教師個人簡歷
現職
國立中央大學
資訊電機學院資訊工程學系
教授
國立中央大學
軟體研究中心
中心主任
專長
分散式計算
雲端計算
邊緣計算
容錯系統
科學計算
專長簡述
分散式程式語言、網格計算、同儕計算、分散式計算理論
最高學歷
美國Rensselaer Polytechnic Institute
電腦資訊系
博士
科技部學門領域
政府GRB研究專長領域
教育部學門領域
其他補助
-
110年跨域資安實務示範課程發展計畫-雲端服務資訊安全
1100901~1120531
[雲端服務安全 , Cloud Service Security]
國科會計畫統計
-
基於穩健雲端系統之行動應用安全性提升研究-子計畫三:以快速虛擬裝置同步機制與自適應硬體壓縮技術建立低延遲虛擬機容錯系統
1140801~1150731
-
基於穩健雲端系統之行動應用安全性提升研究-子計畫三:以快速虛擬裝置同步機制與自適應硬體壓縮技術建立低延遲虛擬機容錯系統
1130801~1140731
-
基於弱特徵以抵禦智慧型手機行為身分驗證上對抗性攻擊之技術研發-虛擬機器容錯系統之時間漂移校正與縮減之機制
1120801~1130731
[系統穩健性,可靠度,虛擬機器,容錯,QEMU-KVM,時間飄移,高可用性 , System Robustness,Reliability,Fault Tolerance,Virtual Machine,QEMU-KVM,Clock Drifting,High Availability] -
基於雲端容錯系統之智慧行動應用惡意行為檢測與身分驗證技術提升研究-支援容錯機制之雲端平台服務
1110801~1120731
[可靠性系統,容錯機制,災害回復,QEMU-KVM,Libivrt,虛擬機器,虛擬機開機時間預測 , Dependable System,Fault Tolerance,Disaster Recovery,QEMU-KVM,Libvirt,Virtual Machine,VM boot time prediction] -
高安全等級智慧型行動應用惡意行為分析架構之技術研發-子計畫三:支援保護機制客製化與自動復原之雲端平台服務
1100801~1110731
[雲端計算平台,智慧型平台管理介面,高可靠度,容錯轉移,虛擬機器,異質性,多層級系統,故障根本原因偵測,階層分群 , Cloud Platform,Intelligent Platform Management Interface,High Availability,Failover,Virtual Machine,Heterogeneity,Multi-Layered System,Failure Root Cause Detection,Layers Grouping] -
高安全等級智慧型行動應用惡意行為分析架構之技術研發-子計畫三:支援保護機制客製化與自動復原之雲端平台服務
1090801~1100731
[雲端計算平台,智慧型平台管理介面,高可靠度,容錯轉移,虛擬機器,異質性,多層級系統,故障根本原因偵測,階層分群 , Cloud Platform,Intelligent Platform Management Interface,High Availability,Failover,Virtual Machine,Heterogeneity,Multi-Layered System,Failure Root Cause Detection,Layers Grouping] -
高安全等級智慧型行動應用惡意行為分析架構之技術研發-子計畫三:支援保護機制客製化與自動復原之雲端平台服務
1080801~1090731
[雲端計算平台,智慧型平台管理介面,高可靠度,容錯轉移,虛擬機器,異質性,多層級系統,故障根本原因偵測,階層分群 , Cloud Platform,Intelligent Platform Management Interface,High Availability,Failover,Virtual Machine,Heterogeneity,Multi-Layered System,Failure Root Cause Detection,Layers Grouping] -
行動應用之惡意行為分析技術研發及平台建置研究-子計畫三:支援異質性智慧計算雲端平台之服務保護機制與自動復原
1070801~1080731
[雲端計算平台,智慧型平台管理介面,高可靠度,容錯轉移,虛擬機器,異質性,多層級系統,錯誤根本原因偵測 , Cloud Platform, Intelligent Platform Management Interface, High Availability, Failover, Virtual Machine, Heterogeneity, Multi-Layered System, Failure Root Cause Detection] -
支援行動應用APP之惡意風險分析及使用者認證技術研發-子計畫三:運用智慧型平台管理介面提升雲端服務高可靠度之研究(1/2)
1060801~1070731
-
支援行動應用APP之惡意風險分析及使用者認證技術研發-子計畫三:運用智慧型平台管理介面提升雲端服務高可靠度之研究(1/2)
1050801~1060731
-
支援在企業雲環境BYOD應用之資訊安全技術研發-基於OpenStack之實體機與虛擬機整合偵錯的高可靠度軟體服務技術
1040801~1050731
[Enterprise Cloud, Failure Detection, Failure Recovery, High Availability, Cloud Computing ]
產學合作計畫統計
-
航遙測影像資訊AI分析研究計畫
1130101~1131231
[深度學習,航攝影像分析,水稻辨識,類別差異,異常檢測 , Deep Learning,Aerial Image Analysis,Rice Classification,Class Variance,Anomaly Detection] -
產業AI落地實證與擴散
1120301~1120930
[無 , 無] -
瑕疵影像生成之GAN模型可解釋性委託研究
1100610~1100930
[影像標記工具,影像生成技術 , GAN Dissection] -
雲霧協作服務網格整合技術
1100501~1101210
[雲端運算,邊緣運算,動態工作排班,微服務,服務網格 , Cloud Computing,Edge Computing,Dynamic System Reconfiguration,Microservice,Service Mesh] -
雲端微服務熔斷機制與服務發現技術開發
1090501~1091130
[雲端運算,霧運算,服務熔斷機制,動態工作轉移,串流資料處理 , Cloud Computing,Fog Computing,Circuit Breaker,Dynamic Task Migration,Streaming Data Processing] -
於雲霧架構下發展大規模邊緣端建構任務成本計算技術
1080701~1081210
-
海上無人載具傳輸頻寬自動調整軟體系統開發
1080131~1080316
-
串流樞紐服務優化技術
1060601~1061215
-
虛擬機器之高可靠性架構研究
1040301~1041130
期刊著作
-
Real-Time Defect Detection for Fast-Moving Fabrics on Circular Knitting Machine Under Various Illumination Conditions
IEEE Access, 13, 139890-139903, 2025-01-01
[ circular knitting,Fabric defect detection,few-shot learning,local binary convolution,real-time detection,various illumination conditions ] -
Analysis and prediction of virtual machine boot time on virtualized computing environments
Journal of Cloud Computing, 13, 1, 2024-12-01
[ Boot time prediction,Cloud computing,Virtual machine,Virtual machine placement ] -
Detecting Low-Yield Machines in Batch Production Systems Based on Observed Defective Pieces
