行動應用之惡意行為分析技術研發及平台建置研究-子計畫二:一種具情境察覺能力之用戶友善智慧型行動應用惡意行為分析平台之研究 1070801~1080831
[情境察覺,用戶友善,行動應用,惡意行為分析,深度學習
,
Situation Awareness, User Friendly, Mobile Application, Malicious Behavior Analysis, Deep Learing]
Using Explainability Techniques to Assist Android Malware Detection Models in Resisting Adversarial Attacks
Proceedings of the International Conference on Soft Computing and Machine Intelligence, ISCMI,
2024,
277-281,
2024-01-01
[
adversarial attacks,Android malware detection,deep learning,XAI
]
Cloud computing for malicious encrypted traffic analysis and collaboration
International Journal of Grid and High Performance Computing,
13,
3,
12-29,
2021-07-01
[
JA3,MapReduce,Microservice,Serverless,SSL/TLS Fingerprinting,TF-IDF,Threat Intelligent
]
A Game Theory Approach for Assessment of Risk and Deployment of Police Patrols in Response to Criminal Activity in San Francisco
Risk Analysis,
40,
3,
534-549,
2020-03-01
[
Nash equilibrium , patrol deployment , risk value , Shapley value
]
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection
Security and Communication Networks,
2020,
2020-01-01
Autonomic Navigation System Based on Predicted Traffic and VANETs
Wireless Personal Communications,
92,
2,
515-546,
2017-01-01
[
Autonomous , Car navigation , Dynamic , Traffic management , Vehicle navigation
]
A Bipolar Traffic Density Awareness Routing Protocol for Vehicular Ad Hoc Networks
Mobile Information Systems,
2015,
2015-01-22
Energy efficient min delay-based geocast routing protocol for the internet of vehicles
Journal of Information Science and Engineering,
31,
6,
1903-1918,
2015-01-01
[
Energy efficient , Green networking , Internet of Vehicles , Routing , Vanets
]
Improving the authentication scheme and access control protocol for VANETs
Entropy,
16,
11,
6152-6165,
2014-01-01
[
Access control , Authentication , Cryptanalysis , Privacy , Vehicular ad hoc networks (VANETs)
]
A hybrid economic indices based short-term load forecasting system
International Journal of Electrical Power and Energy Systems,
54,
293-305,
2014-01-01
[
Business indicator , Short-term load forecasting , Socio-economic indices , Stock index , Support vector regression
]
An anonymous DRM scheme for sharing multimedia files in P2P networks
Multimedia Tools and Applications,
69,
3,
1041-1065,
2014-01-01
[
Anonymity , Digital content sharing , DRM , Group key , P2P
]
Selective timestamp-nonce based authentication scheme
International Journal of Security and its Applications,
7,
1,
95-104,
2013-05-10
[
Adaptive timestamp-nonce , Authentication , Portable storage device , Security , Session key
]
A beacon-based trust management system for enhancing user centric location privacy in VANETs
Journal of Communications and Networks,
15,
2,
153-163,
2013-04-01
[
Privacy , safety , trust management , vehicle ad-hoc network (VANET)
]
A seamless broadcasting scheme with live video support
International Journal of Digital Multimedia Broadcasting,
2012,
2012-05-21
Cryptanalysis of a paacp: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks
Applied Mathematics and Information Sciences,
6,
2 SUPPL.,
463s-469s,
2012-04-01
[
Access control,Authentication,Cryptanalysis,VANET
]
MalPEFinder: Fast and retrospective assessment of data breaches in malware attacks
Security and Communication Networks,
5,
8,
899-915,
2012-01-01
[
Data breach assessment , Malware detection , Retrospective detection
]
On the design of an global intrusion tolerance network architecture against the internet catastrophes
Journal of Systems and Software,
82,
8,
1313-1325,
2009-08-01
[
Fatal attack , Intrusion tolerance , Survivability , Virtual machine , Worm
]
A rough set approach for automatic key attributes identification of zero-day polymorphic worms
Expert Systems with Applications,
36,
3 PART 1,
4672-4679,
2009-01-01
[
Polymorphic worm , Rough set theory , Zero-day attack
]
Dynamic web page protection based on content integrity
International Journal of Services and Standards,
3,
1,
120-135,
2007-01-01
[
Content integrity , Hash , Honeypot , Intrusion detection , Services , Standards , Web protection
