成果亮點
中心榮譽
2014 International Computer Symposium (ICS) Best Poster Award
2014 Cyberspace雲端服務應用、安全與稽核研討會 大會學術論文獎
2005 經濟部 資訊專業人員鑑定-尋找網路達人活動 全國第三名
衍伸計畫
教育部 113年全國教育部電子證書及場域建置計畫, 113/1/1-113/12/31
億宣應用科技股份有限公司 5G雙場域專頻專網結合AI應用計畫, 112/11/1-113/9/30
財團法人電信技術中心 立方實驗衛星地面場域使用服務, 112/11/15-112/12/31
經濟部水利署 區塊鏈應用於水資源關鍵基礎設施之分散式資料儲存驗證機制, 112/5/13-112/12/15
松之安資訊科技有限公司 水資源關鍵基礎設施資通安全防護服務, 111/4/1-112/1/31
國家科學及技術委員會 時間敏感網路與5G專網整合下確保服務品質及安全性之研究, 111/8/1-112/7/31
國家科學及技術委員會 水資源關鍵基礎設施資安防護(2/2), 111/5/1-112/4/30
安華聯網科技股份有限公司 111年度度經濟部關鍵基礎設施資安聯防服務專案, 111/3/1-112/2/28
安華聯網科技股份有限公司 110年度度經濟部關鍵基礎設施資安聯防服務專案, 110/03/01-111/02/28
松之安資訊科技有限公司 水資源關鍵基礎設施資通安全防護服務, 110/03/01-111/01/31
泓格科技股份有限公司 泓格智慧工廠資安水準第三方驗證服務, 110/02/01-110/07/31
台達電子工業股份有限公司 混合式工業控制密罐設計與雛型建置, 109/04/01-110/03/31
科技部 關鍵基礎設施資安防護-以水資源為重點, 109/06/01-110/05/31
建教合作計畫 108年度水資源、能源關鍵設施安全管理計畫, 108/4/1-109/1/31
建教合作計畫 108年度經濟部能源領域、水領域關鍵基礎設施資安防護政策與基準工作, 108/4/1-109/1/31
科技部 運用人工智慧技術進行惡意樣本分類與攻擊追蹤之研究, 108/8/1-111/7/31
科技部 智慧感知與雲端服務產學技術聯盟(II)(3/3), 108/2/1-109/1/31
科技部 資安特色中心暨聯盟--資安特色中心暨聯盟(3/3), 108/6/1-109/5/31
安華聯網科技股份有限公司 107年度強化民營能源關鍵資訊基礎設施資安防護計畫, 107/4/13-08/1/31
安華聯網科技股份有限公司 107年度水資源關鍵設施升級及安全管理確保旗艦計畫之水資源領域關鍵基礎設 施資安防護政策與基準規劃工作, 107/6/28-108/1/31
安碁資訊股份有限公司 桃竹苗縣市政府壓力測試及資安強化建議服務, 107/10/15-108/1/31
安碁資訊股份有限公司 臺北市政府資訊局-弱點掃描服務, 107/9/1-108/2/28
科技部 抵抗外部與內部攻擊的隱私保護機制, 107/8/1-108/7/31
科技部 智慧感知與雲端服務產學技術聯盟(II)(2/3), 107/2/1-108/1/31
科技部 資安特色中心暨聯盟--資安特色中心暨聯盟(2/3), 107/6/1-108/10/31
科技部 資安監控與管理技術開發-資安監控與管理技術開發(2/3), 107/6/1-108/5/31
科技部 個資法與大數據計畫:社會需求、公共利益與個人資料保護(3/3)
科技部 個資法與大數據計畫:社會需求、公共利益與個人資料保護(2/3), 106/8/1-107/7/31
科技部 無線感測網路下以認證資訊交換機制抵禦感測節點攻擊之研究, 108/8/1-109/7/31
科技部 資安特色中心暨聯盟--資安特色中心暨聯盟(1/3), 108/6/1-109/10/31
科技部 在下世代無線行動網路中使用鄰近計算與通訊方式之SoLoMo群體導覽服務平台--總計畫及子計畫 一:在4G與Wi Fi融合式無線行動網路使用物聯網社群和行動社群網路技術之鄰近式興趣點資訊分享機制, 108/8/1-109/7/31,科技部
科技部 資安監控與管理技術開發-資安監控與管理技術開發(3/3), 108/6/1-109/5/31
科技部 資安監控與管理技術開發-資安監控與管理技術開發(2/3), 107/6/1-108/5/31
科技部 在下世代無線行動網路中使用鄰近計算與通訊方式之SoLoMo群體導覽服務平台--子計畫二:多層式 個人隱私保護針對群組內部與外部攻擊, 108/8/1-109/7/31
科技部 資安監控與管理技術開發-資安監控與管理技術開發(1/3), 106/6/1-107/5/31
科技部 以雲端平台為基礎之智慧型安全分析與管理系統--總計畫暨子計畫一:以Hadoop雲端平台為基礎之智慧型安全分析與管理系統, 108/8/1-109/7/31
教育部 行動寬頻尖端技術跨校教學聯盟-行動寬頻網路與應用-小細胞基站聯盟中心第二期 105/4/1-106/1/31
教育部 教育單位網站資安防護服務計畫(3/3) 105/1/1-105/12/31
國科會 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究--總計畫暨子計畫一:雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究(2/2) 104/8/1-105/7/31
教育部 教育單位網站資安防護服務計畫(2/3) 104/1/1-104/12/31
教育部 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究---總計畫暨子計畫一:雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究(1/2) 103/8/1-104/7/31
教育部 教育單位網站資安防護服務計畫(1/3) 103/1/1-103/12/31
經濟部 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (3/3) 103/9/1-104/8/31
科技部 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端系統中分散式日誌蒐集、錯誤偵測、稽核及預警系統 MOST 103-2221-E-006 -146 -MY3 103/8/1-106/7/31
經濟部 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (2/3) 102/9/1-103/8/31
經濟部 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (1/3) 101/9/1-102/8/31
國科會 車用行動生活之協力式多媒體串流服務平台--子計畫二:車輛隨意網路下具效率與安全之群組重疊網路設計(2/2) NSC 101-2219-E-006-003- 101/5/1-102/4/30
國科會 車用行動生活之協力式多媒體串流服務平台--子計畫二:車輛隨意網路下具效率與安全之群組重疊網路設計(1/2) NSC 100-2219-E-006-004- 100/5/1-101/4/30
專利技轉
李忠憲, 劉奕賢, 劉川綱, 彭彥筑, 吳柏毅, 2023, "深度學習訓練集資料之汙染清除系統及其方法" (中華民國,發明,證書號碼I802824)
李忠憲, 劉奕賢, 謝承恩, 林惟敏, 2023, "網路惡意流量分析之平衡式資料集生成與處理系統及其方法" (中華民國,發明,證書號碼I795153)
J.-S. Li, I-H. Liu, C.-K. Liu, P.-Y. Wu, Y.-C. Peng, 2022, “Deepfake Video Detection System and Method” (United States Patent, US 11,514,715 B2)
中華民國 專利編號:I784280 網路通訊方法及網路通訊系統 專利人:李忠憲、劉奕賢、劉川綱、吳謹瑞、賴佳俊、吳其哲。
中華民國 專利編號:I771068 具模擬設備通訊特徵的傳輸系統及方法 專利人:李忠憲、劉奕賢、劉川綱、賴佳俊、吳謹瑞、吳其哲。
中華民國 專利編號:I744057 深度偽造影片檢測系統及其方法 專利人:李忠憲、劉奕賢、劉川綱、吳柏毅、彭彥筑。
中華民國 專利編號:I703467 具有高互動組合工控誘捕系統及其方法 專利人:李忠憲、劉奕賢、孫孟瑋、陸冠竹。
中華民國 專利編號:I696362 基於無線網路的語音通訊安全防護方法 專利人:李忠憲、劉奕賢、張耿豪、陸冠竹。
中華民國 專利編號:I665580 雲端環境下針對圖像檔案的授權及搜尋方法 專利人:李忠憲、劉奕賢、陳佳秀、蔡金瑞。
中華民國 專利編號:I656454 防止密碼檔案外洩偵測方法及系統 專利人:李忠憲、劉奕賢、陳佳秀、蔡金瑞。
中華民國 專利編號:I638271 具加密檔案關鍵字模糊搜尋功能的雲端伺服器系統 專利人:李忠憲、劉奕賢、李詔遠、林禹妡、蔡金瑞。
中華民國 專利編號:I573452 網路相簿的運作方法 專利人:李忠憲、劉奕賢、謝哲人、高傳凱、郭奕岑。
中華民國 專利編號:I514174 分散式多重傳輸協定之跨層日誌搜集系統與方法 (DISTRIBUTED MULTIPLE PROTOCOL CROSS-LAYER LOG COLLECTION SYSTEM AND METHOD) 專利人:李忠憲、劉奕賢、盧建同、張家瑋、楊竹星、蔡邦維。
中華民國 專利編號:I501633 特徵嵌入方法 (SIGNATURE EMBEDDING METHOD) 專利人:李忠憲、劉奕賢、謝哲人、高傳凱、郭奕岑。
中華民國 專利編號:I484331 基於跨層日誌記錄的資料軌跡追蹤系統與方法 (BASE ON CROSS-LAYER LOG DATA TRACE SYSTEM AND METHOD) 專利人:李忠憲、劉奕賢、盧建同、張家瑋。
