Yuan-Cheng Lai
Orcid: 0000-0003-3695-5784
According to our database1,
Yuan-Cheng Lai
authored at least 224 papers
between 1996 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Networks, 2025
2024
Ratio-Based Offloading Optimization for Edge and Vehicular-Fog Federated Systems: A Multi-Agent TD3 Approach.
IEEE Trans. Veh. Technol., November, 2024
MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology.
IEEE Trans. Netw. Serv. Manag., August, 2024
Telecommun. Syst., July, 2024
Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing.
IEEE Trans. Netw. Serv. Manag., February, 2024
AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities.
J. Netw. Comput. Appl., 2024
Int. J. Commun. Syst., 2024
Two-stage multi-datasource machine learning for attack technique and lifecycle detection.
Comput. Secur., 2024
Comput. Commun., 2024
Selecting and Developing a Quantum Internet Simulator for the Needs of New Audience: Practices and Considerations.
IEEE Access, 2024
Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement.
IEEE Access, 2024
Proceedings of the 16th International Conference on Advanced Computational Intelligence, 2024
Queue-Length-Based Offloading for Delay Sensitive Applications in Federated Cloud-Edge-Fog Systems.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
2023
Dual-uCPE for High-Availability Retailer Services with Fault Toleranceand Load Balancing.
IEEE Internet Things Mag., December, 2023
Artificial Intelligence for Internet of Things as a Service: Small or Big Data, Private or Public Model, Centralized or Federated Learning?
Computer, December, 2023
J. Inf. Secur. Appl., November, 2023
Cost optimization of omnidirectional offloading in two-tier cloud-edge federated systems.
J. Netw. Comput. Appl., June, 2023
Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection.
Comput. Secur., June, 2023
Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation.
Comput. Networks, June, 2023
Task Assignment and Capacity Allocation for ML-Based Intrusion Detection as a Service in a Multi-Tier Architecture.
IEEE Trans. Netw. Serv. Manag., March, 2023
The Candlestick-Tracking Trend Decision for Day Trading on Taiwan Index Futures Market.
Proceedings of the 2023 5th International Electronics Communication Conference, 2023
2022
Combined Communication and Computing Resource Scheduling in Sliced 5G Multi-Access Edge Computing Systems.
IEEE Trans. Veh. Technol., 2022
Analyzing vertical and horizontal offloading in federated cloud and edge computing systems.
Telecommun. Syst., 2022
A Bit-Tracking Knowledge-Based Query Tree for RFID Tag Identification in IoT Systems.
Sensors, 2022
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics.
J. Inf. Secur. Appl., 2022
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions.
J. Inf. Secur. Appl., 2022
Machine Learning With Variational AutoEncoder for Imbalanced Datasets in Intrusion Detection.
IEEE Access, 2022
Proceedings of the 8th International Conference on Automation, Robotics and Applications, 2022
Proceedings of the 12th International Conference on Advanced Computer Information Technologies, 2022
Proceedings of the 12th International Conference on Advanced Computer Information Technologies, 2022
2021
QoS Violation Probability Minimization in Federating Vehicular-Fogs With Cloud and Edge Systems.
IEEE Trans. Veh. Technol., 2021
Scaling and Offloading Optimization in Pre-CORD and Post-CORD Multi-Access Edge Computing.
IEEE Trans. Netw. Serv. Manag., 2021
A Spatiotemporal-Oriented Deep Ensemble Learning Model to Defend Link Flooding Attacks in IoT Network.
Sensors, 2021
CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection.
J. Netw. Comput. Appl., 2021
Buffering and prioritization in switches for fast processing table-miss packets in software-defined networks.
Int. J. Commun. Syst., 2021
Offloading Optimization with Delay Distribution in the 3-tier Federated Cloud, Edge, and Fog Systems.
CoRR, 2021
Machine learning based intrusion detection as a service: task assignment and capacity allocation in a multi-tier architecture.
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021
Offloading Optimization with Delay Constraint in the 3-tier Federated Cloud, Edge, and Fog Systems.
Proceedings of the IEEE Global Communications Conference, 2021
2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
Workload and Capacity Optimization for Cloud-Edge Computing Systems with Vertical and Horizontal Offloading.
IEEE Trans. Netw. Serv. Manag., 2020
Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation.
