成果亮點

衍伸計畫


安華聯網科技股份有限公司 110年度度經濟部關鍵基礎設施資安聯防服務專案, 110/03/01-111/02/28



松之安資訊科技有限公司 水資源關鍵基礎設施資通安全防護服務, 110/03/01-111/01/31



泓格科技股份有限公 泓格智慧工廠資安水準第三方驗證服務, 110/02/01-110/07/31



台達電子工業股份有限公司 混合式工業控制密罐設計與雛型建置, 109/04/01-110/03/31



科技部 關鍵基礎設施資安防護-以水資源為重點, 109/06/01-110/05/31



建教合作計畫 108年度水資源、能源關鍵設施安全管理計畫, 108/4/1-109/1/31



建教合作計畫 108年度經濟部能源領域、水領域關鍵基礎設施資安防護政策與基準工作, 108/4/1-109/1/31



科技部 運用人工智慧技術進行惡意樣本分類與攻擊追蹤之研究, 108/8/1-111/7/31



科技部 智慧感知與雲端服務產學技術聯盟(II)(3/3), 108/2/1-109/1/31



科技部 資安特色中心暨聯盟--資安特色中心暨聯盟(3/3), 108/6/1-109/5/31



安華聯網科技股份有限公司 107年度強化民營能源關鍵資訊基礎設施資安防護計畫, 107/4/13-08/1/31



安華聯網科技股份有限公司 107年度水資源關鍵設施升級及安全管理確保旗艦計畫之水資源領域關鍵基礎設 施資安防護政策與基準規劃工作, 107/6/28-108/1/31



安碁資訊股份有限公司 桃竹苗縣市政府壓力測試及資安強化建議服務, 107/10/15-108/1/31



安碁資訊股份有限公司 臺北市政府資訊局-弱點掃描服務, 107/9/1-108/2/28



科技部 抵抗外部與內部攻擊的隱私保護機制, 107/8/1-108/7/31



科技部 智慧感知與雲端服務產學技術聯盟(II)(2/3), 107/2/1-108/1/31



科技部 資安特色中心暨聯盟--資安特色中心暨聯盟(2/3), 107/6/1-108/10/31



科技部 資安監控與管理技術開發-資安監控與管理技術開發(2/3), 107/6/1-108/5/31



科技部 個資法與大數據計畫:社會需求、公共利益與個人資料保護(3/3)



科技部 個資法與大數據計畫:社會需求、公共利益與個人資料保護(2/3), 106/8/1-107/7/31



科技部 無線感測網路下以認證資訊交換機制抵禦感測節點攻擊之研究, 108/8/1-109/7/31



科技部 資安特色中心暨聯盟--資安特色中心暨聯盟(1/3), 108/6/1-109/10/31



科技部 在下世代無線行動網路中使用鄰近計算與通訊方式之SoLoMo群體導覽服務平台--總計畫及子計畫 一:在4G與Wi Fi融合式無線行動網路使用物聯網社群和行動社群網路技術之鄰近式興趣點資訊分享機制, 108/8/1-109/7/31,科技部



科技部 資安監控與管理技術開發-資安監控與管理技術開發(3/3), 108/6/1-109/5/31


科技部 資安監控與管理技術開發-資安監控與管理技術開發(2/3), 107/6/1-108/5/31


科技部 在下世代無線行動網路中使用鄰近計算與通訊方式之SoLoMo群體導覽服務平台--子計畫二:多層式 個人隱私保護針對群組內部與外部攻擊, 108/8/1-109/7/31


科技部 資安監控與管理技術開發-資安監控與管理技術開發(1/3), 106/6/1-107/5/31


科技部 以雲端平台為基礎之智慧型安全分析與管理系統--總計畫暨子計畫一:以Hadoop雲端平台為基礎之智慧型安全分析與管理系統, 108/8/1-109/7/31


教育部 行動寬頻尖端技術跨校教學聯盟-行動寬頻網路與應用-小細胞基站聯盟中心第二期 105/4/1-106/1/31


教育部 教育單位網站資安防護服務計畫(3/3) 105/1/1-105/12/31


國科會 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究--總計畫暨子計畫一:雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究(2/2) 104/8/1-105/7/31


教育部 教育單位網站資安防護服務計畫(2/3) 104/1/1-104/12/31


教育部 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究---總計畫暨子計畫一:雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究(1/2) 103/8/1-104/7/31


教育部 教育單位網站資安防護服務計畫(1/3) 103/1/1-103/12/31


經濟部 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (3/3) 103/9/1-104/8/31


科技部 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端系統中分散式日誌蒐集、錯誤偵測、稽核及預警系統 MOST 103-2221-E-006 -146 -MY3 103/8/1-106/7/31


經濟部 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (2/3) 102/9/1-103/8/31


經濟部 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (1/3) 101/9/1-102/8/31


國科會 車用行動生活之協力式多媒體串流服務平台--子計畫二:車輛隨意網路下具效率與安全之群組重疊網路設計(2/2) NSC 101-2219-E-006-003- 101/5/1-102/4/30


國科會 車用行動生活之協力式多媒體串流服務平台--子計畫二:車輛隨意網路下具效率與安全之群組重疊網路設計(1/2) NSC 100-2219-E-006-004- 100/5/1-101/4/30

