1 |
Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu, “Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense,” The 6th International Symposium on Mobile Internet Security, Jeju Island, Dec. 2022, pp.?-?. |
2 |
Lung-Pin Chen, Fang-Yie Leu, Chia-Chen Kuo, Tzu-Ching Lin, and Ming-Jen Wang, “Efficient Weighted and Balanced Resource Allocation for High-Performance Render Farms,” The 17th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2022), 2022, pp. 292-300. |
3 |
Jung-Bin Li, Szu-Yin Lin, Fang-Yie Leu, Yen-Chu Chu, “Stock Price Trend Prediction using LSTM and Sentiment Analysis on News Headlines,” The 17th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2022), 2022, pp. 282-291. |
4 |
Shih-Wei Guo, Tzu-Chi Chen, Hui-Juan Wang, Fang-Yie Leu, and Yao-Chung Fan, “Generating Personalized Phishing Emails for Social Engineering Training based on Neural Language Models,” The 17th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2022), 2022, pp. 270-281. |
5 |
Sen-Tarng Lai, Fang-Yie Leu, “Applying CI/CD Process to Improve the Speed and Critical Quality of Perfective Maintenance,” The 17th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2022), 2022, pp. 259-269. |
6 |
Yu-Syuan Lu, Heru Susanto, and Fang-Yie Leu, “Asymmetric Cryptography Among Different 5G Core Networks,” The 16-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2022), June 29-30, 2022, Kitakyushu, Japan, pp.325-333. |
7 |
Yi-Cheng Jian, Meng-Shao Chung, Heru Susanto, and Fang- Yie Leu, “5GBaseStationScheduling,” The 16-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2022), June 29-30, 2022, Kitakyushu, Japan, pp. 315-324. |
8 |
Shih-Ting Chiu, Heru Susanto, and Fang-Yie Leu, “Detection and Defense of DDoS Attack and Flash Events by Using ShannonEntropy,” The 16-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2022), June 29-30, 2022, Kitakyushu, Japan, pp.307-314. |
9 |
Lung-Pin Chen, Leu-Fang Yei, and Ying-Ru Chen, “An Efficient Disaster Recovery Mechanism for. Multi-region Apache KafkaClusters,” The 16-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2022), June 29-30, 2022, Kitakyushu, Japan, pp.297-306. |
10 |
Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, and Chuan-Tian Wu, “Secure LoRaWAN Root Key Update Scheme for IoT Environment,” Mobile Internet Security, Oct. 7-9, 2021, pp.3-15. |
11 |
Leu Fang Yie, Heru Susanto, Alifya Kayla Shafa Susanto, “Revealing Security Impacts of Extended Spidering and Brute Force Penetration Attack" Future ICT 2022. |
12 |
L.B. Chen, F.Y. Leu,“Efficient Execution of Malleable Applications in Desktop Grids Using Credit Damping,” The 16th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2021), October 28-30, Fukuoka, Japan, pp. 226-233. |
13 |
P.X. Cai, Y.C. Fan, F.Y. Leu, “Compare Encoder-Decoder, Encoder-Only, and Decoder-Only Architectures for Text Generation on Low-Resource Datasets,” The 16th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2021), October 28-30, Fukuoka, Japan, pp. 216-225. |
14 |
L.X. Liu, P.H. Yu, S.J. Wu, F.Y. Leu, H. Susan, “The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks,” The 16th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2021), October 28-30, Fukuoka, Japan, pp. 206-215. |
15 |
S.T. Lai, H. Susanto, F.Y. Leu, “Project Management Mechanism based on Burndown Chart to Reduce the Risk of Software Project Failure,” The 16th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2021), October 28-30, Fukuoka, Japan, pp. 197-205. |
16 |
Yu-Syuan Lu, Fang-Yie Leu and Heru Susanto, “The security mechanism between two UPFs belonging to two 5G core networks,” The 5th International Symposium on Mobile Internet Security (MobiSec 2021), Oct. 7-9, 2021, pp.?-?. |
17 |
Li-Gang Jiang, Yi-Hong Chan, Yao-Chung Fan, and Fang-Yie Leu, “You Draft We Complete: A BERT-based Article Generation by Keyword Supplement,” The 15-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), July 1-3, 2021, Asan, Korea, pp.383-392. |
18 |
Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu, “Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance,” The 15-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), July 1-3, 2021, Asan, Korea, pp.362-372. |
19 |
Lung-Pin Chen, Fang-Yie Leu, Hsin-Ta Chiao, Hung-Jr Shiu, “Efficient Adaptive Resource Management for Spot Workers in Cloud Computing Environment,” The 15-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), July 1-3, 2021, Asan, Korea, pp.373-382. |
20 |
Zhi-Qian Hon, Heru Susanto, Fang-Yie Leu, “A Q-learning based downlink scheduling algorithm for multiple traffics in 5G NR systems,” The 15-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), July 1-3, 2021, Asan, Korea, pp.393-402. |
21 |
Ting-Wei Yeh, Fang-Yie Leu, “Using Object Detection Technology to measure the accuracy of the TFT-LCD printing process by using Deep Learning,” The 9-th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2021), February 25-27, 2021, Chiang Mai, Thailand, pp. 358-369. |
22 |
Li-Ling Hung and Fang-Yie Leu, “A High Sensing Accuracy Mechanism for Wireless. Sensor Networks,” Lecture Notes in Networks and Systems, Volume 159, the 15th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2020), October 28-30, Yonago, Tottori, Japan, pp.275-283. |
23 |
