Yu-Lun Huang

Orcid: 0000-0001-7618-0114

According to our database1, Yu-Lun Huang authored at least 44 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud.
Softw. Test. Verification Reliab., August, 2023

2022
Cross: A generic framework for system integration and its adaption in hospitals.
Softw. Pract. Exp., 2022

Measuring public opinion on the import of US pork in Taiwan.
Proceedings of the 36th Pacific Asia Conference on Language, Information and Computation, 2022

A Recommendation Mechanism of Selecting Machine Learning Models for Fault Diagnosis.
Proceedings of the 19th International Conference on Informatics in Control, 2022

A Simplified Hardware Proportional-Integral-Derivative Controller Using Power-of-2 Multiplication.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

2021
A Protocol-based Intrusion Detection System using Dual Autoencoders.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

AHP4Edu: An AHP-Based Assessment Model for Learning Effectiveness of Education.
Proceedings of the Innovative Technologies and Learning - 4th International Conference, 2021

2020
Premature Ventricular Complex Detection Chip Obtained Using Convolution Neural Network.
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020

Application of Design Thinking to Optimize Change Management Procedures with a Case Study on Reference Book Stores.
Proceedings of the Cross-Cultural Design. User Experience of Products, Services, and Intelligent Environments, 2020

2019
3aRAM: A 3-Layer AHP-Based Risk Assessment Model and its Implementation for an Industrial IoT Cloud.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Encouraging Active Learning for System Engineering Students Using Role-Exchanging Activities.
Proceedings of the Innovative Technologies and Learning - Second International Conference, 2019

MLoC: A Cloud Framework adopting Machine Learning for Industrial Automation.
Proceedings of the 12th Asian Control Conference, 2019

2018
An AHP-Based Risk Assessment for an Industrial IoT Cloud.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

2017
An Enhanced Handover Scheme Adopting Mobile Relays in a LTE-A Network for High-Speed Movements.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Bringing Desktop Applications to the Web.
IT Prof., 2016

CoAP Option for Capability-Based Access Control for IoT-Applications.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

2015
An Adjustable Risk Assessment Method for a Cloud System.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

S-CBAC: A secure access control model supporting group access for Internet of Things.
Proceedings of the 2015 IEEE International Symposium on Software Reliability Engineering Workshops, 2015

2014
Locating Anchors in WSN Using a Wearable IMU-Camera.
Int. J. Distributed Sens. Networks, 2014

An Anomaly Detection Module for Firefox OS.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

2013
A Performance Mapping Model for Physical-to-Virtual Migration.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Investigating the security control of a water system: An overview.
Proceedings of the 9th Asian Control Conference, 2013

2012
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Veh. Technol., 2012

Threat as a Service?: Virtualization's Impact on Cloud Security.
IT Prof., 2012

A framework for quantitative evaluation of parallel control-flow obfuscation.
Comput. Secur., 2012

Security Impacts of Virtualization on a Network Testbed.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks.
IEEE Trans. Veh. Technol., 2011

An Analytic Hierarchy Process-Based Risk Assessment Method for Wireless Networks.
IEEE Trans. Reliab., 2011

Attacks against process control systems: risk assessment, detection, and response.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
A graph approach to quantitative analysis of control-flow obfuscating transformations.
IEEE Trans. Inf. Forensics Secur., 2009

Hands-on oriented curriculum and laboratory development for embedded system design.
SIGBED Rev., 2009

Understanding the physical and economic consequences of attacks on control systems.
Int. J. Crit. Infrastructure Prot., 2009

OSNP: Secure wireless authentication protocol using one-time key.
Comput. Secur., 2009

Provable Secure AKA Scheme with Reliable Key Delegation in UMTS.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

2008
SWOON: A Testbed for Secure Wireless Overlay Networks.
Proceedings of the Workshop on Cyber Security and Test, 2008

2007
Design methodology and hands-on practices for Embedded Operating Systems.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

2006
Kannon: Ubiquitous Sensor/Actuator Technologies for Elderly Living and Care: A Multidisciplinary Effort in National Chiao Tung University, Taiwan.
Proceedings of the IEEE International Conference on Systems, 2006

A control flow obfuscation method to discourage malicious tampering of software codes.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2004
Efficient key distribution schemes for secure media delivery in pay-TV systems.
IEEE Trans. Multim., 2004

2003
Optimal information-dispersal for fault-tolerant communication over a burst-error channel.
IEEE Trans. Reliab., 2003

2000
Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack.
IEEE Internet Comput., 2000

A Generic Electronic Payment Model Supporting Multiple Merchant Transactions.
Comput. Secur., 2000

Practical Key Distribution Schemes for Channel Protection.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
An Efficient Authentication Protocol for Mobile Networks.
J. Inf. Sci. Eng., 1999


  Loading...