專利技轉


中華民國 專利編號:I703467 具有高互動組合工控誘捕系統及其方法 專利人:李忠憲、劉奕賢、孫孟瑋、陸冠竹。


中華民國 專利編號:I696362 基於無線網路的語音通訊安全防護方法 專利人:李忠憲、劉奕賢、張耿豪陸冠竹。


中華民國 專利編號:I665580 雲端環境下針對圖像檔案的授權及搜尋方法 專利人:李忠憲、劉奕賢、陳佳秀、蔡金瑞。


中華民國 專利編號:I656454 防止密碼檔案外洩偵測方法及系統 專利人:李忠憲、劉奕賢、陳佳秀、蔡金瑞


中華民國 專利編號:I638271 具加密檔案關鍵字模糊搜尋功能的雲端伺服器系統 專利人:李忠憲、劉奕賢、李詔遠、林禹妡、蔡金瑞。


中華民國 專利編號:I573452 網路相簿的運作方法 專利人:李忠憲、劉奕賢、謝哲人、高傳凱、郭奕岑。


中華民國 專利編號:I514174 分散式多重傳輸協定之跨層日誌搜集系統與方法(DISTRIBUTED MULTIPLE PROTOCOL CROSS-LAYER LOG COLLECTION SYSTEM AND METHOD) 專利人:李忠憲、劉奕賢、盧建同、張家瑋、楊竹星、蔡邦維。


中華民國 專利編號:I501633 特徵嵌入方法(SIGNATURE EMBEDDING METHOD) 專利人:李忠憲、劉奕賢、謝哲人、高傳凱、郭奕岑。


中華民國 專利編號:I484331 基於跨層日誌記錄的資料軌跡追蹤系統與方法(BASE ON CROSS-LAYER LOG DATA TRACE SYSTEM AND METHOD) 專利人:李忠憲、劉奕賢、盧建同、張家瑋。


中華民國 專利編號:I461955 惡意程式破壞系統及其破壞方法(MALICIOUS SCRIPTS SUPPRESSION SYSTEM AND SUPPRESSION METHOD THEREOF) 專利人:李忠憲、林敬皇、劉奕賢、馬健原、陳柏霖、安家駒。


中華民國 專利編號:I454164 車用隨意網路系統(VANET SYSTEM) 專利人:李忠憲、劉奕賢、謝哲人、高傳凱。


中華民國 專利編號:I419596 車用隨意網路系統(VANET SYSTEM) 專利人:李忠憲、劉奕賢、謝哲人、高傳凱。


中華民國 專利編號:I423068 影像數位標籤嵌入方法、即時鑑識方法及其鑑識系統 專利人:李忠憲、 謝哲人、 翁吉田。


中華民國 專利編號:I408923 語音閘道架構及其通訊方法 專利人:李忠憲、 謝哲人、 曾昭展。


中華民國 專利編號:I354451 具有數位修正的多媒體版權管理機制(Digital Right Management with Fingerprint Correction) 專利人:李忠憲、謝哲人、洪丞甫、趙志宏。


中華民國 專利編號:I528843 多重傳輸通道的重疊網路串流方法及其系統 專利人:李忠憲、劉奕賢、盧建同、張家瑋、王大利、林駿凱。

論文著作

(A)期刊論文

(i) IEEE Transactions

  1. Y.-M. Hu, I.-C. Chang, and J.-S. Li, 2015, “Hybrid Blocking Algorithm for Identification of Overlapping Staying Tags between Multiple Neighboring Readers in RFID Systems”, IEEE Sensors Journal, Vol. 15, No. 7, pp. 4076-4085.

  2. H.-T. Lin, Y.-Y. Lin, W.-S. Yan, and F.-B. Hsieh, 2015, “Efficient Frame Aggregation Transmission Using Random Linear Network Coding”, IEEE Wireless Communications Letters, Vol. 3 No. 6, pp. 629-632.

  3. Y.-S. Su, S.-L. Su, and J.-S. Li, 2014, “Joint topology-transparent scheduling and QoS routing”, IEEE Transactions on Vehicular Technology, Vol. 63, No. 1, pp. 372-389.

  4. J.-S. Li and Y.-M. Hu, 2013, “An Efficient Time-Bound Collision Prevention Scheme for RFID Re-entering Tags”, IEEE Transactions on Mobile Computing, Vol. 12, No. 6, pp. 1054-1064.

(ii) Other Journals

  1. J.-S. Li, C.-G. Liu, C.-J. Wu, C.-C. Wu, C.-W. Huang, C.-F. Li, I-H. Liu*, 2021, “Design of Industrial Control System Secure Communication Using Moving Target Defense with Legacy Infrastructure”, Sensors and Materials, Vol. 10, No. 1, pp. 3415-3424.

  2. I-H. Liu, C.-H. Lo, T.-C. Liu, J.-S. Li, C.-G. Liu , C.-F. Li, 2020, “IDS Malicious Flow Classification”, accepted for publication in Robotics, Networking and Artificial Life.

  3. J.-S. Li, I-H. Liu, C.-Y. Lee, C.-F. Li, C.-G. Liu, 2020, “A Novel Data Deduplication Scheme for Encrypted Cloud Databases”, accepted for publication in Journal of Internet Technology.

  4. S.-K. Yang, Y.-M. Shiue, Z.-Y. Su, I-H. Liu, C.-G. Liu, 2020, “An Authentication Information Exchange Scheme in WSN for IoT Applications” ,IEEE Access, Vol. 8, pp. 9728-9738.

  5. 林孝忠, 王平, 洪維謙, 2019, “網路勒索病毒的特徵分析與知識本體模型建構”, Communications of the CCISA, Vol.25, No.2, pp. 37-58.

  6. K.-C. Lu, I-H. Liu, J.-W. Liao, S.-C. Wu, Z.-C. Liu, J.-S. Li, C.-F. Li, 2019, “Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices”, Journal of Robotics, Networking and Artificial Life, Vol. 6, No. 3, pp. 157-161.

  7. C.-C. Kuo, C.-L. Hou, C.-S. Yang, 2019, “The Study of a Risk Assessment System based on PageRank”, Journal of Internet Technology, Vol. 20, No. 7, pp. 2255-2264.

