呂芳懌 特聘教授

Fang-Yie Leu

※各分機請先撥本校總機:(04)23590121

E-mail 實驗室 老師個人網站
leufy@thu.edu.tw 資料庫與網路安全實驗室 http://dblab.csie.thu.edu.tw/boss.html
研究室位置 研究室分機 實驗室位置 實驗室分機
ST422 33815 ST425 33849
研究領域
物聯網、無線網路、網路安全與感測網路
最高學歷
國立台灣工業技術學院 電子所 博士
Knowledge Systems Institute Computer and Inform. Scinece 碩士
國立台灣工業技術學院 電子所 碩士
國立台灣工業技術學院 電子工程技術系 學士
經歷
服務單位 職稱 起迄年月
東海大學 資訊工程學系 特聘教授 2018 年 08 月 至2019 年 07 月
東海大學 資訊工程學系 教授 2010 年 02 月 至今
東海大學 資訊工程學系 副教授 1991 年 08 月 至 2010 年 01 月
龍華工專 電子科 講師 1986 年 08 月 至 1987 年 07 月
明志工專 電機科 助教 1983 年 08 月 至 1984 年 07 月
中區電信管理局 電子交換機維護中心 高技員 1979 年 06 月 至 1981 年 08 月
順序 名稱
1 Heru Susanto, Aida Sari and Fang-Yie Leu, “Innovative Business Process Reengineering Adoption: Framework of Big Data Sentiment, Improving Customers’ Service Level Agreement,” Big Data and Cognitive Computing, MDPI, vol. 4, no. 4, Dec. 2022, pp. 1-21.
2 Heru Susanto, Mohammad Qawiul Azim, Leu Fang-Yie, Alifya Kayla Shafa Susanto, Desi Setiana, Fahmi Ibrahim, Akbari Indra Basuki, Taufik Iqbal Ramdhani, Iwan Setiawan, Budhi Riyanto, Rd Angga Ferianda, Raden Muhammad Taufik Yuniantoro and Ulaganathan Subramanian, Artificial Intelligence, Blockchain Framework, Cyberthreat Defenses of Resilient Digital Ecosystems, Chapter 3 of Handbook of Research on Artificial Intelligence and Knowledge Management in Asia’s Digital Economy, ed. By Patricia Ordóñez de Pablos, Xi Zhang, and Mohammad Nabil Almunawar, 2023.
3 Kun-Lin Tsai*, Li-Woei Chen, Fang-Yie Leu, Chuan-Tian Wu, “Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment,” CMC-Computers, Materials & Continua, vol. 73, no. 1, 2022, pp. 547-562. (SCI, 3.86, Q2)
4 Lung-Pin Chen, Fang-Yie Leu*, Hsin-Ta Chiao and Hung-Jr Shiu, “Adaptive Resource Management for Spot Workers in Cloud Computing Environment,” International Journal of Web and Grid Services (IJWGS), Accepted on April 4, 2022. (SCI, IF’21=0.8)
5 Szu-Yin Lin, Yun-Ching Kung, and Fang-Yie Leu*, “Predictive Intelligence in Harmful News Identification by BERT-based Ensemble Learning Model with Text Sentiment Analysis,” Information Processing and Management, vol.59, issue 2, March 2022, 102872. (SCI, 21’s IF=7.466, 20/163, Q1) https://www.sciencedirect.com/science/article/pii/S0306457322000073?dgcid=author
6 Shih-wei Liao, Cheng-Han Hsu, Jeng-Wei Lin*, Yi-Ting Wu and Fang-Yie Leu*, “A Deep Learning-Based Chinese Semantic Parser for Almond Virtual Assistant,” Sensors, vol. 22, Feb. 2022, 22, 1891. https://doi.org/10.3390/s22051891. (SCI, 3.847, 18/64, Q2)
7 Heru Susanto, Leu Fang-Yie, and, Alifya Kayla Shafa “Genetics Algorithm Approaches of Cheminformatics Reengineering Process,” Open Access Journal of Biomedical Science (OAJBS), Jan.- Feb., vol.4, no. 1, 2022, pp. 1523-1530.
8 Alifya Kayla Shafa, and Heru Susanto, Leu Fang-Yie, “Shifting Paradigm of Digital Ecosystems for Modelling in-Science,” Open Access Journal of Biomedical Science (OAJBS), Jan-Feb, vol.4, no. 1, 2022, pp.1729-1736.
9 Szu-Yin Lin, Fang-Yie Leu*, Chia-Yin Ko and Ming-Chien Shih, “A Deep Learning-based Indoor-Positioning Approach using RSSI and Carrying Mode Information,” Concurrency and Computation: Practice and Experience, accepted on November 20, 2020.
10 "Heru Susanto, Leu Fang Yie, Fadzliwati Mohiddin, Arief Amier Rahman Setiawan, Parastou Khodaparast Haghi and Desi Setiana, “Revealing Social Media Phenomenon in Time of COVID-19 Pandemic for Boosting Start-Up Businesses through Digital Ecosystem,” Applied System Innovation, 4 (1), 6, 2021, pp.1-21. (Scopus) ISSN=2571-5577  https://doi.org/10.3390/asi4010006"
11 Fang-Yie Leu, Lidia Ogiela, Kangbin Yim, “Selected papers from Future-ICT 2021,” Journal of Interent Technology, Guest Editor, In process.
12 Heru Susanto, Leu Fang-Yie, Wahyu Caesarendra, Fahmi Ibrahim, P.K. Haghi, Uus Khusni and Adam Glowacz, “Managing Cloud Intelligent System over the Digital Ecosystem: Revealing Apps Behavior during Pandemic Covid-19,” Applied System Innovation, 3, 37, September 7, 2020, pp.1-18. (Scopus) ; https://doi.org/10.3390/asi3030037, ISSN=2571-5577
13 Heru Susanto, Leu Fang Yie, Desi Setiana, Yani Asih, Ambar Yoganingrum, Slamet Riyanto and Fadly Akbar Saputra, “Digital Ecosystem Security Issues for Organizations and Governments: Digital Ethics and Privacy,” Chapter 5 of the book entitled Web 2.0 and Cloud Technologies for Implementing Connected Government, August 10, 2021.
14 Leu Fang Yie, Heru Susanto and Desi Setiana, “Collaborating Decision Support and Business Intelligence to Enable Government Digital Connectivity,” Chapter 5 of the book entitled Web 2.0 and Cloud Technologies for Implementing Connected Government, August 10, 2020.
15 Heru Susanto, Leu Fang Yie, Didi Rosiyadi, Akbari Indra Basuki and Desi Setiana, “Data Security for Connected Governments and Organisations: Managing Automation and Artificial Intelligence,” Chapter 11 of the book entitled Web 2.0 and Cloud Technologies for Implementing Connected Government, August 10, 2020.
16 Fang-Yie Leu, Heru Susanto, Kun-Lin Tsai, Chia-Yin Ko*, “A Channel Assignment Scheme for MIMO on Concentric-Hexagon-based Multi-Channel Wireless Networks,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), vol.35, no.4, 2020, pp.205-221. (SCI, IF’19=0.714, 84/90, )
17 Chia-Yin Ko and Fang-Yie Leu*, “Examining Successful Attributes for Undergraduate Students by Applying Machine Learning Techniques,” IEEE Transactions on Education, Vol. 64, No. 1, February 2021, pp.50-57. (SCI, IF’19=2.214, 15/41, ) , ISSN=0018-9359
18 Chin-Ling Chen, Yuan-Hao Liao, Fang-Yie Leu, Ilsun Yo, Kim-Kwang Raymond Choo, Chia-Yin Ko, An e-lottery system with a fair purchasing environment and an arbitration mechanism, Journal of Internet Technology (ISSN 1607-9264), Vol.21 No.3, pp. 655-671, May 2020, DOI: 10.3966/160792642020052103004 [SCIE, EI; 2019 Impact factor: 0.786, Q4. Telecommunications, Rank=84/90].
19 Fang-Yie Leu*, Ping-Jui Chiang, Heru Susanto, Rui-Ting Hung, Hui-Ling Huang, “Mobile Physiological Sensor Cloud System for Long-term Care,” Internet of Things, vol. 11, September 2020, pp.1-13. (EI)
20 Li-Ling Hung, Fang-Yie Leu, Kun-Lin Tsai and Cia-Yin Ko, “Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks,” IEEE Access, vol. 8, March 2020, pp. 56321 – 56332, DOI: 10.1109/ACCESS.2020.2980877. (SCI, IF’19=3.745, 61/266, )
21 Yao-Chung Fan, Si-Ying Huang, Yung-Yu Chen, Lun-Chi Chen, Fang-Yie Leu*, Word Embedding Quantization for Personalized Recommendation on Storage-Constrained Edge Devices in a Smart Store,” Mobile Networks and Applications, January 4, 2021. (SCI, IF’19=2.602, 21/53, )
22 Kun-Lin Tsai, Fang-Yie Leu, Li-Ling Hung*, and Chia-YIin Ko, “Secure Session Key Generation Method for LoRaWAN Servers," IEEE Access, vol. 8, March 2020, pp.54631 - 54640. (SCI, IF’19=3.745, 61/266, )
23 Fang-Yie Leu, Kun-Lin Tsai, Heru Susanto, Cheng-Yan Gu, Ilsun You*, “A Fault Tolerant Mechanism for UE Authentication in 5G Networks" Mobile Networks and Applications, vol. 26, August 2021, pp.1650–1667. (SCI, IF’19=2.602, 21/53, )
24 Heru Susanto, Fang-Yie Leu, Chin-Kang Chen and Fadzlinati Mohiddin, Managing Human Capital in Today’s Globalization: A Management Information System Perspective, Apple Academic Press, Tailor and Francis Group, Oct. 2019. (Book)
25 Yi-Li Huang, Fang-Yie Leu*, Ruey-Kai Sheu, Jung-Chun Liu, Heru Susanto, “A Secure and Efficient WSN by Employing Symmetric Key Matrix and Rectangular Frame Scheme,” Concurrency and Computation: Practice and Experience, network version on Nov. 29, 2019. (SCI, IF’18=1.167, 59/105)
26 Kun-Lin Tsai, Fang-Yie Leu, I. You, Shuo-Wen Chang, Shiung-Jie Hu, Hoonyong Park, “Low Power AES Data Encryption Architecture for LoRaWAN,” IEEE Access, vol. 7, issue 1, December 2019, pp. 146348-146357. (SCI, IF’18=4.098, 22/155)
27 Jeng-Wei Lin, Shih-wei Liao and Fang-Yie Leu*, “Sensor Data Compression Using Bounded Error Piecewise Linear Approximation with Resolution Reduction,” Energies, vol. 12, 2523, June 2019. (SCI, IF’18=2.707, 56/103)
28 Fang-Yie Leu*, Kun-Lin Tsai, Szu-Yin Lin, “E-ANDSF-based Base Station Selection Scheme by using MLP in Untrusted Environments," IEEE Transactions on Industrial Informatics, vol. 15, no. 10, October 2019. (SCI, IF’19=9.112, 4/109, 頂尖期刊)
29 Heru Susanto, Leu Fang-Yie and Chin Kang Chen, Business Process Reengineering -- An ICT Approach, Apple Academic Press, April 2019.
30 Heru Susanto, Leu Fang-Yie and Chin Kang Chen, “Green Information and Communication Technology Awareness as a Corporate Strategy for Information Systems,” Chapter 11 of the book entitled The Emerging Technology of Big Data-- Its Impact as a Tool of ICT Development, Apple Academic Press, Dec 2018, pp.253-284.
31 Chin Kang Chen, Heru Susanto and Leu Fang-Yie, “Managing online Learning: Big data Social Networks, cloud Computing,” Chapter 10 of the book entitled The Emerging Technology of Big Data-- Its Impact as a Tool of ICT Development, Apple Academic Press, Dec 2018, pp. 229-252.
