教師個人簡歷
現職
國立中央大學
管理學院資訊管理學系
副教授
專長
區塊鏈
資訊安全
車載通訊網路
雲端計算安全
Blockchain
Information security
In-vehicle communication network
Cloud computing security
專長簡述
區塊鏈、資訊安全、車載通訊網路、雲端計算安全
最高學歷
國立交通大學
資訊科學與工程學系
博士
政府GRB研究專長領域
教育部學門領域
高教深耕計畫
-
資管系-葉羅堯
1120101~1121231
國科會計畫統計
-
適用於6G環境之分散式DNS架構與具激勵機制之安全聯邦式學習架構
1150801~1160731
-
適用於6g環境下可安全群播與撤銷之去中心化多媒體存取控制平台
1140801~1150731
-
適用於6G環境之分散式DNS架構與具激勵機制之安全聯邦式學習架構
1140801~1150731
-
合規GDPR之可撤銷式個人健康資訊記錄收集、聯盟式學習、誘因式分享整合平台
1120801~1130731
[區塊鏈,變色龍雜湊函數,聯盟式學習,龐式騙局,位址分群,布容過濾器,代理加密系統 , Blockchain,Chameleon hash function,federated learning,Ponzi scheme,address clustering,Bloom filter,proxy reencyption system] -
合規GDPR之可撤銷式個人健康資訊記錄收集、聯盟式學習、誘因式分享整合平台
1110801~1120731
[區塊鏈,變色龍雜湊函數,聯盟式學習,龐式騙局,位址分群,布容過濾器,代理加密系統 , Blockchain,Chameleon hash function,federated learning,Ponzi scheme,address clustering,Bloom filter,proxy reencyption system] -
具分散式檔案撤銷功能與安全保證之物聯網自動化韌體更新平台
1100201~1110731
[物聯網,區塊鏈,Virustotal,IPFS,分散式檔案分散協定,區塊鏈資料中介導入服務 , IoT,Blockchain,Virustotal,IPFS,P2P file sharing protocol,Blockcahin oracle service]
產學合作計畫統計
-
區塊鏈隱私資料驗證系統
1131001~1140915
[區塊鏈 , 區塊鏈] -
具隱私防護之雲端儲存平臺開發案
1130416~1131130
[雲端計算、密碼學 , Cloud Computing,Cryptography] -
調查局通訊監察內容區塊鏈驗證 POC 案
1110401~1111130
[區塊鏈,文件驗證 , Blockchain,document verification] -
司法院區塊鏈專案安全加強研究案
1101001~1111231
[區塊鏈 , BLOCKCHAIN]
期刊著作
-
Compressing Deep Neural Networks with Goal-Specific Pruning and Self-Distillation
ACM Transactions on Knowledge Discovery from Data, 19, 4, 2025-05-09
[ block diagonal structure,deep neural networks,distillation,network compression ] -
NFT-based車輛與零件履歷驗證平臺=NFT-based Production History and Verification Platform for Vehicle and Car Parts
電子商務學報, 27:1, 23-54, 2025-04-01
[ 區塊鏈,限時驗證,二手車,NFT,Blockchain,Time-limited verification,Second-hand car ] -
Auditable Homomorphic-Based Decentralized Collaborative AI With Attribute-Based Differential Privacy
IEEE Transactions on Network and Service Management, 22, 2, 989-1004, 2025-01-01
[ blockchain,Federated learning,group key management,privacy preservation ] -
Diversifying Graph Augmentation for Learning to Solve Graph Optimization Problems
IEEE Transactions on Knowledge and Data Engineering, 37, 12, 7060-7075, 2025-01-01
[ Graph augmentation,graph optimization,machine learning ] -
A Decentralized Approach to Parking Space Management With Fine-Grained Permission Level Using Blockchain Technology
IEEE Internet of Things Journal, 12, 3, 2749-2762, 2025-01-01
[ Access control,attribute-based encryption (ABE),blockchain,parking space search,vehicular ad-hoc network (VANET) ] -
Detecting Targets of Graph Adversarial Attacks With Edge and Feature Perturbations
IEEE Transactions on Computational Social Systems, 11, 3, 3218-3231, 2024-06-01
[ Detection,graph adversarial attacks,machine learning,reinforcement learning ] -
GDPR-Compliant Personal Health Record Sharing Mechanism with Redactable Blockchain and Revocable IPFS
IEEE Transactions on Dependable and Secure Computing, 21, 4, 3342-3356, 2024-01-01
[ blockchain,data sharing,GDPR,Intel SGX,IPFS,proxy re-encryption,redactable blockchain ] -
Willingness Maximization for Ego Network Data Extraction in Multiple Online Social Networks
IEEE Transactions on Knowledge and Data Engineering, 35, 8, 8672-8686, 2023-08-01
[ approximation algorithm,crawling,ego networks,online social networks,Willingness ] -
GDPR-Aware Revocable P2P File-Sharing System Over Consortium Blockchain
IEEE Systems Journal, 16, 4, 5234-5245, 2022-12-01
[ Ethereum,general data protection regulation (GDPR),Intel software guard extensions (SGX),interplanetary file system (IPFS),peer-to-peer (P2P) file-sharing system,smart contract ] -
Learning to Extract Expert Teams in Social Networks
IEEE Transactions on Computational Social Systems, 9, 5, 1552-1562, 2022-10-01
[ Graph algorithms,machine learning,social networks,team formation ] -
Blockchain-Based Privacy-Preserving and Sustainable Data Query Service Over 5G-VANETs
IEEE Transactions on Intelligent Transportation Systems, 23, 9, 15909-15921, 2022-09-01
[ blockchain,InterPlanetary File System (IPFS),proxy re-encryption,software defined network (SDN),Vehicular ad-hoc network (VANET) ] -