  8. H.-C. Lin, P. Wang, W.-H. Lin, 2019, “Implementation of an PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks”, Journal of Computers, Vol. 8, pp. 88-103.

  9. T.-S. Huang, P.-Y. Hsiung, B.-C. Cheng, 2019, “Mitigating DoS Attacks in SDN Using Offloading Path Strategies”, Journal of Internet Technology, vol. 20, no. 4 , pp. 1281-1285.

  10. C.-G. Liu, I-H. Liu, C.-D. Lin, J.-S. Li, 2019, “A novel tag searching protocol with time efficiency and searching accuracy in RFID systems”, Computer Networks, Vol.150, No.26, pp.201-216.

  11. Y.-R. Chen, I-H. Liu, K.-H. Chang, C.-G. Liu, J.-S. Li, 2019, “Selection Strategy for VM Migration Method”, Journal of Robotics, Networking and Artificial Life, Vol. 6, No. 1, pp. 66-70.

  12. C.-C. Kuo, K. Chain, C.-S. Yang, 2018, “Cyber Attack-and-Defense Training: Using Emulab as a Platform ”, International Journal of Innovative Computing, Information and Control, Vol.14, No.6, pp.2245-2258.

  13. C.-M. Chen, G.-H. Lai, J. Lin, 2018, “Detection of C&C Servers Based on Swarm Intelligence Approach”, Journal of Computers, Vol.29, No.5, pp.204-215.

  14. J.-S. Li, C.-K. Kao, C.-Y. Tsai, I-H. Liu, C.-G. Liu, 2017, "Low-cost localization service for roadside sensors based on passive information", Journal of High Speed Networks, Vol. 23, No. 4, pp. 323-339.

  15. Y.-R. Chen, J.-S. Li, 2017, "Staggered approach for alleviating TCP Incast in simultaneous Multi-VM migration", Computer Communications, Vol. 106, No. 1, pp. 24-32.

  16. C.-B. Ji, J.-S. Li, 2017, "Exploring Global IP-Usage Patterns in Fast-Flux Service Networks", Journal of Computers, Vol. 12, No. 4, pp. 371-380.

  17. Chia-Mei Chen, Dah-Jyh Guan, Yu-Zhi Huang, Ya-Hui Ou, 2016, "Anomaly Network Intrusion Detection Using Hidden Markov Model", International Journal of Innovative Computing, Information and Control. Vol. 12, No. 2, pp. 569-580.

  18. 陳嘉玫, 賴谷鑫, 2016, "基於漸增式分群法之惡意程式自動分類研究", 電子商務學報, Vol. 18, No.2, pp. 225-248.

  19. C.-T. Lu, C.-W. Chang, and J.-S. Li, 2015, "VM Scaling based on Hurst Exponent and Markov Transition with Empirical Cloud Data", Journal of Systems and Software, Vol. 99, pp. 199–207.

  20. C.-B. Jiang, and J.-S. Li, 2015, "Ontology-based Botnet Topology Discovery Approach with IP Flow Data", International Journal of Innovative Computing, Information and Control, Vol. 11, No. 1, pp. 309–326.

  21. 陳嘉玫, 王士豪, 2015, “QR Code智慧型藥藥物影音查詢系統”, Management Information Computing, Vol. 4, No. 1, pp. 224-233.

  22. Kai Chain, Cheng-Chung Kuo, Chu-Sing Yang, 2016, " The analysis and implementation of Botnet and DDoS", International Journal of Computer Science and Information Security, Vol. 14, No. 10, pp. 194-200.

  23. C.-B Jiang, I.-H Liu, Y.-N Chung, J.-S Li, 2016, " T Novel Intrusion Prediction Mechanism based on Honeypot Log Similarity", International Journal of Network Management, Vol. 26, No. 3, pp. 156-175.

  24. Tzy-Shiah Wang, Hui-Tang Lin*, Wei-Tsung Cheng, Chang-Yu Chen, 2016, " DBod: Clustering and Detecting DGA-based Botnets Using DNS Traffic Analysis", Computers & Security, Vol. 64, pp. 1-15.

  25. Tzy-Shiah Wang, Hui-Tang Lin*, Ping Wang, 2016, " Weighted-Spectral Clustering Algorithm for Detecting Community Structures in Complex Networks", Artificial Intelligence Review, Volume 47, Issue 4, pp 463–483.

  26. K.-C. Hu, C.-W. Tsai, M.-C. Chiang, and C.-S. Yang, 2015, "A Multiple Pheromone Table Based Ant Colony Optimization for Clustering", Mathematical Problems in Engineering, Vol. 2015, Article ID 158632, pp. 11.

  27. C.-H. Lin, C.-T. Lu, Y.-H. Chen, and J.-S. Li, 2014, “Resource allocation in cloud virtual machines based on empirical service traces”, International Journal of Communication Systems, Vol. 27, No. 12, pp. 4210–4225.

  28. C.-J. Hsieh, C.-T. Weng, and J.-S. Li, 2014, “JPEG Forensics Scheme for Signature Embedding and Packet-Level Detection”, International Journal of Communication Systems, Vol. 27, No. 11, pp. 3368–3382.

  29. C.-T. Lu, C.-L. Chang, I-H. Liu, and J.-S. Li, 2014, “Novel Advanced Broadcast Scheme for Efficient Safety Message Collision Alleviation in Vehicular Networks”, Journal of Wireless Person Communication, Vol. 77, No. 4, pp. 2793-2816.

  30. I-H. Liu, C.-G. Liu, C.-T. Lu, Y.-T. Kuo, and J.-S. Li, 2014, “A Multi-hop Resource Scheduling Algorithm for IEEE 802.16j Relay Networks”, Computer Networks, Vol. 67, pp. 164–179.