32 Heru Susanto, Leu Fang-Yie and Chin Kang Chen, “Enabling Online Education: An Academic Aspect,” Chapter 6 of the book entitled The Emerging Technology of Big Data-- Its Impact as a Tool of ICT Development, Apple Academic Press, Dec 2018, pp. 125-152.
33 Heru Susanto, and Leu Fang-Yie, Revealing the Big-data revolution as a Driver of Science Achievement in Tioday’s Globalization,” Chapter 3 of the book entitled The Emerging Technology of Big Data-- Its Impact as a Tool of ICT Development, Apple Academic Press, Dec 2018, pp.49-64.
34 Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Ilsun You*, Yu-Ling Huang, Cheng-Han Tsai, “AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments,” IEEE ACCESS, vol. 6, issue 1, 2018, pp. 45325-45334. (SCI, IF’18=4.098, 22/155)
35 Heru Susanto, Leu Fang-Yie and Chin Kang Chen, The Emerging Technology of Big Data-- Its Impact as a Tool of ICT Development, Apple Academic Press, Dec 2018.
36 Ilsun You* and Fang-Yie Leu, “Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks,” IEEE Systems Journal, vol.12, no.1, pp.1038-1041, March 2018. (SCI)
37 Jung-Chun Liu, Fang-Yie Leu*, Guan-Liang Lin, Heru Susanto, “An MFCC-based Text-independent Speaker Identification System for Access Control,” Concurrency and Computation: Practice and Experience, vol. 30, issue 2, 2018, pp. 1-16. SCI
38 Mobile Internet Security, Ilsun You, Fang-Yie Leu, Hsing-Chung Chen and Igor Kotenko (Eds.), Communications in Computer and Information Science 797, Springer, 2018. http://www.springer.com/series/7899
39 Xiu-Shu Zhang, Fang-Yie Leu*, Ching-Wen Yang, Lai-Shiun Lai, “Healthcare-based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan,” Journal of Medical Systems, vol. 42, issue 3, March, 2018, pp.1-13.(SCI)
40 Vishal Sharma, Ilsun You⁎, Fang-Yie Leu, and Mohammed Atiquzzaman, “Secure and efficient protocol for fast handover in 5G mobile Xhaul networks,” Journal of Network and Computer Applications, vol. 102, January 2018, 38–57.
41 Fang−Yie Leu, Chia−Yin Ko, Ilsun You*, Kim-Kwang Raymond Choo, Chi-Lun Ho, “A Smartphone-Based Wearable Sensors for Monitoring Real-Time Physiological Data,” Computers and Electrical Engineering, vol. 65, January 2018, pp. 376–392. (SCI, IF17=1.084).
42 Kun-Lin Tsai, and Fang-Yie Leu, “Secure Data-sharing using Distributed Environmental Matching Keys,” Pervasive and Mobile Computing, vol. 42, December 2017, pp. 513–525.
43 Fatos Xhafa, Fang-Yie Leu and Li-Ling Hung, Smart Sensors Networks -- Communication Technologies and Intelligent Applications, Edited by Fatos Xhafa, Fang-Yie Leu and Li-Ling Hung, Academic Press (Elsevier), London Wall, London EC2Y 5AS, United Kingdom, May 2017.
44 Fang-Yie Leu, Chia-Yin Ko, Yi-Chen Lin, Heru Susanto, Hsin-Chun Yu, “FALL DETECTION AND MOTION CLASSIFICATION BY USING DECISION TREE ON MOBILE PHONE,” Chapter 10 of the book entitled Smart Sensors Networks -- Communication Technologies and Intelligent Applications, pp. 205-237, May 2017.
45 Jui-Hung Kao, Chien Chan, FeiPei Lai, Bo-Cheng Lin, Wei-Zen Sun, Kuan-Wu Chang, Fang-Yie Leu, Jeng-Wei Lin*, “ Spatial analysis and data mining techniques for identifying risk factors of Out-of-Hospital Cardiac Arrest,” International Journal of Information Management, Vol. 37, Issue 1, Part B, February 2017, pp. 1528-1538. (SCI, IF’18=5.063, 1/89)
46 Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu*, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu, “A Square Key Matrix Management Scheme in Wireless Sensor Networks,” Computing and Informatics, Vol. 36, May 2017, 1001–1017. (SCI, JCR’13=0.319, 121/115)
47 Yao-Chung Fan, Huan Chen, Fang-Yie Leu, Ilsun You*, “Enabling In-Network Aggregation by Diffusion Units for Urban Scale M2M Networks,” Journal of Network and Computer Applications, vol. 93, 1 September 2017, pp. 215–227.
48 Tzu-Chiang Chiang, Pei-Yun Cheng, and Fang-Yie Leu*, “Prediction of technical efficiency and financial crisis of Taiwan’s information and communication technology industry with decision tree and DEA,” Soft Computing, vol. 21, issue 18, September 2017, pp. 5341-5353. (SCI)
49 Fang-Yie Leu, Kun-Lin Tsai*, Yi-Ting Hsiao, and Chao-Tung Yang, “An Internal Intrusion Detection and Protection System by using Data Mining and Forensic Techniques,” IEEE Systems Journal, vol. 11, no. 2, June 2017, pp. 427-438. (SCI,IF’18=4.463)
50 Chao-Tung Yang, Jung-Chun Liu, Wei-Sheng Chen, Fang-Yie Leu and William Cheng-Chung Chu, “Implementation of a virtual switch monitoring system using OpenFlow on cloud,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 24, No. 3, 2017, pp. 162-172. (SCI, JCR’13=0.90, 81/135)
51 Chia-Ping Shen, Feng-Sheng Lin, Andy Yan-Yu Lam, Wei Chen, Weizhi Zhou, Hsiao-Ya Sung, Yi-Huei Kao, Ming-Jang Chiu, Jeng-Wei Lin, Fang-Yie Leu, and Feipei Lai, “GA-SVM modeling of multiclass seizure detector in epilepsy analysis system using cloud computing,” Soft Computing, vol. 21, Issue 8, April 2017, pp 2139–2149.
52 Heru Susanto, Chen Chin Kang and Fang Yie Leu, “A Lesson Learn from IT as Enable of Business Process Re-Design,” Information System and Economics and EJournal, accepted in February 2016.
53 Heru Susanto, Chen Chin Kang and Fang Yie Leu, “Revealing the Role of ICT for Business Core Redesign,” Information System and Economics and EJournal, accepted February 2016.
54 Kun-Lin Tsai*, Fang-Yie Leu and Shun-Hung Tsai, “Data Encryption Method Using Environmental Secret Key with Server Assistance,” Intelligent Automation & Soft Computing, vol. 22, Issue 3, August 2016, pp. 423-430. (SCI)
55 Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, and Ilsun You, “TTP based High-efficient Multi-Key Exchange Protocol,” IEEE ACCESS, vol.4, 2016, pp.6261-6271.
56 Kun-Lin Tsai, Fang-Yie Leu, and Ilsun You*, “Residence Energy Control System Based on Wireless Smart Socket and IoT,” IEEE ACCESS, vol. 4, 2016, pp. 2885-2896.
57 Kun-Lin Tsai, Fang-Yie Leu, and Jiu-Soon Tan, “An ECC-based Secure EMR Transmission System with Data Leakage Prevention Scheme,” International Journal of Computer Mathematics, vol. 93, no. 2, February 2016, pp. 367-383. (SCI, 2014, 0.825)
58 Jia-Chun Lin, Fang-Yie, Leu and Ying-ping Chen, “Impacts of Task Re-execution Policy on MapReduce Jobs,” The Computer Journal, vol. 59, issue 5, 2016, 701-714.
59 Ilsun You, Fang-Yie Leu, “Applied Cryptography and its Practical Applications to Secure Internet Services,” Editorial of Journal of Internet Technology, January 2016.
60 Fuu-Cheng Jiang, Ilsun You and Fang-Yi Leu, “Approaching green Sensor Field using Queue-based Optimization Technique,” Journal of Network and Computer Applications, vol. 66, May 2016, pp. 128–136.
61 Heru Susanto, Leu Fang-Yie, and Chin Kang Chen, “Android vs iOS or Others? SMD-OS Security Issues: Generation Y Perception,” International Journal of Technology Diffusion (IJTD), vol. 7, no. 2, pp. 1-18, 2016.
62 Marek R. Ogiela, Ilsun You, Fang-Yie Leu, and Yu-Chee Tseng, “Secure ubiquitous computing,” Pervasive and Mobile Computing, vol.24, December 2016, pp. 1-3.
63 Fang-Yie Leu*, Chin-Yu Liu, Jung-Chun Liu, Fuu-Cheng Jiang, “S-PMIPv6: an Intra-LMA model for IPv6 Mobility,” Journal of Network and Computer Applications, Vol. 58, December 2015, pp. 180–191.
64 Fang-Yie Leu, Yi-Li Huang, Sheng-Mao Wang, “A Secure M-Commerce System based on credit card transaction,” Electronic Commerce Research and Applications, vol. 14, 2015, pp. 351-360. (SCI, IF=2.135)
65 Fang-Yie Leu, Hsin-Liang Chen, and Chih-Chung Cheng, “Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA,” Journal of Internet Services and Information Security (JISIS), vol. 5, no. 4, November 2015, pp. 1-19.
66 Yi-Li Huang, I-Long Lin, Fang-Yie Leu*, Jung-Chun Liu, Fuu-Cheng Jiang, Cheng-Chung Chu, Chao-Tung Yang, Miao-Heng Chen, “A Secure Authentication System for Controlling Traffic Lights for Ambulances,” Journal of Internet Technology, vol. 16, no. 1, January 2015, pp.19-33. (SCI, JCR’12=0.418, 68/78)
67 Chao-Tung Yang, Wen-Chung Shih, Lung-Teng Chen, Cheng-Ta Kuo, Fuu-Cheng Jiang, Fang-Yie Leu, “Accessing Medical Image File with Co-allocation HDFS in Cloud,” Future Generation Computer Systems, vol. 43-44, February 2015, pp. 61-73. SCI
68 Yi-Li Huang, Cheng-Ru Dai, Fang-Yie Leu, Ilsun You*, “A Secure Data Encryption Method Employing a Sequential-Logic Style Mechanism for a Cloud System,” International Journal of Web and Grid Services, vol. 11, no. 1, January 2015, pp. 102-124. SCI, JCR’13=1.579, 24/105.
69 Ming-Chang Lee, Fang-Yie Leu*, Ying-ping Chen, “Pareto-based Cache Replacement Algorithms for YouTube,” World Wide Web Journal, vol. 18, Issue 6, pp.1523–1540, November 2015. (SCI, JCR’13-1.623, 20/105)
70 Jia-Chun Lin, Fang-Yie Leu, and Ying-ping Chen, “Impact of MapReduce Policies on Job Completion Reliability and Job Energy Consumption,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, issue 5, May 2015, pp. 1364-1378. (SCI, JCR’13=2.173, 10/102)
71 Chia-Yin Ko, Fang-Yie Leu and I-Tsen Lin, “Using smart phone as a track and fall detector: An intelligent support system for people with dementia,” a book chapter of Advanced Technological Solutions for Dementia Patient Monitoring, edited by Fatos Xhafa, Philip Moore and George Tadros, IGI Publisher.
72 Jia-Chun Lin, Fang-Yie Leu, Ying-ping Chen, “Analyzing Job Completion Reliability and Job Energy Consumption for a Heterogeneous MapReduce Cluster under Different Intermediate-Data Replication Policies,” Journal of Supercomputing, vol. 71, Issue 5, pp 1657-1677, May 2015. (SCI, JCR’13=0.841, 47/102)
73 Jia-Chun Lin, Fang-Yie Leu, Ying-ping Chen, ReHRS: A Hybrid Redundant System for Improving MapReduce Reliability and Availability, a book chapter of Springer book Company entitled Modelling and Processing for Next Generation Big Data Technologies and Applications, 2015, 187-209.