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 54, 7, 3972-3983, 2024-07-01
[ Batch production,expectation-maximization (EM) algorithm,machine maintenance suggestion,per-machine yield estimation ] -
Multistage Parameter Optimization for Rule Generation for Multistage Manufacturing Processes
IEEE Transactions on Industrial Informatics, 20, 3, 3857-3867, 2024-03-01
[ Fabric manufacturing,industrial data mining,multiple type defects,multistage manufacturing processes,parameter optimization in value range ] -
Evaluation of a decided sample size in machine learning applications
BMC Bioinformatics, 24, 1, 2023-12-01
[ Criteria,Effect sizes,Machine learning,Sample size ] -
Optimization of message delivery reliability and throughput in a DDS-based system with per-publisher sending rate adjustment
Telecommunication Systems, 84, 2, 235-250, 2023-10-01
[ Data distribution service (DDS),QoS,Reliability,Throughput,Topic-based publish-subscribe ] -
FN-Net: A lightweight CNN-based architecture for fabric defect detection with adaptive threshold-based class determination
Displays, 73, 2022-07-01 -
Prediction of per-batch yield rates in production based on maximum likelihood estimation of per-machine yield rates
Journal of Manufacturing Systems, 62, 249-262, 2022-01-01 -
Low-frequency oscillations in cortical level to help diagnose task-specific dystonia
Neurobiology of Disease, 157, 2021-09-01
[ EEG,Effective connectivity,Low frequency (LF),Machine learning,Task-specific dystonia (TSD),Wrist extension ] -
High-availability computing platform with sensor fault resilience
Sensors, 21, 2, 1-16, 2021-01-02
[ Failover,Fault detection and recovery,High availability,Liveness detection,Sensor fault ] -
Optimal Online Liveness Fault Detection for Multilayer Cloud Computing Systems
IEEE Transactions on Dependable and Secure Computing, 2021-01-01
[ Cloud computing,Detectors,Fault detection,Fault detection time,Fault diagnosis,Heart beat,linear layer dependence,multilayer cloud system,Nonhomogeneous media,online fault detection,Transient analysis,transient fault ] -
Distinguishing the visual working memory training and practice effects by the effective connectivity during n-back tasks: A DCM of ERP study
Frontiers in Behavioral Neuroscience, 13, 2019-04-30 -
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements
Journal of Supercomputing, 74, 9, 4295-4314, 2018-09-01
[ Data hiding , Internet of things , Least significant bit , Steganalysis , Vector quantization ] -
Raw reversibility of information hiding on the basis of VQ systems
Journal of Supercomputing, 74, 8, 3748-3777, 2018-08-01
[ High visual quality , Raw reversibility , Steganography , Vector quantization ] -
Mutual authentications to parties with QR-code applications in mobile systems
International Journal of Information Security, 16, 5, 525-540, 2017-10-01
[ Authentication , Gong–Needham–Yahalom logic , Mobile system , Mutual authentication , Quick response code ] -
EEG-based motor network biomarkers for identifying target patients with stroke for upper limb rehabilitation and its construct validity
PLoS ONE, 12, 6, 2017-06-01 -
Efficient resource provisioning for virtual clusters on the cloud
International Journal of Services, Technology and Management, 23, 1-2, 52-63, 2017-01-01
[ Cloud computing,Resource provisioning,Virtual cluster,VM placement ] -
A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences
Multimedia Tools and Applications, 75, 22, 14895-14916, 2016-11-01
[ Information hiding , Side-match vector quantization (SMVQ) , Steganography ] -
VQ-Encoded images in reversible data hiding of high Bit-Compression-Ratio
Imaging Science Journal, 63, 1, 24-33, 2015-01-01
[ Compression , Imageprocessing , Vectorquantisation ] -
