Yennun Huang

Orcid: 0000-0001-9312-0113

According to our database1, Yennun Huang authored at least 117 papers between 1987 and 2023.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2012, "For contributions to fault tolerant and failure avoidance software".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
User-Driven Synthetic Dataset Generation With Quantifiable Differential Privacy.
IEEE Trans. Serv. Comput., 2023

Prediction of Workpiece Film Thickness via Multi-Region Segmented Model of Painting Process Parameters.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2023

2022
An Optimization-Based Orchestrator for Resource Access and Operation Management in Sliced 5G Core Networks.
Sensors, 2022

FedSGDCOVID: Federated SGD COVID-19 Detection under Local Differential Privacy Using Chest X-ray Images and Symptom Information.
Sensors, 2022

On the Feasibility of Anomaly Detection with Fine-Grained Program Tracing Events.
J. Netw. Syst. Manag., 2022

A deep learning-based precision volume calculation approach for kidney and tumor segmentation on computed tomography images.
Comput. Methods Programs Biomed., 2022

A deep learning-based precision and automatic kidney segmentation system using efficient feature pyramid networks in computed tomography images.
Comput. Methods Programs Biomed., 2022

Examining the Utility of Differentially Private Synthetic Data Generated using Variational Autoencoder with TensorFlow Privacy.
Proceedings of the 27th IEEE Pacific Rim International Symposium on Dependable Computing, 2022

A Smart Wearable Device for Abnormal Event Handling of Multiple Machines in Modern Factories.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

Dynamic Scheduling Based on Self-Organizing Wireless Sensing System for Work in Process of Production Line.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

A Machine Learning-Based Model for Predicting the Risk of Cardiovascular Disease.
Proceedings of the Advanced Information Networking and Applications, 2022

A Federated Learning-Based Precision Prediction Model for External Elastic Membrane and Lumen Boundary Segmentation in Intravascular Ultrasound Images.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
(k, ε , δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy.
Serv. Oriented Comput. Appl., 2021

Optimization-Based Approaches for Minimizing Deployment Costs for Wireless Sensor Networks with Bounded Estimation Errors.
Sensors, 2021

Optimization-Based Resource Management Algorithms with Considerations of Client Satisfaction and High Availability in Elastic 5G Network Slices.
Sensors, 2021

Stock Price Movement Prediction Using Sentiment Analysis and CandleStick Chart Representation.
Sensors, 2021

DPCOVID: Privacy-Preserving Federated Covid-19 Detection.
CoRR, 2021

A VAE Conversion Method for Private Data Linkage.
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

Smart Machine Box with Early Failure Detection for Automatic Tool Changer Subsystem of CNC Machine Tool in the Production Line.
Proceedings of the IECON 2021, 2021

Automatic Kidney Volume Estimation System Using Transfer Learning Techniques.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
DPARM: Differentially Private Association Rules Mining.
IEEE Access, 2020

Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended Abstract.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

A Vision-based Dual-axis Positioning System with YOLOv4 and Improved Genetic Algorithms.
Proceedings of the Fourth IEEE International Conference on Robotic Computing, 2020

A Signal Fusion-based ANN Algorithm for Fault Diagnosis of Rotating Machinery.
Proceedings of the International Conference on System Science and Engineering, 2020

Machine Learning Models to Predict Visual Color Difference of Fluorescent Objects under Various Illumination Conditions.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

A Mesopic Lighting Evaluation Model Based on 1D Convolutional Neural Networks.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

Software Aging and Rejuvenation: A Genesis.
Proceedings of the Handbook of Software Aging and Rejuvenation, 2020

2019
Data Prefetching and Eviction Mechanisms of In-Memory Storage Systems Based on Scheduling for Big Data Processing.
IEEE Trans. Parallel Distributed Syst., 2019

Metalworking Industry: Quality Management via Edge Computing-Based Cloud Monitoring System.
Proceedings of the 12th IEEE Conference on Service-Oriented Computing and Applications, 2019

Evaluating Variational Autoencoder as a Private Data Release Mechanism for Tabular Data.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

2018
PPDCA: Privacy-preserving crowdsensing data collection and analysis with randomized response.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

InfoLeak: Scheduling-Based Information Leakage.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Exploring the Relationship Between Dimensionality Reduction and Private Data Release.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

An Industrial IoT Analysis System Based on Machining Data of Metal Materials.
Proceedings of the International Conference on Fuzzy Theory and Its Applications, 2018

HIT: Hybrid-Mode Information Flow Tracking with Taint Semantics Extraction and Replay.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

ANN Mechanism for Network Traffic Anomaly Detection in the Concept Drifting Environment.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Application Execution Time Prediction for Effective CPU Provisioning in Virtualization Environment.
IEEE Trans. Parallel Distributed Syst., 2017

Using Data Mining Methods to Detect Simulated Intrusions on a Modbus Network.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017

Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Toward Fog-Based Event-Driven Services for Internet of Vehicles: Design and Evaluation.
Proceedings of the Internet of Vehicles. Technologies and Services for Smart Cities, 2017

Differential privacy-based data de-identification protection and risk evaluation system.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

The choice between delta and shift operators for low-precision data representation.
Proceedings of the 20th Conference of Open Innovations Association, 2017

K-Aggregation: Improving Accuracy for Differential Privacy Synthetic Dataset by Utilizing K-Anonymity Algorithm.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Scheduling-Aware Data Prefetching for Data Processing Services in Cloud.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Crowdsensing traces visualization in bluetooth beacon-based sensor network using wearable device.
Proceedings of the SIGGRAPH ASIA 2016, Macao, December 5-8, 2016 - Posters, 2016

Overview of research center for information technology innovation in Taiwan Academia Sinica.
Proceedings of the International Workshop on Big Data and Information Security, 2016

Crowdsensing route reconstruction using portable bluetooth beacon-based two-way network.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

2015
SFTopk: Secure Functional Top-k Query via Untrusted Data Storage.
IEEE Access, 2015

Network-traffic anomaly detection with incremental majority learning.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Discovery of De-identification Policies Considering Re-identification Risks and Information Loss.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
PCTopk: Privacy-and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-Tiered Sensor Networks.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

Resistant learning on the envelope bulk for identifying anomalous patterns.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Event Pattern Discovery on IDS Traces of Cloud Services.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2013
ArtTorchlight: an exploratory way of viewing paintings using handheld projectors and smart phones.
Proceedings of the SIGGRAPH Asia 2013, 2013

Mining Large Network Reconnaissance Data.
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013

Network Forensic Analysis Using Growing Hierarchical SOM.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Dependable Architecture of RFID Middleware on Networked RFID Systems.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Investigating DNS traffic anomalies for malicious activities.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

Network traffic anomaly detection based on growing hierarchical SOM.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Design of event-based Intrusion Detection System on OpenFlow Network.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Holography: a behavior-based profiler for malware analysis.
Softw. Pract. Exp., 2012

2011
Malware Profiler Based on Innovative Behavior-Awareness Technique.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

2009
Towards capacity and profit optimization of video-on-demand services in a peer-assisted IPTV platform.
Multim. Syst., 2009

Holography: A Hardware Virtualization Tool for Malware Analysis.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Xprobe2++: Low volume remote network information gathering tool.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Towards Adaptive Covert Communication System.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

2007
Self-Healing Spyware: Detection, and Remediation.
IEEE Trans. Reliab., 2007

Capacity analysis of MediaGrid: a P2P IPTV platform for fiber to the node (FTTN) networks.
IEEE J. Sel. Areas Commun., 2007

Clicker - An IPTV Remote Control in Your Cell Phone.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
A Scalable Port Forwarding for P2P-Based Wi-Fi Applications.
Proceedings of the Wireless Algorithms, 2006

A Stateful Approach to Spyware Detection and Removal.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

2005
A Multi-Faceted Approach towards Spam-Resistible Mail.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

2004
NT-SwiFT: software implemented fault tolerance on Windows NT.
J. Syst. Softw., 2004

Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

2001
VORAL: A System for Voice Over IP Routing in Application Layer.
Proceedings of the 7th IEEE Real-Time Technology and Applications Symposium (RTAS 2001), 30 May, 2001

Robustness Testing and Hardening of CORBA ORB Implementations.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

A Checkpointing Tool for Palm Operating System.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Communication-Induced Checkpointing Protocols with K-Bounded Domino-Effect Freedom.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
Issues in the Design of a Reflective Library for Checkpointing C++ Objects.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

A Simple and Efficient Deadlock Recovery Scheme for Wormhole Routed 2-Dimensional Meshes.
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999

An Accelerative Pre-Allocation Protocol for Wavelength Division Multiplexing Star-Coupled Networks.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

Performance and Reliability Evaluation of Passive Replication Schemes in Application Level Fault Tolerance.
Proceedings of the Digest of Papers: FTCS-29, 1999

Winckp: A Transparent Checkpointing and Rollback Recovery Tool for Windows NT Applications.
Proceedings of the Digest of Papers: FTCS-29, 1999

Fault-Injection Experiments for Distributed Objects.
Proceedings of the International Symposium on Distributed Objects and Applications, 1999

A cluster-based checkpointing scheme for mobile computing on wide area network.
Proceedings of the Mobile Networks and Computing, 1999

1998
Checkpoints-on-Demand with Active Replication.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Filterfresh: Hot Replication of Java RMI Server Objects.
Proceedings of the 4th USENIX Conference on Object-Oriented Technologies and Systems (COOTS), 1998

1997
Progressive Retry for Software Failure Recovery in Message-Passing Applications.
IEEE Trans. Computers, 1997

ONE-IP: Techniques for Hosting a Service on a Cluster of Machines.
Comput. Networks, 1997

On the Scalability and Mean-Time to Failure of k Resilient Protocols.
Acta Informatica, 1997

STL: a tool for on-line software update and rejuvenation (Abstract).
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

Xept: a software instrumentation method for exception handling.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

Integrating Checkpointing with Transaction Processing.
Proceedings of the Digest of Papers: FTCS-27, 1997

1996
Components for software fault tolerance and rejuvenation.
AT&T Tech. J., 1996

Developing reliable applications on cluster systems.
Proceedings of the 15th Symposium on Reliable Distributed Systems, 1996

Minimizing Completion Time of a Program by Checkpointing and Rejuvenation.
Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1996

1995
Parallel architectures for processing high speed network signaling protocols.
IEEE/ACM Trans. Netw., 1995

Computing Reliability Intervals for k-Resilient Protocols.
IEEE Trans. Computers, 1995

Checkpointing and Its Applications.
Proceedings of the Digest of Papers: FTCS-25, 1995

Why Optimistic Message Logging Has Not Been Used In Telecommunications Systems.
Proceedings of the Digest of Papers: FTCS-25, 1995

Software Rejuvenation: Analysis, Module and Applications.
Proceedings of the Digest of Papers: FTCS-25, 1995

1994
High-Speed Protocol Processing Using Parallel Architectures.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

1993
Resource Allocation for Primary-Site Fault-Tolerant Systems.
IEEE Trans. Software Eng., 1993

Two Techniques for Transient Software Error Recovery.
Proceedings of the Hardware and Software Architectures for Fault Tolerance, 1993

Progressive Retry for Software Error Recovery in Distributed Systems.
Proceedings of the Digest of Papers: FTCS-23, 1993

Software Implemented Fault Tolerance Technologies and Experience.
Proceedings of the Digest of Papers: FTCS-23, 1993

1992
Effect of Fault Tolerance on Response Time-Analysis of the Primary Site Approach.
IEEE Trans. Computers, 1992

Computing Threshold Times for k-Resilient Protocols.
Proceedings of the 1992 International Conference on Parallel Processing, 1992

On the Availability of Parallel Protocol-Processing Systems.
Proceedings of the 1992 International Conference on Parallel Processing, 1992

1991
Effective Load and Resource Sharing in Parallel Protocol-Processing Systems.
Proceedings of the International Conference on Parallel Processing, 1991

Resource Allocation for Distributed Systems with Fault Tolerant Nodes.
Proceedings of the Fault-Tolerant Computing Systems, Tests, Diagnosis, 1991

1989
Analytic Models for the Primary Site Approach to Fault-Tolerance.
Acta Informatica, 1989

Availability Analysis of the Primary Site Approach for Fault Tolerance.
Proceedings of the Eigthth Symposium on Reliable Distributed Systems, 1989

1987
Local Area Networks: Software and Related Issues.
IEEE Trans. Software Eng., 1987


  Loading...