成果亮點

衍伸計畫


教育部 行動寬頻尖端技術跨校教學聯盟-行動寬頻網路與應用-小細胞基站聯盟中心第二期 105/4/1-106/1/31


教育部 教育單位網站資安防護服務計畫(3/3) 105/1/1-105/12/31


國科會 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究--總計畫暨子計畫一:雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究(2/2) 104/8/1-105/7/31


教育部 教育單位網站資安防護服務計畫(2/3) 104/1/1-104/12/31


教育部 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究---總計畫暨子計畫一:雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究(1/2) 103/8/1-104/7/31


教育部 教育單位網站資安防護服務計畫(1/3) 103/1/1-103/12/31


經濟部 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (3/3) 103/9/1-104/8/31


科技部 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端系統中分散式日誌蒐集、錯誤偵測、稽核及預警系統 MOST 103-2221-E-006 -146 -MY3 103/8/1-106/7/31


經濟部 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (2/3) 102/9/1-103/8/31


經濟部 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (1/3) 101/9/1-102/8/31


國科會 車用行動生活之協力式多媒體串流服務平台--子計畫二:車輛隨意網路下具效率與安全之群組重疊網路設計(2/2) NSC 101-2219-E-006-003- 101/5/1-102/4/30


國科會 車用行動生活之協力式多媒體串流服務平台--子計畫二:車輛隨意網路下具效率與安全之群組重疊網路設計(1/2) NSC 100-2219-E-006-004- 100/5/1-101/4/30


專利技轉


中華民國 專利編號:I514174 分散式多重傳輸協定之跨層日誌搜集系統與方法(DISTRIBUTED MULTIPLE PROTOCOL CROSS-LAYER LOG COLLECTION SYSTEM AND METHOD) 專利人:李忠憲、劉奕賢、盧建同、張家瑋、楊竹星、蔡邦維。


中華民國 專利編號:I501633 特徵嵌入方法(SIGNATURE EMBEDDING METHOD) 專利人:李忠憲、劉奕賢、謝哲人、高傳凱、郭奕岑。


中華民國 專利編號:I484331 基於跨層日誌記錄的資料軌跡追蹤系統與方法(BASE ON CROSS-LAYER LOG DATA TRACE SYSTEM AND METHOD) 專利人:李忠憲、劉奕賢、盧建同、張家瑋。


中華民國 專利編號:I461955 惡意程式破壞系統及其破壞方法(MALICIOUS SCRIPTS SUPPRESSION SYSTEM AND SUPPRESSION METHOD THEREOF) 專利人:李忠憲、林敬皇、劉奕賢、馬健原、陳柏霖、安家駒。


中華民國 專利編號:I454164 車用隨意網路系統(VANET SYSTEM) 專利人:李忠憲、劉奕賢、謝哲人、高傳凱。


中華民國 專利編號:I419596 車用隨意網路系統(VANET SYSTEM) 專利人:李忠憲、劉奕賢、謝哲人、高傳凱。


中華民國 專利編號:I423068 影像數位標籤嵌入方法、即時鑑識方法及其鑑識系統 專利人:李忠憲、 謝哲人、 翁吉田。


中華民國 專利編號:I408923 語音閘道架構及其通訊方法 專利人:李忠憲、 謝哲人、 曾昭展。


中華民國 專利編號:I354451 具有數位修正的多媒體版權管理機制(Digital Right Management with Fingerprint Correction) 專利人:李忠憲、謝哲人、洪丞甫、趙志宏。


