Journal papers | Submitted papers | Conference papers | 圖書著作(Books) | 專利(Patents)

Journal papers

  1. Fang-Yie Leu and C.C. Yang, "Automatic Rule Base Inspection for Data-Access Oriented Knowledge-Based Systems," Journal of Information Science and Engineering, Vol.7, No.1, March 1991, pp53-79.
  2. Fang-Yie Leu, S.K. Chang and C.C. Yang, "A Validation Assistant for a Distributed Office Information System Modeled by Office Procedure Model," Journal of Information Science and Engineering, Vol.11, No.2, June 1995, pp.183-206.
  3. Fang-Yie Leu and S.W.Zhao, “Distributed Database Architecture and its Query Processing,” Journal of TungHai University,Oct. 1997.
  4. Fang-Yie Leu, et.al., “Face Recognition Using Image database,” TungHai Science Journal, Vol. 1, Nov. 1999.
  5. Fang-Yie Leu, Shi-Jie Yan and Wen-Kui Chang, “Fuzzy-based Dynamic Bandwidth Allocation System,” Proceedings of 2005 the First International Conference on Natural Computation & the Second International Conference on Fuzzy Systems and Knowledge Discovery , August 2005, pp.911-920. (Lecture Notes in Computer Science, Springer-Verlag.) (SCI-E, JCR’05=0.302)
  6. Fang-Yie Leu and Wei-Jie Yang, “Intrusion Detection with CUSUM for TCP-based DDoS,” The First IFIP Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES’05), Nagasaki, Japan, December 6-9, 2005, pp. 1255-1264. (Lecture Notes in Computer Science, Springer-Verlag.), (SCI-E, JCR’05=0.402)
  7. Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, and Jia-Chun Lin, “An Enhanced DGIDE Platform for Intrusion Detection,” The International Conference on Autonomic and Trusted Computing, Hong Kong, China, July 2007, (Lecture Notes in Computer Science, Springer-Verlag.), pp. 559-568.
  8. Fang-Yie Leu, Yu-Hsin Chen, Ching-Chien Kuan and Dr-Jiunn Deng, “An Improved Bandwidth-use Method on IEEE 802.11e Standard over WLAN,” the IFIP International Conference on Network and Parallel Computing, Dalian China, September 2007. (Lecture Notes in Computer Science, Springer-Verlag.), pp. 183-192.
  9. Fang-Yie Leu and Guo-Cai Li, “A Scalable Sensor Network using a Polar Coordinate System,” Signal Processing, vol. 87, issue 12, December 2007, pp.2978-2990. (SCI, JCR’11=1.503, 79/245)
  10. Fang-Yie Leu, Ming-Chang Li, Jia-Chun Lin and Chao-Tung Yang, “Detection Workload in a Dynamic Grid-based Intrusion Detection Environment,” Journal of Parallel and Distributed Computing, vol.68, issue 4, April 2008, pp.427-442. (SCI, JCR’11=0.859, 40/99)
  11. Fang-Yie Leu and Kai-Wei Hu, “A Real-Time Intrusion Detection System using Data Mining Technique,” Journal of Systemics, Cybernetics and Informatics, vol. 6, no. 2, April 2008, pp.36-41. (online). www.iiisci.org/journal/CV$/sci/pdfs/T171GTB.pdf
  12. Fang-Yie Leu, Wen-Chin Wu, and Hung-Wei Huang, “A Routing Assistant Scheme with Localized Movement in Uniformly Distributed Event-driven Wireless Sensor Networks,” The Joint International Conferences on Asia-Pacific Web Conference (APWeb) and Web-Age Information Management (WAIM), April 2009. (Lecture Notes in Computer Science, Springer-Verlag.), pp. 576-583.
  13. Fang-Yie Leu, “An Inner and Incoming Intrusion Detection and Remote Protection System,” International Transaction on Computer Science and Engineering, vol. 55, no. 1, August 2009, pp. 81-96.
  14. Fang-Yie Leu, “A Novel Network Mobility Handoff Scheme Using SIP and SCTP for Multimedia Applications,” Journal of Network and Computer Applications, vol. 32, issue 5, September 2009, pp. 1073-1091. (SCI, JCR’11=1.065, 21/50)
  15. Fang-Yie Leu, Der-Jiunn Deng and, Yi-Fung Huang, “An Efficient Bandwidth-use Scheme over WLAN with the IEEE 802.11e Standard Deploying a Multi-polling Mechanism,” International Transaction on Computer Science and Engineering, vol. 56, no. 1, October 2009, pp. 23-46.
  16. Fang-Yie Leu, “Intrusion Detection, Forecast and Traceback Against DDoS Attacks,” Journal of Information, Technology and Society, vol. 9, December 2009, pp. 19-44.
  17. Chao-Tung Yang, Fang-Yie Leu and Ming-Feng Yang, “A Peer-to-Peer Video File Resource Sharing System for Mobile Devices,” Journal of Internet Technology, vol. 11, no. 1, February 2010, pp.69-78. (SCI, JCR’11=0.508, 57/89)
  18. Fang-Yie Leu and Chih-Chieh Ko, “An Automated Term Definition Extraction System Using the Web Corpus in the Chinese Language,” Journal of Information Science and Engineering, vol. 26, no.2, March 2010, pp. 505-525. (SCI, JCR’11=0.175, 132/135)
  19. Fang-Yie Leu, Chau-Tung Yang, Fuu-Cheng Jiang, “Improving Reliability of a Heterogeneous Grid-based Intrusion Detection Platform using Levels of Redundancies,” Future Generation Computer Systems, vol. 26, issue 4, April 2010, pp. 554-568. (SCI, JCR’1 1=1.978,9/99)
  20. Fang-Yie Leu, I-Long Lin, “A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach,” Journal of Systemics, Cybernetics and Informatics, vol. 8, no. 2, April 2010, pp. 41-51. (online). http://www.iiisci.org/Journal/sci/Contents.asp?var=&next=ISS8802
  21. Chao-Tung Yang, Fang-Yie Leu and Sung-Yi Chen, “Network Bandwidth-aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers,” Journal of Supercomputing, vol. 52, no. 3, June 2010, pp. 199-223. (SCI, JCR’11=0.578, 37/50)
  22. 林宜隆,邱獻民,呂芳懌, “數位證據同一性在法庭上之攻擊與防禦─以在網際網路蒐集之數位證據為中心,” 中央警察大學學報第四十七期, 民國99年七月, pp. 363~377.