74 Jia-Chun Lin, Fang-Yie Leu*, Ying-ping Chen, “PAReS: A Proactive and Adaptive Redundant System for MapReduce,” Journal of Information Science and Engineering, vol. 31, no. 5, pp.1797-1815, Sept. 2015. (SCI, JCR’13=0.333, 128/135)
75 Fang-Yie Leu and Yi-Ting Hsiao, “A Grid System Detecting Internal Malicious Behaviors at System Call Level,” Journal of Internet Services and Information Security (JISIS), vol. 4, no. 4, November 2014, pp. 14-24.
76 Fang-Yie Leu, Fatos Xhafa, Aniello Castiglione and Yi-Li Huang, “EMERGING WIRELESS AND SENSOR NETWORKS AND THEIR APPLICATIONS,” International Journal of Communication Networks and Distributed Systems, vol. 13, nos. 3/4, 2014, pp. 241-243. (EI)
77 Ilsun You, Yi-Li Huang, Fang-Yie Leu, Jung-chun Liu, Lih-Jiun Lo, “A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core,” Journal of Internet Technology, vol.15, no.5, September 2014, pp. 713-726. (SCI, JCR’13=0.418, 68/78)
78 Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen and William Cheng-Chung Chu, “A True Random-Number Encryption Method Employing Block Cipher and PRNG,” Computer Science and Information Systems (ComSIS), vol.11, issue 3, pp.905–924, August 2014. (SCI, JCR’13=0.575, 101/135)
79 Fang-Yie Leu, Jung-chun Liu, Ya-Ting Hsu, Yi-Li Huang, “The Simulation of an Emotional Robot Implemented with Fuzzy Logic,” Soft Computing Journal, September vol. 18, Issue 9, Sept. 2014, pp. 1729-1743. (SCI, JCR’13=1.304, 59/121)
80 Kun-Lin Tsai, Fang-Yie Leu, Tien-Han Wu, Shin-shiuan Chiou, Yu-Wei Liu and Han-Yun Liu “A Secure ECC-based Electronic Medical Record System,” Journal of Internet Services and Information Security, vol. 4, no. 1, February 2014, pp. 47-57.
81 Chin-Ling Chen, Chun-Yi Wu, Fang-Yie Leu and Yi-Li Huang, “Using RFID Yoking Proof to Design a Supply-Chain Applications for Customs Check,” IT CoNvergence PRActice (INPRA), vol. 1, no. 2, June 2013, pp. 34-54.
82 Jia-Chun Lin, Fang-Yie Leu, and Ying-ping Chen, “Analyzing job completion reliability and job energy consumption for a general MapReduce infrastructure,” Journal of High Speed Networks, vol. 19, no. 3, 2013, pp. 203–214. (EI)
83 CHIN-LING CHEN, TSAI-TUNG YANG, FANG-YIE LEU AND YI-LI HUANG, “Designing a Healthcare Authorization Model Based on Cloud Authentication,” Intelligent Automation and Soft Computing, vol. 20, no. 3, pp. 365-379, July 2013. SCI=0.155.
84 Fuu-Cheng Jiang, Hsiang-Wei Wu, Fang-Yie Leu, and Chao-Tung Yang, “Toward green sensor field by optimizing power efficiency using D-policy M/G/1 queuing systems,” Mobile Information Systems, vol. 9, no.3, January 2013, pp.241-260.
85 Fuu-Cheng Jiang, Fang-Yie Leu, Hsiang-Wei Wu, Ching-Hsien Hsu and William Cheng-Chung Chu, “Toward Sustainable Sensor Field by Greener Technique of Optimization with Queue-based Approach,” Journal of Internet Technology, vol.14, no.4, July, 2013, pp. 619-630. (SCI, JCR’12=0.418, 68/78)
86 Yi-Li Huang, Fang-Yie Leu*, Ilsun You, Yao-Kuo Sun, and Cheng-Chung Chu, “A Secure Wireless Communication System Integrating RSA, Diffie-Hellman PKDS, Intelligent Protection-key Chains and a Data Connection Core in a 4G Environment,” Journal of Supercomputing, vol. 67, no.3, March 2014, pp. 635-652. (SCI, JCR’12=0.917, 39/100)
87 Marek R. Ogiela, Ilsun You, Makoto Takizawa, Fang-Yie Leu, (Guest Editorial), “Advances in mobile, ubiquitous and cognitive computing,” Mathematical and Computer Modelling, vol. 58, 2013, pp. 1138-1139.
88 Yi-Li Huang, Fang-Yie Leu, Ko-Chung Wei,“A Secure Communication over Wireless Environments by using a Data Connection Core, Mathematical and Computer Modelling, vol. 58, issue 5-5, September 2013, pp. 1459–1474. (SCI, JCR’12=1.42, 38/247)
89 Fang-Yie Leu , Fuu-Cheng Jiang, Chih-Cheng Lien, Sen-Tarng Lai and Shiuan-You Chiou, “A Rate-allocation Based Multi-path Congestion Control Scheme for Event-Driven Wireless Sensor Networks,” Computer Systems Science and Engineering, vol. 27, no. 5, September 2012, pp. (SCI, JCR-0.371, 88/99)
90 Yi-Li Huang, Chu-Hsing Lin and Fang-Yie Leu*, “A Batch Verification Scheme by using the Matrix-Detection Algorithm,” Journal of Internet Technology, vol. 13, no.4, July 2012, pp. 681-690.( SCI, JCR’12=0.481, 61/78)
91 Fang-Yie Leu, Keng-Yen Chao, Ming-Chang Lee and Jia-Chun Lin “A Semi-preemptive Computational Service System with limited Resources and Dynamic Resource Ranking,” Algorithms, vol. 5, issue 1, March 2012, pp.113-147.
92 Ming-Chang Lee, Fang-Yie Leu, Ying-ping Chen, “PFRF:An Adaptive Data Replication Algorithm based on Star-based Data Grids,” Future Generation Computer Systems, vol. 28, issue 7, July 2012, pp. 1045–1057. (SCI, JCR’12=1.864, 15/100)
93 Fuu-Cheng Jiang, Der-Chen Huang, Chao-Tung Yang and Fang-Yi Leu, “Lifetime Elongation for Wireless Sensor Network using Queue-based Approaches,” Journal of Supercomputing, vol. 59, Issue 3, January 2012, pp. 1312-1335. (SCI, JCR’12=0.917, 39/100)
94 Fang-Yie Leu, (Guest Editorial), “Emerging Security Technologies and Applications,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 3, September 2011, pp.1-3.
95 Yi-Li Huang and Fang-Yie Leu,“Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 3, September 2011, pp. 96-107.
96 Fang-Yie Leu, IlsunYou and Feilong Tang, (Guest Editorial) “Emerging Wireless and Mobile Technologies,” Mobile Information Systems, vol. 7, no. 3, September 2011, pp. 165–167.
97 Yi-Fu Ciou, Fang-Yie Leu, Yi-Li Huang and Kangbin Yim, “A Handover Security Mechanism Employing Diffie-Hellman Key Exchange Approach for IEEE802.16e Wireless Networks,” Mobile Information Systems, vol. 7, no. 3, September 2011, pp. 241–269. (SCI, JCR’11=2.432, 11/135)
98 Fang-Yie Leu, Fenq-Lin Jenq and Fuu-Cheng Jiang, “A Path Switching Scheme for SCTP Based on Round Trip Delays,” Computers and Mathematics with Applications, vol. 62, Issue 9, November 2011, pp. 3504–3523. (SCI, JCR’12=2.069, 11/247)
99 Yi-Fung Huang, Fang-Yie Leu, Chao-Hong Chiu and I-Long Lin, “Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS,” Journal of Universal Computer Science, vol. 17, no. 6, March 2011, pp. 891--911. (SCI, JCR’11=0.398, 85/104)
100 Fang-Yie Leu, Ilsun You and Yao-Tien Huang, “A Coordinated Multiple Channel Assignment Scheme and AP Deployment for Channel Reuse in Metropolitan Scale Wireless Networks,” Journal of Network and Computer Applications, vol. 34, Issue 2, March 2011, pp.632-643. (SCI, JCR’11=1.065, 21/50)
101 Chao-Tung Yang, Fang-Yie Leu, and Sung-Yi Chen, “Resource Brokering using a Multi-site Resource Allocation Strategy for Computational Grids,” Concurrency and Computation: Practice and Experience, vol.23, no. 6, April 2011, pp. 573–594. (SCI, JCR’11=0.636, 64/99)
102 Fang-Yie Leu, Neng-Wen Lo, Lun-Ni Yang, I-Long Lin, “Predicting Vertebrate Promoters Using Heterogeneous Clusters,” International Journal of Ad Hoc and Ubiquitous Computing: a Special Issue on: "Grid and Cloud Computing, Vol. 6, No. 4, September 2010, pp.216–234. (SCI, JCR’11=0.848, 80/135)
103 Li-Wen Liu, Li-Ju Jang, Fang-Yie Leu, Jieh-Jiuh Wang, Shu-Twu Wang, “From an Interdisciplinary Approach to Construct a Model of Community Disaster Management Support System,” Australasian Journal of Disaster and Trauma Studies, Vol. 2-1-2, 2010. (online). http://trauma.massey.ac.nz/issues/2010-2/contents.htm
104 林宜隆,邱獻民,呂芳懌, “數位證據同一性在法庭上之攻擊與防禦─以在網際網路蒐集之數位證據為中心,” 中央警察大學學報第四十七期, 民國99年七月, pp. 363~377.
105 Chao-Tung Yang, Fang-Yie Leu and Sung-Yi Chen, “Network Bandwidth-aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers,” Journal of Supercomputing, vol. 52, no. 3, June 2010, pp. 199-223. (SCI, JCR’11=0.578, 37/50)
106 Fang-Yie Leu, I-Long Lin, “A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach,” Journal of Systemics, Cybernetics and Informatics, vol. 8, no. 2, April 2010, pp. 41-51. (online).http://www.iiisci.org/Journal/sci/Contents.asp?var=&next=ISS8802
107 Fang-Yie Leu, Chau-Tung Yang, Fuu-Cheng Jiang, “Improving Reliability of a Heterogeneous Grid-based Intrusion Detection Platform using Levels of Redundancies,” Future Generation Computer Systems, vol. 26, issue 4, April 2010, pp. 554-568. (SCI, JCR’1 1=1.978,9/99)
108 Fang-Yie Leu and Chih-Chieh Ko, “An Automated Term Definition Extraction System Using the Web Corpus in the Chinese Language,” Journal of Information Science and Engineering, vol. 26, no.2, March 2010, pp. 505-525. (SCI, JCR’11=0.175, 132/135)
109 Chao-Tung Yang, Fang-Yie Leu and Ming-Feng Yang, “A Peer-to-Peer Video File Resource Sharing System for Mobile Devices,” Journal of Internet Technology, vol. 11, no. 1, February 2010, pp.69-78. (SCI, JCR’11=0.508, 57/89)
110 Fang-Yie Leu, “Intrusion Detection, Forecast and Traceback Against DDoS Attacks,” Journal of Information, Technology and Society, vol. 9, December 2009, pp. 19-44.
111 Fang-Yie Leu, Der-Jiunn Deng and, Yi-Fung Huang, “An Efficient Bandwidth-use Scheme over WLAN with the IEEE 802.11e Standard Deploying a Multi-polling Mechanism,” International Transaction on Computer Science and Engineering, vol. 56, no. 1, October 2009, pp. 23-46.
112 Fang-Yie Leu, “A Novel Network Mobility Handoff Scheme Using SIP and SCTP for Multimedia Applications,” Journal of Network and Computer Applications, vol. 32, issue 5, September 2009, pp. 1073-1091. (SCI, JCR’11=1.065, 21/50)
113 Fang-Yie Leu, “An Inner and Incoming Intrusion Detection and Remote Protection System,” International Transaction on Computer Science and Engineering, vol. 55, no. 1, August 2009, pp. 81-96.