]
A smooth broadcasting scheme for VBR-encoded hot videos
Computer Communications,
29,
15,
2904-2916,
2006-09-05
[
Hot-video broadcasting , Variable-bit-rate (VBR) , Video-on-demand (VOD)
]
An adjustable hot-video broadcasting scheme
WSEAS Transactions on Communications,
5,
5,
832-839,
2006-05-01
[
Buffer requirements , Client bandwidth requirements , Hot video broadcasting , VoD , Waiting time
]
The enhanced staircase broadcasting for VBR videos
Computer Communications,
28,
17,
1903-1909,
2005-10-17
[
Cable TV , Hot-video broadcasting , Variable-bit-rate (VBR) , Video-on-demand (VOD)
]
A smooth recursive frequency-splitting scheme for broadcasting VBR-encoded hot videos
Lecture Notes in Computer Science,
3079,
950-960,
2004-01-01
Smooth fast broadcasting (SFB) for compressed videos
Lecture Notes in Computer Science,
2957,
272-283,
2004-01-01
Archive knowledge discovery by proxy cache
Internet Research,
14,
1,
34-47,
2004-01-01
[
Archives , Internet , Worldwide web
]
Improving Internet archive service through proxy cache
Internet Research,
13,
1,
61-71,
2003-03-01
[
Archives , Internet , World Wide Web
]
A scheduling system for exploiting data and task parallelism on PC laboratory clusters
Campus-Wide Information Systems,
20,
1,
4-16,
2003-03-01
[
Clusters , Data processing , Personal computers , Process innovation
]
研討會著作
Comparison of Interaction Profiling Bipartite Graph Mining and Graph Neural Network for Malware-Control Domain Detection
12-19,
2024-05-22
[
Cybersecurity,Deep Graph Infomax,Graph Neural Networks,Malicious Domain Detection,Network Traffic Analysis,Unsupervised Learning
]
A Novel Deep Learning Based Attention Mechanism for Android Malware Detection and Explanation
226-232,
2022-07-29
[
Android Malware Classification,Attention Mechanism,CNN,Deep Learning,Model Interpretation
]
Enhancing Classification Performance for Android Small Sample Malicious Families Using Hybrid RGB Image Augmentation Method
21-25,
2022-01-01
[
Android,data augmentation,deep learning,hybrid augmentation,malware detection,malware family classification
]
Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection
2021-01-30
[
Android,Data Augmentation,Deep Learning,Generative Adversarial Nets
]
Android malware detection system integrating block feature extraction and multi-head attention mechanism
408-413,
2020-12-01
[
Android,Deep Learning,LSTM,multi-head attention,Static Analysis,Transformer
]
Dynamic Android Malware Analysis with De-Identification of Personal Identifiable Information
30-36,
2020-08-05
[
Android,Application Classification,De-Identification,Dynamic Analysis,Network Packet
]
Combining Static Permissions and Dynamic Packet Analysis to Improve Android Malware Detection
75-81,
2020-06-01
[
Android malware detection,application family classification,dynamic analysis,static analysis
]
NetflowTotal: A cloud service integration platform for malicious traffic analysis and collaboration
154-160,
2019-10-18
[
Cyber Threat Intelligence , MapReduce , Microservice , Serverless
]
A novel preprocessing method for solving long sequence problem in android malware detection
12-17,
2019-08-01
[
Android malware detection , Dalvik opcode , LSTM , Preprocessing , Static analysis
]
The Novel SDN Testbed with Virtual Network Functions Placement
2016-06-29
[
Network Testbed , Network Virtualization , NFV , OpenFlow , SDN , Virtual Machine Placement
]
Adaptive Smart Power Control Algorithm for LTE downlink cross-tier interference avoidance
24-30,
2015-11-19
[
CSG , femtocell , ICIC , interference , LTE , macrocell
]
Adaptive decision making for improving trust establishment in VANET
2014-01-01
[
Beacon , Detection delay , Event , Trust , VANET
]
Evaluation of collusion resistance on trust management systems for VANETs
356-360,
2012-12-01
[
collusion attack , security , trust management , VANETs
]
An efficient trust management system for balancing the safety and location privacy in VANETs
393-400,
2012-11-05
[
RSU-aided , Safety , Trust , VANET
]
Combining density-based clustering and wavelet methods for internal systems anomaly detection