  23. Li-Wen Liu, Li-Ju Jang, Fang-Yie Leu, Jieh-Jiuh Wang, Shu-Twu Wang, “From an Interdisciplinary Approach to Construct a Model of Community Disaster Management Support System,” Australasian Journal of Disaster and Trauma Studies, Vol. 2-1-2, 2010. (online). http://trauma.massey.ac.nz/issues/2010-2/contents.htm
  24. Fang-Yie Leu, Neng-Wen Lo, Lun-Ni Yang, I-Long Lin, “Predicting Vertebrate Promoters Using Heterogeneous Clusters,” International Journal of Ad Hoc and Ubiquitous Computing: a Special Issue on: "Grid and Cloud Computing, Vol. 6, No. 4, September 2010, pp.216–234. (SCI, JCR’11=0.848, 80/135)
  25. Chao-Tung Yang, Fang-Yie Leu, and Sung-Yi Chen, “Resource Brokering using a Multi-site Resource Allocation Strategy for Computational Grids,” Concurrency and Computation: Practice and Experience, vol.23, no. 6, April 2011, pp. 573–594. (SCI, JCR’11=0.636, 64/99)
  26. Fang-Yie Leu, Ilsun You and Yao-Tien Huang, “A Coordinated Multiple Channel Assignment Scheme and AP Deployment for Channel Reuse in Metropolitan Scale Wireless Networks,” Journal of Network and Computer Applications, vol. 34, Issue 2, March 2011, pp.632-643. (SCI, JCR’11=1.065, 21/50)
  27. Yi-Fung Huang, Fang-Yie Leu, Chao-Hong Chiu and I-Long Lin, “Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS,” Journal of Universal Computer Science, vol. 17, no. 6, March 2011, pp. 891--911. (SCI, JCR’11=0.398, 85/104)
  28. Fang-Yie Leu, Fenq-Lin Jenq and Fuu-Cheng Jiang, “A Path Switching Scheme for SCTP Based on Round Trip Delays,” Computers and Mathematics with Applications, vol. 62, Issue 9, November 2011, pp. 3504–3523. (SCI, JCR’12=2.069, 11/247)
  29. Yi-Fu Ciou, Fang-Yie Leu, Yi-Li Huang and Kangbin Yim, “A Handover Security Mechanism Employing Diffie-Hellman Key Exchange Approach for IEEE802.16e Wireless Networks,” Mobile Information Systems, vol. 7, no. 3, September 2011, pp. 241–269. (SCI, JCR’11=2.432, 11/135)
  30. Fang-Yie Leu, IlsunYou and Feilong Tang, (Guest Editorial) “Emerging Wireless and Mobile Technologies,” Mobile Information Systems, vol. 7, no. 3, September 2011, pp. 165–167.
  31. Yi-Li Huang and Fang-Yie Leu,“Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 3, September 2011, pp. 96-107.
  32. Fang-Yie Leu, (Guest Editorial), “Emerging Security Technologies and Applications,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 3, September 2011, pp.1-3.
  33. Fuu-Cheng Jiang, Der-Chen Huang, Chao-Tung Yang and Fang-Yi Leu, “Lifetime Elongation for Wireless Sensor Network using Queue-based Approaches,” Journal of Supercomputing, vol. 59, Issue 3, January 2012, pp. 1312-1335. (SCI, JCR’12=0.917, 39/100)
  34. Ming-Chang Lee, Fang-Yie Leu, Ying-ping Chen, “An Adaptive Data Replication Algorithm based on Star-based Data Grids,” Future Generation Computer Systems, vol. 28, issue 7, July 2012, pp. 1045–1057. (SCI, JCR’12=1.864, 15/100)
  35. Fang-Yie Leu, Keng-Yen Chao, Ming-Chang Lee and Jia-Chun Lin “A Semi-preemptive Computational Service System with limited Resources and Dynamic Resource Ranking,” Algorithms, vol. 5, issue 1, March 2012, pp.113-147.
  36. Yi-Li Huang, Chu-Hsing Lin and Fang-Yie Leu*, “A Batch Verification Scheme by using the Matrix-Detection Algorithm,” Journal of Internet Technology, vol. 13, no.4, July 2012, pp. 681-690.( SCI, JCR’12=0.481, 61/78)
  37. Fang-Yie Leu , Fuu-Cheng Jiang, Chih-Cheng Lien, Sen-Tarng Lai and Shiuan-You Chiou, “A Rate-allocation Based Multi-path Congestion Control Scheme for Event-Driven Wireless Sensor Networks,” Computer Systems Science and Engineering, vol. 27, no. 5, September 2012, pp. (SCI, JCR-0.371, 88/99)
  38. Yi-Li Huang, Fang-Yie Leu, Ko-Chung Wei,“A Secure Communication over Wireless Environments by using a Data Connection Core, Mathematical and Computer Modelling, vol. 58, issue 5-5, September 2013, pp. 1459–1474. (SCI, JCR’12=1.42, 38/247)
  39. Marek R. Ogiela, Ilsun You, Makoto Takizawa, Fang-Yie Leu, (Guest Editorial), “Advances in mobile, ubiquitous and cognitive computing,” Mathematical and Computer Modelling, vol. 58, 2013, pp. 1138-1139.
  40. Jia-Chun Lin, Fang-Yie Leu, Ying-ping Chen, ReHRS: A Hybrid Redundant System for Improving MapReduce Reliability and Availability, a book chapter of Springer book Company entitled Modelling and Processing for Next Generation Big Data Technologies and Applications, 2015, 187-209
  41. Yi-Li Huang, Fang-Yie Leu*, Ilsun You, Yao-Kuo Sun, and Cheng-Chung Chu, “A Secure Wireless Communication System Integrating RSA, Diffie-Hellman PKDS, Intelligent Protection-key Chains and a Data Connection Core in a 4G Environment,” Journal of Supercomputing, vol. 67, no.3, March 2014, pp. 635-652. (SCI, JCR’12=0.917, 39/100)
  42. Fuu-Cheng Jiang, Fang-Yie Leu, Hsiang-Wei Wu, Ching-Hsien Hsu and William Cheng-Chung Chu, “Toward Sustainable Sensor Field by Greener Technique of Optimization with Queue-based Approach,” Journal of Internet Technology, vol.14, no.4, July, 2013, pp. 619-630. (SCI, JCR’12=0.418, 68/78)
  43. Fuu-Cheng Jiang, Hsiang-Wei Wu, Fang-Yie Leu, and Chao-Tung Yang, “Toward green sensor field by optimizing power efficiency using D-policy M/G/1 queuing systems,” Mobile Information Systems, vol. 9, no.3, January 2013, pp.241-260.