中華民國 專利編號:I528843 多重傳輸通道的重疊網路串流方法及其系統 專利人:李忠憲、劉奕賢、盧建同、張家瑋、王大利、林駿凱。

論文著作

(A)期刊論文

(i) IEEE Transactions

  1. Y.-M. Hu, I.-C. Chang, and J.-S. Li, 2015, “Hybrid Blocking Algorithm for Identification of Overlapping Staying Tags between Multiple Neighboring Readers in RFID Systems”, IEEE Sensors Journal, Vol. 15, No. 7, pp. 4076-4085
  2. H.-T. Lin, Y.-Y. Lin, W.-S. Yan, and F.-B. Hsieh, 2015, “Efficient Frame Aggregation Transmission Using Random Linear Network Coding”, IEEE Wireless Communications Letters, Vol. 3 No. 6, pp. 629-632
  3. Y.-S. Su, S.-L. Su, and J.-S. Li, 2014, “Joint topology-transparent scheduling and QoS routing”, IEEE Transactions on Vehicular Technology, Vol. 63, No. 1, pp. 372-389
  4. J.-S. Li and Y.-M. Hu, 2013, “An Efficient Time-Bound Collision Prevention Scheme for RFID Re-entering Tags”, IEEE Transactions on Mobile Computing, Vol. 12, No. 6, pp. 1054-1064.

