Jung-Shian Li

Orcid: 0000-0002-3613-6108

According to our database1, Jung-Shian Li authored at least 109 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
VoWi-Fi security threats: Address resolution protocol attack and countermeasures.
IET Networks, March, 2024

Cover Image.
IET Networks, March, 2024

2023
Securing 5G Non-Public Networks Against Fake Base Station.
J. Robotics Netw. Artif. Life, 2023

Securing the Critical Communication in Dam Control System with SDN.
J. Robotics Netw. Artif. Life, 2023

Network Intrusion Detection Using CNN-based Classification Method.
Proceedings of the 8th IEEE/ACIS International Conference on Big Data, 2023

2022
Cross-organizational Non-repudiation Industrial Control Log System Based on Blockchain.
J. Robotics Netw. Artif. Life, 2022

Scalable ICS Honeypot Design by Description Files.
J. Robotics Netw. Artif. Life, 2022

OPC UA TSN Industrial Control System Cybersecurity Testbed.
J. Robotics Netw. Artif. Life, 2022

Data-Balancing Algorithm Based on Generative Adversarial Network for Robust Network Intrusion Detection.
J. Robotics Netw. Artif. Life, 2022

A Non-normal Warning System for Dam Operation Using Machine Learning.
Proceedings of the 24th IEEE/ACIS International Conference on Software Engineering, 2022

A New Poisoning Attacks on Deep Neural Networks.
Proceedings of the 6th International Conference on Medical and Health Informatics, 2022

Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack Tree.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2021
The Security Issue of ICS: The Use of IT Infrastructure.
J. Robotics Netw. Artif. Life, 2021

An Emulation Mechanism for PLC Communication Features.
J. Robotics Netw. Artif. Life, 2021

Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement.
J. Robotics Netw. Artif. Life, 2021

Malicious Flows Generator Based on Data Balanced Algorithm.
Proceedings of the 2021 International Conference on Fuzzy Theory and Its Applications, 2021

2020
IDS Malicious Flow Classification.
J. Robotics Netw. Artif. Life, 2020

A Novel and Efficient Blocking Scheme for Multiple Tag Identifications in a Large Scale RFID System.
Ad Hoc Sens. Wirel. Networks, 2020

Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality.
IEEE Access, 2020

The Risk of Industrial Control System Programmable Logic Controller Default Configurations.
Proceedings of the International Computer Symposium, 2020

Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Differential Privacy Protection with Group Onion Routing based on AI-based URL Classification.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2019
Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices.
J. Robotics Netw. Artif. Life, 2019

Selection Strategy for VM Migration Method.
J. Robotics Netw. Artif. Life, 2019

A novel tag searching protocol with time efficiency and searching accuracy in RFID systems.
Comput. Networks, 2019

2018
Venerability and Protection Tool Surveys of Industrial Control System.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
Low-cost localization service for roadside sensors based on passive information.
J. High Speed Networks, 2017

Exploring Global IP-Usage Patterns in Fast-Flux Service Networks.
J. Comput., 2017

Staggered approach for alleviating TCP Incast in simultaneous Multi-VM migration.
Comput. Commun., 2017

A New Colluded Adversarial VNet Embeddings Attack in Cloud.
Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017

2016
Novel intrusion prediction mechanism based on honeypot log similarity.
Int. J. Netw. Manag., 2016

Efficient tag reading protocol for large-scale RFID systems with pre-reading.
Comput. Commun., 2016

Distributed Node Scheduling Algorithms for Multiple Group Communications in Wireless Multi-hop Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

2015
<i>K</i>-anonymity against neighborhood attacks in weighted social networks.
Secur. Commun. Networks, 2015

VM scaling based on Hurst exponent and Markov transition with empirical cloud data.
J. Syst. Softw., 2015

2014
Novel Advanced Broadcast Scheme for Efficient Safety Message Collision Alleviation in Vehicular Networks.
Wirel. Pers. Commun., 2014

Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2014

Resource allocation in cloud virtual machines based on empirical service traces.
Int. J. Commun. Syst., 2014

JPEG forensics scheme for signature embedding and packet-level detection.
Int. J. Commun. Syst., 2014

A multi-hop resource scheduling algorithm for IEEE 802.16j relay networks.
Comput. Networks, 2014

An Effective Group Communications in Hybrid VANET.
Proceedings of the Intelligent Systems and Applications, 2014

2013
An Efficient Time-Bound Collision Prevention Scheme for RFID Re-Entering Tags.
IEEE Trans. Mob. Comput., 2013

A lightweight identity authentication protocol for vehicular networks.
Telecommun. Syst., 2013

Digital evidence collection for web image access.
Secur. Commun. Networks, 2013

Novel distributed key revocation scheme for wireless sensor networks.
Secur. Commun. Networks, 2013

Intelligent Adjustment Forwarding: A compromise between end-to-end and hop-by-hop transmissions in VANET environments.
J. Syst. Archit., 2013

Navigation-aware association control in vehicular wireless networks.
J. High Speed Networks, 2013

Distributed key management scheme for peer-to-peer live streaming services.
Int. J. Commun. Syst., 2013

A hierarchical mobile-agent-based security operation center.
Int. J. Commun. Syst., 2013

2012
Network-coding-based cache policy for loss recovery enhancement in reliable multicast.
Int. J. Netw. Manag., 2012

Minimizing multiplayer interactive delay in multihop wireless networks.
Int. J. Commun. Syst., 2012

Scheduling performance enhancement by network coding in wireless mesh networks.
IET Commun., 2012

Efficient group multicast node scheduling schemes in multi-hop wireless networks.
Comput. Commun., 2012

Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks.
Comput. J., 2012

2011
Star-block design in two-level survivable optical networks.
IEEE/ACM Trans. Netw., 2011

Improved IPsec performance utilizing transport-layer-aware compression architecture.
Secur. Commun. Networks, 2011

Differentiated recovery in WDM networks.
Photonic Netw. Commun., 2011

An efficient diversity-driven selective forwarding approach for replicated data queries in wireless sensor networks.
J. Syst. Archit., 2011

A hidden mutual authentication protocol for low-cost RFID tags.
Int. J. Commun. Syst., 2011

VoIP secure session assistance and call monitoring via building security gateway.
Int. J. Commun. Syst., 2011

Single-Packet IP Traceback with Less Logging.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
An Efficient P2P Content Distribution System Based on Altruistic Demand and Recoding Dissemination.
IEEE Trans. Syst. Man Cybern. Part A, 2010

An Efficient Superpeer Overlay Construction and Broadcasting Scheme Based on Perfect Difference Graph.
IEEE Trans. Parallel Distributed Syst., 2010

A novel DRM framework for peer-to-peer music content delivery.
J. Syst. Softw., 2010

Distributed K-coverage self-location estimation scheme based on Voronoi diagram.
IET Commun., 2010

Achieving maximal VoIP calls in 802.11 wireless networks.
Comput. Commun., 2010

2009
Security in wireless sensor networks.
Secur. Commun. Networks, 2009

Construct a power-efficient and space-reuse-effective dominating set using small-world model in mobile <i>ad hoc</i> networks.
Int. J. Commun. Syst., 2009

Voronoi-based relay placement scheme for wireless sensor networks.
IET Commun., 2009

Building Security Gateway.
Proceedings of the 2009 International Conference on Information Networking, 2009

2008
Medium access control protocols for wireless LANs [Guest Editorial].
IEEE Wirel. Commun., 2008

Topology-Independent Link Activation Scheduling Schemes for Mobile CDMA Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2008

A fast-convergent fairness scheme for resource allocation in RPR networks.
Int. J. Commun. Syst., 2008

Joint Topology-Transparent Scheduling and QoS Routing in Mobile Ad Hoc Networks.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

2007
Multi-Piconet Extension using a Bridge Selection Protocol with Distributed and Centralized Traffic Scheduling in Home Networks.
IEEE Trans. Consumer Electron., 2007

Achieving multipoint-to-multipoint fairness with RCNWA.
J. Syst. Archit., 2007

Effects of hotspots on throughput in mobile ad hoc networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2007

A Robust Audio Fingerprinting Scheme for MP3 Copyright.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Efficient Packet-level JPEG Forensic Data Collection.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Effective fair allocation using smart market label auction with CSLF and CR-CSFQ.
J. Syst. Softw., 2006

Random early detection with flow number estimation and queue length feedback control.
J. Syst. Archit., 2006

Core-stateless fair rate estimation fair queuing.
Int. J. Commun. Syst., 2006

Fair allocation using a fast smart market auction.
Eur. J. Oper. Res., 2006

Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks.
Comput. Commun., 2006

Improve TCP performance with a novel adaptive queue management scheme in IEEE 802.17 RPR optical networks.
Comput. Networks, 2006

Routing in Fast-Moving Mobile Ad Hoc Networks.
Proceedings of the 2006 International Conference on Wireless Networks, 2006

2005
Improving 802.11 Wireless TCP Performance with Adaptive Reed-Solomon Codes: An Experimental Study.
J. Inf. Sci. Eng., 2005

Improving fairness of TCP Vegas.
Int. J. Netw. Manag., 2005

A novel core-stateless ABR-like congestion avoidance scheme in IP networks.
Int. J. Commun. Syst., 2005

Receiver-initiated multiple access protocols for spread spectrum mobile ad hoc networks.
Comput. Commun., 2005

A Topology-Independent Link Activation Scheduling Framework in Multihop CDMA Packet Radio Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

2004
Analysis, simulation and implementation of wireless TCP flows with forward error correction.
Comput. Commun., 2004

Topology-transparent link activation scheduling schemes for multihop CDMA ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Achieving proportional DiffServ per-hop behaviour with PLQF.
Int. J. Commun. Syst., 2003

2002
Network fair bandwidth share using hash rate estimation.
Networks, 2002

An Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control.
J. Inf. Sci. Eng., 2002

EVA: a better TCP version for resource-insufficient networks.
Int. J. Commun. Syst., 2002

Using autoregressive Gaussian processes with trends and aggregations to model self-similar traffic.
Comput. Commun., 2002

Core-Stateless Labeling Fairness: An Integrated Architecture to Approximate Fair Bandwidth Allocations in High Speed Networks.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Fair bandwidth share using flow number estimation.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Providing proportional differentiated services using PLQ.
Proceedings of the Global Telecommunications Conference, 2001

2000
Measurement and in-service monitoring for QoS violations and spare capacity estimations in ATM network.
Comput. Commun., 2000

Modeling VBR traffic with autoregressive Gaussian processes.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000

1999
Measurement and Performance Evaluation of NFS Traffic in ATM Network.
Comput. Commun., 1999

Mobile Agents and Security; G. Vigna (Ed.).
Comput. Commun., 1999

LAN testing and troubleshooting; G. Held.
Comput. Commun., 1999

1998
Traffic characterization, modelling and performance analysis of ATM networks.
PhD thesis, 1998

Modelling and simulation of fractional ARIMA processes based on importance sampling.
Proceedings of the 1998 ACM symposium on Applied Computing, 1998

Fast simulation of self-similar traffic.
Proceedings of the 1998 IEEE International Conference on Communications, 1998


  Loading...