  44. CHIN-LING CHEN, TSAI-TUNG YANG, FANG-YIE LEU AND YI-LI HUANG, “Designing a Healthcare Authorization Model Based on Cloud Authentication,” Intelligent Automation and Soft Computing, vol. 20, no. 3, pp. 365-379, July 2013. SCI=0.155.
  45. Jia-Chun Lin, Fang-Yie Leu, and Ying-ping Chen, “Analyzing job completion reliability and job energy consumption for a general MapReduce infrastructure,” Journal of High Speed Networks, vol. 19, no. 3, 2013, pp. 203–214. (EI)
  46. Kun-Lin Tsai, Fang-Yie Leu, Tien-Han Wu, Shin-shiuan Chiou, Yu-Wei Liu and Han-Yun Liu “A Secure ECC-based Electronic Medical Record System,” Journal of Internet Services and Information Security, vol. 4, no. 1, February 2014, pp. 47-57.
  47. Chin-Ling Chen, Chun-Yi Wu, Fang-Yie Leu and Yi-Li Huang, “Using RFID Yoking Proof to Design a Supply-Chain Applications for Customs Check,” IT CoNvergence PRActice (INPRA), vol. 1, no. 2, June 2013, pp. 34-54.
  48. Fang-Yie Leu, Jung-chun Liu, Ya-Ting Hsu, Yi-Li Huang, “The Simulation of an Emotional Robot Implemented with Fuzzy Logic,” Soft Computing Journal, September vol. 18, Issue 9, Sept. 2014, pp. 1729-1743. (SCI, JCR’13=1.304, 59/121)
  49. Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen and William Cheng-Chung Chu, “A True Random-Number Encryption Method Employing Block Cipher and PRNG,” Computer Science and Information Systems (ComSIS), vol.11, issue 3, pp.905–924, August 2014. (SCI, JCR’13=0.575, 101/135)
  50. Ilsun You, Yi-Li Huang, Fang-Yie Leu, Jung-chun Liu, Lih-Jiun Lo, “A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core,” Journal of Internet Technology, vol.15, no.5, September 2014, pp. 713-726. (SCI, JCR’13=0.418, 68/78)
  51. Jia-Chun Lin, Fang-Yie Leu*, Ying-ping Chen, “PAReS: A Proactive and Adaptive Redundant System for MapReduce,” Journal of Information Science and Engineering, vol. 31, no. 5, pp.1797-1815, Sept. 2015. (SCI, JCR’13=0.333, 128/135)
  52. Fang-Yie Leu, Fatos Xhafa, Aniello Castiglione and Yi-Li Huang, “EMERGING WIRELESS AND SENSOR NETWORKS AND THEIR APPLICATIONS,” International Journal of Communication Networks and Distributed Systems, vol. 13, nos. 3/4, 2014, pp. 241-243. (EI)
  53. Jia-Chun Lin, Fang-Yie Leu, Ying-ping Chen, “Analyzing Job Completion Reliability and Job Energy Consumption for a Heterogeneous MapReduce Cluster under Different Intermediate-Data Replication Policies,” Journal of Supercomputing, vol. 71, Issue 5, pp 1657-1677, May 2015. (SCI, JCR’13=0.841, 47/102)
  54. Chia-Yin Ko, Fang-Yie Leu and I-Tsen Lin, “Using smart phone as a track and fall detector: An intelligent support system for people with dementia,” a book chapter of Advanced Technological Solutions for Dementia Patient Monitoring, edited by Fatos Xhafa, Philip Moore and George Tadros, IGI Publisher.
  55. Jia-Chun Lin, Fang-Yie Leu, and Ying-ping Chen, “Impact of MapReduce Policies on Job Completion Reliability and Job Energy Consumption,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, issue 5, May 2015, pp. 1364-1378. (SCI, JCR’13=2.173, 10/102)
  56. Ming-Chang Lee, Fang-Yie Leu*, Ying-ping Chen, “Pareto-based Cache Replacement Algorithms for YouTube,” World Wide Web Journal, vol. 18, Issue 6, pp.1523–1540, November 2015. (SCI, JCR’13-1.623, 20/105)
  57. Fang-Yie Leu and Yi-Ting Hsiao, “A Grid System Detecting Internal Malicious Behaviors at System Call Level,” Journal of Internet Services and Information Security (JISIS), vol. 4, no. 4, November 2014, pp. 14-24.
  58. Yi-Li Huang, Cheng-Ru Dai, Fang-Yie Leu, Ilsun You*, “A Secure Data Encryption Method Employing a Sequential-Logic Style Mechanism for a Cloud System,” International Journal of Web and Grid Services, vol. 11, no. 1, January 2015, pp. 102-124. SCI, JCR’13=1.579, 24/105.
  59. Yi-Li Huang, I-Long Lin, Fang-Yie Leu*, Jung-Chun Liu, Fuu-Cheng Jiang, Cheng-Chung Chu, Chao-Tung Yang, Miao-Heng Chen, “A Secure Authentication System for Controlling Traffic Lights for Ambulances,” Journal of Internet Technology, vol. 16, no. 1, January 2015, pp.19-33. (SCI, JCR’12=0.418, 68/78)
  60. Fang-Yie Leu, Kun-Lin Tsai*, Yi-Ting Hsiao, and Chao-Tung Yang, “An Internal Intrusion Detection and Protection System by using Data Mining and Forensic Techniques,” IEEE Systems Journal, vol. 11, no. 2, June 2017, pp. 427-438. (SCI)
  61. Marek R. Ogiela, Ilsun You, Fang-Yie Leu, and Yu-Chee Tseng, “Secure ubiquitous computing,” Pervasive and Mobile Computing, vol.24, December 2016, pp. 1-3.
  62. Ilsun You* and Fang-Yie Leu, “Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks,” IEEE Systems Journal, accepted August 15, 2015. (SCI)
  63. Fang-Yie Leu*, Chin-Yu Liu, Jung-Chun Liu, Fuu-Cheng Jiang, “S-PMIPv6: an Intra-LMA model for IPv6 Mobility,” Journal of Network and Computer Applications, Vol. 58, December 2015, pp. 180–191.