Siang Yun Yoong, Yao-Chung Fan, and Fang-Yie Leu, “On Text Tiling for. Documents: A Neural-Network Approach,” Lecture Notes in Networks and Systems, Volume 159, the 15th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2020), October 28-30, Yonago, Tottori, Japan, pp.265-274. |
24 |
Sen-Tarng Lai and Fang-Yie Leu, “Combining Agile with Traditional Software Development for Improvement Maintenance Efficiency and Quality,” Lecture Notes in Networks and Systems, Volume 159, the 15th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2020), October 28-30, Yonago, Tottori, Japan, pp.254-264. |
25 |
Kun-Lin Tsai, Fang-Yie Leu, Tz-Yuan Huang, and Hao-En Yang, “IoT Device Power. Management Based on PSM and EDRX Mechanisms,” Lecture Notes in Networks and Systems, Volume 159, the 15th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2020), October 28-30, Yonago, Tottori, Japan, pp. 244-253. |
26 |
Shih-Ting Chiu Fang-Yie Leu, “Using CUSUM-Algorithm to Detect DoS and DDoS Attack,” The 23rd International Conference on Network-Based Information Systems (NBiS-2020),August 31-Sept. 2, 2020, Victoria, Canada, pp. 1-9. |
27 |
Szu-Yin Lin, Fang-Yie Leu, Chia-Yin K, Ming-Chien Shih, "A Hybrid Information-based Smartphone Indoor-Position Approach," The 14th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 1-3, 2020, Lodz, Poland, pp. 56-64. |
28 |
Bing-Hong Tsai, Yao-Chung Fan, and Fang-Yie Leu, “Extractive Summarization by Rouge Score Regression based on BERT,” The 14th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2020), July 1-3, 2020, Lodz, Poland, pp. 156-165. |
29 |
Yi-Hsun Lu, Fang-Yie Leu, “Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN Networks,” Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020), Caserta, Italy, April 2020, pp. 1-11. |
30 |
Wei-Sheng Chen, Fang-Yie Leu, “The Study on AUSF Fault Tolerance,” The 8-th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2020), February 24-26, 2020, pp. 406-415. |
31 |
Ping-Jui Chiang, Heru Susanto, Fang-Yie Leu, and Hui-Ling Huang, “Mobile Physiological Sensor Cloud System for Long-Term Care,” the 14th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 7-9, 2019, pp. 698-710. |
32 |
Zhi-Qian Hong, Fang-Yie Leu, and Heru Susanto, “News Collection and Analysis on Public Political Opinions,” the 14th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 7-9, 2019, pp. 688-697. |
33 |
Wei-Sheng Chen, Fang-Yie Leu, and Heru Susanto, “System Implementation of AUSF Fault Tolerance,” the 14th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 7-9, 2019, pp. 678-687. |
34 |
J.-W. Lin, S.-. Liao, F.-Y. Leu, “A Novel Bounded-Error Piecewise Linear Approximation Algorithm for Streaming Sensor Data in Edge Computing,” the 11-th International Conference on Intelligent Networking and Collaborative Systems INCoS-2019, Oita University, Oita, Japan, September 5 - 7, 2019, pp. 123-132. |
35 |
Mei-Yu Wu, Fang-Yie Leu, “MIH and CRRM Handover in Trusted or Untrusted Environments,” The 13-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2019, pp.526-536. |
36 |
Fang-Yie Leu and Jia-Sheng Ho, “Air pollution source identification by using Neural Network with Bayesian Optimization,” The 13-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2019, pp.514-524. |
37 |
Sheng-Zheng Lin, Fang-Yie Leu, “Firewall services provided by Edge Computer under AMF and gNB in 5G environments,” The 13-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2019, pp.503-513. |
38 |
Kun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang, Jiun-Yi Lin, Huei-Tang Luo, “A LoRaWAN based Energy Efficient Data Encryption Method,” The 13-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2019, pp.493-502. |
39 |
Heru Susanto, Fang-Yie Leu, Didi Rosiyadi and Chin Kang Chen, “Revealing Storage and Speed Transmission Emerging Technology of Big Data,” The 33rd IEEE International Conference on Advanced Information Networking and Applications (AINA-2019), Japan, March 2019, pp.571-583. |
40 |
Kun-Lin Tsai, Fang-Yie Leu, and Shuo-Wen Chang, “Self-parameter Based Bilateral Session Key Exchange Method,” the 13th International Conference on Broad-Band Wireless Computing, Communication and Applications, Oct. 27-28, 2018, pp. 611-620. |
41 |
Heru Susanto, Leu Fang-Yie, and Chin Kang Chen, “High Performance Grid Computing: Challenges and Opportunities of High Speed Networking,” the 13th International Conference on Broad-Band Wireless Computing, Communication and Applications, Oct. 27-28, 2018, pp. 597-610. |
42 |
Fang-Yie Leu, Heru Susanto, Ping-Hung Chou, and Jeng-Wei Lin, “Migration of Edge Computing Services in 5G Networks – Firewall as a Service Example,” the 13th International Conference on Broad-Band Wireless Computing, Communication and Applications, Oct. 27-28, 2018, pp. 578-585. |
43 |
Sen-Tarng Lai, Fang-Yie Leu, and Jeng-Wei Lin, “A Banking Chatbot Security Control Procedure for Protecting User Data Security and Privacy,” the 13th International Conference on Broad-Band Wireless Computing, Communication and Applications, Oct. 27-28, 2018, pp. 561-571. |
44 |
Fang-Yie Leu, Chen-Yian Ku, “The Study of MME Pool Management and Fault Tolerance in 5G Networks with SDN Controllers,” 2018 the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2018, pp. 585-595. |
45 |
Fang-Yie Leu, Bin-Horn Chou, “A Study on Firewall Services with Edge Computers of vEPC in 5G Networks,” 2018 the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2018, pp. 576-584. |
46 |