114 Fang-Yie Leu, Wen-Chin Wu, and Hung-Wei Huang, “A Routing Assistant Scheme with Localized Movement in Uniformly Distributed Event-driven Wireless Sensor Networks,” The Joint International Conferences on Asia-Pacific Web Conference (APWeb) and Web-Age Information Management (WAIM), April 2009. (Lecture Notes in Computer Science, Springer-Verlag.), pp. 576-583.
115 Fang-Yie Leu and Kai-Wei Hu, “A Real-Time Intrusion Detection System using Data Mining Technique,” Journal of Systemics, Cybernetics and Informatics, vol. 6, no. 2, April 2008, pp.36-41. (online). www.iiisci.org/journal/CV$/sci/pdfs/T171GTB.pdf
116 Fang-Yie Leu, Ming-Chang Li, Jia-Chun Lin and Chao-Tung Yang, “Detection Workload in a Dynamic Grid-based Intrusion Detection Environment,” Journal of Parallel and Distributed Computing, vol.68, issue 4, April 2008, pp.427-442. (SCI, JCR’11=0.859, 40/99)
117 Fang-Yie Leu and Guo-Cai Li, “A Scalable Sensor Network using a Polar Coordinate System,” Signal Processing, vol. 87, issue 12, December 2007, pp.2978-2990. (SCI, JCR’11=1.503, 79/245)
118 Fang-Yie Leu, Yu-Hsin Chen, Ching-Chien Kuan and Dr-Jiunn Deng, “An Improved Bandwidth-use Method on IEEE 802.11e Standard over WLAN,” the IFIP International Conference on Network and Parallel Computing, Dalian China, September 2007. (Lecture Notes in Computer Science, Springer-Verlag.), pp. 183-192.
119 Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, and Jia-Chun Lin, “An Enhanced DGIDE Platform for Intrusion Detection,” The International Conference on Autonomic and Trusted Computing, Hong Kong, China, July 2007, (Lecture Notes in Computer Science, Springer-Verlag.), pp. 559-568.
120 Fang-Yie Leu and Wei-Jie Yang, “Intrusion Detection with CUSUM for TCP-based DDoS,” The First IFIP Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES’05), Nagasaki, Japan, December 6-9, 2005, pp. 1255-1264. (Lecture Notes in Computer Science, Springer-Verlag.), (SCI-E, JCR’05=0.402)
121 Fang-Yie Leu, Shi-Jie Yan and Wen-Kui Chang, “Fuzzy-based Dynamic Bandwidth Allocation System,” Proceedings of 2005 the First International Conference on Natural Computation & the Second International Conference on Fuzzy Systems and Knowledge Discovery , August 2005, pp.911-920. (Lecture Notes in Computer Science, Springer-Verlag.) (SCI-E, JCR’05=0.302)
122 Fang-Yie Leu, et.al., “Face Recognition Using Image database,” TungHai Science Journal, Vol. 1, Nov. 1999.
123 Fang-Yie Leu and S.W.Zhao, “Distributed Database Architecture and its Query Processing,” Journal of TungHai University,Oct. 1997.
124 Fang-Yie Leu, S.K. Chang and C.C. Yang, "A Validation Assistant for a Distributed Office Information System Modeled by Office Procedure Model," Journal of Information Science and Engineering, Vol.11, No.2, June 1995, pp.183-206.
125 Fang-Yie Leu and C.C. Yang, "Automatic Rule Base Inspection for Data-Access Oriented Knowledge-Based Systems," Journal of Information Science and Engineering, Vol.7, No.1, March 1991, pp53-79.
順序 名稱
1 Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu, “Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense,” The 6th International Symposium on Mobile Internet Security, Jeju Island, Dec. 2022, pp.?-?.
2 Lung-Pin Chen, Fang-Yie Leu, Chia-Chen Kuo, Tzu-Ching Lin, and Ming-Jen Wang, “Efficient Weighted and Balanced Resource Allocation for High-Performance Render Farms,” The 17th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2022), 2022, pp. 292-300.
3 Jung-Bin Li, Szu-Yin Lin, Fang-Yie Leu, Yen-Chu Chu, “Stock Price Trend Prediction using LSTM and Sentiment Analysis on News Headlines,” The 17th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2022), 2022, pp. 282-291.
4 Shih-Wei Guo, Tzu-Chi Chen, Hui-Juan Wang, Fang-Yie Leu, and Yao-Chung Fan, “Generating Personalized Phishing Emails for Social Engineering Training based on Neural Language Models,” The 17th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2022), 2022, pp. 270-281.
5 Sen-Tarng Lai, Fang-Yie Leu, “Applying CI/CD Process to Improve the Speed and Critical Quality of Perfective Maintenance,” The 17th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2022), 2022, pp. 259-269.
6 Yu-Syuan Lu, Heru Susanto, and Fang-Yie Leu, “Asymmetric Cryptography Among Different 5G Core Networks,” The 16-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2022), June 29-30, 2022, Kitakyushu, Japan, pp.325-333.
7 Yi-Cheng Jian, Meng-Shao Chung, Heru Susanto, and Fang- Yie Leu, “5GBaseStationScheduling,” The 16-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2022), June 29-30, 2022, Kitakyushu, Japan, pp. 315-324.
8 Shih-Ting Chiu, Heru Susanto, and Fang-Yie Leu, “Detection and Defense of DDoS Attack and Flash Events by Using ShannonEntropy,” The 16-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2022), June 29-30, 2022, Kitakyushu, Japan, pp.307-314.
9 Lung-Pin Chen, Leu-Fang Yei, and Ying-Ru Chen, “An Efficient Disaster Recovery Mechanism for. Multi-region Apache KafkaClusters,” The 16-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2022), June 29-30, 2022, Kitakyushu, Japan, pp.297-306.
10 Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, and Chuan-Tian Wu, “Secure LoRaWAN Root Key Update Scheme for IoT Environment,” Mobile Internet Security, Oct. 7-9, 2021, pp.3-15.
11 Leu Fang Yie, Heru Susanto, Alifya Kayla Shafa Susanto, “Revealing Security Impacts of Extended Spidering and Brute Force Penetration Attack" Future ICT 2022.
12 L.B. Chen, F.Y. Leu,“Efficient Execution of Malleable Applications in Desktop Grids Using Credit Damping,” The 16th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2021), October 28-30, Fukuoka, Japan, pp. 226-233.
13 P.X. Cai, Y.C. Fan, F.Y. Leu, “Compare Encoder-Decoder, Encoder-Only, and Decoder-Only Architectures for Text Generation on Low-Resource Datasets,” The 16th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2021), October 28-30, Fukuoka, Japan, pp. 216-225.
14 L.X. Liu, P.H. Yu, S.J. Wu, F.Y. Leu, H. Susan, “The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks,” The 16th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2021), October 28-30, Fukuoka, Japan, pp. 206-215.
15 S.T. Lai, H. Susanto, F.Y. Leu, “Project Management Mechanism based on Burndown Chart to Reduce the Risk of Software Project Failure,” The 16th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2021), October 28-30, Fukuoka, Japan, pp. 197-205.
16 Yu-Syuan Lu, Fang-Yie Leu and Heru Susanto, “The security mechanism between two UPFs belonging to two 5G core networks,” The 5th International Symposium on Mobile Internet Security (MobiSec 2021), Oct. 7-9, 2021, pp.?-?.
17 Li-Gang Jiang, Yi-Hong Chan, Yao-Chung Fan, and Fang-Yie Leu, “You Draft We Complete: A BERT-based Article Generation by Keyword Supplement,” The 15-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), July 1-3, 2021, Asan, Korea, pp.383-392.
18 Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu, “Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance,” The 15-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), July 1-3, 2021, Asan, Korea, pp.362-372.
19 Lung-Pin Chen, Fang-Yie Leu, Hsin-Ta Chiao, Hung-Jr Shiu, “Efficient Adaptive Resource Management for Spot Workers in Cloud Computing Environment,” The 15-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), July 1-3, 2021, Asan, Korea, pp.373-382.
20 Zhi-Qian Hon, Heru Susanto, Fang-Yie Leu, “A Q-learning based downlink scheduling algorithm for multiple traffics in 5G NR systems,” The 15-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), July 1-3, 2021, Asan, Korea, pp.393-402.
21 Ting-Wei Yeh, Fang-Yie Leu, “Using Object Detection Technology to measure the accuracy of the TFT-LCD printing process by using Deep Learning,” The 9-th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2021), February 25-27, 2021, Chiang Mai, Thailand, pp. 358-369.
22 Li-Ling Hung and Fang-Yie Leu, “A High Sensing Accuracy Mechanism for Wireless. Sensor Networks,” Lecture Notes in Networks and Systems, Volume 159, the 15th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2020), October 28-30, Yonago, Tottori, Japan, pp.275-283.
23 Siang Yun Yoong, Yao-Chung Fan, and Fang-Yie Leu, “On Text Tiling for. Documents: A Neural-Network Approach,” Lecture Notes in Networks and Systems, Volume 159, the 15th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2020), October 28-30, Yonago, Tottori, Japan, pp.265-274.
24 Sen-Tarng Lai and Fang-Yie Leu, “Combining Agile with Traditional Software Development for Improvement Maintenance Efficiency and Quality,” Lecture Notes in Networks and Systems, Volume 159, the 15th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2020), October 28-30, Yonago, Tottori, Japan, pp.254-264.
25 Kun-Lin Tsai, Fang-Yie Leu, Tz-Yuan Huang, and Hao-En Yang, “IoT Device Power. Management Based on PSM and EDRX Mechanisms,” Lecture Notes in Networks and Systems, Volume 159, the 15th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2020), October 28-30, Yonago, Tottori, Japan, pp. 244-253.
26 Shih-Ting Chiu Fang-Yie Leu, “Using CUSUM-Algorithm to Detect DoS and DDoS Attack,” The 23rd International Conference on Network-Based Information Systems (NBiS-2020),August 31-Sept. 2, 2020, Victoria, Canada, pp. 1-9.
27 Szu-Yin Lin, Fang-Yie Leu, Chia-Yin K, Ming-Chien Shih, "A Hybrid Information-based Smartphone Indoor-Position Approach," The 14th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 1-3, 2020, Lodz, Poland, pp. 56-64.
28 Bing-Hong Tsai, Yao-Chung Fan, and Fang-Yie Leu, “Extractive Summarization by Rouge Score Regression based on BERT,” The 14th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2020), July 1-3, 2020, Lodz, Poland, pp. 156-165.
29 Yi-Hsun Lu, Fang-Yie Leu, “Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN Networks,” Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020), Caserta, Italy, April 2020, pp. 1-11.
30 Wei-Sheng Chen, Fang-Yie Leu, “The Study on AUSF Fault Tolerance,” The 8-th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2020), February 24-26, 2020, pp. 406-415.
31 Ping-Jui Chiang, Heru Susanto, Fang-Yie Leu, and Hui-Ling Huang, “Mobile Physiological Sensor Cloud System for Long-Term Care,” the 14th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 7-9, 2019, pp. 698-710.
32 Zhi-Qian Hong, Fang-Yie Leu, and Heru Susanto, “News Collection and Analysis on Public Political Opinions,” the 14th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 7-9, 2019, pp. 688-697.
33 Wei-Sheng Chen, Fang-Yie Leu, and Heru Susanto, “System Implementation of AUSF Fault Tolerance,” the 14th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 7-9, 2019, pp. 678-687.
34 J.-W. Lin, S.-. Liao, F.-Y. Leu, “A Novel Bounded-Error Piecewise Linear Approximation Algorithm for Streaming Sensor Data in Edge Computing,” the 11-th International Conference on Intelligent Networking and Collaborative Systems INCoS-2019, Oita University, Oita, Japan, September 5 - 7, 2019, pp. 123-132.