Shortest-linkage-based parallel hierarchical clustering on main-belt moving objects of the solar system
Future Generation Computer Systems, 34, 26-46, 2014-05-01
[ Hierarchical clustering , Incremental update , Parallel computing ] -
A novel approach for discovering condition-specific correlations of gene expressions within biological pathways by using cloud computing technology
BioMed Research International, 2014, 2014-02-17 -
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems
Peer-to-Peer Networking and Applications, 7, 4, 676-686, 2014-01-01
[ Copyright protection , Information hiding , Vector quantization , Watermarking ] -
Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping
Information Sciences, 246, 69-82, 2013-10-10
[ Data compression , Image coding , Information hiding , Information security , Vector quantization ] -
A new adaptive steganographic method based on gradient adjacent prediction and side-match vector quantization
Journal of Information Hiding and Multimedia Signal Processing, 4, 4, 215-224, 2013-08-06
[ Gradient adjacent prediction (GAP) , SMVQ , Steganography , VQ ] -
Image Steganography Using Gradient Adjacent Prediction in Side-Match Vector Quantization
Smart Innovation, Systems and Technologies, 21, 121-129, 2013-06-28
[ Gradient Adjacent Prediction (GAP) , SMVQ , Steganography , VQ ] -
Accelerating Computation of DCM for ERP in MATLAB by External Function Calls to the GPU
PLoS ONE, 8, 6, 2013-06-26 -
SAMEVED: A system architecture for managing and establishing virtual elastic datacenters
International Journal of Grid and High Performance Computing, 5, 2, 27-42, 2013-04-01
[ Elastic Computing , System Architecture , System Architecture for Managing and Establishing Virtual Elastic Datacenters (SAMEVED) , Virtual Datacenter , Virtualization ] -
Adaptive scheduling for parallel tasks with QoS satisfaction for hybrid cloud environments
Journal of Supercomputing, 66, 2, 783-811, 2013-02-11
[ Adaptive scheduling , Cloud computing , Heuristic approach , Hybrid cloud , Quality of service ] -
Conservative snapshot-based actor garbage collection for distributed mobile actor systems
Telecommunication Systems, 52, 2, 647-660, 2013-02-01
[ Actor , Actor garbage collection , Conservative snapshot , Mobile agent ] -
A scheme of reversible information hiding based on SMVQ
Imaging Science Journal, 61, 2, 195-203, 2013-02-01
[ Capacity , Reversible data hiding , Side-match vector quantisation ] -
A near field communication-driven home automation framework
Personal and Ubiquitous Computing, 17, 1, 169-185, 2013-01-01
[ Digital home , Home automation , Near field communication , Personalization , RFID , Smart space ] -
Collecting mobile-agent garbage using actor-based weighted reference counting
Advanced Science Letters, 9, 157-161, 2012-07-02
[ Actor garbage collection , Actor model , Actor-oriented model ] -
A self-adaptive computing framework for parallel maximum likelihood evaluation
Journal of Supercomputing, 61, 1, 67-83, 2012-07-01
[ Grid computing , High performance computing , Load balancing , MLE , Self-adaptive computing ] -
A dynamic causal model for evoked and induced responses
, 59, 1, 340-348, 2012-01-02 -
VQ applications in steganographic data hiding upon multimedia images
IEEE Systems Journal, 5, 4, 528-537, 2011-12-01
[ Date hiding , image processing , steganography , vector quantization (VQ) ] -
BrowserGuard: A behavior-based solution to drive-by-download attacks
IEEE Journal on Selected Areas in Communications, 29, 7, 1461-1468, 2011-08-01
[ drive-by-download attack , heap spray , intrusion detection , malware , system security , Web browser ] -
Reversible steganography based on side match and hit pattern for VQ-compressed images
Information Sciences, 181, 11, 2218-2230, 2011-06-01
[ Data hiding , Reversible data hiding , Side match vector quantization , Steganography , Vector quantization ] -
A novel data hiding and reversible scheme using SMN blocks in VQ-compressed images
Opto-electronics Review, 19, 2, 225-233, 2011-01-01
[ date hiding , neighbouring block , reversible data hiding , vector quantization ]
研討會著作
-
WebShell Detection Based on CodeBERT and Deep Learning Model
484-489, 2024-05-24
[ Bidirectional GRU,BPE,CodeBERT,GRU,WebShell ] -
Using Block Filter Device for Acceleration of Storage Synchronization on Fault-tolerant Virtual Machines
217-219, 2023-01-01
[ Block Filter,Fault Tolerance,Live Storage Migration,Virtual Machine ] -
Multiclass Classification of EEG Motor Imagery Signals Based on Transfer Learning
140-143, 2022-01-01
[ Deep Learning,EEG,multi-category classification,Transfer Learning ] -
Rice Semantic Segmentation Using Unet-VGG16: A Case Study in Yunlin, Taiwan
2021-01-01
[ Deep Learning,Rice,Semantic Segmentation,Taiwan,Unet-VGG16 ] -
Resolving automatic high availability operations and users commands to virtual machines on OpenStack
159-164, 2020-12-01
[ high availability,protection,virtual machine operation ] -
Partitioning and placing virtual machine clusters on cloud environment
268-270, 2018-12-06
[ Cloud computing , Cloud scheduling , Virtual machine cluster , Virtual machine placement ] -
IIoT Testbed: A DDS-Based Emulation Tool for Industrial IoT Applications
2018-11-01
[ Data Distribution Service , Emulation , Industrial Internet-of-Things , Publish-Subscribe Model , QoS ] -
A guideline to determine the training sample size when applying big data mining methods in clinical decision making
678-681, 2018-06-22
[ Artificial intelligence , Big data mining , Guideline , Heterogeneous data , Sample size ] -
Dynamic throttling for IoT streaming hub services on multi-tenant cloud environment
544-547, 2018-06-22
[ IoT Streaming , Message Broker , Network Traffic Control , Throttling ] -
A Fault Tolerance Mechanism for Semiconductor Equipment Monitoring
171-176, 2018-03-13
[ Checkpointing , Fault Tolerance , Monitoring , Semiconductor Manufacturing , SESC/GEM ] -
Supporting software-defined HA clusters on openstack platform
268-271, 2017-07-21
[ Cloud computing , High availability , Openstack , Software-defined cluster ] -
The changes of improvement-related motor kinetics after virtual reality based rehabilitation
683-685, 2017-07-21
[ Individualized treatment , Kinematic Features , Virtual reality (VR) based rehabilitation ] -
NCU-HA: A Lightweight HA System for Kernel-Based Virtual Machine
2017-03-20
[ Cluster , Fault Tolerance , High Availability , KVM , Virtualization Technology ] -
KORAT - A platform independent test automation tool by emulating keyboard/mouse hardware signals
2016-10-12
-
Virtual machines of high availability using hardware-assisted failure detection
2016-01-21
[ ATCA , Failover , Fault tolerance , High availability , Virtual machine ] -
A dynamic network bandwidth allocation mechanism under network QoS constraints
963-968, 2015-01-01
[ Bandwidth Allocation , Cloud Computing , OpenStack , QoS , Virtual Cluster ] -
Efficient hybriding auto-scaling for OpenStack platforms
1079-1085, 2015-01-01
[ Auto-scaling , Cloud computing , Load balancing ] -
Improving system and software deployment on a large-scale cloud data center
82-87, 2013-12-01
[ Cloud Computing , Cloud OS , Data Center , Large-Scale Deployment ] -
Steganography of data embedding in multimedia images using interpolation and histogram shifting
387-390, 2013-01-01
[ Data hiding , Histogram shifting , Interpolation , Steganography ] -
A decision generation algorithm based on granular computing
475-480, 2012-12-01
[ granular computing , granule space , rule granule , rule-chossing , solution space ] -
