NCKUEE Faculty Data
Chinese Version
Professor Jung-Shian Li
Address
EE Building 9F R92991
Email
TEL
+886-6-2757575 ext.62385
Lab Weblink
CANS Lab
(R92979/ext.62400-1679)
Background
Educations
1999
Dr.-Ing, Technical University Berlin, Germany
1992
M.S., Electrical Engineering Department, National Taiwan University, R.O.C.
1986
B.S., Electrical Engineering Department, National Taiwan University, R.O.C.
Experiences
2009/08 至今
國立成功大學 電機系教授
2017/02 至今
國立成功大學 資通安全研究與教學中心 主任
2023/04 至 2026/04
國家中山科學研究院 董事
2019/10 至2025/05
財團法人電信技術中心 中心本部 董事
2022/06 至 2023/05
行政院 關鍵基礎設施防護推動專案小組 委員
2020/11 至 2023/11
財團法人醫院評鑑暨醫療品質策進會 諮詢專家
2018/06 至 2019/05
中央選舉委員會 政府資料開放諮詢小組 委員
2017/09 至 2018/12
台北市立聯合醫院 資訊安全暨個人資料保護管理委員會 委員
2017/02 至 2019/01
國家高速網路與計算中心 副主任
2013/07 至 2018/12
Security and Communication Networks, Guest Editor
2012/01 至 2012/12
Lebanese American University 2012 升等外審委員
2012/08 至 2013/12
工業技術研究院 南分院雲端服務中心 顧問
2011/08 至 2012/07
南部科學園區 產學協會通訊推廣委員會 委員
2009/08 至 2013/12
證券櫃檯買賣中心 上櫃審議 委員
2009/08 至 2011/04
國立成功大學 計算機與網路中心 副主任
2009/01 至 2010/12
中國電機工程學 會國際關係委員會 委員
2008/08 至 2011/07
國立成功大學 資訊安全委員會 委員
2008/01 至 2009/12
IEEE Wireless Communications, Guest Editor
2008/08 至 2009/07
國立成功大學 電腦與通信工程研究所 通訊組召集人
2004/08 至 2004/10
財團法人電信技術中心 資通安全組 德國共同準則實驗室技轉團團長
2004/02 至 2013/12
International Journal of Communication Systems, Wiley Associate Editor
2006/08 至 2018/12
International Journal of Cyber Criminology Associate Editor
2005/08 至 2007/07
國立成功大學 資通安全研發中心 主任
2002/08 至 2009/07
國立成功大學 電腦與通信工程研究所 計算機與網路中心網路作業組組長
2002/01 至 2002/12
財團法人 電信技術中心 資安顧問
2002/01 至 2002/12
財團法人電信技術中心 資通安全產品檢測實驗室 德國技轉團長
2002/08 至 2009/07
國立成功大學電機系副教授
1999/02 至 2002/07
國立成功大學電機系助理教授
1995/10 至 1999/02
德國國家資訊技術研究中心 開放通信研究所 研究員
1994/12 至 1995/07
台北市政府 交通局交通管制工程處 幫工程司
Specialities
  • Information Security Protection of Industrial Control System
  • Cloud security
  • Digital copyright management and digital forensics
Publication
Journal
more
less
  1. I-H. Liu, H.-C. Huang, M.-H. Lee, J.-S. Li, 2024, “Intrusion Detection in IoT Network Traffic Using Markov Model”, accepted for publication on Sensors and Materials.
  2. K.-C. Lu, I-H. Liu, K.-H. Chang, J.-S. Li, 2024, “VoWi-Fi Security Threats: ARP Attack and Countermeasures”, IET Networks, Vol. 13, No. 2, pp. i, 111-198. (Cover Page)
  3. M.-W. Chang, J.-S. Li, I-H. Liu, 2023, “Cyber-Physical Security Testbed for Dam Control System”, Journal of Advances in Artificial Life Robotics, Vol. 4, No. 2, pp. 106-109.
  4. I-H. Liu, M.-W. Huang, H.-Y. Lai, M.-H. Lee, J.-S. Li*, 2023, “Securing the Critical Communication in Dam Control System with SDN”, Journal of Robotics, Networking and Artificial Life, Vol. 10, No. 2, pp. 179-183. 
  5. I-H. Liu, M.-H. Lee, J.-S. Li*, 2023, “Securing 5G Non-Public Networks Against Fake Base Station”, Journal of Robotics, Networking and Artificial Life, Vol. 10, No. 2, pp. 156-159.
  6. I-H. Liu, C.-H. Wu, J.-S. Li, C.-F. Li, 2023, "Utilizing Blockchain to Monitor the Functioning of Devices in Industrial Control Systems", Journal of Advances in Artificial Life Robotics, Vol. 3, No. 4, pp. 205-208.
  7. I-H. Liu, C.-E. Hsieh, W.-M. Lin, J.-S. Li, C.-F. Li, 2022, "Data-Balancing Algorithm Based on Generative Adversarial Network for Robust Network Intrusion Detection", Journal of Robotics, Networking and Artificial Life, Vol. 9, No. 3, pp. 303-308. (ESCI)
  8. I-H. Liu, Y.-C. Tsai, C.-F. Li, J.-S. Li, 2022, "Cross-organizational Non-repudiation Industrial Control Log System Based on Blockchain", Journal of Robotics, Networking and Artificial Life, Vol. 9, No. 3, pp. 240-244. (ESCI)
  9. I-H. Liu, C.-K. Liu, L.-Y. Chang, J.-S. Li, 2022, "OPC UA TSN Industrial Control System Cybersecurity Testbed", Journal of Robotics, Networking and Artificial Life, Vol. 9, No. 3, pp. 229-232. (ESCI)
  10. I-H. Liu, J.-H. Lin, H.-Y. Lai, J.-S. Li, 2022, "Scalable ICS Honeypot Design by Description Files", Journal of Robotics, Networking and Artificial Life, Vol. 9, No. 3, pp. 216-220. (ESCI)
  11. I-H. Liu, J.-S. Li, Y.-C. Peng, C.-G. Liu, 2022, “A Robust Countermeasures for Poisoning Attacks on Deep Neural Networks of Computer Interaction systems”, Applied Sciences, Vol. 12, No. 15, pp. 7753-7770. (SCI, EI)
  12. I-H. Liu, Y.-Y. Chen, C.-G. Liu, J.-S. Li, 2022, “Cyberattack Defense with Appropriate Address-changing Frequency in Industrial Control Systems”, Sensors and Materials, Vol. 34, No. 7, pp. 2567-2579. (SCI, EI)
  13. I-H. Liu, C.-C. Lai, J.-S. Li, C.-C. Wu, C.-F. Li, C.-G. Liu, 2021, “An Emulation Mechanism for PLC Communication Features”, Journal of Robotics, Networking and Artificial Life, Vol. 8, No. 3, pp. 175-179.
  14. T.-L. Lee, I-H. Liu, C.-F. Li, J.-S. Li, 2021, “Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement”, Journal of Robotics, Networking and Artificial Life, Vol. 8, No. 3, pp. 193-196.
  15. J.-S. Li, C.-G. Liu, C.-J. Wu, C.-C. Wu, C.-W. Huang, C.-F. Li, and I-H. Liu, 2021,“Design of Industrial Control System Secure Communication Using Moving Target Defense with Legacy Infrastructure”, Sensors and Materials, Vol. 33, No. 10 , pp.3415-3424
  16. I-H. Liu, K.-M. Su, J.-S. Li*, 2021, “The Security Issue of ICS: The Use of IT Infrastructure”, Journal of Robotics, Networking and Artificial Life, Vol. 8, Issue 1, pp. 29-32.
  17. 劉大哲, 劉奕賢, 蔡一郎, 李竹芬, 李忠憲, 2020,“使用深度學習技術進行惡意程式分類”, 航空技術學院學報, Vol. 19, pp. 22-26.
  18. C.-G. Liu, Y.-M. Huo, I-H. Liu, H.-H. Liu, C.-F. Li, J. -S. Li, 2020, “A novel and efficient blocking scheme for multiple tag identifications in a large scale RFID system”, Ad-Hoc and Sensor Wireless Networks, Vol. 46, No. 1-2, pp. 23-51.
  19. I-H. Liu, C.-H. Lo, T.-C. Liu, J.-S. Li, C.-G. Liu and C.-F. Li, 2020, “IDS Malicious Flow Classification”, Journal of Robotics Networking and Artificial Life , Vol. 7, No. 2, pp. 103-106.
  20. J.-S. Li, I-H. Liu, C.-Y. Lee, C.-F. Li and C.-G. Liu, 2020, “A Novel Data Deduplication Scheme for Encrypted Cloud Databases”, Journal of Internet Technology, Vol. 21, No. 4, pp. 1115-1125.
  21. J.-S. Li, I-H. Liu, C.-J. Tsai, Z.-Y. Su, C.-F. Li and C.-G. Liu, 2020, “Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality”, IEEE Access, Vol. 8, pp. 114940 - 114952.
  22. K.-C. Lu, I-H. Liu, J.-W. Liao, S.-C. Wu, Z.-C. Liu, J.-S. Li, C.-F. Li , 2019, “Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices ”, Journal of Robotics Networking and Artificial Life , Vol. 6, No. 3, pp.157-161.
  23. C.-G. Liu,  I.-H. Liu,  C.-D. Lin,  J.-S. Li, 2019, “A novel tag searching protocol with time efficiency and searching accuracy in RFID systems”, Computer Networks, Vol. 150, pp. 201-216.
  24. Y.-R. Chen,  I.-H. Liu,  K.-H. Chang,  C.-G. Liu,  J.-S. Li, 2019, “Selection Strategy for VM Migration Method”, Journal of Robotics Networking and Artificial Life, Vol. 6, No. 1, pp. 66-70.
  25. C.-H.Chou, C.-C.Wu, K.-C. Lu, I-H. Liu, T.-H. Chang, C.-F.Li, J.-S. Li, Modbus Packet Analysis and Attack Mode for SCADA System, Journal of ICT, Design, Engineering and Technological Science (JITDETS 2018), Vol. 2, No. 2, pp. 30-35.
  26. J.-S. Li, C.-K. Kao, C.-Y. Tsai, I.-H. Liu and C.-G. Liu, 2017, “Low-cost localization service for roadside sensors based on passive information”, Journal of High Speed Networks, Vol. 23, No. 4, pp. 323-339.
  27. C.-B. Ji and J.-S. Li, 2017, “Exploring Global IP-Usage Patterns in Fast-Flux Service Networks”, Journal of Computers, Vol. 12, No. 4, pp. 371-380.
  28. Y.-R. Ch and J.-S. Li, 2017, “Staggered approach for alleviating TCP Incast in simultaneous Multi-VM migration”, Computer Communications, Vol. 106, pp. 24-32.
  29. S.-C. Tsai, I-H. Liu, C.-T. Lu, C.-H. Chang, J.-S. Li , 2016, “Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network”, ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, Vol.63, pp. 285-292
  30. S.-C. Tsai, Y.-M. Hu, C.-H. Chai, and J.-S. Li, 2016, “Efficient Tag Reading Protocol for Large-Scale RFID Systems with Pre-reading”, Computer Communications, Vol. 88, pp. 73–83.
  31. C.-B. Jiang, I-H. Liu, Y.-N. Chung and J.-S. Li, 2016, “Novel intrusion prediction mechanism based on honeypot log similarity”, International Journal of Network Management, Vol. 26, No. 3, pp. 156-175.
  32. Y.-M. Hu, I.-C. Chang, and J.-S. Li, 2015, “Hybrid Blocking Algorithm for Identification of Overlapping Staying Tags between Multiple Neighboring Readers in RFID Systems”, IEEE Sensors Journal, Vol. 15, No. 7, pp. 4076 - 4085.
  33. C.-G. Liu, I-H. Liu, W.-S. Yao, and J.-S. Li, 2015, “K-anonymity against Neighborhood Attacks in Weighted Social Networks”, Security and Communication Networks,Vol. 8,No. 18,pp. 3864-3882.
  34. C.-T. Lu, C.-W. Chang, and J.-S. Li, 2015, “VM Scaling based on Hurst Exponent and Markov Transition with Empirical Cloud Data”, Journal of Systems and Softwar, Vol. 99, pp. 199–207.
