default search action
Po-Ching Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Abhishek Vyas, Po-Ching Lin, Ren-Hung Hwang, Meenakshi Tripathi:
Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey. IEEE Access 12: 127018-127050 (2024) - [j52]Zheng-Shao Chen, R. Vaitheeshwari, Eric Hsiao-Kuang Wu, Ying-Dar Lin, Ren-Hung Hwang, Po-Ching Lin, Yuan-Cheng Lai, Asad Ali:
Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement. IEEE Access 12: 141851-141865 (2024) - [j51]Chen-Kuo Chiang, Ying-Dar Lin, Ren-Hung Hwang, Po-Ching Lin, Shih-Ya Chang, Hao-Ting Li:
Imperceptible adversarial attack via spectral sensitivity of human visual system. Multim. Tools Appl. 83(20): 59291-59315 (2024) - [j50]Edy Kristianto, Po-Ching Lin, Ren-Hung Hwang:
Sustainable and lightweight domain-based intrusion detection system for in-vehicle network. Sustain. Comput. Informatics Syst. 41: 100936 (2024) - [j49]Yi-Ting Huang, R. Vaitheeshwari, Meng Chang Chen, Ying-Dar Lin, Ren-Hung Hwang, Po-Ching Lin, Yuan-Cheng Lai, Eric Hsiao-Kuang Wu, Chung-Hsuan Chen, Zi-Jie Liao, Chung-Kuan Chen:
MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology. IEEE Trans. Netw. Serv. Manag. 21(4): 4871-4887 (2024) - [j48]Van-Linh Nguyen, Lan-Huong Nguyen, Jian-Jhih Kuo, Po-Ching Lin, Ren-Hung Hwang:
Intelligent Aerial Relay Deployment for Enhancing Connectivity in Emergency Communications. IEEE Trans. Veh. Technol. 73(6): 8782-8796 (2024) - 2023
- [j47]Po-Ching Lin, Wen-Hao Hsu, Ying-Dar Lin, Ren-Hung Hwang, Hsiao-Kuang Wu, Yuan-Cheng Lai, Chung-Kuan Chen:
Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation. Comput. Networks 228: 109736 (2023) - [j46]Yuan-Cheng Lai, Jheng-Yan Lin, Ying-Dar Lin, Ren-Hung Hwang, Po-Ching Lin, Hsiao-Kuang Wu, Chung-Kuan Chen:
Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection. Comput. Secur. 129: 103205 (2023) - [j45]Pei-Yu Tseng, Po-Ching Lin, Edy Kristianto:
Vehicle theft detection by generative adversarial networks on driving behavior. Eng. Appl. Artif. Intell. 117(Part): 105571 (2023) - [j44]Ren-Hung Hwang, Chieh-Lun Lee, Ying-Dar Lin, Po-Ching Lin, Hsiao-Kuang Wu, Yuan-Cheng Lai, Chung-Kuan Chen:
Host-based intrusion detection with multi-datasource and deep learning. J. Inf. Secur. Appl. 78: 103625 (2023) - [j43]Van-Linh Nguyen, Ren-Hung Hwang, Po-Ching Lin, Abhishek Vyas, Van-Tao Nguyen:
Toward the Age of Intelligent Vehicular Networks for Connected and Autonomous Vehicles in 6G. IEEE Netw. 37(3): 44-51 (2023) - [j42]Edy Kristianto, Po-Ching Lin, Ren-Hung Hwang:
Misbehavior detection system with semi-supervised federated learning. Veh. Commun. 41: 100597 (2023) - [c23]Van-Linh Nguyen, Lan-Huong Nguyen, Ren-Hung Hwang, Jian-Jhih Kuo, Po-Ching Lin:
Efficient Aerial Relaying Station Path Planning for Emergency Event-based Communications. CCNC 2023: 973-974 - [c22]Van-Linh Nguyen, Lan-Huong Nguyen, Po-Ching Lin, Ren-Hung Hwang:
Deep Learning-Based Localization and Outlier Removal Integration Model for Indoor Surveillance. ICC 2023: 4879-4884 - [c21]Kai-Chun Yang, Po-Ching Lin:
Mutual Authentication between Aerial Base Stations and Core Network: A Lightweight Security Scheme. ITNAC 2023: 11-18 - [c20]Shu-Ying Chang, Hung-Wen Liang, Van-Linh Nguyen, Po-Ching Lin:
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring. MILCOM 2023: 239-240 - 2022
- [j41]Ying-Dar Lin, Zi-Qiang Liu, Ren-Hung Hwang, Van-Linh Nguyen, Po-Ching Lin, Yuan-Cheng Lai:
Machine Learning With Variational AutoEncoder for Imbalanced Datasets in Intrusion Detection. IEEE Access 10: 15247-15260 (2022) - [j40]Edy Kristianto, Van-Linh Nguyen, Po-Ching Lin:
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria? IEEE Secur. Priv. 20(4): 40-50 (2022) - [j39]Ying-Dar Lin, Ze-Yu Wang, Po-Ching Lin, Van-Linh Nguyen, Ren-Hung Hwang, Yuan-Cheng Lai:
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics. J. Inf. Secur. Appl. 68: 103248 (2022) - [j38]Ying-Dar Lin, Jehoshua-Hanky Pratama, Didik Sudyana, Yuan-Cheng Lai, Ren-Hung Hwang, Po-Ching Lin, Hsuan-Yu Lin, Wei-Bin Lee, Chen-Kuo Chiang:
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions. J. Inf. Secur. Appl. 71: 103348 (2022) - [j37]Van-Linh Nguyen, Ren-Hung Hwang, Po-Ching Lin:
Controllable Path Planning and Traffic Scheduling for Emergency Services in the Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 23(8): 12399-12413 (2022) - [c19]Edy Kristianto, Po-Ching Lin, Ren-Hung Hwang:
Domain-Specific Anomaly Detection for In-Vehicle Networks. ICS 2022: 637-648 - [i3]Van-Linh Nguyen, Ren-Hung Hwang, Po-Ching Lin, Abhishek Vyas, Van-Tao Nguyen:
Towards the Age of Intelligent Vehicular Networks for Connected and Autonomous Vehicles in 6G. CoRR abs/2209.01349 (2022) - 2021
- [j36]Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin:
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges. IEEE Commun. Surv. Tutorials 23(4): 2384-2428 (2021) - [j35]Huu-Khoi Bui, Ying-Dar Lin, Ren-Hung Hwang, Po-Ching Lin, Van-Linh Nguyen, Yuan-Cheng Lai:
CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection. J. Netw. Comput. Appl. 193: 103212 (2021) - [c18]Ren-Hung Hwang, Van-Linh Nguyen, Chia-Che Tsai, Po-Ching Lin:
Platoon-based Vehicle Coordination Scheme for Resolving Sudden Traffic Jam in the IoV Era. VTC Fall 2021: 1-5 - [c17]Lan-Huong Nguyen, Ren-Hung Hwang, Po-Ching Lin, Van-Linh Nguyen, Jian-Jhih Kuo:
Robust Positioning-based Verification Scheme for Enhancing Reliability of Vehicle Platoon Control. VTC Fall 2021: 1-5 - [i2]Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin:
Security and privacy for 6G: A survey on prospective technologies and challenges. CoRR abs/2108.11861 (2021) - 2020
- [j34]Ren-Hung Hwang, Min-Chun Peng, Chien-Wei Huang, Po-Ching Lin, Van Linh Nguyen:
An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection. IEEE Access 8: 30387-30399 (2020) - [j33]Van Linh Nguyen, Po-Ching Lin, Ren-Hung Hwang:
A Beamforming Signal-Based Verification Scheme for Data Sharing in 5G Vehicular Networks. IEEE Access 8: 211723-211737 (2020) - [j32]Van Linh Nguyen, Po-Ching Lin, Ren-Hung Hwang:
