- Network Traffic and Congestion Control
- Caching and Content Delivery
- Advanced Wireless Network Optimization
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Software-Defined Networks and 5G
- Mobile Ad Hoc Networks
- Vehicular Ad Hoc Networks (VANETs)
- Wireless Communication Networks Research
- Peer-to-Peer Network Technologies
- Advanced Optical Network Technologies
- Opportunistic and Delay-Tolerant Networks
- IPv6, Mobility, Handover, Networks, Security
- Advanced MIMO Systems Optimization
- Wireless Networks and Protocols
- Mobile Agent-Based Network Management
- Cooperative Communication and Network Coding
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Advanced Queuing Theory Analysis
- Energy Efficient Wireless Sensor Networks
- Cloud Computing and Resource Management
- Context-Aware Activity Recognition Systems
- Image and Video Quality Assessment
- Indoor and Outdoor Localization Technologies
National Yang Ming Chiao Tung University
1988-2025
National Chung Cheng University
2014-2023
Academia Sinica
2023
Princeton University
2023
Thai Nguyen University
2021
Research Center for Information Technology Innovation, Academia Sinica
2019
National Cheng Kung University
2011-2017
Institute of Electrical and Electronics Engineers
2014
Frontier Hospital
2014
National Chiayi University
2004-2010
Various attacks have emerged as the major threats to success of a connected world like Internet Things (IoT), in which billions devices interact with each other facilitate human life. By exploiting vulnerabilities cheap and insecure such IP cameras, an attacker can create hundreds thousands zombie then launch massive volume take down any target. For example, 2016, record large-scale DDoS attack launched by millions Mirai-injected cameras smart printers blocked accessibility several...
Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) Long Short-Term Memory (LSTM) classify malicious traffic. However, these state-of-the-art also face tremendous challenges satisfy real-time analysis requirements due the major delay of flow-based data preprocessing, i.e., requiring time for accumulating packets into particular flows then...
Location-based services (LBS) which bring so much convenience to our daily life have been intensively studied over the years. Generally, an LBS query processing can be categorized into snapshot and continuous queries access user location information return search results users. An has full control of information, causing privacy concerns. If provider a malicious intention breach by tracking users' routes their destinations, it incurs serious threat. Most existing techniques addressed...
Low Power Wireless (LPW) networks have recently been emerging as key candidates to offer affordable connectivity for the constrained devices in Internet of Things (IoT). However, they also raise major security concerns due inherent vulnerabilities built-in communication protocols. By exploiting these flaws, an adversary can attack sensors or actuators LPW network and force them execute energy-hungry tasks such verifying unauthenticated garbage messages repeatedly. This attack, namely energy...
Intelligent Transport Systems (ITSs) play an important role in future smart city design to improve traffic safety and congestion by sharing data collected vehicles. For the with other vehicles, vehicular sensory are usually uploaded cloud server. However, existing systems for VANETs cannot provide selective sufficient privacy protection. Moreover, some schemes also ensure stable accessibility integrity of retrieved data. On hand, improvements such as lower latency, higher capacity, increased...
As a result of the explosion security attacks and complexity modern networks, machine learning (ML) has recently become favored approach for intrusion detection systems (IDS). However, ML usually faces three challenges: massive attack variants, imbalanced data issues, appropriate segmentation. Improper handling issues will significantly degrade performance, e.g., resulting in high false-negative low recall rates. Despite many efforts have done literature, detecting complicated network...
Twenty-two years after the advent of first-generation vehicular network, that is, dedicated short-range communications (DSRC) standard/ IEEE 802.11p, technology market has become very competitive with a new player, Cellular Vehicle-to-Everything (C-V2X). Currently, C-V2X likely dominates race because big advantages comprehensive coverage and high throughput/reliability. Meanwhile, DSRC-based technologies are struggling to survive rebound many hopes betting on success second-generation...
The live video streaming services have been suffered from the limited backhaul capacity of cellular core network and occasional congestions due to cloud-based architecture. Mobile Edge Computing (MEC) brings centralized cloud nearby edge improve Quality Experience (QoE) services, such as services. Nevertheless, resource at devices is still should be allocated economically efficiently. In this paper, we propose Combinatorial Clock Auction (ECCA) in Stream (CCAS), two auction frameworks QoE...
Next-generation advanced driver-assistance systems (ADAS) and cooperative adaptive cruise control (CACC) for advanced/autonomous driving are expected to increasingly use wireless connectivity such as V2V V2I improve the coverage, particularly in locations where a vehicle's camera or radar is ineffective. However, using shared sensing data raises grave concerns about truthfulness of information reported by unreliable stakeholders. For example, transmitting vehicle may deliberately disseminate...
With increasing interest in the concept of 5G wireless networks and popularization mobile devices, users gradually watch videos through devices streaming mode rather than off-line mode. However, latency lags will reduce quality service. In HTTP live services, when there are multiple sources for same content stored servers, suited is able to be selected playing according networking bandwidth conditions between servers user equipment, can obtain appropriate automatically. selection policy...
In cloud computing, resource subscription is an important procedure which enables customers to elastically subscribe IT resources based on their service requirements. Resource can be divided into two categories, namely long-term reservation and on-demand subscription. Although need pay the upfront fee for a contract, usage charge of reserved generally much cheaper than that To provide better Internet by using resource, operators will expect make trade-off between amount subscribed resources....
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security privacy issues 6G remain largely in concept. This survey provides systematic overview of based prospective technologies the physical, connection, service layers, as well through lessons learned from failures existing architectures state-of-the-art defenses. Two key are...
Dispatching emergency vehicles (EVs) to fatal accidents or fires as fast possible is vital save lives; however, minimizing an EV's travel time the rescue spot still open challenge. This work presents a path planning and traffic clear-out scheduling scheme lessen in vision of Internet Vehicles (IoV). Initially, system searches list candidate paths with estimated arrival (ETA) at EVs' maximum speed, regardless conditions. After that, vehicle process evaluates delay clearing out obstacles on...
Due to the advent of many new multimedia applications in high speed networks, issue multicast routing has become more and important. The problem computer networks is also known as Steiner tree which been shown be NP-complete. In this paper, we propose a algorithm based on Genetic Algorithms. To apply real several methods for reducing computational complexity. Computer simulations were conducted random graph evaluate performance proposed algorithm. Our numerical results show that able find...
Deep learning technology has developed rapidly in recent years and been successfully applied many fields, including face recognition. Face recognition is used scenarios nowadays, security control systems, access management, health safety employee attendance monitoring, automatic border control, scan payment. However, deep models are vulnerable to adversarial attacks conducted by perturbing probe images generate examples, or using patches well-designed perturbations specific regions of the...
The virtual path (VP) concept has been proposed to simplify traffic control and resource management in future B-ISDN. In particular, call setup processing can be significantly reduced when resources are reserved on VPs. However, this advantage is offset by a decrease statistical multiplexing gains of the networks. focus paper how improve bandwidth efficiency through adaptive routing capacity all authors first examine two VP reservation strategies. They then design evaluate computationally...