Sen-Tarng Lai, Fang-Yie Leu, “A Micro Service Quality Measurement Model for Improving the Efficiency and Quality of DevOps,” 2018 the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2018, pp. 565-575. |
47 |
Chia-Yin Ko and Fang-Yie Leu, “Analyzing attributes of successful learners by using machine learning in an undergraduate computer course,” The 32nd IEEE International Conference on Advanced Information Networking and Applications (AINA-2018), Krakow, Poland, 2018, pp. 801-806. |
48 |
Zong-Ying Yang, Fang-Yie Leu, “Relay Base-Station Handover in a 5G Environment,” the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 8–10, 2017, Spain, pp. 803-810. (EI) |
49 |
Chien-Hsiang Kao, Fang-Yie Leu, “Predicting Video Stream Fragments in a Reactive Mode Chien-Hsiang Kao, Fang-Yie Leu 4. Relay Base-Station Handover in a 5G Environment,” the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 8–10, 2017, Spain, pp.796-802. (EI) |
50 |
Kun-Lin Tsai, Fang-Yie Leu, Tung-Hung Su, Yi-Chen Chang, “A Light Weight Data Encryption Method for WSN Communication,” the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 8–10, 2017, Spain, pp.788-795. (EI) |
51 |
Sen-Tarng Lai, Fang-Yie Leu, “A Critical Quality Measurement Model for Managing and Controlling Big Data Project Risks,” the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 8–10, 2017, Spain, pp.777-787. (EI) |
52 |
Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu, Xing-You Pan, and Li-Ren Chen, “Generating Dynamic Box by using an Input String,” MobiSec 2017, Jeju Island, Korea, 2017, pp.?-?.. LNCS. |
53 |
Xiu-Shu Zhang, Fang-Yie Leu and Ching-Wen Yang, “Healthcare based on Cloud Electrocardiogram System:A Medical Center Experience in Middle Taiwan,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.473-482. |
54 |
Sen-Tarng Lai and Fang-Yie Leu, “An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.483-492. |
55 |
Chien-Hsiang Kao and Fang-Yie Leu, “Prediction of the Fragment of video streamed to mobile phones under a 5G network base station,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.493-501. |
56 |
Fang-Yie Leu and Chih-Chung Cheng, “MIH-based Congestion Control with Seamless Handover in Untrusted Networks,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.502-512. |
57 |
Po-Yu Tsai, Leu, Fang-Yie, Ilsun You, Hsing-Chun Chen, “ANDSF-based Congestion Control with Seamless Handover to Target AP in Heterogeneous Wireless Networks,” Infocom 2017. |
58 |
Fang-Yie Leu, Guan-Liang Lin, “An MFCC-based Speaker Identification System,” The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017), pp.1055-1062. |
59 |
Hsing-Chung Chen, Chia-Hui Chang, Fang-Yie Leu, “Implement of Agent with Role-based Hierarchy Access Control for Secure Grouping IoTs,” The 5th IEEE CCNC International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2017) 8 January 2017, Las Vegas, USA, pp.120-125. |
60 |
Yi-Li Huang, Fang-Yie Leu, Ilsun You, Rong-Yi Su, Po-Hao Su, Hsing-Chung Chen, “A 3D Encryption with Shifting Mapping Substitution Mechanism,” The 5th IEEE CCNC International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2017) 8 January 2017, Las Vegas, USA, pp.126-131. |
61 |
Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, “Enhancing Security of LTE using a Double Masking Technique,” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp. 747-754. (EI) |
62 |
Cheng-Ying Hsu, Shang-En Yang, Hung-Yuan Chen, Fang-Yie Leu, Yao-Chung Fan, “Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users’ Privacy Concerns” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp. 739-746. (EI) |
63 |
Sen-Tarng Lai and Fang-Yie Leu, “Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality,” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp.731-738. (EI) |
64 |
Kun-Lin Tsai, Fang-Yie Leu and King-Shing Yip, “Device Parameter based Secure User Authentication,” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp. 721-730. (EI) |
65 |
Xia-Yun Guo, Chin-Ling Chen, Chang-Qing Gong and Fang-Yie Leu, “A Secure Official Vehicle Communication Protocol for VANET,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 482-485. (EI) |
66 |
Kun-Lin Tsai, Fang-Yie Leu, Yi-Fung Huang, Chi Yang, Cheng-Hsin Chang, King-Shing Yip, Yuchen Xue, and Guan-Chi Lai, “Cloud Encryption Using Distributed Environmental Keys,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 476-481. (EI) |
67 |
Yi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu, “A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 470-475. (EI) |
68 |
Sen-Tarng Lai and Fang-Yie Leu, “A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and Quality,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 464-469. (EI) |
69 |
Fang-Yie Leu and Yi-Ting Hsiao, “Finite State Machine Based Real Time Scheduling for Microchip,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 458-463. (EI) |
70 |
WooSeok Hyun, Ilsun You, JoungSoon Jang and Fang-Yie Leu, “A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 415-418. (EI) |
71 |
Yi-Li Huang and Fang-Yie Leu, Ilsun You, Hsing-Chung Chen, Chishyan Liaw and Jung-Chun Liu, “Random Cladding with Feedback Mechanism for Encrypting Mobile Messages,” 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, 2016, pp. 970-975. (EI) |
72 |
Chia-Yin Ko and Fang-Yie Leu, “Applying data mining to explore students’ self-regulation in learning contexts,” IEEE 30th International Conference on Advanced Information Networking and Applications, March 2016, pp. 74-78. (EI) |
73 |
Sen-Tarng Lai and Fang-Yie Leu, “Applying Continuous Integration for Reducing Web Applications Development Risks,” International Conference on Broadband and Wireless Computing, Communication and Applications, Krakow, Poland, November 4-6 November 2015, pp. 386-391. (EI) |
74 |
Fang-Yie Leu and Sheng-Chieh Chuang, “Establishing a Routing Path with Redundant Link Minimization in Wireless Sensor Networks,” International Conference on Broadband and Wireless Computing, Communication and Applications, Krakow, Poland, 4-6 November 2015, pp. 380-385. (EI) |
75 |
Kun-Lin Tsai, MengYuan Ye and Fang-Yie Leu, “Secure Power Management Scheme for WSN,” The ACM Conference on Computer and Communications Security (CCS)/ Managing Insider Security Threats (MIST) 2015, Denver, USA, 12-16 October 2015, pp. 63-68 (poster). (EI) |
76 |
Chi-Lun Ho, and Fang-Yie Leu, “A Wireless Physiological Sensor Area Network,” International Conference on Network-Based Information Systems, Taipei Taiwan, 2-4 September 2015, pp.14-19. (EI) |
77 |
Tien-Sheng Lin, I -Long Lin and Fang-Yie Leu, “Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Regional University of Blumenau (FURB), Blumenau Brazil, 8-10 July 2015, pp.420-425. (EI) |
78 |
Sen-Tarng Lai and Fang-Yie Leu, “A Security Threats Measurement Model for Reducing Cloud Computing Security Risk,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Brazil, 8-10 July 2015, pp.414-419. (EI) |
79 |
Yu-Jen Chang, Fang-Yie Leu, Shih-Chieh Chen and Hei-Lam Wong, “Applying Web Crawlers to Develop a Sale Management System for Online Malls,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Brazil, 8-10 July 2015, pp. 408-413. (EI) |
80 |
Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu and Fang-Yie Leu, “An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Brazil, 8-10 July 2015, pp. 403-407. (EI) |
81 |
Ming-Chang Lee, Fang-Yie Leu, and Ying-ping Chen, “ReMBF: A Reliable Multicast Brute-Force Co-Allocation Scheme for Multi-user Data Grids,” The 39th Annual International Computers, Software & Applications Conference, Taichung Taiwan, 1-5 July 2015, pp.774-783. (EI) |
82 |
Chin-Yu Liu, Fang-Yie Leu, Ilsun You, Aniello Castiglione and Francesco Palmieri, “The Untrusted Handover Security of the S-PMIPv6 on LTE-A,” 6th IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2015), April 2015, pp.161-166. (EI) |
83 |
Chin-Yu Liu, Fang-Yie Leu, Ilsun You, Aniello Castiglione and Francesco Palmieri, “Heterogeneous network handover using 3GPP ANDSF,” The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015), Gwangju, Korea, March 25-27, 2015, pp. 171-175. (EI) |
84 |
Fang-Yie Leu and Yi-Ting Hsiao, "A Grid System Detecting Internal Malicious Behaviors at System Call Level," The 6th International Workshop on Managing Insider Security Threats, 2014, pp. 14-24. |
85 |
Chia-Yin Ko, Fang-Yie Leu and I-Tsen Lin, “Using Smart Phone as a Track and Fall Detector for People with Dementia,” International Conference on Broadband and Wireless Computing, Communication and Applications, 2014, pp. 306-311. (EI) |
86 |
Fang-Yie Leu, Jung-Chun Liu and Hsin-Liang Chen, “Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA,” International Conference on Broadband and Wireless Computing, Communication and Applications, 2014, pp. 300-305. (EI) |
87 |
Sen-Tarng Lai, Fang-Yie Leu, Chao-Tung Yang and William Cheng-Chung Chu, “Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements,” International Conference on Broadband and Wireless Computing, Communication and Applications, 2014, pp. 291-299. (EI) |
88 |
Fang-Yie Leu, Jung-Chun Liu and Chin-Yu Liu, “S-PMIPv6: Efficient Handover in Proxy Mobile IPv6 Domain by using SCTP,” International Conference on Broadband and Wireless Computing, Communication and Applications, 2014, pp. 287-291. (EI) |
89 |
Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang, “Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters,” The 9th International Conference on Availability, Reliability and Security, 2014, pp. 166–171. (EI) |
90 |
Ming-Chang Lee, Fang-Yie Leu, and Ying-ping Chen, “Evaluating Response Time and Reliability of Co-Allocation Schemes from Multi-User Perspectives on a Star-Topology Data Grid,” The 6th International Conference on Intelligent Networking and Collaborative Systems, 2014, pp. 242-248. (EI) |
91 |
Yi-Li Huang, Shih-Han Chen, Fang-Yie Leu, Chia-Yin Ko, Jung-Chun Liu, “An efficient traffic control system with emergency handling for ambulances,” The 6th International Conference on Intelligent Networking and Collaborative Systems, 2014, pp. 356-361. (EI) |
92 |
Yi-Li Huang, Sheng-Mao Wang, Fang-Yie Leu, Jung-Chun Liu, and Chia-Yin Ko, “A secure mobile shopping system based on credit card transaction,” The 6th International Conference on Intelligent Networking and Collaborative Systems, 2014, pp. 336-341. (EI) |
93 |
Kun-Lin Tsai, Jiu-Soon Tan, Fang-Yie Leu and Yi-Li Huang, “A Group File Encryption Method using Dynamic System Environment Key,” The International Conference on Network-Based Information Systems (NBiS), 2014, pp. 476-483. (EI) |
94 |
Sen-Tarng Lai, Fang-Yie Leu and WilliamCheng-Chung Chu, “A Multi-Layer Secure Prevention Scheme for Improving E-commerce Security,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.505-510. (EI) |