  35. C.-B. Jiang, and J.-S. Li, 2015, “Ontology-based Botnet Topology Discovery Approach with IP Flow Data”, International Journal of Innovative Computing, Information and Control, Vol. 11, No. 1, pp. 309–326.
  36. Y.-S. Su, S.-L. Su, and J.-S. Li, 2014, “Joint topology-transparent scheduling and QoS routing”, IEEE Transactions on Vehicular Technology, Vol. 63, No. 1, pp. 372-389.
  37. C.-H. Lin, C.-T. Lu, Y.-H. Chen, and J.-S. Li, 2014, “Resource allocation in cloud virtual machines based on empirical service traces”, International Journal of Communication Systems, Vol. 27, No. 12, pp. 4210–4225.
  38. C.-J. Hsieh, C.-T. Weng, and J.-S. Li, 2014, “JPEG Forensics Scheme for Signature Embedding and Packet-Level Detection”, International Journal of Communication Systems, Vol. 27, No. 11, pp. 3368–3382.
  39. C.-T. Lu, C.-L. Chang, I-H. Liu, and J.-S. Li, 2014, “Novel Advanced Broadcast Scheme for Efficient Safety Message Collision Alleviation in Vehicular Networks”, Journal of Wireless Person Communication, Vol. 77, No. 4, pp. 2793-2816.
  40. I-H. Liu, C.-G. Liu, C.-T. Lu, Y.-T. Kuo, and J.-S. Li, 2014, “A Multi-hop Resource Scheduling Algorithm for IEEE 802.16j Relay Networks”, Computer Networks, Vol. 67, pp. 164–179.
  41. 李忠憲, 劉奕賢, 江啟賓, 姚文盛, 陳怡臻, 李昱宏, 李鋆洧, 2013, “適地型雲端社交網路隱私防護方法之研究”, Communications of CCISA, Vol. 19, No. 1, pp. 104-118.
  42. J.-S. Li, I-H. Liu, C.-K. Kao, and C.-M. Tseng, 2013, “Intelligent Adjustment Forwarding: A Compromise between End-to-End and Hop-by-Hop Transmissions in VANET”, Journal of Systems Architecture, Vol. 59, No. 10, pp. 1319–1333.
  43. C.-G. Liu, I-H. Liu, T.-T. Yang, and J.-S. Li, 2013, “Navigation-Aware Association Control in Vehicular Wireless Networks”, Journal of High Speed Networks, Vol. 19, No. 4, pp. 311-324.
  44. C.-H. Chao, C.-F. Yang, P.-T. Lin, and J.-S. Li, 2013, “Novel Distributed Key Revocation Scheme for Wireless Sensor Networks”, Journal of Security and Networks, Vol. 6, No. 10, pp. 1271-1280.
  45. J.-S. Li, C.-J. Hsieh, and W.-C. Liu, 2013, “Digital Evidence Collection for Web Image Access”, Security and Networks, Vol. 6, No. 6 , pp. 765-776.
  46. J.-S. Li, C.-J. Hsieh, and H.-Y. Lin, 2013, “A Hierarchical Mobile-Agent-based Security Operation Center”, International Journal of Communication Systems, Vol. 26, No. 12, pp.1503-15191
  47. J.-S. Li, C.-J. Hsieh, and Y.-K. Wang, 2013, “Distributed Key Management Scheme for P2P Live Streaming Services”, International Journal of Communication Systems, Vol. 26, No. 10, pp. 1259-1272
  48. J.-S. Li and K.-H. Liu, 2013, “A Lightweight Identity Authentication Protocol for Vehicular Networks”, Telecommunication Systems, Vol. 53, No. 4, pp. 425-438.
  49. J.-S. Li and Y.-M. Hu, 2013, “An Efficient Time-Bound Collision Prevention Scheme for RFID Re-entering Tags”, IEEE Transactions on Mobile Computing, Vol. 12, No. 6, pp. 1054-1064.
  50. C.-G. Liu, C.-H. Chao, C.-W. Leou and J.-S. Li, 2012, “Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks”, The Computer Journal, Vol. 55, No. 12, pp. 1467-1458.
  51. C.-H. Lin, J.-Y. Ma, C.-S. Laih, and J.-S. Li, 2012, “MSS: Use File Format Conversion for Suppress Malicious Scripts in Multimedia”, Journal of Internet Technology.Vol. 13.No. 5 , 2012, pp. 843-852.
  52. J.-S. Li, K.-H. Liu, N. Chilamkurti, L. Shu and T. Q. Duong, 2012, “Scheduling Performance Enhancement by Network Coding in Wireless Mesh Networks”, IET Communications, Vol. 6, No. 13, pp. 1912-1919.
  53. J.-S. Li, K.-H. Liu, and C.-H. Wu, 2012, “Efficient group multicast node scheduling schemes in multi-hop wireless networks”, Computer Communications, Vol. 35, No. 10, pp. 1247-1258.
  54. J.-S. Li and K.-H. Liu, 2012, “Network-coding-based Cache Policy for Loss Recovery Enhancement in Reliable Multicast”, International Journal of Network Management, Vol. 22, No. 4, pp. 330-345.
  55. K.-H. Liu, J.-S. Li, C.-Y. Wang, N. Chilamkurti and T. Vasilakos, 2012, “Minimizing Multi-player Interactive Delay in Multihop Wireless Networks”, International Journal of Communication Systems, Vol. 25, No. 10, pp. 1330-1349.
  56. C.-B. Jiang and J.-S. Li, 2012, “IP Flow Data Correlation with Interference Rules”, Advanced Materials Research, Vol. 406, No. 1, pp. 1211-1214.
  57. J.-S. Li, C.-K. Kao, I-H. Liu, C.-M. Tseng, 2011, “Reliable Bundle Transmission in VANET with Node Failure”, American Journal of Engineering and Technology Research, Vol.11, No. 12, pp. 2652-2655.
  58. J.-S. Li and C.-F. Yang, 2011, “Differentiated Recovery in WDM Networks”, Photonic Network Communications, Vol. 22, No. 1, pp. 98-107.
  59. C.-H. Chao, I.-H. Li, C.-Y. Yang, and J.-S. Li, 2011, “An Efficient Diversity-Driven Selective Forwarding Approach for Replicated Data Queries in Wireless Sensor Networks”, Journal of Systems and Architecture, Vol. 57, No. 9, pp. 830-839.
  60. J.-S. Li, and K.- H. Liu, 2011, “A Hidden Mutual Authentication Protocol for Low-cost RFID Tags”, International Journal of Communication Systems, Vol. 24, No. 9, pp. 1196-1211.
  61. J.-S. Li, C.-J. Hsieh, C.-Y. Chang and N. Chilamkurti, 2011, “Improved IPsec Performance Utilizing Transport-Layer-Aware Compression Architecture”, Security and Communication Networks, Vol. 4, No. 9, pp.1063-1074.
  62. J.-S. Li, C.-K. Kao, J.-J. Tzeng, 2011, “VoIP Secure Session Assistance and Call Monitoring via Building Security Gateway”, International Journal of Communication Systems, Vol. 24, No. 7, pp. 837-851.
  63. J.-S. Li, C.-J. Hsieh, C.-F. Hung , 2010, “A Novel DRM Framework for Peer-to-Peer Music Content Delivery”, Journal of Systems and Software, Vol. 83, No. 10, pp. 1689-1700.
  64. J.-S. Li, H.-C. Kao, and W.-H. Lin, 2010, “Achieving Maximal VoIP Calls in 802.11 Wireless Networks”, Computer Communications, Vol. 33, No. 11, pp. 1296–1303.
  65. C.-J. Hsieh , J.-S. Li, and W.-C. Liu, 2010, “Network Forensic for Web JPEG Image Transmission”, Journal of Statistics & Management Systems, Vol. 13, No. 4, pp. 689-699.
  66. J.-S. Li, C.-F. Yang and J.-H. Chen, 2010, “Star-block Design in Two-level Survivable Optical Networks”, IEEE/ACM Transactions on Networking, Vol. 19, No. 2, pp. 526 - 539.
  67. J.-S. Li and C.-H. Chao, 2010, “P2P Content Distribution based on Altruistic Demand and Recoding Dissemination”, IEEE Transactions on Systems, Man, and Cybernetics--Part A: Systems and Humans, Vol. 40, No. 5, pp. 1083 - 1093.
  68. J.-S. Li and C.-H. Chao, 2010, “An Efficient Super-Peer Overlay-Construction and Broadcasting Scheme Based on Perfect Difference Graph”, IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 5, pp. 594-606.
  69. J.-S. Li and H.-C. Kao, 2009, “Distributed K-coverage self-location estimation scheme based on Voronoi diagram”, IET Communications, Vol. 4, No. 2, pp. 167-177.
  70. J.-S. Li, Y.-T. Lin and T.-H. Liu, 2009, “Construct a Power-Efficient and Space-Reuse-Effective Dominating Set Using Small-World Model in Mobile Ad Hoc Networks”, International Journal of Communication Systems, Vol. 22, No. 11, pp. 1445-1464.
  71. J.-S. Li, H.-C. Kao, and J.-D. Ke, 2009, “Voronoi-Based Relay Placement Scheme for Wireless Sensor Networks”, IET Communications, Vol. 3, No. 4, pp. 530-538.
  72. C.-G. Liu and J.-S. Li , 2008, “A Fast-convergent Fairness Scheme for Resource Allocation in RPR Networks”, International Journal of Communication Systems, Vol. 21, No. 7, pp. 773-789.
  73. Y.-S. Su, S.-L. Su, and J.-S. Li, 2008, “Topology-Independent Link Activation Scheduling Schemes for Mobile CDMA Ad Hoc Networks”, IEEE Transactions on Mobile Computing, Vol. 7, No. 5, pp.599-616.
  74. J.-S. Li, H.-C. Kao, S.-Y. Cheng, and C.-Y. Huang, 2007, “Multi-Piconet Extension Using a Bridge Selection Protocol with Distributed and Centralized Traffic Scheduling in Home Networks”, IEEE Transactions on Consumer Electronics, Vol. 53, No. 4, pp. 1378-1386.
  75. J.-S. Li, C.-G. Liu and C.-Y. Huang, 2007, “Achieving Multipoint-to-Multipoint Fairness with RCNWA”, Journal of Systems and Architecture, Vol. 53, No. 7, pp.437-452.
  76. J.-S. Li and C.-T. Lee, 2006,” Improve routing trust with Promiscuous Listening Routing Security Algorithm in Mobile Ad Hoc Networks”, Computer Communications, Vol. 29, No. 8, pp. 1121-1132.
  77. C.-F. Li and J.-S. Li, 2006, “Fair Allocation Using a Fast Smart-Market Auction”, European Journal of Operational Research, Vol. 172, No. 1, pp. 352-365.
  78. J.-S. Li, C.-F. Li and C.-P. Lo, 2006, “Effective Fair Allocation Using Smart Market Label Auction with CSLF and CR-CSFQ”, Journal of Systems and Software, Vol. 79, No. 5, pp. 665-673.
  79. J.-S. Li and Y.-S. Su, 2006, “Random Early Detection with Flow Number Estimation and Queue Length Feedback Control”, Journal of Systems and Architecture, Vol. 52, No. 6, pp. 359-372.
  80. J.-S. Li and C.-G. Liu, 2006, “Improve TCP Performance with a Novel Adaptive Queue Management Scheme in IEEE 802.17 RPR Optical Networks”, Computer Networks, Vol. 50, No. 15, pp. 2762-2786.
  81. J.-S. Li and C.-W. Ma, 2005, “Improving Fairness of TCP Vegas”, International Journal of Network Management, Vol. 15, No. 1, pp.3-10.
  82. J.-S. Li and M.-W. Guo, 2005, “Improving 802.11 Wireless TCP Performance with Adaptive Reed-Solomon Codes: An Experimental Study”, Journal of Information Science and Engineering, Vol. 21, No. 6, pp. 1201-1211.
  83. J.-S. Li, Y.-T. Lin, and C.-F. Yang, 2005, “Core-Stateless Fair Rate Estimation Fair Queuing”, International Journal of Communication Systems, Vol. 19, No. 6, pp. 679–697.
  84. Y.-S. Su, S.-L. Su and J.-S. Li, 2005, “Receiver-Initiated Multiple Access Protocols for Spread Spectrum Mobile Ad Hoc Networks”, Computer Communications, Vol.10, No. 28, pp. 1251-1265.