35 Mei-Yu Wu, Fang-Yie Leu, “MIH and CRRM Handover in Trusted or Untrusted Environments,” The 13-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2019, pp.526-536.
36 Fang-Yie Leu and Jia-Sheng Ho, “Air pollution source identification by using Neural Network with Bayesian Optimization,” The 13-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2019, pp.514-524.
37 Sheng-Zheng Lin, Fang-Yie Leu, “Firewall services provided by Edge Computer under AMF and gNB in 5G environments,” The 13-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2019, pp.503-513.
38 Kun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang, Jiun-Yi Lin, Huei-Tang Luo, “A LoRaWAN based Energy Efficient Data Encryption Method,” The 13-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2019, pp.493-502.
39 Heru Susanto, Fang-Yie Leu, Didi Rosiyadi and Chin Kang Chen, “Revealing Storage and Speed Transmission Emerging Technology of Big Data,” The 33rd IEEE International Conference on Advanced Information Networking and Applications (AINA-2019), Japan, March 2019, pp.571-583.
40 Kun-Lin Tsai, Fang-Yie Leu, and Shuo-Wen Chang, “Self-parameter Based Bilateral Session Key Exchange Method,” the 13th International Conference on Broad-Band Wireless Computing, Communication and Applications, Oct. 27-28, 2018, pp. 611-620.
41 Heru Susanto, Leu Fang-Yie, and Chin Kang Chen, “High Performance Grid Computing: Challenges and Opportunities of High Speed Networking,” the 13th International Conference on Broad-Band Wireless Computing, Communication and Applications, Oct. 27-28, 2018, pp. 597-610.
42 Fang-Yie Leu, Heru Susanto, Ping-Hung Chou, and Jeng-Wei Lin, “Migration of Edge Computing Services in 5G Networks – Firewall as a Service Example,” the 13th International Conference on Broad-Band Wireless Computing, Communication and Applications, Oct. 27-28, 2018, pp. 578-585.
43 Sen-Tarng Lai, Fang-Yie Leu, and Jeng-Wei Lin, “A Banking Chatbot Security Control Procedure for Protecting User Data Security and Privacy,” the 13th International Conference on Broad-Band Wireless Computing, Communication and Applications, Oct. 27-28, 2018, pp. 561-571.
44 Fang-Yie Leu, Chen-Yian Ku, “The Study of MME Pool Management and Fault Tolerance in 5G Networks with SDN Controllers,” 2018 the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2018, pp. 585-595.
45 Fang-Yie Leu, Bin-Horn Chou, “A Study on Firewall Services with Edge Computers of vEPC in 5G Networks,” 2018 the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2018, pp. 576-584.
46 Sen-Tarng Lai, Fang-Yie Leu, “A Micro Service Quality Measurement Model for Improving the Efficiency and Quality of DevOps,” 2018 the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2018, pp. 565-575.
47 Chia-Yin Ko and Fang-Yie Leu, “Analyzing attributes of successful learners by using machine learning in an undergraduate computer course,” The 32nd IEEE International Conference on Advanced Information Networking and Applications (AINA-2018), Krakow, Poland, 2018, pp. 801-806.
48 Zong-Ying Yang, Fang-Yie Leu, “Relay Base-Station Handover in a 5G Environment,” the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 8–10, 2017, Spain, pp. 803-810. (EI)
49 Chien-Hsiang Kao, Fang-Yie Leu, “Predicting Video Stream Fragments in a Reactive Mode Chien-Hsiang Kao, Fang-Yie Leu 4. Relay Base-Station Handover in a 5G Environment,” the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 8–10, 2017, Spain, pp.796-802. (EI)
50 Kun-Lin Tsai, Fang-Yie Leu, Tung-Hung Su, Yi-Chen Chang, “A Light Weight Data Encryption Method for WSN Communication,” the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 8–10, 2017, Spain, pp.788-795. (EI)
51 Sen-Tarng Lai, Fang-Yie Leu, “A Critical Quality Measurement Model for Managing and Controlling Big Data Project Risks,” the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 8–10, 2017, Spain, pp.777-787. (EI)
52 Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu, Xing-You Pan, and Li-Ren Chen, “Generating Dynamic Box by using an Input String,” MobiSec 2017, Jeju Island, Korea, 2017, pp.?-?.. LNCS.
53 Xiu-Shu Zhang, Fang-Yie Leu and Ching-Wen Yang, “Healthcare based on Cloud Electrocardiogram System:A Medical Center Experience in Middle Taiwan,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.473-482.
54 Sen-Tarng Lai and Fang-Yie Leu, “An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.483-492.
55 Chien-Hsiang Kao and Fang-Yie Leu, “Prediction of the Fragment of video streamed to mobile phones under a 5G network base station,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.493-501.
56 Fang-Yie Leu and Chih-Chung Cheng, “MIH-based Congestion Control with Seamless Handover in Untrusted Networks,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.502-512.
57 Po-Yu Tsai, Leu, Fang-Yie, Ilsun You, Hsing-Chun Chen, “ANDSF-based Congestion Control with Seamless Handover to Target AP in Heterogeneous Wireless Networks,” Infocom 2017.
58 Fang-Yie Leu, Guan-Liang Lin, “An MFCC-based Speaker Identification System,” The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017), pp.1055-1062.
59 Hsing-Chung Chen, Chia-Hui Chang, Fang-Yie Leu, “Implement of Agent with Role-based Hierarchy Access Control for Secure Grouping IoTs,” The 5th IEEE CCNC International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2017) 8 January 2017, Las Vegas, USA, pp.120-125.
60 Yi-Li Huang, Fang-Yie Leu, Ilsun You, Rong-Yi Su, Po-Hao Su, Hsing-Chung Chen, “A 3D Encryption with Shifting Mapping Substitution Mechanism,” The 5th IEEE CCNC International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2017) 8 January 2017, Las Vegas, USA, pp.126-131.
61 Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, “Enhancing Security of LTE using a Double Masking Technique,” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp. 747-754. (EI)
62 Cheng-Ying Hsu, Shang-En Yang, Hung-Yuan Chen, Fang-Yie Leu, Yao-Chung Fan, “Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users’ Privacy Concerns” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp. 739-746. (EI)
63 Sen-Tarng Lai and Fang-Yie Leu, “Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality,” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp.731-738. (EI)
64 Kun-Lin Tsai, Fang-Yie Leu and King-Shing Yip, “Device Parameter based Secure User Authentication,” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp. 721-730. (EI)
65 Xia-Yun Guo, Chin-Ling Chen, Chang-Qing Gong and Fang-Yie Leu, “A Secure Official Vehicle Communication Protocol for VANET,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 482-485. (EI)
66 Kun-Lin Tsai, Fang-Yie Leu, Yi-Fung Huang, Chi Yang, Cheng-Hsin Chang, King-Shing Yip, Yuchen Xue, and Guan-Chi Lai, “Cloud Encryption Using Distributed Environmental Keys,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 476-481. (EI)
67 Yi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu, “A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 470-475. (EI)
68 Sen-Tarng Lai and Fang-Yie Leu, “A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and Quality,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 464-469. (EI)
69 Fang-Yie Leu and Yi-Ting Hsiao, “Finite State Machine Based Real Time Scheduling for Microchip,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 458-463. (EI)
70 WooSeok Hyun, Ilsun You, JoungSoon Jang and Fang-Yie Leu, “A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 415-418. (EI)
71 Yi-Li Huang and Fang-Yie Leu, Ilsun You, Hsing-Chung Chen, Chishyan Liaw and Jung-Chun Liu, “Random Cladding with Feedback Mechanism for Encrypting Mobile Messages,” 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, 2016, pp. 970-975. (EI)
72 Chia-Yin Ko and Fang-Yie Leu, “Applying data mining to explore students’ self-regulation in learning contexts,” IEEE 30th International Conference on Advanced Information Networking and Applications, March 2016, pp. 74-78. (EI)
73 Sen-Tarng Lai and Fang-Yie Leu, “Applying Continuous Integration for Reducing Web Applications Development Risks,” International Conference on Broadband and Wireless Computing, Communication and Applications, Krakow, Poland, November 4-6 November 2015, pp. 386-391. (EI)
74 Fang-Yie Leu and Sheng-Chieh Chuang, “Establishing a Routing Path with Redundant Link Minimization in Wireless Sensor Networks,” International Conference on Broadband and Wireless Computing, Communication and Applications, Krakow, Poland, 4-6 November 2015, pp. 380-385. (EI)
75 Kun-Lin Tsai, MengYuan Ye and Fang-Yie Leu, “Secure Power Management Scheme for WSN,” The ACM Conference on Computer and Communications Security (CCS)/ Managing Insider Security Threats (MIST) 2015, Denver, USA, 12-16 October 2015, pp. 63-68 (poster). (EI)
76 Chi-Lun Ho, and Fang-Yie Leu, “A Wireless Physiological Sensor Area Network,” International Conference on Network-Based Information Systems, Taipei Taiwan, 2-4 September 2015, pp.14-19. (EI)
77 Tien-Sheng Lin, I -Long Lin and Fang-Yie Leu, “Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Regional University of Blumenau (FURB), Blumenau Brazil, 8-10 July 2015, pp.420-425. (EI)
78 Sen-Tarng Lai and Fang-Yie Leu, “A Security Threats Measurement Model for Reducing Cloud Computing Security Risk,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Brazil, 8-10 July 2015, pp.414-419. (EI)
79 Yu-Jen Chang, Fang-Yie Leu, Shih-Chieh Chen and Hei-Lam Wong, “Applying Web Crawlers to Develop a Sale Management System for Online Malls,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Brazil, 8-10 July 2015, pp. 408-413. (EI)
80 Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu and Fang-Yie Leu, “An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Brazil, 8-10 July 2015, pp. 403-407. (EI)
81 Ming-Chang Lee, Fang-Yie Leu, and Ying-ping Chen, “ReMBF: A Reliable Multicast Brute-Force Co-Allocation Scheme for Multi-user Data Grids,” The 39th Annual International Computers, Software & Applications Conference, Taichung Taiwan, 1-5 July 2015, pp.774-783. (EI)
82 Chin-Yu Liu, Fang-Yie Leu, Ilsun You, Aniello Castiglione and Francesco Palmieri, “The Untrusted Handover Security of the S-PMIPv6 on LTE-A,” 6th IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2015), April 2015, pp.161-166. (EI)
83 Chin-Yu Liu, Fang-Yie Leu, Ilsun You, Aniello Castiglione and Francesco Palmieri, “Heterogeneous network handover using 3GPP ANDSF,” The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015), Gwangju, Korea, March 25-27, 2015, pp. 171-175. (EI)
84 Fang-Yie Leu and Yi-Ting Hsiao, "A Grid System Detecting Internal Malicious Behaviors at System Call Level," The 6th International Workshop on Managing Insider Security Threats, 2014, pp. 14-24.