Enhancing Misbehavior Detection in 5G Vehicle-to-Vehicle Communications. IEEE Trans. Veh. Technol. 69(9): 9417-9430 (2020) - [c16]You-Wei Chang, Po-Ching Lin:
SSOV: A Single Sign-on Protocol for Accessing Vehicular Application Services with the Support of Secret Credential Management System. ICS 2020: 437-442
2010 – 2019
- 2019
- [j31]Van Linh Nguyen, Po-Ching Lin, Ren-Hung Hwang:
Energy Depletion Attacks in Low Power Wireless Networks. IEEE Access 7: 51915-51932 (2019) - [j30]Van Linh Nguyen, Po-Ching Lin, Ren-Hung Hwang:
Multi-Array Relative Positioning for Verifying the Truthfulness of V2X Messages. IEEE Commun. Lett. 23(10): 1704-1707 (2019) - [j29]Van Linh Nguyen, Po-Ching Lin, Ren-Hung Hwang:
Web attacks: defeating monetisation attempts. Netw. Secur. 2019(5): 11-19 (2019) - [c15]Van Linh Nguyen, Po-Ching Lin, Ren-Hung Hwang:
Physical signal-driven fusion for V2X misbehavior detection. VNC 2019: 1-4 - [i1]Van Linh Nguyen, Po-Ching Lin, Ren-Hung Hwang:
Preventing the attempts of abusing cheap-hosting Web-servers for monetization attacks. CoRR abs/1903.05470 (2019) - 2018
- [j28]Minh-Tuan Thai, Ying-Dar Lin, Po-Ching Lin, Yuan-Cheng Lai:
Towards load-balanced service chaining by Hash-based Traffic Steering on Softswitches. J. Netw. Comput. Appl. 109: 1-10 (2018) - [j27]Van Linh Nguyen, Po-Ching Lin, Ren-Hung Hwang:
MECPASS: Distributed Denial of Service Defense Architecture for Mobile Networks. IEEE Netw. 32(1): 118-124 (2018) - [j26]Chih-Chiang Wang, Ying-Dar Lin, Jang-Jiin Wu, Po-Ching Lin, Ren-Hung Hwang:
Toward Optimal Resource Allocation of Virtualized Network Functions for Hierarchical Datacenters. IEEE Trans. Netw. Serv. Manag. 15(4): 1532-1544 (2018) - [c14]Ren-Hung Hwang, Van-Linh Nguyen, Po-Ching Lin:
StateFit: A Security Framework for SDN Programmable Data Plane Model. I-SPAN 2018: 168-173 - 2017
- [j25]Fu-Hau Hsu, Chih-Wen Ou, Yanling Hwang, Ya-Ching Chang, Po-Ching Lin:
Detecting Web-Based Botnets Using Bot Communication Traffic Features. Secur. Commun. Networks 2017: 5960307:1-5960307:11 (2017) - [c13]Minh-Tuan Thai, Ying-Dar Lin, Po-Ching Lin, Yuan-Cheng Lai:
Hash-based load balanced traffic steering on softswitches for chaining virtualized network functions. ICC 2017: 1-6 - [c12]Po-Ching Lin, Yu-Ting Hsu, Ren-Hung Hwang:
Detecting and Preventing DDoS Attacks in SDN-Based Data Center Networks. ICCCS (2) 2017: 50-61 - [c11]Yen-Chun Chiu, Po-Ching Lin:
Rapid detection of disobedient forwarding on compromised OpenFlow switches. ICNC 2017: 672-677 - [c10]Po-Ching Lin, Chia-Feng Wu, Po-Hsien Shih:
Optimal Placement of Network Security Monitoring Functions in NFV-Enabled Data Centers. SC² 2017: 9-16 - 2016
- [j24]Po-Ching Lin, Ying-Dar Lin, Cheng-Ying Wu, Yuan-Cheng Lai, Yi-Chih Kao:
Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization. Computer 49(11): 68-76 (2016) - [j23]Po-Ching Lin, Pei-Ying Lin:
Unintentional and Involuntary Personal Information Leakage on Facebook from User Interactions. KSII Trans. Internet Inf. Syst. 10(7): 3301-3318 (2016) - [j22]Po-Ching Lin, Pei-Ying Lin:
An Anomaly Detection Framework Based on ICA and Bayesian Classification for IaaS Platforms. KSII Trans. Internet Inf. Syst. 10(8): 3865-3883 (2016) - [j21]Fu-Hau Hsu, Yu-Liang Hsu, Yanling Hwang, Li-Han Chen, Chuan-Sheng Wang, Chang-Kuo Tso, Szu-Chi Liu, Po-Ching Lin, Chi-Hsien Hsu:
VRS: a values-based reputation system for web services. Secur. Commun. Networks 9(18): 6335-6350 (2016) - [j20]Ying-Dar Lin, Po-Ching Lin, Sheng-Hao Wang, I-Wei Chen, Yuan-Cheng Lai:
PCAPLib: A System of Extracting, Classifying, and Anonymizing Real Packet Traces. IEEE Syst. J. 10(2): 520-531 (2016) - 2015
- [j19]Ying-Dar Lin, Po-Ching Lin, Chih-Hung Yeh, Yao-Chun Wang, Yuan-Cheng Lai:
An extended SDN architecture for network function virtualization with a case study on intrusion prevention. IEEE Netw. 29(3): 48-53 (2015) - [j18]Yu-Sian Li, Trang Cao Minh, Shu-Ting Wang, Xin Huang, Cheng-Hsin Hsu, Po-Ching Lin:
A Resource-Constrained Asymmetric Redundancy Elimination Algorithm. IEEE/ACM Trans. Netw. 23(4): 1135-1148 (2015) - [c9]Po-Ching Lin, Jyun-Chen Liu, Pin-Ren Chiou:
An event-based SDN architecture for network security analysis. ICCST 2015: 159-164 - [c8]De-Yu Chen, Po-Ching Lin, Kuan-Ta Chen:
Does Playing Online Mobile Games Overcharge You for the Fun? MobiGames@MobiSys 2015: 13-18 - 2014
- [j17]Ying-Dar Lin, Po-Ching Lin, Viktor K. Prasanna, H. Jonathan Chao, John W. Lockwood:
Guest Editorial Deep Packet Inspection: Algorithms, Hardware, and Applications. IEEE J. Sel. Areas Commun. 32(10): 1781-1783 (2014) - [j16]Ying-Dar Lin, Po-Ching Lin, Yu-An Lin, Yuan-Cheng Lai:
On-the-Fly Capture and Replay Mechanisms for Multi-Port Network Devices in Operational Networks. IEEE Trans. Netw. Serv. Manag. 11(2): 158-171 (2014) - 2013
- [j15]Po-Ching Lin, Jia-Hau Lee:
Re-examining the performance bottleneck in a NIDS with detailed profiling. J. Netw. Comput. Appl. 36(2): 768-780 (2013) - [c7]De-Yu Chen, Po-Ching Lin, Kuan-Ta Chen:
Does Online Mobile Gaming Overcharge You for The Fun? NetGames 2013: 11:1-11:2 - 2012
- [j14]Ying-Dar Lin, Po-Ching Lin, Tsung-Huan Cheng, I-Wei Chen, Yuan-Cheng Lai:
Low-storage capture and loss recovery selective replay of real flows. IEEE Commun. Mag. 50(4): 114-121 (2012) - [j13]Tsung-Huan Cheng, Ying-Dar Lin, Yuan-Cheng Lai, Po-Ching Lin:
Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems. IEEE Commun. Surv. Tutorials 14(4): 1011-1020 (2012) - [j12]I-Wei Chen, Po-Ching Lin, Tsung-Huan Cheng, Chi-Chung Luo, Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin:
Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems. Int. J. Netw. Secur. 14(5): 243-250 (2012) - [c6]Yu-Sian Li, Trang Cao Minh, Xin Huang, Cheng-Hsin Hsu, Po-Ching Lin:
CacheQuery: A practical asymmetric communication algorithm. GLOBECOM 2012: 3353-3359 - 2011
- [j11]Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai:
A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning. IEEE Trans. Computers 60(4): 594-601 (2011) - 2010