  85. J.-S. Li and J.-Z. Liang, 2005, “A Novel Core-stateless ABR-like Congestion Avoidance Scheme in IP Networks”, International Journal of Communication Systems, Vol. 18, No. 5, pp. 427-447.
  86. J.-S. Li, C.-T. Lee and M.-W. Guo, 2004, “Analysis, Simulation and Implementation of Wireless TCP Flows with Forward Error Correction”, Computer Communications, Vol. 27, No. 3, pp. 222-229.
  87. J.-S. Li and C.-S. Mao, 2004, “Providing Flow-based Proportional Differentiated Services in Class-based DiffServ Routers”, IEEE Proceedings on Communications, Vol. 151, No. 1, pp. 82-88.
  88. J.-S. Li, H.-C. Lai and Y.-T. Lin, 2003, “Achieving Proportional DiffServ Per-Hop Behaviour with PLQF”, International Journal of Communication Systems, Vol. 16, No. 8, pp. 715-733.
  89. J.-S. Li, 2002, “An Evaluation of Deficit Round Robin Fair Queuing Applied for Router Congestion control”, Journal of Information Science and Engineering, Vol. 18, No. 2, pp. 333-339.
  90. J.-S. Li, 2002, “Using Autoregressive Gaussian Processes With Trends and Aggregations to Model Self-Similar Traffic”, Computer Communications, Vol. 25, No. 10, pp. 964-971.
  91. J.-S. Li and M.-S. Leu, 2002, “Network Fair Bandwidth Share Using Hash Rate Estimation”, Networks, Vol. 40, No. 3, pp. 125-141.
  92. J.-S. Li and C.-W. Ma, 2002, “EVA: A Better TCP Version for Resources-Insufficient Networks”, International Journal of Communication Systems, Vol. 15, No. 7, pp. 593-606.
  93. J.-S. Li, 2000, “Measurement and In-Service Monitoring for QoS Violations and Space Capacity Estimations in ATM Networks”, Computer Communications, Vol. 23, No. 2, pp. 162-170.
Conference
more
less
  1. P.-W. Chou, N.-Y. Chen, J.-S. Li, I-H. Liu, 2024, “Detecting abnormal operations in ICS using finite-state machines”, ICAROB 2024, Feb. 22-25, Oita, Japan.
  2. Y.-H. Chang, T.-E. Peng, J.-S. Li, I-H. Liu, 2024, “Industrial Control System State Monitor Using Blockchain Technology”, ICAROB 2024, Feb. 22-25, Oita, Japan.
  3. Y.-C. Wu, J.-S. Li, C.-F. Li, I-H. Liu, 2024, “Enhancing Dam Security and Water Level Alerting with Blockchain Technology”, ICAROB 2024, Feb. 22-25, Oita, Japan.
  4. T.-E. Peng, Y.-H. Chang, J.-S. Li, I-H. Liu, 2024, “MiniDAM: A Dam Cybersecurity Toolkit”, ICAROB 2024, Feb. 22-25, Oita, Japan.
  5. N.-Y. Chen, P.-W. Chou, J.-S. Li, I-H. Liu, 2024, “Case Study of Network-Based Intrusion Detection System Deployment in Industrial Control Systems with Network Isolation”, ICAROB 2024, Feb. 22-25, Oita, Japan.
  6. T.-E. Peng, I-H. Liu, J.-S. Li, C.-K. Liu, 2023, “Network Intrusion Detection Using CNN-based Classification Method”,  IEEE/ACIS SNPD2023-Winter, Dec. 6-7, Taichung, Taiwan.
  7. S.-G. Tân, I-H. Liu, J.-S. Li, 2023, “Simulation and Analysis of Common Attacks against PLCs Used in Dam Testbed”, ARIS 2023, Aug. 30 - Sep. 22, Taipei, Taiwan.
  8. 張允豪, 劉奕賢, 李忠憲, 2023, “基於區塊鏈的智慧系統資料驗證機制”, 第十三屆網路智能與應用研討會(NCWIA2023), Aug. 4-5, 台灣雲林. (最佳論文獎)
  9. H.-C. Huang, I-H. Liu, M.-H. Lee, J.-S. Li, 2023, “Anomaly Detection on Network Traffic for Healthcare Internet of Thing”, IEEE ECBIOS 2023, Jun. 2-4, Tainan, Taiwan.
  10. M.-H. Lee, I-H. Liu, H.-C. Huang, J.-S. Li, 2023, “Cybersecurity in 5G-Based Smart Healthcare Network: A Base Station Case Study”, IEEE ECBIOS 2023, Jun. 2-4, Tainan, Taiwan. (Best Conference Paper Award)
  11. 黃敏維, 劉奕賢, 李忠憲, 2023, “運用內容感知軟體定義網路提升智慧控制系統傳輸安全”, 第十八屆國際健康資訊管理研討會(UHIMA2023), May. 27-28, 台灣花蓮. (論文獎佳作)
  12. 吳芊欣, 劉奕賢, 李忠憲, 2023, “基於區塊鏈技術的物聯網運作記錄系統”, 第十八屆國際健康資訊管理研討會(UHIMA2023), May. 27-28, 台灣花蓮. (論文獎佳作)
  13. C.-Y. Lee, I-H. Liu, M.-W. Chang, J.-S. Li, 2023, “The Dam Gate Cybersecurity Testbed”, ICAROB 2023, Feb. 9-12, Oita, Japan.
  14. C.-H. Wu, I-H. Liu, J.-S. Li, C.-F. Li, 2023, “Device's Operation Tracking using Blockchain in Industrial Control System”, ICAROB 2023, Feb. 9-12, Oita, Japan.
  15. M.-W. Huang, I-H. Liu, H.-Y. Lai, M.-H. Lee, J.-S. Li, 2023, “Strengthen the Security of the Industrial Control System using SDN Technology”, ICAROB 2023, Feb. 9-12, Oita, Japan
  16. M.-H. Lee, I-H. Liu, J.-S. Li, 2023, “Fake Base Station Threats in 5G Non-Public Networks”, ICAROB 2023, Feb. 9-12, Oita, Japan.
  17. M.-W. Chang, I-H. Liu, J.-S. Li, 2023, “Cyber-Physical Security Testbed for River Basin Gate Control System”, ICAROB 2023, Feb. 9-12, Oita, Japan.
  18. I-H. Liu, J.-S. Chen, K.-M. Su, J.-S. Li, 2022, “Dam Control System's Cybersecurity Testbed”, IIH-MSP 2022, Dec. 16-18, Kitakyushu, Japan.
  19. M.-W. Chang, I-H. Liu, C.-K. Liu,W.-M. Lin, Z.-Y. Su, J.-S. Li, 2022, “A Non-normal Warning System for Dam Operation Using Machine Learning”, IEEE/ACIS SNPD2022-Winter, Dec. 7-9, Taichung, Taiwan.
  20. S.-G. Tân, I-H. Liu, J.-S. Li, 2022, “Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack Tree", CANDAR 2022 WICS Workshop, Nov. 21-22, Himeji, Japan.
  21. 賴薪宇, 劉奕賢, 李忠憲, 2022, “運用軟體定義網路保障工業控制系統可用性”, ITAOI 2022, May 27-29, 台灣澎湖.
  22. I-H. Liu, J.-S. Li, Y.-C. Peng, C.-G. Liu, 2022, "A Countermeasure of polluting on Health-Related Dataset for data mining", IEEE ECBIOS 2022, May 27-29, Tainan, Taiwan(Best Conference Paper Award).
  23. I-H. Liu, Y.-C. Peng, J.-S. Li, C.-G. Liu, 2022, "A New Poisoning Attacks on Deep Neural Networks", ICHSM 2022, May 13-15, Kyoto, Japan.
  24. 蔡曜竹, 劉奕賢, 李忠憲, 2022, “水資源場域內之區塊鏈證據資料保護系統”, DLT 2022 數位生活科技研討會, May 13, 台灣高雄.
  25. 黃哲偉, 劉奕賢, 劉川綱, 吳其哲, 李忠憲, 2022, “以動態位址分派技術提高健康照護環境之資訊安全性”, UHIMA 2022 第十七屆國際健康資訊管理研討會, Mar. 13, 嘉義, 台灣.
  26. 李鎮宇, 劉奕賢, 李忠憲, 李竹芬, 2022, “資安試驗平台比較分析”,  UHIMA 2022 第十七屆國際健康資訊管理研討會, Mar. 13, 嘉義, 台灣.
  27. 張力尹, 劉奕賢, 陳柏瑋, 李忠憲, 2022, “基於TSN網路的工業控制網路流量排程控制”, NST 2022 臺灣電信年會, Jan. 24-27, 台灣台北.
  28. I-H. Liu, J.-H. Lin, H.-Y. Lai, J.-S. Li, 2022, “Extendable ICS Honeypot Design with Modbus/TCP”, ICAROB 2022, Jan. 20-23, Oita, Japan.
  29. I-H. Liu, L.-Y. Chang, J.-S. Li, 2022, “Industrial Control System Cybersecurity Testbed with TSN Feature”, ICAROB 2022, Jan. 20-23, Oita, Japan.
  30. Y.-C. Tsai, I-H. Liu, J.-S. Li, 2022, “Blockchain-based Verification Mechanism for Industrial Control System”, ICAROB 2022, Jan. 20-23, Oita, Japan.
  31. I-H. Liu, C.-E. Hsieh, W.-M. Lin, J.-S. Li, C.-F. Li, 2022, “Data Balanced Algorithm Based on Generative Adversarial Network”, ICAROB 2022, Jan. 20-23, Oita, Japan.
  32. Y.-Y. Chen, I-H. Liu, C.-C. Wu, C.-G. Liu, J.-S. Li, “A Dynamic Interval Strategy for MT6D in IoT Systems”, IEEE ICEIB 2021, Dec. 10-12, Yilan, Taiwan.
  33. 吳謹瑞, 劉奕賢, 吳其哲, 劉川綱, 李忠憲, 2021, “Agent-based Moving Target Defense for Industrial Conrol System”, NCS 2021 全國計算機會議, Dec. 10-12, 台灣台中
  34. K.-C. Lu, I-H. Liu, J.-S. Li, “A Survey of the Offensive and defensive in Industrial Control System”, CANDAR/NCSS 2021, Nov. 23-26, Matsue, Japan.
  35. I-H. Liu, C.-E. Hsien, W.-M. Lin, C.-F. Li, J.-S. Li, “Malicious Flows Generator Based on Data Balanced Algorithm”, iFUZZY 2021, Oct. 5-8, Taitung, Taiwan.
  36. 謝承恩, 劉奕賢, 陸冠竹, 李忠憲, 2021, “基於機器學習之入侵偵測系統研析”, CISC 2021 第三十一屆全國資訊安全會議, Aug. 5-6, 台北, 台灣.
  37. C.-W. Huang, I-H. Liu, C.-C. Wu, C.-G. Liu, J.-S. Li, “A Legacy Infrastructure-based Mechanism for Moving Target Defense”, IEEE ECBIOS 2021, May 28-30, Tainan, Taiwan(Best Conference Paper Award).
  38. 張力尹, 劉奕賢, 鍾沛原, 楊竹星, 李忠憲, 2021, “運用修正式德菲法建構水資源領域關鍵基礎設施資安防護指標”, ITAOI 2021, May 28-29, 金門, 台灣.
  39. 陳階欣, 劉奕賢, 李忠憲, 2021, “工業控制系統信號傳輸干擾與抗干擾分析”, DLT 2021 數位生活科技研討會, May 14, 屏東, 台灣.
  40. Y.-Y. Chen, I-H. Liu, C.-C. Wu, C.-G. Liu, J.-S. Li, 2021, “The Effect of Node Deployment for MT6D in Industry Control System”, IEEE SIBCON 2021, May 13-15, Kazan, Russia
  41. T.-L. Lee, I-H. Liu, J.-S. Li, 2021, “Threats Hidden in Employee Workstation through Office Files”, ICAROB 2021, Jan 21-24, Hiroshima, Japan.
  42. C.-C. Lai, I-H. Liu, C.-C. Wu, J.-S. Li, C.-G. Liu, 2021, “A Communication System with Equipment's Characteristics”, ICAROB 2021, Jan 21-24, Hiroshima, Japan.