SOChain: A Privacy-Preserving DDoS Data Exchange Service over SOC Consortium Blockchain
IEEE Transactions on Engineering Management, 67, 4, 1487-1500, 2020-11-01
[ Blockchain,bloom filter,Diffie-Hellman key exchange,distributed denial of service (DDoS),incentive coin ] -
Efficient Extraction of Target Users for Package Promotion in Big Social Networks
IEEE Transactions on Computational Social Systems, 7, 5, 1111-1122, 2020-10-01
[ Algorithm design,package promotion,social networks,target group identification ] -
Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices
Computers and Security, 86, 238-252, 2019-09-01
[ Blockchain,Distributed Denial-of-Service (DDoS),Internet of Things (IoT),Smart contract ] -
DANS: A Secure and Efficient Driver-Abnormal Notification Scheme with IoT Devices over IoV
IEEE Systems Journal, 13, 2, 1628-1639, 2019-06-01
[ Biometric authentication,driver distraction,edge-fog computing,Internet of Things (IoT),Internet of Vehicles (IoV) ] -
Cloud-Based Fine-Grained Health Information Access Control Framework for LightweightIoT Devices with Dynamic Auditing andAttribute Revocation
IEEE Transactions on Cloud Computing, 6, 2, 532-544, 2018-04-01
[ auditing,cloud storage,fine-grained access control,Internet of thing,personal health information ] -
Secure IoT-based, incentive-aware emergency personnel dispatching scheme withweighted fine-grained access control
ACM Transactions on Intelligent Systems and Technology, 9, 1, 2017-09-01
[ Biometric authentication,Emergency personnel dispatch,Fine-grained access control,Internet of vehicles,Security ] -
PBS: A portable billing scheme with fine-grained access control for service-oriented vehicular networks
IEEE Transactions on Mobile Computing, 13, 11, 2606-2619, 2014-11-01
[ authentication,billing scheme,vehicular networks ] -
A proxy-based authentication and billing scheme with incentive-aware multihop forwarding for vehicular networks
IEEE Transactions on Intelligent Transportation Systems, 15, 4, 1607-1621, 2014-01-01
[ Authentication,billing,Proxy Mobile IPv6 (PMIPv6),vehicular ad hoc networks (VANETs) ] -
Hierarchical role-based data dissemination in wireless sensor networks
Journal of Supercomputing, 66, 1, 35-56, 2013-10-01
[ Data dissemination,Energy efficiency,Mobile sinks,Wireless sensor networks ] -
A conditional access system with efficient key distribution and revocation for mobile pay-TV systems
ACM Transactions on Multimedia Computing, Communications and Applications, 9, 3, 2013-06-01
[ Digital video broadcasting,Multimedia delivery,Nonrepudiation,Sophisticated access control ] -
EDG: An energy-efficient data gathering scheme in wireless sensor networks
Information, 16, 7 B, 5007-5018, 2013-01-01
[ Data gathering,Spatial correlation,Wireless sensor networks ] -
A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs
Journal of Network and Computer Applications, 36, 1, 284-292, 2013-01-01
[ Binding update,Mobile IPv6,Network security,Route optimization ] -
A secure and efficient authentication scheme for access control in mobile pay-TV systems
IEEE Transactions on Multimedia, 14, 6, 1690-1693, 2012-12-10
[ Authentication,conditional access systems,pay-TV services ] -
A batch-authenticated and key agreement framework for P2P-based online social networks
IEEE Transactions on Vehicular Technology, 61, 4, 1907-1924, 2012-05-22
[ Authentication protocol,batch authentication,Online social networks (OSNs),Peer to peer (P2P) ] -
A fine-grained access control scheme for secure video multicast
ICIC Express Letters, Part B: Applications, 2, 6, 1407-1412, 2011-12-01
[ Cryptography,Multimedia delivery,Security in digital video systems ] -
A practical authentication protocol with anonymity for wireless access networks
Wireless Communications and Mobile Computing, 11, 10, 1366-1375, 2011-10-01
[ authentication,security,user anonymity,VO logic,wireless network ] -
A novel mobile agent authentication scheme for multi-host environments using self-certified pairing-based public key cryptosystem
International Journal of Innovative Computing, Information and Control, 7, 5 A, 2389-2404, 2011-05-01