  31. J.-S. Li, I-H. Liu, C.-K. Kao, and C.-M. Tseng, 2013, “Intelligent Adjustment Forwarding: A Compromise between End-to-End and Hop-by-Hop Transmissions in VANET”, Journal of Systems Architecture, Vol. 59, No. 10, pp. 1319–1333.

  32. C.-G. Liu, I-H. Liu, T.-T. Yang, and J.-S. Li, 2013, “Navigation-Aware Association Control in Vehicular Wireless Networks”, Journal of High Speed Networks, Vol. 19, No. 4, pp. 311-324.

  33. C.-H. Chao, C.-F. Yang, P.-T. Lin, and J.-S. Li, 2013, “Novel Distributed Key Revocation Scheme for Wireless Sensor Networks”, Journal of Security and Networks, Vol. 6, No. 10, pp. 1271-1280.

  34. J.-S. Li, C.-J. Hsieh, and W.-C. Liu, 2013, “Digital Evidence Collection for Web Image Access”, Security and Networks, Vol. 6, No. 6, pp. 765-776. (SCI, EI)

  35. J.-S. Li, C.-J. Hsieh, and H.-Y. Lin, 2013, “A Hierarchical Mobile-Agent-based Security Operation Center”, International Journal of Communication Systems, Vol. 26, No. 12, pp.1503-1519.

  36. J.-S. Li, C.-J. Hsieh, and Y.-K. Wang, 2013, “Distributed Key Management Scheme for P2P Live Streaming Services”, International Journal of Communication Systems, Vol. 26, No. 10, pp. 1259-1272

  37. J.-S. Li and K.-H. Liu, 2013, “A Lightweight Identity Authentication Protocol for Vehicular Networks”, Telecommunication Systems, Vol. 53, No. 4, pp. 425-438.

  38. C.-G. Liu, C.-H. Chao, C.-W. Leou and J.-S. Li, 2012, “Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks”, The Computer Journal, Vol. 55, No. 12, pp. 1467-1458.

  39. C.-H. Lin, J.-Y. Ma, C.-S. Laih, and J.-S. Li, 2012, "MSS: Use File Format Conversion for Suppress Malicious Scripts in Multimedia", Journal of Internet Technology, Vol. 13, No. 5, 2012, pp. 843-852.

  40. J.-S. Li, K.-H. Liu, N. Chilamkurti, L. Shu and T. Q. Duong, 2012, "Scheduling Performance Enhancement by Network Coding in Wireless Mesh Networks", IET Communications, Vol. 6, No. 13, pp. 1912-1919.

  41. J.-S. Li, K.-H. Liu, and C.-H. Wu, 2012, "Efficient Real-time Group Multicast Node Scheduling Schemes in Multi-hop Wireless Networks", Computer Communications, Vol. 35, No. 10, pp. 1247-1258.

  42. J.-S. Li and K.-H. Liu, 2012, “Network-coding-based Cache Policy for Loss Recovery Enhancement in Reliable Multicast”, International Journal of Network Management, Vol. 22, No. 4, pp. 330-345.

  43. K.-H. Liu, J.-S. Li, C.-Y. Wang, N. Chilamkurti and T. Vasilakos, 2012, “Minimizing Multi-player Interactive Delay in Multihop Wireless Networks”, International Journal of Communication Systems, Vol. 25, No. 10, pp. 1330-1349.

  44. C.-B. Jiang and J.-S. Li, 2012, “IP Flow Data Correlation with Interference Rules”, Advanced Materials Research, Vol. 406, No. 1, pp. 1211-1214.


(B)研討會論文


  1. 李東霖, 劉奕賢, 吳其哲, 李竹芬, 李忠憲, 2020, “網路通訊品質對 VPN 連線可靠度之影響”, DLT 2020 數位生活科技研討會, May, Taiwan.

  2. 宋泉儒, 吳柏毅, 劉奕賢, 李忠憲, 2019, “Android惡意軟體偵測與防護之研析”, 25屆台灣網際網路研討會 (TANET2019), Sep. 25-27, Kaohsiung, Taiwan.

  3. 王成允, 宋泉儒, 安家駒, 劉奕賢, 李忠憲, 2019, “機器學習流量分析對洋蔥路由匿蹤危害之研析”, 25屆台灣網際網路研討會 (TANET2019), Sep 25-27, Kaohsiung, Taiwan.

  4. 宋泉儒, 王成允, 劉奕賢, 李忠憲, 2019, “基於機器學習方法的入侵檢測系統研析”,25屆台灣網際網路研討會 (TANET2019), Sep. 25-27, Kaohsiung, Taiwan.

  5. 鍾沛原, 李忠憲, 劉奕賢, 黃貴麟, 2019, “因應資通安全管理法之資安管理研究 -以水資源領域關鍵基礎設施為例”, 25屆台灣網際網路研討會 (TANET2019), Sep. 25-27, Kaohsiung, Taiwan.

  6. 吳柏毅, 彭彥筑, 劉奕賢, 李忠憲, 2019, “使用機器學習改善網路傳輸品質的探討”, 25屆台灣網際網路研討會 (TANET2019), Sep. 25-27, Kaohsiung, Taiwan.

  7. 陸冠竹, 劉奕賢, 劉宗晁, 李忠憲, 2019, “工業控制系統安全之探討-以西門子S7系列為例”, 25屆台灣網際網路研討會 (TANET2019), Sep. 25-27, Kaohsiung, Taiwan.

  8. 劉大哲, 蔡一郎, 陸冠竹, 劉奕賢, 羅政翔, 李忠憲, 2019, “探討深度學習應用於惡意程式分類中之研析”, 第九屆航空科技與飛航安全暨第七屆航空與社會學術研討會會議 (2019ATSF&AS), Jun. 06, Kaohsiung, Taiwan.

