Jung-Chun Liu

Orcid: 0009-0009-1988-8701

According to our database1, Jung-Chun Liu authored at least 100 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On Construction of Precise Positioning System via IEEE 802.11ax.
IEEE Internet Things J., July, 2023

GP with Ranging-Binding Technique for Symbolic Regression.
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023

2022
Cyberattacks detection and analysis in a network log system using XGBoost with ELK stack.
Soft Comput., 2022

Assessing Perceptual Load and Cognitive Load by Fixation-Related Information of Eye Movements.
Sensors, 2022

Performance Analysis in HyperFlex and vSAN Hyper Convergence Platforms for Online Course Consideration.
IEEE Access, 2022

Multi-Robot Formation Control using Collective Behavior Model and Reinforcement Learning.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022

2021
Performance benchmarking of deep learning framework on Intel Xeon Phi.
J. Supercomput., 2021

Cyberattack detection model using deep learning in a network log system with data visualization.
J. Supercomput., 2021

2020
An implementation of cloud-based platform with R packages for spatiotemporal analysis of air pollution.
J. Supercomput., 2020

On construction of the air pollution monitoring service with a hybrid database converter.
Soft Comput., 2020

A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme.
Concurr. Comput. Pract. Exp., 2020

On construction of an energy monitoring service using big data technology for the smart campus.
Clust. Comput., 2020

NetFlow Monitoring and Cyberattack Detection Using Deep Learning With Ceph.
IEEE Access, 2020

Performance Enhancement of GPU Parallel Computing Using Memory Allocation Optimization.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

2019
On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Computing.
Wirel. Pers. Commun., 2019

An energy-efficient cloud system with novel dynamic resource allocation methods.
J. Supercomput., 2019

Implementation of a real-time network traffic monitoring service with network functions virtualization.
Future Gener. Comput. Syst., 2019

A predictive load balancing technique for software defined networked cloud services.
Computing, 2019

2018
An MFCC-based text-independent speaker identification system for access control.
Concurr. Comput. Pract. Exp., 2018

The Implementation of a Virtual Desktop Infrastructure with GPU Accelerated on OpenStack.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

On Construction of a Caffe Deep Learning Framework based on Intel Xeon Phi.
Proceedings of the Advances on P2P, 2018

2017
Virtual machine management system based on the power saving algorithm in cloud.
J. Netw. Comput. Appl., 2017

Implementation of a Big Data Accessing and Processing Platform for Medical Records in Cloud.
J. Medical Syst., 2017

Implementation of a virtual switch monitoring system using OpenFlow on cloud.
Int. J. Ad Hoc Ubiquitous Comput., 2017

Square Key Matrix Management Scheme in Wireless Sensor Networks.
Comput. Informatics, 2017

2016
Random Cladding with Feedback Mechanism for encrypting mobile messages.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Implementation of an Energy Saving Cloud Infrastructure with Virtual Machine Power Usage Monitoring and Live Migration on OpenStack.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

The Implementation of Supporting Uniform Data Distribution with Software-Dened Storage Service on Heterogeneous Cloud Storage.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

The Implementation of Air Pollution Monitoring Service Using Hybrid Database Converter.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

On Construction of an Energy Monitoring Service Using Big Data Technology for Smart Campus.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

Enhancing Security of LTE using a Double Masking Technique.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
S-PMIPv6: An intra-LMA model for IPv6 mobility.
J. Netw. Comput. Appl., 2015

On the Accelerated Convergence of Genetic Algorithm Using GPU Parallel Operations.
Int. J. Softw. Innov., 2015

Performance Evaluation of Parallel Genetic Algorithm Using Single Program Multiple Data Technique.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

Improvement of Workload Balancing Using Parallel Loop Self-Scheduling on Intel Xeon Phi.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

Improvement of Workload Balancing Using Parallel Loop Self-Scheduling on Xeon Phi.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

Implementation of a Cloud Energy Saving System with Virtual Machine Dynamic Resource Allocation Method Based on OpenStack.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

Construction of a Green Power Virtual Machine Management Method on OpenStack.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Implementation of Cloud Infrastructure Monitor Platform with Power Saving Method.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Heterogeneous Network Handover Using 3GPP ANDSF.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Implementation of GPU virtualization using PCI pass-through mechanism.
J. Supercomput., 2014

On improvement of cloud virtual machine availability with virtualization fault tolerance mechanism.
J. Supercomput., 2014

The simulation of an emotional robot implemented with fuzzy logic.
Soft Comput., 2014

Construction and Application of an Intelligent Air Quality Monitoring System for Healthcare Environment.
J. Medical Syst., 2014