  64. Jia-Chun Lin, Fang-Yie, Leu and Ying-ping Chen, “Impacts of Task Re-execution Policy on MapReduce Jobs,” The Computer Journal, vol. 59, issue 5, 2016, 701-714.
  65. Chia-Ping Shen, Feng-Sheng Lin, Andy Yan-Yu Lam, Wei Chen, Weizhi Zhou, Hsiao-Ya Sung, Yi-Huei Kao, Ming-Jang Chiu, Jeng-Wei Lin, Fang-Yie Leu, and Feipei Lai, “GA-SVM modeling of multiclass seizure detector in epilepsy analysis system using cloud computing.” Soft Computing, 14 November 2015, pp. 1-11.
  66. Ilsun You, Fang-Yie Leu, “Applied Cryptography and its Practical Applications to Secure Internet Services,” Journal of Internet Technology, Accepted October 2015.???.
  67. Chao-Tung Yang, Wen-Chung Shih, Lung-Teng Chen, Cheng-Ta Kuo, Fuu-Cheng Jiang, Fang-Yie Leu, “Accessing Medical Image File with Co-allocation HDFS in Cloud,” Future Generation Computer Systems, vol. 43-44, February 2015, pp. 61-73. SCI
  68. Fang-Yie Leu, Hsin-Liang Chen, and Chih-Chung Cheng, “Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA,” Journal of Internet Services and Information Security (JISIS), vol. 5, no. 4, November 2015, pp. 1-19.
  69. Heru Susanto, Leu Fang-Yie, and Chin Kang Chen, “Android vs iOS or Others? SMD-OS Security Issues: Generation Y Perception,” International Journal of Technology Diffusion (IJTD), vol. 7, no. 2, pp. 1-18, 2016.
  70. Fuu-Cheng Jiang, Ilsun You and Fang-Yi Leu, “Approaching green Sensor Field using Queue-based Optimization Technique,” Journal of Network and Computer Applications, vol. 66, May 2016, pp. 128–136.
  71. Kun-Lin Tsai, Fang-Yie Leu, and Jiu-Soon Tan, “An ECC-based Secure EMR Transmission System with Data Leakage Prevention Scheme,” International Journal of Computer Mathematics, vol. 93, no. 2, February 2016, pp. 367-383. (SCI, 2014, 0.825)
  72. Heru Susanto, Chen Chin Kang and Fang Yie Leu, “Revealing the Role of ICT for Business Core Redesign,” Information System and Economics and EJournal, accepted February 2016.
  73. Heru Susanto, Chen Chin Kang and Fang Yie Leu, “A Lesson Learn from IT as Enable of Business Process Re-Design,” Information System and Economics and EJournal, accepted in February 2016.
  74. Kun-Lin Tsai, Fang-Yie Leu, and Ilsun You*, “Residence Energy Control System Based on Wireless Smart Socket and IoT,” IEEE ACCESS, vol. 4, 2016, pp. 2885-2896.
  75. Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, and Ilsun You, “TTP based High-efficient Multi-Key Exchange Protocol,” IEEE ACCESS, vol.4, 2016, pp.6261-6271.
  76. Kun-Lin Tsai*, Fang-Yie Leu and Shun-Hung Tsai, “Data Encryption Method Using Environmental Secret Key with Server Assistance,” Intelligent Automation & Soft Computing, vol. 22, Issue 3, August 2016, pp. 423-430. (SCI)
  77. Fang-Yie Leu, Yi-Li Huang, Sheng-Mao Wang, “A Secure M-Commerce System based on credit card transaction,” Electronic Commerce Research and Applications, vol. 14, 2015, pp. 351-360. (SCI, IF=2.135)
  78. Chao-Tung Yang, Jung-Chun Liu, Wei-Sheng Chen, Fang-Yie Leu and William Cheng-Chung Chu, “Implementation of a virtual switch monitoring system using OpenFlow on cloud,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 24, No. 3, 2017, pp. 162-172. (SCI, JCR’13=0.90, 81/135)
  79. Tzu-Chiang Chiang, Pei-Yun Cheng, and Fang-Yie Leu*, “Prediction of technical efficiency and financial crisis of Taiwan’s information and communication technology industry with decision tree and DEA,” Soft Computing, vol. 21, issue 18, September 2017, pp. 5341-5353. (SCI)
  80. Yao-Chung Fan, Huan Chen, Fang-Yie Leu, Ilsun You*, “Enabling In-Network Aggregation by Diffusion Units for Urban Scale M2M Networks,” Journal of Network and Computer Applications, vol. 93, 1 September 2017, pp. 215–227.
  81. Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu*, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu, “A Square Key Matrix Management Scheme in Wireless Sensor Networks,” Computing and Informatics, Vol. 36, May 2017, 1001–1017. (SCI, JCR’13=0.319, 121/115)
  82. Fang−Yie Leu, Chia−Yin Ko, Ilsun You*, Kim-Kwang Raymond Choo, Chi-Lun Ho, “A Smartphone-Based Wearable Sensors for Monitoring Real-Time Physiological Data,” Computers and Electrical Engineering, accepted May 31, 2017. (SCI, IF17=1.084).
  83. Jung-Chun Liu, Fang-Yie Leu*, Guan-Liang Lin, Heru Susanto, “An MFCC-based Text-independent Speaker Identification System for Access Control,” accepted June 27, 2017. SCI
  84. Heru Susanto, Leu Fang-Yie and Chin Kang Chen, The Emerging Technology of Big Data-- Its Impact as a Tool of ICT Development, Apple Academic Press (book chapter), expected at April 2018.
  85. Fang-Yie Leu, Chia-Yin Ko, Yi-Chen Lin, Heru Susanto, Hsin-Chun Yu, “FALL DETECTION AND MOTION CLASSIFICATION BY USING DECISION TREE ON MOBILE PHONE,” Chapter 10 of the book entitled Smart Sensors Networks -- Communication Technologies and Intelligent Applications, pp. 234-267, 2017.

Submitted papers

  1. Yi-Fung Huang, Fang-Yie Leu and Chao-Hong Chiu, “Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM Environment without Prior Authentication Connection,” 未投稿.
