Ying-Dar Lin
Orcid: 0000-0002-5226-4396Affiliations:
- National Chiao Tung University, Hsinchu, Taiwan
According to our database1,
Ying-Dar Lin
authored at least 281 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2013, "For contributions to multi-hop cellular communications and deep packet inspection".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology.
IEEE Trans. Netw. Serv. Manag., August, 2024
Telecommun. Syst., July, 2024
Multim. Tools Appl., June, 2024
Understanding Privacy Risks of High-Accuracy Radio Positioning and Sensing in Wireless Networks.
IEEE Commun. Mag., May, 2024
Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing.
IEEE Trans. Netw. Serv. Manag., February, 2024
AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities.
J. Netw. Comput. Appl., 2024
The universal federator: A third-party authentication solution to federated cloud, edge, and fog.
J. Netw. Comput. Appl., 2024
Int. J. Commun. Syst., 2024
Two-stage multi-datasource machine learning for attack technique and lifecycle detection.
Comput. Secur., 2024
Comput. Secur., 2024
3GPP Edge-Fog federation: Transparent 3rd-party authentication and application mobility.
Comput. Commun., 2024
Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement.
IEEE Access, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Unmasking Vulnerabilities: Adversarial Attacks against DRL-based Resource Allocation in O-RAN.
Proceedings of the IEEE International Conference on Communications, 2024
Queue-Length-Based Offloading for Delay Sensitive Applications in Federated Cloud-Edge-Fog Systems.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
2023
Cost optimization of cloud-edge-fog federated systems with bidirectional offloading: one-hop versus two-hop.
Telecommun. Syst., December, 2023
Dual-uCPE for High-Availability Retailer Services with Fault Toleranceand Load Balancing.
IEEE Internet Things Mag., December, 2023
Artificial Intelligence for Internet of Things as a Service: Small or Big Data, Private or Public Model, Centralized or Federated Learning?
Computer, December, 2023
J. Inf. Secur. Appl., November, 2023
IEEE Trans. Netw. Serv. Manag., September, 2023
Cost optimization of omnidirectional offloading in two-tier cloud-edge federated systems.
J. Netw. Comput. Appl., June, 2023
Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection.
Comput. Secur., June, 2023
Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation.
Comput. Networks, June, 2023
Task Assignment and Capacity Allocation for ML-Based Intrusion Detection as a Service in a Multi-Tier Architecture.
IEEE Trans. Netw. Serv. Manag., March, 2023
Offloading Using Traditional Optimization and Machine Learning in Federated Cloud-Edge-Fog Systems: A Survey.
IEEE Commun. Surv. Tutorials, 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
Low-Latency Service Chaining With Predefined NSH-Based Multipath Across Multiple Datacenters.
IEEE Trans. Netw. Serv. Manag., December, 2022
Combined Communication and Computing Resource Scheduling in Sliced 5G Multi-Access Edge Computing Systems.
IEEE Trans. Veh. Technol., 2022
Analyzing vertical and horizontal offloading in federated cloud and edge computing systems.
Telecommun. Syst., 2022
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics.
J. Inf. Secur. Appl., 2022
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions.
J. Inf. Secur. Appl., 2022
A Survey on Offloading in Federated Cloud-Edge-Fog Systems with Traditional Optimization and Machine Learning.
CoRR, 2022
Machine Learning With Variational AutoEncoder for Imbalanced Datasets in Intrusion Detection.
IEEE Access, 2022
Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication With Application Mobility Support.
IEEE Access, 2022
Provisioning Fog Services to 3GPP Subscribers: Authentication and Application Mobility.
Proceedings of the IEEE International Conference on Communications, 2022
Prioritized Traffic Shaping for Low-latency MEC Flows in MEC-enabled Cellular Networks.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
2021
Scalable Mobile Edge Computing: A Two-Tier Multi-Site Multi-Server Architecture with Autoscaling and Offloading.