  43. K.-M. Su, I-H. Liu, J.-S. Li, 2021, “The Security Challenges with The Widespread Use of IT Infrastructure in ICS”, ICAROB 2021, Jan 21-24, Hiroshima, Japan.
  44. K.-M. Su, I-H. Liu, J.-S. Li, 2020,“The Risk of Industrial Control System: Programmable Logic Controller Default Configurations”, ICS 2020, Dec. 17-19, Tainan, Taiwan.
  45. C.-G. Liu, C.-J. Wu, I-H. Liu, C.-C. Wu, J.-S. Li, 2020,“Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems”, ICEA 2020, Dec. 12-15, Gangwon, Republic of Korea.
  46. I-H. Liu, Y.-L. Chang, J.-S. Li, C.-G. Liu, 2020,“Differential Privacy Protection with Group Onion Routing based on AI-based URL Classification”, ICEA 2020, Dec. 12-15, Gangwon, Republic of Korea.
  47. 謝承恩, 陸冠竹, 劉奕賢, 2020, “基於工控系統運用安全資訊和事件管理系統之研析”, TANET 2020, Oct 28-30, 台北, 台灣.
  48. 陳階欣, 劉奕賢, 李忠憲, 2020,“工控網路安全:水領域感測器干擾因素之研究”, TANET 2020, Oct 28-30, 台北, 台灣.
  49. 賴佳俊, 劉奕賢, 吳其哲, 劉川綱, 李忠憲, 2020,“運用回應特徵的蜜網偵測機制”, CISC 2020 第三十屆全國資訊安全會議, Sep. 1-4, 高雄, 台灣.
  50. 吳柏毅, 劉奕賢, 劉川綱, 李竹芬, 李忠憲, 2020,“探討 Deepfake 影片生成方法”, UHIMA 2020 第十五屆國際健康資訊管理研討會, Jul. 4, 台南, 台灣 (優秀論文獎).
  51. 彭彥筑, 劉奕賢, 劉川綱, 李竹芬, 李忠憲, 2020,“機器學習上的攻擊之研析”, UHIMA 2020 第十五屆國際健康資訊管理研討會, Jul. 4, 台南, 台灣.
  52. 王成允, 劉奕賢, 劉川綱, 李竹芬, 李忠憲, 2020, “軟體定義網路上的攻擊與防護之研析”, UHIMA 2020 第十五屆國際健康資訊管理研討會, Jul. 4, 台南, 台灣.
  53. P.-Y. Chung, J.-S. Li, I-H. Liu, Q.-R. Song, C.-F. Li and G.-L. Huang, 2020,“Cyber Security of Critical Infrastructure Protection Overview in Taiwan's Water Resource Domain”, ICRCE 2020, Jun. 19-21, Tokyo, Japan.
  54. 李東霖, 劉奕賢, 吳其哲, 李竹芬, 李忠憲, 2020,“網路通訊品質對 VPN 連線可靠度之影響”, DLT 2020 數位生活科技研討會, May 16, Pingtung, Taiwan.
  55. C.-H. Lo, T.-C. Liu, I-H. Liu, J.-S. Li, C.-G. Liu, C.-F. Li, 2020, “MALWARE CLASSIFICATION USING DEEP LEARNING”, ICAROB 2020, Jan. 13-16, Otia, Japan.
  56. 宋泉儒, 吳柏毅, 劉奕賢, 李忠憲, 2019, “Android惡意軟體偵測與防護之研析”, TANET 2019, Sep.25-27, Kaohsiung, Taiwan.
  57. 吳柏毅, 宋泉儒, 劉奕賢, 李忠憲, 2019, “使用機器學習改善網路傳輸品質的探討”, TANET 2019, Sep.25-27, Kaohsiung, Taiwan.
  58. 鍾沛原 ,李忠憲, 劉奕賢, 黃貴麟, 2019, “因應資通安全管理法之資安管理研究 -以水資源領域關鍵基礎設施為例”, TANET 2019, Sep.25-27, Kaohsiung, Taiwan.
  59. 宋泉儒, 王成允, 劉奕賢, 李忠憲, 2019, “基於機器學習方法的入侵檢測系統研析”, TANET 2019, Sep.25-27, Kaohsiung, Taiwan.
  60. 陸冠竹, 劉奕賢, 劉宗晁, 李忠憲, 2019, “工業控制系統安全之探討-以西門子S7系列為例”, TANET 2019, Sep.25-27, Kaohsiung, Taiwan.
  61. 王成允, 宋泉儒, 劉奕賢, 李忠憲, 2019, “機器學習流量分析對洋蔥路由匿蹤危害之研析”, TANET 2019, Sep.25-27, Kaohsiung, Taiwan.
  62. 劉大哲, 蔡一郎, 陸冠竹, 劉奕賢, 羅政翔, 李忠憲, 2019, “探討深度學習應用於惡意程式分類中之研析”, 2019ATSF&AS 第九屆航空科技與飛航安全暨第七屆航空與社會學術研討會會議, Jan. 6, Kaohsiung, Taiwan.
  63. 陸冠竹, 廖家煒, 吳少鈞, 劉奕賢, 李忠憲, 2019, “使用從序列到序列模型改善入侵偵測系統之惡意入侵偵測”, CISC2019 第29 屆全國資訊安全會議, May 23-24, Taichung, Taiwan.
  64. 羅政翔, 陸冠竹, 蔡一郎, 劉奕賢, 劉大哲, 李忠憲, 2019, “運用微控制器建置工業控制蜜網系統”, CISC2019 第29 屆全國資訊安全會議, May 23-24, Taichung, Taiwan.
  65. I-H. Liu, C.-G. Liu, J.-S. Li, 2019, “Effect of Different Information Security Training Methods based on TCAT Cup CTF Game”, SETAS 2019, Feb. 16-17, Osaka, Japan.
  66. Y.-R. Chen, I-H. Liu, K.-H. Chang, C.-G. Liu, J.-S. Li, 2019, “VM Migration Placement in Cloud Service”, ICAROB 2019, Jun. 27-30, Otia, Japan.
  67. 安家駒, 劉奕賢, 李忠憲, 2019, “分散式角色存取與行動群組匿名通訊機制之研究”, ITAOI 2019, May 24-26, Penghu, Taiwan.
  68. Y.-R. Chen, I-H. Liu, K.-H. Chang, J.-S. Li, 2020, “Selection Strategy for VM Migration Method”, ICAROB 2019 , Jun. 27-30, Otia, Japan.
  69. C.-H.CHOU, C.-C. WU, I-H. Liu, T.‐H. Chang, J.-S. Li, 2019, Modbus Packet Analysis and Attack Mode for SCADA System, IMCS 2019, Aug. 3-4, Amsterdam, Netherlands.
  70. Y.-R. Chen, I-H. Liu, J.-S. Li, 2018, “VM Migration Time Estimation in Cloud Services”, 2018 ISEAS, Aug. 8-9, Guam, USA.
  71. 周政輝, 張添香, 劉奕賢, 蘇致遠, 李忠憲, 吳其哲, 2018, “基於機器學習中Web應用防火牆之入侵偵測與防範系統設計與研究”, 2018 IMP 第24屆國際資訊管理暨實務研討會, Dec. 1, 台南, 台灣.
  72. 羅政翔, 劉奕賢, 李忠憲, 2018, “深度學習技術應用於電競勝率預測”, The 2018 Conference on Technologies and Applications of Artificial Intelligence, Nov, 台中, 台灣.
  73. 蔡一郎,張成睿,安興彥,李忠憲, 2018, “以BDTS進行常時間惡意網域IP變化行為偵測”, TANET 2018, Oct, Taiwan.
  74. 陸冠竹, 劉奕賢, 孫孟瑋, 李忠憲, 2018, “工業控制環境之誘捕系統建置及其反偵測機制之研究”, TANET 2018, Oct, Taiwan.
  75. 陸冠竹, 劉奕賢, 李忠憲, 李竹芬, 2018, “運用匿名傳輸技術保護醫療資訊安全”, 第十三屆國際健康資訊管理研討會(UHIMA2018), Jun. 8-9, 花蓮, 台灣.
  76. 劉奕賢, 陳佳秀, 陸冠竹, 李忠憲, 李竹芬, 劉忠峰, 2018, “帳戶驗證機制的安全性研析”, 第十三屆國際健康資訊管理研討會(UHIMA2018), Jun. 8-9, 花蓮, 臺灣.
  77. K.-C. Lu, I-H. Liu, J.-S. Li, 2018, “Venerability and Protection Tool Surveys of Industrial Control System”, CANDAR Workshops 2018,Nov. 27-30, Takayama, Japan.
  78. I-H. Liu, C.-G. Liub, C.-H. Chena, J.-S. Li, 2018, “Authentication Database Leakage Detection”, ICEEE 2018, Sep.17-19, Lodz, Poland.
  79. K.-C. Lu, I-H. Liu, M.-W. Sun, J.-S. Li, 2018, “A Survey on SCADA Security and Honeypot in Industrial Control System”, IRICT 2018, July 23-24, Hotel Bangi-Purajaya, Malaysia.
  80. 顏子皓, 蔡一郎, 陸冠竹, 劉奕賢, 潘祈睿, 李忠憲, 2018, “使用機器學習技術之入侵防禦系統研究”, ITAOI 2018, May.24-27,Penghu,Taiwan.
  81. 顏子皓, 蔡一郎, 陸冠竹, 劉奕賢, 潘祈睿, 李忠憲, 2018, “探討機器學習與深度學習應用於惡意程式分析中之研析”, ITAOI 2018, May.24-27,Penghu,Taiwan.
  82. 陸冠竹, 劉奕賢, 孫孟瑋, 鍾沛原, 李忠憲, 2018, “探討蜜網在 SCADA 系統中安全之研析”, ITAOI 2018, May.24-27, Penghu,Taiwan.
  83. 陸冠竹, 劉奕賢, 孫孟瑋, 鍾沛原, 李忠憲, 2018, “使用機器學習技術之入侵防禦系統研究”, ITAOI 2018, May.24-27,Penghu, Taiwan.
  84. Y.-R. Chen, I-H. Liu, C.-W. Chou, J.-S. Li, C.-G. Liu, 2018, “Multiple Virtual Machines Live Migration Scheduling Method”, ICCCS 2018, Apr. 27-30, Nagoya, Japan.
  85. I-H. Liu, Y.-H. Lin, J.-S. Li, C.-G. Liu, 2018, “A Secure Multi-Keyword Fuzzy Search with Polynomial Function for Encrypted Data in Cloud Computing”, ICCCS 2018, Apr. 27-30, Nagoya, Japan.
  86. C.-C. Kuo; K. Chain; I-H. Liu, C.-S. Yang, J.-S. Li, 2018, “Design and Implement of Capture the Flag based on Cloud Offense and Defense Platform”, ICASI 2018, Ari. 13-17, Chiba, Japan.
  87. C.-F. Li, J.-J. Su, I-H. Liu, 2018, “Factors Affecting Customers' Use of Internet Banking”, e-CASE & e-Tech 2018, Apr. 1-3, Osaka, Japan.
  88. J.-J. An, I-H. Liu, Y.-H. Lee, J.-S. Li, 2018, “Routing Loop Detection in VM Network”, e-CASE & e-Tech 2018, Apr. 1-3, Osaka, Japan.
  89. I-H. Liu, J.-H. Tai, C.-J. Tsai, C.-F. Li, J.-S. Li, 2018, “Secure Image Content Retrieval Management”, e-CASE & e-Tech 2018, Apr. 1-3, Osaka, Japan.
  90. I-H. Liu, C.-G. Liu, C.-J. Chang, J.-S. Li, 2018, “Client Searching Privacy Protection in Encrypted Database”, ICAROB 2018, Feb. 1-4, Oita, Japan.
  91. I-H. Liu, C.-H. Chen, J.-S. Li, 2018, “Novel Detection Scheme for Stolen Password File”, ICAROB 2018, Feb. 01-04 , Oita, Japan.
  92. K.-C. Lu, I-H. Liu, J.-S. Li, 2018, “Honeypot System of SCADA Security Survey”, ICAROB 2018, Feb. 01-04, Oita, Japan.
  93. I-H. Liu, N.-W. Li, C.-F. Li, J.-S. Li, 2017, “RBAC Management with Blockchain”, EECS 2017, Dec. 19-21, Singapore.
  94. I-H. Liu, T.-J. Fang, J.-S. Li, M.-W. Sun, C.-G. Liu, 2017, “A New Colluded Adversarial VNet embeddings Attack in Cloud”, PDCAT 2017, Dec. 18-20, Taipei, Taiwan.
