Calculated based on number of publications stored in Pure and citations from Scopus
20032023

Research activity per year

Filter
Conference contribution

Search results

  • 2022

    Android Malware Classifier Combining Permissions and API Features to Face Model Drifting

    Chang, W. T., Chen, Y. M. & Yang, H. H., 2022, New Trends in Computer Technologies and Applications - 25th International Computer Symposium, ICS 2022, Proceedings. Hsieh, S-Y., Hung, L-J., Peng, S-L., Klasing, R. & Lee, C-W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 434-446 13 p. (Communications in Computer and Information Science; vol. 1723 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A Novel Deep Learning Based Attention Mechanism for Android Malware Detection and Explanation

    Jeng, T. H., Chang, Y. C., Yang, H. H., Chen, L. K. & Chen, Y. M., 29 Jul 2022, Proceedings of the 10th International Conference on Computer and Communications Management, ICCCM 2022. Association for Computing Machinery, p. 226-232 7 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Detecting Android Malware by Combining System Call Sequence Relationships with Local Feature Calculation

    Hung, C. H., Chen, Y. M. & Wu, C. C., 2022, New Trends in Computer Technologies and Applications - 25th International Computer Symposium, ICS 2022, Proceedings. Hsieh, S-Y., Hung, L-J., Peng, S-L., Klasing, R. & Lee, C-W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 362-373 12 p. (Communications in Computer and Information Science; vol. 1723 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Enhancing Classification Performance for Android Small Sample Malicious Families Using Hybrid RGB Image Augmentation Method

    Ting, Y. H., Chen, Y. M. & Chen, L. K., 2022, 2022 9th International Conference on Soft Computing and Machine Intelligence, ISCMI 2022. Institute of Electrical and Electronics Engineers Inc., p. 21-25 5 p. (2022 9th International Conference on Soft Computing and Machine Intelligence, ISCMI 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2021

    Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection

    Chen, Y. M., Yang, C. H. & Chen, G. C., 30 Jan 2021, 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021. Institute of Electrical and Electronics Engineers Inc., 9346277. (2021 IEEE Conference on Dependable and Secure Computing, DSC 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • 2020

    Android malware detection system integrating block feature extraction and multi-head attention mechanism

    Chen, Y. M., He, A. C., Chen, G. C. & Liu, Y. C., Dec 2020, Proceedings - 2020 International Computer Symposium, ICS 2020. Institute of Electrical and Electronics Engineers Inc., p. 408-413 6 p. 9359096. (Proceedings - 2020 International Computer Symposium, ICS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Combining Static Permissions and Dynamic Packet Analysis to Improve Android Malware Detection

    Shyong, Y. C., Jeng, T. H. & Chen, Y. M., Jun 2020, 2020 2nd International Conference on Computer Communication and the Internet, ICCCI 2020. Institute of Electrical and Electronics Engineers Inc., p. 75-81 7 p. 9145994. (2020 2nd International Conference on Computer Communication and the Internet, ICCCI 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Dynamic Android Malware Analysis with De-Identification of Personal Identifiable Information

    Hu, C. C., Jeng, T. H. & Chen, Y. M., 5 Aug 2020, ICCBD 2020 - 2020 3rd International Conference on Computing and Big Data: Workshop 2020 2nd International Conference on Computer, Software Engineering and Applications, CSEA 2020. Association for Computing Machinery, p. 30-36 7 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2019

    A novel preprocessing method for solving long sequence problem in android malware detection

    Chen, Y. M., Hsu, C. H. & Kuo Chung, K. C., Aug 2019, Proceedings - 2019 12th International Conference on Ubi-Media Computing, Ubi-Media 2019. Institute of Electrical and Electronics Engineers Inc., p. 12-17 6 p. 9049612. (Proceedings - 2019 12th International Conference on Ubi-Media Computing, Ubi-Media 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection

    Jeng, T. H., Chen, Y. M., Chen, C. C., Huang, C. C. & Chou, K. S., 23 Jan 2019, DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., 8625170. (DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • NetflowTotal: A cloud service integration platform for malicious traffic analysis and collaboration

    Jeng, T. H., Chan, W. M., Luo, W. Y., Huang, C. C., Chen, C. C. & Chen, Y. M., 18 Oct 2019, ICCBD 2019 - 2019 the 2nd International Conference on Computing and Big Data, Workshop CSEA 2019: 2019 International Conference on Computer, Software Engineering and Applications. Association for Computing Machinery, p. 154-160 7 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • RSU Beacon Aided Trust Management System for Location Privacy-Enhanced VANETs

