternationalConferenceonCyberneticsandInformationTechnologies,SystemsandApplications(CITSA2009),July2009,Florida,USA,pp.41-46. 113 Fang-YieLeuandZhi-YangLi,“DetectingDoSandDDoSAttacksbyUsinganIntrusionDetectionandRemotePreventionSystem,”theFifthInternationalConferenceonInformationAssuranceandSecurity,August2009,Xian,China,pp.255-258.(EI) 114 Fang-YieLeuandChia-ChiPai,“DetectingDoS&DDoSAttacksUsingChi-Square,”theFifthInternationalConferenceonInformationAssuranceandSecurity,August2009,Xian,China,pp.251-254.(EI) 115 Chao-TungYang,Fang-YieLeu,andSung-YiChen,“NetworkBandwidth-awareJobSchedulingwithDynamicInformationModelforGridResourceBrokers,”InternationalConferenceonAsia-PacificServicesComputingConference,2008,pp.775-780.(EI) 116 L.W.LiuandFang-YieLeu,“UseofGISandDataMiningTechniquesintheDesigningofCommunity-BasedServicesfortheElderly,”TheInternationalConferenceontheGerontologicalSocietyofAmerica’s61thAnnualMeeting,WashingtonDC,November2008. 117 Fang-YieLeu,andYao-TienHuang,“SoftwareToolsDevelopedandEmployedforSurveyonCentralTaiwanScienceParkandDataAnalyses,”InternationalConferenceonTerritorialIntelligence,Besancon,Oct.2008. 118 Fang-YieLeu,Shu-RenLeeModelingandSimulationofEnergyProducingProcessofFatsMetabolismbyUsingPetriNets,”InternationalConferenceonComputerGraphicsandImageandMultimediaProcessing,2008. 119 Fang-YieLeu,Guo-CaiLiandWen-ChinWu,“AnAutonomousEnergy-AwareRoutingScheme:aSupplementaryRoutingApproachforPath-PreservingWirelessSensorNetworks,”TheIFIPAnnualMediterraneanAdHocNetworkingWorkshop,2008,pp.49-60. 120 Fang-YieLeu,Zhen-JiaKo,“ANovelNetworkMobilitySchemeUsingSIPandSCTPforMultimediaApplications,”InternationalConferenceonIntelligentMultimediaInformationSystem,2008.pp.564-569.(EI) 121 Fang-YieLeuandYu-TingHuang,“MaximumCapacityinChain-TopologyWirelessMeshNetworks,”WirelessTelecommunicationsSymposium,CA,2008,pp.250-259.(EI) 122 Fang-YieLeu,“AnalyzingSurveyDataConcerningtheConstructionofCentralTaiwanScienceParkusingAssociationRulesandGeographicalInformationSystems,”InternationalConferenceonTerritorialIntelligence,Huelva,Spain,Oct.2007. 123 Fang-YieLeuandChih-ChiehKo,“AnAutomatedTermDefinitionExtractionusingtheWebCorpusinChineseLanguage,”theIEEEInternationalConferenceonNaturalLanguageProcessingandKnowledgeEngineering,BeijingChina,August/September2007,pp.435-440.(EI). 124 Fang-YieLeuandKai-WeiHu,“AReal-TimeIntrusionDetectionSystemusingDataMiningandForensicTechniques,”theInternationalWorkshoponSecurity,October2007,pp.137-152. 125 Fang-YieLeuandKai-WeiHu,“AReal-TimeIntrusionDetectionandIdentificationSystemonCommand-Line-InterfaceComputersusingDataMiningandForensicTechniquesinanIntranet,”theInternationalConferenceonComputing,CommunicationsandControlTechnologies,FloridaUSA,July2007,pp.148-153. 126 Fang-YieLeu,andKuo-WeiLee,“ATransmissionCostModelofDataRetrievalfromaClusterSystemonanOne-NodeOne-Fragment,One-NodeOne-TaskandRandomAllocationEnvironmentusingnoGlobalDirectory,”theWorldMulti-ConferenceonSystemics,CyberneticsandInformatics,FloridaUSA,July2007,pp.112-116. 127 Fang-YieLeu,Yu-HsinChen,Ching-ChienKuan,“AnEfficientBandwidth-usingSchemeoverWLANwithIEEE802.11eStandard,”theIEEEInternationalWorkshoponBroadbandConvergenceNetworks,MunichGermany,May2007.(EI) 128 Fang-YieLeuandTai-ShiangWang,“DataAnalysisUsingGISandDataMining,”InternationalConferenceonTerritorialIntelligence,AlbaIulia,Romania,Oct.2006. 129 Fang-YieLeu,Ming-ChangLi,andJia-ChunLin,“IntrusionDetectionbasedonGrid,”InternationalMulti-ConferenceonComputingintheGlobalInformationTechnology,Romania,Aug.2006,pp.62-67. 130 Fang-YieLeuandTai-ShiangWang,“IntegratingMobileAgentswithaWirelessGridPlatform,”theIEEE-ACISInternationalConferenceonSoftwareEngineering,ArtificialIntelligence,Networking,andParallel/DistributedComputing,June2006,pp.139-144. 131 Fang-YieLeu,Ming-ChangLi,Jia-ChunLin,“AnIntrusionDetectionSystemonDynamicDetectionEnvironment,”InternationalConferenceonComputationalScienceandItsApplications,May2006. 132 L.W.Liu,R.M.Tsay,J.ShiangandFang-YieLeu,“PromotingTechnicalInnovation:TheApplicationofGISforIn-HomeServices,”theFourthNationalGerontologicalSocialWorkConference,Chicago,Illinois,February16–19,2006. 133 Fang-YieLeuandWei-JieYang,“CUSUMIntrusionDetection&TracebackSystem,”TheInternationalForensicScienceSymposium,Taipei,Taiwan,Nov.2005. 134 Fang-YieLeuandKai-WaiHu,“AReal-TimeIntrusionDetectionandIdentificationSystemwithDataMiningandForensicTechniques,”TheInternationalForensicScienceSymposium,Taipei,Taiwan,Nov.2005. 135 Fang-YieLeu,Neng-WenLo,Lun-NiYang,“PredictingVertebratePromoterswithHomogeneousClusterComputing,”TheInternationalConferenceonSignal-ImageTechnology&Internet–BasedSystems,Yaound?Cameroon,Nov.2005,pp.143-148. 136 Fang-YieLeu,Ching-ChienKuan,Der-JiunnDengandYu-Hsin,Chen,“GuaranteedNonDroppingMechanismDeployingIEEE802.11eStandard,”TheInternationalConferenceonSignal-ImageTechnology&Internet–BasedSystems,Yaound?Cameroon,Nov.2005,pp.170-175. 137 Fang-YieLeu,Jia-ChunLin,Ming-ChangLi,Chao-TungYang,“APerformance-BasedGridIntrusionDetectionSystem,”Proceedingsofthe29thInternationalComputerSoftwareandApplicationsConference(COMPSAC2005),Edinburgh,Scotland,July26-28,2005.(EI) 138 Hsiao-HongTsai,Fang-YieLeuandWen-KuiChang,”DistributedSendBoxSchemeforMobileAgentCommunication,”2005IEEEthe4thInternationalConferenceonMobileBusiness(ICMB2005),Sydney,Australia,July2005.(EI),pp.545-550. 139 Fang-YieLeu,Ching-ChienKuan,Dr-JiunnDengandWen-KuiChang,“QualityofServiceforVoiceoverWirelessLANbyDeployingMultipollinginIEEE802.11eStandard,”2005IEEEInternationalSymposiumonMultimediaOverWireless.(EI) 140 Fang-YieLeuandWei-JieYang,“IFTS:IntrusionForecastandTracebackbasedonUnionDefenseEnvironment,”the11thInternationalConferenceonParallelandDistributedSystems(ICPADS2005),July20-22,2005,pp.716-722.(EI) 141 Hsiao-HongTsai,Fang-YieLeuandWen-KuiChang,“MobileAgentCommunicationUsingSIP,”IEEE2005InternationalSymposiumonApplicationsandtheInternet(SAINT2005),Trento,Italy,January2005,pp.274-279.(EI) 142 Fang-YieLeu,Jia-ChunLin,Ming-ChangLi,Chao-TungYang,Bo-QiShi,“IntegratingGridwithIntrusionDetection,”theIEEE19thInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA2005),TaipeiTaiwan,March2005,pp.304-309.(EI) 143 Leu,Fang-YieandYao-ChungFan,“CompressinganInvertedFilewithLCS,”IEEECOMPSAC2004,Sept.,2004,HongKong,pp.60-61.(EI) 144 呂芳懌,楊惟傑,林佳純,李明昌,“網路安全分析與趨勢”2004年資訊科技與人文管理教育論壇-數位內容數位教育與管理政策研討會,2004年7月,pp.277-293. 145 Leu,Fang-YieandYao-ChungFan,“DealingwiththeStructureofRealWorldGraphs,”The2ndInternationalConferenceonComputerScienceanditsApplications(ICCSA-2004),June2004,California,USA,2004,pp.40-49. 146 F.Y.LeuandK.W.Lee,“TransmissionCostModelsofData-RetrievalbasedonSpecificDataAllocationswithoutDirectoryonClusterSystems,”IntheProceedingsofthe8thWorldMulticonferenceonSystemics,CyberneticsandInformatics(SCI2004),Orlando,USA,2004,pp.167-172. 147 Leu,Fang-YieandYao-ChungFan,“CompressingaDirectedMassiveGraphusingSmallWorldModel,”IEEEDataCompressionConference,March2004.Poster. 148 呂芳懌,楊惟傑,鄭真真,洪嘉鴻,”UDIFT:具預警功能與入侵追蹤之區域聯防系統,”2003年「網際空間:科技、犯罪與法律社會」學術研究暨實務研討會,12月,2003年,pp.140-148。

