Chi-Hsiang Hung

Orcid: 0000-0003-1453-6247

According to our database1, Chi-Hsiang Hung authored at least 14 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PS-IPS: Deploying Intrusion Prevention System with machine learning on programmable switch.
Future Gener. Comput. Syst., March, 2024

2022
Real-Time In-Network Microburst Mitigation on Programmable Switch.
IEEE Access, 2022

P4SF: A High-Performance Stateful Firewall on Commodity P4-Programmable Switch.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Enabling Malware Detection with Machine Learning on Programmable Switch.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

2020
SAFCast: Smart Inter-Datacenter Multicast Transfer with Deadline Guarantee by Store-And-Forwarding.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2018
Heterogeneous Flow Table Integration for Capacity Enhancement in Software-Defined Networks.
Proceedings of the 2018 International Conference on Computing, 2018

2017
High-efficiency matching mechanism for off-chip tables in OpenFlow-enabled legacy switch.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Control plane latency reduction for service chaining in mobile edge computing system.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
Scalable topology-based flow entry management in data center.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2014
Group Key Management based on (2, 2) Secret Sharing.
KSII Trans. Internet Inf. Syst., 2014

2012
Quorum-based Key Management Scheme in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2012

2011
IP Traceback Based on Chinese Remainder Theorem.
J. Inf. Sci. Eng., 2011

2009
Zero-Collision RFID Tags Identification Based on CDMA.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2007
Building intrusion pattern miner for Snort network intrusion detection system.
J. Syst. Softw., 2007


  Loading...