中華民國 專利編號:I461955 惡意程式破壞系統及其破壞方法 (MALICIOUS SCRIPTS SUPPRESSION SYSTEM AND SUPPRESSION METHOD THEREOF) 專利人:李忠憲、林敬皇、劉奕賢、馬健原、陳柏霖、安家駒。
中華民國 專利編號:I454164 車用隨意網路系統 (VANET SYSTEM) 專利人:李忠憲、劉奕賢、謝哲人、高傳凱。
中華民國 專利編號:I419596 車用隨意網路系統 (VANET SYSTEM) 專利人:李忠憲、劉奕賢、謝哲人、高傳凱。
中華民國 專利編號:I423068 影像數位標籤嵌入方法、即時鑑識方法及其鑑識系統 專利人:李忠憲、 謝哲人、 翁吉田。
中華民國 專利編號:I408923 語音閘道架構及其通訊方法 專利人:李忠憲、 謝哲人、 曾昭展。
中華民國 專利編號:I354451 具有數位修正的多媒體版權管理機制 (Digital Right Management with Fingerprint Correction) 專利人:李忠憲、謝哲人、洪丞甫、趙志宏。
中華民國 專利編號:I528843 多重傳輸通道的重疊網路串流方法及其系統 專利人:李忠憲、劉奕賢、盧建同、張家瑋、王大利、林駿凱。
論文著作
(A)期刊論文
(i) IEEE Transactions
J.-S. Li, I-H. Liu, C.-J. Tsai, Z.-Y. Su, C.-F. Li and C.-G. Liu, 2020, “Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality”, IEEE Access, Vol. 8, pp. 114940 - 114952.
Y.-M. Hu, I.-C. Chang, and J.-S. Li, 2015, “Hybrid Blocking Algorithm for Identification of Overlapping Staying Tags between Multiple Neighboring Readers in RFID Systems”, IEEE Sensors Journal, Vol. 15, No. 7, pp. 4076–4085.
H.-T. Lin, Y.-Y. Lin, W.-S. Yan, and F.-B. Hsieh, 2015, “Efficient Frame Aggregation Transmission Using Random Linear Network Coding”, IEEE Wireless Communications Letters, Vol. 3 No. 6, pp. 629–632.
Y.-S. Su, S.-L. Su, and J.-S. Li, 2014, “Joint topology-transparent scheduling and QoS routing”, IEEE Transactions on Vehicular Technology, Vol. 63, No. 1, pp. 372–389.
J.-S. Li and Y.-M. Hu, 2013, “An Efficient Time-Bound Collision Prevention Scheme for RFID Re-entering Tags”, IEEE Transactions on Mobile Computing, Vol. 12, No. 6, pp. 1054–1064.
(ii) Other Journals
K.-C. Lu, I-H. Liu, K.-H. Chang, J.-S. Li, 2023, “VoWi-Fi Security Threats: ARP Attack and Countermeasures” accepted for publication in IET Networks, https://doi.org/10.1049/ntw2.12113 (Early View). (SCI, EI)
I-H. Liu, M.-H. Lee, H.-C. Huang, J.-S. Li, 2023, “5G-Based Smart Healthcare and Mobile Network Security: Combating Fake Base Station”, Applied Sciences, Vol. 13, No. 20, pp. 11565-11575. (SCI, EI)
M.-W. Chang, J.-S. Li, I-H. Liu*, 2023, “Cyber-Physical Security Testbed for Dam Control System”, Journal of Advances in Artificial Life Robotics, Vol. 4, No. 2, pp. 106-109.
I-H. Liu, M.-W. Huang, H.-Y. Lai, M.-H. Lee, J.-S. Li, 2023, “Securing the Critical Communication in Dam Control System with SDN”, Journal of Robotics, Networking and Artificial Life, Vol. 10, No. 2, pp. 179-183. (ESCI)
I-H. Liu, M.-H. Lee, J.-S. Li, 2023, “Securing 5G Non-Public Networks Against Fake Base Station”, Journal of Robotics, Networking and Artificial Life, Vol. 10, No. 2, pp. 156-159. (ESCI)
I-H. Liu, C.-H. Wu, J.-S. Li, C.-F. Li, 2023, "Utilizing Blockchain to Monitor the Functioning of Devices in Industrial Control Systems", Journal of Advances in Artificial Life Robotics, Vol. 3, No. 4, pp. 205-208.
I-H. Liu, C.-E. Hsieh, W.-M. Lin, J.-S. Li, C.-F. Li, 2022, "Data-Balancing Algorithm Based on Generative Adversarial Network for Robust Network Intrusion Detection", Journal of Robotics, Networking and Artificial Life, Vol. 9, No. 3, pp. 303-308. (ESCI)
I-H. Liu, Y.-C. Tsai, C.-F. Li, J.-S. Li, 2022, "Cross-organizational Non-repudiation Industrial Control Log System Based on Blockchain", Journal of Robotics, Networking and Artificial Life, Vol. 9, No. 3, pp. 240-244. (ESCI)
I-H. Liu, C.-K. Liu, L.-Y. Chang, J.-S. Li, 2022, "OPC UA TSN Industrial Control System Cybersecurity Testbed", Journal of Robotics, Networking and Artificial Life, Vol. 9, No. 3, pp. 229-232. (ESCI)
I-H. Liu, J.-H. Lin, H.-Y. Lai, J.-S. Li, 2022, "Scalable ICS Honeypot Design by Description Files", Journal of Robotics, Networking and Artificial Life, Vol. 9, No. 3, pp. 216-220. (ESCI)
I-H. Liu, C.-C. Lai, J.-S. Li, C.-C. Wu, C.-F. Li, C.-G. Liu, 2021, “An Emulation Mechanism for PLC Communication Features”, Journal of Robotics, Networking and Artificial Life, Vol. 8, No. 3, pp. 175–179.
T.-L. Lee, I-H. Liu, C.-F. Li, and J.-S. Li, 2021, “Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement”, Journal of Robotics, Networking and Artificial Life, Vol. 8, No. 3, pp. 193–196.
J.-S. Li, C.-G. Liu, C.-J. Wu, C.-C. Wu, C.-W. Huang, C.-F. Li, I-H. Liu, 2021, “Design of Industrial Control System Secure Communication Using Moving Target Defense with Legacy Infrastructure”, Sensors and Materials, Vol. 10, No. 1, pp. 3415–3424.
