


default search action
Yu-Lun Huang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Wen-Lin Sun
, Ying-Han Tang, Yu-Lun Huang
:
HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud. Softw. Test. Verification Reliab. 33(5) (2023) - 2022
- [j17]Wen-Lin Sun
, Yu-Lun Huang
:
Cross: A generic framework for system integration and its adaption in hospitals. Softw. Pract. Exp. 52(7): 1643-1660 (2022) - [c26]Yu-Lun Huang, Yu-Feng Hsiao, Po-Hui Yang:
A Simplified Hardware Proportional-Integral-Derivative Controller Using Power-of-2 Multiplication. ICCE-TW 2022: 491-492 - [c25]Wen-Lin Sun, Yu-Lun Huang, Kai-Wei Yeh:
A Recommendation Mechanism of Selecting Machine Learning Models for Fault Diagnosis. ICINCO 2022: 49-57 - [c24]Yu-Lun Huang, Yu-Yun Chang, Jyi-Shane Liu, Chang-Yi Lin:
Measuring public opinion on the import of US pork in Taiwan. PACLIC 2022: 405-414 - 2021
- [c23]Yu-Lun Huang
, Yu-Hsin Wu:
AHP4Edu: An AHP-Based Assessment Model for Learning Effectiveness of Education. ICITL 2021: 196-205 - [c22]Yu-Lun Huang, Ching-Yu Hung, Hsiao-Te Hu:
A Protocol-based Intrusion Detection System using Dual Autoencoders. QRS 2021: 749-758 - 2020
- [c21]Yu-Lun Huang, Ding-Hau Huang:
Application of Design Thinking to Optimize Change Management Procedures with a Case Study on Reference Book Stores. HCI (12) 2020: 91-103 - [c20]Yu-Lun Huang, Pei-Jung Chang, Yuan-Ho Chen
:
Premature Ventricular Complex Detection Chip Obtained Using Convolution Neural Network. ICAIIC 2020: 482-484
2010 – 2019
- 2019
- [c19]Yu-Lun Huang, Wen-Lin Sun, Kai-Wei Yeh:
MLoC: A Cloud Framework adopting Machine Learning for Industrial Automation. ASCC 2019: 1413-1418 - [c18]Yu-Lun Huang
:
Encouraging Active Learning for System Engineering Students Using Role-Exchanging Activities. ICITL 2019: 827-835 - [c17]Yu-Lun Huang, Wen-Lin Sun, Ying-Han Tang:
3aRAM: A 3-Layer AHP-Based Risk Assessment Model and its Implementation for an Industrial IoT Cloud. QRS Companion 2019: 450-457 - 2018
- [c16]Yu-Lun Huang, Wen-Lin Sun:
An AHP-Based Risk Assessment for an Industrial IoT Cloud. QRS Companion 2018: 637-638 - 2017
- [c15]Li-Wen Chen, Yu-Lun Huang:
An Enhanced Handover Scheme Adopting Mobile Relays in a LTE-A Network for High-Speed Movements. QRS Companion 2017: 567-568 - 2016
- [j16]Borting Chen, Ho-Pang Hsu, Yu-Lun Huang:
Bringing Desktop Applications to the Web. IT Prof. 18(1): 34-40 (2016) - [c14]Borting Chen, Mesut Günes, Yu-Lun Huang:
CoAP Option for Capability-Based Access Control for IoT-Applications. IoTBD 2016: 266-274 - 2015
- [c13]Borting Chen, Yu-Lun Huang, Mesut Günes
:
S-CBAC: A secure access control model supporting group access for Internet of Things. ISSRE Workshops 2015: 67 - [c12]Chi-An Chih, Yu-Lun Huang:
An Adjustable Risk Assessment Method for a Cloud System. QRS Companion 2015: 115-120 - 2014
- [j15]Jwu-Sheng Hu, Yu-Lun Huang, Chin-Yuan Tseng
:
Locating Anchors in WSN Using a Wearable IMU-Camera. Int. J. Distributed Sens. Networks 10 (2014) - [c11]Borting Chen, Ming-Wei Shih, Yu-Lun Huang:
An Anomaly Detection Module for Firefox OS. SERE (Companion) 2014: 176-184 - 2013
- [c10]Yu-Lun Huang, Ya-Hsuan Wang:
Investigating the security control of a water system: An overview. ASCC 2013: 1-5 - [c9]Borting Chen, Chien-Yu Lai, Yu-Lun Huang:
A Performance Mapping Model for Physical-to-Virtual Migration. SERE 2013: 90-98 - 2012
- [j14]Yu-Lun Huang, Hsin-Yi Tsai:
A framework for quantitative evaluation of parallel control-flow obfuscation. Comput. Secur. 31(8): 886-896 (2012) - [j13]Hsin-Yi Tsai, Melanie Siebenhaar, André Miede, Yu-Lun Huang, Ralf Steinmetz
:
Threat as a Service?: Virtualization's Impact on Cloud Security. IT Prof. 14(1): 32-37 (2012) - [j12]Lo-Yao Yeh, Yu-Lun Huang, Anthony D. Joseph
, Shiuhpyng Winston Shieh, Woei-Jiunn Tsaur:
