Chun-Ying Huang

Full Publication List

[ | ]

Journal

  1. Yi-Hsien Chen, Si-Chen Lin, Szu-Chun Huang, Chin-Laung Lei, and Chun-Ying Huang, "Guided Malware Sample Analysis based on Graph Neural Networks," IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 4128--4143, June 2023.
    @article{chen2023_CLHLH, author = {Yi-Hsien Chen and Si-Chen Lin and Szu-Chun Huang and Chin-Laung Lei and Chun-Ying Huang}, title = {Guided Malware Sample Analysis based on Graph Neural Networks}, journal = {IEEE Transactions on Information Forensics and Security}, pages = {4128--4143}, month = {6}, year = {2023} }
  2. Chung-Kuan Chen, Si-Chen Lin, Szu-Chun Huang, Yung-Tien Chu, Chin-Laung Lei, and Chun-Ying Huang, "Building Machine Learning-based Threat Hunting System from Scratch," ACM Digital Threats: Research and Practice, Vol. 3, No. 3, pp. 1--21, September 2022.
    @article{chen2022_CLHCLH, author = {Chung-Kuan Chen and Si-Chen Lin and Szu-Chun Huang and Yung-Tien Chu and Chin-Laung Lei and Chun-Ying Huang}, title = {Building Machine Learning-based Threat Hunting System from Scratch}, journal = {ACM Digital Threats: Research and Practice}, number = {3}, pages = {1--21}, month = {9}, year = {2022} }
  3. Chih-Fan Hsu, Yu-Lun Chang, Chun-Ying Huang, and Xin Liu, "Measuring Objective Visual Quality of Real-Time Communication Systems in the Wild," International Journal of Semantic Computing, Vol. 16, No. 2, pp. 257--280, June 2022.
    @article{hsu2022_HCHL, author = {Chih-Fan Hsu and Yu-Lun Chang and Chun-Ying Huang and Xin Liu}, title = {Measuring Objective Visual Quality of Real-Time Communication Systems in the Wild}, journal = {International Journal of Semantic Computing}, number = {2}, pages = {257--280}, month = {6}, year = {2022} }
  4. Chih-Hsun Lin, Chia-Mu Yu, and Chun-Ying Huang, "DPView: Differentially Private Data Synthesis through Domain Size Information," IEEE Internet of Things Journal, Vol. 9, No. 17, pp. 15886--15900, February 2022.
    @article{lin2022_LYH, author = {Chih-Hsun Lin and Chia-Mu Yu and Chun-Ying Huang}, title = {DPView: Differentially Private Data Synthesis through Domain Size Information}, journal = {IEEE Internet of Things Journal}, number = {17}, pages = {15886--15900}, month = {2}, year = {2022} }
  5. Chi-Yu Li, Hsin-Yi Wang, Wei-Ching Wang, and Chun-Ying Huang, "Privacy Leakage and Protection of InputConnection Interface in Android," IEEE Transactions on Network and Service Management, Vol. 18, No. 3, pp. 3309--3323, September 2021.
    @article{li2021_LWWH, author = {Chi-Yu Li and Hsin-Yi Wang and Wei-Ching Wang and Chun-Ying Huang}, title = {Privacy Leakage and Protection of InputConnection Interface in Android}, journal = {IEEE Transactions on Network and Service Management}, number = {3}, pages = {3309--3323}, month = {9}, year = {2021} }
  6. Chun-Ying Huang, Yun-Chen Cheng, Guan-Zhang Huang, Ching-Ling Fan, and Cheng-Hsin Hsu, "On the Performance Comparisons of Native and Clientless Real-Time Screen Sharing Technologies," ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 17, No. 2, pp. 1--26, June 2021.
    @article{huang2021_HCHFH, author = {Chun-Ying Huang and Yun-Chen Cheng and Guan-Zhang Huang and Ching-Ling Fan and Cheng-Hsin Hsu}, title = {On the Performance Comparisons of Native and Clientless Real-Time Screen Sharing Technologies}, journal = {ACM Transactions on Multimedia Computing, Communications and Applications}, number = {2}, pages = {1--26}, month = {6}, year = {2021} }
  7. Ching-Ling Fan, Shou-Cheng Yen, Chun-Ying Huang, and Cheng-Hsin Hsu, "On the Optimal Encoding Ladder of Tiled 360◦ Videos for Head-Mounted Virtual Reality," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 31, No. 4, pp. 1632--1647, April 2021.
    @article{fan2021_FYHH, author = {Ching-Ling Fan and Shou-Cheng Yen and Chun-Ying Huang and Cheng-Hsin Hsu}, title = {On the Optimal Encoding Ladder of Tiled 360◦ Videos for Head-Mounted Virtual Reality}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, number = {4}, pages = {1632--1647}, month = {4}, year = {2021} }
  8. Ching-Ling Fan, Shou-Cheng Yen, Chun-Ying Huang, and Cheng-Hsin Hsu, "Optimizing Fixation Prediction Using Recurrent Neural Networks for 360◦ Video Streaming in Head-Mounted Virtual Reality," IEEE Transactions on Multimedia, Vol. 22, No. 3, pp. 744--759, March 2020.
    @article{fan2020_FYHH, author = {Ching-Ling Fan and Shou-Cheng Yen and Chun-Ying Huang and Cheng-Hsin Hsu}, title = {Optimizing Fixation Prediction Using Recurrent Neural Networks for 360◦ Video Streaming in Head-Mounted Virtual Reality}, journal = {IEEE Transactions on Multimedia}, number = {3}, pages = {744--759}, month = {3}, year = {2020} }
  9. Chun-Nan Lu, Chun-Ying Huang, Ying-Dar Lin, and Yuan-Cheng Lai, "High Performance Traffic Classification based on Message Size Sequence and Distribution," Journal of Network and Computer Applications, Vol. 76, pp. 60--74, December 2016.
    @article{lu2016_LHLL, author = {Chun-Nan Lu and Chun-Ying Huang and Ying-Dar Lin and Yuan-Cheng Lai}, title = {High Performance Traffic Classification based on Message Size Sequence and Distribution}, journal = {Journal of Network and Computer Applications}, pages = {60--74}, month = {12}, year = {2016} }
  10. Chih-Fan Hsu, Ching-Ling Fan, Tsung-Han Tsai, Chun-Ying Huang, Cheng-Hsin Hsu, and Kuan-Ta Chen, "Toward an Adaptive Screencast Platform: Measurement and Optimization," ACM Transactions on Multimedia Computing Communications and Applications, Vol. 12, No. 5s, pp. 1--25, November 2016.
    @article{hsu2016_HFTHHC, author = {Chih-Fan Hsu and Ching-Ling Fan and Tsung-Han Tsai and Chun-Ying Huang and Cheng-Hsin Hsu and Kuan-Ta Chen}, title = {Toward an Adaptive Screencast Platform: Measurement and Optimization}, journal = {ACM Transactions on Multimedia Computing Communications and Applications}, number = {5s}, pages = {1--25}, month = {11}, year = {2016} }
  11. Wei Cai, Ryan Shea, Chun-Ying Huang, Kuan-Ta Chen, Jiangchuan Liu, Victor C. M. Leung, and Cheng-Hsin Hsu, "A Survey on Cloud Gaming: Future of Computer Games," IEEE Access, Vol. 4, pp. 7605--7620, August 2016.
    @article{cai2016_CSHCLLH, author = {Wei Cai and Ryan Shea and Chun-Ying Huang and Kuan-Ta Chen and Jiangchuan Liu and Victor C. M. Leung and Cheng-Hsin Hsu}, title = {A Survey on Cloud Gaming: Future of Computer Games}, journal = {IEEE Access}, pages = {7605--7620}, month = {8}, year = {2016} }
  12. Pin-Yu Chen, Ching-Chao Lin, Shin-Ming Cheng, Hsu-Chun Hsiao, and Chun-Ying Huang, "Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack," IEEE Communications Magazine, Vol. 54, No. 6, pp. 75--81, June 2016.
    @article{chen2016_CLCHH, author = {Pin-Yu Chen and Ching-Chao Lin and Shin-Ming Cheng and Hsu-Chun Hsiao and Chun-Ying Huang}, title = {Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack}, journal = {IEEE Communications Magazine}, number = {6}, pages = {75--81}, month = {6}, year = {2016} }
  13. Wei Cai, Ryan Shea, Chun-Ying Huang, Kuan-Ta Chen, Jiangchuan Liu, Victor C. M. Leung, and Cheng-Hsin Hsu, "The Future of Cloud Gaming," Proceedings of IEEE, Vol. 104, No. 4, pp. 687--691, April 2016.
    @article{cai2016_CSHCLLH, author = {Wei Cai and Ryan Shea and Chun-Ying Huang and Kuan-Ta Chen and Jiangchuan Liu and Victor C. M. Leung and Cheng-Hsin Hsu}, title = {The Future of Cloud Gaming}, journal = {Proceedings of IEEE}, number = {4}, pages = {687--691}, month = {4}, year = {2016} }
  14. Hua-Jun Hong, Chih-Fan Hsu, Tsung-Han Tsai, Chun-Ying Huang, Kuan-Ta Chen, and Cheng-Hsin Hsu, "Enabling Adaptive Cloud Gaming in an Open-Source Cloud Gaming Platform," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 25, No. 12, pp. 2078--2091, December 2015.
    @article{hong2015_HHTHCH, author = {Hua-Jun Hong and Chih-Fan Hsu and Tsung-Han Tsai and Chun-Ying Huang and Kuan-Ta Chen and Cheng-Hsin Hsu}, title = {Enabling Adaptive Cloud Gaming in an Open-Source Cloud Gaming Platform}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, number = {12}, pages = {2078--2091}, month = {12}, year = {2015} }
  15. Chun-Ying Huang, Ying-Dar Lin, Peng-Yu Liao, and Yuan-Cheng Lai, "Stateful Traffic Replay for Web Application Proxies," Security and Communication Networks, Vol. 8, No. 6, pp. 970--981, April 2015.
    @article{huang2015_HLLL, author = {Chun-Ying Huang and Ying-Dar Lin and Peng-Yu Liao and Yuan-Cheng Lai}, title = {Stateful Traffic Replay for Web Application Proxies}, journal = {Security and Communication Networks}, number = {6}, pages = {970--981}, month = {4}, year = {2015} }
  16. Shang-Pin Ma, Chun-Ying Huang, Yong-Yi Fanjiang, and Jong-Yih Kuo, "Configurable RESTful Service Mashup: A Process-Data-Widget Approach," Applied Mathematics & Information Sciences, Vol. 9, No. 2L, pp. 637--644, April 2015.
    @article{ma2015_MHFK, author = {Shang-Pin Ma and Chun-Ying Huang and Yong-Yi Fanjiang and Jong-Yih Kuo}, title = {Configurable RESTful Service Mashup: A Process-Data-Widget Approach}, journal = {Applied Mathematics & Information Sciences}, number = {2L}, pages = {637--644}, month = {4}, year = {2015} }
  17. Hsing-Kuo Pao, Yuh-Jye Lee, and Chun-Ying Huang, "Statistical Learning Methods for Information Security: Fundamentals and Case Studies," Applied Stochastic Models in Business and Industry, Vol. 31, No. 2, pp. 97--113, March 2015.
    @article{pao2015_PLH, author = {Hsing-Kuo Pao and Yuh-Jye Lee and Chun-Ying Huang}, title = {Statistical Learning Methods for Information Security: Fundamentals and Case Studies}, journal = {Applied Stochastic Models in Business and Industry}, number = {2}, pages = {97--113}, month = {3}, year = {2015} }
  18. Hua-Jun Hong, De-Yu Chen, Chun-Ying Huang, Kuan-Ta Chen, and Cheng-Hsin Hsu, "Placing Virtual Machines to Optimize Cloud Gaming Experience," IEEE Transactions on Cloud Computing, Vol. 3, No. 1, pp. 42--53, January 2015.
    @article{hong2015_HCHCH, author = {Hua-Jun Hong and De-Yu Chen and Chun-Ying Huang and Kuan-Ta Chen and Cheng-Hsin Hsu}, title = {Placing Virtual Machines to Optimize Cloud Gaming Experience}, journal = {IEEE Transactions on Cloud Computing}, number = {1}, pages = {42--53}, month = {1}, year = {2015} }
  19. Kuochen Wang, Chun-Ying Huang, Li-Yang Tsai, and Ying-Dar Lin, "Behavior-based Botnet Detection in Parallel," Security and Communication Networks, Vol. 7, No. 11, pp. 1849--1859, November 2014.
    @article{wang2014_WHTL, author = {Kuochen Wang and Chun-Ying Huang and Li-Yang Tsai and Ying-Dar Lin}, title = {Behavior-based Botnet Detection in Parallel}, journal = {Security and Communication Networks}, number = {11}, pages = {1849--1859}, month = {11}, year = {2014} }
  20. Ying-Dar Lin, Chun-Ying Huang, Matthew Wright, and Georgios Kambourakis, "Mobile Application Security," IEEE Computer, Vol. 47, No. 6, pp. 21--23, June 2014. (Guest Editoral)
    @article{lin2014_LHWK, author = {Ying-Dar Lin and Chun-Ying Huang and Matthew Wright and Georgios Kambourakis}, title = {Mobile Application Security}, journal = {IEEE Computer}, number = {6}, pages = {21--23}, month = {6}, year = {2014} }
  21. Chun-Ying Huang, Shang-Pin Ma, Ming-Lun Chang, Ching-Hsiang Chiu, and Ting-Chun Huang, "An Open and Automated Android Behavior Monitor in Cloud," Journal of Internet Technology, Vol. 15, No. 2, pp. 297--305, March 2014.
    @article{huang2014_HMCCH, author = {Chun-Ying Huang and Shang-Pin Ma and Ming-Lun Chang and Ching-Hsiang Chiu and Ting-Chun Huang}, title = {An Open and Automated Android Behavior Monitor in Cloud}, journal = {Journal of Internet Technology}, number = {2}, pages = {297--305}, month = {3}, year = {2014} }
  22. Kuan-Ta Chen, Yu-Chun Chang, Hwai-Jung Hsu, De-Yu Chen, Chun-Ying Huang, and Cheng-Hsin Hsu, "On the Quality of Service of Cloud Gaming Systems," IEEE Transactions on Multimedia, Vol. 16, No. 2, pp. 480--495, February 2014.
    @article{chen2014_CCHCHH, author = {Kuan-Ta Chen and Yu-Chun Chang and Hwai-Jung Hsu and De-Yu Chen and Chun-Ying Huang and Cheng-Hsin Hsu}, title = {On the Quality of Service of Cloud Gaming Systems}, journal = {IEEE Transactions on Multimedia}, number = {2}, pages = {480--495}, month = {2}, year = {2014} }
  23. Chun-Ying Huang, Kuan-Ta Chen, De-Yu Chen, Hwai-Jung Hsu, and Cheng-Hsin Hsu, "GamingAnywhere: The First Open Source Cloud Gaming System," ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 10, No. 1s, pp. 1:1--1:21, January 2014.
    @article{huang2014_HCCHH, author = {Chun-Ying Huang and Kuan-Ta Chen and De-Yu Chen and Hwai-Jung Hsu and Cheng-Hsin Hsu}, title = {GamingAnywhere: The First Open Source Cloud Gaming System}, journal = {ACM Transactions on Multimedia Computing, Communications and Applications}, number = {1s}, pages = {1:1--1:21}, month = {1}, year = {2014} }
  24. Chun-Ying Huang, "Effective Bot Host Detection Based on Network Failure Models," Computer Networks, Vol. 57, No. 2, pp. 514--525, February 2013.
    @article{huang2013_H, author = {Chun-Ying Huang}, title = {Effective Bot Host Detection Based on Network Failure Models}, journal = {Computer Networks}, number = {2}, pages = {514--525}, month = {2}, year = {2013} }
  25. Chun-Nan Lu, Chun-Ying Huang, Ying-Dar Lin, and Yuan-Cheng Lai, "Session Level Flow Classification by Packet Size Distribution and Flow Grouping," Computer Networks, Vol. 56, No. 1, pp. 260--272, January 2012.
    @article{lu2012_LHLL, author = {Chun-Nan Lu and Chun-Ying Huang and Ying-Dar Lin and Yuan-Cheng Lai}, title = {Session Level Flow Classification by Packet Size Distribution and Flow Grouping}, journal = {Computer Networks}, number = {1}, pages = {260--272}, month = {1}, year = {2012} }
  26. Kuochen Wang, Chun-Ying Huang, Shang-Jyh Lin, and Ying-Dar Lin, "A Fuzzy Pattern-based Filtering Algorithm for Botnet Detection," Computer Networks, Vol. 55, No. 15, pp. 3275--3286, October 2011.
    @article{wang2011_WHLL, author = {Kuochen Wang and Chun-Ying Huang and Shang-Jyh Lin and Ying-Dar Lin}, title = {A Fuzzy Pattern-based Filtering Algorithm for Botnet Detection}, journal = {Computer Networks}, number = {15}, pages = {3275--3286}, month = {10}, year = {2011} }
  27. Chun-Ying Huang, Shang-Pin Ma, and Kuan-Ta Chen, "Using One-Time Passwords to Prevent Password Phishing Attacks," Journal of Network and Computer Applications, Vol. 34, No. 4, pp. 1292--1301, July 2011.
    @article{huang2011_HMC, author = {Chun-Ying Huang and Shang-Pin Ma and Kuan-Ta Chen}, title = {Using One-Time Passwords to Prevent Password Phishing Attacks}, journal = {Journal of Network and Computer Applications}, number = {4}, pages = {1292--1301}, month = {7}, year = {2011} }
  28. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, and Chin-Laung Lei, "Secure Multicast in Dynamic Environments," Computer Networks, Vol. 51, No. 10, pp. 2805--2817, July 2007.
    @article{huang2007_HCCL, author = {Chun-Ying Huang and Yun-Peng Chiu and Kuan-Ta Chen and Chin-Laung Lei}, title = {Secure Multicast in Dynamic Environments}, journal = {Computer Networks}, number = {10}, pages = {2805--2817}, month = {7}, year = {2007} }
  29. Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, and Chin-Laung Lei, "Quantifying Skype User Satisfaction," ACM Computer Communication Review, Vol. 36, No. 4, pp. 399--410, August 2006.
    @article{chen2006_CHHL, author = {Kuan-Ta Chen and Chun-Ying Huang and Polly Huang and Chin-Laung Lei}, title = {Quantifying Skype User Satisfaction}, journal = {ACM Computer Communication Review}, number = {4}, pages = {399--410}, month = {8}, year = {2006} }

Conference

  1. Yu-Lin Tsai, Chia-Yi Hsu, Chulin Xie, Chih-Hsun Lin, Jia-You Chen, Bo Li, Pin-Yu Chen, Chia-Mu Yu, and Chun-Ying Huang, "Ring-a-Bell! How reliable are concept removal methods for diffusion models?," Proceedings of The Twelfth International Conference on Learning Representations (ICLR), May 2024.
    @inproceedings{tsai2024_THXLCLCYH, author = {Yu-Lin Tsai and Chia-Yi Hsu and Chulin Xie and Chih-Hsun Lin and Jia-You Chen and Bo Li and Pin-Yu Chen and Chia-Mu Yu and Chun-Ying Huang}, title = {Ring-a-Bell! How reliable are concept removal methods for diffusion models?}, booktitle = {Proceedings of The Twelfth International Conference on Learning Representations (ICLR)}, month = {5}, year = {2024} }
  2. Yuan-Chun Sun, I-Chun Huang, Yuang Shi, Wei Tsang Ooi, Chun-Ying Huang, and Cheng-Hsin Hsu, "A Dynamic 3D Point Cloud Dataset for Immersive Applications," Proceedings of ACM SIGMM Conference on Multimedia Systems (MMSys), pp. 376--383, June 2023. (Dataset Track)
    @inproceedings{sun2023_SHSOHH, author = {Yuan-Chun Sun and I-Chun Huang and Yuang Shi and Wei Tsang Ooi and Chun-Ying Huang and Cheng-Hsin Hsu}, title = {A Dynamic 3D Point Cloud Dataset for Immersive Applications}, booktitle = {Proceedings of ACM SIGMM Conference on Multimedia Systems (MMSys)}, pages = {376--383}, month = {6}, year = {2023} }
  3. Ping-Jui Chuang, Chih-Fan Hsu, Yun-Tien Chu, Szu-Chun Huang, and Chun-Ying Huang, "Towards a Utopia of Dataset Sharing: A Case Study on MachineLearning-based Malware Detection Algorithms," Proceedings of ACM ASIA Conference on Computer and Communications Security (ASIACCS), pp. 479--493, May 2022.
    @inproceedings{chuang2022_CHCHH, author = {Ping-Jui Chuang and Chih-Fan Hsu and Yun-Tien Chu and Szu-Chun Huang and Chun-Ying Huang}, title = {Towards a Utopia of Dataset Sharing: A Case Study on MachineLearning-based Malware Detection Algorithms}, booktitle = {Proceedings of ACM ASIA Conference on Computer and Communications Security (ASIACCS)}, pages = {479--493}, month = {5}, year = {2022} }
  4. Yi-Hsien Chen, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, and Chun-Ying Huang, "POSTER: Construct macOS Cyber Range for Red/Blue Teams," Proceedings of ACM ASIA Conference on Computer and Communications Security (ASIACCS), pp. 934--936, October 2020.