The smooth switching gain-scheduled control with H<sup>∞</sup> performance to the application of TORA systems.
Int. J. Model. Identif. Control., 2014

A method for managing green power of a virtual machine cluster in cloud.
Future Gener. Comput. Syst., 2014

Implementation of an environmental quality and harmful gases monitoring system.
Proceedings of the International Conference on Smart Computing, 2014

An Environmental Monitoring System for Air Quality Control.
Proceedings of the Intelligent Systems and Applications, 2014

A Big Data Processing Platform for Medical Records in Cloud.
Proceedings of the Intelligent Systems and Applications, 2014

Designing QR Code with Authentication Capabilities.
Proceedings of the Intelligent Systems and Applications, 2014

A Secure Mobile Shopping System Based on Credit Card Transaction.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Secure Traffic Control System with Emergency Handling for Ambulances.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Implementation of Load Balancing Method for Cloud Service with Open Flow.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

A random wrapping encryption method.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

S-PMIPv6: Efficient Handover of Proxy Mobile IPv6 by Using SCTP.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Improving Multi-path Congestion Control for Event-Driven Wireless Sensor Networks by Using TDMA.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
On construction of heuristic QoS bandwidth management in clouds.
Concurr. Comput. Pract. Exp., 2013

On Construction of an Intelligent Environmental Monitoring System for Healthcare.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Implementation of a Cloud IaaS with Dynamic Resource Allocation Method Using OpenStack.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Implementation of Data Transform Method into NoSQL Database for Healthcare Data.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Building a block cipher mode of operation with feedback keys.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

Implementation of a Virtual Switch Monitor System Using OpenFlow on Cloud.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Block Cipher Mode of Operation with Two Keys.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Handover Scheme for LTE Wireless Networks under the Assistance of GPS.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

The Simulation of a Robot with Emotions Implemented with Fuzzy Logic.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Multiple-Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Implementation of Smart Power Management and Service System on Cloud Computing.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Mobile Computer System with User Friendly Environment and Security Protection.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

On Construction of Cloud IaaS Using KVM and Open Nebula for Video Services.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

On Construction of Cloud IaaS for VM Live Migration Using KVM and OpenNebula.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

Performance Evaluation of OpenMP and CUDA on Multicore Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

2011
Implementation of a Smart Grid System with SOA-based Service on Cloud.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011

Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS Attacks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Research on the ZigBee-Based Indoor Location Estimation Technology.
Proceedings of the Communication and Networking, 2011

An Indoor Location-Aware System Based on Rotation Sampling in Positioning.
Proceedings of the Communication and Networking, 2011

2010
Energy analysis of multimedia video decoding on mobile handheld devices.
Comput. Stand. Interfaces, 2010

Improvement of multi-hop packet transmission scheduling in WDM optical star networks.
Comput. Commun., 2010

Implementation of a SOA-Based Service Deployment Platform with Portal.
Proceedings of the Communication and Networking, 2010

Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks.
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010

2009
Investigations of Factors Affecting the Genetic Algorithm for Shortest Driving Time.
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009

Energy Analysis of Multimedia Video Streaming on Mobile Devices.
Proceedings of the Advances in Information Security and Assurance, 2009

Scalable Multi-Hop Scheduling with Overlapping the Tuning Latency in WDM Optical Star Networks.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

Binary Documents Recovery Based on Skeleton Extraction.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Improvement of Multi-hop Packet Transmission Scheduling in WDM Optical Star Networks.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Analysis of Priority Queue-Based Scheme to Alleviate Malicious Flows from Distributed DoS Attacks.
Proceedings of the Communication and Networking, 2009

Access Log Generator for Analyzing Malicious Website Browsing Behaviors.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Optimization of logical rings for multi-hop transmissions in WDM optical star networks.
Comput. Commun., 2008

On the Security of the Full-Band Image Watermark for Copyright Protection.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

A Robust Watermark Scheme for Copyright Protection.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Detection Method Based on Reverse Proxy against Web Flooding Attacks.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Energy efficiency measurement for multimedia audio decoding on embedded systems.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Energy Analysis of Multimedia Video Decoding on Embedded Systems.
Proceedings of the 2008 International Conference on Information Networking, 2008

Safeguard Intranet Using Embedded and Distributed Firewall System.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

2007
Robust Multi-scale Full-Band Image Watermarking for Copyright Protection.
Proceedings of the New Trends in Applied Artificial Intelligence, 2007

2005
An Ear-Decomposition Based Approach for Survivable Routing in WDM Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005


  Loading...