(ii) Other Journals

  1. Chia-Mei Chen, Dah-Jyh Guan, Yu-Zhi Huang, Ya-Hui Ou, 2016, " Anomaly Network Intrusion Detection Using Hidden Markov Model", International Journal of Innovative Computing, Information and Control. Vol. 12, No. 2, pp. 569-580.
  2. 陳嘉玫, 賴谷鑫, 2016, “基於漸增式分群法之惡意程式自動分類研究”, 電子商務學報, Vol. 18, No.2, pp. 225-248.
  3. C.-T. Lu, C.-W. Chang, and J.-S. Li, 2015, "VM Scaling based on Hurst Exponent and Markov Transition with Empirical Cloud Data", Journal of Systems and Software.Vol. 99, pp. 199–207.
  4. C.-B. Jiang, and J.-S. Li, 2015, "Ontology-based Botnet Topology Discovery Approach with IP Flow Data", International Journal of Innovative Computing, Information and Control, Vol. 11, No. 1, pp. 309–326.
  5. 陳嘉玫, 王士豪, 2015, “QR Code智慧型藥袋藥物影音查詢系統”, Management Information Computing, Vol. 4, No. 1, pp. 224-233.
  6. Kai Chain, Cheng-Chung Kuo, Chu-Sing Yang, 2016, " The analysis and implementation of Botnet and DDoS", International Journal of Computer Science and Information Security, Vol. 14, No. 10, pp. 194-200.
  7. C.-B Jiang, I.-H Liu, Y.-N Chung, J.-S Li, 2016, " T Novel Intrusion Prediction Mechanism based on Honeypot Log Similarity", International Journal of Network management, Vol. 26, No. 3, pp. 156-175.
  8. Tzy-Shiah Wang, Hui-Tang Lin*, Wei-Tsung Cheng, Chang-Yu Chen, 2016, " DBod: Clustering and Detecting DGA-based Botnets Using DNS Traffic Analysis", Computers & Security, Vol. 64, pp. 1-15.
  9. Tzy-Shiah Wang, Hui-Tang Lin*, Ping Wang, 2016, " Weighted-Spectral Clustering Algorithm for Detecting Community Structures in Complex Networks", Artificial Intelligence Review, Volume 47, Issue 4, pp 463–483
  10. K.-C. Hu, C.-W. Tsai, M.-C. Chiang, and C.-S. Yang, 2015, "A Multiple Pheromone Table Based Ant Colony Optimization for Clustering", Mathematical Problems in Engineering, Vol. 2015, Article ID 158632, pp. 11
  11. C.-H. Lin, C.-T. Lu, Y.-H. Chen, and J.-S. Li, 2014, “Resource allocation in cloud virtual machines based on empirical service traces”, International Journal of Communication Systems.Vol. 27, No. 12, pp. 4210–4225.
  12. C.-J. Hsieh, C.-T. Weng, and J.-S. Li, 2014, “JPEG Forensics Scheme for Signature Embedding and Packet-Level Detection”, International Journal of Communication Systems.Vol. 27, No. 11, pp. 3368–3382.
  13. C.-T. Lu, C.-L. Chang, I-H. Liu, and J.-S. Li, 2014, “Novel Advanced Broadcast Scheme for Efficient Safety Message Collision Alleviation in Vehicular Networks”, Journal of Wireless Person Communication, Vol. 77, No. 4, pp. 2793-2816.
  14. I-H. Liu, C.-G. Liu, C.-T. Lu, Y.-T. Kuo, and J.-S. Li, 2014, “A Multi-hop Resource Scheduling Algorithm for IEEE 802.16j Relay Networks”, Computer Networks, Vol. 67, pp. 164–179.
  15. J.-S. Li, I-H. Liu, C.-K. Kao, and C.-M. Tseng, 2013, “Intelligent Adjustment Forwarding: A Compromise between End-to-End and Hop-by-Hop Transmissions in VANET”, Journal of Systems Architecture, Vol. 59, No. 10, pp. 1319–1333.
  16. C.-G. Liu, I-H. Liu, T.-T. Yang, and J.-S. Li, 2013, “Navigation-Aware Association Control in Vehicular Wireless Networks”, Journal of High Speed Networks, Vol. 19, No. 4, pp. 311-324.
  17. C.-H. Chao, C.-F. Yang, P.-T. Lin, and J.-S. Li, 2013, “Novel Distributed Key Revocation Scheme for Wireless Sensor Networks”, Journal of Security and Networks, Vol. 6, No. 10, pp. 1271-1280
  18. J.-S. Li, C.-J. Hsieh, and W.-C. Liu, 2013, “Digital Evidence Collection for Web Image Access”, Security and Networks, Vol. 6, No. 6 , pp. 765-776 (SCI, EI)
  19. J.-S. Li, C.-J. Hsieh, and H.-Y. Lin, 2013, “A Hierarchical Mobile-Agent-based Security Operation Center”, International Journal of Communication Systems, Vol. 26, No. 12, pp.1503-1519
  20. J.-S. Li, C.-J. Hsieh, and Y.-K. Wang, 2013, “Distributed Key Management Scheme for P2P Live Streaming Services”, International Journal of Communication Systems, Vol. 26, No. 10, pp. 1259-1272
  21. J.-S. Li and K.-H. Liu, 2013, “A Lightweight Identity Authentication Protocol for Vehicular Networks”, Telecommunication Systems, Vol. 53, No. 4, pp. 425-438
  22. C.-G. Liu, C.-H. Chao, C.-W. Leou and J.-S. Li, 2012, “Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks”,The Computer Journal. Vol. 55, No. 12, pp. 1467-1458.
  23. C.-H. Lin, J.-Y. Ma, C.-S. Laih, and J.-S. Li, 2012, "MSS: Use File Format Conversion for Suppress Malicious Scripts in Multimedia", Journal of Internet Technology.Vol. 13.No. 5 , 2012, pp. 843-852.
  24. J.-S. Li, K.-H. Liu, N. Chilamkurti, L. Shu and T. Q. Duong, 2012, "Scheduling Performance Enhancement by Network Coding in Wireless Mesh Networks", IET Communications, Vol. 6, No. 13, pp. 1912-1919.
  25. J.-S. Li, K.-H. Liu, and C.-H. Wu, 2012, "Efficient Real-time Group Multicast Node Scheduling Schemes in Multi-hop Wireless Networks", Computer Communications, Vol. 35, No. 10, pp. 1247-1258.
  26. J.-S. Li and K.-H. Liu, 2012, “Network-coding-based Cache Policy for Loss Recovery Enhancement in Reliable Multicast”, International Journal of Network Management. Vol. 22, No. 4, pp. 330-345.
  27. K.-H. Liu, J.-S. Li, C.-Y. Wang, N. Chilamkurti and T. Vasilakos, 2012, “Minimizing Multi-player Interactive Delay in Multihop Wireless Networks”,International Journal of Communication Systems. Vol. 25, No. 10, pp. 1330-1349.
  28. C.-B. Jiang and J.-S. Li, 2012, “IP Flow Data Correlation with Interference Rules”, Advanced Materials Research, Vol. 406, No. 1, pp. 1211-1214.


(B)研討會論文


  1. 陸冠竹, 劉奕賢, 劉川綱, 李忠憲, 2017,“SCADA資訊安全之研析 ”, TANET 2017, Oct. 25-27, Taichung, Taiwan.(最佳論文獎)
  2. 張永霖, 劉奕賢, 劉川綱, 李忠憲, 2017,“匿名傳輸技術之研析 ”, TANET 2017, Oct. 25-27, Taichung, Taiwan.
  3. 安家駒, 劉奕賢, 李儂偉, 李忠憲, 2016, “區塊鏈技術實現跨組織認證架構”, TANET 2016, October. 19-21, Hualien, Taiwan.
  4. 張成睿, 劉奕賢, 劉川綱, 李忠憲, 2016, “雲端資料加密環境下的多關鍵字搜尋技術探討”, TANET 2016, October. 19-21, Hualien, Taiwan.
  5. 陳佳秀, 劉奕賢, 蔡一郎, 李忠憲, 2016, “雲端系統虛擬帳號誘捕機制”, TANET 2016, October. 19-21, Hualien, Taiwan.
  6. 蔡金瑞, 劉奕賢, 陳信文, 邱志傑, 劉川綱, 李忠憲, 楊竹星, 2016, “網頁圖像隱私偵測系統構”, TANET 2016, October. 19-21, Hualien, Taiwan.
  7. 宋彥徵, 賴家齡, 高毓英, 林輝堂, 2016, “支援服務品質於分時/分波多工長距離光纖網路之即時性演算法”, TANET 2016, October. 19-21, Hualien, Taiwan.
  8. 郭振忠, 林季偉, 姚書涵, 楊竹星, 2016, “設計與實作基於埠號監控的殭屍網路惡意程式偵測框架”, TANET 2016, October. 19-21, Hualien, Taiwan.
  9. 陳嘉玫, 吳惠麟, 張明達, 曾昭銘, 陳怡靜, 2016, “多層次網路防護系統”, TANET 2016, October. 19-21, Hualien, Taiwan.
  10. 黃瓊瑩, 孫明功, 陳嘉玫, 張子敬, 賴谷鑫, 2016, “注入惡意DLL之APT攻擊手法研究”, TANET 2016, October. 19-21, Hualien, Taiwan.
  11. 富榮光, 陳嘉玫, 2016, “資訊主機監控系統設計與建置之研究”, TANET 2016, October. 19-21, Hualien, Taiwan.
  12. 涂嘉成, 林季偉, 張家綸, 姚書涵, 楊竹星, 2016, “設計與實作基於NetFlow分析的路由調整”, ITAOI2016, May. 20-21, Kaohsiung, Taiwan.
  13. 郭振忠, 程凱, 楊竹星, 2016, “設計安全的訓用暨後維管理網站平台”, CISC2016, May. 26-27, Taichung, Taiwan.
  14. 陳嘉玫, 賴谷鑫, 王奕凱, 2016, “惡意程式組件分析與關連性分群”, CISC2016, May. 26-27, Taichung, Taiwan.
  15. 陳嘉玫, 賴谷鑫, 王則堯, 2016, “以機率粗糙集合論為基礎的 HTTP-based 殭屍網路偵測”, CISC2016, May. 26-27, Taichung, Taiwan.
  16. 王子夏, 林致聖, 林輝堂, 2016, “植基於社群網路分析方法之DAG型態殭屍網路偵防研究”, CISC2016, May. 26-27, Taichung, Taiwan.
  17. Nian Xia, Chu-Sing Yang, 2016, “Recent Advances in Machine-to-Machine Communications”, IoTSC2016, May. 29-31, Nanjing, China.
  18. Shih-Hsiung Lee, Chin-Nan Hu, Chu-Sing Yang, 2016, “Token-oriented based for Internet of Things and Clouding computing services”, ICC2016, March. 22-23, Cambridge, United Kingdom.
  19. Chia-Mei Chen, Sung-Chien HSU, Gu-Hsin Lai, 2016, “Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks”, ICGEC2016, November. 7-9, Fuzhou City, Fujian Province, China.
  20. Chia-Mei Chen, Gu-Hsin Lai, 2016, “Detecting Command and Control Servers Using Ant Colony Optimization”, ICCSIT 2016, December. 7-12, Limerick City, Ireland.
  21. Shi-Hao Wang, Chia-Mei Chen, Gu-Hsin Lai, 2016, “Exploring Cross-Site Scripting Botnet Detection and Simulation”, PACIS2016, June 27- July 1, Chiayi, Taiwan.
  22. Chia-Mei Chen, Gu-Hsin Lai, Pong-Yu Young, 2016, “Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection”, AsiaJCIS2016, August 4-5, Fukuoka, Japan.
  23. Chia-mei Chen, Han-wei Hsiao, Tien-ho Chang, 2016, “The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs”, MobiSec2016, July 13-16, Taichung, Taiwan.
  24. S.-C Tsai, I.- Liu, C.-T Lu, B.-L Chen, J.-S Li, 2016, “Factor Impact of Virtual Switch Performance by Factorial Design in Cloud Computing”, ICS2016, December. 15-17, Chiayi, Taiwan.
  25. C.-B Jiang, I.-H Liu, C.-G Liu, Y.-C Chen, J.-S Li, 2016, “Distributed Log System in Cloud Digital Forensics”, ICS2016, December. 15-17, Chiayi, Taiwan.
  26. S.-C Tsai, I.-H Liu, C.-T Lu, C.-H Chang, J.-S Li, 2016, “Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network”, IIH-MSP2016, November 21-23, Kaohsiung, Taiwan.
  27. I-Hsien Liu, Chuan-Gang Liu, Kun-Hsuan Liu , Shun-Hsiung Yu , Zhi-Yuan Su , Jung-Shian Li, 2016, “Distributed Node Scheduling Algorithms for Multiple Group Communications in Wireless Multi-hop Networks”, Qshine2016, July 7-8, Seoul, South Korea.
  28. Ci-Bin Jiang , Jung-Shian Li, 2016, “Exploring Global IP-usage Patterns in Fast-Flux Service Networks”, ICICA2016, January 18-19, Brisbane, Australia.
  29. Jung-Shian Li, 2016, “Digital Forensic with Cross-Layer Log Files”, BAI2016, July 3-5, Nagoya, Japan.
  30. Tzy-Shiah Wang, Hui-Tang Lin, 2016, “DGA Botnet Detection Utilizing Social Network Analysis”, IS3C2016, July 4-6, Xi'an, China.
  31. C.-M. Chen, T. Chang, 2015, “The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack”, AsiaJCIS 2015, May. 24-26, Kaohsiung, Taiwan.
  32. I-Hsien Liu, Chun-Kai Lin, and Jung-Shian Li, 2015, “An enhancing video streaming scheme over hybrid VANET”, AROB 2015, Jan. 21-23, Beppu, Japan.
  33. 許凱竣, 郭振忠, 楊竹星, 2015, “基於靜態分析之可攜式文件格式檔案過濾系統”, CISC2015, May. 28-29, Kaohsiung, Taiwan.
  34. 陳嘉玫, 王士豪, 2015, “漸進式惡意程式分類方法”, CISC2015, May. 28-29, Kaohsiung, Taiwan.
  35. 陳嘉玫, 王則堯, 羅文翎, 2015, “智慧型僵屍網路偵測”, CISC2015, May. 28-29, Kaohsiung, Taiwan.
  36. I-Hsien Liu, Tian-Li Wang, and Jung-Shian Li, 2014, “An Effective Group Communications in Hybrid VANET”, ICS 2014, Dec. 12-14, Taichung, Taiwan.(Best Poster Award)
  37. 郭振忠, 歐雅惠, 劉奕賢, 王子夏, 郭鎮穎, 陳嘉玫, 李忠憲, 林輝堂, 楊竹星, 2014, “網路威脅搜捕、分析、追蹤與過濾技術之研究”, Cyberspace 2014, Dec. 5, Taipei, Taiwan.
  38. 郭振忠, 盧建同, 林敬皇, 李忠憲, 楊竹星, 2013, “基於測試平台之網路攻防演練活動設計與實作”, NCS 2013, Dec. 13-14, Taichung, Taiwan.
  39. 陳怡臻、劉奕賢、盧建同、方泰鈞、李忠憲, 2013, “雲端分散式日誌搜集方法”, NST 2013, Nov. 14-16, Tainan, Taiwan.
  40. 劉奕賢, 蔡舜智, 江啟賓, 張家瑋, 安家駒, 李忠憲, 2013, “結構化惡意程式資料庫系統 ”, TANET 2013, Oct. 23-25, Taichung, Taiwan.
  41. Chuan-Gang Liu, Chuan-Kang Kao, Huoc-Yong Koo, and Jung-Shian Li, 2013 “A Novel Group-based Location Service Management Scheme in VANETs”, ICICN 2013, Jan. 19-20, Singapore.
  42. 謝哲人,劉奕賢,黃證翰,方泰鈞,李忠憲, 2012, “校園網路動態目錄服務與Google Apps學術雲端服務整合之研究”, TANET 2012, Oct. 23-25, Taichung, Taiwan.
  43. 林敬皇, 盧建同, 李忠憲, 楊竹星, 2012, “網路攻擊與防禦平台之研究與實作”, CISC 2012, May 30-31, Tai-Chung, Taiwan.
  44. Jung-Shian Li, I-Hsien Liu, Kun-Hsuan Liu, and Shun-Hsiung Yu, 2012 , “Schedule Multi-player Online Game Transmission Services in Wireless Multi-hop Networks”, MASS 2012, Aug. 10-12, Shanghai, China.