  95. 陸冠竹, 劉奕賢, 劉川綱, 李忠憲, 2017,“SCADA資訊安全之研析 ”, TANET 2017, Oct. 25-27, Taichung, Taiwan.(最佳論文獎).
  96. 張永霖, 劉奕賢, 劉川綱, 李忠憲, 2017,“匿名傳輸技術之研析 ”, TANET 2017, Oct. 25-27, Taichung, Taiwan.
  97. I-H. Liu, C.-C. Chang, J.-S. Li, 2016, “Anomaly Detection on Cloud Application Based on Service Pattern Statistics”, ACENS 2017, Jan 19-21, Hokkaido, Japan.
  98. I-H. Liu, C.-G. Liu, K.-H. Liu , S.-H. Yu , Z.-Y. Su , J.-S. Li, 2016“Distributed Node Scheduling Algorithms for Multiple Group Communications in Wireless Multi-hop Networks”, Qshine 2016, July 7-8, SEOUL, South Korea.
  99. 張成睿 劉奕賢, 劉川綱, 李忠憲, 2016,“ 雲端資料加密環境下的多關鍵字搜尋技術探討”, TANET 2016, Oct. 19-21, Hualien, Taiwan.
  100. 安家駒 劉奕賢, 李儂偉, 李忠憲, 2016,“區塊鏈技術實現跨組織認證架構 ”, TANET 2016, Oct. 19-21, Hualien, Taiwan.
  101. C.-B. Jiang, I-H. Liu, Y.-C. Chen, C.-G. Liu, J.-S. Li, 2016, “Distributed Log System in Cloud Digital Forensics”, ICS 2016, Dec. 15-17, Chiayi, Taiwan.
  102. S.-C. Tsai, I-H. Liu, C.-T. Lu, B.-L. Chen, J.-S. Li, 2016, “Factor Impact of Virtual Switch Performance by Factorial Design in Cloud Computing”, ICS 2016, Dec. 15-17, Chiayi, Taiwan.
  103. S.-C. Tsai, I-H. Liu, C.-T. Lu, C.-H. Chang, J.-S. Li , 2016, “Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network”, IIHMSP 2016, Nov.20-23, Kaohsiung, Taiwan.
  104. 蔡金瑞, 劉奕賢, 陳信文, 邱志傑, 劉川綱, 李忠憲, 楊竹星, 2016,“網頁圖像隱私偵測系統”, TANET 2016, Oct. 19-21, Hualien, Taiwan.
  105. C.-G. Liu, T.-J. Fang, I-H. Liu, J.-S. Li, Y.C. Liang, 2016, “A Useful Data Structure for Adversarial VNet embeddings Attack in Cloud”, ICICE 2016, Nov. 05-10, Shaanxi, China.
  106. C.-G. Liu, Y.-M. Huo, I-H. Liu, Z.-Y. Su, H.-H. Liu, J.-S. Li, 2016, “A novel RFID Blocking scheme for staying tags in eoorprone wireless channel”, NCWIA 2016, July 15-16, Kaohsiung, Taiwan.
  107. 蔡一郎 劉奕賢, 陳佳秀, 李忠憲, 2016,“雲端系統虛擬帳號誘捕機制”, TANET 2016, Oct. 19-21, Hualien, Taiwan.
  108. C.-G. Liu, Y.-M. Huo, W.-L. Huang, I-H. Liu, J.-S. Li, 2016, “A new security design concept based on the Authentication protocol and anti-collision algorithm in RFID system”, ICEAI 2016, May. 10-12 , Osaka, Japan.
  109. C.-B. Jiang , J.-S. Li, 2016“Exploring Global IP-usage Patterns in Fast-Flux Service Networks”, ICICA 2016, Jan. 18-19, Brisbane, Australia.
  110. 劉奕賢,盧建同,張家駿,林長德,林禹妡,李忠憲, 2015, “雲端應用服務中使用者行為規範稽核機制”, TANET 2015, Oct. 21-23, Nantou, Taiwan.
  111. 劉奕賢,盧建同,林長德,張家駿,林禹妡,劉川綱,李忠憲, 2015, “混合雲環境的整合式日誌蒐集 ”, TANET 2015, Oct. 21-23, Nantou, Taiwan.
  112. 蔡舜智,劉奕賢,盧建同,李鋆洧,李忠憲, 2015, “跨層日誌收集、分析與追蹤 ”, NST 2015, Nov. 26-27, Taoyuan, Taiwan.
  113. 劉奕賢,盧建同,林長德,張家駿,林禹妡,劉川綱,李忠憲, 2015“混合雲日誌蒐集與分析系統”, NST 2015, Nov. 26-27, Taoyuan, Taiwan.
  114. I-H. Liu, C.-K. Lin, and J.-S. Li, 2015, “An enhancing video streaming scheme over hybrid VANET”, AROB 2015, Jan. 21-23, Beppu, Japan.
  115. I-H. Liu, T.-L. Wang, and J.-S. Li, 2014, “An Effective Group Communications in Hybrid VANET”, ICS 2014, Dec. 12-14, Taichung, Taiwan. (Best Poster Award)
  116. 周政緯, 劉恒華, 鍾曜年, 劉奕賢, 李忠憲, 2014, “以關聯式資料庫分析及預測惡意程式系統 ”, TANET 2014, Oct. 22-24, Kaohsiung, Taiwan.
  117. 劉奕賢, 張展華, 盧建同, 李忠憲, 2014, “雲端日誌驗證稽核系統 ”, TANET 2014, Oct. 22-24, Kaohsiung, Taiwan.
  118. 郭振忠, 歐雅惠, 劉奕賢, 王子夏, 郭鎮穎, 陳嘉玫, 李忠憲, 林輝堂, 楊竹星, 2014, “網路威脅搜捕、分析、追蹤與過濾技術之研究”, Cyberspace 2014, Dec. 5, Taipei, Taiwan.
  119. 郭振忠, 盧建同, 林敬皇, 李忠憲, 楊竹星, 2013, “基於測試平台之網路攻防演練活動設計與實作”, NCS 2013, Dec. 13-14, Taichung, Taiwan.
  120. 陳怡臻, 劉奕賢, 盧建同, 方泰鈞, 李忠憲, 2013, “雲端分散式日誌搜集方法”, NST 2013, Nov. 14-16, Tainan, Taiwan.
  121. 劉奕賢, 蔡舜智, 江啟賓, 張家瑋, 安家駒, 李忠憲, 2013, “結構化惡意程式資料庫系統 ”, TANET 2013, Oct. 23-25, Taichung, Taiwan.
  122. Chuan-Gang Liu, Chuan-Kang Kao, Huoc-Yong Koo, and Jung-Shian Li, 2013, “A Novel Group-based Location Service Management Scheme in VANETs”, ICICN 2013, Jan. 19-20, Singapore.
  123. 謝哲人,劉奕賢,黃證翰,方泰鈞,李忠憲, 2012, “校園網路動態目錄服務與Google Apps學術雲端服務整合之研究”, TANET 2012, Oct. 23-25, Taichung, Taiwan.
  124. 林敬皇, 盧建同, 李忠憲, 楊竹星, 2012, “網路攻擊與防禦平台之研究與實作”, CISC 2012, May 30-31, Tai-Chung, Taiwan.
  125. J.-S. Li, I-H. Liu, K.-H. Liu, and S.-H. Yu, 2012 , “Schedule Multi-player Online Game Transmission Services in Wireless Multi-hop Networks”, MASS 2012, Aug. 10-12, Shanghai, China.
  126. I. Kuo and J.-S. Li, 2011, “A mechanism for Taiwan's electronic voting”, National Computer Symposium 2011 (NCS 2011), Dec. 2-3, Chaiyi, Taiwan.
  127. I-H. Liu, Y.-T. Kuo and J.-S. Li, 2011, “Multi-hop Resource Scheduling in IEEE 802.16j Relay Networks”, International Conference on Computer Science and Logistics Engineering 2011 (ICCSLE 2011), Nov. 11-13, Zhengzhou, China.
  128. W.-C. Kuo, S.-C. Tsai, Y.-L. Chen, and J.-S. Li, 2011, “Single-Packet IP Traceback with Less Logging”, Intelligent Information Hiding and Multimedia Signal Processing 2011 (IIH-MSP 2011), Oct. 14-16, Dalian, China.
  129. C.-H. Lin, J.-Y. Ma, C.-S. Laih, and J.-S. Li, 2011, “MSS: Use File Format Conversion for Suppress Malicious Scripts in Multimedia”, TANET 2011, Oct. 24-26, Yilan, Taiwan (優秀論文獎).
  130. C.-B. Jiang, J.-S. Li, 2011, “IP Flow Data Correlation with Interference Rules”, IEEE International Conference on Electronics and Information Engineering 2011 (ICEIE 2011), Sep. 9-11, Tianjin, China.
  131. J.-S. Li, K.-H. Liu, C.-Y. Wang, and C.-H. Wu, 2011, “Traffic-oriented STDMA scheduling in Multi-hop Wireless Networks”, International Conference on Data Engineering and Internet Technology (DEIT 2011), Mar. 15-17, Bali, Indonesia.
  132. 盧建同, 高志忠, 鍾沛原, 賴溪松, 李忠憲, 2011, “應用網站應用程式弱點檢測平台於TANet連線單位網站安全之研究”, TANET 2011, Oct. 24-26, Yilan, Taiwan.
  133. 江啟賓, 李忠憲, 2010, “以語意網為方法強化殭屍網路之偵測”, TANET 2010, Oct. 27-29, Tainan, Taiwan.
  134. 劉奕賢, 謝哲人, 郭奕岑, 李忠憲, 2010, “JPEG圖形檔案特徵嵌入及在網路層偵測之數位鑑識方法”, TANET 2010, Oct. 27-29, Tainan, Taiwan.
  135. 郭奕岑, 劉奕賢, 李竹芬, 李忠憲, “雲端服務平台與計價模式之比較”, TANET 2010, Oct. 27-29, Tainan, Taiwan.
  136. 楊宗達, 高傳凱, 李忠憲, “基於導航路徑之連結控制排程”, TANET 2010, Oct. 27-29, Tainan, Taiwan.
  137. J.-S. Li and C.-F. Yang, 2010, “Quality-based Survivability in Dual-failure network”, International Conference on Transparent Optical Networks 2010 (ICTON 2010), Jun. 27 - Jul. 1, Munich, Germany.
  138. C.-J. Hsieh and J.-S. Li, 2010, “Implementation of the distributed hierarchical security operation center using mobile agent group”, IEEE International Symposium on Computer Communication Control and Automation 2010 (IEEE 3CA 2010), May 5-7, Tainan, Taiwan.
  139. J.-S. Li, C.-K. Kao, and S.-J. Lin, 2010, “A Kerberos-based Single Sign-On System for VoIP SIP Servers and Clients with a Terminal Mobility Capability”, IEEE International Symposium on Computer Communication Control and Automation 2010 (IEEE 3CA 2010), May 5-7, Tainan, Taiwan.
  140. J.-S. Li and Ching-Fang Yang, 2009, “Quantum Communication in Distributed Wireless Sensor Networks”, IEEE International Workshop on Wireless and Sensor Networks Security 2009 (WSNS '09), Oct. 12, Macau, China.
  141. J.-S. Li, J.-J. Tzeng, C.-M. Kuo, 2009, “Building Security Gateway”, International Conference on Information Networking 2009 (ICOIN 2009), Jan. 21-24, Chiang Mai, Thailand.
  142. C.-S. Laih, J.-S. Li, M.-J. Lin, S.-H. Chang, L.-D. Chen, S.-H. Tseng and M. Chang, 2008, “Development and Operation of Testbed@TWISC”, Joint Workshop on Information Security 2008 (JWIS 2008), Jul. 10-11, Seoul, Korea.
  143. J.-S. Li, 2008, “Testbed@TWISC”, Taiwan-Germany Information Technology Workshop 2008, Nov. 24-25, Kaohsiung, Taiwan.
  144. 林秀靜, 李忠憲, 2008, “移動認證在SIP-based環境上的研究與實作”, 數位生活科技研討會 2008, Jun. 5-6, Tainan, Taiwan.
  145. 曾昭展, 李忠憲, 2008, “SIP-based VoIP 下 Building Security Gateway 的研究與實作”, 數位生活科技研討會 2008, Jun. 5-6, Tainan, Taiwan.
  146. 曾昭展, 李忠憲, 2008, “具備安全通話與監聽的Building Security Gateway實作”, TANET 2008, Oct. 20-22, Kaohsiung, Taiwan.
  147. J.-S. Li, C.-K. Kao and I-H. Chen, 2007, “Effects of Hotspots on Throughput in Mobile Ad Hoc Networks”, The IASTED International Conference on Parallel and Distributed Computing and Networks 2007 (PDCN 2007), Feb. 13-15, Innsbrucke, Austria.
  148. C.-J. Hsieh, J.-S. Li and C.-F. Hung, 2007, “A Robust Audio Fingerprinting Scheme for MP3 Copyright”, IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2007 (IEEE IIHMSP 2007), Nov. 26-28, Kaohsiung, Taiwan.
  149. J.-S. Li, H.-C. Kao and S.-Y. Cheng, 2007, “Multi-hop Networking with Space Reuse in IEEE 802.15.3 UWB WPANs”, International conference on Wireless Broadband and Ultra Wideband Communication 2007 (AusWireless 2007), Aug. 27-30, Sydney, Australia.
  150. C.-J. Hsieh, W.-C. Liu and J.-S. Li, 2007, “An Efficient Packet-level JPEG Forensic Data Collection”, in Future Generation Communication and Networking 2007 (FGCN 2007), Dec. 6-8, Jeju-Island, Korea.
  151. 柯鈞達, 李忠憲, 2007, “一個基於Voronoi diagram的新型無線偵測網路中繼點機制”, TANET 2007, Oct. 22-25, Taipei, Taiwan.
  152. 林秀靜, 李忠憲, 2007, “終端移動性與安全機制在SIP-Based環境下的研究與實作”, National Symposium on Telecommunications 2007 (NST 2007), Nov. 23-24, Taipei, Taiwan.
  153. J.-S. Li and C.-F. Yang, 2007, “The design of a Quantum Benes Switch”, IEEE Conference on Electron Devices and Solid-State Circuits (EDSSC 2007), Dec. 20-22, Tainan, Taiwan.
  154. J.-S. Li and C.-K. Kao, 2006, “Routing in Fast-Moving Mobile Ad Hoc Networks”, International Conference on Wireless Networks (ICWN 2006), Jun. 26-29, Las Vegas, USA.
  155. 林宣燁, 李忠憲, 2006, “以行動代理人為基礎之多Host-Based IDSs之入侵偵測平台”, TANET 2006, Nov. 1-3, Hualien, Taiwan.
  156. 洪丞甫, 謝哲人, 李忠憲, 劉奕賢, 2006, “分散式數位版權管理網路系統”, TANET 2006, Nov. 1-3, Hualien, Taiwan.
  157. 李忠憲, 高宏政, 黃欽揚, 2006, “在極寬頻無線個人網路中多個微網路傳輸集中式排程設計”, National Symposium on Telecommunications 2006 (NST 2006), Dec. 1-2, Kaohsiung, Taiwan.
  158. 陳泰維, 李忠憲, 2006, “以賽局理論分析以MA-IDS為主的網路攻擊與防禦”, Information Management Practice 2006 (IMP 2006), Dec. 9, Yunlin, Taiwan.
  159. 郭嘉明, 李忠憲, 2006,“行動會議系統上可適性安全機制的研究與實作”, National Symposium on Telecommunications 2006 (NST 2006), Dec. 1-2, Kaohsiung, Taiwan.
  160. 陳保霖, 高傳凱, 李忠憲, 2006, “無線網路媒體存取公平之研究”, National Symposium on Telecommunications 2006 (NST 2006), Dec. 1-2, Kaohsiung, Taiwan.
  161. 柯鈞達, 李忠憲, 2006, “一個基於Voronoi Diagram的新型無線偵測網路中繼點機制”, National Symposium on Telecommunications 2006 (NST 2006), Dec. 1-2, Kaohsiung, Taiwan.
  162. Y.-S. Su, S.-L. Su, and J.-S. Li, 2005, “Topology-Transparent Link Activation Scheduling Schemes for Multihop CDMA Packet Radio Networks”, in Proceedings of IEEE Conference on Local Computer Networks 2005 (LCN 2005), Nov. 15-17, Sydney, Australia.
  163. J.-S. Li and C.-F. Xie, 2005, “Reduce Self-Coupling Effects in Wireless Ad Hoc Networks”, in Proceedings of IEEE International Conference on Wireless Networks, Communications, and Mobile Computing (WirelessCom 2005), Jun. 13-16, Hawaii, USA.
  164. 劉昆玹, 陳明陽, 李忠憲, 鄭博仁, 2005, “RFID系統雙邊認證協定-兼具防偽及隱私保護之功能”, TANET 2005, Oct. 26-28, Tai-Chung, Taiwan.
  165. C.-H. Chao and J.-S. Li, 2004, “A Novel Bib-Based Parallel Download Scheme”, IEEE Asia-Pacific Conference on Circuits and Systems 2004, Dec. 6-9, Tainan, Taiwan.
  166. C.-G. Liu and J.-S. Li, 2004, “Improving RPR Fairness Convergence”, in Proceedings of IEEE Asia-Pacific Conference on Circuits and Systems 2004, Dec. 6-9, Tainan, Taiwan.
  167. J.-S. Li, 2004, “Development of CC in Taiwan”, International Common Criteria Conference 2004 (ICCC 2004), Sep. 28-30, Berlin, Germany (Invited Talk).
  168. J.-S. Li, 2004, “Taiwan Network Security Testbed”, ITC- Asia 2004, Nov. 20-22, Kuala-Lumpur, Malaysia (Invited Talk).
  169. Y.-S. Su, S.-L. Su, and J.-S. Li, 2004, “Topology-Transparent Link Activation Scheduling Schemes for Multihop CDMA Ad Hoc Networks”, IEEE Global Telecommunications Conference 2004 (Globecom 2004), Nov. 29 - Dec. 3, Dallas, USA.
  170. Y.-S. Su, S.-L. Su, and J.-S. Li, 2003, “Receiver-Initiated Multiple Access Protocols for Spread Spectrum Mobile Ad Hoc Networks”, IEEE Semiannual Vehicular Technology Conference 2003 (VTC 2003-Spring), Apr. 22-25, Jeju, Korea.
  171. J.-S. Li and M.-S. Leu, 2002, “Fair Bandwidth Share Using Flow Number Estimation”, IEEE International Conference on Communications 2002 (ICC 2002), Apr. 28 - May 2, New York City, USA.
  172. J.-S. Li, Yi-Tin Lin, and Ching-Fang Yang, 2002, “Core-stateless Fair Rate Estimation Fair Queuing”, IEEE Military Communications Conference 2002 (Milcom 2002), Oct. 7-10, Anaheim, California, USA.
  173. J.-S. Li and C.-P. Lo, 2002, “Core-Stateless Labeling Fairness: An Integrated Architecture to Approximate Fair Bandwidth Allocations in High Speed Networks”, IEEE Conference on Local Computer Networks 2002 (LCN 2002), Nov. 6-8, Tampa, Florida, USA.
  174. J.-S. Li and C.-G. Liu, 2001, “Detecting Link Bandwidth With One-Packet Technique”, Workshop on the 21st Century Digital Life and Internet Technologies, May 18, Tainan, Taiwan.
  175. 林奕廷, 劉川綱, 黃志欽, 李忠憲, 黃悅民, 賴溪松, 2001, “網路量測報告系統”, TANET 2001, Oct. 24-26, Chiayi, Taiwan.
  176. J.-S. Li and Y.-T. Lin, 2001, “The Effects of LRD on Video Traffic Smoothing Schemes”, International Symposium on Communications 2001 (ISCOM 2001), Nov. 13-16, Tainan, Taiwan.
  177. J.-S. Li and H.-C. Lai, 2001, “Providing Proportional Differentiated Services Using PLQ”, IEEE Global Telecommunications Conference 2001 (Globecom 2001), Nov. 25-29, San Antonio, Texas, USA.
  178. J.-S. Li and H.-C. Lai, 2000, “Finding the Fitting Parameters for M-Pareto Process in LRD Traffic Modeling”, Workshop on Internet and Distributed Systems 2000 (WIND 2000), May 11-12, Tainan, Taiwan.
  179. J.-S. Li and Y.-T. Lin, 2000, “Modeling the VBR Traffic With Piecewise Gaussian Processes”, Workshop on Internet and Distributed Systems 2000 (WIND 2000), May 11-12, Tainan, Taiwan.
  180. J.-S. Li and C.-W. Ma, 2000, “A New Split-Connection Scheme for Wireless TCP”, Workshop on Internet and Distributed Systems 2000 (WIND 2000), May 11-12, Tainan, Taiwan.
  181. J.-S. Li, 2000, “Modeling VBR Traffic with Autoregressive Gaussian Processes”, in Proceedings of IEEE International Conference on Networks 2000 (ICON 2000), Sep. 8, Singapore.
  182. C.-W. Ma and J.-S. Li, 2000, “IP Masquerade: One Solution to Insufficient IP Addresses”, TANET 2000, Oct. 19-21, Tainan, Taiwan.
  183. 賴溪松, 黃悅民, 李忠憲, 劉相君, 黃志欽, 林華乙, 王敏僑, 黃仁竑, 楊竹星, 2000, “全域、主動、預警、服務導向的 Web Based 網路管理”, TANET 2000, Oct. 19-21, Tainan, Taiwan.
  184. J.-S. Li, A. Wolisz and R. Popescu-Zeletin, 1998, “QoS Guarantees for Long-Range Dependent Traffic”, IEEE International Performance Computing, and Communications Conference 1998 (IPCCC 98), Feb. 16-18, Tempe/Phoenix, Arizona, USA.
  185. J.-S. Li, A. Wolisz and R. Popescu-Zeletin, 1998, “Modeling and Simulation of Fractional ARIMA Processes Based on Importance Sampling”, ACM Symposium on Applied Computing 1998 (SAC 98), Feb. 27 - Mar. 1, Atlanta, USA.
  186. J.-S. Li, A. Wolisz and R. Popescu-Zeletin, 1998, “Fast Simulation of Self-Similar Traffic”, in Proceedings of IEEE International Conference on Communications 1998 (ICC 98), Jun. 11, Atlanta, USA.
  187. J.-S. Li, A. Wolisz and R. Popescu-Zeletin, 1998, “Proposed In-Service Monitoring Scheme for QoS Guarantees and Admission Control Based on Self-Similar Traffic”, IEEE Singapore International Conference on Networks 1998 (SICON 98), Jun. 30 - Jul. 3, Singapore.