  2. Fang-Yie Leu, Chih-Cheng Lien, Fenq-Lin Jenq and Hung-Wei Huang, “An Event-Driven Mobile Assistant Control Protocol for Wireless Sensor Networks,” submitted to International Journal of Computer Systems Science and Engineering. (SCIE), April 8, 2011.
  3. Fang-Yie Leu, “A Channel Assignment Scheme for Concentric Hexagon based Multi-Channel Wireless Networks,” 未投稿
  4. Fang-Yie Leu, and Aniello Castiglione “Maximum Transmission Capacity of Chain-Topology Wireless Mesh Networks,” 未投稿.
  5. Fang-Yie Leu and Aniello Castiglione, “A Location-based Handoff Scheme based on IEEE 802.21 in Heterogeneous Wireless Networks,” Submitted to Journal of System and Software, 未投稿
  6. Ming-Chang Lee, Fang-Yie Leu, Jia-Chun Lin, and Ying-ping Chen, “TSR: Topology Reduction from Tree to Star for a Drop-Free Data Grids,” 未投稿
  7. Ming-Chang Lee, Jia-Chun Lin, Fang-Yie Leu, and Ying-ping Chen, “ReMBF: A Reliable Multicast Brute-Force Co-Allocation Scheme for Multi-user Data Grids,” Submitted to Future Generation Computer Systems. 整理中. (SCI)

Conference papers

  1. F.Y. Leu, "An Internal Inspection of a Distributed Office Information System" Ph.D Dissertation of National Taiwan Institute of Technology, Taipei, Taiwan, ROC, July 1991.
  2. 楊鍵樵,呂芳懌,連志誠等 "支援智慧型網路管理系統之物件導向資料庫雛形系統"INTC '95,台北,中華民國八十四年十月
  3. 楊鍵樵,呂芳懌,"智慧型網管系統資料庫之研究與雛型系統之開發之研究",資策會委託研究計畫,中華民國八十四年六月
  4. F.Y. Leu and S.K. Chang, "An Internal Protocol Assistant for Distributed Systems," Proc. of SPIE Conference, Orlando, FL, 1991.
  5. F.Y. Leu and C.C. Yang, "Rule Base Inspection Using Algorithmic Approach for Data-Access Oriented Knowledge-Based Systems," IEEE COMPSAC, Chicago, 1990, pp.155-160.
  6. 呂芳懌 資料庫與生活 人力與發展雜誌 第二十期 中華民國八十四年九月
  7. 呂芳懌 資料表示法 人力與發展雜誌 第二十一期 中華民國八十四年十月
  8. 呂芳懌 資料庫之演進 人力與發展雜誌 第二十二期 中華民國八十四年十一月
  9. 呂芳懌 資料庫之功能 人力與發展雜誌 第二十三期 中華民國八十四年十二月
  10. 呂芳懌 資料庫管理人員之角色 人力與發展雜誌 第二十四期 中華民國八十五年一月
  11. 呂芳懌 資料庫相關人員 人力與發展雜誌 第二十五期 中華民國八十五年二月
  12. 呂芳懌 資料庫之應用 人力與發展雜誌 第二十六期 中華民國八十五年三月
  13. 呂芳懌 資料庫之管理 人力與發展雜誌 第二十七~二十九期 中華民國八十五年四~六月
  14. F.Y. Leu and S.W. Zhao, “The Query and Integration Algorithms in a Distributed Database, “Proceeding of the 14th Workshop on Combinatorial Mathematics and Computation Theory, Taichung, Taiwan, June 1997, pp.114-117.
  15. Fang-Yie Leu呂芳懌), Shiang-Wei Chao,Dec.1997, “A Distributed Database Architecture and its Query,” Proceedings of National Computer Symposium 1997, Taiwan, pp. A38-A42.
  16. 呂芳懌,林厚誼,黃文鴻,邱聖斌,朱峻德,龔俊杰 “文字資料庫在犯罪偵察之應用—竊盜犯罪手法之比對,”, 第十屆國際資訊管理學術研討會,1999年6月,台灣台北pp.935-943
  17. 呂芳懌,余少棠,許閔雄,林晁立,蔡清欉 “影像資料庫在人臉辨識上的應用—前科犯資料庫,”,第十屆國際資訊管理學術研討會,1999年6月,台灣台北pp.863-870
  18. 呂芳懌, 林厚誼, “協助犯罪偵察之前科犯資料庫績效品質改善,”第三十五屆品質管制研討會, 中華民國八十八年十一月.
  19. 呂芳懌等, “影像資料庫在人臉辨識上的應用—前科犯資料庫,” 東海科學第一捲,東海大學,中華民國八十八年七月。
  20. 呂芳懌, 黃文鴻, “協助查詢有地緣關係之前科犯資訊的地理資訊系統,” 大業學報,第九卷,第一期,八十九年。
  21. 呂芳懌, 黃文鴻, “協助查詢有地緣關係之前科犯資訊的地理資訊系統,”第四屆資訊管理學術及警政資訊實務研討會,2000年5月,pp.115-123。
  22. 呂芳懌,林厚誼, “物件導向竊盜犯罪案件相似性比對,” 第十一屆物件導向技術及應用研討會,2000年九月。
  23. 呂芳懌,林晁立, “以臉部器官形狀、寬度、相對位置從事人臉影像辨識,” 第十一屆物件導向技術及應用研討會,2000年九月。
  24. 呂芳懌,楊子逸,“IIS網頁伺服器Unicode漏洞探討,”第五屆資訊管理學術及警政資訊實務研討會,2001年6月。
  25. 呂芳懌,顏義樺,施政瑋,”探查疑似不法資訊網站之分散式網路巡邏系統,’ 2001年網際空間:資訊、法律與社會,2001年12月24日。
  26. 呂芳懌,歐建暉,邱維埠, ”大學校園寬頻網路運用研究—東海數位村—寬頻網路監測,”,2002年電子商務與數位生活研討會,2002年3月, pp.489-495。
  27. 呂芳懌,顏義樺,施政瑋,”以網頁特性為基礎之重要性排名,’ 2002年第六屆資訊管理學術及警政資訊實務研討會,2002年5月, pp.489-495.