85 Chia-Yin Ko, Fang-Yie Leu and I-Tsen Lin, “Using Smart Phone as a Track and Fall Detector for People with Dementia,” International Conference on Broadband and Wireless Computing, Communication and Applications, 2014, pp. 306-311. (EI)
86 Fang-Yie Leu, Jung-Chun Liu and Hsin-Liang Chen, “Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA,” International Conference on Broadband and Wireless Computing, Communication and Applications, 2014, pp. 300-305. (EI)
87 Sen-Tarng Lai, Fang-Yie Leu, Chao-Tung Yang and William Cheng-Chung Chu, “Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements,” International Conference on Broadband and Wireless Computing, Communication and Applications, 2014, pp. 291-299. (EI)
88 Fang-Yie Leu, Jung-Chun Liu and Chin-Yu Liu, “S-PMIPv6: Efficient Handover in Proxy Mobile IPv6 Domain by using SCTP,” International Conference on Broadband and Wireless Computing, Communication and Applications, 2014, pp. 287-291. (EI)
89 Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang, “Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters,” The 9th International Conference on Availability, Reliability and Security, 2014, pp. 166–171. (EI)
90 Ming-Chang Lee, Fang-Yie Leu, and Ying-ping Chen, “Evaluating Response Time and Reliability of Co-Allocation Schemes from Multi-User Perspectives on a Star-Topology Data Grid,” The 6th International Conference on Intelligent Networking and Collaborative Systems, 2014, pp. 242-248. (EI)
91 Yi-Li Huang, Shih-Han Chen, Fang-Yie Leu, Chia-Yin Ko, Jung-Chun Liu, “An efficient traffic control system with emergency handling for ambulances,” The 6th International Conference on Intelligent Networking and Collaborative Systems, 2014, pp. 356-361. (EI)
92 Yi-Li Huang, Sheng-Mao Wang, Fang-Yie Leu, Jung-Chun Liu, and Chia-Yin Ko, “A secure mobile shopping system based on credit card transaction,” The 6th International Conference on Intelligent Networking and Collaborative Systems, 2014, pp. 336-341. (EI)
93 Kun-Lin Tsai, Jiu-Soon Tan, Fang-Yie Leu and Yi-Li Huang, “A Group File Encryption Method using Dynamic System Environment Key,” The International Conference on Network-Based Information Systems (NBiS), 2014, pp. 476-483. (EI)
94 Sen-Tarng Lai, Fang-Yie Leu and WilliamCheng-Chung Chu, “A Multi-Layer Secure Prevention Scheme for Improving E-commerce Security,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.505-510. (EI)
95 Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu, “A secure authentication scheme of health care based on the cloud,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.499-504. (EI)
96 Kun-Lin Tsai, Fang-Yie Leu, Yi-Li Huang, Jiu-Soon Tan and MengYuan Ye, “High-efficient Multi-Key Exchange Protocol based on Three-party Authentication,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.487-492. (EI)
97 Lung-Pin Chen, Chih-Wei Hsieh and Fang-Yie Leu, “Minimum Cost Content Object Reconstruction in Multi-Tier Servers,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.523-528. (EI)
98 I-Long Lin, Yun-Sheng Yen, and Fang-Yie Leu, “Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP and ISO27037 SOP,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.511-516. (EI)
99 Ming-Chang Lee, Fang-Yie Leu, and Ying-ping Chen, “Cache Replacement Algorithms for YouTube,” The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), May 2014, pp. 743-750. (EI) – Conference Best Paper Award
100 Jia-Chun Lin, Fang-Yie Leu, Ying-ping Chen and Waqaas Munawar, “Impact of MapReduce Task Re-execution Policy on Job Completion Reliability and Job Completion Time,” The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), May 2014, pp. 712-718. (EI)
101 Fang-Yie Leu*, Yi-Ting Hsiao, “A Real-Time Intrusion Detection and Protection System on System Call Level by using Data Mining and Profiling Techniques Under the Assistance of a Grid,” The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014), April 2014, pp.375-385. (EI)
102 Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Ilsun You, Kangbin Yim, Jian-Hong Chen, “A Random Wrapping Encryption Method,” International Workshop on Mobility Management in the Networks of the Future World, January 2014, pp.353-358. (EI)
103 Chin-Ling Chen, Wei-Chen Tasi and Fang-Yie Leu, “Improve Two Remote User Authentication Scheme Using Smart Card,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 404-407. (EI)
104 Sueming Hsu, Yalan Chan, Kai-I Huang and Fang-Yie Leu, “An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan’s Senior Care Market: A Case Study of Fitness Equipment Industry,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 378-381. (EI)
105 Sen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu, “A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 366-371. (EI)
106 Yu-Shin Huang, Fang-Yie Leu and Yi-Li Huang, “A handover scheme for LTE based on the assistance of GPS,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp.399-403. (EI)
107 Yi-Li Huang, Fang-Yie Leu, Jung-chun Liu, Lih-Jiun Lo,William Cheng-Chung Chu, “A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 360-365. (EI)
108 Ya-Ting Hsu, Fang-Yie Leu, Jung-chun Liu, Yi-Li Huang, “The Simulation of an Emotional Robot Implemented with Fuzzy Logic,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 382-386. (EI)
109 Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, and Alfredo De Santis, “Analyzing the Internet Stability in Presence of Disasters,” The 8th International Conference on Availability, Reliability and Security, Regensburg, Germany, September 2-6, 2013, pp.253-268. (EI)
110 Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu*, Feng-Ching Chiang, Chao-Tung Yang, and William Cheng-Chung Chu “A Multiple-key Management Scheme in Wireless Sensor Networks,” The 8th International Conference on Availability, Reliability and Security, Regensburg, Germany, September 2-6, 2013, pp.337-344. (EI)
111 Ming-Chang Lee, Fang-Yie Leu, Ying-ping Chen, “TSR: Topology Reduction from Tree to Star Data Grids,” The Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013, pp.678-683. (EI)
112 Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, Cheng-Chung Chu, Chao-Tung Yang, “A True Random-Number Encryption Method,” The Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013, pp.654-659. (EI)
113 Yi-Li Huang, Fang-Yie Leu, Yao-Kuo Sun, Cheng-Chung Chu, Chao-Tung Yang, “A Secure Wireless Communication System by Integrating RSA and Diffie-Hellman PKDS in 4G Environments and an Intelligent Protection-key Chain with a Data Connection Core,” the IEEE International Symposium on Industrial Electronics, 2013, pp.1-6. (EI)
114 Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang, Chih-Wei Yu, Cheng-Chung Chu, Chao-Tung Yang, “Building a block cipher mode of operation with feedback keys,” the IEEE International Symposium on Industrial Electronics, 2013, pp.1-4.(EI)
115 Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang, “Building a block cipher mode of operation with Dual keys,” The Asian Conference on Availability, Reliability and Security (AsiaARES 2013). Lecture Notes of Computer Science – LNCS 7804, March 2013, pp. 392-398. (EI)
116 Jia-Chun Lin, Fang-Yie Leu, Ying-ping Chen, “Deriving Job Completion Reliability and Job Energy Consumption for a General MapReduce Infrastructure from Single-Job Perspective,” the IEEE International Conference on Advanced Information Networking and Applications, March 2013, Barcelona, Spain, pp. 1642-1647. (EI)
117 Fang-Yie Leu, IlSun You, Yi-Li Huang, Kangbin Yim, Cheng-Ru Dai, “Improving Security Level of LTE Authentication and Key Agreement Procedure,” the International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2012), December 2012, pp. 1032-1036. (EI)
118 Fang-Yie Leu, Yi-Li Huang, Chien-Nan Chen, “The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link,” the IEEE International Workshop on Cloud, Wireless and e-Commerce Security, November 12-14, 2012, Victoria, Canada, pp.452~457. (EI)
119 Fang-Yie Leu, Miao-Heng Chen, Yi-Li Huang, Chung-Chi Lin, “Controlling Traffic Lights for Ambulances,” the International Workshop on Cloud, Wireless and e-Commerce Security, November 12-14, 2012, Victoria, Canada, pp.462~467. (EI)
120 Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai, “A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation,” International Workshop on Security and Cognitive Informatics for Homeland Defense, August 2012, pp.578-592. Lecture Notes of Computer Science – LNCS 7465. (EI)
121 Ko-Chung Wei, Yi-Li Huang, Fang-Yie Leu, “A Secure Communication over Wireless Environments by using a Data Connection Core,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, Palermo, Italy, 4-6 July 2012, pp.570-575 . (EI)
122 Fang-Yie Leu, Ming-Chang Lee, Ying-ping Chen, “Improving Data Grid Performance by using Popular File Replicate First Algorithm,” The IEEE International Workshop on Cloud, Wireless and e-Commerce Security, October 24-26. 2011, Barcelona, Spain, pp. 416~421.(EI)
123 Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang, “A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks,” International Workshop on Security and Cognitive Informatics for Homeland Defense, August 2011, pp.255-270. Lecture Notes of Computer Science – LNCS-67908 (EI)
124 Fenq-Lin Jenq, Tang-Jen Liu and Fang-Yie Leu, “An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2011, June/July 2011, Seoul Korea, pp.589- 593 . (EI)
125 Fang-Yie Leu, and Keng-Yen Chao, “A Semi-preemptive Ad Hoc Wireless Cloud Service System with limited Resources to Support Node Mobility,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2011, June/July 2011, Seoul Korea, pp.577-582 . (EI)
126 Fang-Yie Leu, and Kuo-Chi Liang, “A Location-based Handoff Scheme based on IEEE 802.21 in Heterogeneous Wireless Networks,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2011, June/July 2011, Seoul Korea, pp. 571-576 . (EI)
127 Fang-Yie Leu and Shiuan-You Chiou, “A Rate-allocation Based Multi-path Congestion Control Scheme for Event-Driven Wireless Sensor Networks,” the International Conference on Data Compression, Communications and Processing, June 2011, Italy, pp. 293-298. (EI)
128 Yi-Li Huang, Chu-Hsing Lin, and Fang-Yie Leu, “Verification of a Batch of Bad Signatures by using the Matrix-Detection Algorithm,” the International Conference on Data Compression, Communications and Processing, June 2011, Italy, pp. 299-306. (EI)
129 Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu, “Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM Environment without Prior Authentication Connection,” The IEEE International Workshop on Cloud, Wireless and e-Commerce Security, Nov. 2010, Fukuoka, Japan, pp. 441- 446. (EI)
130 Fang-Yie Leu and Hung-Wei Huang, “An Event-Driven Mobile Assistant Control Protocol for Wireless Sensor Networks,” the IEEE International Symposium on Frontiers in Ubiquitous Computing, Networking and Applications, Sept., 2010, Takayama, Japan, pp. 521-526. (EI)
131 Fang-Yie Leu and Pei-Shiun Liu, “A Channel Assignment and AP Deployment Scheme for Concentric-Hexagon based Multi-Channel Wireless Networks,” the IEEE International Symposium on Frontiers in Ubiquitous Computing, Networking and Applications, Sept., 2010, Takayama, Japan , pp. 504-509. (EI)
132 Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu, “Improving security levels of IEEE802.16e authentication by Involving Diffie-Hellman PKDS,” the International Conference on Complex, Intelligent and Software Intensive Systems, Feb. 2010, Krakow, Poland , pp. 391-397. (EI)
133 Yi-Fung Huang, Ko-Chung Wei, Fang-Yie Leu, “Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering Without Certificate Authorities,” the International Conference on Complex, Intelligent and Software Intensive Systems, Feb. 2010, Krakow, Poland, pp. 384-390. (EI)
134 Fang-Yie Leu and Yong-Lon Chen, “A Path Switching Scheme for SCTP Based on Round Trip Delay and under the Assistance of Network Management Schemes,” the International Conference on Computer Science and its Applications, Dec. 2009, Jeju, Korea, pp. 103-108. (EI)
135 Fang-Yie Leu, Yao-Tien Huang, “A Coordinating Multiple Channel Assignment Scheme and AP Deployment in A Wireless Network,” The 2009 IEEE/IFIP International Symposium on Embedded and Pervasive Systems, Vancouver, Canada, August 2009, pp. 440-445. (EI)
136 Fang-Yie Leu and Zhi-Yang Li, “An Inner DoS/DDoS Attack Detection System,” the 6th International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA 2009), July 2009, Florida, USA, pp.41-46.