  9. 羅政翔, 陸冠竹, 蔡一郎, 劉奕賢, 劉大哲, 李忠憲, 2019, “運用微控制器建置工業控制蜜網系統”, 29屆全國資訊安全會議 (CISC2019), May 23-24, Taichung, Taiwan.

  10. 陸冠竹, 廖家煒, 吳少鈞, 劉奕賢, 李忠憲, 2019, “使用從序列到序列模型改善入侵偵測系統之惡意入侵偵測”, 29屆全國資訊安全會議 (CISC2019), May 23-24, Taichung, Taiwan.

  11. 林孝忠, 林正逢, 莊博鈞, 2019, “應用深度學習於IoT 殭屍網路偵測之研究”, 30屆國際資訊管理學術研討會 (ICIM 2019), May 18, Taipei, Taiwan.

  12. 林文暉, 王平, 吳保樺, 蔡政穎 , 2018, “基於DNN網路架構之網路入侵偵測”, 第二十八屆全國資訊安全會議研討會 (CISC2018), May 24-25, Taipei, Taiwan.

  13. 蔡一郎, 張成睿, 安興彥, 李忠憲, 2018, “BDTS進行常時間惡意網域IP變化行為偵測”, Taiwan Academic Network Conference 2018, Oct., Taiwan.

  14. 陸冠竹, 劉奕賢, 李忠憲, 李竹芬, “運用匿名傳輸技術保護醫療資訊安全”, 第十三屆國際健康資訊管理研討會 (UHIMA2018), 2018, Jun. 8-9, 臺灣花蓮.

  15. 劉奕賢, 陳佳秀, 陸冠竹, 李忠憲, 李竹芬, 劉忠峰, “帳戶驗證機制的安全性研析”, 第十三屆國際健康資訊管理研討會 (UHIMA2018), 2018, Jun. 8-9, 臺灣花蓮.

  16. 顏子皓, 蔡一郎, 陸冠竹, 劉奕賢, 潘祈睿, 李忠憲, 2018, “使用機器學習技術之入侵防禦系統研究”, ITAOI 2018, May 24-27, Penghu, Taiwan.

  17. 顏子皓, 蔡一郎, 陸冠竹, 劉奕賢, 潘祈睿, 李忠憲, 2018, “探討機器學習與深度學習應用於惡意程式分析中之研析”, ITAOI 2018, May.24-27, Penghu,Taiwan.

  18. 陸冠竹, 劉奕賢, 孫孟瑋, 鍾沛原, 李忠憲, 2018, “探討蜜網在 SCADA 系統中安全之研析”, ITAOI 2018, May.24-27, Penghu, Taiwan.

  19. 陸冠竹, 劉奕賢, 孫孟瑋, 鍾沛原, 李忠憲, 2018 , “使用機器學習技術之入侵防禦系統研究”, ITAOI 2018, May.24-27, Penghu, Taiwan.

  20. 李柏毅, 蔡一郎, 陳嘉玫, 2018, “從網路威脅情資分享探討我國關鍵資訊基礎設施防護策略”, 2018第二十四屆國際資訊管理暨實務研討會 (IMP 2018), Dec. 1, Tainan, Taiwan.

  21. 徐志朋, 劉上宇, 朱家訓, 黃冠龍, 許振銘, 蔡一郎, 葉永信, 2018, “kCTF@CDX: 高速網路與計算中心雲端資安攻防平台網路攻擊鏈數位靶場”, 第二十八屆全國資訊安全會議(CISC 2018), Taipei, Taiwan.

  22. 陸冠竹, 劉奕賢, 劉川綱, 李忠憲, 2017, “SCADA資訊安全之研析”, 2017臺灣網際網路研討會 (TANET 2017), Oct. 25-27, Taichung, Taiwan.

  23. 張永霖, 劉奕賢, 劉川綱, 李忠憲, 2017, “匿名傳輸技術之研析”, 2017臺灣網際網路研討會 (TANET 2017), Oct. 25-27, Taichung, Taiwan.

  24. P.-Y. Chung, J.-S Li, I-H. Liu, Q.-R. Song, C.-F. Li, G.-L. Huang, 2020, “Cyber Security of Critical Infrastructure Protection Overview in Taiwan's Water Resource Domain”, ICRCE 2020, Jun. 19-21, Tokyo, Japan.

  25. C.-H. Lo, T.-C. Liu, I-H. Liu, J.-S. Li, 2020, “Malware Classification Using Deep Learning”, ICAROB 2020, Jan. 13-16, Otia, Japan.

  26. S.-H. Huang, I-H. Liu, 2020, “A Study of Applying Computer-assisted Language Learning to English Course for Junior College Students in Taiwan”, ICAROB 2020, Jan. 13-16, Otia, Japan.

  27. H.-C. Lin, P. Wang, W.-H. Lin, 2019,“A Revised Particle Swarm Optimization Scheme for Discovering Attack Vectors of IPv6 Security by Spoofed IP Attacks”, IEEE ECICE 2019, October 3-6, Yunlin, Taiwan.

  28. C.-Y. Wu, C.-C. Kuo, C.-S. Yang, 2019, “A Phishing Detection System based on Machine Learning”, ICEA 2019, Aug. 30- Sep. 1, Tainan, Taiwan.

  29. S.-K. Yang, Y.-M. Shiue, I-H. Liu, Z.-Y. Su, C.-G Liu, 2019, “Performance analysis of Authentication Information exchange Scheme in WSN”, ICEA 2019, Aug. 30- Sep. 1, Tainan, Taiwan.

  30. W.-Z. Wu, B.-C. Cheng , 2019, “A Novel Approach to Identify Confidential Data in Data Leakage Prevention Systems”, The 2019 International Conference on Security and Management (SAM'19), July 29 - August 1, Las Vegas, USA.

  31. I-H. Liu, C.-G. Liu, J.-S. Li , 2019, “Effect of Different Information Security Training Methods based on TCAT Cup CTF Game”, The 2nd International Conference on Science Management, Engineering Technology and Applied Sciences (SETAS-2019), Feb. 16-27,Osaka, Japan.

  32. Y.-R. Chen, I-H. Liu, K.-H. Chang, C.-G. Liu, J.-S. Li, 2019, “VM Migration Placement in Cloud Service”, The 2019 International Conference on Artificial Life and Robotics (ICAROB2019), Jan. 10-13, Beppu, Japan.

  33. D.-W. Wen, C.-M. Chen, 2018, “Evolution of Advanced Persistent Threat (APT) Attacks and Actors”, International Computer Symposium 2018 (ICS 2018), Dec. 20-22, Yunlin, Taiwan.

  34. P.-Y. Hsiung, C.-H. Li, Shih Hung Chang, Bo-Chao Cheng, 2018, “A Fog-Based Collusion Detection System”, Security with Intelligent Computing and Big-data Services (SICBS 2018), Dec. 14-16, Springer, Cham.

  35. C.-M. Chen, Z.-X. Tsai, 2018, “Integrated Digital Forensic for Cyber Attacks”, International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018), Dec. 14-16, Guilin, China.

  36. T.-H. Chang, C.-M. Chen, G.-H. Lai, J. Lin, 2018, “The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic”,2018 IEEE Conference on Dependable and Secure Computing (TDSC 2018), Dec. 10-13, Kaohsiung, Taiwan.

  37. K.-C. Lu, I-H. Liu, J.-S. Li, 2018, “Venerability and Protection Tool Surveys of Industrial Control System”, The 6th International Symposium on Computing and Networking (CANDAR 2018),Nov. 27-30, Takayama, Japan.

  38. C.-C. Kuo, S.-H Yao, C.-L. Hou, C.-S. Yang, 2018, “Design and implementation of a host-based intrusion detection system for linux-based web server”, The 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2018), Nov. 26-28, Sendai, Japan.

  39. C.-M. Chen, W.-L. Lo, G.-H. Lai, Y.-C. Hu, 2018, “Network Anomaly Detection Based on Artificial Intelligence”, The 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2018), Nov. 26-28, Sendai, Japan.

  40. W.-H. Lin, P. Wang, K.-M. Chao, C.-C. Lo, 2018, “A Cross-age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices”, The 15th IEEE International Conference on e-Business Engineering (ICEBE 2018), Oct. 12-14, Xi’An China.

  41. I-H. Liu, C.-G. Liu, C.-H. Chen, J.-S. Li, 2018, “Authentication Database Leakage Detection”, The 8th International Conference on Digital Information and Communication Technology and its Applications, Sep. 17-19, Lodz, Poland.

  42. K.-C. Lu, I-H. Liu, M.-W. Sun, J.-S. Li, 2018, “A Survey on SCADA Security and Honeypot in Industrial Control System”, The 3rd International Conference of Reliable Information and Communication Technology 2018, Jul. 23-24, Kuala Lumpur, Malaysia.

  43. I-H. Liu, Y.-H. Lee, J.-S. Li, 2018, “Routing Loop Detection in VM Network”, e-CASE & e-Tech 2018, Apr. 1-3, Osaka, Japan.

  44. C.-F. Li, J.-J. Su, I-H. Liu, 2018, “Factors Affecting Customers' Use of Internet Banking”, e-CASE & e-Tech 2018, Apr. 1-3, Osaka, Japan.

  45. C.-C. Kuo; K. Chain; I-H. Liu, C.-S. Yang, J.-S. Li, 2018, “Design and Implement of Capture the Flag based on Cloud Offense and Defense Platform”, ICASI 2018, Ari. 13-17, Chiba, Japan.

  46. I-H. Liu, Y.-H. Lin, J.-S. Li, C.-G. Liu, 2018, “A Secure Multi-Keyword Fuzzy Search with Polynomial Function for Encrypted Data in Cloud Computing”, ICCCS 2018, Apr. 27-30, Nagoya, Japan.

  47. Y.-R. Chen, I-H. Liu, C.-W. Chou, J.-S. Li, C.-G. Liu, 2018, “Multiple Virtual Machines Live Migration Scheduling Method”, ICCCS 2018, Apr. 27-30, Nagoya, Japan.

  48. I-H. Liu, C.-H. Chen, J.-S. Li, 2018 , “Novel Detection Scheme for Stolen Password File”,ICAROB 2018, Feb. 01-04 , Oita, Japan.

  49. I-H. Liu, C.-G. Liu, C.-J. Chang, J.-S. Li, 2018, “Client Searching Privacy Protection in Encrypted Database”,ICAROB 2018, Feb. 01-04, Oita, Japan.

  50. I-H. Liu, T.-J. Fang, J.-S. Li, M.-W. Sun, C.-G. Liu, 2017, “A New Colluded Adversarial VNet embeddings Attack in Cloud”, PDCAT 2017, Dec. 18-20 , Taipei, Taiwan

  51. I-H. Liu, N.-W. Li, C.-F. Li, J.-S. Li, 2017, “RBAC Management with Blockchain”, EECS 2017, Dec. 19-21, Singapore.

  52. 安家駒, 劉奕賢, 李儂偉, 李忠憲, 2016, “區塊鏈技術實現跨組織認證架構”, TANET 2016, October 19-21, Hualien, Taiwan.

  53. 張成睿, 劉奕賢, 劉川綱, 李忠憲, 2016, “雲端資料加密環境下的多關鍵字搜尋技術探討”, TANET 2016, October 19-21, Hualien, Taiwan.