I-H. Liu, C.-H. Lo, T.-C. Liu, J.-S. Li, C.-G. Liu , C.-F. Li, 2020, “IDS Malicious Flow Classification”, Journal of Robotics, Networking and Artificial Life, Vol. 7, No. 2, pp. 103-106.
J.-S. Li, I-H. Liu, C.-Y. Lee, C.-F. Li, C.-G. Liu, 2020, “A Novel Data Deduplication Scheme for Encrypted Cloud Databases”, Journal of Internet Technology, Vol. 21, No. 4, pp. 1115–1125.
S.-K. Yang, Y.-M. Shiue, Z.-Y. Su, I-H. Liu, C.-G. Liu, 2020, “An Authentication Information Exchange Scheme in WSN for IoT Applications”, IEEE Access, Vol. 8, pp. 9728–9738.
林孝忠, 王平, 洪維謙, 2019, “網路勒索病毒的特徵分析與知識本體模型建構”, Communications of the CCISA, Vol. 25, No. 2, pp. 37–58.
K.-C. Lu, I-H. Liu, J.-W. Liao, S.-C. Wu, Z.-C. Liu, J.-S. Li, C.-F. Li, 2019, “Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices”, Journal of Robotics, Networking and Artificial Life, Vol. 6, No. 3, pp. 157–161.
C.-C. Kuo, C.-L. Hou, C.-S. Yang, 2019, “The Study of a Risk Assessment System based on PageRank”, Journal of Internet Technology, Vol. 20, No. 7, pp. 2255-2264.
H.-C. Lin, P. Wang, W.-H. Lin, 2019, “Implementation of an PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks”, Journal of Computers, Vol. 8, pp. 88–103.
T.-S. Huang, P.-Y. Hsiung, B.-C. Cheng, 2019, “Mitigating DoS Attacks in SDN Using Offloading Path Strategies”, Journal of Internet Technology, vol. 20, no. 4 , pp. 1281–1285.
C.-G. Liu, I-H. Liu, C.-D. Lin, J.-S. Li, 2019, “A novel tag searching protocol with time efficiency and searching accuracy in RFID systems”, Computer Networks, Vol.150, No.26, pp. 201–216.
Y.-R. Chen, I-H. Liu, K.-H. Chang, C.-G. Liu, J.-S. Li, 2019, “Selection Strategy for VM Migration Method”, Journal of Robotics, Networking and Artificial Life, Vol. 6, No. 1, pp. 66–70.
C.-C. Kuo, K. Chain, C.-S. Yang, 2018, “Cyber Attack-and-Defense Training: Using Emulab as a Platform ”, International Journal of Innovative Computing, Information and Control, Vol.14, No.6, pp. 2245–2258.
C.-M. Chen, G.-H. Lai, J. Lin, 2018, “Detection of C&C Servers Based on Swarm Intelligence Approach”, Journal of Computers, Vol.29, No.5, pp. 204–215.
J.-S. Li, C.-K. Kao, C.-Y. Tsai, I-H. Liu, C.-G. Liu, 2017, "Low-cost localization service for roadside sensors based on passive information", Journal of High Speed Networks, Vol. 23, No. 4, pp. 323–339.
Y.-R. Chen, J.-S. Li, 2017, "Staggered approach for alleviating TCP Incast in simultaneous Multi-VM migration", Computer Communications, Vol. 106, No. 1, pp. 24–32.
C.-B. Ji, J.-S. Li, 2017, "Exploring Global IP-Usage Patterns in Fast-Flux Service Networks", Journal of Computers, Vol. 12, No. 4, pp. 371–380.
Chia-Mei Chen, Dah-Jyh Guan, Yu-Zhi Huang, Ya-Hui Ou, 2016, "Anomaly Network Intrusion Detection Using Hidden Markov Model", International Journal of Innovative Computing, Information and Control. Vol. 12, No. 2, pp. 569–580.
陳嘉玫, 賴谷鑫, 2016, "基於漸增式分群法之惡意程式自動分類研究", 電子商務學報, Vol. 18, No. 2, pp. 225–248.
C.-T. Lu, C.-W. Chang, J.-S. Li, 2015, "VM Scaling based on Hurst Exponent and Markov Transition with Empirical Cloud Data", Journal of Systems and Software, Vol. 99, pp. 199–207.
C.-B. Jiang, J.-S. Li, 2015, "Ontology-based Botnet Topology Discovery Approach with IP Flow Data", International Journal of Innovative Computing, Information and Control, Vol. 11, No. 1, pp. 309–326.
陳嘉玫, 王士豪, 2015, “QR Code智慧型藥藥物影音查詢系統”, Management Information Computing, Vol. 4, No. 1, pp. 224–233.
Kai Chain, Cheng-Chung Kuo, Chu-Sing Yang, 2016, " The analysis and implementation of Botnet and DDoS", International Journal of Computer Science and Information Security, Vol. 14, No. 10, pp. 194–200.
C.-B Jiang, I.-H Liu, Y.-N Chung, J.-S Li, 2016, " T Novel Intrusion Prediction Mechanism based on Honeypot Log Similarity", International Journal of Network Management, Vol. 26, No. 3, pp. 156–175.
Tzy-Shiah Wang, Hui-Tang Lin*, Wei-Tsung Cheng, Chang-Yu Chen, 2016, " DBod: Clustering and Detecting DGA-based Botnets Using DNS Traffic Analysis", Computers & Security, Vol. 64, pp. 1–15.
Tzy-Shiah Wang, Hui-Tang Lin*, Ping Wang, 2016, " Weighted-Spectral Clustering Algorithm for Detecting Community Structures in Complex Networks", Artificial Intelligence Review, Volume 47, Issue 4, pp 463–483.
K.-C. Hu, C.-W. Tsai, M.-C. Chiang, C.-S. Yang, 2015, "A Multiple Pheromone Table Based Ant Colony Optimization for Clustering", Mathematical Problems in Engineering, Vol. 2015, Article ID 158632, pp. 11.
C.-H. Lin, C.-T. Lu, Y.-H. Chen, J.-S. Li, 2014, “Resource allocation in cloud virtual machines based on empirical service traces”, International Journal of Communication Systems, Vol. 27, No. 12, pp. 4210–4225.
C.-J. Hsieh, C.-T. Weng, J.-S. Li, 2014, “JPEG Forensics Scheme for Signature Embedding and Packet-Level Detection”, International Journal of Communication Systems, Vol. 27, No. 11, pp. 3368–3382.
C.-T. Lu, C.-L. Chang, I-H. Liu, J.-S. Li, 2014, “Novel Advanced Broadcast Scheme for Efficient Safety Message Collision Alleviation in Vehicular Networks”, Journal of Wireless Person Communication, Vol. 77, No. 4, pp. 2793–2816.
I-H. Liu, C.-G. Liu, C.-T. Lu, Y.-T. Kuo, J.-S. Li, 2014, “A Multi-hop Resource Scheduling Algorithm for IEEE 802.16j Relay Networks”, Computer Networks, Vol. 67, pp. 164–179.
J.-S. Li, I-H. Liu, C.-K. Kao, C.-M. Tseng, 2013, “Intelligent Adjustment Forwarding: A Compromise between End-to-End and Hop-by-Hop Transmissions in VANET”, Journal of Systems Architecture, Vol. 59, No. 10, pp. 1319–1333.
C.-G. Liu, I-H. Liu, T.-T. Yang, J.-S. Li, 2013, “Navigation-Aware Association Control in Vehicular Wireless Networks”, Journal of High Speed Networks, Vol. 19, No. 4, pp. 311–324.
C.-H. Chao, C.-F. Yang, P.-T. Lin, J.-S. Li, 2013, “Novel Distributed Key Revocation Scheme for Wireless Sensor Networks”, Journal of Security and Networks, Vol. 6, No. 10, pp. 1271–1280.
J.-S. Li, C.-J. Hsieh, W.-C. Liu, 2013, “Digital Evidence Collection for Web Image Access”, Security and Networks, Vol. 6, No. 6, pp. 765–776. (SCI, EI)
J.-S. Li, C.-J. Hsieh, H.-Y. Lin, 2013, “A Hierarchical Mobile-Agent-based Security Operation Center”, International Journal of Communication Systems, Vol. 26, No. 12, pp. 1503–1519.
J.-S. Li, C.-J. Hsieh, Y.-K. Wang, 2013, “Distributed Key Management Scheme for P2P Live Streaming Services”, International Journal of Communication Systems, Vol. 26, No. 10, pp. 1259–1272
J.-S. Li and K.-H. Liu, 2013, “A Lightweight Identity Authentication Protocol for Vehicular Networks”, Telecommunication Systems, Vol. 53, No. 4, pp. 425–438.
C.-G. Liu, C.-H. Chao, C.-W. Leou, J.-S. Li, 2012, “Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks”, The Computer Journal, Vol. 55, No. 12, pp. 1467–1458.
C.-H. Lin, J.-Y. Ma, C.-S. Laih, J.-S. Li, 2012, "MSS: Use File Format Conversion for Suppress Malicious Scripts in Multimedia", Journal of Internet Technology, Vol. 13, No. 5, 2012, pp. 843–852.
J.-S. Li, K.-H. Liu, N. Chilamkurti, L. Shu, T. Q. Duong, 2012, "Scheduling Performance Enhancement by Network Coding in Wireless Mesh Networks", IET Communications, Vol. 6, No. 13, pp. 1912–1919.
J.-S. Li, K.-H. Liu, C.-H. Wu, 2012, "Efficient Real-time Group Multicast Node Scheduling Schemes in Multi-hop Wireless Networks", Computer Communications, Vol. 35, No. 10, pp. 1247–1258.
J.-S. Li, K.-H. Liu, 2012, “Network-coding-based Cache Policy for Loss Recovery Enhancement in Reliable Multicast”, International Journal of Network Management, Vol. 22, No. 4, pp. 330–345.
K.-H. Liu, J.-S. Li, C.-Y. Wang, N. Chilamkurti, T. Vasilakos, 2012, “Minimizing Multi-player Interactive Delay in Multihop Wireless Networks”, International Journal of Communication Systems, Vol. 25, No. 10, pp. 1330–1349.
C.-B. Jiang, J.-S. Li, 2012, “IP Flow Data Correlation with Interference Rules”, Advanced Materials Research, Vol. 406, No. 1, pp. 1211–1214.
(B)研討會論文
(i) 國際研討會
P.-W. Chou, N.-Y. Chen, J.-S. Li, I-H. Liu*, 2024, “Detecting abnormal operations in ICS using finite-state machines”, ICAROB 2024, Feb. 22-25, Oita, Japan.
Y.-H. Chang, T.-E. Peng, J.-S. Li, I-H. Liu*, 2024, “Industrial Control System State Monitor Using Blockchain Technology”, ICAROB 2024, Feb. 22-25, Oita, Japan.
Y.-C. Wu, J.-S. Li, C.-F. Li, I-H. Liu*, 2024, “Enhancing Dam Security and Water Level Alerting with Blockchain Technology”, ICAROB 2024, Feb. 22-25, Oita, Japan.
T.-E. Peng, Y.-H. Chang, J.-S. Li, I-H. Liu*, 2024, “MiniDAM: A Dam Cybersecurity Toolkit”, ICAROB 2024, Feb. 22-25, Oita, Japan.
N.-Y. Chen, P.-W. Chou, J.-S. Li, I-H. Liu*, 2024, “Case Study of Network-Based Intrusion Detection System Deployment in Industrial Control Systems with Network Isolation”, ICAROB 2024, Feb. 22-25, Oita, Japan.
T.-E. Peng, I-H. Liu, J.-S. Li, C.-K. Liu, “Network Intrusion Detection Using CNN-based Classification Method”, IEEE/ACIS SNPD2023-Winter, Dec. 6-7, Taichung, Taiwan.
S.-G. Tân, I-H. Liu, J.-S. Li, 2023, “Simulation and Analysis of Common Attacks against PLCs Used in Dam Testbed”, ARIS 2023, Aug. 30 - Sep. 1, Taipei, Taiwan.
H.-C. Huang, I-H. Liu, M.-H. Lee, J.-S. Li, 2023, “Anomaly Detection on Network Traffic for Healthcare Internet of Thing”, IEEE ECBIOS 2023, Jun. 2-4, Tainan, Taiwan.
M.-H. Lee, I-H. Liu, H.-C. Huang, J.-S. Li, 2023, “Cybersecurity in 5G-Based Smart Healthcare Network: A Base Station Case Study”, IEEE ECBIOS 2023, Jun. 2-4, Tainan, Taiwan. (Best Conference Paper Award)
C.-Y. Lee, I-H. Liu, M.-W. Chang, J.-S. Li, 2023, “The Dam Gate Cybersecurity Testbed”, ICAROB 2023, Feb. 9-12, Oita, Japan.
C.-H. Wu, I-H. Liu, J.-S. Li, C.-F. Li, 2023, “Device's Operation Tracking using Blockchain in Industrial Control System”, ICAROB 2023, Feb. 9-12, Oita, Japan.
M.-W. Huang, I-H. Liu, H.-Y. Lai, M.-H. Lee, J.-S. Li, 2023, “Strengthen the Security of the Industrial Control System using SDN Technology”, ICAROB 2023, Feb. 9-12, Oita, Japan
M.-H. Lee, I-H. Liu, J.-S. Li, 2023, “Fake Base Station Threats in 5G Non-Public Networks”, ICAROB 2023, Feb. 9-12, Oita, Japan.
M.-W. Chang, I-H. Liu, J.-S. Li, 2023, “Cyber-Physical Security Testbed for River Basin Gate Control System”, ICAROB 2023, Feb. 9-12, Oita, Japan.
I-H. Liu, J.-S. Chen, K.-M. Su, J.-S. Li, 2022,“Dam Control System's Cybersecurity Testbed”, IIH-MSP 2022, Dec. 16-18, Kitakyushu, Japan.
M.-W. Chang, I-H. Liu, C.-K. Liu,W.-M. Lin, Z.-Y. Su, J.-S. Li, 2022, “A Non-normal Warning System for Dam Operation Using Machine Learning”, IEEE/ACIS SNPD2022-Winter, Dec. 7-9, Taichung, Taiwan.
S.-G. Tân, I-H. Liu, J.-S. Li, 2022, “Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack Tree”, CANDAR 2022 WICS Workshop, Nov. 21–22, Himeji, Japan.
I-H. Liu, J.-S. Li, Y.-C. Peng, C.-G. Liu, 2022, “A Countermeasure of polluting on Health-Related Dataset for data mining”, IEEE ECBIOS 2022, May 27–29, Tainan, Taiwan. (Best Conference Paper Award)
I-H. Liu, Y.-C. Peng, J.-S. Li, C.-G. Liu, 2022, “A New Poisoning Attacks on Deep Neural Networks”, ICHSM 2022, May 13–15, Kyoto, Japan.
I-H. Liu, J.-H. Lin, H.-Y. Lai, J.-S. Li, 2022, “Extendable ICS Honeypot Design with Modbus/TCP”, ICAROB 2022, Jan. 20–23, Oita, Japan.
I-H. Liu, L.-Y. Chang, J.-S. Li, 2022, “Industrial Control System Cybersecurity Testbed with TSN Feature”, ICAROB 2022, Jan. 20–23, Oita, Japan.
Y.-C. Tsai, I-H. Liu, J.-S. Li, 2022, “Blockchain-based Verification Mechanism for Industrial Control System”, ICAROB 2022, Jan. 20–23, Oita, Japan.
I-H. Liu, C.-E. Hsieh, W.-M. Lin, J.-S. Li, C.-F. Li, 2022, “Data Balanced Algorithm Based on Generative Adversarial Network”, ICAROB 2022, Jan. 20–23, Oita, Japan.
Y.-Y. Chen, I-H. Liu, C.-C. Wu, C.-G. Liu, J.-S. Li, 2021, “Dynamic Interval Strategy for MT6D in IoT Systems”, IEEE ICEIB 2021, Dec. 10–12, Yilan, Taiwan.
K.-C. Lu, I-H. Liu, J.-S. Li, 2021, “A Survey of the Offensive and Defensive in Industrial Control System”, CANDAR 2021 NCSS Workshop, Nov. 23–26, Matsue, Japan.
I-H. Liu, C.-E. Hsien, W.-M. Lin, C.-F. Li, J.-S. Li, 2021, “Malicious Flows Generator Based on Data Balanced Algorithm”, iFUZZY 2021, Oct. 5–8, Taitung, Taiwan.
C.-W. Huang, I-H. Liu, J.-S. Li, C.-C. Wu, C.-F. Li, C.-G. Liu, “A Legacy Infrastructure-based Mechanism for Moving Target Defense”, IEEE ECBIOS 2021, May 28–30, Tainan, Taiwan. (Best Conference Paper Award)
Y.-Y. Chen, I-H. Liu, C.-C. Wu, C.-G. Liu, J.-S. Li, 2021, “The Effect of Node Deployment for MT6D in Industry Control System”, IEEE SIBCON 2021, May 13–15, Kazan, Russia.
T.-L. Lee, I-H. Liu, J.-S. Li, 2021, “Threats Hidden in Employee Workstation through Office Files”, ICAROB 2021, Jan 21–24, Hiroshima, Japan.
C.-C. Lai, I-H. Liu, C.-C. Wu, J.-S. Li, C.-G. Liu, 2021, “A Communication System with Equipment's Characteristics”, ICAROB 2021, Jan 21–24, Hiroshima, Japan.
K.-M. Su, I-H. Liu, J.-S. Li, 2021, “The Security Challenges with The Widespread Use of IT Infrastructure in ICS”, ICAROB 2021, Jan 21–24, Hiroshima, Japan.
K.-M. Su, I-H. Liu, J.-S. Li, 2020, “The Risk of Industrial Control System: Programmable Logic Controller Default Configurations”, ICS 2020, Dec. 17–19, Tainan, Taiwan.
C.-G. Liu, C.-J. Wu, I-H. Liu, C.-C. Wu, J.-S. Li, 2020, “Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems”, ICEA 2020, Dec. 12–15, Gangwon, Republic of Korea.
I-H. Liu, Y.-L. Chang, J.-S. Li, C.-G. Liu, 2020, “Differential Privacy Protection with Group Onion Routing based on AI-based URL Classification”, ICEA 2020, Dec. 12–15, Gangwon, Republic of Korea.
P.-Y. Chung, J.-S Li, I-H. Liu, Q.-R. Song, C.-F. Li, G.-L. Huang, 2020, “Cyber Security of Critical Infrastructure Protection Overview in Taiwan's Water Resource Domain”, ICRCE 2020, Jun. 19–21, Tokyo, Japan.
C.-H. Lo, T.-C. Liu, I-H. Liu, J.-S. Li, 2020, “Malware Classification Using Deep Learning”, ICAROB 2020, Jan. 13–16, Otia, Japan.
S.-H. Huang, I-H. Liu, 2020, “A Study of Applying Computer-assisted Language Learning to English Course for Junior College Students in Taiwan”, ICAROB 2020, Jan. 13–16, Otia, Japan.
H.-C. Lin, P. Wang, W.-H. Lin, 2019, “A Revised Particle Swarm Optimization Scheme for Discovering Attack Vectors of IPv6 Security by Spoofed IP Attacks”, IEEE ECICE 2019, Oct. 3–6, Yunlin, Taiwan. (Best Conference Paper Award)
C.-Y. Wu, C.-C. Kuo, C.-S. Yang, 2019, “A Phishing Detection System based on Machine Learning”, ICEA 2019, Aug. 30–Sep. 1, Tainan, Taiwan.
S.-K. Yang, Y.-M. Shiue, I-H. Liu, Z.-Y. Su, C.-G Liu, 2019, “Performance analysis of Authentication Information exchange Scheme in WSN”, ICEA 2019, Aug. 30–Sep. 1, Tainan, Taiwan.
W.-Z. Wu, B.-C. Cheng , 2019, “A Novel Approach to Identify Confidential Data in Data Leakage Prevention Systems”, The 2019 International Conference on Security and Management (SAM'19), Jul. 29–Aug. 1, Las Vegas, USA.
I-H. Liu, C.-G. Liu, J.-S. Li , 2019, “Effect of Different Information Security Training Methods based on TCAT Cup CTF Game”, The 2nd International Conference on Science Management, Engineering Technology and Applied Sciences (SETAS 2019), Feb. 16–27, Osaka, Japan.
Y.-R. Chen, I-H. Liu, K.-H. Chang, C.-G. Liu, J.-S. Li, 2019, “VM Migration Placement in Cloud Service”, The 2019 International Conference on Artificial Life and Robotics (ICAROB 2019), Jan. 10–13, Beppu, Japan.
D.-W. Wen, C.-M. Chen, 2018, “Evolution of Advanced Persistent Threat (APT) Attacks and Actors”, International Computer Symposium 2018 (ICS 2018), Dec. 20–22, Yunlin, Taiwan.
P.-Y. Hsiung, C.-H. Li, Shih Hung Chang, Bo-Chao Cheng, 2018, “A Fog-Based Collusion Detection System”, Security with Intelligent Computing and Big-data Services (SICBS 2018), Dec. 14–16, Springer, Cham.
C.-M. Chen, Z.-X. Tsai, 2018, “Integrated Digital Forensic for Cyber Attacks”, International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018), Dec. 14–16, Guilin, China.
T.-H. Chang, C.-M. Chen, G.-H. Lai, J. Lin, 2018, “The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic”, 2018 IEEE Conference on Dependable and Secure Computing (TDSC 2018), Dec. 10–13, Kaohsiung, Taiwan.
K.-C. Lu, I-H. Liu, J.-S. Li, 2018, “Venerability and Protection Tool Surveys of Industrial Control System”, The 6th International Symposium on Computing and Networking Workshops (CANDARW 2018), Nov. 27–30, Takayama, Japan.
C.-C. Kuo, S.-H Yao, C.-L. Hou, C.-S. Yang, 2018, “Design and implementation of a host-based intrusion detection system for linux-based web server”, The 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2018), Nov. 26–28, Sendai, Japan.
C.-M. Chen, W.-L. Lo, G.-H. Lai, Y.-C. Hu, 2018, “Network Anomaly Detection Based on Artificial Intelligence”, The 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2018), Nov. 26–28, Sendai, Japan.
W.-H. Lin, P. Wang, K.-M. Chao, C.-C. Lo, 2018, “A Cross-age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices”, The 15th IEEE International Conference on e-Business Engineering (ICEBE 2018), Oct. 12–14, Xi’An China.
I-H. Liu, C.-G. Liu, C.-H. Chen, J.-S. Li, 2018, “Authentication Database Leakage Detection”, The 8th International Conference on Digital Information and Communication Technology and its Applications, Sep. 17–19, Lodz, Poland.
K.-C. Lu, I-H. Liu, M.-W. Sun, J.-S. Li, 2018, “A Survey on SCADA Security and Honeypot in Industrial Control System”, The 3rd International Conference of Reliable Information and Communication Technology 2018, Jul. 23–24, Kuala Lumpur, Malaysia.
I-H. Liu, Y.-H. Lee, J.-S. Li, 2018, “Routing Loop Detection in VM Network”, e-CASE & e-Tech 2018, Apr. 1–3, Osaka, Japan.
C.-F. Li, J.-J. Su, I-H. Liu, 2018, “Factors Affecting Customers' Use of Internet Banking”, e-CASE & e-Tech 2018, Apr. 1–3, Osaka, Japan.
C.-C. Kuo; K. Chain; I-H. Liu, C.-S. Yang, J.-S. Li, 2018, “Design and Implement of Capture the Flag based on Cloud Offense and Defense Platform”, ICASI 2018, Apr. 13–17, Chiba, Japan.
I-H. Liu, Y.-H. Lin, J.-S. Li, C.-G. Liu, 2018, “A Secure Multi-Keyword Fuzzy Search with Polynomial Function for Encrypted Data in Cloud Computing”, ICCCS 2018, Apr. 27–30, Nagoya, Japan.
Y.-R. Chen, I-H. Liu, C.-W. Chou, J.-S. Li, C.-G. Liu, 2018, “Multiple Virtual Machines Live Migration Scheduling Method”, ICCCS 2018, Apr. 27–30, Nagoya, Japan.
I-H. Liu, C.-H. Chen, J.-S. Li, 2018 , “Novel Detection Scheme for Stolen Password File”, ICAROB 2018, Feb. 1–4 , Oita, Japan.
I-H. Liu, C.-G. Liu, C.-J. Chang, J.-S. Li, 2018, “Client Searching Privacy Protection in Encrypted Database”, ICAROB 2018, Feb. 1–4, Oita, Japan.
I-H. Liu, T.-J. Fang, J.-S. Li, M.-W. Sun, C.-G. Liu, 2017, “A New Colluded Adversarial VNet embeddings Attack in Cloud”, PDCAT 2017, Dec. 18–20 , Taipei, Taiwan
I-H. Liu, N.-W. Li, C.-F. Li, J.-S. Li, 2017, “RBAC Management with Blockchain”, EECS 2017, Dec. 19–21, Singapore.
S.-C Tsai, I.- Liu, C.-T Lu, B.-L Chen, J.-S Li, 2016, “Factor Impact of Virtual Switch Performance by Factorial Design in Cloud Computing”, ICS 2016, Dec. 15–17, Chiayi, Taiwan.
C.-B Jiang, I.-H Liu, C.-G Liu, Y.-C Chen, J.-S Li, 2016, “Distributed Log System in Cloud Digital Forensics”, ICS 2016, Dec. 15–17, Chiayi, Taiwan.
Chia-Mei Chen, Gu-Hsin Lai, 2016, “Detecting Command and Control Servers Using Ant Colony Optimization”, ICCSIT 2016, Dec. 7–12, Limerick City, Ireland.
S.-C Tsai, I.-H Liu, C.-T Lu, C.-H Chang, J.-S Li, 2016, “Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network”, IIH-MSP 2016, Nov. 21–23, Kaohsiung, Taiwan.
Chia-Mei Chen, Sung-Chien HSU, Gu-Hsin Lai, 2016, “Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks”, ICGEC 2016, Nov. 7–9, Fuzhou City, Fujian Province, China.
Chia-Mei Chen, Gu-Hsin Lai, Pong-Yu Young, 2016, “Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection”, AsiaJCIS 2016, Aug. 4–5, Fukuoka, Japan.
Chia-mei Chen, Han-wei Hsiao, Tien-ho Chang, 2016, “The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs”, MobiSec 2016, Jul. 13–16, Taichung, Taiwan.
I-Hsien Liu, Chuan-Gang Liu, Kun-Hsuan Liu , Shun-Hsiung Yu , Zhi-Yuan Su , Jung-Shian Li, 2016, “Distributed Node Scheduling Algorithms for Multiple Group Communications in Wireless Multi-hop Networks”, Qshine 2016, Jul. 7–8, Seoul, South Korea.
Tzy-Shiah Wang, Hui-Tang Lin, 2016, “DGA Botnet Detection Utilizing Social Network Analysis”, IS3C 2016, Jul. 4–6, Xi'an, China.
Jung-Shian Li, 2016, “Digital Forensic with Cross-Layer Log Files”, BAI 2016, Jul. 3–5, Nagoya, Japan.
Shi-Hao Wang, Chia-Mei Chen, Gu-Hsin Lai, 2016, “Exploring Cross-Site Scripting Botnet Detection and Simulation”, PACIS 2016, Jun. 27–July 1, Chiayi, Taiwan.
Nian Xia, Chu-Sing Yang, 2016, “Recent Advances in Machine-to-Machine Communications”, IoTSC 2016, May 29–31, Nanjing, China.
Shih-Hsiung Lee, Chin-Nan Hu, Chu-Sing Yang, 2016, “Token-oriented based for Internet of Things and Clouding computing services”, ICC 2016, Mar. 22–23, Cambridge, United Kingdom.
Ci-Bin Jiang , Jung-Shian Li, 2016, “Exploring Global IP-usage Patterns in Fast-Flux Service Networks”, ICICA 2016, Jan. 18–19, Brisbane, Australia.
C.-M. Chen, T. Chang, 2015, “The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack”, AsiaJCIS 2015, May 24–26, Kaohsiung, Taiwan.
I-Hsien Liu, Chun-Kai Lin, Jung-Shian Li, 2015, “An enhancing video streaming scheme over hybrid VANET”, AROB 2015, Jan. 21–23, Beppu, Japan.
I-Hsien Liu, Tian-Li Wang, Jung-Shian Li, 2014, “An Effective Group Communications in Hybrid VANET”, ICS 2014, Dec. 12–14, Taichung, Taiwan. (Best Poster Award)
Chuan-Gang Liu, Chuan-Kang Kao, Huoc-Yong Koo, Jung-Shian Li, 2013, “A Novel Group-based Location Service Management Scheme in VANETs”, ICICN 2013, Jan. 19–20, Singapore.
Jung-Shian Li, I-Hsien Liu, Kun-Hsuan Liu, Shun-Hsiung Yu, 2012, “Schedule Multi-player Online Game Transmission Services in Wireless Multi-hop Networks”, MASS 2012, Aug. 10–12, Shanghai, China.
(ii) 國內研討會
張允豪, 劉奕賢, 李忠憲, 2023, “基於區塊鏈的智慧系統資料驗證機制”, 第十三屆網路智能與應用研討會(NCWIA2023), Aug. 4-5, 台灣雲林. (最佳論文獎)
黃敏維, 劉奕賢, 李忠憲, 2023, “運用內容感知軟體定義網路提升智慧控制系統傳輸安全”, 第十八屆國際健康資訊管理研討會(UHIMA2023), May. 27-28, 台灣花蓮. (論文獎佳作)吳芊欣, 劉奕賢, 李忠憲, 2023, “基於區塊鏈技術的物聯網運作記錄系統”, 第十八屆國際健康資訊管理研討會(UHIMA2023), May. 27-28, 台灣花蓮. (論文獎佳作)
賴薪宇, 劉奕賢, 李忠憲, 2022, “運用軟體定義網路保障工業控制系統可用性”, ITAOI 2022, May 27–29, 澎湖, 台灣.
蔡曜竹, 劉奕賢, 李忠憲, 2022, “水資源場域內之區塊鏈證據資料保護系統”, DLT 2022 數位生活科技研討會, May 13, 高雄, 台灣.
李鎮宇, 劉奕賢, 李忠憲, 李竹芬, 2022, “資安試驗平台比較分析”, UHIMA 2022 第十七屆國際健康資訊管理研討會, Mar. 13, 嘉義, 台灣.
黃哲偉, 劉奕賢, 劉川綱, 吳其哲, 李忠憲, 2022, “以動態位址分派技術提高健康照護環境之資訊安全性”, UHIMA 2022 第十七屆國際健康資訊管理研討會, Mar. 13, 嘉義, 台灣.
張力尹, 劉奕賢, 陳柏瑋, 李忠憲, 2022, "基於TSN網路的工業控制網路流量排程控制", NST 2022 臺灣電信年會, Jan. 24–27, 台北, 台灣.
吳謹瑞, 劉奕賢, 吳其哲, 劉川綱, 李忠憲, 2021, “Agent-based Moving Target Defense for Industrial Conrol System”, NCS 2021 全國計算機會議, Dec. 10–12, 台中, 台灣.
謝承恩, 劉奕賢, 陸冠竹, 李忠憲, 2021, “基於機器學習之入侵偵測系統研析”, CISC 2021 第三十一屆全國資訊安全會議, Aug. 5–6, 台北, 台灣.
張力尹, 劉奕賢, 鍾沛原, 楊竹星, 李忠憲, 2021, “運用修正式德菲法建構水資源領域關鍵基礎設施資安防護指標”, ITAOI 2021, May 28–29, 金門, 中華民國.
陳階欣, 劉奕賢, 李忠憲, 2021, “工業控制系統信號傳輸干擾與抗干擾分析”, DLT 2021 數位生活科技研討會, May 14, 屏東, 台灣.
謝承恩, 陸冠竹, 劉奕賢, 李忠憲, 2020, “基於工控系統運用安全資訊和事件管理系統之研析”, TANET 2020, Oct. 28–30, 台北, 台灣.
陳階欣, 劉奕賢, 李忠憲, 2020, “工控網路安全:水領域感測器干擾因素之研究”, TANET 2020, Oct. 28–30, 台北, 台灣.
賴佳俊, 劉奕賢, 吳其哲, 劉川綱, 李忠憲, 2020, “運用回應特徵的蜜網偵測機制”, CISC 2020 第三十屆全國資訊安全會議, Sep. 1–4, 高雄, 台灣.
吳柏毅, 劉奕賢, 劉川綱, 李竹芬, 李忠憲, 2020, “探討 Deepfake 影片生成方法”, UHIMA 2020 第十五屆國際健康資訊管理研討會, Jul. 4, 台南, 台灣. (優秀論文獎)
彭彥筑, 劉奕賢, 劉川綱, 李竹芬, 李忠憲, 2020, “機器學習上的攻擊之研析”, UHIMA 2020 第十五屆國際健康資訊管理研討會, Jul. 4, 台南, 台灣.
王成允, 劉奕賢, 劉川綱, 李竹芬, 李忠憲, 2020, “軟體定義網路上的攻擊與防護之研析”, UHIMA 2020 第十五屆國際健康資訊管理研討會, Jul. 4, 台南, 台灣.
李東霖, 劉奕賢, 吳其哲, 李竹芬, 李忠憲, 2020, “網路通訊品質對 VPN 連線可靠度之影響”, DLT 2020 數位生活科技研討會, May 16, 屏東, 台灣.
宋泉儒, 吳柏毅, 劉奕賢, 李忠憲, 2019, “Android惡意軟體偵測與防護之研析”, 第25屆台灣網際網路研討會 (TANET 2019), Sep. 25–27, 高雄, 台灣.
王成允, 宋泉儒, 安家駒, 劉奕賢, 李忠憲, 2019, “機器學習流量分析對洋蔥路由匿蹤危害之研析”, 第25屆台灣網際網路研討會 (TANET 2019), Sep 25–27, 高雄, 台灣.
宋泉儒, 王成允, 劉奕賢, 李忠憲, 2019, “基於機器學習方法的入侵檢測系統研析”, 第25屆台灣網際網路研討會 (TANET 2019), Sep. 25–27, 高雄, 台灣.
鍾沛原, 李忠憲, 劉奕賢, 黃貴麟, 2019, “因應資通安全管理法之資安管理研究 -以水資源領域關鍵基礎設施為例”, 第25屆台灣網際網路研討會 (TANET 2019), Sep. 25–27, 高雄, 台灣.
吳柏毅, 彭彥筑, 劉奕賢, 李忠憲, 2019, “使用機器學習改善網路傳輸品質的探討”, 第25屆台灣網際網路研討會 (TANET 2019), Sep. 25–27, 高雄, 台灣.
陸冠竹, 劉奕賢, 劉宗晁, 李忠憲, 2019, “工業控制系統安全之探討-以西門子S7系列為例”, 第25屆台灣網際網路研討會 (TANET 2019), Sep. 25–27, 高雄, 台灣.
劉大哲, 蔡一郎, 陸冠竹, 劉奕賢, 羅政翔, 李忠憲, 2019, “探討深度學習應用於惡意程式分類中之研析”, 第九屆航空科技與飛航安全暨第七屆航空與社會學術研討會會議 (2019ATSF&AS), Jun. 6, 高雄, 台灣.
羅政翔, 陸冠竹, 蔡一郎, 劉奕賢, 劉大哲, 李忠憲, 2019, “運用微控制器建置工業控制蜜網系統”, 第29屆全國資訊安全會議 (CISC 2019), May 23–24, 台中, 台灣.
陸冠竹, 廖家煒, 吳少鈞, 劉奕賢, 李忠憲, 2019, “使用從序列到序列模型改善入侵偵測系統之惡意入侵偵測”, 第29屆全國資訊安全會議 (CISC 2019), May 23–24, 台中, 台灣.
林孝忠, 林正逢, 莊博鈞, 2019, “應用深度學習於IoT 殭屍網路偵測之研究”, 第30屆國際資訊管理學術研討會 (ICIM 2019), May 18, 台北, 台灣.
李柏毅, 蔡一郎, 陳嘉玫, 2018, “從網路威脅情資分享探討我國關鍵資訊基礎設施防護策略”, 2018第二十四屆國際資訊管理暨實務研討會 (IMP 2018), Dec. 1, 台南, 台灣.
蔡一郎, 張成睿, 安興彥, 李忠憲, 2018, “以BDTS進行常時間惡意網域IP變化行為偵測”, 2018台灣網際網路研討會 (TANET 2018), Oct. 24–26, 桃園, 台灣.
陸冠竹, 劉奕賢, 李忠憲, 李竹芬, “運用匿名傳輸技術保護醫療資訊安全”, 第十三屆國際健康資訊管理研討會 (UHIMA 2018), 2018, Jun. 8–9, 花蓮, 台灣.
劉奕賢, 陳佳秀, 陸冠竹, 李忠憲, 李竹芬, 劉忠峰, “帳戶驗證機制的安全性研析”, 第十三屆國際健康資訊管理研討會 (UHIMA 2018), 2018, Jun. 8–9, 花蓮, 台灣.
顏子皓, 蔡一郎, 陸冠竹, 劉奕賢, 潘祈睿, 李忠憲, 2018, “使用機器學習技術之入侵防禦系統研究”, ITAOI 2018, May 24–27, 澎湖, 台灣.
顏子皓, 蔡一郎, 陸冠竹, 劉奕賢, 潘祈睿, 李忠憲, 2018, “探討機器學習與深度學習應用於惡意程式分析中之研析”, ITAOI 2018, May 24–27, 澎湖, 台灣.
陸冠竹, 劉奕賢, 孫孟瑋, 鍾沛原, 李忠憲, 2018, “探討蜜網在 SCADA 系統中安全之研析”, ITAOI 2018, May 24–27, 澎湖, 台灣.
陸冠竹, 劉奕賢, 孫孟瑋, 鍾沛原, 李忠憲, 2018 , “使用機器學習技術之入侵防禦系統研究”, ITAOI 2018, May 24–27, 澎湖, 台灣.
