[1]
Candra Ahmadi, Jiann-Liang Chen and Yi-Cheng Lai “Enhancing Cybersecurity With P-Code Analysis and XGBoost: A Novel Approach for Malicious VBA Macro Detection in Office Documents.” IEEE Access, 12: 71746-71760 (2024)
[2]
Hung-Tse Chiang, Bor-Yao Tseng, Jiann-Liang Chen and Han-Chuan Hsieh ”Trajectory Analysis in UKF: Predicting Table Tennis Ball Flight Parameters.” IT Prof., 26(3): 65-72 (2024)
[3]
Candra Ahmadi, Jiann-Liang Chen, Yu-Yi Hsiao "Zero-DCE xT: A Computational Approach to Addressing Low-Light Image Enhancement Challenges." IEEE Trans. Circuits Syst. II Express Briefs 71(9): 4401-4405 (2024)
[4]
Yi-Wei Ma, Jiann-Liang Chen, Li-Dong Chen, Yueh-Min Huang "Intelligent Clickbait News Detection System Based on Artificial Intelligence and Feature Engineering." IEEE Trans. Engineering Management 71: 12509-12518 (2024)
[5]
Hsiang-Yu Chuang, Jiann-Liang Chen and Yi-Wei Ma “Malware Detection and Classification Based on Graph Convolutional Networks and Function Call Graphs.” IT Prof., 25(3): 43-53 (2023)
[6]
Yi-Wei Ma, Jiann-Liang Chen, Yan-Ju Chen and Ying-Hsun Lai “Explainable deep learning architecture for early diagnosis of Parkinson's disease.” Soft Computing, 27(5): 2729-2738 (2023)
[7]
Bo-Xiang Wang, Jiann-Liang Chen and Chiao-Lin Yu ”An AI-Powered Network Threat Detection System.” IEEE Access, 10: 54029-54037 (2022)
[8]
Yi-Xiang Luo and Jiann-Liang Chen “Dual Attention Network Approaches to Face Forgery Video Detection.” IEEE Access, 10: 110754-110760 (2022)
[9]
Yi-Wei Ma, Chun-Yao Chang, Yen-Neng Chiang, Jiann-Liang Chen, Chih-Hung Chen, Wen-Tsung Chang, Shun-Ching Yang and Ying-Hsun Lai ”Analysis and Response Strategy of Cross-Community Rumors Using Mixed Multilayer Method for Enterprise Cyber Warriors.” IEEE Access, 10: 131386-131393 (2022)
[10]
Yi-Wei Ma, Jiann-Liang Chen, Wen-Han Kuo and Yu-Chen Chen “AI@nti-Malware: An intelligent framework for defending against malware attacks.” Journal of Information Security and Applications, 65: 103092 (2022)
[11]
Jiann-Liang Chen, Hsin-Yun Chen and Yi-Wei Ma “Intelligent LoRa-Based Positioning System.” KSII Trans. Internet Inf. Syst., 16(9): 2961-2975 (2022)
[12]
Yi-Wei Ma, Jiann-Liang Chen and Chi-Sheng Shih “An Automatic and Intelligent Internet of Things for Future Agriculture.” IT Prof., 24(6): 74-80 (2022)
[13]
Fu Jie Tey, Tin-Yu Wu and Jiann-Liang Chen “Machine Learning-based Short-term Rainfall Prediction from Sky Data.” ACM Transactions on Knowledge Discovery from Data (TKDD), 16(6): 102:1-102:18 (2022)
[14]
Yu-Chen Chen, Jiann-Liang Chen and Yi-Wei Ma “AI@TSS- Intelligent technical support scam detection system.” Journal of Information Security and Applications, 61: 102921 (2021)
[15]
Fu Jie Tey, Tin-Yu Wu, Chiao-Ling Lin and Jiann-Liang Chen “Accuracy improvements for cold-start recommendation problem using indirect relations in social networks.” Journal of Big Data, 8(1): 98 (2021).
[16]
Jiann-Liang Chen, Yi-Wei Ma and Kuan-Lung Huang “Intelligent Visual Similarity-Based Phishing Websites Detection.” Symmetry, 12(10): 1681 (2020)
[1]
I. Nyoman Putra Maharddhika, Jiann-Liang Chen "Bi-GRU Based Botnet Attack Detection: Performance Comparison Between Centralized and Federated Learning." CITS 2024: 1-7
[2]
Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen and Jian-Chang Hsu “Router Penetration Testing Based on CEM Vulnerability Assessment Criteria.” ICACT 2024, 1-6.
[3]
Pin-Shan Lin, Yi-Cheng Lai, Man-Ling Liao, Shih-Ping Chiu and Jiann-Liang Chen ”Hybrid Clustering Mechanisms for High-Efficiency Intrusion Prevention.” ICACT 2024, 1-6.
[4]
Bor-Yao Tseng, Hung-Tse Chiang, Jiann-Liang Chen and Han-Chuan Hsieh “Pitching-Motion: Pose-Based Pitch Trajectory Overlay System.” ICACT 2024, 116-121.
[5]
Jiann-Liang Chen, Zheng-Zhun Chen, Youg-Sheng Chang, Ching-Iang Li, Tien-I Kao, Yu-Ting Lin, Yu-Yi Xiao and Jian-Fu Qiu “Intrusion Detection System for AI Box Based on Machine Learning.” ICACT 2023, 111-116.
[6]
Jiann-Liang Chen, Jian-Chang Hsu, Candra Ahmadi, Bagus Tri Atmaja, Chia-Chi Lin, Siao-He Wang and Shu-Yu Lin “Development of Security Target for Router Based on ENISA Common Criteria Framework.” ICACT 2023, 117-121.
[7]
Chia-Wei Tsou, Yi-Wei Ma, Yi-Hao Tu and Jiann-Liang Chen “Security Assist Mechanisms for Industrial Control Systems with Authentication.” ICACT 2023, 186-188.
[8]
Man-Ling Liao, Chiao-Lin Yu, Yi-Cheng Lai, Shih-Ping Chiu and Jiann-Liang Chen “An Intelligent Cyber Threat Classification System.” ICACT 2023, 189-194.
[9]
Yi-Cheng Lai, Chiao-Lin Yu, Man-Ling Liao, Yu-Shan Lin, Yao-Chung Chang and Jiann-Liang Chen “An Intelligence Defense System with SNORT Rules.” ICACT 2023, 249-254.
[10]
Jiann-Liang Chen, Zheng-Zhun Chen, Youg-Sheng Chang, Ching-Iang Li, Tien-I Kao, Yu-Ting Lin, Yu-Yi Xiao and Jian-Fu Qiu “AI-Based Intrusion Detection System for Secure AI BOX Applications.” ICAIIC 2023, 360-364.
[11]
Yi-Hao Tu, Yi-Wei Ma, Zhi-Xiang Li, Jiann-Liang Chen and Kazuya Tsukamoto “Applying Deep Reinforcement Learning for Self-organizing Network Architecture.” ICKII 2023, 16-20.
[12]
Jiann-Liang Chen, Zheng-Zhun Chen, Youg-Sheng Chang, Ching-Iang Li, Tien-I Kao, Yu-Ting Lin, Yu-Yi Xiao and Jian-Fu Qiu “AI BOX: Artificial intelligence-based autonomous abnormal network traffic response mechanism.” ICOIN 2023, 592-595.
[13]
Zhen-Yuan Pan, Jiann-Liang Chen and Yao-Chung Chang “Low-Latency Computation Offloading based on 5G Edge Computing Systems.” ICACT 2022, 95-100.
[14]
Chih-Ting Shen, Yu-Yi Xiao, Yi-Wei Ma, Jiann-Liang Chen, Cheng-Mou Chiang, Shiang-Jiun Chen and Yu-Chuan Pan “Security Threat Analysis and Treatment Strategy for ORAN.” ICACT 2022, 417-422.
[15]
Yao-Chung Chang, Yi-Wei Ma and Jiann-Liang Chen “A High-Efficiency Mobility Load Balancing System Architecture for Hybrid Mobile Cell Network.” SmartIoT 2022, 254-255.
[16]
Yu-Hung Chen and Jiann-Liang Chen “Intelligent Learning Architecture with Hybrid Features for Phishing Detection.” ICUFN 2021, 225-230.
[17]
Bo-Xiang Wang, Jiann-Liang Chen and Chiao-Lin Yu “Cyber Security Threat Intelligence Monitoring and Classification.” ISI 2021, 1-3.
[18]
Yi-Wei Ma, Jiann-Liang Chen and Wei-Kuan Shih “The Survey for Next Generation Mobile Networks Framework Applied to Intelligent Internet of Medical.” SmartIoT 2021, 267-270.
[19]
Wang-You Tsai, Tzu-Chuan Chou, Jiann-Liang Chen, Yi-Wei Ma and Chen-Jui Huang “Blockchain as a Platform for Secure Cloud Computing Services.” ICACT 2020, 155-158.
[20]
Yu-Chen Chen, Yi-Wei Ma and Jiann-Liang Chen “Intelligent Malicious URL Detection with Feature Analysis.” ISCC 2020, 1-5.
[1]
林宗男、周立德、陳煥、趙涵捷、賴文彬、陳俊良,「SOHO網路閘道器-實作與VoIP應用」,知城, 2007。
[2]
陳俊良、陳明僑, 「藍芽個人區域網路之高效能互連機制設計及行動功能開發」, 工程科技通訊, 電機類, 第87期, pp.33-37, 2006。
[3]
Y.C. Chang, M.T. Lin, H.C. Chao and J.L. Chen, “Bluetooth Scatternet Using an Ad Hoc Bridge Node Routing Protocol for Outdoor Distance Education” Chapter IV of Future Directions in Distance Learning and Communication Technologies, Information Science Publishing, Page 76-93, 2006.
[4]
RFID Middleware之點對點Smartphone應用介面 (證字第J-18-00-950001號;95/5/1)
[5]
RFID Middleware之點對點PDA應用介面 (證字第J-18-00-950002號;95/5/1)
[6]
遠端異質性區域網路之管理架構與診斷方法 (台灣專利; 200906102; 2009/02/01)
[7]
Managing Architecture and Diagnostic Method for Remote Configuration of Heterogeneous Local Networks (美國專利; 20090034424; 2009/02/05)
[8]
無線射頻辨識讀取器之管理系統/RFID READER MANAGEMENT SYSTEM (發明專利申請; 關貿網路股份有限公司)