Ren‐Hung Hwang

ORCID: 0000-0001-7996-4184
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Traffic and Congestion Control
  • Caching and Content Delivery
  • Advanced Wireless Network Optimization
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Software-Defined Networks and 5G
  • Mobile Ad Hoc Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Wireless Communication Networks Research
  • Peer-to-Peer Network Technologies
  • Advanced Optical Network Technologies
  • Opportunistic and Delay-Tolerant Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced MIMO Systems Optimization
  • Wireless Networks and Protocols
  • Mobile Agent-Based Network Management
  • Cooperative Communication and Network Coding
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Queuing Theory Analysis
  • Energy Efficient Wireless Sensor Networks
  • Cloud Computing and Resource Management
  • Context-Aware Activity Recognition Systems
  • Image and Video Quality Assessment
  • Indoor and Outdoor Localization Technologies

National Yang Ming Chiao Tung University
1988-2025

National Chung Cheng University
2014-2023

Academia Sinica
2023

Princeton University
2023

Thai Nguyen University
2021

Research Center for Information Technology Innovation, Academia Sinica
2019

National Cheng Kung University
2011-2017

Institute of Electrical and Electronics Engineers
2014

Frontier Hospital
2014

National Chiayi University
2004-2010

Various attacks have emerged as the major threats to success of a connected world like Internet Things (IoT), in which billions devices interact with each other facilitate human life. By exploiting vulnerabilities cheap and insecure such IP cameras, an attacker can create hundreds thousands zombie then launch massive volume take down any target. For example, 2016, record large-scale DDoS attack launched by millions Mirai-injected cameras smart printers blocked accessibility several...

10.1109/access.2020.2973023 article EN cc-by IEEE Access 2020-01-01

Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) Long Short-Term Memory (LSTM) classify malicious traffic. However, these state-of-the-art also face tremendous challenges satisfy real-time analysis requirements due the major delay of flow-based data preprocessing, i.e., requiring time for accumulating packets into particular flows then...

10.3390/app9163414 article EN cc-by Applied Sciences 2019-08-19

Location-based services (LBS) which bring so much convenience to our daily life have been intensively studied over the years. Generally, an LBS query processing can be categorized into snapshot and continuous queries access user location information return search results users. An has full control of information, causing privacy concerns. If provider a malicious intention breach by tracking users' routes their destinations, it incurs serious threat. Most existing techniques addressed...

10.1109/tsc.2013.55 article EN IEEE Transactions on Services Computing 2014-01-31

Low Power Wireless (LPW) networks have recently been emerging as key candidates to offer affordable connectivity for the constrained devices in Internet of Things (IoT). However, they also raise major security concerns due inherent vulnerabilities built-in communication protocols. By exploiting these flaws, an adversary can attack sensors or actuators LPW network and force them execute energy-hungry tasks such verifying unauthenticated garbage messages repeatedly. This attack, namely energy...

10.1109/access.2019.2911424 article EN cc-by-nc-nd IEEE Access 2019-01-01

Intelligent Transport Systems (ITSs) play an important role in future smart city design to improve traffic safety and congestion by sharing data collected vehicles. For the with other vehicles, vehicular sensory are usually uploaded cloud server. However, existing systems for VANETs cannot provide selective sufficient privacy protection. Moreover, some schemes also ensure stable accessibility integrity of retrieved data. On hand, improvements such as lower latency, higher capacity, increased...

10.1109/tits.2022.3146322 article EN IEEE Transactions on Intelligent Transportation Systems 2022-02-03

As a result of the explosion security attacks and complexity modern networks, machine learning (ML) has recently become favored approach for intrusion detection systems (IDS). However, ML usually faces three challenges: massive attack variants, imbalanced data issues, appropriate segmentation. Improper handling issues will significantly degrade performance, e.g., resulting in high false-negative low recall rates. Despite many efforts have done literature, detecting complicated network...

10.1109/access.2022.3149295 article EN cc-by IEEE Access 2022-01-01

Twenty-two years after the advent of first-generation vehicular network, that is, dedicated short-range communications (DSRC) standard/ IEEE 802.11p, technology market has become very competitive with a new player, Cellular Vehicle-to-Everything (C-V2X). Currently, C-V2X likely dominates race because big advantages comprehensive coverage and high throughput/reliability. Meanwhile, DSRC-based technologies are struggling to survive rebound many hopes betting on success second-generation...

10.1109/mnet.010.2100509 article EN IEEE Network 2022-09-12

The live video streaming services have been suffered from the limited backhaul capacity of cellular core network and occasional congestions due to cloud-based architecture. Mobile Edge Computing (MEC) brings centralized cloud nearby edge improve Quality Experience (QoE) services, such as services. Nevertheless, resource at devices is still should be allocated economically efficiently. In this paper, we propose Combinatorial Clock Auction (ECCA) in Stream (CCAS), two auction frameworks QoE...

10.1109/tmc.2019.2901786 article EN IEEE Transactions on Mobile Computing 2019-02-26

Next-generation advanced driver-assistance systems (ADAS) and cooperative adaptive cruise control (CACC) for advanced/autonomous driving are expected to increasingly use wireless connectivity such as V2V V2I improve the coverage, particularly in locations where a vehicle's camera or radar is ineffective. However, using shared sensing data raises grave concerns about truthfulness of information reported by unreliable stakeholders. For example, transmitting vehicle may deliberately disseminate...

10.1109/tvt.2020.2975822 article EN IEEE Transactions on Vehicular Technology 2020-02-25

With increasing interest in the concept of 5G wireless networks and popularization mobile devices, users gradually watch videos through devices streaming mode rather than off-line mode. However, latency lags will reduce quality service. In HTTP live services, when there are multiple sources for same content stored servers, suited is able to be selected playing according networking bandwidth conditions between servers user equipment, can obtain appropriate automatically. selection policy...

10.1109/mnet.2015.7018203 article EN IEEE Network 2015-01-01

In cloud computing, resource subscription is an important procedure which enables customers to elastically subscribe IT resources based on their service requirements. Resource can be divided into two categories, namely long-term reservation and on-demand subscription. Although need pay the upfront fee for a contract, usage charge of reserved generally much cheaper than that To provide better Internet by using resource, operators will expect make trade-off between amount subscribed resources....

10.1109/tsc.2013.35 article EN IEEE Transactions on Services Computing 2013-06-18

Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security privacy issues 6G remain largely in concept. This survey provides systematic overview of based prospective technologies the physical, connection, service layers, as well through lessons learned from failures existing architectures state-of-the-art defenses. Two key are...

10.1109/comst.2021.3108618 article EN IEEE Communications Surveys & Tutorials 2021-01-01

Dispatching emergency vehicles (EVs) to fatal accidents or fires as fast possible is vital save lives; however, minimizing an EV's travel time the rescue spot still open challenge. This work presents a path planning and traffic clear-out scheduling scheme lessen in vision of Internet Vehicles (IoV). Initially, system searches list candidate paths with estimated arrival (ETA) at EVs' maximum speed, regardless conditions. After that, vehicle process evaluates delay clearing out obstacles on...

10.1109/tits.2021.3113933 article EN IEEE Transactions on Intelligent Transportation Systems 2021-09-27

Due to the advent of many new multimedia applications in high speed networks, issue multicast routing has become more and important. The problem computer networks is also known as Steiner tree which been shown be NP-complete. In this paper, we propose a algorithm based on Genetic Algorithms. To apply real several methods for reducing computational complexity. Computer simulations were conducted random graph evaluate performance proposed algorithm. Our numerical results show that able find...

10.6688/jise.2000.16.6.5 article EN Journal of information science and engineering 2000-11-01

Deep learning technology has developed rapidly in recent years and been successfully applied many fields, including face recognition. Face recognition is used scenarios nowadays, security control systems, access management, health safety employee attendance monitoring, automatic border control, scan payment. However, deep models are vulnerable to adversarial attacks conducted by perturbing probe images generate examples, or using patches well-designed perturbations specific regions of the...

10.3390/s23020853 article EN cc-by Sensors 2023-01-11

The virtual path (VP) concept has been proposed to simplify traffic control and resource management in future B-ISDN. In particular, call setup processing can be significantly reduced when resources are reserved on VPs. However, this advantage is offset by a decrease statistical multiplexing gains of the networks. focus paper how improve bandwidth efficiency through adaptive routing capacity all authors first examine two VP reservation strategies. They then design evaluate computationally...

10.1109/infcom.1994.337531 article EN 2002-12-17
Coming Soon ...