95 |
Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu, “A secure authentication scheme of health care based on the cloud,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.499-504. (EI) |
96 |
Kun-Lin Tsai, Fang-Yie Leu, Yi-Li Huang, Jiu-Soon Tan and MengYuan Ye, “High-efficient Multi-Key Exchange Protocol based on Three-party Authentication,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.487-492. (EI) |
97 |
Lung-Pin Chen, Chih-Wei Hsieh and Fang-Yie Leu, “Minimum Cost Content Object Reconstruction in Multi-Tier Servers,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.523-528. (EI) |
98 |
I-Long Lin, Yun-Sheng Yen, and Fang-Yie Leu, “Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP and ISO27037 SOP,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.511-516. (EI) |
99 |
Ming-Chang Lee, Fang-Yie Leu, and Ying-ping Chen, “Cache Replacement Algorithms for YouTube,” The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), May 2014, pp. 743-750. (EI) – Conference Best Paper Award |
100 |
Jia-Chun Lin, Fang-Yie Leu, Ying-ping Chen and Waqaas Munawar, “Impact of MapReduce Task Re-execution Policy on Job Completion Reliability and Job Completion Time,” The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), May 2014, pp. 712-718. (EI) |
101 |
Fang-Yie Leu*, Yi-Ting Hsiao, “A Real-Time Intrusion Detection and Protection System on System Call Level by using Data Mining and Profiling Techniques Under the Assistance of a Grid,” The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014), April 2014, pp.375-385. (EI) |
102 |
Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Ilsun You, Kangbin Yim, Jian-Hong Chen, “A Random Wrapping Encryption Method,” International Workshop on Mobility Management in the Networks of the Future World, January 2014, pp.353-358. (EI) |
103 |
Chin-Ling Chen, Wei-Chen Tasi and Fang-Yie Leu, “Improve Two Remote User Authentication Scheme Using Smart Card,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 404-407. (EI) |
104 |
Sueming Hsu, Yalan Chan, Kai-I Huang and Fang-Yie Leu, “An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan’s Senior Care Market: A Case Study of Fitness Equipment Industry,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 378-381. (EI) |
105 |
Sen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu, “A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 366-371. (EI) |
106 |
Yu-Shin Huang, Fang-Yie Leu and Yi-Li Huang, “A handover scheme for LTE based on the assistance of GPS,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp.399-403. (EI) |
107 |
Yi-Li Huang, Fang-Yie Leu, Jung-chun Liu, Lih-Jiun Lo,William Cheng-Chung Chu, “A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 360-365. (EI) |
108 |
Ya-Ting Hsu, Fang-Yie Leu, Jung-chun Liu, Yi-Li Huang, “The Simulation of an Emotional Robot Implemented with Fuzzy Logic,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 382-386. (EI) |
109 |
Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, and Alfredo De Santis, “Analyzing the Internet Stability in Presence of Disasters,” The 8th International Conference on Availability, Reliability and Security, Regensburg, Germany, September 2-6, 2013, pp.253-268. (EI) |
110 |
Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu*, Feng-Ching Chiang, Chao-Tung Yang, and William Cheng-Chung Chu “A Multiple-key Management Scheme in Wireless Sensor Networks,” The 8th International Conference on Availability, Reliability and Security, Regensburg, Germany, September 2-6, 2013, pp.337-344. (EI) |
111 |
Ming-Chang Lee, Fang-Yie Leu, Ying-ping Chen, “TSR: Topology Reduction from Tree to Star Data Grids,” The Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013, pp.678-683. (EI) |
112 |
Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, Cheng-Chung Chu, Chao-Tung Yang, “A True Random-Number Encryption Method,” The Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013, pp.654-659. (EI) |
113 |
Yi-Li Huang, Fang-Yie Leu, Yao-Kuo Sun, Cheng-Chung Chu, Chao-Tung Yang, “A Secure Wireless Communication System by Integrating RSA and Diffie-Hellman PKDS in 4G Environments and an Intelligent Protection-key Chain with a Data Connection Core,” the IEEE International Symposium on Industrial Electronics, 2013, pp.1-6. (EI) |
114 |
Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang, Chih-Wei Yu, Cheng-Chung Chu, Chao-Tung Yang, “Building a block cipher mode of operation with feedback keys,” the IEEE International Symposium on Industrial Electronics, 2013, pp.1-4.(EI) |
115 |
Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang, “Building a block cipher mode of operation with Dual keys,” The Asian Conference on Availability, Reliability and Security (AsiaARES 2013). Lecture Notes of Computer Science – LNCS 7804, March 2013, pp. 392-398. (EI) |
116 |
Jia-Chun Lin, Fang-Yie Leu, Ying-ping Chen, “Deriving Job Completion Reliability and Job Energy Consumption for a General MapReduce Infrastructure from Single-Job Perspective,” the IEEE International Conference on Advanced Information Networking and Applications, March 2013, Barcelona, Spain, pp. 1642-1647. (EI) |
117 |
Fang-Yie Leu, IlSun You, Yi-Li Huang, Kangbin Yim, Cheng-Ru Dai, “Improving Security Level of LTE Authentication and Key Agreement Procedure,” the International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2012), December 2012, pp. 1032-1036. (EI) |