  28. 呂芳懌,蘇俊維,”網路入侵與防禦策略探討,”第三屆網際網路應用與發展研討會,2002年5月
  29. 呂芳懌, 黃文鴻, “能提供及追蹤行車最短路徑之分散式系統,”2002中華地理資訊學會暨學術研討會,2002年9月
  30. 呂芳懌,楊子逸,“IIS伺服器漏洞剖析與防備,”第四屆2002年網際空間:資訊、法律與社會,2002年11月29日。
  31. 呂芳懌,黃品璁,楊子逸,胡凱威,“低負載隱形式網路異常偵測器,” 2003年電子商務與數位生活研討會,2003年4月11-12日, pp.165-165(摘要,本文在光碟片中未編頁碼)。
  32. 呂芳懌,蘇俊維,許惟翔,” 內部網路安全威脅分析與防制,” 2003年電子商務與數位生活研討會,2003年4月11-12日, pp.166-166(摘要,本文在光碟片中未編頁碼)。
  33. 呂芳懌,施政瑋,”以詞義概念為基礎的文件檢索與比對,” 2003年資訊技術應用與發展研討會,2003年6月28日,pp.667-673.
  34. 呂芳懌,顏義樺,” 以事件聯想為基礎之文章相似性比對 ,” 2003年資訊技術應用與發展研討會,2003年6月28日,pp.61-67.
  35. 呂芳懌,顏義樺,”以聯想法則概念網路為基礎之文章概念探索及相似比對,” 第十四屆國際資訊管理學術研討會,2003年7月12日,pp.330-336.
  36. 呂芳懌,洪嘉鴻,鄭真真,”UDAIDTS:以Hash為基礎的主動式區域聯防入侵偵測與追蹤系統,” 第十四屆國際資訊管理學術研討會,2003年7月12日,pp.1090-1097.
  37. F.Y. Leu and T.Y. Yang, “A Host-Based Real-Time Intrusion Detection System with Data Mining and Forensic Techniques,” IEEE 2003 International Carnahan Conference on Security Technology,Taiwan,ROC,Oct. 14-16, 2003, pp.580-586.
  38. 呂芳懌,鄭真真,洪嘉鴻,管清健,林佳純,李明昌,”以分散式平行入侵偵測系統從事區域聯防, 2003年「網際空間:科技、犯罪與法律社會」學術研究暨實務研討會,12月,2003年,pp.129-139。
  39. 呂芳懌,楊惟傑,鄭真真,洪嘉鴻,”UDIFT:具預警功能與入侵追蹤之區域聯防系統,” 2003年「網際空間:科技、犯罪與法律社會」學術研究暨實務研討會,12月,2003年,pp.140-148。
  40. Leu, Fang-Yie and Yao-Chung Fan, “Compressing a Directed Massive Graph using Small World Model,” IEEE Data Compression Conference, March 2004.Poster.
  41. F.Y. Leu and K.W. Lee, “Transmission Cost Models of Data-Retrieval based on Specific Data Allocations without Directory on Cluster Systems,” In the Proceedings of the 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004), Orlando, USA, 2004, pp.167-172.
  42. Leu, Fang-Yie and Yao-Chung Fan, “Dealing with the Structure of Real World Graphs,” The 2nd International Conference on Computer Science and its Applications (ICCSA-2004), June 2004, California, USA, 2004, pp.40-49.
  43. 呂芳懌,楊惟傑,林佳純,李明昌,“網路安全分析與趨勢” 2004年資訊科技與人文管理教育論壇-數位內容數位教育與管理政策研討會,2004年7月, pp.277-293.
  44. Leu, Fang-Yie and Yao-Chung Fan, “Compressing an Inverted File with LCS,” IEEE COMPSAC 2004, Sept., 2004, Hong Kong, pp.60-61. (EI)
  45. Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Bo-Qi Shi, “Integrating Grid with Intrusion Detection,” the IEEE 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei Taiwan, March 2005, pp.304-309. (EI)
  46. Hsiao-Hong Tsai, Fang-Yie Leu and Wen-Kui Chang, “Mobile Agent Communication Using SIP,” IEEE 2005 International Symposium on Applications and the Internet (SAINT2005), Trento, Italy, January 2005, pp.274-279. (EI)
  47. Fang-Yie Leu and Wei-Jie Yang, “IFTS: Intrusion Forecast and Traceback based on Union Defense Environment,” the 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), July 20-22, 2005, pp. 716- 722. (EI)
  48. Fang-Yie Leu, Ching-Chien Kuan, Dr-Jiunn Deng and Wen-Kui Chang, “Quality of Service for Voice over Wireless LAN by Deploying Multipolling in IEEE802.11e Standard,” 2005 IEEE International Symposium on Multimedia Over Wireless. (EI)
  49. Hsiao-Hong Tsai, Fang-Yie Leu and Wen-Kui Chang, “Distributed SendBox Scheme for Mobile Agent Communication,” 2005 IEEE the 4th International Conference on Mobile Business (ICMB 2005), Sydney, Australia, July 2005. (EI), pp. 545-550.
  50. Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, “A Performance-Based Grid Intrusion Detection System,” Proceedings of the 29th International Computer Software and Applications Conference (COMPSAC 2005), Edinburgh, Scotland, July 26-28, 2005. (EI)
  51. Fang-Yie Leu, Ching-Chien Kuan, Der-Jiunn Deng and Yu-Hsin, Chen, “Guaranteed Non Dropping Mechanism Deploying IEEE802.11e Standard,” The International Conference on Signal-Image Technology & Internet–Based Systems, Yaoundé Cameroon, Nov. 2005, pp. 170-175.
  52. Fang-Yie Leu, Neng-Wen Lo, Lun-Ni Yang, “Predicting Vertebrate Promoters with Homogeneous Cluster Computing,” The International Conference on Signal-Image Technology & Internet–Based Systems, Yaoundé Cameroon, Nov. 2005, pp. 143-148.
  53. Fang-Yie Leu and Kai-Wai Hu, “A Real-Time Intrusion Detection and Identification System with Data Mining and Forensic Techniques,” The International Forensic Science Symposium, Taipei, Taiwan, Nov. 2005.
  54. Fang-Yie Leu and Wei-Jie Yang, “CUSUM Intrusion Detection & Traceback System,” The International Forensic Science Symposium, Taipei, Taiwan, Nov. 2005.
  55. L.W. Liu, R.M. Tsay, J. Shiang and Fang-Yie Leu, “Promoting Technical Innovation: The Application of GIS for In-Home Services,” the Fourth National Gerontological Social Work Conference, Chicago, Illinois, February 16 – 19, 2006.