[ Agent security,Authentication scheme,Proxy signature,Self-certified public key cryptosystem ] -
PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks
Computer Communications, 34, 3, 447-456, 2011-03-15
[ Access control,Key establishment,Mutual authentication,Privacy,Vehicular ad hoc networks ] -
ABACS: An attribute-based access control system for emergency services over vehicular Ad Hoc Networks
IEEE Journal on Selected Areas in Communications, 29, 3, 630-643, 2011-03-01
[ Access control,Attribute-based encryption,Emergency management,VANETs ] -
ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
IEEE Transactions on Vehicular Technology, 60, 1, 248-262, 2011-01-01
[ Authentication,batch verification,conditional privacy,elliptic curve cryptographic ] -
ALM: An adaptive location management scheme for approximate location queries in wireless sensor networks
Computer Communications, 33, 16, 1937-1948, 2010-10-15
[ Approximate location queries,Location management,Wireless sensor networks ] -
A portable integrated authentication and access control scheme for distributed embedded systems
International Journal of Innovative Computing, Information and Control, 6, 2, 449-460, 2010-02-01
[ Access control,Authentication,Embedded systems,Security ] -
An efficient nonce-based authentication scheme with key agreement
Applied Mathematics and Computation, 169, 2, 982-994, 2005-10-15
[ Authentication,Hash function,Key agreement,Network security,Smart card ]
研討會著作
-
Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting
2023-01-01
[ blockchain,electronic voting system,Ethereum,ring signature,self-Tallying,stealth address ] -
Decentralized Federated Learning with Enhanced Privacy Preservation
2022-01-01
[ blockchain,Federated learning ] -
Analyzing Federated Learning with Enhanced Privacy Preservation
446-451, 2022-01-01
[ Federated learning,Machine learning,Privacy-preserving ] -
Integrating Cellphone-based Hardware Wallet with Visional Certificate Verification System
2020-12-01
[ blockchain,digital certificate,Ethereum,IPFS ] -
Design of a Data Collection System with Data Compression for Small Manufacturers in Industrial IoT Environments
2019-09-01
[ Compression,Data storage,Industrial IoT,IoT ] -
A Monitorable Peer-to-Peer File Sharing Mechanism
2019-09-01
[ Ethereum,IPFS,P2P file sharing system,Smart contract ] -
A Collaborative DDoS Defense Platform Based on Blockchain Technology
1-6, 2019-08-01
[ Blockchain,Distributed denial of service,Smart contract ] -
An Privacy-Preserving Cross-Organizational Authentication/Authorization/Accounting System Using Blockchain Technology
2018-07-27
[ AAA server,Access control,Anonymous,Blockchain,Hash chain ] -
NCHC Blockchain Construction Platform (NBCP): Rapidly Constructing Blockchain Nodes around Taiwan
2017-07-25
[ Blockchain,docker swarm,Fintech,security.,smart contract ] -
A practical third-party auditor prototype for cloud storage service
796-799, 2016-07-02
[ availability,Cloud storage service,file integrity,third-party auditor ] -
Ultra-lightweight mutual authentication and ownership transfer protocol with PUF for Gen2 v2 RFID systems
655-658, 2016-01-01
[ Mutual authentication,Ownership transfer,PUF,RFJD ] -
Automated malware analysis framework with honeynet technology in Taiwan campuses
724-725, 2012-12-01
[ And virtual machine,Botnet,Honeypot,Malware ] -
An in-network approximate data gathering algorithm exploiting spatial correlation in wireless sensor networks
550-555, 2012-07-12
[ approximate answers,data gathering,energy efficiency,spatial correlation,wireless sensor networks ] -
A localized authentication and billing scheme for proxy mobile IPv6 in VANETs
993-998, 2012-01-01
[ authentication,billing,Proxy Mobile IPv6,VANETs ] -
Hierarchical role-based data dissemination for large-scale wireless sensor networks with mobile sinks
129-134, 2010-07-01
-
SWOON: A testbed for secure wireless overlay networks
2008-01-01
-
An efficient authentication and access control scheme using smart cards
78-82, 2005-09-01
校內獲獎
- 115 研究傑出獎
- 114 研究傑出獎
- 112 新聘國鼎青年獎勵
國立中央大學