IEEE Netw., 2020
ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines.
J. Netw. Comput. Appl., 2020
Int. J. Commun. Syst., 2020
A knowledge-based Query Tree with Shortcutting and Couple-Resolution for RFID tag identification.
Comput. Commun., 2020
Comput. Networks, 2020
OMNI: Omni-directional Dual Cost Optimization of Two-Tier Federated Cloud-Edge Systems.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing.
Proceedings of the 2020 European Conference on Networks and Communications, 2020
2019
IEEE Wirel. Commun., 2019
IEEE Syst. J., 2019
Social-Aware Peer Discovery for Energy Harvesting-Based Device-To-Device Communications.
Sensors, 2019
Analytical Modelling of Software and Hardware Switches with Internal Buffer in Software-Defined Networks.
J. Netw. Comput. Appl., 2019
Performance modeling and analysis of TCP and UDP flows over software defined networks.
J. Netw. Comput. Appl., 2019
A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms.
J. Netw. Comput. Appl., 2019
Proactive multipath routing with a predictive mechanism in software-defined networks.
Int. J. Commun. Syst., 2019
Privacy-Preserving Encryption-Domain Video Retrieval over the Cloud via Block Transformations of Key Frames.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019
F1ow-based Anomaly Detection Using Multilayer Perceptron in Software Defined Networks.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019
2018
Wirel. Networks, 2018
Clustering and Symbolic Regression for Power Consumption Estimation on Smartphone Hardware Subsystems.
IEEE Trans. Sustain. Comput., 2018
Three-Tier Capacity and Traffic Allocation for Core, Edges, and Devices for Mobile Edge Computing.
IEEE Trans. Netw. Serv. Manag., 2018
Soft Partitioning Flow Tables for Virtual Networking in Multi-Tenant Software Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations.
IEEE Syst. J., 2018
Hierarchical CORD for NFV Datacenters: Resource Allocation with Cost-Latency Tradeoff.
IEEE Netw., 2018
Towards load-balanced service chaining by Hash-based Traffic Steering on Softswitches.
J. Netw. Comput. Appl., 2018
J. Netw. Comput. Appl., 2018
J. Netw. Comput. Appl., 2018
Int. J. Commun. Syst., 2018
Comput. Electr. Eng., 2018
Comput. Electr. Eng., 2018
Proceedings of the 2018 International Conference on Sensors, Signal and Image Processing, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
J. Netw. Comput. Appl., 2017
Comput. Commun., 2017
A Group Bandwidth Reservation Scheme to Enhance the Driver's Safety in Vehicles and Transport Environment.
Comput. J., 2017
Modelling Software-Defined Networking: Switch Design with Finite Buffer and Priority Queueing.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Accurate Traffic Flow Estimation in Urban Roads with Considering the Traffic Signals.
Proceedings of the Internet of Vehicles. Technologies and Services for Smart Cities, 2017
Hash-based load balanced traffic steering on softswitches for chaining virtualized network functions.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017
2016
IEEE Trans. Sustain. Comput., 2016
IEEE Syst. J., 2016
High performance traffic classification based on message size sequence and distribution.
J. Netw. Comput. Appl., 2016
Int. J. Commun. Syst., 2016
IEICE Trans. Inf. Syst., 2016
Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization.
Computer, 2016
A joint network and server load balancing algorithm for chaining virtualized network functions.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Fast failover and switchover for link failures and congestion in software defined networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Optimal Slot Assignment for Binary Tracking Tree Protocol in RFID Tag Identification.
IEEE/ACM Trans. Netw., 2015
Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds.
IEEE Syst. J., 2015
Three-phase behavior-based detection and classification of known and unknown malware.
Secur. Commun. Networks, 2015
An extended SDN architecture for network function virtualization with a case study on intrusion prevention.
IEEE Netw., 2015
J. Netw. Comput. Appl., 2015
A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems, 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
2014
On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices.
IEEE Trans. Software Eng., 2014
On-the-Fly Capture and Replay Mechanisms for Multi-Port Network Devices in Operational Networks.
IEEE Trans. Netw. Serv. Manag., 2014
IEEE Softw., 2014
Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment.
Secur. Commun. Networks, 2014
Calibrating parameters and formulas for process-level energy consumption profiling in smartphones.