  56. Fang-Yie Leu, Ming-Chang Li, Jia-Chun Lin, “An Intrusion Detection System on Dynamic Detection Environment,” International Conference on Computational Science and Its Applications, May 2006.
  57. Fang-Yie Leu and Tai-Shiang Wang, “Integrating Mobile Agents with a Wireless Grid Platform,” the IEEE-ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, June 2006, pp. 139-144.
  58. Fang-Yie Leu, Ming-Chang Li, and Jia-Chun Lin, “Intrusion Detection based on Grid,” International Multi-Conference on Computing in the Global Information Technology, Romania, Aug. 2006, pp. 62-67.
  59. Fang-Yie Leu and Tai-Shiang Wang, “Data Analysis Using GIS and Data Mining,” International Conference on Territorial Intelligence, Alba Iulia, Romania, Oct. 2006.
  60. Fang-Yie Leu, Yu-Hsin Chen, Ching-Chien Kuan, “An Efficient Bandwidth-using Scheme over WLAN with IEEE 802.11e Standard,” the IEEE International Workshop on Broadband Convergence Networks, Munich Germany, May 2007. (EI)
  61. Fang-Yie Leu, and Kuo-Wei Lee, “A Transmission Cost Model of Data Retrieval from a Cluster System on an One-Node One-Fragment, One-Node One-Task and Random Allocation Environment using no Global Directory,” the World Multi-Conference on Systemics, Cybernetics and Informatics, Florida USA, July 2007, pp. 112-116.
  62. Fang-Yie Leu and Kai-Wei Hu, “A Real-Time Intrusion Detection and Identification System on Command-Line-Interface Computers using Data Mining and Forensic Techniques in an Intranet,” the International Conference on Computing, Communications and Control Technologies, Florida USA, July 2007, pp. 148-153.
  63. Fang-Yie Leu and Kai-Wei Hu, “A Real-Time Intrusion Detection System using Data Mining and Forensic Techniques,” the International Workshop on Security, October 2007, pp.137-152.
  64. Fang-Yie Leu and Chih-Chieh Ko, “An Automated Term Definition Extraction using the Web Corpus in Chinese Language,” the IEEE International Conference on Natural Language Processing and Knowledge Engineering, Beijing China, August/September 2007, pp. 435-440. (EI).
  65. Fang-Yie Leu, “Analyzing Survey Data Concerning the Construction of Central Taiwan Science Park using Association Rules and Geographical Information Systems,” International Conference on Territorial Intelligence, Huelva, Spain, Oct. 2007.
  66. Fang-Yie Leu and Yu-Ting Huang, “Maximum Capacity in Chain-Topology Wireless Mesh Networks,” Wireless Telecommunications Symposium, CA, 2008, pp. 250-259. (EI)
  67. Fang-Yie Leu, Zhen-Jia Ko, “A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia Applications,” International Conference on Intelligent Multimedia Information System, 2008. pp.564-569. (EI)
  68. Fang-Yie Leu, Guo-Cai Li and Wen-Chin Wu, “An Autonomous Energy-Aware Routing Scheme: a Supplementary Routing Approach for Path-Preserving Wireless Sensor Networks,” The IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2008, pp.49-60.
  69. Fang-Yie Leu, Shu-Ren Lee Modeling and Simulation of Energy Producing Process of Fats Metabolism by Using Petri Nets,” International Conference on Computer Graphics and Image and Multimedia Processing, 2008.
  70. Fang-Yie Leu, and Yao-Tien Huang, “Software Tools Developed and Employed for Survey on Central Taiwan Science Park and Data Analyses,” International Conference on Territorial Intelligence, Besancon, Oct. 2008.
  71. L.W. Liu and Fang-Yie Leu, “Use of GIS and Data Mining Techniques in the Designing of Community-Based Services for the Elderly,” The International Conference on the Gerontological Society of America’s 61th Annual Meeting, Washington DC, November 2008.
  72. Chao-Tung Yang, Fang-Yie Leu, and Sung-Yi Chen, “Network Bandwidth-aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers,” International Conference on Asia-Pacific Services Computing Conference, 2008, pp. 775-780. (EI)
  73. Fang-Yie Leu and Chia-Chi Pai, “Detecting DoS&DDoS Attacks Using Chi-Square,” the Fifth International Conference on Information Assurance and Security, August 2009, Xian, China, pp. 251-254. (EI)
  74. Fang-Yie Leu and Zhi-Yang Li, “Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System,” the Fifth International Conference on Information Assurance and Security, August 2009, Xian, China, pp. 255-258. (EI)
  75. Fang-Yie Leu and Zhi-Yang Li, “An Inner DoS/DDoS Attack Detection System,” the 6th International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA 2009), July 2009, Florida, USA, pp.41-46.