Patent
more
less
  1. 李忠憲 / J.-S. Li, 劉奕賢 / I-H. LIU, 劉川綱 / C.-G. LIU, 彭彥筑 / Y.-Z. PENG, 吳柏毅 / B.-Y. WU, 2023, "深度學習訓練集資料之汙染清除系統及其方法"  (中華民國,發明,證書號碼I802824)
  2. 李忠憲, 劉奕賢, 謝承恩, 林惟敏, 2023, "網路惡意流量分析之平衡式資料集生成與處理系統及其方法" 中華民國專利,發明專利證書(I795153)
  3. J.-S. Li, I-H. Liu, C.-K. Liu, P.-Y. Wu, Y.-C. Peng, 2022, “Deepfake Video Detection System and Method” (United States Patent, US 11,514,715 B2)
  4. 李忠憲, 劉奕賢, 劉川綱, 吳謹瑞, 賴佳俊, 吳其哲, 2022, “網路通訊方法及網路通訊系統中華民國”中華民國專利,發明專利證書(I784280)
  5. J.-S. Li, I-H. Liu, K.-H. Chang, K.-C. Lu, 2022, “Wireless Network-Based Voice Communication Security Protection Method” (United States Patent, US 11,388,134 B2)
  6. 李忠憲, 劉奕賢, 劉川綱, 賴佳俊, 吳謹瑞, 吳其哲, “具模擬設備通訊特徵的傳輸系統及方法”,中華民國專利, 發明專利證書(I771068)
  7. 李忠憲, 劉奕賢, 劉川綱, 吳柏毅, 彭彥筑, “深度偽造影片檢測系統及其方法”, 中華民國專利, 發明專利證書(I744057)
  8. 李忠憲, 劉奕賢, 孫孟瑋, 陸冠竹, “具有高互動組合工控誘捕系統及其方法”, 中華民國專利, 發明專利證書(I703467)
  9. 李忠憲, 劉奕賢, 張耿豪, 陸冠竹, “基於無線網路的語音通訊安全防護方法”, 中華民國專利, 發明專利證書(I696362)
  10. 李忠憲, 劉奕賢, 陳佳秀, 蔡金瑞, “雲端環境下針對圖像檔案的授權及搜尋方法”, 中華民國專利, 發明專利證書(I665580)
  11. 李忠憲, 劉奕賢, 陳佳秀, 蔡金瑞, “防止密碼檔案外洩偵測方法及系統”, 中華民國專利, 發明專利證書(I656454)
  12. 李忠憲, 劉奕賢, 李詔遠, 林禹妡, 蔡金瑞, “具加密檔案關鍵字模糊搜尋功能的雲端伺服器系統”, 中華民國專利, 發明專利證書(I638271)
  13. 李忠憲 , 劉奕賢, 謝哲人, 高傳凱, 郭奕岑, “網路相簿的運作方法”, 中華民國專利, 發明專利證書(I573452)
  14. 李忠憲, 劉奕賢, 盧建同, 張家瑋, 王天利, 林駿凱, “多重傳輸通道的重疊網路串流方法及其系統”, 中華民國專利, 發明專利證書(I528843)
  15. 李忠憲 , 劉奕賢, 盧建同, 張家瑋, 楊竹星, 蔡邦維, “分散式多重傳輸協定之跨層日誌搜集系統與方法(DISTRIBUTED MULTIPLE PROTOCOL CROSS-LAYER LOG COLLECTION SYSTEM AND METHOD)”, 中華民國發明專利證書(I514174)
  16. 李忠憲, 劉奕賢, 謝哲人, 高傳凱, 郭奕岑, “特徵嵌入方法(SIGNATURE EMBEDDING METHOD)”, 中華民國發明專利證書(I501633)
  17. 李忠憲, 劉奕賢, 盧建同, 張家瑋, “基於跨層日誌記錄的資料軌跡追蹤系統與方法 (BASE ON CROSS-LAYER LOG DATA TRACE SYSTEM AND METHOD)”, 中華民國發明專利證書(I484331)
  18. 李忠憲, 林敬皇, 劉奕賢, 馬健原, 陳柏霖, 安家駒, “惡意程式破壞系統及其破壞方法 (MALICIOUS SCRIPTS SUPPRESSION SYSTEM AND SUPPRESSION METHOD THEREOF)”, 中華民國發明專利證書(I461955)
  19. 李忠憲, 劉奕賢, 謝哲人, 高傳凱, “車用隨意網路系統 (VANET SYSTEM)”, 中華民國發明專利證書(I454164)
  20. 李忠憲, 劉奕賢, 謝哲人, 高傳凱, “車用隨意網路系統(VANET SYSTEM)” 中華民國發明專利證書(I419596)
  21. 李忠憲, 謝哲人, 翁吉田, “影像數位標籤嵌入方法、即時鑑識方法及其鑑識系統” 中華民國發明專利證書(I423068)
  22. 李忠憲, 謝哲人, 曾昭展, “語音閘道架構及其通訊方法”, 中華民國發明專利證書(I408923)
  23. 李忠憲, 謝哲人, 洪丞甫, 趙志宏, “具有數位修正的多媒體版權管理機制 (Digital Right Management with Fingerprint Correction)”, 中華民國發明專利(I354451)
Others
more
less
  1. 網路安全實務, 九十五年度教育部『通訊教改計畫優良教材選拔』推薦
  2. 網路安全測試平台, 九十九年度教育部『網通計畫優良教材選拔』優等獎
  3. J .-S. Li, 1998, “Traffic Characterization, Modelling and Performance Analysis of ATM Networks”, Technical University Berlin, Germany.
  4. J.-S. Li, 1999, “LAN Testing and Troubleshooting: G. Held”, Book review, Computer Communications,Vol. 22, No. 15-16, pp.1526.
  5. J.-S. Li, 1999, “Mobile Agents and Security: G. Vigna”, Book review, Computer Communications, Vol. 22, No. 15-16, pp.1526-1527.
  6. 林奕廷, 劉川綱, 李忠憲, 2004, “資安產品共同準則與安全目標之探討”, Communications of the CCISA, Vol. 10, pp. 64-87.
  7. 趙志宏, 李忠憲, 2004, “共同準則安全保證需求之簡介”, Communications of the CCISA, Vol. 10, pp. 88-98.
  8. M. S. Obaidat, P. Nicopolitidis, and J.-S. Li, 2008, “Guest Editorial: Medium Access Control Protocols for Wireless LANs”, IEEE Wireless Communications Magazine, Vol. 15, No. 1, pp. 20-21.
  9. M. S. Obaidat, P. Nicopolitidis, and J.-S. Li, 2009, “Guest Editorial: Security in Wireless Sensor Networks”, Security and Communication Networks, Vol. 2, No. 2, pp. 101-103, Wiley.
  10. The 2024 International Conference on Artificial Life and Robotics (ICAROB 2024), International Program Committee
  11. ICAROB 2023 Program Committee
  12. ICAROB 2022 Program Committee
  13. IJSS 2021Program Committee
  14. ICAROB 2021 Program Committee
  15. ICAROB 2020 Program Committee
  16. TANET 2020 前瞻資安研發、個人資料安全保護管理主題主編
  17. TANET 2019 Program Committee
  18. TWISC總中心 2019 Program Committee
  19. IMCS 2019 Program Committee
  20. ICAROB 2019 Program Committee
  21. CISC 2019 Program Committee
  22. ICSMETA 2019 Program Committee
  23. ICEEE 2018 Program Committee
  24. IRICT 2018 Program Committee
  25. ITAOI 2018 Program Committee
  26. ICCCS 2018 Program Committee
  27. e-Case 2018 Program Committee
  28. TANET 2017 Program Committee
  29. ICEECS 2017 Program Committee
  30. CISC 2012 Program Committee
  31. SADFE 2012 Program Committee
  32. SGSC 2012 Program Committee
  33. AINA-2012 Track co-chair
  34. VTC 2011 Program Committee
  35. IEEE/SADFE 2011 Program Committee
  36. F2GC 2011 International Advisory Board board
  37. SGSC 2011 Program Committee
  38. 數位生活科技研討會 2010 Program Committee
  39. ICS 2010 Workshop Chair
  40. VTC 2010 Program Committee
  41. ICC 2010 Program Committee
Projects
  1. 李忠憲, 資料驅動智慧應用技術產學聯盟(2/3), 113年度
  2. 李忠憲, 水資源關鍵基礎設施工控系統資安試驗平台及區塊鏈日誌功能擴充, 113/3/13~113/12/15, 經濟部水利署
  3. 李忠憲, 113年全國教育部電子證書及場域建置計畫, 113/1/1~113/12/3, 教育部
  4. 李忠憲, 立方實驗衛星地面場域使用服務, 112/11/15日~112/12/31, 財團法人電信技術中心
  5. 李忠憲, 區塊鏈應用於水資源關鍵基礎設施之分散式資料儲存驗證機制, 112/5/13~112/12/15, 經濟部水利署
  6. 李忠憲, 時間敏感網路與5G專網整合下確保服務品質及安全性之研究,111/8/1~112/7/31,國家科學及技術委員會
  7. 李忠憲, 水資源關鍵基礎設施資安防護(2/2),111/5/1~112/4/30,國家科學及技術委員會
  8. 李忠憲, 水資源關鍵基礎設施資通安全防護服務, 111/04/01-112/01/31, 松之安資訊科技有限公司
  9. 李忠憲, 111年度度經濟部關鍵基礎設施資安聯防服務專案,111/3/1~112/2/28,安華聯網
  10. 李忠憲, 水資源關鍵基礎設施資安防護(1/2),110/05/01~111/04/30,科技部
  11. 李忠憲, 110年度經濟部關鍵基礎設施資安聯防服務專案,110/03/01~111/02/28,安華聯網
  12. 李忠憲, 水資源關鍵基礎設施資通安全防護服務, 110/03/01-111/01/31, 松之安資訊科技有限公司
  13. 李忠憲, 泓格智慧工廠資安水準第三方驗證服務, 110/02/01-110/07/31, 泓格科技股份有限公司
  14. 李忠憲, 無線感測網路下以認證資訊交換機制抵禦感測節點攻擊之研究, 108/8/1-109/7/31, 科技部
  15. 李忠憲, 以雲端平台為基礎之智慧型安全分析與管理系統--總計畫暨子計畫一:以Hadoop雲端平台為基礎之智慧型安全分析與管理系統, 108/8/1-109/7/31,科技部
  16. 李忠憲, 在下世代無線行動網路中使用鄰近計算與通訊方式之SoLoMo群體導覽服務平台--子計畫二:多層式個人隱私保護針對群組內部與外部攻擊, 108/8/1-109/7/31, 科技部
  17. 李忠憲, 在下世代無線行動網路中使用鄰近計算與通訊方式之SoLoMo群體導覽服務平台--總計畫及子計畫一:在4G與Wi Fi融合式無線行動網路使用物聯網社群和行動社群網路技術之鄰近式興趣點資訊分享機制, 108/8/1-109/7/31,科技部
  18. 李忠憲, 資安特色中心暨聯盟--資安特色中心暨聯盟(1/3), 108/6/1-109/10/31,科技部
  19. 李忠憲, 資安監控與管理技術開發-資安監控與管理技術開發(3/3), 108/6/1-109/5/31, 科技部
  20. 李忠憲, 關鍵基礎設施資安防護-以水資源為重點, 109/06/01-110/05/31, 科技部
  21. 李忠憲, 混合式工業控制密罐設計與雛型建置, 109/04/01-110/03/31, 台達電子工業股份有限公司
  22. 李忠憲,運用人工智慧技術進行惡意樣本分類與攻擊追蹤之研究, 108/8/1-111/7/31,科技部
  23. 李忠憲,資安特色中心暨聯盟--資安特色中心暨聯盟(3/3), 108/6/1-109/5/31,科技部
  24. 李忠憲,108年度水資源、能源關鍵設施安全管理計畫, 108/4/1-109/1/31,建教合作計畫
  25. 李忠憲,108年度經濟部能源領域、水領域關鍵基礎設施資安防護政策與基準工作, 108/4/1-109/1/31,建教合作計畫
  26. 李忠憲, 智慧感知與雲端服務產學技術聯盟(II)(1/3), 108/2/1-109/1/31,科技部
  27. 李忠憲,智慧感知與雲端服務產學技術聯盟(II)(3/3), 108/2/1-109/1/31,科技部
  28. 李忠憲,桃竹苗縣市政府壓力測試及資安強化建議服務, 107/10/15-108/1/31,安碁資訊股份有限公司
  29. 李忠憲,臺北市政府資訊局-弱點掃描服務, 107/9/1-108/2/28,安碁資訊股份有限公司
  30. 李忠憲,個資法與大數據計畫:社會需求、公共利益與個人資料保護(1/3), 107/8/1-108/7/31,科技部
  31. 李忠憲,抵抗外部與內部攻擊的隱私保護機制, 107/8/1-108/7/31,科技部
  32. 李忠憲, 107年度水資源關鍵設施升級及安全管理確保旗艦計畫之水資源領域關鍵基礎設施資安防護政策與基準規劃工作, 107/6/28-108/1/31,安華聯網科技股份有限公司
  33. 李忠憲, 資安特色中心暨聯盟--資安特色中心暨聯盟(2/3), 107/6/1-108/10/31,科技部
  34. 李忠憲, 資安監控與管理技術開發-資安監控與管理技術開發(2/3), 107/6/1-108/5/31, 科技部
  35. 李忠憲, 資安監控與管理技術開發-資安監控與管理技術開發(2/3), 107/6/1-108/5/31,科技部
  36. 李忠憲, 107年度強化民營能源關鍵資訊基礎設施資安防護計畫, 107/4/13-08/1/31,安華聯網科技股份有限公司
  37. 李忠憲, 智慧感知與雲端服務產學聯盟(3/3), 107/2/1-108/1/31, 科技部
  38. 李忠憲,智慧感知與雲端服務產學技術聯盟(II)(2/3), 107/2/1-108/1/31,科技部
  39. 李忠憲, 個資法與大數據計畫:社會需求、公共利益與個人資料保護(3/3),科技部
  40. 李忠憲, 個資法與大數據計畫:社會需求、公共利益與個人資料保護(2/3), 106/8/1-107/7/31,科技部
  41. 李忠憲, 資安監控與管理技術開發-資安監控與管理技術開發(1/3), 106/6/1-107/5/31, 科技部
  42. 李忠憲, 行動寬頻尖端技術跨校教學聯盟-行動寬頻網路與應用-小細胞基站聯盟中心第二期計畫, 105/4/1-106/1/31, 教育部
  43. 李忠憲, 教育單位網站資安防護服務計畫(3/3), 105/1/1-105/12/31, 教育部
  44. 李忠憲, 教育單位網站資安防護服務計畫(2/3), 104/1/1-104/12/31, 教育部
  45. 李忠憲, 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (3/3), 103/9/1-104/8/31, 經濟部
  46. 李忠憲, 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端系統中分散式日誌蒐集、錯誤偵測、稽核及預警系統 MOST 103-2221-E-006 -146 -MY3, 103/8/1-106/7/31, 科技部
  47. 李忠憲, 教育單位網站資安防護服務計畫(1/3), 103/1/1-103/12/31, 教育部
  48. 李忠憲, 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (2/3), 102/9/1-103/8/31, 經濟部
  49. 李忠憲, 中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (1/3), 101/9/1-102/8/31, 經濟部
  50. 李忠憲, 車用行動生活之協力式多媒體串流服務平台--子計畫二:車輛隨意網路下具效率與安全之群組重疊網路設計(2/2) NSC 101-2219-E-006-003-, 101/5/1-102/4/30, 國科會
  51. 李忠憲, 教育單位網站弱點檢測與防洩漏個資資安服務計畫, 101/1/1-101/12/31, 教育部
  52. 李忠憲, 車用行動生活之協力式多媒體串流服務平台--子計畫二:車輛隨意網路下具效率與安全之群組重疊網路設計(1/2) NSC 100-2219-E-006-004-, 100/5/1-101/4/30, 國科會
  53. 李忠憲, 網路威脅搜捕、態樣分析、追蹤與過濾技術研究--子計畫二:殭屍網路型態樣式分析、分類與風險評估之應用研究 NSC 100-2218-E-006-029-MY3, 100/8/1-103/7/31, 國科會
  54. 李忠憲, 地方政府資通安全服務, 99/7/23-100/4/15, 財團法人資訊工業策進會
  55. 李忠憲, 網路系統弱點掃描與修補顧問服務, 98/8/1-100/1/31, 精誠股份有限公司
  56. 李忠憲, 企業e幫手計畫-商工登記資訊加值服務開發建置計畫, 99/5/1-100/1/31, 宏碁股份有限公司
  57. 李忠憲, 國營會資安資訊分享與分析中心服務能量建置與功能擴充, 98/9/1-99/1/31, 宏碁股份有限公司
  58. 李忠憲, 用 動生活之 載資通訊服務平台-子計畫二:在 輛隨意網 環境下,可靠、智慧及安全的包裹層協定設計(2/2) NSC 99-2219-E-006 -010 -, 99/8/1-100/7/31, 國科會
  59. 李忠憲, 乙太被動光纖網 之 位鑑 與資安保證的應用研究-子計畫一:在EPON網 封包層中進 位標籤的嵌入與偵測之圖片檔案 位鑑 方法之研究NSC 99-2221-E-006 -248 -, 99/8/1-100/7/31, 國科會
  60. 李忠憲, 內網安全管理平台測試與驗證, 99/7/1-99/12/31, 經濟部
  61. 李忠憲, 網路安全測試平台(Testbed@TWISC)之建置、推廣與應用(Ⅱ) NSC 99-2219-E-006-011-, 99/1/1-99/12/31, 國科會
  62. 李忠憲, 網路安全測試平台(Testbed@TWISC)之建置、推廣與應用 NSC 98-2219-E-006-001-, 98/1/1-99/1/31, 國科會
  63. 李忠憲, 乙太被動光纖網 之 位鑑 與資安保證的應用研究-子計畫一:在EPON 網 封包層中進 位標籤的嵌入與偵測之圖片檔案 位鑑 方法之研究NSC 98-2218-E-006 -251, 98/10/1-99/7/31, 國科會
  64. 李忠憲, 乙太被動光纖網路之數位鑑識與資安保證的應用研究--總計畫NSC 98-2218-E-194-005-, 98/10/1-99/7/31, 國科會
  65. 李忠憲, 用動生活之載資通訊服務平台-子計畫二:在 輛隨意網 環境下可靠、智慧及安全的包裹層協定設計(1/2) NSC 98-2219-E-006 -010, 98/8/1-99/7/31, 國科會
  66. 李忠憲, 網路層JPEG圖片數位證據收集架構97-2221-E-006-092, 97/8/1-98/7/31, 國科會
  67. 李忠憲, 極寬頻無線通訊網路之研發-子計畫六: UWB多微網路間的存取控制與安全性之研究與實現(3/3), 96/8/1-97/7/31, 國科會
  68. 李忠憲, 資通安全人才培育計畫-子計畫三:資通安全人才培育-國 成功大學資通安全研究與教學中心, 96/4/29-97/3/31, 國科會
  69. 李忠憲, 航程資料系統核算現金補貼網路通訊安全閘道系統之研究, 95/12/29-96/3/31, 農委會, 95農科-14.3.1-漁 F7
  70. 李忠憲, 極寬頻無線通訊網路之研發-子計畫六:DS-UWB多微網路間的存取控制與安全性之研究與實現(2/3), 95/8/1-96/7/31, 國科會
  71. 李忠憲, 通訊科技教育人才培育計畫-網路安全與相關標準, 95/1/1-95/12/31, 教育部
  72. 李忠憲, 地方政府資通安全之教育訓練與觀摩 , 95/2/1-95/5/31, 業界(微軟)
  73. 李忠憲, 共同準則評估報告樣版產生系統, 94/11/1-95/10/31, 電信技術中心
  74. 李忠憲, RFID 先導性實驗計畫, 94/9/1-94/12/31, 教育部
  75. 李忠憲, 使用直接序列(DS)展頻技術之極寬頻無線通訊網路之研發-子計畫六:DS-UWB多微網路間的存取控制與安全性之研究與實現(1/3), 94/8/1-95/7/31, 國科會
  76. 李忠憲, 中華電信安全通系統安全評估, 94/5/1-94/12/31, 中華電信
  77. 李忠憲, 通訊科技教育改進計畫-進階網路安全實務, 94/1/1-94/12/31, 教育部
  78. 李忠憲, 以核心無狀態公平佇列架構實現IP QoS(III) NSC93-2213-E-006-095, 93/8/1-94/7/31, 國科會
  79. 李忠憲, Ultra Wideband 學研案, 94/1/1-94/12/31, 工研院
  80. 李忠憲, 政府資通安全現況調查, 93/12/1-94/6/30, 業界(微軟)
  81. 李忠憲, Implementing an Intrusion Detection Prevention Devise, 93/7/6-94/6/30, 業界(亞太網匯)
  82. 李忠憲, 建立資通安全檢測實驗室, 93/5/3-93/12/10, 資策會
  83. 李忠憲, 在類別差異路由器上提供個別資料流成比例之品質保證服務, NSC93-2815-C-006 -014 -E, 93/7/1-94/2/28, 國科會
  84. 李忠憲, 通訊科技教育改進計畫-網路安全實務, 93/1/1-93/12/31, 教育部
  85. 李忠憲, 全球學術研究網路亞太中樞計畫-測試計劃, 93/1/1-93/9/30, 國家高速網路與計算中心
  86. 李忠憲, 以核心無狀態公平佇列架構實現IP QoS(II) NSC92-2213-E-006-065, 92/8/1-93/7/31, 國科會
  87. 李忠憲, 國家寬頻實驗網路網路安全建置與實驗計畫-總計畫 NSC92-2219-E-006-001, 92/5/1-93/4/30, 國科會
  88. 李忠憲, 全球學術研究網路-網路安全、不當資訊防制及商業機制規劃服務, 91/9/1-91/10/31, 國家高速網路與計算中心
  89. 李忠憲, 以核心無狀態公平佇列架構實現IP QoS(I) NSC91-2213-E-006-080, 91/8/1-92/7/31, 國科會
  90. 李忠憲, 終端群播系統NSC90-2815-C-006-054-E, 90/7/1-91/2/28, 國科會
  91. 李忠憲, 自我形似變動速率視訊平緩化之研究NSC90-2213-E-006-106, 90/8/1-91/7/31, 國科會
  92. 李忠憲, 國家實驗網路應用環境前置規劃計畫- 國家實驗網路之整合性網路管理系統NSC90-2219-E-008-005, 90/8/1-91/7/31, 國科會
  93. 李忠憲, 網際網路主動式佇列管理與壅塞控制NSC 89-2213-E-006-195, 89/8/1-90/7/31, 國科會
  94. 李忠憲, 非同步傳輸模式簡易測試器NSC 89-2213-E-006-068, 88/8/1-89/7/31, 國科會
  95. 李忠憲, 成功大學等GigaPOP維運計畫NSC 89-2219-E-006-013, 88/8/1-89/7/31, 國科會
Students
Current Academic Year Lab Members
Ph.D.
安家駒
蔡一郎
陸冠竹
陳信文
Master
陳柏瑋
黃筱晴
彭子恩
張允豪
吳穎誠
陳冠霖
陳侯華
湯秉翰
周姵彣
陳乃宇
謝宇哲
何承穎
邱德昌
廖栢賢
曾謙文
王威融
Graduates of all Previous Years
Ph.D.
96
蘇益生
97
劉川綱
99
趙志宏   高宏政
100
謝哲人   楊清方
101
高傳凱   劉昆玹
102
林敬皇
104
劉奕賢   盧建同   胡育銘
105
江啟賓
106
蔡舜智
108
陳彥仁
Master
90
林奕廷   呂明憲   賴行健   馬崇文
91
郭明旺   羅正邦   楊清方
92
梁景智   毛慶生   蘇永順   李政達
93
許家銘   黃丞宇   劉天河   謝承峰
94
丁聖哲   陳以軒   高傳凱
95
劉昆玹   黃欽揚   鄭森友   林宣燁
96
洪丞甫   陳泰維   郭嘉明   陳炳誠   陳保霖   柯鈞達   楊崇義 (產業碩專)   林佳鴻 (產業碩專)   曲成權 (產業碩專)
97
王俊彥   劉威成   林舞寒 (產業碩專)   張知穎 (產業碩專)   謝仲益   郭建邦 (產業碩專)
98
林秀靜   曾昭展   林柏廷   翁吉田   陳建宏   曾昭銘   蔡嘉陽   高志忠 (產業碩專)   馬健原 (產業碩專)
99
王昱凱   柳智文   吳建宏   丘火熒
100
郭奕岑   楊宗達   游順雄
101
林駿凱   王天利   陳映先   張持綸   陳柏蒼(產業碩專)
102
陳柏霖   蔡承勳   張央忠   張家瑋   安家駒
103
陳怡臻   鍾曜年   姚文盛
104
方泰鈞   李鋆洧   周政緯   黃為立   劉恆華   張展華
105
李詔遠   林長德   林禹妡   張家駿
106
陳佳秀   蔡金瑞   張成睿   李儂偉
107
張永霖   潘祈睿   孫孟瑋   顏子皓
108
張耿豪   劉大哲   羅政翔
109
宋泉儒   彭彥筑   劉宗晁
110
吳柏毅   陳階欣   林俊豪   賴佳俊   謝承恩   蘇冠名   王成允
111
吳謹瑞   陳彥宇   李東霖   張力尹   蔡曜竹   黃哲偉   林惟敏   賴薪宇
112
李孟寰   陳璽元   李鎮宇   黃敏維   吳芊欣
113
張孟偉
Honors
  1. 2018 科技部 2018未來科技突破獎
  2. 2017 科技部資訊安全實務研發計畫績優團隊
  3. 九十九年度教育部『網通計畫優良教材選拔』優等獎
  4. 高考一級電子工程及格
  5. Editorial board member, International Journal of Communication Systems. John Wiley
  6. 教育部公費留學獎學金1995~1999