- [j10]Ying-Dar Lin, I-Wei Chen, Po-Ching Lin, Chang-Sheng Chen, Chun-Hung Hsu:
On campus beta site: architecture designs, operational experience, and top product defects. IEEE Commun. Mag. 48(12): 83-91 (2010)
2000 – 2009
- 2009
- [j9]Ying-Dar Lin, Chun-Nan Lu, Yuan-Cheng Lai, Wei-Hao Peng, Po-Ching Lin:
Application classification using packet size distribution and port association. J. Netw. Comput. Appl. 32(5): 1023-1030 (2009) - [j8]Ying-Dar Lin, Po-Ching Lin, Yuan-Cheng Lai, Tai-Ying Liu:
Hardware-Software Codesign for High-Speed Signature-based Virus Scanning. IEEE Micro 29(5): 56-65 (2009) - [j7]Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai, Yi-Jun Zheng, Tsern-Huei Lee:
Realizing a Sub-Linear Time String-Matching Algorithm With a Hardware Accelerator Using Bloom Filters. IEEE Trans. Very Large Scale Integr. Syst. 17(8): 1008-1020 (2009) - [c5]I-Wei Chen, Po-Ching Lin, Chi-Chung Luo, Tsung-Huan Cheng, Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin:
Extracting Attack Sessions from Real Traffic with Intrusion Prevention Systems. ICC 2009: 1-5 - 2008
- [j6]Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai, Tsern-Huei Lee:
Using String Matching for Deep Packet Inspection. Computer 41(4): 23-28 (2008) - [j5]Po-Ching Lin, Ming-Dao Liu, Ying-Dar Lin, Yuan-Cheng Lai:
Accelerating Web Content Filtering by the Early Decision Algorithm. IEICE Trans. Inf. Syst. 91-D(2): 251-257 (2008) - [j4]Ying-Dar Lin, Po-Ching Lin, Meng-Fu Tsai, Tsao-Jiang Chang, Yuan-Cheng Lai:
kP2PADM: An In-Kernel Architecture of P2P Management Gateway. IEICE Trans. Inf. Syst. 91-D(10): 2398-2405 (2008) - [j3]Ying-Dar Lin, Szu-Hao Chen, Po-Ching Lin, Yuan-Cheng Lai:
Designing and evaluating interleaving decompressing and virus scanning in a stream-based mail proxy. J. Syst. Softw. 81(9): 1517-1524 (2008) - 2007
- [c4]Ying-Dar Lin, Po-Ching Lin, Meng-Fu Tsai, Tsao-Jiang Chang, Yuan-Cheng Lai:
kP2PADM: An In-kernel Gateway Architecture for Managing P2P Traffic. IPDPS 2007: 1-9 - 2006
- [j2]Ying-Dar Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Cheng Lai:
Designing an Integrated Architecture for Network Content Security Gateways. Computer 39(11): 66-72 (2006) - [j1]Po-Ching Lin, Zhi-Xiang Li, Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin:
Profiling and accelerating string matching algorithms in three network content security applications. IEEE Commun. Surv. Tutorials 8(1-4): 24-37 (2006) - [c3]Po-Ching Lin, Ming-Dao Liu, Ying-Dar Lin, Yuan-Cheng Lai:
An Early Decision Algorithm to Accelerate Web Content Filtering. ICOIN 2006: 833-841 - 2003
- [c2]Ying-Dar Lin, Ping-Tsai Tsai, Po-Ching Lin, Ching-Ming Tien:
Direct Web switch routing with state migration, TCP masquerade, and cookie name rewriting. GLOBECOM 2003: 3663-3667 - [c1]Ching-Ming Tien, Po-Ching Lin, Ying-Dar Jason Lin:
Evolution and Evaluation of Internet Content Delivery. International Conference on Internet Computing 2003: 502-505
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint