Fu-Hau Hsu

Orcid: 0000-0002-2586-5874

According to our database1, Fu-Hau Hsu authored at least 44 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
USBIPS Framework: Protecting Hosts from Malicious USB Peripherals.
CoRR, 2024

2023
Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy.
Inf., 2023

2021
DPC: A Dynamic Permission Control Mechanism for Android Third-Party Libraries.
IEEE Trans. Dependable Secur. Comput., 2021

DDoS Flood and Destination Service Changing Sensor.
Sensors, 2021

SMS Observer: A dynamic mechanism to analyze the behavior of SMS-based malware.
J. Parallel Distributed Comput., 2021

IoTD: An approach to identify E-mails sent by IoT devices.
Comput. Commun., 2021

Identifying IoT Devices with SMTP.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

2020
A passive user-side solution for evil twin access point detection at public hotspots.
Int. J. Commun. Syst., 2020

A Kernel Module Based Mechanism to Establish a TCP/IP Connection When Destination Service Changing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

2019
A solution to detect the existence of a malicious rogue AP.
Comput. Commun., 2019

Keep Rogue IoT Away: IoT Detector Based on Diversified TLS Negotiation.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
A Cloud-based Protection approach against JavaScript-based attacks to browsers.
Comput. Electr. Eng., 2018

Handover: A mechanism to improve the reliability and availability of network services for clients behind a network address translator.
Comput. Electr. Eng., 2018

2017
Detecting Web-Based Botnets Using Bot Communication Traffic Features.
Secur. Commun. Networks, 2017

A client-side detection mechanism for evil twins.
Comput. Electr. Eng., 2017

2016
Data concealments with high privacy in new technology file system.
J. Supercomput., 2016

VRS: a values-based reputation system for web services.
Secur. Commun. Networks, 2016

Libra: An Adaptive Method for Protecting Memory from Arbitrary Overwrite.
J. Comput., 2016

2015
Defeat scanning worms in cyber warfare.
Secur. Commun. Networks, 2015

Web security in a windows system as PrivacyDefender in private browsing mode.
Multim. Tools Appl., 2015

Bypass Cell-phone-verification Through a Smartphone-based Botnet.
J. Inf. Sci. Eng., 2015

The bilateral communication-based dynamic extensible honeypot.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
Visible watermarking with reversibility of multimedia images for ownership declarations.
J. Supercomput., 2014

Image reversibility in data embedding on the basis of blocking-predictions.
Peer-to-Peer Netw. Appl., 2014

Detect Fast-Flux Domains Through Response Time Differences.
IEEE J. Sel. Areas Commun., 2014

Hawkeye: Finding spamming accounts.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2013
Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion.
J. Supercomput., 2013

Reversible data hiding using side-match predictions on steganographic images.
Multim. Tools Appl., 2013

ARMORY: An automatic security testing tool for buffer overflow defect detection.
Comput. Electr. Eng., 2013

2012
Antivirus Software Shield Against Antivirus Terminators.
IEEE Trans. Inf. Forensics Secur., 2012

Dual-Watermarking by QR-code Applications in Image Processing.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

2011
BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks.
IEEE J. Sel. Areas Commun., 2011

A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks.
J. Inf. Sci. Eng., 2011

TransSQL: A Translation and Validation-Based Solution for SQL-injection Attacks.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011

Reversible Watermarking Scheme with Visibility Using Randomize Distance.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
HSP: A solution against heap sprays.
J. Syst. Softw., 2010

A Signal-Representation-Based Parser to Extract Text-Based Information from the Web.
J. Adv. Comput. Intell. Intell. Informatics, 2010

A neural tree and its application to spam e-mail detection.
Expert Syst. Appl., 2010

Actor Garbage Collection Using Vertex-Preserving Actor-to-Object Graph Transformations.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010

2006
Scalable network-based buffer overflow attack detection.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006

2004
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
A Path Information Caching and Aggregation Approach to Traffic Source Identification.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

2002
Sago: A Network Resource Management System for Real-Time Content Distribution.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

2001
RAD: A Compile-Time Solution to Buffer Overflow Attacks.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001


  Loading...