I-Hsien Liu

Orcid: 0000-0001-8431-7475

According to our database1, I-Hsien Liu authored at least 32 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
VoWi-Fi security threats: Address resolution protocol attack and countermeasures.
IET Networks, March, 2024

Cover Image.
IET Networks, March, 2024

2023
Network Intrusion Detection Using CNN-based Classification Method.
Proceedings of the 8th IEEE/ACIS International Conference on Big Data, 2023

2022
A Non-normal Warning System for Dam Operation Using Machine Learning.
Proceedings of the 24th IEEE/ACIS International Conference on Software Engineering, 2022

A New Poisoning Attacks on Deep Neural Networks.
Proceedings of the 6th International Conference on Medical and Health Informatics, 2022

Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack Tree.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2021
The Security Issue of ICS: The Use of IT Infrastructure.
J. Robotics Netw. Artif. Life, 2021

An Emulation Mechanism for PLC Communication Features.
J. Robotics Netw. Artif. Life, 2021

Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement.
J. Robotics Netw. Artif. Life, 2021

Malicious Flows Generator Based on Data Balanced Algorithm.
Proceedings of the 2021 International Conference on Fuzzy Theory and Its Applications, 2021

2020
IDS Malicious Flow Classification.
J. Robotics Netw. Artif. Life, 2020

A Study of Applying Computer-assisted Language Learning to English Course for Junior College Students in Taiwan.
J. Robotics Netw. Artif. Life, 2020

A Novel and Efficient Blocking Scheme for Multiple Tag Identifications in a Large Scale RFID System.
Ad Hoc Sens. Wirel. Networks, 2020

An Authentication Information Exchange Scheme in WSN for IoT Applications.
IEEE Access, 2020

Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality.
IEEE Access, 2020

The Risk of Industrial Control System Programmable Logic Controller Default Configurations.
Proceedings of the International Computer Symposium, 2020

Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Differential Privacy Protection with Group Onion Routing based on AI-based URL Classification.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2019
Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices.
J. Robotics Netw. Artif. Life, 2019

Selection Strategy for VM Migration Method.
J. Robotics Netw. Artif. Life, 2019

A novel tag searching protocol with time efficiency and searching accuracy in RFID systems.
Comput. Networks, 2019

2018
Venerability and Protection Tool Surveys of Industrial Control System.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
Low-cost localization service for roadside sensors based on passive information.
J. High Speed Networks, 2017

A New Colluded Adversarial VNet Embeddings Attack in Cloud.
Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017

2016
Novel intrusion prediction mechanism based on honeypot log similarity.
Int. J. Netw. Manag., 2016

Distributed Node Scheduling Algorithms for Multiple Group Communications in Wireless Multi-hop Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

2015
<i>K</i>-anonymity against neighborhood attacks in weighted social networks.
Secur. Commun. Networks, 2015

2014
Novel Advanced Broadcast Scheme for Efficient Safety Message Collision Alleviation in Vehicular Networks.
Wirel. Pers. Commun., 2014

A multi-hop resource scheduling algorithm for IEEE 802.16j relay networks.
Comput. Networks, 2014

An Effective Group Communications in Hybrid VANET.
Proceedings of the Intelligent Systems and Applications, 2014

2013
Intelligent Adjustment Forwarding: A compromise between end-to-end and hop-by-hop transmissions in VANET environments.
J. Syst. Archit., 2013

Navigation-aware association control in vehicular wireless networks.
J. High Speed Networks, 2013


  Loading...