137 Fang-Yie Leu and Zhi-Yang Li, “Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System,” the Fifth International Conference on Information Assurance and Security, August 2009, Xian, China, pp. 255-258. (EI)
138 Fang-Yie Leu and Chia-Chi Pai, “Detecting DoS&DDoS Attacks Using Chi-Square,” the Fifth International Conference on Information Assurance and Security, August 2009, Xian, China, pp. 251-254. (EI)
139 Chao-Tung Yang, Fang-Yie Leu, and Sung-Yi Chen, “Network Bandwidth-aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers,” International Conference on Asia-Pacific Services Computing Conference, 2008, pp. 775-780. (EI)
140 L.W. Liu and Fang-Yie Leu, “Use of GIS and Data Mining Techniques in the Designing of Community-Based Services for the Elderly,” The International Conference on the Gerontological Society of America’s 61th Annual Meeting, Washington DC, November 2008.
141 Fang-Yie Leu, and Yao-Tien Huang, “Software Tools Developed and Employed for Survey on Central Taiwan Science Park and Data Analyses,” International Conference on Territorial Intelligence, Besancon, Oct. 2008.
142 Fang-Yie Leu, Shu-Ren Lee Modeling and Simulation of Energy Producing Process of Fats Metabolism by Using Petri Nets,” International Conference on Computer Graphics and Image and Multimedia Processing, 2008.
143 Fang-Yie Leu, Guo-Cai Li and Wen-Chin Wu, “An Autonomous Energy-Aware Routing Scheme: a Supplementary Routing Approach for Path-Preserving Wireless Sensor Networks,” The IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2008, pp.49-60.
144 Fang-Yie Leu, Zhen-Jia Ko, “A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia Applications,” International Conference on Intelligent Multimedia Information System, 2008. pp.564-569. (EI)
145 Fang-Yie Leu and Yu-Ting Huang, “Maximum Capacity in Chain-Topology Wireless Mesh Networks,” Wireless Telecommunications Symposium, CA, 2008, pp. 250-259. (EI)
146 Fang-Yie Leu, “Analyzing Survey Data Concerning the Construction of Central Taiwan Science Park using Association Rules and Geographical Information Systems,” International Conference on Territorial Intelligence, Huelva, Spain, Oct. 2007.
147 Fang-Yie Leu and Chih-Chieh Ko, “An Automated Term Definition Extraction using the Web Corpus in Chinese Language,” the IEEE International Conference on Natural Language Processing and Knowledge Engineering, Beijing China, August/September 2007, pp. 435-440. (EI).
148 Fang-Yie Leu and Kai-Wei Hu, “A Real-Time Intrusion Detection System using Data Mining and Forensic Techniques,” the International Workshop on Security, October 2007, pp.137-152.
149 Fang-Yie Leu and Kai-Wei Hu, “A Real-Time Intrusion Detection and Identification System on Command-Line-Interface Computers using Data Mining and Forensic Techniques in an Intranet,” the International Conference on Computing, Communications and Control Technologies, Florida USA, July 2007, pp. 148-153.
150 Fang-Yie Leu, and Kuo-Wei Lee, “A Transmission Cost Model of Data Retrieval from a Cluster System on an One-Node One-Fragment, One-Node One-Task and Random Allocation Environment using no Global Directory,” the World Multi-Conference on Systemics, Cybernetics and Informatics, Florida USA, July 2007, pp. 112-116.
151 Fang-Yie Leu, Yu-Hsin Chen, Ching-Chien Kuan, “An Efficient Bandwidth-using Scheme over WLAN with IEEE 802.11e Standard,” the IEEE International Workshop on Broadband Convergence Networks, Munich Germany, May 2007. (EI)
152 Fang-Yie Leu and Tai-Shiang Wang, “Data Analysis Using GIS and Data Mining,” International Conference on Territorial Intelligence, Alba Iulia, Romania, Oct. 2006.
153 Fang-Yie Leu, Ming-Chang Li, and Jia-Chun Lin, “Intrusion Detection based on Grid,” International Multi-Conference on Computing in the Global Information Technology, Romania, Aug. 2006, pp. 62-67.
154 Fang-Yie Leu and Tai-Shiang Wang, “Integrating Mobile Agents with a Wireless Grid Platform,” the IEEE-ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, June 2006, pp. 139-144.
155 Fang-Yie Leu, Ming-Chang Li, Jia-Chun Lin, “An Intrusion Detection System on Dynamic Detection Environment,” International Conference on Computational Science and Its Applications, May 2006.
156 L.W. Liu, R.M. Tsay, J. Shiang and Fang-Yie Leu, “Promoting Technical Innovation: The Application of GIS for In-Home Services,” the Fourth National Gerontological Social Work Conference, Chicago, Illinois, February 16 – 19, 2006.
157 Fang-Yie Leu and Wei-Jie Yang, “CUSUM Intrusion Detection & Traceback System,” The International Forensic Science Symposium, Taipei, Taiwan, Nov. 2005.
158 Fang-Yie Leu and Kai-Wai Hu, “A Real-Time Intrusion Detection and Identification System with Data Mining and Forensic Techniques,” The International Forensic Science Symposium, Taipei, Taiwan, Nov. 2005.
159 Fang-Yie Leu, Neng-Wen Lo, Lun-Ni Yang, “Predicting Vertebrate Promoters with Homogeneous Cluster Computing,” The International Conference on Signal-Image Technology &Internet–Based Systems, Yaound? Cameroon, Nov. 2005, pp. 143-148.
160 Fang-Yie Leu, Ching-Chien Kuan, Der-Jiunn Deng and Yu-Hsin, Chen, “Guaranteed Non Dropping Mechanism Deploying IEEE802.11e Standard,” The International Conference on Signal-Image Technology & Internet–Based Systems, Yaound? Cameroon, Nov. 2005, pp. 170-175.
161 Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang , “A Performance-Based Grid Intrusion Detection System,” Proceedings of the 29th International Computer Software and Applications Conference (COMPSAC 2005), Edinburgh, Scotland, July 26-28, 2005. (EI)
162 Hsiao-Hong Tsai, Fang-Yie Leu and Wen-Kui Chang, ”Distributed SendBox Scheme for Mobile Agent Communication,” 2005 IEEE the 4th International Conference on Mobile Business(ICMB 2005), Sydney, Australia, July 2005. (EI), pp. 545-550.
163 Fang-Yie Leu, Ching-Chien Kuan, Dr-Jiunn Deng and Wen-Kui Chang, “Quality of Service for Voice over Wireless LAN by Deploying Multipolling in IEEE802.11e Standard,” 2005 IEEE International Symposium on Multimedia Over Wireless. (EI)
164 Fang-Yie Leu and Wei-Jie Yang, “IFTS: Intrusion Forecast and Traceback based on Union Defense Environment,” the 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), July 20-22, 2005, pp. 716- 722. (EI)
165 Hsiao-Hong Tsai, Fang-Yie Leu and Wen-Kui Chang, “Mobile Agent Communication Using SIP,” IEEE 2005 International Symposium on Applications and the Internet (SAINT2005), Trento, Italy, January 2005, pp.274-279. (EI)
166 Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Bo-Qi Shi, “Integrating Grid with Intrusion Detection,” the IEEE 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei Taiwan, March 2005, pp.304-309. (EI)
167 Leu, Fang-Yie and Yao-Chung Fan, “Compressing an Inverted File with LCS,” IEEE COMPSAC 2004, Sept., 2004, Hong Kong, pp.60-61. (EI)
168 呂芳懌,楊惟傑,林佳純,李明昌,“網路安全分析與趨勢” 2004年資訊科技與人文管理教育論壇-數位內容數位教育與管理政策研討會,2004年7月, pp.277-293.
169 Leu, Fang-Yie and Yao-Chung Fan, “Dealing with the Structure of Real World Graphs,” The 2nd International Conference on Computer Science and its Applications (ICCSA-2004), June 2004, California, USA, 2004, pp.40-49.
170 F.Y. Leu and K.W. Lee, “Transmission Cost Models of Data-Retrieval based on Specific Data Allocations without Directory on Cluster Systems,” In the Proceedings of the 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004), Orlando, USA, 2004, pp.167-172.
171 Leu, Fang-Yie and Yao-Chung Fan, “Compressing a Directed Massive Graph using Small World Model,” IEEE Data Compression Conference, March 2004.Poster.
172 呂芳懌,楊惟傑,鄭真真,洪嘉鴻,”UDIFT:具預警功能與入侵追蹤之區域聯防系統,” 2003年「網際空間:科技、犯罪與法律社會」學術研究暨實務研討會,12月,2003年,pp.140-148。
173 呂芳懌,鄭真真,洪嘉鴻,管清健,林佳純,李明昌,”以分散式平行入侵偵測系統從事區域聯防, 2003年「網際空間:科技、犯罪與法律社會」學術研究暨實務研討會,12月,2003年,pp.129-139。
174 F.Y. Leu and T.Y. Yang, ”A Host-Based Real-Time Intrusion Detection System with Data Mining and Forensic Techniques,” IEEE 2003 International Carnahan Conference on Security Technology,Taiwan,ROC,Oct. 14-16, 2003, pp.580-586.
175 呂芳懌,洪嘉鴻,鄭真真,”UDAIDTS:以Hash為基礎的主動式區域聯防入侵偵測與追蹤系統,” 第十四屆國際資訊管理學術研討會,2003年7月12日,pp.1090-1097.
176 呂芳懌,顏義樺,”以聯想法則概念網路為基礎之文章概念探索及相似比對,” 第十四屆國際資訊管理學術研討會,2003年7月12日,pp.330-336.
177 呂芳懌,顏義樺,” 以事件聯想為基礎之文章相似性比對 ,” 2003年資訊技術應用與發展研討會,2003年6月28日,pp.61-67.
178 呂芳懌,施政瑋,”以詞義概念為基礎的文件檢索與比對,” 2003年資訊技術應用與發展研討會,2003年6月28日,pp.667-673.
179 呂芳懌,蘇俊維,許惟翔,” 內部網路安全威脅分析與防制,” 2003年電子商務與數位生活研討會,2003年4月11-12日, pp.166-166(摘要,本文在光碟片中未編頁碼)。
180 呂芳懌,黃品璁,楊子逸,胡凱威,“低負載隱形式網路異常偵測器,” 2003年電子商務與數位生活研討會,2003年4月11-12日, pp.165-165(摘要,本文在光碟片中未編頁碼)。
181 呂芳懌,楊子逸,“IIS伺服器漏洞剖析與防備,”第四屆2002年網際空間:資訊、法律與社會,2002年11月29日。
182 呂芳懌, 黃文鴻, “能提供及追蹤行車最短路徑之分散式系統,”2002中華地理資訊學會暨學術研討會,2002年9月
183 呂芳懌,蘇俊維,”網路入侵與防禦策略探討,”第三屆網際網路應用與發展研討會,2002年5月
184 呂芳懌,顏義樺,施政瑋,”以網頁特性為基礎之重要性排名,’ 2002年第六屆資訊管理學術及警政資訊實務研討會,2002年5月, pp.489-495.
185 呂芳懌,歐建暉,邱維埠, ”大學校園寬頻網路運用研究—東海數位村—寬頻網路監測,”,2002年電子商務與數位生活研討會,2002年3月, pp.489-495。
186 呂芳懌,顏義樺,施政瑋,”探查疑似不法資訊網站之分散式網路巡邏系統,’ 2001年網際空間:資訊、法律與社會,2001年12月24日。
187 呂芳懌,楊子逸,“IIS網頁伺服器Unicode漏洞探討,”第五屆資訊管理學術及警政資訊實務研討會,2001年6月。
188 呂芳懌,林晁立, “以臉部器官形狀、寬度、相對位置從事人臉影像辨識,” 第十一屆物件導向技術及應用研討會,2000年九月。
189 呂芳懌,林厚誼, “物件導向竊盜犯罪案件相似性比對,” 第十一屆物件導向技術及應用研討會,2000年九月。
190 呂芳懌, 黃文鴻, “協助查詢有地緣關係之前科犯資訊的地理資訊系統,”第四屆資訊管理學術及警政資訊實務研討會,2000年5月,pp.115-123。
191 呂芳懌, 黃文鴻, “協助查詢有地緣關係之前科犯資訊的地理資訊系統,” 大業學報,第九卷,第一期,八十九年。
192 呂芳懌等, “影像資料庫在人臉辨識上的應用—前科犯資料庫,” 東海科學第一捲,東海大學,中華民國八十八年七月。
193 呂芳懌, 林厚誼, “協助犯罪偵察之前科犯資料庫績效品質改善,”第三十五屆品質管制研討會, 中華民國八十八年十一月.
