Po-Ching Lin

Orcid: 0000-0001-8294-5857

According to our database1, Po-Ching Lin authored at least 73 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Sustainable and lightweight domain-based intrusion detection system for in-vehicle network.
Sustain. Comput. Informatics Syst., January, 2024

2023
Host-based intrusion detection with multi-datasource and deep learning.
J. Inf. Secur. Appl., November, 2023

Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection.
Comput. Secur., June, 2023

Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation.
Comput. Networks, June, 2023

Misbehavior detection system with semi-supervised federated learning.
Veh. Commun., 2023

Toward the Age of Intelligent Vehicular Networks for Connected and Autonomous Vehicles in 6G.
IEEE Netw., 2023

Vehicle theft detection by generative adversarial networks on driving behavior.
Eng. Appl. Artif. Intell., 2023

Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring.
Proceedings of the IEEE Military Communications Conference, 2023

Mutual Authentication between Aerial Base Stations and Core Network: A Lightweight Security Scheme.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

Deep Learning-Based Localization and Outlier Removal Integration Model for Indoor Surveillance.
Proceedings of the IEEE International Conference on Communications, 2023

Efficient Aerial Relaying Station Path Planning for Emergency Event-based Communications.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Controllable Path Planning and Traffic Scheduling for Emergency Services in the Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics.
J. Inf. Secur. Appl., 2022

ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions.
J. Inf. Secur. Appl., 2022

Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?
IEEE Secur. Priv., 2022

Towards the Age of Intelligent Vehicular Networks for Connected and Autonomous Vehicles in 6G.
CoRR, 2022

Machine Learning With Variational AutoEncoder for Imbalanced Datasets in Intrusion Detection.
IEEE Access, 2022

Domain-Specific Anomaly Detection for In-Vehicle Networks.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

2021
CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection.
J. Netw. Comput. Appl., 2021

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges.
IEEE Commun. Surv. Tutorials, 2021

Robust Positioning-based Verification Scheme for Enhancing Reliability of Vehicle Platoon Control.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Platoon-based Vehicle Coordination Scheme for Resolving Sudden Traffic Jam in the IoV Era.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

2020
Enhancing Misbehavior Detection in 5G Vehicle-to-Vehicle Communications.
IEEE Trans. Veh. Technol., 2020

A Beamforming Signal-Based Verification Scheme for Data Sharing in 5G Vehicular Networks.
IEEE Access, 2020

An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection.
IEEE Access, 2020

SSOV: A Single Sign-on Protocol for Accessing Vehicular Application Services with the Support of Secret Credential Management System.
Proceedings of the International Computer Symposium, 2020

2019
Web attacks: defeating monetisation attempts.
Netw. Secur., 2019

Multi-Array Relative Positioning for Verifying the Truthfulness of V2X Messages.
IEEE Commun. Lett., 2019

Preventing the attempts of abusing cheap-hosting Web-servers for monetization attacks.
CoRR, 2019

Energy Depletion Attacks in Low Power Wireless Networks.
IEEE Access, 2019

Physical signal-driven fusion for V2X misbehavior detection.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019

2018
Toward Optimal Resource Allocation of Virtualized Network Functions for Hierarchical Datacenters.
IEEE Trans. Netw. Serv. Manag., 2018

MECPASS: Distributed Denial of Service Defense Architecture for Mobile Networks.
IEEE Netw., 2018

Towards load-balanced service chaining by Hash-based Traffic Steering on Softswitches.
J. Netw. Comput. Appl., 2018

StateFit: A Security Framework for SDN Programmable Data Plane Model.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

2017
Detecting Web-Based Botnets Using Bot Communication Traffic Features.
Secur. Commun. Networks, 2017

Optimal Placement of Network Security Monitoring Functions in NFV-Enabled Data Centers.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017

Rapid detection of disobedient forwarding on compromised OpenFlow switches.
Proceedings of the 2017 International Conference on Computing, 2017