Parallel clustering based on partitions of local minimal-spanning-trees
111-118, 2012-12-01
[ clustering , graph-based clustering , parallel computing ] -
Accelerating computation of DCM for ERP with GPU-based parallel strategy
679-684, 2012-11-28
[ CUDA , Dynamic causal modelling , Expectation maximization , Parallel computing ] -
Employing LSB and VQ for undetectable secret data hiding
644-649, 2012-11-28
[ Data hiding , Least significant bit , Steganalysis , Vector quantization ] -
Execution time prediction using rough set theory in hybrid cloud
729-734, 2012-11-28
[ Execution Time Prediction , History Based Approach , Hybrid Cloud , Private Cloud , Public Cloud , Rough Set Theory , Rough Sets ] -
Message from UIPM-12 workshop chairs
2012-11-28
-
IPhone social networking for evidence investigations using iTunes forensics
2012-05-08
[ Backup file , IPhone , ITunes backup , Social networking application ] -
Large-scale data management and analysis for astronomical research
2011-12-01
-
Agent-based service migration framework in hybrid cloud
887-892, 2011-11-24
[ Agent-based , Cloud Computing , Hybrid Cloud , Intelligence , Service Migration ] -
Reversible data hiding using neighboring block in VQ-compressed images
327-331, 2010-12-01
[ date hiding , neighbor blocks , reversible data hiding , vector quantization ] -
An efficient distributed hierarchical-clustering algorithm for large scale data
869-874, 2010-12-01
[ Hierarchical clustering , Parallel computing ] -
Side-match prediction scheme in data hiding
658-662, 2010-12-01
[ Reversible data-hiding , Side-match vector quantization ] -
A middleware framework for maximum likelihood evaluation over dynamic grids
2006-12-01
-
Distributed garbage collection for mobile actor systems: The pseudo root approach
360-372, 2006-01-01
專書
-
Smart Innovation, Systems and Technologies
165-177, 2025-01-01
[ Malware classification,SVM,Transfer learning,VGG16 ] -
Communications in Computer and Information Science
670-678, 2022-01-01
[ Data hiding,High capacity,Magic cube,Multi-layers embedding ] -
Communications in Computer and Information Science
661-669, 2022-01-01
[ Cloud security,Container,Docker,Malicious,Vulnerability ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
599-612, 2015-01-01
[ Information hiding,Side-match vector quantization (SMVQ),Steganography ] -
Frontiers in Artificial Intelligence and Applications
1396-1405, 2015-01-01
[ Cloud Computing,Load Balancing,OpenStack,Resource Allocation ] -
Lecture Notes in Electrical Engineering
135-141, 2013-01-01
[ Image Processing,Information Hiding,Vector Quantization ] -
Lecture Notes in Electrical Engineering
295-303, 2012-01-01
[ Agent-based intelligence,Application migration,Cloud computing,Hybrid cloud ] -
Communications in Computer and Information Science
496-505, 2011-12-23
[ Grid computing,Heuristics,Job dependency,Job scheduling ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
244-255, 2010-06-25
[ Active objects,Actors,Garbage collection,Program transformation ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
430-440, 2010-06-25
[ Classification,Data Center,Distributed System,Support Vector Machine ]
校內獲獎
- 114 優良論文貢獻獎
- 用於階層式系統之故障排除之裝置、方法及電腦程式產品 [中華民國]
- DEVICE, METHOD AND COMPUTER PROGRAM PRODUCT FOR FAULT ELIMINATION OF A MULTILAYER SYSTEM [美國]
- 階層式系統之快速錯誤根本原因分析方法與設計 The method and design of an efficient hierarchical root cause analysis mechansim [美國]
- 用於偵測階層式系統故障之偵錯裝置及偵錯方法、電腦可讀取之記錄媒體及電腦程式產品 [中華民國]
- PACKET-AWARE FAULT-TOLERANCE METHOD AND SYSTEM OF VIRTUAL MACGINES APPLIED TO CLOUD SERVICE,COMPUTER READABLE RECORD MEDIUM AND COMPUTER PROGRAM RODUCT 運用於雲端服務之虛擬機之封包察覺式容錯方法及系統、電腦可讀取之記錄媒體及電腦程式產品 [美國]
- 運用於雲端服務之虛擬機之封包察覺式容錯方法及系統、電腦可讀取之記錄媒體及電腦程式產品 [中華民國]
- 多台伺服器之容錯方法及系統 [中華民國]
國立中央大學