林文暉, 王平, 吳保樺, 蔡政穎 , 2018, “基於DNN網路架構之網路入侵偵測”, 第二十八屆全國資訊安全會議研討會 (CISC 2018), May 24–25, 台北, 台灣.
徐志朋, 劉上宇, 朱家訓, 黃冠龍, 許振銘, 蔡一郎, 葉永信, 2018, “kCTF@CDX: 高速網路與計算中心雲端資安攻防平台–網路攻擊鏈數位靶場”, 第二十八屆全國資訊安全會議 (CISC 2018), May 24–25, 台北, 台灣.
陸冠竹, 劉奕賢, 劉川綱, 李忠憲, 2017, “SCADA資訊安全之研析”, 2017台灣網際網路研討會 (TANET 2017), Oct. 25–27, 台中, 台灣.
張永霖, 劉奕賢, 劉川綱, 李忠憲, 2017, “匿名傳輸技術之研析”, 2017台灣網際網路研討會 (TANET 2017), Oct. 25–27, 台中, 台灣.
安家駒, 劉奕賢, 李儂偉, 李忠憲, 2016, “區塊鏈技術實現跨組織認證架構”, TANET 2016, Oct. 19–21, 花蓮, 台灣.
張成睿, 劉奕賢, 劉川綱, 李忠憲, 2016, “雲端資料加密環境下的多關鍵字搜尋技術探討”, TANET 2016, Oct. 19–21, 花蓮, 台灣.
陳佳秀, 劉奕賢, 蔡一郎, 李忠憲, 2016, “雲端系統虛擬帳號誘捕機制”, TANET 2016, Oct. 19–21,花蓮, 台灣.
蔡金瑞, 劉奕賢, 陳信文, 邱志傑, 劉川綱, 李忠憲, 楊竹星, 2016, “網頁圖像隱私偵測系統構”, TANET 2016, Oct. 19–21, 花蓮, 台灣.
宋彥徵, 賴家齡, 高毓英, 林輝堂, 2016, “支援服務品質於分時/分波多工長距離光纖網路之即時性演算法”, TANET 2016, Oct. 19–21, 花蓮, 台灣.
郭振忠, 林季偉, 姚書涵, 楊竹星, 2016, “設計與實作基於埠號監控的殭屍網路惡意程式偵測框架”, TANET 2016, Oct. 19–21, 花蓮, 台灣.
陳嘉玫, 吳惠麟, 張明達, 曾昭銘, 陳怡靜, 2016, “多層次網路防護系統”, TANET 2016, Oct. 19–21, 花蓮, 台灣.
黃瓊瑩, 孫明功, 陳嘉玫, 張子敬, 賴谷鑫, 2016, “注入惡意DLL之APT攻擊手法研究”, TANET 2016, Oct. 19–21, 花蓮, 台灣.
富榮光, 陳嘉玫, 2016, “資訊主機監控系統設計與建置之研究”, TANET 2016, Oct. 19–21, 花蓮, 台灣.
郭振忠, 程凱, 楊竹星, 2016, “設計安全的訓用暨後維管理網站平台”, CISC 2016, May 26–27, 台中, 台灣.
陳嘉玫, 賴谷鑫, 王奕凱, 2016, “惡意程式組件分析與關連性分群”, CISC 2016, May 26–27, 台中, 台灣.
陳嘉玫, 賴谷鑫, 王則堯, 2016, “以機率粗糙集合論為基礎的 HTTP-based 殭屍網路偵測”, CISC 2016, May 26–27, 台中, 台灣.
王子夏, 林致聖, 林輝堂, 2016, “植基於社群網路分析方法之DAG型態殭屍網路偵防研究”, CISC 2016, May 26–27, 台中, 台灣.
涂嘉成, 林季偉, 張家綸, 姚書涵, 楊竹星, 2016, “設計與實作基於NetFlow分析的路由調整”, ITAOI 2016, May 20–21, 高雄, 台灣.
許凱竣, 郭振忠, 楊竹星, 2015, “基於靜態分析之可攜式文件格式檔案過濾系統”, CISC 2015, May 28–29, 高雄, 台灣.
陳嘉玫, 王士豪, 2015, “漸進式惡意程式分類方法”, CISC 2015, May 28–29, 高雄, 台灣.
陳嘉玫, 王則堯, 羅文翎, 2015, “智慧型僵屍網路偵測”, CISC 2015, May 28–29, 高雄, 台灣.
郭振忠, 歐雅惠, 劉奕賢, 王子夏, 郭鎮穎, 陳嘉玫, 李忠憲, 林輝堂, 楊竹星, 2014, “網路威脅搜捕、分析、追蹤與過濾技術之研究”, Cyberspace 2014, Dec. 5, 台北, 台灣.
郭振忠, 盧建同, 林敬皇, 李忠憲, 楊竹星, 2013, “基於測試平台之網路攻防演練活動設計與實作”, NCS 2013, Dec. 13–14, 台中, 台灣.
陳怡臻, 劉奕賢, 盧建同, 方泰鈞, 李忠憲, 2013, “雲端分散式日誌搜集方法”, NST 2013, Nov. 14–16, 台南, 台灣.
劉奕賢, 蔡舜智, 江啟賓, 張家瑋, 安家駒, 李忠憲, 2013, “結構化惡意程式資料庫系統 ”, TANET 2013, Oct. 23–25, 台中, 台灣.
謝哲人, 劉奕賢, 黃證翰, 方泰鈞, 李忠憲, 2012, “校園網路動態目錄服務與Google Apps學術雲端服務整合之研究”, TANET 2012, Oct. 23-25, 台中, 台灣.
林敬皇, 盧建同, 李忠憲, 楊竹星, 2012, “網路攻擊與防禦平台之研究與實作”, CISC 2012, May 30–31, 台中, 台灣.
專業證照
資訊安全
EC-Council Computer Hacking Forensic Investigator v8
EC-Council Certified Ethical Hacker v8
CompTIA Security+ ce certificate
International Computer Driving Licence / European Computer Driving License Foundation IT Security 2.0
趨勢科技 Trend Corporate AntiVirus Engineer
SGS BS10012個人資訊管理系統主導稽核員訓練合格
Certified Ethical Hacker
Cisco Certified Support Technician Cybersecurity net & cs
勞委會及其他政府機關
經濟部 資訊專業人員認證(ITE) 網路通訊+網路規劃與設計
經濟部 資訊專業人員認證(ITE) 網路通訊
經濟部 資訊專業人員認證(ITE) 資訊管理
系統管理
LPI Advanced Level Linux Professional
LPI Junior Level Linux Professional
Microsoft MCSE- Microsoft Windows Server 2003
Microsoft MCSA- Microsoft Windows Server 2003
Microsoft MCITP-Enterprise Support Technician on Windows Vista
Microsoft MCTS-Microsoft Windows Vista, Configuration
Microsoft Certified Professional
Microsoft MTA-Server Administration
Microsoft MTA-Networking Fundamentals
Microsoft MTA-Windows Operating System
HP Accredited Technical Associate: Cloud
HP Accredited Technical Associate: Connected Devices
HP Accredited Technical Associate: IT Architect
HP Accredited Technical Associate: IT for Business
HP Accredited Technical Associate: Networks
HP Accredited Technical Associate: Servers & Storage
Novell Certified Linux Administrator
Novell PartnerNet Data Center Technical Specialist
系統開發/程式設計
SUN Certified Programmer for JAVA 1.2
SUN Certified Web Component Developer for JAVA 1.4
Microsoft MCSD- Microsoft Visual Studio 6.0
Microsoft MCTS-Windows Embedded CE 6.0 Developer
Microsoft Certified of Completion Windows XP Embedded Training
Microsoft Certified of Completion Windows CE Embedded Training
資料庫系統
Oracle 8i Database Administrator Certified Professional
Microsoft MCDBA- Microsoft SQL Server 2000
Microsoft MTA-Database Administration