Detecting and Preventing DDoS Attacks in SDN-Based Data Center Networks.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Hash-based load balanced traffic steering on softswitches for chaining virtualized network functions.
Proceedings of the IEEE International Conference on Communications, 2017

2016
PCAPLib: A System of Extracting, Classifying, and Anonymizing Real Packet Traces.
IEEE Syst. J., 2016

VRS: a values-based reputation system for web services.
Secur. Commun. Networks, 2016

An Anomaly Detection Framework Based on ICA and Bayesian Classification for IaaS Platforms.
KSII Trans. Internet Inf. Syst., 2016

Unintentional and Involuntary Personal Information Leakage on Facebook from User Interactions.
KSII Trans. Internet Inf. Syst., 2016

Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization.
Computer, 2016

2015
A Resource-Constrained Asymmetric Redundancy Elimination Algorithm.
IEEE/ACM Trans. Netw., 2015

An extended SDN architecture for network function virtualization with a case study on intrusion prevention.
IEEE Netw., 2015

Does Playing Online Mobile Games Overcharge You for the Fun?
Proceedings of the 2nd Workshop on Mobile Gaming, MobiGames@MobiSys 2015, Florence, Italy, 2015

An event-based SDN architecture for network security analysis.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
On-the-Fly Capture and Replay Mechanisms for Multi-Port Network Devices in Operational Networks.
IEEE Trans. Netw. Serv. Manag., 2014

Guest Editorial Deep Packet Inspection: Algorithms, Hardware, and Applications.
IEEE J. Sel. Areas Commun., 2014

2013
Re-examining the performance bottleneck in a NIDS with detailed profiling.
J. Netw. Comput. Appl., 2013

Does Online Mobile Gaming Overcharge You for The Fun?
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

2012
Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems.
Int. J. Netw. Secur., 2012

Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems.
IEEE Commun. Surv. Tutorials, 2012

Low-storage capture and loss recovery selective replay of real flows.
IEEE Commun. Mag., 2012

CacheQuery: A practical asymmetric communication algorithm.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning.
IEEE Trans. Computers, 2011

2010
On campus beta site: architecture designs, operational experience, and top product defects.
IEEE Commun. Mag., 2010

2009
Realizing a Sub-Linear Time String-Matching Algorithm With a Hardware Accelerator Using Bloom Filters.
IEEE Trans. Very Large Scale Integr. Syst., 2009

Hardware-Software Codesign for High-Speed Signature-based Virus Scanning.
IEEE Micro, 2009

Application classification using packet size distribution and port association.
J. Netw. Comput. Appl., 2009

Extracting Attack Sessions from Real Traffic with Intrusion Prevention Systems.
Proceedings of IEEE International Conference on Communications, 2009

2008
Designing and evaluating interleaving decompressing and virus scanning in a stream-based mail proxy.
J. Syst. Softw., 2008

kP2PADM: An In-Kernel Architecture of P2P Management Gateway.
IEICE Trans. Inf. Syst., 2008

Accelerating Web Content Filtering by the Early Decision Algorithm.
IEICE Trans. Inf. Syst., 2008

Using String Matching for Deep Packet Inspection.
Computer, 2008

2007
kP2PADM: An In-kernel Gateway Architecture for Managing P2P Traffic.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

2006
Profiling and accelerating string matching algorithms in three network content security applications.
IEEE Commun. Surv. Tutorials, 2006

Designing an Integrated Architecture for Network Content Security Gateways.
Computer, 2006

An Early Decision Algorithm to Accelerate Web Content Filtering.
Proceedings of the Information Networking, 2006

2003
Evolution and Evaluation of Internet Content Delivery.
Proceedings of the International Conference on Internet Computing, 2003

Direct Web switch routing with state migration, TCP masquerade, and cookie name rewriting.
Proceedings of the Global Telecommunications Conference, 2003


  Loading...