2011-12-15
[
anomaly detection , system anomaly , wavelet transform
]
A system call analysis method with MapReduce for malware detection
631-637,
2011-12-01
[
Behavior-based , Malware detection , MapReduce , System calls
]
Safe distance based location privacy in vehicular networks
2010-01-01
[
Anonymity,Location Privacy,Traffic Safety,VANET
]
TLMS: A novel DRM scheme for multimedia sharing in P2P networks
873-876,
2009-12-01
[
Digital content sharing , DRM , Group key , P2P , Threshold scheme
]
Combining incremental hidden Markov model and Adaboost algorithm for anomaly intrusion detection
3-9,
2009-11-23
[
Adaboost , Anomaly intrusion detection , IHMM , Normal profile
]
A game theory approach for the reallocation of security forces against terrorist diversionary attacks
89-94,
2009-10-22
[
Nash equilibrium , Security forces reallocation , Shapley value , Terrorist attack
]
A game theory approach for an emergency management security advisory system
116-121,
2008-09-22
[
Homeland security advisory system , Nash equilibrium , Shapley value , Terrorist threat value
]
An efficient staircase-harmonic scheme for broadcasting popular videos
122-127,
2005-12-01
[
Buffer requirement , Hot video broadcasting , QoS , Viewers' waiting time , VoD
]
Recognizing multistage cyber attacks via CPN approach
1-6,
2005-12-01
[
Alert correlation , Attack modeling , Colored Petri Net , Multistage attacks
]
Interleaving harmonic broadcasting and receiving scheme with loss-anticipation delivery
600-605,
2004-12-01
[
Fault tolerant , Hot video broadcasting , Loss recovery , Video on demand
]
Interleaving staircase broadcasting and receiving scheme with loss-anticipation delivery
352-355,
2004-12-01
[
Fault tolerant , Hot video broadcasting , Loss recovery , Video on demand
]
Fast and lossless broadcasting schemes for VBR-encoded hot videos
165-169,
2004-12-01
[
Hot-video broadcasting , Live video , Lossless broadcasting , Variable-bit-rate (VBR) , Video-on-demand (VoD)
]
A segment-alignment interactive broadcasting scheme
1040-1045,
2004-06-28
[
Hot video broadcasting , VCR functionality , Video on demand service , Video streaming
]
專書
Communications in Computer and Information Science
434-446,
2022-01-01
[
Android malware detection,Machine learning,Model aging,Static analysis
]
Communications in Computer and Information Science
362-373,
2022-01-01
[
Android malware analysis,Deep learning,Dynamic analysis,Sequence relationships,System call sequences
]
Communications in Computer and Information Science
18-30,
2017-01-01
[
Emergency response,Medical resources scheduling,Nash equilibrium,Shapley value
]
Frontiers in Artificial Intelligence and Applications
651-661,
2015-01-01
[
Cloud Security Experimental Platform,State Feedback,Windows API Hooking
]
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
405-416,
2013-12-01
Lecture Notes in Electrical Engineering
105-112,
2012-12-13
[
RSU-aided,Safety,Trust,VANET
]
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
328-344,
2012-01-01
[
Safety,Self-organized,Trust management,VANET
]
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
226-240,
2012-01-01
[
Advanced persistent threat,Botnet detection,Incident investigation,Malware detection
]
Communications in Computer and Information Science
65-74,
2011-12-01
[
Agent,Interactivity,Security training,Virtual machine
]
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
39-51,
2010-12-01
[
Anonymity,Location privacy,Tracking,VANET
]
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
446-451,
2009-07-17
[
Agent deployment,Nash equilibrium,Shapley value,Threat levels
]
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
241-251,
2007-01-01
[
Call admission control,Congestion control,Quality of service,Utility function,Wireless network
]
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
389-404,
2006-01-01
[
Colored petri nets,Information flow,Security policy,SELinux
]
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
236-246,
2006-01-01
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
362-370,
2005-01-01