IEEE Wirel. Commun., 2021
Decentralized Configuration Protocols for Low-Cost Offloading From Multiple Edges to Multiple Vehicular Fogs.
IEEE Trans. Veh. Technol., 2021
QoS Violation Probability Minimization in Federating Vehicular-Fogs With Cloud and Edge Systems.
IEEE Trans. Veh. Technol., 2021
Scaling and Offloading Optimization in Pre-CORD and Post-CORD Multi-Access Edge Computing.
IEEE Trans. Netw. Serv. Manag., 2021
The Universal Fog Proxy: A Third-party Authentication Solution for Federated Fog Systems with Multiple Protocols.
IEEE Netw., 2021
CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection.
J. Netw. Comput. Appl., 2021
Offloading Optimization with Delay Distribution in the 3-tier Federated Cloud, Edge, and Fog Systems.
CoRR, 2021
IEEE Commun. Surv. Tutorials, 2021
O2MD²: A New Post-Quantum Cryptosystem With One-to-Many Distributed Key Management Based on Prime Modulo Double Encapsulation.
IEEE Access, 2021
Machine learning based intrusion detection as a service: task assignment and capacity allocation in a multi-tier architecture.
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021
Offloading Optimization with Delay Constraint in the 3-tier Federated Cloud, Edge, and Fog Systems.
Proceedings of the IEEE Global Communications Conference, 2021
2020
IEEE Trans. Veh. Technol., 2020
End-to-End Slicing With Optimized Communication and Computing Resource Allocation in Multi-Tenant 5G Systems.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
Workload and Capacity Optimization for Cloud-Edge Computing Systems with Vertical and Horizontal Offloading.
IEEE Trans. Netw. Serv. Manag., 2020
Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation.
IEEE Netw., 2020
ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines.
J. Netw. Comput. Appl., 2020
IEEE Internet Things Mag., 2020
Int. J. Commun. Syst., 2020
IEEE Commun. Surv. Tutorials, 2020
IEEE Commun. Surv. Tutorials, 2020
IEEE Commun. Surv. Tutorials, 2020
IEEE Commun. Surv. Tutorials, 2020
Comput. Networks, 2020
Comput. Networks, 2020
Communication and Computing Cost Optimization of Meshed Hierarchical NFV Datacenters.
IEEE Access, 2020
OMNI: Omni-directional Dual Cost Optimization of Two-Tier Federated Cloud-Edge Systems.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing.
Proceedings of the 2020 European Conference on Networks and Communications, 2020
2019
IEEE Wirel. Commun., 2019
End-to-End Slicing as a Service with Computing and Communication Resource Allocation for Multi-Tenant 5G Systems.
IEEE Wirel. Commun., 2019
IEEE Syst. J., 2019
Analytical Modelling of Software and Hardware Switches with Internal Buffer in Software-Defined Networks.
J. Netw. Comput. Appl., 2019
Performance modeling and analysis of TCP and UDP flows over software defined networks.
J. Netw. Comput. Appl., 2019
A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms.
J. Netw. Comput. Appl., 2019
Int. J. Commun. Syst., 2019
Int. J. Commun. Syst., 2019
Proactive multipath routing with a predictive mechanism in software-defined networks.
Int. J. Commun. Syst., 2019
IEEE Commun. Surv. Tutorials, 2019
IEEE Commun. Surv. Tutorials, 2019
IEEE Commun. Surv. Tutorials, 2019
IEEE Commun. Surv. Tutorials, 2019
Cost Minimization with Offloading to Vehicles in two-Tier Federated Edge and Vehicular-Fog Systems.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
2018
Wirel. Networks, 2018
Multi-Operator Fairness in Transparent RAN Sharing by Soft-Partition With Blocking and Dropping Mechanism.
IEEE Trans. Veh. Technol., 2018
Clustering and Symbolic Regression for Power Consumption Estimation on Smartphone Hardware Subsystems.
IEEE Trans. Sustain. Comput., 2018
Toward Optimal Resource Allocation of Virtualized Network Functions for Hierarchical Datacenters.
IEEE Trans. Netw. Serv. Manag., 2018
Three-Tier Capacity and Traffic Allocation for Core, Edges, and Devices for Mobile Edge Computing.
IEEE Trans. Netw. Serv. Manag., 2018
Soft Partitioning Flow Tables for Virtual Networking in Multi-Tenant Software Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
Energy Cost Optimization in Dynamic Placement of Virtualized Network Function Chains.
IEEE Trans. Netw. Serv. Manag., 2018
Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations.
IEEE Syst. J., 2018
Hierarchical CORD for NFV Datacenters: Resource Allocation with Cost-Latency Tradeoff.
IEEE Netw., 2018
Towards load-balanced service chaining by Hash-based Traffic Steering on Softswitches.
J. Netw. Comput. Appl., 2018
J. Netw. Comput. Appl., 2018
J. Netw. Comput. Appl., 2018
Int. J. Commun. Syst., 2018
IEEE Commun. Surv. Tutorials, 2018
IEEE Commun. Surv. Tutorials, 2018
IEEE Commun. Surv. Tutorials, 2018
IEEE Commun. Surv. Tutorials, 2018
Comput. Electr. Eng., 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, 2018
2017
IEEE Wirel. Commun., 2017
J. Netw. Comput. Appl., 2017
IEEE Commun. Surv. Tutorials, 2017
IEEE Commun. Surv. Tutorials, 2017
IEEE Commun. Surv. Tutorials, 2017
IEEE Commun. Surv. Tutorials, 2017
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017
Modelling Software-Defined Networking: Switch Design with Finite Buffer and Priority Queueing.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Keynote topic: Network cloudification: SDN-NFV and 5G-MEC with edge and fog computing.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017
Hash-based load balanced traffic steering on softswitches for chaining virtualized network functions.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017
2016
IEEE Trans. Sustain. Comput., 2016
The Budgeted Maximum Coverage Problem in Partially Deployed Software Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2016
IEEE Syst. J., 2016
IEEE Netw., 2016
High performance traffic classification based on message size sequence and distribution.
J. Netw. Comput. Appl., 2016
CDNPatch: a cost-effective failover mechanism for hybrid CDN-P2P live streaming systems.
Int. J. Commun. Syst., 2016
Int. J. Commun. Syst., 2016
IEICE Trans. Inf. Syst., 2016
Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization.
Computer, 2016
A joint network and server load balancing algorithm for chaining virtualized network functions.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Fast failover and switchover for link failures and congestion in software defined networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
EAI Endorsed Trans. Ubiquitous Environ., 2015
Integration of Spatial Reuse and Allocation for Downlink Broadcast in LTE-Advanced and WiMAX Relay Networks.
IEEE Trans. Veh. Technol., 2015
Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds.
IEEE Syst. J., 2015
Three-phase behavior-based detection and classification of known and unknown malware.
Secur. Commun. Networks, 2015
An extended SDN architecture for network function virtualization with a case study on intrusion prevention.
IEEE Netw., 2015
J. Netw. Comput. Appl., 2015
Comput. Commun., 2015
Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems, 2015
Proceedings of the Twenty First National Conference on Communications, 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
2014
Multihop cellular: from research to systems, standards, and applications [Guest Editorial].
IEEE Wirel. Commun., 2014
On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices.
IEEE Trans. Software Eng., 2014
On-the-Fly Capture and Replay Mechanisms for Multi-Port Network Devices in Operational Networks.
IEEE Trans. Netw. Serv. Manag., 2014
IEEE Softw., 2014
Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment.
Secur. Commun. Networks, 2014
IEEE J. Sel. Areas Commun., 2014
Calibrating parameters and formulas for process-level energy consumption profiling in smartphones.
J. Netw. Comput. Appl., 2014
Int. J. Netw. Secur., 2014
Research Roadmap Driven by Network Benchmarking Lab (NBL): Deep Packet Inspection, Traffic Forensics, Embedded Benchmarking, Software Defined Networking and Beyond.
Int. J. Netw. Comput., 2014
IEEE Secur. Priv., 2014
Computer, 2014
Reducing power consumption in LTE data scheduling with the constraints of channel condition and QoS.
Comput. Networks, 2014
Bug traces: identifying and downsizing packet traces with failures triggered in networking devices.
IEEE Commun. Mag., 2014
Proceedings of the 2014 IFIP Wireless Days, 2014
2013
Booting, browsing and streaming time profiling, and bottleneck analysis on android-based systems.
J. Netw. Comput. Appl., 2013
IEICE Trans. Inf. Syst., 2013
Creditability-based weighted voting for reducing false positives and negatives in intrusion detection.
Comput. Secur., 2013
Identifying android malicious repackaged applications by thread-grained system call sequences.
Comput. Secur., 2013
Research Roadmap Driven by Network Benchmarking Lab (NBL): Deep Packet Inspection, Traffic Forensics, Embedded Benchmarking, 4G LTE, and Beyond.
Proceedings of the First International Symposium on Computing and Networking, 2013
2012
Int. J. Netw. Secur., 2012
IEEE Commun. Surv. Tutorials, 2012
Comput. Networks, 2012
IEEE Commun. Mag., 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
Proceedings of the International Symposium on Performance Evaluation of Computer & Telecommunication Systems, 2012
2011
IEEE Trans. Veh. Technol., 2011
IEEE Trans. Computers, 2011
Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks.
IEICE Trans. Inf. Syst., 2011
NAT-Compatibility Testbed: An Environment to Automatically Verify Direct Connection Rate.
IEEE Commun. Lett., 2011
To Call or To Be Called Behind NATs is Sensitive in Solving the Direct Connection Problem.
IEEE Commun. Lett., 2011
Comput. Commun., 2011
Comput. Networks, 2011
Ad Hoc Networks, 2011
2010
IEEE Wirel. Commun., 2010
Parallel Comput., 2010
On campus beta site: architecture designs, operational experience, and top product defects.
IEEE Commun. Mag., 2010
Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks.
Proceedings of IEEE International Conference on Communications, 2010
2009
Realizing a Sub-Linear Time String-Matching Algorithm With a Hardware Accelerator Using Bloom Filters.
IEEE Trans. Very Large Scale Integr. Syst., 2009
ACM Trans. Embed. Comput. Syst., 2009
IEEE Micro, 2009
J. Netw. Comput. Appl., 2009
Int. J. Commun. Syst., 2009
Highest Urgency First (HUF): A latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Comput. Commun., 2009
Proceedings of IEEE International Conference on Communications, 2009
2008
ACM Trans. Embed. Comput. Syst., 2008
Designing and evaluating interleaving decompressing and virus scanning in a stream-based mail proxy.
J. Syst. Softw., 2008
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Inf. Syst., 2008
Erratum to "Multiple-resource request scheduling for differentiated QoS at website gateway".
Comput. Commun., 2008
Comput. Commun., 2008
On applying fair queuing discipline to schedule requests at access gateway for downlink differential QoS.
Comput. Networks, 2008
A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Deterministic high-speed root-hashing automaton matching coprocessor for embedded network processor.
SIGARCH Comput. Archit. News, 2007
Taxonomy and Evaluation of TCP-Friendly Congestion-Control Schemes on Fairness, Aggressiveness, and Responsiveness.
IEEE Netw., 2007
J. Syst. Softw., 2007
A platform-based SoC design and implementation of scalable automaton matching for deep packet inspection.
J. Syst. Archit., 2007
Co-DRR: An Integrated Uplink and Downlink Scheduler for Bandwidth Management over Wireless LANs.
IEICE Trans. Commun., 2007
Comput. Commun., 2007
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Profiling and accelerating string matching algorithms in three network content security applications.
IEEE Commun. Surv. Tutorials, 2006
Computer, 2006
Proceedings of the Information Networking, 2006
Proceedings of the Information Networking, 2006
2005
Proceedings of the Web Information Systems Engineering - WISE 2005 Workshops, 2005
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005
A Parallel Automaton String Matching with Pre-Hashing and Root-Indexing Techniques for Content Filtering Coprocessor.
Proceedings of the 16th IEEE International Conference on Application-Specific Systems, 2005
2004
Perceptual codec and interaction aware playout algorithms and quality measurements for VoIP systems.
IEEE Trans. Consumer Electron., 2004
IEEE Trans. Computers, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
IEEE Netw., 2003
IEEE Commun. Surv. Tutorials, 2003
Evolution and Evaluation of Internet Content Delivery.
Proceedings of the International Conference on Internet Computing, 2003
Scalable Transparent E-Mail Outsourcing Services for Enterprises: Design and Benchmark.
Proceedings of the International Conference on Internet Computing, 2003
Direct Web switch routing with state migration, TCP masquerade, and cookie name rewriting.
Proceedings of the Global Telecommunications Conference, 2003
2002
J. Commun. Networks, 2002
Building an Integrated Security Gateway: Mechanisms, Performance Evaluations, Implementations, and Research Issues.
IEEE Commun. Surv. Tutorials, 2002
Proceedings of the 10th Annual IEEE Symposium on High Performance Interconnects (HOTIC 2002), August 21, 2002
Proceedings of the Global Telecommunications Conference, 2002
2001
IEEE Commun. Lett., 2001
Comput. Commun., 2001
Ordered lookup with bypass matching for scalable per-flow classification in layer 4 routers.
Comput. Commun., 2001
Pre-order Deficit Round Robin: a new scheduling algorithm for packet-switched networks.
Comput. Networks, 2001
Proceedings of the Quality of Service, 2001
Guaranteed versus Controlled Load: Implications for Service Subscribers and Providers in RSVP Networks.
Proceedings of the 15th International Conference on Information Networking, 2001
Proceedings of the IEEE International Conference on Communications, 2001
Proceedings of the IEEE International Conference on Communications, 2001
Proceedings of the Global Telecommunications Conference, 2001
Bandwidth brokers of instantaneous and book-ahead requests for differentiated services networks.
Proceedings of the Global Telecommunications Conference, 2001
Proceedings of the Global Telecommunications Conference, 2001
2000
Statistically optimized minislot allocation for initial and collision resolution in hybrid fiber coaxial networks.
IEEE J. Sel. Areas Commun., 2000
J. Commun. Networks, 2000
IEEE Commun. Lett., 2000
An Investigation into HFC MAC Protocols: Mechanisms, Implementation, and Research Issues.
IEEE Commun. Surv. Tutorials, 2000
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000
1999
Int. J. Commun. Syst., 1999
1998
A timestamp-sensitive scheduling algorithm for MPEG-II multiplexers in CATV networks.
IEEE Trans. Broadcast., 1998
Allocation and scheduling algorithms for IEEE 802.14 and MCNS in hybrid fiber coaxial networks.
IEEE Trans. Broadcast., 1998
Parallel Comput., 1998
IEEE Netw., 1998
Int. J. Commun. Syst., 1998
Comput. Networks ISDN Syst., 1998
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998
1997
IEEE Trans. Broadcast., 1997
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997
Performance Analysis of Rate-based Congestion Control Scheme and Choice of High and Low Thresholds.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997
1996
Proceedings of the 1996 Network Operations and Management Symposium, 1996
Proceedings of the Proceedings 21st Conference on Local Computer Networks, 1996
1993
1991
Proceedings of the 16th Conference on Local Computer Networks, 1991
Proceedings of the 16th Conference on Local Computer Networks, 1991