  54. 陳佳秀, 劉奕賢, 蔡一郎, 李忠憲, 2016, “雲端系統虛擬帳號誘捕機制”, TANET 2016, October 19-21, Hualien, Taiwan.

  55. 蔡金瑞, 劉奕賢, 陳信文, 邱志傑, 劉川綱, 李忠憲, 楊竹星, 2016, “網頁圖像隱私偵測系統構”, TANET 2016, October 19-21, Hualien, Taiwan.

  56. 宋彥徵, 賴家齡, 高毓英, 林輝堂, 2016, “支援服務品質於分時/分波多工長距離光纖網路之即時性演算法”, TANET 2016, October 19-21, Hualien, Taiwan.

  57. 郭振忠, 林季偉, 姚書涵, 楊竹星, 2016, “設計與實作基於埠號監控的殭屍網路惡意程式偵測框架”, TANET 2016, October 19-21, Hualien, Taiwan.

  58. 陳嘉玫, 吳惠麟, 張明達, 曾昭銘, 陳怡靜, 2016, “多層次網路防護系統”, TANET 2016, October 19-21, Hualien, Taiwan.

  59. 黃瓊瑩, 孫明功, 陳嘉玫, 張子敬, 賴谷鑫, 2016, “注入惡意DLL之APT攻擊手法研究”, TANET 2016, October 19-21, Hualien, Taiwan.

  60. 富榮光, 陳嘉玫, 2016, “資訊主機監控系統設計與建置之研究”, TANET 2016, October. 19-21, Hualien, Taiwan.

  61. 涂嘉成, 林季偉, 張家綸, 姚書涵, 楊竹星, 2016, “設計與實作基於NetFlow分析的路由調整”, ITAOI 2016, May 20-21, Kaohsiung, Taiwan.

  62. 郭振忠, 程凱, 楊竹星, 2016, “設計安全的訓用暨後維管理網站平台”, CISC 2016, May 26-27, Taichung, Taiwan.

  63. 陳嘉玫, 賴谷鑫, 王奕凱, 2016, “惡意程式組件分析與關連性分群”, CISC 2016, May 26-27, Taichung, Taiwan.

  64. 陳嘉玫, 賴谷鑫, 王則堯, 2016, “以機率粗糙集合論為基礎的 HTTP-based 殭屍網路偵測”, CISC 2016, May 26-27, Taichung, Taiwan.

  65. 王子夏, 林致聖, 林輝堂, 2016, “植基於社群網路分析方法之DAG型態殭屍網路偵防研究”, CISC 2016, May 26-27, Taichung, Taiwan.

  66. Nian Xia, Chu-Sing Yang, 2016, “Recent Advances in Machine-to-Machine Communications”, IoTSC 2016, May. 29-31, Nanjing, China.

  67. Shih-Hsiung Lee, Chin-Nan Hu, Chu-Sing Yang, 2016, “Token-oriented based for Internet of Things and Clouding computing services”, ICC 2016, March 22-23, Cambridge, United Kingdom.

  68. Chia-Mei Chen, Sung-Chien HSU, Gu-Hsin Lai, 2016, “Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks”, ICGEC 2016, November 7-9, Fuzhou City, Fujian Province, China.

  69. Chia-Mei Chen, Gu-Hsin Lai, 2016, “Detecting Command and Control Servers Using Ant Colony Optimization”, ICCSIT 2016, December 7-12, Limerick City, Ireland.

  70. Shi-Hao Wang, Chia-Mei Chen, Gu-Hsin Lai, 2016, “Exploring Cross-Site Scripting Botnet Detection and Simulation”, PACIS 2016, June 27- July 1, Chiayi, Taiwan.

  71. Chia-Mei Chen, Gu-Hsin Lai, Pong-Yu Young, 2016, “Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection”, AsiaJCIS 2016, August 4-5, Fukuoka, Japan.

  72. Chia-mei Chen, Han-wei Hsiao, Tien-ho Chang, 2016, “The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs”, MobiSec 2016, July 13-16, Taichung, Taiwan.

  73. S.-C Tsai, I.- Liu, C.-T Lu, B.-L Chen, J.-S Li, 2016, “Factor Impact of Virtual Switch Performance by Factorial Design in Cloud Computing”, ICS 2016, December 15-17, Chiayi, Taiwan.

  74. C.-B Jiang, I.-H Liu, C.-G Liu, Y.-C Chen, J.-S Li, 2016, “Distributed Log System in Cloud Digital Forensics”, ICS 2016, December 15-17, Chiayi, Taiwan.

  75. S.-C Tsai, I.-H Liu, C.-T Lu, C.-H Chang, J.-S Li, 2016, “Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network”, IIH-MSP 2016, November 21-23, Kaohsiung, Taiwan.

  76. I-Hsien Liu, Chuan-Gang Liu, Kun-Hsuan Liu , Shun-Hsiung Yu , Zhi-Yuan Su , Jung-Shian Li, 2016, “Distributed Node Scheduling Algorithms for Multiple Group Communications in Wireless Multi-hop Networks”, Qshine 2016, July 7-8, Seoul, South Korea.

  77. Ci-Bin Jiang , Jung-Shian Li, 2016, “Exploring Global IP-usage Patterns in Fast-Flux Service Networks”, ICICA 2016, January 18-19, Brisbane, Australia.

  78. Jung-Shian Li, 2016, “Digital Forensic with Cross-Layer Log Files”, BAI 2016, July 3-5, Nagoya, Japan.

  79. Tzy-Shiah Wang, Hui-Tang Lin, 2016, “DGA Botnet Detection Utilizing Social Network Analysis”, IS3C 2016, July 4-6, Xi'an, China.