118 |
Fang-Yie Leu, Yi-Li Huang, Chien-Nan Chen, “The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link,” the IEEE International Workshop on Cloud, Wireless and e-Commerce Security, November 12-14, 2012, Victoria, Canada, pp.452~457. (EI) |
119 |
Fang-Yie Leu, Miao-Heng Chen, Yi-Li Huang, Chung-Chi Lin, “Controlling Traffic Lights for Ambulances,” the International Workshop on Cloud, Wireless and e-Commerce Security, November 12-14, 2012, Victoria, Canada, pp.462~467. (EI) |
120 |
Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai, “A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation,” International Workshop on Security and Cognitive Informatics for Homeland Defense, August 2012, pp.578-592. Lecture Notes of Computer Science – LNCS 7465. (EI) |
121 |
Ko-Chung Wei, Yi-Li Huang, Fang-Yie Leu, “A Secure Communication over Wireless Environments by using a Data Connection Core,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, Palermo, Italy, 4-6 July 2012, pp.570-575 . (EI) |
122 |
Fang-Yie Leu, Ming-Chang Lee, Ying-ping Chen, “Improving Data Grid Performance by using Popular File Replicate First Algorithm,” The IEEE International Workshop on Cloud, Wireless and e-Commerce Security, October 24-26. 2011, Barcelona, Spain, pp. 416~421.(EI) |
123 |
Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang, “A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks,” International Workshop on Security and Cognitive Informatics for Homeland Defense, August 2011, pp.255-270. Lecture Notes of Computer Science – LNCS-67908 (EI) |
124 |
Fenq-Lin Jenq, Tang-Jen Liu and Fang-Yie Leu, “An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2011, June/July 2011, Seoul Korea, pp.589- 593 . (EI) |
125 |
Fang-Yie Leu, and Keng-Yen Chao, “A Semi-preemptive Ad Hoc Wireless Cloud Service System with limited Resources to Support Node Mobility,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2011, June/July 2011, Seoul Korea, pp.577-582 . (EI) |
126 |
Fang-Yie Leu, and Kuo-Chi Liang, “A Location-based Handoff Scheme based on IEEE 802.21 in Heterogeneous Wireless Networks,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2011, June/July 2011, Seoul Korea, pp. 571-576 . (EI) |
127 |
Fang-Yie Leu and Shiuan-You Chiou, “A Rate-allocation Based Multi-path Congestion Control Scheme for Event-Driven Wireless Sensor Networks,” the International Conference on Data Compression, Communications and Processing, June 2011, Italy, pp. 293-298. (EI) |
128 |
Yi-Li Huang, Chu-Hsing Lin, and Fang-Yie Leu, “Verification of a Batch of Bad Signatures by using the Matrix-Detection Algorithm,” the International Conference on Data Compression, Communications and Processing, June 2011, Italy, pp. 299-306. (EI) |
129 |
Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu, “Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM Environment without Prior Authentication Connection,” The IEEE International Workshop on Cloud, Wireless and e-Commerce Security, Nov. 2010, Fukuoka, Japan, pp. 441- 446. (EI) |
130 |
Fang-Yie Leu and Hung-Wei Huang, “An Event-Driven Mobile Assistant Control Protocol for Wireless Sensor Networks,” the IEEE International Symposium on Frontiers in Ubiquitous Computing, Networking and Applications, Sept., 2010, Takayama, Japan, pp. 521-526. (EI) |
131 |
Fang-Yie Leu and Pei-Shiun Liu, “A Channel Assignment and AP Deployment Scheme for Concentric-Hexagon based Multi-Channel Wireless Networks,” the IEEE International Symposium on Frontiers in Ubiquitous Computing, Networking and Applications, Sept., 2010, Takayama, Japan , pp. 504-509. (EI) |
132 |
Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu, “Improving security levels of IEEE802.16e authentication by Involving Diffie-Hellman PKDS,” the International Conference on Complex, Intelligent and Software Intensive Systems, Feb. 2010, Krakow, Poland , pp. 391-397. (EI) |
133 |
Yi-Fung Huang, Ko-Chung Wei, Fang-Yie Leu, “Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering Without Certificate Authorities,” the International Conference on Complex, Intelligent and Software Intensive Systems, Feb. 2010, Krakow, Poland, pp. 384-390. (EI) |
134 |
Fang-Yie Leu and Yong-Lon Chen, “A Path Switching Scheme for SCTP Based on Round Trip Delay and under the Assistance of Network Management Schemes,” the International Conference on Computer Science and its Applications, Dec. 2009, Jeju, Korea, pp. 103-108. (EI) |
135 |
Fang-Yie Leu, Yao-Tien Huang, “A Coordinating Multiple Channel Assignment Scheme and AP Deployment in A Wireless Network,” The 2009 IEEE/IFIP International Symposium on Embedded and Pervasive Systems, Vancouver, Canada, August 2009, pp. 440-445. (EI) |
136 |
Fang-Yie Leu and Zhi-Yang Li, “An Inner DoS/DDoS Attack Detection System,” the 6th International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA 2009), July 2009, Florida, USA, pp.41-46. |
137 |
Fang-Yie Leu and Zhi-Yang Li, “Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System,” the Fifth International Conference on Information Assurance and Security, August 2009, Xian, China, pp. 255-258. (EI) |
138 |
Fang-Yie Leu and Chia-Chi Pai, “Detecting DoS&DDoS Attacks Using Chi-Square,” the Fifth International Conference on Information Assurance and Security, August 2009, Xian, China, pp. 251-254. (EI) |
139 |
Chao-Tung Yang, Fang-Yie Leu, and Sung-Yi Chen, “Network Bandwidth-aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers,” International Conference on Asia-Pacific Services Computing Conference, 2008, pp. 775-780. (EI) |
140 |
L.W. Liu and Fang-Yie Leu, “Use of GIS and Data Mining Techniques in the Designing of Community-Based Services for the Elderly,” The International Conference on the Gerontological Society of America’s 61th Annual Meeting, Washington DC, November 2008. |
141 |
Fang-Yie Leu, and Yao-Tien Huang, “Software Tools Developed and Employed for Survey on Central Taiwan Science Park and Data Analyses,” International Conference on Territorial Intelligence, Besancon, Oct. 2008. |
142 |
Fang-Yie Leu, Shu-Ren Lee Modeling and Simulation of Energy Producing Process of Fats Metabolism by Using Petri Nets,” International Conference on Computer Graphics and Image and Multimedia Processing, 2008. |
143 |
Fang-Yie Leu, Guo-Cai Li and Wen-Chin Wu, “An Autonomous Energy-Aware Routing Scheme: a Supplementary Routing Approach for Path-Preserving Wireless Sensor Networks,” The IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2008, pp.49-60. |
144 |
Fang-Yie Leu, Zhen-Jia Ko, “A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia Applications,” International Conference on Intelligent Multimedia Information System, 2008. pp.564-569. (EI) |
145 |
Fang-Yie Leu and Yu-Ting Huang, “Maximum Capacity in Chain-Topology Wireless Mesh Networks,” Wireless Telecommunications Symposium, CA, 2008, pp. 250-259. (EI) |
146 |
Fang-Yie Leu, “Analyzing Survey Data Concerning the Construction of Central Taiwan Science Park using Association Rules and Geographical Information Systems,” International Conference on Territorial Intelligence, Huelva, Spain, Oct. 2007. |
147 |
Fang-Yie Leu and Chih-Chieh Ko, “An Automated Term Definition Extraction using the Web Corpus in Chinese Language,” the IEEE International Conference on Natural Language Processing and Knowledge Engineering, Beijing China, August/September 2007, pp. 435-440. (EI). |
148 |
Fang-Yie Leu and Kai-Wei Hu, “A Real-Time Intrusion Detection System using Data Mining and Forensic Techniques,” the International Workshop on Security, October 2007, pp.137-152. |
149 |
Fang-Yie Leu and Kai-Wei Hu, “A Real-Time Intrusion Detection and Identification System on Command-Line-Interface Computers using Data Mining and Forensic Techniques in an Intranet,” the International Conference on Computing, Communications and Control Technologies, Florida USA, July 2007, pp. 148-153. |
150 |
Fang-Yie Leu, and Kuo-Wei Lee, “A Transmission Cost Model of Data Retrieval from a Cluster System on an One-Node One-Fragment, One-Node One-Task and Random Allocation Environment using no Global Directory,” the World Multi-Conference on Systemics, Cybernetics and Informatics, Florida USA, July 2007, pp. 112-116. |
151 |
Fang-Yie Leu, Yu-Hsin Chen, Ching-Chien Kuan, “An Efficient Bandwidth-using Scheme over WLAN with IEEE 802.11e Standard,” the IEEE International Workshop on Broadband Convergence Networks, Munich Germany, May 2007. (EI) |
152 |
Fang-Yie Leu and Tai-Shiang Wang, “Data Analysis Using GIS and Data Mining,” International Conference on Territorial Intelligence, Alba Iulia, Romania, Oct. 2006. |
153 |
Fang-Yie Leu, Ming-Chang Li, and Jia-Chun Lin, “Intrusion Detection based on Grid,” International Multi-Conference on Computing in the Global Information Technology, Romania, Aug. 2006, pp. 62-67. |
154 |
Fang-Yie Leu and Tai-Shiang Wang, “Integrating Mobile Agents with a Wireless Grid Platform,” the IEEE-ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, June 2006, pp. 139-144. |
155 |
Fang-Yie Leu, Ming-Chang Li, Jia-Chun Lin, “An Intrusion Detection System on Dynamic Detection Environment,” International Conference on Computational Science and Its Applications, May 2006. |
156 |
L.W. Liu, R.M. Tsay, J. Shiang and Fang-Yie Leu, “Promoting Technical Innovation: The Application of GIS for In-Home Services,” the Fourth National Gerontological Social Work Conference, Chicago, Illinois, February 16 – 19, 2006. |
157 |
Fang-Yie Leu and Wei-Jie Yang, “CUSUM Intrusion Detection & Traceback System,” The International Forensic Science Symposium, Taipei, Taiwan, Nov. 2005. |
158 |
Fang-Yie Leu and Kai-Wai Hu, “A Real-Time Intrusion Detection and Identification System with Data Mining and Forensic Techniques,” The International Forensic Science Symposium, Taipei, Taiwan, Nov. 2005. |
159 |
Fang-Yie Leu, Neng-Wen Lo, Lun-Ni Yang, “Predicting Vertebrate Promoters with Homogeneous Cluster Computing,” The International Conference on Signal-Image Technology &Internet–Based Systems, Yaound? Cameroon, Nov. 2005, pp. 143-148. |
160 |
Fang-Yie Leu, Ching-Chien Kuan, Der-Jiunn Deng and Yu-Hsin, Chen, “Guaranteed Non Dropping Mechanism Deploying IEEE802.11e Standard,” The International Conference on Signal-Image Technology & Internet–Based Systems, Yaound? Cameroon, Nov. 2005, pp. 170-175. |
161 |
Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang , “A Performance-Based Grid Intrusion Detection System,” Proceedings of the 29th International Computer Software and Applications Conference (COMPSAC 2005), Edinburgh, Scotland, July 26-28, 2005. (EI) |
162 |
