According to our database1, Yu-Lun Huang authored at least 35 papers between 1999 and 2019.
Legend:Book In proceedings Article PhD thesis Other
3aRAM: A 3-Layer AHP-Based Risk Assessment Model and its Implementation for an Industrial IoT Cloud.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Encouraging Active Learning for System Engineering Students Using Role-Exchanging Activities.
Proceedings of the Innovative Technologies and Learning - Second International Conference, 2019
MLoC: A Cloud Framework adopting Machine Learning for Industrial Automation.
Proceedings of the 12th Asian Control Conference, 2019
An AHP-Based Risk Assessment for an Industrial IoT Cloud.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
An Enhanced Handover Scheme Adopting Mobile Relays in a LTE-A Network for High-Speed Movements.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Bringing Desktop Applications to the Web.
IT Professional, 2016
CoAP Option for Capability-Based Access Control for IoT-Applications.
Proceedings of the International Conference on Internet of Things and Big Data, 2016
An Adjustable Risk Assessment Method for a Cloud System.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015
S-CBAC: A secure access control model supporting group access for Internet of Things.
Proceedings of the 2015 IEEE International Symposium on Software Reliability Engineering Workshops, 2015
Locating Anchors in WSN Using a Wearable IMU-Camera.
An Anomaly Detection Module for Firefox OS.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
A Performance Mapping Model for Physical-to-Virtual Migration.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Investigating the security control of a water system: An overview.
Proceedings of the 9th Asian Control Conference, 2013
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Vehicular Technology, 2012
Threat as a Service?: Virtualization's Impact on Cloud Security.
IT Professional, 2012
A framework for quantitative evaluation of parallel control-flow obfuscation.
Computers & Security, 2012
Security Impacts of Virtualization on a Network Testbed.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks.
IEEE Trans. Vehicular Technology, 2011
An Analytic Hierarchy Process-Based Risk Assessment Method for Wireless Networks.
IEEE Trans. Reliability, 2011
Attacks against process control systems: risk assessment, detection, and response.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
A graph approach to quantitative analysis of control-flow obfuscating transformations.
IEEE Trans. Information Forensics and Security, 2009
Hands-on oriented curriculum and laboratory development for embedded system design.
SIGBED Review, 2009
Understanding the physical and economic consequences of attacks on control systems.
OSNP: Secure wireless authentication protocol using one-time key.
Computers & Security, 2009
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
SWOON: A Testbed for Secure Wireless Overlay Networks.
Proceedings of the Workshop on Cyber Security and Test, 2008
Design methodology and hands-on practices for Embedded Operating Systems.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007
Kannon: Ubiquitous Sensor/Actuator Technologies for Elderly Living and Care: A Multidisciplinary Effort in National Chiao Tung University, Taiwan.
Proceedings of the IEEE International Conference on Systems, 2006
A control flow obfuscation method to discourage malicious tampering of software codes.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Efficient key distribution schemes for secure media delivery in pay-TV systems.
IEEE Trans. Multimedia, 2004
Optimal information-dispersal for fault-tolerant communication over a burst-error channel.
IEEE Trans. Reliability, 2003
Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack.
IEEE Internet Computing, 2000
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions.
Computers & Security, 2000
Practical Key Distribution Schemes for Channel Protection.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
An Efficient Authentication Protocol for Mobile Networks.
J. Inf. Sci. Eng., 1999