    @inproceedings{chen2020_CLCLH, author = {Yi-Hsien Chen and Yen-Da Lin and Chung-Kuan Chen and Chin-Laung Lei and Chun-Ying Huang}, title = {POSTER: Construct macOS Cyber Range for Red/Blue Teams}, booktitle = {Proceedings of ACM ASIA Conference on Computer and Communications Security (ASIACCS)}, pages = {934--936}, month = {10}, year = {2020} }
  5. Chung-Yi Lin, Chia-Wei Tien, and Chun-Ying Huang, "Boosting Fuzzing Performance with Differential Seed Scheduling," Proceedings of IEEE Asia Joint Conference on Information Security (AsiaJCIS), pp. 72--79, August 2019.
    @inproceedings{lin2019_LTH, author = {Chung-Yi Lin and Chia-Wei Tien and Chun-Ying Huang}, title = {Boosting Fuzzing Performance with Differential Seed Scheduling}, booktitle = {Proceedings of IEEE Asia Joint Conference on Information Security (AsiaJCIS)}, pages = {72--79}, month = {8}, year = {2019} }
  6. Wei-Chieh Chao, Si-Chen Lin, Yi-Hsien Chen, Chin-Wei Tien, and Chun-Ying Huang, "Design and Implement Binary Fuzzing based on libFuzzer," Proceedings of IEEE Conference on Dependable and Secure Computing, December 2018.
    @inproceedings{chao2018_CLCTH, author = {Wei-Chieh Chao and Si-Chen Lin and Yi-Hsien Chen and Chin-Wei Tien and Chun-Ying Huang}, title = {Design and Implement Binary Fuzzing based on libFuzzer}, booktitle = {Proceedings of IEEE Conference on Dependable and Secure Computing}, month = {12}, year = {2018} }
  7. Shang-Pin Ma, Yen Chuang, Ci-Wei Lan, Hsi-Min Chen, Chun-Ying Huang, and Chia-Yu Li, "Scenario-Based Microservice Retrieval Using Word2Vec," Proceedings of IEEE International Conference on e-Business Engineering, pp. 239--244, October 2018.
    @inproceedings{ma2018_MCLCHL, author = {Shang-Pin Ma and Yen Chuang and Ci-Wei Lan and Hsi-Min Chen and Chun-Ying Huang and Chia-Yu Li}, title = {Scenario-Based Microservice Retrieval Using Word2Vec}, booktitle = {Proceedings of IEEE International Conference on e-Business Engineering}, pages = {239--244}, month = {10}, year = {2018} }
  8. Chih-Fan Hsu, Anthony Chen, Cheng-Hsin Hsu, Chun-Ying Huang, Chin-Laung Lei, and Kuan-Ta Chen, "Is Foveated Rendering Perceivable to VR Users? A Study on the Efficiency and Consistency of Subjective Assessment Methods," Proceedings of ACM Multimedia, pp. 55--63, October 2017.
    @inproceedings{hsu2017_HCHHLC, author = {Chih-Fan Hsu and Anthony Chen and Cheng-Hsin Hsu and Chun-Ying Huang and Chin-Laung Lei and Kuan-Ta Chen}, title = {Is Foveated Rendering Perceivable to VR Users? A Study on the Efficiency and Consistency of Subjective Assessment Methods}, booktitle = {Proceedings of ACM Multimedia}, pages = {55--63}, month = {10}, year = {2017} }
  9. Wen-Chih Lo, Ching-Ling Fan, Jean Lee, Chun-Ying Huang, Kuan-Ta Chen, and Cheng-Hsin Hsu, "360° Video Viewing Dataset in Head-Mounted Virtual Reality," Proceedings of ACM SIGMM Conference on Multimedia Systems (MMSys), pp. 211--216, June 2017. (Dataset Track)
    @inproceedings{lo2017_LFLHCH, author = {Wen-Chih Lo and Ching-Ling Fan and Jean Lee and Chun-Ying Huang and Kuan-Ta Chen and Cheng-Hsin Hsu}, title = {360° Video Viewing Dataset in Head-Mounted Virtual Reality}, booktitle = {Proceedings of ACM SIGMM Conference on Multimedia Systems (MMSys)}, pages = {211--216}, month = {6}, year = {2017} }
  10. Ching-Ling Fan, Jean Lee, Wen-Chih Lo, Chun-Ying Huang, Kuan-Ta Chen, and Cheng-Hsin Hsu, "Fixation Prediction for 360° Video Streaming to Head-Mounted Displays," Proceedings of ACM NOSSDAV, pp. 67--72, June 2017.
    @inproceedings{fan2017_FLLHCH, author = {Ching-Ling Fan and Jean Lee and Wen-Chih Lo and Chun-Ying Huang and Kuan-Ta Chen and Cheng-Hsin Hsu}, title = {Fixation Prediction for 360° Video Streaming to Head-Mounted Displays}, booktitle = {Proceedings of ACM NOSSDAV}, pages = {67--72}, month = {6}, year = {2017} }
  11. Chun-Ying Huang, Ching-Ling Fan, Chih-Fan Hsu, Hsin-Yu Chang, Tsung-Han Tsai, Kuan-Ta Chen, and Cheng-Hsin Hsu, "Smart Beholder: An Extensible Smart Lens Platform," Proceedings of ACM Multimedia, pp. 1164–-1168, October 2016. (Open Source Software Competition Track)
    @inproceedings{huang2016_HFHCTCH, author = {Chun-Ying Huang and Ching-Ling Fan and Chih-Fan Hsu and Hsin-Yu Chang and Tsung-Han Tsai and Kuan-Ta Chen and Cheng-Hsin Hsu}, title = {Smart Beholder: An Extensible Smart Lens Platform}, booktitle = {Proceedings of ACM Multimedia}, pages = {1164–-1168}, month = {10}, year = {2016} }
  12. Pin-Chun Wang, Ching-Ling Fan, Chun-Ying Huang, Kuan-Ta Chen, and Cheng-Hsin Hsu, "Towards Ultra-Low-Bitrate Video Conferencing Using Facial Landmarks," Proceedings of ACM Multimedia, pp. 561--565, October 2016.
    @inproceedings{wang2016_WFHCH, author = {Pin-Chun Wang and Ching-Ling Fan and Chun-Ying Huang and Kuan-Ta Chen and Cheng-Hsin Hsu}, title = {Towards Ultra-Low-Bitrate Video Conferencing Using Facial Landmarks}, booktitle = {Proceedings of ACM Multimedia}, pages = {561--565}, month = {10}, year = {2016} }
  13. Chun-Ying Huang, Chih-Fan Hsu, Tsung-Han Tsai, Ching-Ling Fan, Cheng-Hsin Hsu, and Kuan-Ta Chen, "Smart Beholder: An Open-Source Smart Lens for Mobile Photography," Proceedings of ACM Multimedia, pp. 351--360, October 2015.
    @inproceedings{huang2015_HHTFHC, author = {Chun-Ying Huang and Chih-Fan Hsu and Tsung-Han Tsai and Ching-Ling Fan and Cheng-Hsin Hsu and Kuan-Ta Chen}, title = {Smart Beholder: An Open-Source Smart Lens for Mobile Photography}, booktitle = {Proceedings of ACM Multimedia}, pages = {351--360}, month = {10}, year = {2015} }
  14. Chun-Ying Huang, Ching-Hsiang Chiu, Chih-Hung Lin, and Han-Wei Tzeng, "Code Coverage Measurement for Android Dynamic Analysis Tools," Proceedings of IEEE Mobile Services, pp. 209--216, June 2015.
    @inproceedings{huang2015_HCLT, author = {Chun-Ying Huang and Ching-Hsiang Chiu and Chih-Hung Lin and Han-Wei Tzeng}, title = {Code Coverage Measurement for Android Dynamic Analysis Tools}, booktitle = {Proceedings of IEEE Mobile Services}, pages = {209--216}, month = {6}, year = {2015} }
  15. Chun-Ying Huang, Yu-Ling Huang, Yu-Hsuan Chi, Kuan-Ta Chen, and Cheng-Hsin Hsu, "To Cloud or Not to Cloud: Measuring the Performance of Mobile Gaming," Proceedings of ACM MobiGames, pp. 19--24, May 2015.
    @inproceedings{huang2015_HHCCH, author = {Chun-Ying Huang and Yu-Ling Huang and Yu-Hsuan Chi and Kuan-Ta Chen and Cheng-Hsin Hsu}, title = {To Cloud or Not to Cloud: Measuring the Performance of Mobile Gaming}, booktitle = {Proceedings of ACM MobiGames}, pages = {19--24}, month = {5}, year = {2015} }
  16. Chih-Fan Hsu, Tsung-Han Tsai, Chun-Ying Huang, Cheng-Hsin Hsu, and Kuan-Ta Chen, "Screencast Dissected: Performance Measurements and Design Considerations," Proceedings of ACM SIGMM Conference on Multimedia Systems (MMSys), pp. 177--188, March 2015.
    @inproceedings{hsu2015_HTHHC, author = {Chih-Fan Hsu and Tsung-Han Tsai and Chun-Ying Huang and Cheng-Hsin Hsu and Kuan-Ta Chen}, title = {Screencast Dissected: Performance Measurements and Design Considerations}, booktitle = {Proceedings of ACM SIGMM Conference on Multimedia Systems (MMSys)}, pages = {177--188}, month = {3}, year = {2015} }
  17. Hua-Jun Hong, Tao-Ya Fan-Chiang, Che-Rung Lee, Kuan-Ta Chen, Chun-Ying Huang, and Cheng-Hsin Hsu, "GPU Consolidation for Cloud Games: Are We There Yet?," Proceedings of IEEE/ACM NetGames, December 2014.
    @inproceedings{hong2014_HFLCHH, author = {Hua-Jun Hong and Tao-Ya Fan-Chiang and Che-Rung Lee and Kuan-Ta Chen and Chun-Ying Huang and Cheng-Hsin Hsu}, title = {GPU Consolidation for Cloud Games: Are We There Yet?}, booktitle = {Proceedings of IEEE/ACM NetGames}, month = {12}, year = {2014} }
  18. Chun-Ying Huang, Po-Han Chen, Yu-Ling Huang, Kuan-Ta Chen, and Cheng-Hsin Hsu, "Measuring the Client Performance and Energy Consumption in Mobile Cloud Gaming," Proceedings of IEEE/ACM NetGames, December 2014.
    @inproceedings{huang2014_HCHCH, author = {Chun-Ying Huang and Po-Han Chen and Yu-Ling Huang and Kuan-Ta Chen and Cheng-Hsin Hsu}, title = {Measuring the Client Performance and Energy Consumption in Mobile Cloud Gaming}, booktitle = {Proceedings of IEEE/ACM NetGames}, month = {12}, year = {2014} }
  19. Kuan-Ta Chen, Chun-Ying Huang, and Cheng-Hsin Hsu, "Cloud Gaming Onward: Research Opportunities and Outlook," Proceedings of IEEE International Workshop on Cloud Gaming Systems and Networks (C-Game), pp. 1--4, July 2014.
    @inproceedings{chen2014_CHH, author = {Kuan-Ta Chen and Chun-Ying Huang and Cheng-Hsin Hsu}, title = {Cloud Gaming Onward: Research Opportunities and Outlook}, booktitle = {Proceedings of IEEE International Workshop on Cloud Gaming Systems and Networks (C-Game)}, pages = {1--4}, month = {7}, year = {2014} }
  20. Chun-Ying Huang, Cheng-Hsin Hsu, De-Yu Chen, and Kuan-Ta Chen, "Quantifying User Satisfaction in Mobile Cloud Games," Proceedings of ACM Workshop on Mobile Video (MoVid), pp. 1--6, March 2014.
    @inproceedings{huang2014_HHCC, author = {Chun-Ying Huang and Cheng-Hsin Hsu and De-Yu Chen and Kuan-Ta Chen}, title = {Quantifying User Satisfaction in Mobile Cloud Games}, booktitle = {Proceedings of ACM Workshop on Mobile Video (MoVid)}, pages = {1--6}, month = {3}, year = {2014} }
  21. Hua-Jun Hong, De-Yu Chen, Chun-Ying Huang, Kuan-Ta Chen, and Cheng-Hsin Hsu, "QoE-Aware Virtual Machine Placement for Cloud Games," Proceedings of the 12th Annual Workshop on Network and Systems Support for Games (NetGames), December 2013.
    @inproceedings{hong2013_HCHCH, author = {Hua-Jun Hong and De-Yu Chen and Chun-Ying Huang and Kuan-Ta Chen and Cheng-Hsin Hsu}, title = {QoE-Aware Virtual Machine Placement for Cloud Games}, booktitle = {Proceedings of the 12th Annual Workshop on Network and Systems Support for Games (NetGames)}, month = {12}, year = {2013} }
  22. Chun-Ying Huang, De-Yu Chen, Cheng-Hsin Hsu, and Kuan-Ta Chen, "GamingAnywhere: An Open-Source Cloud Gaming Testbed," Proceedings of ACM SIGMM Conference on Multimedia, pp. 827--830, October 2013. (Open Source Software Competition Track)
    @inproceedings{huang2013_HCHC, author = {Chun-Ying Huang and De-Yu Chen and Cheng-Hsin Hsu and Kuan-Ta Chen}, title = {GamingAnywhere: An Open-Source Cloud Gaming Testbed}, booktitle = {Proceedings of ACM SIGMM Conference on Multimedia}, pages = {827--830}, month = {10}, year = {2013} }
  23. Chun-Ying Huang, Cheng-Hsin Hsu, Yu-Chun Chang, and Kuan-Ta Chen, "GamingAnywhere: An Open Cloud Gaming System," Proceedings of ACM SIGMM Conference on Multimedia Systems (MMSys), pp. 36--47, February 2013.
    @inproceedings{huang2013_HHCC, author = {Chun-Ying Huang and Cheng-Hsin Hsu and Yu-Chun Chang and Kuan-Ta Chen}, title = {GamingAnywhere: An Open Cloud Gaming System}, booktitle = {Proceedings of ACM SIGMM Conference on Multimedia Systems (MMSys)}, pages = {36--47}, month = {2}, year = {2013} }
  24. Chun-Ying Huang, Yi-Ting Tsai, and Chung-Han Hsu, "Performance Evaluation on Permission-Based Detection for Android Malware," Proceedings of International Computer Symposium (ICS), pp. 111--120, December 2012.
    @inproceedings{huang2012_HTH, author = {Chun-Ying Huang and Yi-Ting Tsai and Chung-Han Hsu}, title = {Performance Evaluation on Permission-Based Detection for Android Malware}, booktitle = {Proceedings of International Computer Symposium (ICS)}, pages = {111--120}, month = {12}, year = {2012} }
  25. Kuan-Ta Chen, Yu-Chun Chang, Po-Han Tseng, Chun-Ying Huang, and Chin-Laung Lei, "Measuring the Latency of Cloud Gaming Systems," Proceedings of ACM Multimedia, pp. 1269–-1272, November 2011.
    @inproceedings{chen2011_CCTHL, author = {Kuan-Ta Chen and Yu-Chun Chang and Po-Han Tseng and Chun-Ying Huang and Chin-Laung Lei}, title = {Measuring the Latency of Cloud Gaming Systems}, booktitle = {Proceedings of ACM Multimedia}, pages = {1269–-1272}, month = {11}, year = {2011} }
  26. Chun-Ying Huang, Shang-Pin Ma, Wei-Lin Yeh, Chia-Yi Lin, and Chien-Tsung Liu, "Mitigate Web Phishing Using Site Signatures," Proceedings of IEEE Region 10 Conference, pp. 803--808, November 2010.
    @inproceedings{huang2010_HMYLL, author = {Chun-Ying Huang and Shang-Pin Ma and Wei-Lin Yeh and Chia-Yi Lin and Chien-Tsung Liu}, title = {Mitigate Web Phishing Using Site Signatures}, booktitle = {Proceedings of IEEE Region 10 Conference}, pages = {803--808}, month = {11}, year = {2010} }
  27. Chun-Ying Huang, Chi-Ming Chen, Shu-Ping Yu, Sheng-Yao Hsu, and Chih-Hung Lin, "Accelerate In-Line Packet Processing Using Fast Queue," Proceedings of IEEE Region 10 Conference, pp. 1048--1052, November 2010.
    @inproceedings{huang2010_HCYHL, author = {Chun-Ying Huang and Chi-Ming Chen and Shu-Ping Yu and Sheng-Yao Hsu and Chih-Hung Lin}, title = {Accelerate In-Line Packet Processing Using Fast Queue}, booktitle = {Proceedings of IEEE Region 10 Conference}, pages = {1048--1052}, month = {11}, year = {2010} }
  28. Chun-Ying Huang, Shang-Pin Ma, Ching-Hong Wu, Chi-Ming Chen, and Chih-Hung Lin, "Observe Internet Peer-to-Peer Activities at Home," Proceedings of IEEE International Conference on Communication Systems, pp. 595--599, November 2010.
    @inproceedings{huang2010_HMWCL, author = {Chun-Ying Huang and Shang-Pin Ma and Ching-Hong Wu and Chi-Ming Chen and Chih-Hung Lin}, title = {Observe Internet Peer-to-Peer Activities at Home}, booktitle = {Proceedings of IEEE International Conference on Communication Systems}, pages = {595--599}, month = {11}, year = {2010} }
  29. Ching-Hsiang Hsu, Chun-Ying Huang, and Kuan-Ta Chen, "Fast-Flux Bot Detection in Real Time," Proceedings of International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 464--483, September 2010.
    @inproceedings{hsu2010_HHC, author = {Ching-Hsiang Hsu and Chun-Ying Huang and Kuan-Ta Chen}, title = {Fast-Flux Bot Detection in Real Time}, booktitle = {Proceedings of International Symposium on Recent Advances in Intrusion Detection (RAID)}, pages = {464--483}, month = {9}, year = {2010} }
  30. Shang-Pin Ma, Jong-Yih Kuo, Yong-Yi Fanjiang, Chin-Pin Tung, and Chun-Ying Huang, "Optimal Service Selection for Composition Based on Weighted Service Flow and Genetic Algorithm," Proceedings of International Conference on Machine Learning and Cybernetics, July 2010.
    @inproceedings{ma2010_MKFTH, author = {Shang-Pin Ma and Jong-Yih Kuo and Yong-Yi Fanjiang and Chin-Pin Tung and Chun-Ying Huang}, title = {Optimal Service Selection for Composition Based on Weighted Service Flow and Genetic Algorithm}, booktitle = {Proceedings of International Conference on Machine Learning and Cybernetics}, month = {7}, year = {2010} }
  31. Chen-Chi Wu, Kuan-Ta Chen, Chun-Ying Huang, and Chin-Laung Lei, "An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger," Proceedings of ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 97--102, June 2009.
    @inproceedings{wu2009_WCHL, author = {Chen-Chi Wu and Kuan-Ta Chen and Chun-Ying Huang and Chin-Laung Lei}, title = {An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger}, booktitle = {Proceedings of ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video}, pages = {97--102}, month = {6}, year = {2009} }
  32. Chun-Ying Huang and Chin-Laung Lei, "Bounding Peer-to-Peer Upload Traffic in Client Networks," Proceedings of IEEE International Conference on Dependable Systems and Network (DSN), pp. 759--769, June 2007.
    @inproceedings{huang2007_HL, author = {Chun-Ying Huang and Chin-Laung Lei}, title = {Bounding Peer-to-Peer Upload Traffic in Client Networks}, booktitle = {Proceedings of IEEE International Conference on Dependable Systems and Network (DSN)}, pages = {759--769}, month = {6}, year = {2007} }
  33. Jiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, and Chin-Laung Lei, "Design and Implementation of Secure Communication Channels over UPnP Networks," Proceedings of International Workshop on Smart Living Space, pp. 307--312, April 2007.
    @inproceedings{lee2007_LHLL, author = {Jiunn-Jye Lee and Chun-Ying Huang and Li-Yuan Lee and Chin-Laung Lei}, title = {Design and Implementation of Secure Communication Channels over UPnP Networks}, booktitle = {Proceedings of International Workshop on Smart Living Space}, pages = {307--312}, month = {4}, year = {2007} }
  34. Yu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, and Chun-Ying Huang, "Confessible Threshold Ring Signatures," Proceedings of IEEE International Conference on Systems and Networks Communications, November 2006.
    @inproceedings{chen2006_CLCH, author = {Yu-Shian Chen and Chin-Laung Lei and Yun-Peng Chiu and Chun-Ying Huang}, title = {Confessible Threshold Ring Signatures}, booktitle = {Proceedings of IEEE International Conference on Systems and Networks Communications}, month = {11}, year = {2006} }
  35. Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, and Chin-Laung Lei, "Building High-Performance, Reconfigurable Bandwidth Controllers with Adaptive Clustering," Proceedings of IEEE International Conference on Systems and Networks Communications, November 2006.
    @inproceedings{chiu2006_CLTHL, author = {Chien-Hua Chiu and Chin-Yen Lee and Pan-Lung Tsai and Chun-Ying Huang and Chin-Laung Lei}, title = {Building High-Performance, Reconfigurable Bandwidth Controllers with Adaptive Clustering}, booktitle = {Proceedings of IEEE International Conference on Systems and Networks Communications}, month = {11}, year = {2006} }
  36. Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, and Chin-Laung Lei, "Quantifying Skype User Satisfaction," Proceedings of ACM SIGCOMM, pp. 399--410, September 2006.
    @inproceedings{chen2006_CHHL, author = {Kuan-Ta Chen and Chun-Ying Huang and Polly Huang and Chin-Laung Lei}, title = {Quantifying Skype User Satisfaction}, booktitle = {Proceedings of ACM SIGCOMM}, pages = {399--410}, month = {9}, year = {2006} }
  37. Chun-Ying Huang, Kuan-Ta Chen, and Chin-Laung Lei, "Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter," Proceedings of IEEE International Conference on Dependable Systems and Network (DSN), pp. 403--412, June 2006.
    @inproceedings{huang2006_HCL, author = {Chun-Ying Huang and Kuan-Ta Chen and Chin-Laung Lei}, title = {Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter}, booktitle = {Proceedings of IEEE International Conference on Dependable Systems and Network (DSN)}, pages = {403--412}, month = {6}, year = {2006} }
  38. Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, and Chin-Laung Lei, "An Empirical Evaluation of TCP Performance in Online Games," Proceedings of ACM SIGCHI International Conference on Advances in Computer Entertainment Technology (ACE), June 2006.
    @inproceedings{chen2006_CHHL, author = {Kuan-Ta Chen and Chun-Ying Huang and Polly Huang and Chin-Laung Lei}, title = {An Empirical Evaluation of TCP Performance in Online Games}, booktitle = {Proceedings of ACM SIGCHI International Conference on Advances in Computer Entertainment Technology (ACE)}, month = {6}, year = {2006} }
  39. Kuan-Ta Chen, Polly Huang, Guo-Shiuan Wang, Chun-Ying Huang, and Chin-Laung Lei, "On the Sensitivity of Online Game Playing Time to Network QoS," Proceedings of the IEEE INFOCOM, pp. 1--12, April 2006.
    @inproceedings{chen2006_CHWHL, author = {Kuan-Ta Chen and Polly Huang and Guo-Shiuan Wang and Chun-Ying Huang and Chin-Laung Lei}, title = {On the Sensitivity of Online Game Playing Time to Network QoS}, booktitle = {Proceedings of the IEEE INFOCOM}, pages = {1--12}, month = {4}, year = {2006} }
  40. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, and Chin-Laung Lei, "A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy Cryptography," Proceedings of the ACM Symposium on InformAtion, Computer, and Communications Security (ASIACCS), pp. 359--359, March 2006. (Short Paper)
    @inproceedings{huang2006_HCCL, author = {Chun-Ying Huang and Yun-Peng Chiu and Kuan-Ta Chen and Chin-Laung Lei}, title = {A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy Cryptography}, booktitle = {Proceedings of the ACM Symposium on InformAtion, Computer, and Communications Security (ASIACCS)}, pages = {359--359}, month = {3}, year = {2006} }
  41. Yun-Peng Chiu, Chin-Laung Lei, and Chun-Ying Huang, "Secure Multicast Using Proxy Encryption," Proceedings of International Conference on Information and Communications Security, pp. 280--290, December 2005.
    @inproceedings{chiu2005_CLH, author = {Yun-Peng Chiu and Chin-Laung Lei and Chun-Ying Huang}, title = {Secure Multicast Using Proxy Encryption}, booktitle = {Proceedings of International Conference on Information and Communications Security}, pages = {280--290}, month = {12}, year = {2005} }
  42. Pan-Lung Tsai, Chun-Ying Huang, Yun-Yin Huang, Chia-Chang Hsu, and Chin-Laung Lei, "A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec Virtual Private Networks," Procddeings of the 12th Internal Conference on High Performance Computing (HiPC), pp. 432--443, December 2005.
    @inproceedings{tsai2005_THHHL, author = {Pan-Lung Tsai and Chun-Ying Huang and Yun-Yin Huang and Chia-Chang Hsu and Chin-Laung Lei}, title = {A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec Virtual Private Networks}, booktitle = {Procddeings of the 12th Internal Conference on High Performance Computing (HiPC)}, pages = {432--443}, month = {12}, year = {2005} }
  43. Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, and Zsehong Tsai, "An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing," Proceedings of International Symposium on Pacific Rim Dependable Computing (PRDC), December 2005.
    @inproceedings{kuo2005_KTLHTLKHT, author = {Jen-Hao Kuo and Siong-Ui Te and Pang-Ting Liao and Chun-Ying Huang and Pan-Lung Tsai and Chin-Laung Lei and Sy-Yen Kuo and Yennun Huang and Zsehong Tsai}, title = {An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing}, booktitle = {Proceedings of International Symposium on Pacific Rim Dependable Computing (PRDC)}, month = {12}, year = {2005} }
  44. Hann-Huei Chiou, Pan-Lung Tsai, Jiunn-Jye Lee, Hsing-Fu Tung, Chun-Ying Huang, and Chin-Laung Lei, "Extending Cluster File Systems beyond Last Miles," Proceedings of IEEE Region 10 Conference, pp. 1--6, November 2005.
    @inproceedings{chiou2005_CTLTHL, author = {Hann-Huei Chiou and Pan-Lung Tsai and Jiunn-Jye Lee and Hsing-Fu Tung and Chun-Ying Huang and Chin-Laung Lei}, title = {Extending Cluster File Systems beyond Last Miles}, booktitle = {Proceedings of IEEE Region 10 Conference}, pages = {1--6}, month = {11}, year = {2005} }
  45. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann-Huei Chiou, and Chin-Laung Lei, "Secure Content Delivery using Key Composition," Proceedings of IEEE Conference on Local Computer Networks (LCN), pp. 484--485, November 2005.
    @inproceedings{huang2005_HCCCL, author = {Chun-Ying Huang and Yun-Peng Chiu and Kuan-Ta Chen and Hann-Huei Chiou and Chin-Laung Lei}, title = {Secure Content Delivery using Key Composition}, booktitle = {Proceedings of IEEE Conference on Local Computer Networks (LCN)}, pages = {484--485}, month = {11}, year = {2005} }
  46. Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, and Chin-Laung Lei, "Game Traffic Analysis: An MMORPG Perspective," Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV), pp. 19--24, June 2005.
    @inproceedings{chen2005_CHHL, author = {Kuan-Ta Chen and Polly Huang and Chun-Ying Huang and Chin-Laung Lei}, title = {Game Traffic Analysis: An MMORPG Perspective}, booktitle = {Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV)}, pages = {19--24}, month = {6}, year = {2005} }
  47. Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, and Chin-Laung Lei, "The Impact of Network Variabilities on TCP Clocking Schemes," Proceedings of the IEEE Global Internet Symposium, pp. 97--102, March 2005.
    @inproceedings{chen2005_CHHL, author = {Kuan-Ta Chen and Polly Huang and Chun-Ying Huang and Chin-Laung Lei}, title = {The Impact of Network Variabilities on TCP Clocking Schemes}, booktitle = {Proceedings of the IEEE Global Internet Symposium}, pages = {97--102}, month = {3}, year = {2005} }

Domestic

  1. 吳苡瑄 and 黃俊穎, "針對Python網頁框架設計之最小權限控管機制," 2023 Cryptology and Information Security Conference, CISC 2023, June 2023.
  2. 張智諺 and 黃俊穎, "使用代理伺服器與快照機制對 Linux 核心內部遠端檔案系統進行灰箱模糊測試," 2023 Cryptology and Information Security Conference, CISC 2023, June 2023.
  3. 杜萬珩 and 黃俊穎, "結合動態 iCFG 的平行定向模糊測試," 2023 Cryptology and Information Security Conference, CISC 2023, June 2023.
  4. 陳冠廷 and 黃俊穎, "目標導向模糊測試的高效率標的引導方法," 2023 Cryptology and Information Security Conference, CISC 2023, June 2023.
  5. 徐曼妮 and 黃俊穎, "針對緩解程式碼重用攻擊的完整路徑檢查機制," 2023 Cryptology and Information Security Conference, CISC 2023, June 2023.
  6. 莊秉叡, 王聖銘, and 黃俊穎, "效能保留的訓練特徵轉換方式," 2021 Cryptology and Information Security Conference, CISC 2021, August 2021. (** Best paper honorable mention)
  7. 張禾金 and 黃俊穎, "全系統廣告阻擋軟體的隱憂與挑戰," Communications of the CCISA, Vol. 27, No. 1, February 2021.
  8. 藍建元, 田家瑋, and 黃俊穎, "androidPF : 一個在 Android 上可指定過濾封包規則的應用程式," 2020 Cryptology and Information Security Conference, CISC 2020, September 2020. (** Best student paper honorable mention)
  9. 郎宇傑, 簡旭彤, 田家瑋, and 黃俊穎, "癱瘓行動通訊網路:系統化的 EPC 模糊測試分析," 2020 Cryptology and Information Security Conference, CISC 2020, September 2020.
  10. 黃德賢, 田家瑋, and 黃俊穎, "針對 WiFi 基地台認證者的模糊測試機制," 2020 Cryptology and Information Security Conference, CISC 2020, September 2020.
  11. 黃昭銘, 鐘彥杰, 田家瑋, and 黃俊穎, "深度學習應用於演算法生成網域偵測之能力與成效," 2019 Cryptology and Information Security Conference, CISC 2019, May 2019. (** Best student paper honorable mention)
  12. 楊凱均, 連培知, 田謹維, and 黃俊穎, "自動化通訊協定欄位解析之模糊測試系統," 2018 Taiwan Academic Network Conference, TANet 2018, October 2018.
  13. 李家治, 楊光傑, 田謹維, and 黃俊穎, "行動應用程式安全傳輸技術之實作與攻擊," 2017 Taiwan Academic Network Conference, TANet 2017, October 2017.
  14. 曾瀚緯, 黃俊穎, 黃友亮, 李昀陞, and 田謹維, "行動軟體自動化安全評估機制之設計與實作," 2016 Cryptology and Information Security Conference, CISC 2016, May 2016.
  15. 邱敬翔, 曾瀚緯, 田謹維, and 黃俊穎, "量測Android動態分析工具之檢測能力," 2015 Cryptology and Information Security Conference, CISC 2015, May 2015.
  16. 黃兆淳, 黃郁菱, 曾瀚緯, and 黃俊穎, "虛擬機上雲端遊戲效能之觀察與比較," 2014 Taiwan Conference on Software Engineering, TCSE2014, June 2014.
  17. 陳柏翰, 祁羽旋, 曾瀚緯, and 黃俊穎, "行動裝置上雲端遊戲效能之觀察與分析," 2014 Taiwan Conference on Software Engineering, TCSE2014, June 2014.
  18. 許中瀚, 黃郁菱, 祁羽旋, 張銘倫, and 黃俊穎, "基於CFG進行Android惡意程式偵測的可用性分析," 2014 Cryptology and Information Security Conference, CISC 2014, May 2014. (**Best student paper)
  19. 黃亭鈞, 祁羽旋, 黃郁菱, and 黃俊穎, "雲端分享與金鑰管理機制之探討與設計," 2014 Cryptology and Information Security Conference, CISC 2014, May 2014.
  20. 許中瀚, 張銘倫, 邱敬翔, 陳柏瀚, and 黃俊穎, "基於靜態分析的複合式Android惡意程式偵測機制," 2013 National Computer Symposium, NCS 2013, December 2013.
  21. 董文碩, 陳柏翰, 黃兆淳, and 黃俊穎, "基於CFG的Android惡意程式特徵碼之自動產生器," 2013 Cryptology and Information Security Conference, CISC 2013, May 2013. (**Best student paper honorable mention)
  22. 蔡伊婷, 許中瀚, and 黃俊穎, "基於Android執行權限之軟體分析與分群," 2012 Taiwan Academic Network Conference, TANet 2012, October 2012.
  23. 黃亭鈞, 邱敬翔, 張銘倫, and 黃俊穎, "Android應用程式行為自動分析系統之設計與實作," 2012 Taiwan Academic Network Conference, TANet 2012, October 2012. (**Best paper)
  24. 鍾委璋, 黃俊穎, and 許中瀚, "增進Linux VPN效能之軟體架構設計與實作," 2012 Taiwan Conference on Software Engineering, TCSE 2012, July 2012.
  25. 許勝堯, 黃俊穎, 董文碩, and 黃兆淳, "基於動態分析的軟體相似度偵測系統," 2012 Cryptology and Information Security Conference, CISC 2012, May 2012. (**Best student paper honerable mention)
  26. 余淑萍, 黃俊穎, 王省閔, and 陳柏瀚, "被動式即時偵測匿蹤殭屍網路之技術研究," 2012 Cryptology and Information Security Conference, CISC 2012, May 2012.
  27. 吳慶鴻, 董文碩, 王省閔, and 黃俊穎, "網際網路垃圾流量的分類與分群," 2011 Joint Conference on Software Engineering and Object-Oriented Technology and Applications, TCSE/OOTA 2011, July 2011. (**Best paper)
  28. 林佳宜, 黃俊穎, 鍾委璋, and 王省閔, "基於連線錯誤模型的殭屍主機偵測技術," 2011 Cryptology and Information Security Conference, CISC 2011, May 2011. (**Best student paper)
  29. 陳麒名, 余淑萍, 黃俊穎, 馬尚彬, and 林志鴻, "在線式封包處理效能提升架構之設計與實作," 2010 Taiwan Academic Network Conference, TANET 2010, October 2010.
  30. 許景翔, 黃俊穎, and 陳昇瑋, "匿蹤殭屍電腦之即時偵測與研究分析," Communications of the CCISA, Vol. 16, No. 3, pp. 72--94, July 2010.
  31. 葉瑋霖, 陳麒名, 吳慶鴻, 林志鴻, and 黃俊穎, "利用可識別的站台特徵防止網路釣魚," 2010 Joint Conference on Object-Oriented Technology and Applications and Software Engineering, OOTA/TCSE 2010, July 2010.
  32. 楊尊宇, 林佳宜, 陳麒名, 劉建宗, and 黃俊穎, "利用即時訊息傳送一次性通行碼之可擴展服務架構," 2010 Joint Conference on Object-Oriented Technology and Applications and Software Engineering, OOTA/TCSE 2010, July 2010.

Contact

+886-3-5731875
+886-3-5721490
chuang@cs.nycu.edu.tw
[Office] Room 417, [Lab] Room 223A
Engineering Bldg 3, 1001 University Road, Hsinchu, TAIWAN 300093
(C) Copyright 2008—2024 | Chun-Ying Huang | Security and Systems Laboratory | Department of Computer Science, National Yang Ming Chiao Tung University.