    Wei, Y. C., Chen, Y. M., Wu, W. C. & Chu, Y. C., 2019, Frontier Computing - Theory, Technologies and Applications FC 2018. Hui, L., Yen, N. Y. & Hung, J. C. (eds.). Springer Verlag, p. 1913-1924 12 p. (Lecture Notes in Electrical Engineering; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2017

    A game theory approach for deploying medical resources in emergency department

    Wu, C. K., Chen, Y. M. & Wu, D., 2017, Game Theory and Applications - 3rd Joint China-Dutch Workshop and 7th China Meeting, GTA 2016, Revised Selected Papers. Yang, X-G., Li, D-F., Uetz, M. & Xu, G-J. (eds.). Springer Verlag, p. 18-30 13 p. (Communications in Computer and Information Science; vol. 758).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2016

    The Novel SDN Testbed with Virtual Network Functions Placement

    Chou, L. D., Tseng, C. W., Tseng, C. H. & Chen, Y. M., 29 Jun 2016, 2016 1st International Conference on Software Networking, ICSN 2016. Institute of Electrical and Electronics Engineers Inc., 7501932. (2016 1st International Conference on Software Networking, ICSN 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2015

    Adaptive Smart Power Control Algorithm for LTE downlink cross-tier interference avoidance

    Kuo, Y. W., Chou, L. D. & Chen, Y. M., 19 Nov 2015, Proceedings of the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2015. Institute of Electrical and Electronics Engineers Inc., p. 24-30 7 p. 7332537. (Proceedings of the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    4 Scopus citations
  • A simple authentication scheme and access control protocol for VANETs

    Wu, W. C. & Chen, Y. M., 2015, Ubiquitous Computing Application and Wireless Sensor, UCAWSN-2014. Pan, Y., Yi, G., Chao, H-C. & Park, J. J. (eds.). Springer Verlag, p. 259-272 14 p. (Lecture Notes in Electrical Engineering; vol. 331).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The research of experimental state feedback mechanism based on windows API-take cloud security experimental platform for instance

    Ching, Y. T. & Chen, Y. M., 2015, Intelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014. Chu, W. C-C., Chao, H-C. & Yang, S. J-H. (eds.). IOS Press BV, p. 651-661 11 p. (Frontiers in Artificial Intelligence and Applications; vol. 274).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2014

    Adaptive decision making for improving trust establishment in VANET

    Wei, Y. C. & Chen, Y. M., 23 Dec 2014, APNOMS 2014 - 16th Asia-Pacific Network Operations and Management Symposium. Institute of Electrical and Electronics Engineers Inc., 6996523. (APNOMS 2014 - 16th Asia-Pacific Network Operations and Management Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • 2013

    A novel search engine to uncover potential victims for APT investigations

    Liu, S. T., Chen, Y. M. & Lin, S. J., 2013, Network and Parallel Computing - 10th IFIP International Conference, NPC 2013, Proceedings. p. 405-416 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8147 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    17 Scopus citations
  • 2012

    An efficient trust management system for balancing the safety and location privacy in VANETs

    Wei, Y. C. & Chen, Y. M., 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 393-400 8 p. 6296000. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Scopus citations
  • Efficient self-organized trust management in location privacy enhanced VANETs

    Wei, Y. C. & Chen, Y. M., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 328-344 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Evaluation of collusion resistance on trust management systems for VANETs

    Wei, Y. C. & Chen, Y. M., 2012, 2012 12th International Conference on ITS Telecommunications, ITST 2012. p. 356-360 5 p. 6425197. (2012 12th International Conference on ITS Telecommunications, ITST 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • N-victims: An approach to determine N-victims for APT investigations

    Liu, S. T., Chen, Y. M. & Hung, H. C., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 226-240 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Reliability and efficiency improvement for trust management model in VANETs

    Wei, Y. C. & Chen, Y. M., 2012, Human Centric Technology and Service in Smart Space, HumanCom 2012. p. 105-112 8 p. (Lecture Notes in Electrical Engineering; vol. 182 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2011

    A system call analysis method with MapReduce for malware detection

    Liu, S. T., Huang, H. C. & Chen, Y. M., 2011, Proceedings - 2011 17th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2011. p. 631-637 7 p. 6121334. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Beacon-based trust management for location privacy enhancement VANETs

    Wei, Y. C., Chen, Y. M. & Shan, H. L., 2011, APNOMS 2011 - 13th Asia-Pacific Network Operations and Management Symposium: Managing Clouds, Smart Networks and Services, Final Program. 6077002. (APNOMS 2011 - 13th Asia-Pacific Network Operations and Management Symposium: Managing Clouds, Smart Networks and Services, Final Program).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Combining density-based clustering and wavelet methods for internal systems anomaly detection

