國立中正學術成果資訊系統

Scopus

Article
1
TRACE: Relationship Analysis and Causal Factor Extraction in Cyber Threat Intelligence Reports
Vaitheeshwari R., Wu E.H.K., Lin Y.D., Hwang R.H., Lin P.C., Lai Y.C., Ali A.
IEEE Transactions on Dependable and Secure Computing
 
2025
 
Article
2
Adversarial Attacks Against Shared Knowledge Interpretation in Semantic Communications
Hoang V.T., Nguyen V.L., Chang R.G., Lin P.C., Hwang R.H., Duong T.Q.
IEEE Transactions on Cognitive Communications and Networking
 
2025
 
Article
3
Intelligent Aerial Relay Deployment for Enhancing Connectivity in Emergency Communications
Nguyen V.L., Nguyen L.H., Kuo J.J., Lin P.C., Hwang R.H.
IEEE Transactions on Vehicular Technology
 
2024, 73 (6) , 8782-8796
 
Article
4
Imperceptible adversarial attack via spectral sensitivity of human visual system
Chiang C.K., Lin Y.D., Hwang R.H., Lin P.C., Chang S.Y., Li H.T.
Multimedia Tools and Applications
 
2024, 83 (20) , 59291-59315
 
Conference Paper
5
RadSense: Radio Sensing for Crime Monitoring in Restricted-Access Areas
Liang H.W., Chang S.Y., Nguyen V.L., Lin P.C., Hwang R.H.
Lecture Notes in Networks and Systems
 
2024, 882 LNNS , 473-484
 
Article
6
Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement
Chen Z.S., Vaitheeshwari R., Wu E.H.K., Lin Y.D., Hwang R.H., Lin P.C., Lai Y.C., Ali A.
IEEE Access
 
2024, 12 , 141851-141865
 
Review
7
Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey
Vyas A., Lin P.C., Hwang R.H., Tripathi M.
IEEE Access
 
2024, 12 , 127018-127050
 
Article
8
MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology
Huang Y.T., Vaitheeshwari R., Chen M.C., Lin Y.D., Hwang R.H., Lin P.C., Lai Y.C., Wu E.H.K., Chen C.H., Liao Z.J., Chen C.K.
IEEE Transactions on Network and Service Management
 
2024, 21 (4) , 4871-4887
 
Article
9
Sustainable and lightweight domain-based intrusion detection system for in-vehicle network
Kristianto E., Lin P.C., Hwang R.H.
Sustainable Computing: Informatics and Systems
 
2024, 41
 
Article
10
Host-based intrusion detection with multi-datasource and deep learning
Hwang R.H., Lee C.L., Lin Y.D., Lin P.C., Wu H.K., Lai Y.C., Chen C.K.
Journal of Information Security and Applications
 
2023, 78
 
88 筆資料,第 1/9 頁,每頁顯示 筆,到第
1 2 3 4 5 6 7 8 9

學術著作

1
An Extended SDN Architecture for Network Function Virtualization with a Case Study on Intrusion Detection
Ying-Dar LIn, Po-Ching Lin, Chih-Hung Yeh, Yao-Chun Wang and Yuan-Cheng Lai
IEEE Network
2015 年 5 月
IEEE Network,Vol.29, No.3,pp.48-53
期刊論文
1 筆資料,第 1/1 頁,每頁顯示 筆,到第
1