J. Netw. Comput. Appl., 2014
Int. J. Netw. Secur., 2014
A bandwidth allocation algorithm with channel quality and QoS aware for IEEE 802.16 base stations.
Int. J. Commun. Syst., 2014
Int. J. Commun. Syst., 2014
Development and Evaluation of Across-Unit Diagnostic Feedback Mechanism for Online Learning.
J. Educ. Technol. Soc., 2014
Reducing power consumption in LTE data scheduling with the constraints of channel condition and QoS.
Comput. Networks, 2014
Bug traces: identifying and downsizing packet traces with failures triggered in networking devices.
IEEE Commun. Mag., 2014
Using collaborative annotating and data mining on formative assessments to enhance learning efficiency.
Comput. Appl. Eng. Educ., 2014
2013
IEEE Trans. Mob. Comput., 2013
Booting, browsing and streaming time profiling, and bottleneck analysis on android-based systems.
J. Netw. Comput. Appl., 2013
A tracking system using location prediction and dynamic threshold for minimizing SMS delivery.
J. Commun. Networks, 2013
IEICE Trans. Inf. Syst., 2013
J. Educ. Technol. Soc., 2013
J. Educ. Technol. Soc., 2013
EURASIP J. Wirel. Commun. Netw., 2013
Creditability-based weighted voting for reducing false positives and negatives in intrusion detection.
Comput. Secur., 2013
Identifying android malicious repackaged applications by thread-grained system call sequences.
Comput. Secur., 2013
Comput. Commun., 2013
2012
Two Couple-Resolution Blocking Protocols on Adaptive Query Splitting for RFID Tag Identification.
IEEE Trans. Mob. Comput., 2012
A best block exploring algorithm for two-dimensional downlink burst construction in IEEE 802.16 networks.
J. Netw. Comput. Appl., 2012
Int. J. Netw. Secur., 2012
Heuristic algorithms for two-dimensional uplink burst construction in IEEE 802.16 networks.
Comput. Stand. Interfaces, 2012
IEEE Commun. Surv. Tutorials, 2012
Comput. Networks, 2012
IEEE Commun. Mag., 2012
Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems.
IEEE Commun. Mag., 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
Proceedings of the International Symposium on Performance Evaluation of Computer & Telecommunication Systems, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
IEEE Trans. Veh. Technol., 2011
IEEE Trans. Computers, 2011
Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks.
IEICE Trans. Inf. Syst., 2011
EURASIP J. Wirel. Commun. Netw., 2011
2010
Parallel Comput., 2010
General binary tree protocol for coping with the capture effect in RFID tag identification.
IEEE Commun. Lett., 2010
A high-performance and well-manageable distributed measurement laboratory with an object-oriented approach.
Comput. Appl. Eng. Educ., 2010
Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks.
Proceedings of IEEE International Conference on Communications, 2010
2009
Realizing a Sub-Linear Time String-Matching Algorithm With a Hardware Accelerator Using Bloom Filters.
IEEE Trans. Very Large Scale Integr. Syst., 2009
Two blocking algorithms on adaptive binary splitting: single and pair resolutions for RFID tag identification.
IEEE/ACM Trans. Netw., 2009
ACM Trans. Embed. Comput. Syst., 2009
IEEE Micro, 2009
J. Netw. Comput. Appl., 2009
Manageable and Extensible Video Streaming Systems for On-Line Monitoring of Remote Laboratory Experiments.
Int. J. Online Eng., 2009
Int. J. Commun. Syst., 2009
Highest Urgency First (HUF): A latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Comput. Commun., 2009
Efficient development of a web-based environmental testing system using a novel two-layer software architecture.
Comput. Appl. Eng. Educ., 2009
Proceedings of IEEE International Conference on Communications, 2009
Designing and Implementing an IEEE 802.16 Network Simulator for Performance Evaluation of Bandwidth Allocation Algorithms.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009
2008
ACM Trans. Embed. Comput. Syst., 2008
Designing and evaluating interleaving decompressing and virus scanning in a stream-based mail proxy.
J. Syst. Softw., 2008
IEEE Internet Comput., 2008
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Inf. Syst., 2008
A Pair-Resolution Blocking Algorithm on Adaptive Binary Splitting for RFID Tag Identification.
IEEE Commun. Lett., 2008
IEEE Commun. Lett., 2008
Erratum to "Multiple-resource request scheduling for differentiated QoS at website gateway".