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks. IEEE Trans. Veh. Technol. 61(4): 1907-1924 (2012) - [c8]Yu-Lun Huang, Borting Chen, Ming-Wei Shih, Chien-Yu Lai:
Security Impacts of Virtualization on a Network Testbed. SERE 2012: 71-77 - 2011
- [j11]Hsin-Yi Tsai, Yu-Lun Huang:
An Analytic Hierarchy Process-Based Risk Assessment Method for Wireless Networks. IEEE Trans. Reliab. 60(4): 801-816 (2011) - [j10]Yu-Lun Huang, Chih-Ya Shen, Shiuh-Pyng Winston Shieh:
S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks. IEEE Trans. Veh. Technol. 60(9): 4509-4519 (2011) - [c7]Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, Shankar Sastry:
Attacks against process control systems: risk assessment, detection, and response. AsiaCCS 2011: 355-366
2000 – 2009
- 2009
- [j9]Yu-Lun Huang, P. H. Lu, J. Doug Tygar, Anthony D. Joseph
:
OSNP: Secure wireless authentication protocol using one-time key. Comput. Secur. 28(8): 803-815 (2009) - [j8]Yu-Lun Huang, Alvaro A. Cárdenas
, Saurabh Amin, Zong-Syun Lin, Hsin-Yi Tsai, Shankar Sastry:
Understanding the physical and economic consequences of attacks on control systems. Int. J. Crit. Infrastructure Prot. 2(3): 73-83 (2009) - [j7]Yu-Lun Huang, Jwu-Sheng Hu:
Hands-on oriented curriculum and laboratory development for embedded system design. SIGBED Rev. 6(1): 3 (2009) - [j6]Hsin-Yi Tsai, Yu-Lun Huang, David A. Wagner:
A graph approach to quantitative analysis of control-flow obfuscating transformations. IEEE Trans. Inf. Forensics Secur. 4(2): 257-267 (2009) - [c6]Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin:
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS. SSIRI 2009: 243-252 - 2008
- [c5]Yu-Lun Huang, J. Doug Tygar, Hsiao-Ying Lin, L. Y. Yeh, Hsin-Yi Tsai, Keith Sklower, Shiuh-Pyng Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, Chia-Wei Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong:
SWOON: A Testbed for Secure Wireless Overlay Networks. CSET 2008 - 2007
- [c4]Yu-Lun Huang, Jwu-Sheng Hu:
Design methodology and hands-on practices for Embedded Operating Systems. ICPADS 2007: 1-6 - 2006
- [c3]Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao:
A control flow obfuscation method to discourage malicious tampering of software codes. AsiaCCS 2006: 362 - [c2]John Kar-Kin Zao, Jwu-Sheng Hu, Jin-Chern Chiou, Yu-Lun Huang, Shu-Chen Li, Zee-Yih Kuo, Ming-Chuen Chuang, Shang Hwa Hsu, Yu-Chee Tseng, Jane W.-S. Liu, Chin-Teng Lin
:
Kannon: Ubiquitous Sensor/Actuator Technologies for Elderly Living and Care: A Multidisciplinary Effort in National Chiao Tung University, Taiwan. SMC 2006: 4297-4303 - 2004
- [j5]Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho, Jian-Chyuan Wang:
Efficient key distribution schemes for secure media delivery in pay-TV systems. IEEE Trans. Multim. 6(5): 760-769 (2004) - 2003
- [j4]Shiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang:
Optimal information-dispersal for fault-tolerant communication over a burst-error channel. IEEE Trans. Reliab. 52(3): 354-366 (2003) - 2000
- [j3]Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho:
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. Comput. Secur. 19(5): 453-465 (2000) - [j2]Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang, Jia-Ning Luo
:
Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack. IEEE Internet Comput. 4(6): 42-49 (2000) - [c1]Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyuan Wang:
Practical Key Distribution Schemes for Channel Protection. COMPSAC 2000: 569-574
1990 – 1999
- 1999
- [j1]Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang:
An Efficient Authentication Protocol for Mobile Networks. J. Inf. Sci. Eng. 15(4): 505-520 (1999)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint