Po-Ching Lin
Orcid: 0000-0001-8294-5857
According to our database1,
Po-Ching Lin
authored at least 78 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology.
IEEE Trans. Netw. Serv. Manag., August, 2024
Intelligent Aerial Relay Deployment for Enhancing Connectivity in Emergency Communications.
IEEE Trans. Veh. Technol., June, 2024
Multim. Tools Appl., June, 2024
Sustainable and lightweight domain-based intrusion detection system for in-vehicle network.
Sustain. Comput. Informatics Syst., January, 2024
Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey.
IEEE Access, 2024
Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement.
IEEE Access, 2024
2023
J. Inf. Secur. Appl., November, 2023
Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection.
Comput. Secur., June, 2023
Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation.
Comput. Networks, June, 2023
Veh. Commun., 2023
Toward the Age of Intelligent Vehicular Networks for Connected and Autonomous Vehicles in 6G.
IEEE Netw., 2023
Eng. Appl. Artif. Intell., 2023
Proceedings of the IEEE Military Communications Conference, 2023
Mutual Authentication between Aerial Base Stations and Core Network: A Lightweight Security Scheme.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023
Deep Learning-Based Localization and Outlier Removal Integration Model for Indoor Surveillance.
Proceedings of the IEEE International Conference on Communications, 2023
Efficient Aerial Relaying Station Path Planning for Emergency Event-based Communications.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
2022
Controllable Path Planning and Traffic Scheduling for Emergency Services in the Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics.
J. Inf. Secur. Appl., 2022
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions.
J. Inf. Secur. Appl., 2022
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?
IEEE Secur. Priv., 2022
Towards the Age of Intelligent Vehicular Networks for Connected and Autonomous Vehicles in 6G.
CoRR, 2022
Machine Learning With Variational AutoEncoder for Imbalanced Datasets in Intrusion Detection.
IEEE Access, 2022
Proceedings of the New Trends in Computer Technologies and Applications, 2022
2021
CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection.
J. Netw. Comput. Appl., 2021
IEEE Commun. Surv. Tutorials, 2021
Robust Positioning-based Verification Scheme for Enhancing Reliability of Vehicle Platoon Control.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
Platoon-based Vehicle Coordination Scheme for Resolving Sudden Traffic Jam in the IoV Era.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
2020
IEEE Trans. Veh. Technol., 2020
A Beamforming Signal-Based Verification Scheme for Data Sharing in 5G Vehicular Networks.
IEEE Access, 2020
IEEE Access, 2020
SSOV: A Single Sign-on Protocol for Accessing Vehicular Application Services with the Support of Secret Credential Management System.
Proceedings of the International Computer Symposium, 2020
2019
IEEE Commun. Lett., 2019
Preventing the attempts of abusing cheap-hosting Web-servers for monetization attacks.
CoRR, 2019
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019
2018
Toward Optimal Resource Allocation of Virtualized Network Functions for Hierarchical Datacenters.
IEEE Trans. Netw. Serv. Manag., 2018
IEEE Netw., 2018
Towards load-balanced service chaining by Hash-based Traffic Steering on Softswitches.
J. Netw. Comput. Appl., 2018
Proceedings of the 15th International Symposium on Pervasive Systems, 2018
2017
Secur. Commun. Networks, 2017
Optimal Placement of Network Security Monitoring Functions in NFV-Enabled Data Centers.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017
Proceedings of the 2017 International Conference on Computing, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Hash-based load balanced traffic steering on softswitches for chaining virtualized network functions.
Proceedings of the IEEE International Conference on Communications, 2017
2016
IEEE Syst. J., 2016
Secur. Commun. Networks, 2016
An Anomaly Detection Framework Based on ICA and Bayesian Classification for IaaS Platforms.
KSII Trans. Internet Inf. Syst., 2016
Unintentional and Involuntary Personal Information Leakage on Facebook from User Interactions.
KSII Trans. Internet Inf. Syst., 2016
Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization.
Computer, 2016
2015
IEEE/ACM Trans. Netw., 2015
An extended SDN architecture for network function virtualization with a case study on intrusion prevention.
IEEE Netw., 2015
Proceedings of the 2nd Workshop on Mobile Gaming, MobiGames@MobiSys 2015, Florence, Italy, 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
2014
On-the-Fly Capture and Replay Mechanisms for Multi-Port Network Devices in Operational Networks.
IEEE Trans. Netw. Serv. Manag., 2014
IEEE J. Sel. Areas Commun., 2014
2013
J. Netw. Comput. Appl., 2013
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013
2012
Int. J. Netw. Secur., 2012
IEEE Commun. Surv. Tutorials, 2012
IEEE Commun. Mag., 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
IEEE Trans. Computers, 2011
2010
On campus beta site: architecture designs, operational experience, and top product defects.
IEEE Commun. Mag., 2010
2009
Realizing a Sub-Linear Time String-Matching Algorithm With a Hardware Accelerator Using Bloom Filters.
IEEE Trans. Very Large Scale Integr. Syst., 2009
IEEE Micro, 2009
J. Netw. Comput. Appl., 2009
Proceedings of IEEE International Conference on Communications, 2009
2008
Designing and evaluating interleaving decompressing and virus scanning in a stream-based mail proxy.
J. Syst. Softw., 2008
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Inf. Syst., 2008
2007
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007
2006
Profiling and accelerating string matching algorithms in three network content security applications.
IEEE Commun. Surv. Tutorials, 2006
Computer, 2006
Proceedings of the Information Networking, 2006
2003
Evolution and Evaluation of Internet Content Delivery.
Proceedings of the International Conference on Internet Computing, 2003
Direct Web switch routing with state migration, TCP masquerade, and cookie name rewriting.
Proceedings of the Global Telecommunications Conference, 2003