Comput. Commun., 2008
Comput. Commun., 2008
Achieving proportional loss rate differentiation in a wireless network with a multi-state link.
Comput. Commun., 2008
On applying fair queuing discipline to schedule requests at access gateway for downlink differential QoS.
Comput. Networks, 2008
Comput. Networks, 2008
A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the Advances in Multimedia Information Processing, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
A Cross-Layer Fine-Tuning Scheduling Scheme to Provide Proportional Delay Differentiation in a Wireless LAN.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
A Channel Quality and QoS Aware Bandwidth Allocation Algorithm for IEEE 802.16 Base Stations.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Deterministic high-speed root-hashing automaton matching coprocessor for embedded network processor.
SIGARCH Comput. Archit. News, 2007
Taxonomy and Evaluation of TCP-Friendly Congestion-Control Schemes on Fairness, Aggressiveness, and Responsiveness.
IEEE Netw., 2007
J. Syst. Softw., 2007
A platform-based SoC design and implementation of scalable automaton matching for deep packet inspection.
J. Syst. Archit., 2007
Provision of proportional delay differentiation in wireless LAN using a cross-layer fine-tuning scheduling scheme.
IET Commun., 2007
Comput. Commun., 2007
Comput. Networks, 2007
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007
Dynamic Backoff Time Adjustment with Considering Channel Condition for IEEE 802.11e EDCA.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007
Achieving Proportional Delay and Loss Differentiation in a Wireless Network with a Multi-state Link.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
A Non-Work-Conserving Scheduler to Provide Proportional Delay Differentiated Services and Best Effort Service.
IEICE Trans. Commun., 2006
A high-performance and fair scheduler for the wireless network with a multi-state channel.
IEEE Commun. Lett., 2006
Profiling and accelerating string matching algorithms in three network content security applications.
IEEE Commun. Surv. Tutorials, 2006
Computer, 2006
Proceedings of the Information Networking, 2006
Proceedings of the Information Networking, 2006
A Web-based Server Management System with IPMI and WMI Techniques.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006
2005
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
Some Packet Schedulers for Proportional Delay Differentiated Services and Best Effort Service.
Proceedings of The 2005 International Conference on Internet Computing, 2005
A Parallel Automaton String Matching with Pre-Hashing and Root-Indexing Techniques for Content Filtering Coprocessor.
Proceedings of the 16th IEEE International Conference on Application-Specific Systems, 2005
2004
Perceptual codec and interaction aware playout algorithms and quality measurements for VoIP systems.
IEEE Trans. Consumer Electron., 2004
Proceedings of the Information Networking, 2004
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004
Packet schedulers to provide proportional delay differentiation and reduce packet queueing delay simultaneously.
Proceedings of IEEE International Conference on Communications, 2004
A non-work-conserving scheduler to provide proportional delay Differentiated Services.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
A novel scheduler for proportional delay differentiation by considering packet transmission time.
IEEE Commun. Lett., 2003
IEEE Commun. Lett., 2003
Proceedings of the Information Networking, 2003
A Look-Ahead Scheduler to Provide Proportional Delay Differentiation in Wireless Network with a Multi-state Link.
Proceedings of the Information Networking, 2003
Proceedings of IEEE International Conference on Communications, 2003
2002
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002
Proceedings of the Information Networking, 2002
A Novel Scheduler for the Proportional Delay Differentiation Model by Considering Packet Transmission Time.
Proceedings of the Information Networking, 2002
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002
Proceedings of the Global Telecommunications Conference, 2002
2001
Int. J. Commun. Syst., 2001
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001
Guaranteed versus Controlled Load: Implications for Service Subscribers and Providers in RSVP Networks.
Proceedings of the 15th International Conference on Information Networking, 2001
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001
Proceedings of the Global Telecommunications Conference, 2001
1999
Int. J. Commun. Syst., 1999
1998
IEEE Netw., 1998
Int. J. Commun. Syst., 1998
Comput. Networks ISDN Syst., 1998
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998
1997
IEEE Trans. Broadcast., 1997
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997
Performance Analysis of Rate-based Congestion Control Scheme and Choice of High and Low Thresholds.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997
1996
Proceedings of the Proceedings 21st Conference on Local Computer Networks, 1996