149 呂芳懌,鄭真真,洪嘉鴻,管清健,林佳純,李明昌,”以分散式平行入侵偵測系統從事區域聯防,2003年「網際空間:科技、犯罪與法律社會」學術研究暨實務研討會,12月,2003年,pp.129-139。

150 F.Y.LeuandT.Y.Yang,”AHost-BasedReal-TimeIntrusionDetectionSystemwithDataMiningandForensicTechniques,”IEEE2003InternationalCarnahanConferenceonSecurityTechnology,Taiwan,ROC,Oct.14-16,2003,pp.580-586. 151 呂芳懌,洪嘉鴻,鄭真真,”UDAIDTS:以Hash為基礎的主動式區域聯防入侵偵測與追蹤系統,”第十四屆國際資訊管理學術研討會,2003年7月12日,pp.1090-1097. 152 呂芳懌,顏義樺,”以聯想法則概念網路為基礎之文章概念探索及相似比對,”第十四屆國際資訊管理學術研討會,2003年7月12日,pp.330-336. 153 呂芳懌,顏義樺,”以事件聯想為基礎之文章相似性比對,”2003年資訊技術應用與發展研討會,2003年6月28日,pp.61-67. 154 呂芳懌,施政瑋,”以詞義概念為基礎的文件檢索與比對,”2003年資訊技術應用與發展研討會,2003年6月28日,pp.667-673. 155 呂芳懌,蘇俊維,許惟翔,”內部網路安全威脅分析與防制,”2003年電子商務與數位生活研討會,2003年4月11-12日,pp.166-166(摘要,本文在光碟片中未編頁碼)。

156 呂芳懌,黃品璁,楊子逸,胡凱威,“低負載隱形式網路異常偵測器,”2003年電子商務與數位生活研討會,2003年4月11-12日,pp.165-165(摘要,本文在光碟片中未編頁碼)。

157 呂芳懌,楊子逸,“IIS伺服器漏洞剖析與防備,”第四屆2002年網際空間:資訊、法律與社會,2002年11月29日。

158 呂芳懌,黃文鴻,“能提供及追蹤行車最短路徑之分散式系統,”2002中華地理資訊學會暨學術研討會,2002年9月 159 呂芳懌,蘇俊維,”網路入侵與防禦策略探討,”第三屆網際網路應用與發展研討會,2002年5月 160 呂芳懌,顏義樺,施政瑋,”以網頁特性為基礎之重要性排名,’2002年第六屆資訊管理學術及警政資訊實務研討會,2002年5月,pp.489-495. 161 呂芳懌,歐建暉,邱維埠,”大學校園寬頻網路運用研究—東海數位村—寬頻網路監測,”,2002年電子商務與數位生活研討會,2002年3月,pp.489-495。

162 呂芳懌,顏義樺,施政瑋,”探查疑似不法資訊網站之分散式網路巡邏系統,’2001年網際空間:資訊、法律與社會,2001年12月24日。

163 呂芳懌,楊子逸,“IIS網頁伺服器Unicode漏洞探討,”第五屆資訊管理學術及警政資訊實務研討會,2001年6月。

164 呂芳懌,林晁立,“以臉部器官形狀、寬度、相對位置從事人臉影像辨識,”第十一屆物件導向技術及應用研討會,2000年九月。

165 呂芳懌,林厚誼,“物件導向竊盜犯罪案件相似性比對,”第十一屆物件導向技術及應用研討會,2000年九月。

166 呂芳懌,黃文鴻,“協助查詢有地緣關係之前科犯資訊的地理資訊系統,”第四屆資訊管理學術及警政資訊實務研討會,2000年5月,pp.115-123。

167 呂芳懌,黃文鴻,“協助查詢有地緣關係之前科犯資訊的地理資訊系統,”大業學報,第九卷,第一期,八十九年。

168 呂芳懌等,“影像資料庫在人臉辨識上的應用—前科犯資料庫,”東海科學第一捲,東海大學,中華民國八十八年七月。

169 呂芳懌,林厚誼,“協助犯罪偵察之前科犯資料庫績效品質改善,”第三十五屆品質管制研討會,中華民國八十八年十一月. 170 呂芳懌,余少棠,許閔雄,林晁立,蔡清欉“影像資料庫在人臉辨識上的應用—前科犯資料庫,”,第十屆國際資訊管理學術研討會,1999年6月,台灣台北pp.863-870 171 呂芳懌,林厚誼,黃文鴻,邱聖斌,朱峻德,龔俊杰“文字資料庫在犯罪偵察之應用—竊盜犯罪手法之比對,”,第十屆國際資訊管理學術研討會,1999年6月,台灣台北pp.935-943 172 Fang-YieLeu(呂芳懌),Shiang-WeiChao,Dec.1997,“ADistributedDatabaseArchitectureanditsQuery,”ProceedingsofNationalComputerSymposium1997,Taiwan,pp.A38-A42. 173 F.Y.LeuandS.W.Zhao,“TheQueryandIntegrationAlgorithmsinaDistributedDatabase,“Proceedingofthe14thWorkshoponCombinatorialMathematicsandComputationTheory,Taichung,Taiwan,June1997,pp.114-117. 174 呂芳懌資料庫之管理人力與發展雜誌第二十七~二十九期中華民國八十五年四~六月 175 呂芳懌資料庫之應用人力與發展雜誌第二十六期中華民國八十五年三月 176 呂芳懌資料庫相關人員人力與發展雜誌第二十五期中華民國八十五年二月 177 呂芳懌資料庫管理人員之角色人力與發展雜誌第二十四期中華民國八十五年一月 178 呂芳懌 資料庫之功能 人力與發展雜誌 第二十三期 中華民國八十四年十二月 179 呂芳懌 資料庫之演進 人力與發展雜誌 第二十二期 中華民國八十四年十一月 180 呂芳懌 資料表示法 人力與發展雜誌 第二十一期 中華民國八十四年十月 181 呂芳懌 資料庫與生活 人力與發展雜誌 第二十期 中華民國八十四年九月 182 F.Y.LeuandC.C.Yang,"RuleBaseInspectionUsingAlgorithmicApproachforData-AccessOrientedKnowledge-BasedSystems,"IEEECOMPSAC,Chicago,1990,pp.155-160. 183 F.Y.LeuandS.K.Chang,"AnInternalProtocolAssistantforDistributedSystems,"Proc.ofSPIEConference,Orlando,FL,1991. 184 楊鍵樵,呂芳懌,"智慧型網管系統資料庫之研究與雛型系統之開發之研究",資策會委託研究計畫,中華民國八十四年六月 185 楊鍵樵,呂芳懌,連志誠等"支援智慧型網路管理系統之物件導向資料庫雛形系統"INTC'95,台北,中華民國八十四年十月 186 F.Y.Leu,"AnInternalInspectionofaDistributedOfficeInformationSystem"Ph.DDissertationofNationalTaiwanInstituteofTechnology,Taipei,Taiwan,ROC,July1991. 專書著作 順序 名稱 1 HeruSusanto,Fang-YieLeu,Chin-KangChen,FadzlinatiMohiddin,ManagingHumanCapitalinTodaysGlobalization:AManagementInformationSystemPerspective,2019-10,AppleAcademicPress,Tailor&FrancisGroup. 2 HeruSusanto,LeuFang-Yie,ChinKangChen,BusinessProcessReengineering--AnICTApproach,2019-04,AppleAcademicPress. 3 HeruSusanto,LeuFang-YieandChinKangChen,TheEmergingTechnologyofBigData--ItsImpactasaToolofICTDevelopment,2018-04,AppleAcademicPress. 4 FatosXhafa,Fang-YieLeu,Li-LingHung(編輯者),SmartSensorsNetworks--CommunicationTechnologiesandIntelligentApplications,2017-05,AcademicPress(Elsevier). 5 張文貴呂芳懌,軟體開發技術文件—指引手冊,2002年,經濟部工業局。

6 張文貴呂芳懌,軟體規劃與維護技術文件—指引手冊,2002年,經濟部工業局。

7 呂芳懌等,計算機概論與基礎資訊教育,2001年,全華科技圖書公司。

8 呂芳懌,MS-DOS使用手冊,1986年,全華科技圖書公司。

9 呂芳懌,MD-150自動控制使用手冊,1984年,全華科技圖書公司。

專利/技術報告 順序 名稱 1 發明人與專利權人:黃宜豊呂芳懌林正基,“具有三維運算、反饋控制與動態置換盒設計的加密方法”發明第I459784號 2 發明人與專利權人:黃宜豊呂芳懌,“在無線/有線環境下安全金鑰交換的方法”發明第I434577號 3 發明人與專利權人:黃宜豊呂芳懌,“具有動態金要雙向認證之無線通訊方法”發明第I425845號 4 發明人與專利權人:呂芳懌黃耀田,“部署基地台之方法”發明第I415485號 研究計畫 順序 計畫名稱 計畫所屬機構 計畫編號 計畫日期 1 緊密耦合卸載與大象流/老鼠流卸載之連線安全與QoS之研製 科技部計畫 MOST108-2221-E-029-009- 108/08/01 2 行動寬頻課程推廣計畫--智慧基站與行動計算 教育部計畫 107/12/01 3 5G網路VPN、NAT、防火牆/IDS/IPS之服務方式及傳遞頻寬改善之研究 科技部計畫 107-2221-E-029-010- 107/08/01 4 在SCTP通訊協定下以ANDSF與MIH/CRRM協定協助網路卸載與跨網路換手之研究 科技部計畫 106-2221-E-029-004- 106/08/01 5 行動寬頻尖端技術課程推廣計畫--物聯網感測網路技術 教育部計畫 105/12/01 6 植基於靜態協同雲端資料中心之影視傳輸回覆時間與能量耗費之研究 科技部計畫 MOST105-2221-E-029-017- 105/08/01 7 第9屆國際展能節職業技能競賽(電腦程式設計職類)國手培訓 其他政府部會計畫 104/09/16 8 單一整合型計畫-以問題導向學習模式發展K-16節能減碳教育成效評估及教具研發(3/3) 科技部 102-3113-S-029-001- 2013/4/1 9 建構一個植基於多使用者星狀拓樸資料網格的群播協同檔案傳送機制 科技部 101-2221-E-029-003-MY3 2012/8/1 10 單一整合型計畫-以問題導向學習模式發展K-16節能減碳教育成效評估及教具研發(2/3) 科技部 101-3113-S-029-001- 2012/4/1 11 在多使用者資料網格環境下建構一個低回覆時間和高度可靠性之動態資料複製演算法協同傳送機制 科技部 100-2221-E-029-018- 2011/8/1 12 單一整合型計畫-以問題導向學習模式發展K-16節能減碳教育成效評估及教具研發(1/3) 科技部 100-3113-S-029-001- 2011/4/1 13 考量信號干擾及STDMA之無線網路鏈狀拓撲的單向資料傳遞最大throughput之研究 科技部 2010/8/1 14 以資料探勘與Forensic技術研製ㄧ個身份辨認與即時偵測入侵行為之系統 科技部 97229 2008/8/1 15 資訊化社會的治理與永續發展:歐盟FP6CAENTI取向--歐洲領土智慧網絡協調計畫(FP6CAENTI)的應用:歐盟與台灣的比較 科技部 2007/8/1 16 資訊化社會的治理與永續發展:歐盟FP6CAENTI的取向--數位化治理與傳統治理的競合:FP6架構下歐盟與台灣的比較 科技部 2007/8/1 17 資訊化社會的治理與永續發展:歐盟FP6CAENTI的取向--領土智慧資訊整合與分析平台之研製:歐盟FP6CAENTI的取向 科技部 97528 2007/8/1 18 社區防救災的社會支持體系建構與災害風險管理--子計畫:社區災害空間分析與監視系統之建構(I) 科技部 96372 2007/8/1 19 全球化、都市發展與社區生活:領土智慧的分析取向(2/2) 科技部 2006/8/1 20 整合無線網路、行動代理人與網格之無線校園網格系統之研製(I) 科技部 95748 2006/8/1 21 整合式定位與偵測系統之研製 科技部 95247 2005/8/1 22 全球化、都市發展與社區生活:領土智慧的分析取向(1/2) 科技部 2005/8/1 23 結合第三代行動通訊與無線網路之開放式多媒體服務平台 科技部 2005/8/1 24 整合格網與入侵偵測 科技部 95245 2005/8/1 25 安全的身份鑑別式加密法 科技部 2005/8/1 國內外演講記錄 順序 作品名稱/活動名稱/主題 邀請單位 地點 日期 1 5G Networkand ITs securityProblems MobileNetworkSecurity(MobiSec)2017大會  韓國濟州島 2017/10/20 2 RandomCladdingwithFeedbackEncryptionforMobileTransmissionandCloudSystems 中國大陸東北大學  瀋陽 2016/09/13 3 HowDataReplicationandFetch-timePoliciesImpactMapReduceJobCompletionReliabilityandEnergyConsumption 福岡工業大學  福岡,日本 2016/07/06 4 S-PMIPv6:anIntra-LMAmodelforIPv6Mobility