    Liu, S. T., Lin, S. J. & Chen, Y. M., 2011, APNOMS 2011 - 13th Asia-Pacific Network Operations and Management Symposium: Managing Clouds, Smart Networks and Services, Final Program. 6077031. (APNOMS 2011 - 13th Asia-Pacific Network Operations and Management Symposium: Managing Clouds, Smart Networks and Services, Final Program).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Using agent in virtual machine for interactive security training

    Chen, Y. M., Chuang, C. E., Liu, H. C., Ni, C. Y. & Wang, C. T., 2011, Security Technology - International Conference SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Proceedings. p. 65-74 10 p. (Communications in Computer and Information Science; vol. 259 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2010

    Retrospective detection of malware attacks by cloud computing

    Liu, S. T. & Chen, Y. M., 2010, Proceedings - 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2010. p. 510-517 8 p. 5616975. (Proceedings - 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • RSSI-based user centric anonymization for location privacy in Vehicular Networks

    Wei, Y. C., Chen, Y. M. & Shan, H. L., 2010, Security in Emerging Wireless Communication and Networking Systems - First International ICST Workshop, SEWCN 2009, Revised Selected Papers. p. 39-51 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 42 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2009

    A game theoretic approach for deploying intrusion detection agent

    Chen, Y. M., Wu, D. & Wu, C. K., 2009, Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers. p. 446-451 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5044 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • A game theory approach for the reallocation of security forces against terrorist diversionary attacks

    Chen, Y. M., Dachrahn, W. & Wu, C. K., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 89-94 6 p. 5137277. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Combining incremental hidden Markov model and Adaboost algorithm for anomaly intrusion detection

    Chen, Y. S. & Chen, Y. M., 2009, Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09. p. 3-9 7 p. 1599276. (Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • TLMS: A novel DRM scheme for multimedia sharing in P2P networks

    Wu, W. C. & Chen, Y. M., 2009, IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. p. 873-876 4 p. 5337125. (IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2007

    Meeting QoS requirements of mobile computing by dual-level congestion control

    Chen, Y. M. & Su, C. L., 2007, Advances in Grid and Pervasive Computing - Second International Conference, GPC 2007, Proceedings. Springer Verlag, p. 241-251 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4459 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2006

    A live harmonic broadcasting scheme for VBR-encoded hot videos

    Yang, H. C., Yu, H. F., Yang, Z. Y., Tseng, L. M. & Chen, Y. M., 2006, Wired/Wireless Internet Communications - 4th International Conference, WWIC 2006, Proceedings. Springer Verlag, p. 236-246 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3970 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Information flow query and verification for security policy of security-enhanced linux

    Chen, Y. M. & Kao, Y. W., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 389-404 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2005

    An efficient staircase-harmonic scheme for broadcasting popular videos

    Yang, H. C., Yu, H. F., Tseng, L. M. & Chen, Y. M., 2005, 2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005. p. 122-127 6 p. 1405155. (2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Recognizing multistage cyber attacks via CPN approach

    Chen, Y. M., Wong, H. K. & Liu, M. C., 2005, WMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings. p. 1-6 6 p. (WMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Short-delay video streaming with restricted supplying peer bandwidth

    Yang, H. C., Yu, H. F., Tseng, L. M. & Chen, Y. M., 2005, Management of Multimedia Networks and Services - 8th International Conference on Management of Multimedia Networks and Services, MMNS 2005, Proceedings. Royo, J. D. & Hasegawa, G. (eds.). Springer Verlag, p. 362-370 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3754 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2004

    A segment-alignment interactive broadcasting scheme

    Yang, H. C., Yu, H. F., Tseng, L. M. & Chen, Y. M., 2004, 6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure. p. 1040-1045 6 p. (6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Fast and lossless broadcasting schemes for VBR-encoded hot videos

    Yang, H. C., Yu, H. F., Tseng, L. M. & Chen, Y. M., 2004, Proceedings - 2004 12th IEEE International Conference on Networks, ICON 2004. Pung, H-K., Lee, FB-S., Tham, C-K. & Kuttan, S. (eds.). p. 165-169 5 p. (Proceedings - IEEE International Conference on Networks, ICON; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Simple VBR staircase broadcasting (SVSB)

    Yu, H. F., Yang, H. C., Tseng, L. M. & Chen, Y. M., 2004, 2004 1st IEEE Consumer Communications and Networking Conference, CCNC 2004; Consumer Networking: Closing the Digital Divide - Proceedings. p. 128-133 6 p. (IEEE Consumer Communications and Networking Conference, CCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations