Yu-Lun Huang

According to our database1, Yu-Lun Huang authored at least 35 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
3aRAM: A 3-Layer AHP-Based Risk Assessment Model and its Implementation for an Industrial IoT Cloud.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Encouraging Active Learning for System Engineering Students Using Role-Exchanging Activities.
Proceedings of the Innovative Technologies and Learning - Second International Conference, 2019

MLoC: A Cloud Framework adopting Machine Learning for Industrial Automation.
Proceedings of the 12th Asian Control Conference, 2019

2018
An AHP-Based Risk Assessment for an Industrial IoT Cloud.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

2017
An Enhanced Handover Scheme Adopting Mobile Relays in a LTE-A Network for High-Speed Movements.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Bringing Desktop Applications to the Web.
IT Professional, 2016

CoAP Option for Capability-Based Access Control for IoT-Applications.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

2015
An Adjustable Risk Assessment Method for a Cloud System.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

S-CBAC: A secure access control model supporting group access for Internet of Things.
Proceedings of the 2015 IEEE International Symposium on Software Reliability Engineering Workshops, 2015

2014
Locating Anchors in WSN Using a Wearable IMU-Camera.
IJDSN, 2014

An Anomaly Detection Module for Firefox OS.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

2013
A Performance Mapping Model for Physical-to-Virtual Migration.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Investigating the security control of a water system: An overview.
Proceedings of the 9th Asian Control Conference, 2013

2012
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Vehicular Technology, 2012

Threat as a Service?: Virtualization's Impact on Cloud Security.
IT Professional, 2012

A framework for quantitative evaluation of parallel control-flow obfuscation.
Computers & Security, 2012

Security Impacts of Virtualization on a Network Testbed.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks.
IEEE Trans. Vehicular Technology, 2011

An Analytic Hierarchy Process-Based Risk Assessment Method for Wireless Networks.
IEEE Trans. Reliability, 2011

Attacks against process control systems: risk assessment, detection, and response.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
A graph approach to quantitative analysis of control-flow obfuscating transformations.
IEEE Trans. Information Forensics and Security, 2009

Hands-on oriented curriculum and laboratory development for embedded system design.
SIGBED Review, 2009

Understanding the physical and economic consequences of attacks on control systems.
IJCIP, 2009

OSNP: Secure wireless authentication protocol using one-time key.
Computers & Security, 2009

Provable Secure AKA Scheme with Reliable Key Delegation in UMTS.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

2008
SWOON: A Testbed for Secure Wireless Overlay Networks.
Proceedings of the Workshop on Cyber Security and Test, 2008

2007
Design methodology and hands-on practices for Embedded Operating Systems.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

2006
Kannon: Ubiquitous Sensor/Actuator Technologies for Elderly Living and Care: A Multidisciplinary Effort in National Chiao Tung University, Taiwan.
Proceedings of the IEEE International Conference on Systems, 2006

A control flow obfuscation method to discourage malicious tampering of software codes.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2004
Efficient key distribution schemes for secure media delivery in pay-TV systems.
IEEE Trans. Multimedia, 2004

2003
Optimal information-dispersal for fault-tolerant communication over a burst-error channel.
IEEE Trans. Reliability, 2003

2000
Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack.
IEEE Internet Computing, 2000

A Generic Electronic Payment Model Supporting Multiple Merchant Transactions.
Computers & Security, 2000

Practical Key Distribution Schemes for Channel Protection.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
An Efficient Authentication Protocol for Mobile Networks.
J. Inf. Sci. Eng., 1999


  Loading...