194 呂芳懌,余少棠,許閔雄,林晁立,蔡清欉 “影像資料庫在人臉辨識上的應用—前科犯資料庫,”,第十屆國際資訊管理學術研討會,1999年6月,台灣台北pp.863-870
195 呂芳懌,林厚誼,黃文鴻,邱聖斌,朱峻德,龔俊杰 “文字資料庫在犯罪偵察之應用—竊盜犯罪手法之比對,”, 第十屆國際資訊管理學術研討會,1999年6月,台灣台北pp.935-943
196 Fang-Yie Leu(呂芳懌),Shiang-Wei Chao,Dec.1997,“A Distributed Database Architecture and its Query,” Proceedings of National Computer Symposium 1997, Taiwan, pp. A38-A42.
197 F.Y. Leu and S.W.Zhao, “The Query and Integration Algorithms in a Distributed Database, “Proceeding of the 14th Workshop on Combinatorial Mathematics and Computation Theory, Taichung, Taiwan, June 1997, pp.114-117.
198 呂芳懌 資料庫之管理 人力與發展雜誌 第二十七~二十九期 中華民國八十五年四~六月
199 呂芳懌 資料庫之應用 人力與發展雜誌 第二十六期 中華民國八十五年三月
200 呂芳懌 資料庫相關人員 人力與發展雜誌 第二十五期 中華民國八十五年二月
201 呂芳懌 資料庫管理人員之角色 人力與發展雜誌 第二十四期 中華民國八十五年一月
202 呂芳懌 資料庫之功能 人力與發展雜誌 第二十三期 中華民國八十四年十二月
203 呂芳懌 資料庫之演進 人力與發展雜誌 第二十二期 中華民國八十四年十一月
204 呂芳懌 資料表示法 人力與發展雜誌 第二十一期 中華民國八十四年十月
205 呂芳懌 資料庫與生活 人力與發展雜誌 第二十期 中華民國八十四年九月
206 F.Y. Leu and C.C. Yang, "Rule Base Inspection Using Algorithmic Approach for Data-Access Oriented Knowledge-Based Systems," IEEE COMPSAC, Chicago, 1990, pp.155-160.
207 F.Y. Leu and S.K. Chang, "An Internal Protocol Assistant for Distributed Systems," Proc. of SPIE Conference, Orlando, FL, 1991.
208 楊鍵樵,呂芳懌,"智慧型網管系統資料庫之研究與雛型系統之開發之研究",資策會委託研究計畫,中華民國八十四年六月
209 楊鍵樵,呂芳懌,連志誠等 "支援智慧型網路管理系統之物件導向資料庫雛形系統"INTC '95,台北,中華民國八十四年十月
210 F.Y. Leu, "An Internal Inspection of a Distributed Office Information System" Ph.D Dissertation of National Taiwan Institute of Technology, Taipei, Taiwan, ROC, July 1991.
順序 名稱
1 Heru Susanto, Fang-Yie Leu, Chin-Kang Chen, Fadzlinati Mohiddin,Managing Human Capital in Today s Globalization: A Management Information System Perspective,2019-10,Apple Academic Press, Tailor & Francis Group.
2 Heru Susanto, Leu Fang-Yie, Chin Kang Chen,Business Process Reengineering -- An ICT Approach,2019-04,Apple Academic Press.
3 Heru Susanto, Leu Fang-Yie and Chin Kang Chen,The Emerging Technology of Big Data-- Its Impact as a Tool of ICT Development,2018-04,Apple Academic Press.
4 Fatos Xhafa, Fang-Yie Leu, Li-Ling Hung (編輯者),Smart Sensors Networks -- Communication Technologies and Intelligent Applications,2017-05,Academic Press (Elsevier).
5 張文貴 呂芳懌,軟體開發技術文件—指引手冊,2002年,經濟部工業局。
6 張文貴 呂芳懌,軟體規劃與維護技術文件—指引手冊,2002年,經濟部工業局。
7 呂芳懌等,計算機概論與基礎資訊教育,2001年,全華科技圖書公司。
8 呂芳懌,MS-DOS使用手冊,1986年,全華科技圖書公司。
9 呂芳懌,MD-150自動控制使用手冊,1984年,全華科技圖書公司。
順序 名稱
1 發明人與專利權人: 黃宜豊 呂芳懌 林正基, “具有三維運算、反饋控制與動態置換盒設計的加密方法” 發明第I 459784號,2014/11/1-2032/1/5
2 發明人與專利權人: 黃宜豊 呂芳懌, “在無線/有線環境下安全金鑰交換的方法” 發明第I 434577號,2014/4/11-2030/9/29
3 發明人與專利權人:黃宜豊 呂芳懌, “具有動態金要雙向認證之無線通訊方法” 發明第I 425845號,2014/2/1-2030/2/1
4 發明人與專利權人:呂芳懌 黃耀田, “部署基地台之方法” 發明第I 415485號,2013/11/11-2029/7/30
順序 計畫名稱 計畫所屬機構 計畫編號 計畫日期
1 緊密耦合卸載與大象流/老鼠流卸載之連線安全與QoS之研製 科技部計畫 MOST 108-2221-E-029-009- 108/08/01
2 行動寬頻課程推廣計畫--智慧基站與行動計算 教育部計畫 107/12/01
3 5G網路VPN、NAT、防火牆/IDS/IPS之服務方式及傳遞頻寬改善之研究 科技部計畫 107-2221-E-029-010- 107/08/01
4 在SCTP通訊協定下以ANDSF與MIH/CRRM協定協助網路卸載與跨網路換手之研究 科技部計畫 106-2221-E-029-004 - 106/08/01
5 行動寬頻尖端技術課程推廣計畫--物聯網感測網路技術 教育部計畫 105/12/01
6 植基於靜態協同雲端資料中心之影視傳輸回覆時間與能量耗費之研究 科技部計畫 MOST 105-2221-E-029-017 - 105/08/01
7 第9屆國際展能節職業技能競賽(電腦程式設計職類)國手培訓 其他政府部會計畫 104/09/16
8 單一整合型計畫-以問題導向學習模式發展K-16節能減碳教育成效評估及教具研發(3/3) 科技部 102-3113-S-029-001- 2013/4/1
9 建構一個植基於多使用者星狀拓樸資料網格的群播協同檔案傳送機制 科技部 101-2221-E-029-003-MY3 2012/8/1
10 單一整合型計畫-以問題導向學習模式發展K-16節能減碳教育成效評估及教具研發(2/3) 科技部 101-3113-S-029-001- 2012/4/1
11 在多使用者資料網格環境下建構一個低回覆時間和高度可靠性之動態資料複製演算法協同傳送機制 科技部 100-2221-E-029-018- 2011/8/1
12 單一整合型計畫-以問題導向學習模式發展K-16節能減碳教育成效評估及教具研發(1/3) 科技部 100-3113-S-029-001- 2011/4/1
13 考量信號干擾及STDMA之無線網路鏈狀拓撲的單向資料傳遞最大throughput之研究 科技部 2010/8/1
14 以資料探勘與Forensic技術研製ㄧ個身份辨認與即時偵測入侵行為之系統 科技部 97229 2008/8/1
15 資訊化社會的治理與永續發展:歐盟FP6 CAENTI取向--歐洲領土智慧網絡協調計畫(FP6 CAENTI)的應用:歐盟與台灣的比較 科技部 2007/8/1
16 資訊化社會的治理與永續發展:歐盟FP6 CAENTI的取向--數位化治理與傳統治理的競合:FP6架構下歐盟與台灣的比較 科技部 2007/8/1
17 資訊化社會的治理與永續發展:歐盟FP6 CAENTI的取向--領土智慧資訊整合與分析平台之研製:歐盟FP6 CAENTI的取向 科技部 97528 2007/8/1
18 社區防救災的社會支持體系建構與災害風險管理--子計畫:社區災害空間分析與監視系統之建構(I) 科技部 96372 2007/8/1
19 全球化、都市發展與社區生活:領土智慧的分析取向(2/2) 科技部 2006/8/1
20 整合無線網路、行動代理人與網格之無線校園網格系統之研製(I) 科技部 95748 2006/8/1
21 整合式定位與偵測系統之研製 科技部 95247 2005/8/1
22 全球化、都市發展與社區生活:領土智慧的分析取向(1/2) 科技部 2005/8/1
23 結合第三代行動通訊與無線網路之開放式多媒體服務平台 科技部 2005/8/1
24 整合格網與入侵偵測 科技部 95245 2005/8/1
25 安全的身份鑑別式加密法 科技部 2005/8/1
順序 作品名稱/活動名稱/主題 邀請單位 地點 日期
1 5G Network and ITs security Problems Mobile Network Security (MobiSec) 2017大會  韓國濟州島 2017/10/20
2 Random Cladding with Feedback Encryption for Mobile Transmission and Cloud Systems 中國大陸東北大學  瀋陽 2016/09/13
3 How Data Replication and Fetch-time Policies Impact MapReduce Job Completion Reliability and Energy Consumption 福岡工業大學  福岡,日本 2016/07/06
4 S-PMIPv6: an Intra-LMA model for IPv6 Mobility Department of Computer Engineering, ChoSun University, Korea  Department of Computer Engineering, ChoSun University 2015/03/26
順序 作品名稱/活動名稱/主題 頒獎單位 日期
1 The 33rd International Conference on Advanced Information Networking and Applications 出席國際學術會議 2019/03/27
2 The 3rd International Symposium on Mobile Internet Security 出席國際學術會議 2018/08/29
3 The 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2018) 出席國際學術會議 2018/07/04
4 "The 32nd IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA-2018)" 出席國際學術會議 2018/05/16
5 The 12th International Conference on Broad-Band Wireless Computing, Communication and Applications 出席國際學術會議 2017/11/10
6 The 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017) 出席國際學術會議 2017/07/10
7 IEEE International Conference on Computer Communications (INFOCOM 2017) 出席國際學術會議 2017/05/01
8 The 5th IEEE CCNC International Workshop on Security and Cognitive Informatics for Homeland Defense 出席國際學術會議 2017/01/08
9 the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications 出席國際學術會議 2016/11/05
10 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 出席國際學術會議 2016/04/10
11 第九屆國際展能節(the 9th International Abilympics) 擔任國際學術組織要員 2016/03/25
12 International Conference on Broadband and Wireless Computing, Communication and Applications(BWCCA 2015) 出席國際學術會議 2015/11/04
13 The ACM Conference on Computer and Communications Security (CCS 2015)/ Managing Insider Security Threats (MIST 2015) 出席國際學術會議 2015/10/12
14 International Conference on Network-Based Information Systems, , 2-4 September 2015 出席國際學術會議 2015/09/02
15 the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIs/MCNCS 2015) 出席國際學術會議 2015/07/08
16 The 39th Annual International Computers, Software & Applications Conference (COMPSAC 2015) 出席國際學術會議 2015/07/01
17 6th IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future World (INFOCOM/MobiWorld 2015) 出席國際學術會議 2015/04/26
18 The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015) 出席國際學術會議 2015/03/25
19 The 6th International Workshop on Managing Insider Security Threats (MIST 2014) 出席國際學術會議 2014/11/21
20 The 6th International Conference on Intelligent Networking and Collaborative Systems (InCOS/NBIS 2014) 出席國際學術會議 2014/09/10
21 The 9th International Conference on Availability, Reliability and Security (ARES 2014) 出席國際學術會議 2014/09/08