Hsiao-Hong Tsai, Fang-Yie Leu and Wen-Kui Chang, ”Distributed SendBox Scheme for Mobile Agent Communication,” 2005 IEEE the 4th International Conference on Mobile Business(ICMB 2005), Sydney, Australia, July 2005. (EI), pp. 545-550. |
163 |
Fang-Yie Leu, Ching-Chien Kuan, Dr-Jiunn Deng and Wen-Kui Chang, “Quality of Service for Voice over Wireless LAN by Deploying Multipolling in IEEE802.11e Standard,” 2005 IEEE International Symposium on Multimedia Over Wireless. (EI) |
164 |
Fang-Yie Leu and Wei-Jie Yang, “IFTS: Intrusion Forecast and Traceback based on Union Defense Environment,” the 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), July 20-22, 2005, pp. 716- 722. (EI) |
165 |
Hsiao-Hong Tsai, Fang-Yie Leu and Wen-Kui Chang, “Mobile Agent Communication Using SIP,” IEEE 2005 International Symposium on Applications and the Internet (SAINT2005), Trento, Italy, January 2005, pp.274-279. (EI) |
166 |
Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Bo-Qi Shi, “Integrating Grid with Intrusion Detection,” the IEEE 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei Taiwan, March 2005, pp.304-309. (EI) |
167 |
Leu, Fang-Yie and Yao-Chung Fan, “Compressing an Inverted File with LCS,” IEEE COMPSAC 2004, Sept., 2004, Hong Kong, pp.60-61. (EI) |
168 |
呂芳懌,楊惟傑,林佳純,李明昌,“網路安全分析與趨勢” 2004年資訊科技與人文管理教育論壇-數位內容數位教育與管理政策研討會,2004年7月, pp.277-293. |
169 |
Leu, Fang-Yie and Yao-Chung Fan, “Dealing with the Structure of Real World Graphs,” The 2nd International Conference on Computer Science and its Applications (ICCSA-2004), June 2004, California, USA, 2004, pp.40-49. |
170 |
F.Y. Leu and K.W. Lee, “Transmission Cost Models of Data-Retrieval based on Specific Data Allocations without Directory on Cluster Systems,” In the Proceedings of the 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004), Orlando, USA, 2004, pp.167-172. |
171 |
Leu, Fang-Yie and Yao-Chung Fan, “Compressing a Directed Massive Graph using Small World Model,” IEEE Data Compression Conference, March 2004.Poster. |
172 |
呂芳懌,楊惟傑,鄭真真,洪嘉鴻,”UDIFT:具預警功能與入侵追蹤之區域聯防系統,” 2003年「網際空間:科技、犯罪與法律社會」學術研究暨實務研討會,12月,2003年,pp.140-148。 |
173 |
呂芳懌,鄭真真,洪嘉鴻,管清健,林佳純,李明昌,”以分散式平行入侵偵測系統從事區域聯防, 2003年「網際空間:科技、犯罪與法律社會」學術研究暨實務研討會,12月,2003年,pp.129-139。 |
174 |
F.Y. Leu and T.Y. Yang, ”A Host-Based Real-Time Intrusion Detection System with Data Mining and Forensic Techniques,” IEEE 2003 International Carnahan Conference on Security Technology,Taiwan,ROC,Oct. 14-16, 2003, pp.580-586. |
175 |
呂芳懌,洪嘉鴻,鄭真真,”UDAIDTS:以Hash為基礎的主動式區域聯防入侵偵測與追蹤系統,” 第十四屆國際資訊管理學術研討會,2003年7月12日,pp.1090-1097. |
176 |
呂芳懌,顏義樺,”以聯想法則概念網路為基礎之文章概念探索及相似比對,” 第十四屆國際資訊管理學術研討會,2003年7月12日,pp.330-336. |
177 |
呂芳懌,顏義樺,” 以事件聯想為基礎之文章相似性比對 ,” 2003年資訊技術應用與發展研討會,2003年6月28日,pp.61-67. |
178 |
呂芳懌,施政瑋,”以詞義概念為基礎的文件檢索與比對,” 2003年資訊技術應用與發展研討會,2003年6月28日,pp.667-673. |
179 |
呂芳懌,蘇俊維,許惟翔,” 內部網路安全威脅分析與防制,” 2003年電子商務與數位生活研討會,2003年4月11-12日, pp.166-166(摘要,本文在光碟片中未編頁碼)。 |
180 |
呂芳懌,黃品璁,楊子逸,胡凱威,“低負載隱形式網路異常偵測器,” 2003年電子商務與數位生活研討會,2003年4月11-12日, pp.165-165(摘要,本文在光碟片中未編頁碼)。 |
181 |
呂芳懌,楊子逸,“IIS伺服器漏洞剖析與防備,”第四屆2002年網際空間:資訊、法律與社會,2002年11月29日。 |
182 |
呂芳懌, 黃文鴻, “能提供及追蹤行車最短路徑之分散式系統,”2002中華地理資訊學會暨學術研討會,2002年9月 |
183 |
呂芳懌,蘇俊維,”網路入侵與防禦策略探討,”第三屆網際網路應用與發展研討會,2002年5月 |
184 |
呂芳懌,顏義樺,施政瑋,”以網頁特性為基礎之重要性排名,’ 2002年第六屆資訊管理學術及警政資訊實務研討會,2002年5月, pp.489-495. |
185 |
呂芳懌,歐建暉,邱維埠, ”大學校園寬頻網路運用研究—東海數位村—寬頻網路監測,”,2002年電子商務與數位生活研討會,2002年3月, pp.489-495。 |
186 |
呂芳懌,顏義樺,施政瑋,”探查疑似不法資訊網站之分散式網路巡邏系統,’ 2001年網際空間:資訊、法律與社會,2001年12月24日。 |
187 |
呂芳懌,楊子逸,“IIS網頁伺服器Unicode漏洞探討,”第五屆資訊管理學術及警政資訊實務研討會,2001年6月。 |
188 |
呂芳懌,林晁立, “以臉部器官形狀、寬度、相對位置從事人臉影像辨識,” 第十一屆物件導向技術及應用研討會,2000年九月。 |
189 |
呂芳懌,林厚誼, “物件導向竊盜犯罪案件相似性比對,” 第十一屆物件導向技術及應用研討會,2000年九月。 |
190 |
呂芳懌, 黃文鴻, “協助查詢有地緣關係之前科犯資訊的地理資訊系統,”第四屆資訊管理學術及警政資訊實務研討會,2000年5月,pp.115-123。 |
191 |
呂芳懌, 黃文鴻, “協助查詢有地緣關係之前科犯資訊的地理資訊系統,” 大業學報,第九卷,第一期,八十九年。 |
192 |
呂芳懌等, “影像資料庫在人臉辨識上的應用—前科犯資料庫,” 東海科學第一捲,東海大學,中華民國八十八年七月。 |
193 |
呂芳懌, 林厚誼, “協助犯罪偵察之前科犯資料庫績效品質改善,”第三十五屆品質管制研討會, 中華民國八十八年十一月. |
194 |
呂芳懌,余少棠,許閔雄,林晁立,蔡清欉 “影像資料庫在人臉辨識上的應用—前科犯資料庫,”,第十屆國際資訊管理學術研討會,1999年6月,台灣台北pp.863-870 |
195 |
呂芳懌,林厚誼,黃文鴻,邱聖斌,朱峻德,龔俊杰 “文字資料庫在犯罪偵察之應用—竊盜犯罪手法之比對,”, 第十屆國際資訊管理學術研討會,1999年6月,台灣台北pp.935-943 |
196 |
Fang-Yie Leu(呂芳懌),Shiang-Wei Chao,Dec.1997,“A Distributed Database Architecture and its Query,” Proceedings of National Computer Symposium 1997, Taiwan, pp. A38-A42. |
197 |
F.Y. Leu and S.W.Zhao, “The Query and Integration Algorithms in a Distributed Database, “Proceeding of the 14th Workshop on Combinatorial Mathematics and Computation Theory, Taichung, Taiwan, June 1997, pp.114-117. |
198 |
呂芳懌 資料庫之管理 人力與發展雜誌 第二十七~二十九期 中華民國八十五年四~六月 |
199 |
呂芳懌 資料庫之應用 人力與發展雜誌 第二十六期 中華民國八十五年三月 |
200 |
呂芳懌 資料庫相關人員 人力與發展雜誌 第二十五期 中華民國八十五年二月 |
201 |
呂芳懌 資料庫管理人員之角色 人力與發展雜誌 第二十四期 中華民國八十五年一月 |
202 |
呂芳懌 資料庫之功能 人力與發展雜誌 第二十三期 中華民國八十四年十二月 |
203 |
呂芳懌 資料庫之演進 人力與發展雜誌 第二十二期 中華民國八十四年十一月 |
204 |
呂芳懌 資料表示法 人力與發展雜誌 第二十一期 中華民國八十四年十月 |
205 |
呂芳懌 資料庫與生活 人力與發展雜誌 第二十期 中華民國八十四年九月 |
206 |
F.Y. Leu and C.C. Yang, "Rule Base Inspection Using Algorithmic Approach for Data-Access Oriented Knowledge-Based Systems," IEEE COMPSAC, Chicago, 1990, pp.155-160. |
207 |
F.Y. Leu and S.K. Chang, "An Internal Protocol Assistant for Distributed Systems," Proc. of SPIE Conference, Orlando, FL, 1991. |
208 |
楊鍵樵,呂芳懌,"智慧型網管系統資料庫之研究與雛型系統之開發之研究",資策會委託研究計畫,中華民國八十四年六月 |
209 |
楊鍵樵,呂芳懌,連志誠等 "支援智慧型網路管理系統之物件導向資料庫雛形系統"INTC '95,台北,中華民國八十四年十月 |
210 |
F.Y. Leu, "An Internal Inspection of a Distributed Office Information System" Ph.D Dissertation of National Taiwan Institute of Technology, Taipei, Taiwan, ROC, July 1991. |