DepartmentofComputerEngineering,ChoSunUniversity,Korea  DepartmentofComputerEngineering,ChoSunUniversity 2015/03/26 參與學術活動 順序 作品名稱/活動名稱/主題 頒獎單位 日期 1 The33rdInternationalConferenceonAdvancedInformationNetworkingandApplications 出席國際學術會議 2019/03/27 2 The3rdInternationalSymposiumonMobileInternetSecurity 出席國際學術會議 2018/08/29 3 The12thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing(IMIS-2018) 出席國際學術會議 2018/07/04 4 "The32ndIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(IEEEAINA-2018)" 出席國際學術會議 2018/05/16 5 The12thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications 出席國際學術會議 2017/11/10 6 The11thInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing(IMIS-2017) 出席國際學術會議 2017/07/10 7 IEEEInternationalConferenceonComputerCommunications(INFOCOM2017) 出席國際學術會議 2017/05/01 8 The5thIEEECCNCInternationalWorkshoponSecurityandCognitiveInformaticsforHomelandDefense 出席國際學術會議 2017/01/08 9 the11thInternationalConferenceonBroad-BandWirelessComputing,CommunicationandApplications 出席國際學術會議 2016/11/05 10 2016IEEEConferenceonComputerCommunicationsWorkshops(INFOCOMWKSHPS) 出席國際學術會議 2016/04/10 11 第九屆國際展能節(the9thInternationalAbilympics) 擔任國際學術組織要員 2016/03/25 12 InternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications(BWCCA2015) 出席國際學術會議 2015/11/04 13 TheACMConferenceonComputerandCommunicationsSecurity(CCS2015)/ManagingInsiderSecurityThreats(MIST2015) 出席國際學術會議 2015/10/12 14 InternationalConferenceonNetwork-BasedInformationSystems,,2-4September2015 出席國際學術會議 2015/09/02 15 theInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing(IMIs/MCNCS2015) 出席國際學術會議 2015/07/08 16 The39thAnnualInternationalComputers,Software&ApplicationsConference(COMPSAC2015) 出席國際學術會議 2015/07/01 17 6thIEEEINFOCOMInternationalWorkshoponMobilityManagementintheNetworksoftheFutureWorld(INFOCOM/MobiWorld2015) 出席國際學術會議 2015/04/26 18 The29thIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA-2015) 出席國際學術會議 2015/03/25 19 The6thInternationalWorkshoponManagingInsiderSecurityThreats(MIST2014) 出席國際學術會議 2014/11/21 20 The6thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems(InCOS/NBIS2014) 出席國際學術會議 2014/09/10 21 The9thInternationalConferenceonAvailability,ReliabilityandSecurity(ARES2014) 出席國際學術會議 2014/09/08 回列表 2015©AllRightsReserved. PrivacyPolicy|TermsofService



請為這篇文章評分?