專業證照

資訊安全


1. EC-Council Computer Hacking Forensic Investigator v8

2. EC-Council Certified Ethical Hacker v8

3. CompTIA Security+ ce certificate

4. International Computer Driving Licence / European Computer Driving License Foundation IT Security 2.0

5. 趨勢科技 Trend Corporate AntiVirus Engineer

6. SGS BS10012個人資訊管理系統主導稽核員訓練合格


勞委會及其他政府機關


1. 經濟部 資訊專業人員認證(ITE) 網路通訊+網路規劃與設計

2. 經濟部 資訊專業人員認證(ITE) 網路通訊

3. 經濟部 資訊專業人員認證(ITE) 資訊管理


系統管理


1. LPI Advanced Level Linux Professional

2. LPI Junior Level Linux Professional

3. Microsoft MCSE- Microsoft Windows Server 2003

4. Microsoft MCSA- Microsoft Windows Server 2003

5. Microsoft MCITP-Enterprise Support Technician on Windows Vista

6. Microsoft MCTS-Microsoft Windows Vista, Configuration

7. Microsoft Certified Professional

8. Microsoft MTA-Server Administration

9. Microsoft MTA-Networking Fundamentals

10. Microsoft MTA-Windows Operating System

11. HP Accredited Technical Associate: Cloud

12. HP Accredited Technical Associate: Connected Devices

13. HP Accredited Technical Associate: IT Architect

14. HP Accredited Technical Associate: IT for Business

15. HP Accredited Technical Associate: Networks

16. HP Accredited Technical Associate: Servers & Storage

17. Novell Certified Linux Administrator

18. Novell PartnerNet Data Center Technical Specialist


系統開發/程式設計


1. SUN Certified Programmer for JAVA 1.2

2. SUN Certified Web Component Developer for JAVA 1.4

3. Microsoft MCSD- Microsoft Visual Studio 6.0

4. Microsoft MCTS-Windows Embedded CE 6.0 Developer

5. Microsoft Certified of Completion Windows XP Embedded Training

6. Microsoft Certified of Completion Windows CE Embedded Training


資料庫系統


1. Oracle 8i Database Administrator Certified Professional

3. Microsoft MCDBA- Microsoft SQL Server 2000

4. Microsoft MTA-Database Administration

中心榮譽

1. 2014 International Computer Symposium (ICS) Best Poster Award

2. 2014 Cyberspace雲端服務應用、安全與稽核研討會 大會學術論文獎

3. 2005 經濟部 資訊專業人員鑑定-尋找網路達人活動 全國第三名