  80. C.-M. Chen, T. Chang, 2015, “The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack”, AsiaJCIS 2015, May 24-26, Kaohsiung, Taiwan.

  81. I-Hsien Liu, Chun-Kai Lin, and Jung-Shian Li, 2015, “An enhancing video streaming scheme over hybrid VANET”, AROB 2015, Jan. 21-23, Beppu, Japan.

  82. 許凱竣, 郭振忠, 楊竹星, 2015, “基於靜態分析之可攜式文件格式檔案過濾系統”, CISC 2015, May 28-29, Kaohsiung, Taiwan.

  83. 陳嘉玫, 王士豪, 2015, “漸進式惡意程式分類方法”, CISC 2015, May 28-29, Kaohsiung, Taiwan.

  84. 陳嘉玫, 王則堯, 羅文翎, 2015, “智慧型僵屍網路偵測”, CISC 2015, May 28-29, Kaohsiung, Taiwan.

  85. I-Hsien Liu, Tian-Li Wang, and Jung-Shian Li, 2014, “An Effective Group Communications in Hybrid VANET”, ICS 2014, Dec. 12-14, Taichung, Taiwan. (Best Poster Award)

  86. 郭振忠, 歐雅惠, 劉奕賢, 王子夏, 郭鎮穎, 陳嘉玫, 李忠憲, 林輝堂, 楊竹星, 2014, “網路威脅搜捕、分析、追蹤與過濾技術之研究”, Cyberspace 2014, Dec. 5, Taipei, Taiwan.

  87. 郭振忠, 盧建同, 林敬皇, 李忠憲, 楊竹星, 2013, “基於測試平台之網路攻防演練活動設計與實作”, NCS 2013, Dec. 13-14, Taichung, Taiwan.

  88. 陳怡臻、劉奕賢、盧建同、方泰鈞、李忠憲, 2013, “雲端分散式日誌搜集方法”, NST 2013, Nov. 14-16, Tainan, Taiwan.

  89. 劉奕賢, 蔡舜智, 江啟賓, 張家瑋, 安家駒, 李忠憲, 2013, “結構化惡意程式資料庫系統 ”, TANET 2013, Oct. 23-25, Taichung, Taiwan.

  90. Chuan-Gang Liu, Chuan-Kang Kao, Huoc-Yong Koo, and Jung-Shian Li, 2013, “A Novel Group-based Location Service Management Scheme in VANETs”, ICICN 2013, Jan. 19-20, Singapore.

  91. 謝哲人, 劉奕賢, 黃證翰, 方泰鈞, 李忠憲, 2012, “校園網路動態目錄服務與Google Apps學術雲端服務整合之研究”, TANET 2012, Oct. 23-25, Taichung, Taiwan.

  92. 林敬皇, 盧建同, 李忠憲, 楊竹星, 2012, “網路攻擊與防禦平台之研究與實作”, CISC 2012, May 30-31, Tai-Chung, Taiwan.

  93. Jung-Shian Li, I-Hsien Liu, Kun-Hsuan Liu, and Shun-Hsiung Yu, 2012, “Schedule Multi-player Online Game Transmission Services in Wireless Multi-hop Networks”, MASS 2012, Aug. 10-12, Shanghai, China.


專業證照

資訊安全


1. EC-Council Computer Hacking Forensic Investigator v8

2. EC-Council Certified Ethical Hacker v8

3. CompTIA Security+ ce certificate

4. International Computer Driving Licence / European Computer Driving License Foundation IT Security 2.0

5. 趨勢科技 Trend Corporate AntiVirus Engineer

6. SGS BS10012個人資訊管理系統主導稽核員訓練合格


勞委會及其他政府機關


1. 經濟部 資訊專業人員認證(ITE) 網路通訊+網路規劃與設計

2. 經濟部 資訊專業人員認證(ITE) 網路通訊

3. 經濟部 資訊專業人員認證(ITE) 資訊管理


系統管理


1. LPI Advanced Level Linux Professional

2. LPI Junior Level Linux Professional

3. Microsoft MCSE- Microsoft Windows Server 2003

4. Microsoft MCSA- Microsoft Windows Server 2003

5. Microsoft MCITP-Enterprise Support Technician on Windows Vista

6. Microsoft MCTS-Microsoft Windows Vista, Configuration

7. Microsoft Certified Professional

8. Microsoft MTA-Server Administration

9. Microsoft MTA-Networking Fundamentals

10. Microsoft MTA-Windows Operating System

11. HP Accredited Technical Associate: Cloud

12. HP Accredited Technical Associate: Connected Devices

13. HP Accredited Technical Associate: IT Architect

14. HP Accredited Technical Associate: IT for Business

15. HP Accredited Technical Associate: Networks

16. HP Accredited Technical Associate: Servers & Storage

17. Novell Certified Linux Administrator

18. Novell PartnerNet Data Center Technical Specialist


系統開發/程式設計


1. SUN Certified Programmer for JAVA 1.2

2. SUN Certified Web Component Developer for JAVA 1.4

3. Microsoft MCSD- Microsoft Visual Studio 6.0

4. Microsoft MCTS-Windows Embedded CE 6.0 Developer

5. Microsoft Certified of Completion Windows XP Embedded Training

6. Microsoft Certified of Completion Windows CE Embedded Training


資料庫系統


1. Oracle 8i Database Administrator Certified Professional

3. Microsoft MCDBA- Microsoft SQL Server 2000

4. Microsoft MTA-Database Administration

中心榮譽

1. 2014 International Computer Symposium (ICS) Best Poster Award

2. 2014 Cyberspace雲端服務應用、安全與稽核研討會 大會學術論文獎

3. 2005 經濟部 資訊專業人員鑑定-尋找網路達人活動 全國第三名