  76. Fang-Yie Leu, Yao-Tien Huang, “A Coordinating Multiple Channel Assignment Scheme and AP Deployment in A Wireless Network,” The 2009 IEEE/IFIP International Symposium on Embedded and Pervasive Systems, Vancouver, Canada, August 2009, pp. 440-445. (EI)
  77. Fang-Yie Leu and Yong-Lon Chen, “A Path Switching Scheme for SCTP Based on Round Trip Delay and under the Assistance of Network Management Schemes,” the International Conference on Computer Science and its Applications, Dec. 2009, Jeju, Korea, pp. 103-108. (EI)
  78. Yi-Fung Huang, Ko-Chung Wei, Fang-Yie Leu, “Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering Without Certificate Authorities,” the International Conference on Complex, Intelligent and Software Intensive Systems, Feb. 2010, Krakow, Poland, pp. 384-390. (EI)
  79. Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu, “Improving security levels of IEEE802.16e authentication by Involving Diffie-Hellman PKDS,” the International Conference on Complex, Intelligent and Software Intensive Systems, Feb. 2010, Krakow, Poland, pp. 391-397. (EI)
  80. Fang-Yie Leu and Pei-Shiun Liu, “A Channel Assignment and AP Deployment Scheme for Concentric-Hexagon based Multi-Channel Wireless Networks,” the IEEE International Symposium on Frontiers in Ubiquitous Computing, Networking and Applications, Sept., 2010, Takayama, Japan, pp. 504-509. (EI)
  81. Fang-Yie Leu and Hung-Wei Huang, “An Event-Driven Mobile Assistant Control Protocol for Wireless Sensor Networks,” the IEEE International Symposium on Frontiers in Ubiquitous Computing, Networking and Applications, Sept., 2010, Takayama, Japan, pp. 521-526. (EI)
  82. Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu, “Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM Environment without Prior Authentication Connection,” The IEEE International Workshop on Cloud, Wireless and e-Commerce Security, Nov. 2010, Fukuoka, Japan, pp. 441- 446. (EI)
  83. Yi-Li Huang, Chu-Hsing Lin, and Fang-Yie Leu, “Verification of a Batch of Bad Signatures by using the Matrix-Detection Algorithm,” the International Conference on Data Compression, Communications and Processing, Palinuro (Cilento Coast), Italy, 21-24 June 2011, pp. 299-306. (EI)
  84. Fang-Yie Leu and Shiuan-You Chiou, “A Rate-allocation Based Multi-path Congestion Control Scheme for Event-Driven Wireless Sensor Networks,” the International Conference on Data Compression, Communications and Processing, Palinuro (Cilento Coast), Italy, 21-24 June 2011, Italy, pp. 293-298. (EI)
  85. Fang-Yie Leu, and Kuo-Chi Liang, “A Location-based Handoff Scheme based on IEEE 802.21 in Heterogeneous Wireless Networks,” The International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, 30 June/2 July 2011, Korea Bible university, Seoul Korea, pp. 571-576. (EI)
  86. Fang-Yie Leu, and Keng-Yen Chao, “A Semi-preemptive Ad Hoc Wireless Cloud Service System with limited Resources to Support Node Mobility,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, 30 June/2 July 2011, Korea Bible university, Seoul Korea, pp.577-582. (EI)
  87. Fenq-Lin Jenq, Tang-Jen Liu and Fang-Yie Leu, “An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, 30 June/2 July 2011, Korea Bible university, Seoul Korea, pp.589- 593. (EI)
  88. Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang, “A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks,” International Workshop on Security and Cognitive Informatics for Homeland Defense, Vienna, Austria, 22– 26 August, 2011, pp.255-270. Lecture Notes of Computer Science – LNCS-67908 (EI)
  89. Fang-Yie Leu, Ming-Chang Lee, Ying-ping Chen, “Improving Data Grid Performance by using Popular File Replicate First Algorithm,” The International Workshop on Cloud, Wireless and e-Commerce Security, October 24-26. 2011, Barcelona, Spain, pp. 416~421. (EI)
  90. Ko-Chung Wei, Yi-Li Huang, Fang-Yie Leu, “A Secure Communication over Wireless Environments by using a Data Connection Core,” The International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, Palermo, Italy, 4-6 July 2012, pp.570-575. (EI)
  91. Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai, “A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation,” International Workshop on Security and Cognitive Informatics for Homeland Defense, Prague, Czech Republic, 20-24 August 2012, pp.578-592. Lecture Notes of Computer Science – LNCS 7465. (EI)
  92. Fang-Yie Leu, Miao-Heng Chen, Yi-Li Huang, Chung-Chi Lin, “Controlling Traffic Lights for Ambulances,” the International Workshop on Cloud, Wireless and e-Commerce Security, November 12-14, 2012, Victoria, Canada, pp.462~467. (EI)
  93. Fang-Yie Leu, Yi-Li Huang, Chien-Nan Chen, “The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link,” the IEEE International Workshop on Cloud, Wireless and e-Commerce Security, November 12-14, 2012, Victoria, Canada, pp.452~457. (EI)
  94. Fang-Yie Leu, IlSun You, Yi-Li Huang, Kangbin Yim, Cheng-Ru Dai, “Improving Security Level of LTE Authentication and Key Agreement Procedure,” the International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2012), Anaheim, California, USA, 3 December 2012, pp. 1032-1036. (EI)
  95. Jia-Chun Lin, Fang-Yie Leu, Ying-ping Chen, “Deriving Job Completion Reliability and Job Energy Consumption for a General MapReduce Infrastructure from Single-Job Perspective,” the IEEE International Conference on Advanced Information Networking and Applications, 25-28 March 2013, Barcelona, Spain, pp. 1642-1647. (EI)
  96. Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang, “Building a block cipher mode of operation with Dual keys,” The Asian Conference on Availability, Reliability and Security (AsiaARES 2013). Lecture Notes of Computer Science – LNCS 7804, 24-29 March 2013, pp. 392-398. (EI)
  97. Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang, Chih-Wei Yu, Cheng-Chung Chu, Chao-Tung Yang, “Building a block cipher mode of operation with feedback keys,” the IEEE International Symposium on Industrial Electronics, 28-31 May 2013, pp.1-4. (EI)
  98. Yi-Li Huang, Fang-Yie Leu, Yao-Kuo Sun, Cheng-Chung Chu, Chao-Tung Yang, “A Secure Wireless Communication System by Integrating RSA and Diffie-Hellman PKDS in 4G Environments and an Intelligent Protection-key Chain with a Data Connection Core,” the IEEE International Symposium on Industrial Electronics, 28-31 May 2013, pp.1-6. (EI)
  99. Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, Cheng-Chung Chu, Chao-Tung Yang, “A True Random-Number Encryption Method,” The Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 3-5 July 2013, pp.654-659. (EI)
  100. Ming-Chang Lee, Fang-Yie Leu, Ying-ping Chen, “TSR: Topology Reduction from Tree to Star Data Grids,” The Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 3-5 July 2013, pp.678-683. (EI)
  101. Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu*, Feng-Ching Chiang, Chao-Tung Yang, and William Cheng-Chung Chu “A Multiple-key Management Scheme in Wireless Sensor Networks,” The 8th International Conference on Availability, Reliability and Security, Regensburg, Germany, September 2-6, 2013, pp.337-344. (EI)
  102. Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, and Alfredo De Santis, “Analyzing the Internet Stability in Presence of Disasters,” The 8th International Conference on Availability, Reliability and Security, Regensburg, Germany, September 2-6, 2013, pp.253-268. (EI)
  103. Ya-Ting Hsu, Fang-Yie Leu, Jung-chun Liu, Yi-Li Huang, “The Simulation of an Emotional Robot Implemented with Fuzzy Logic,” The International Workshop on Cloud, Wireless and e-Commerce Security, University of Technology of Compiegne, Compiegne, France, October 28-30, 2013, pp. 382-386. (EI)
  104. Yi-Li Huang, Fang-Yie Leu, Jung-chun Liu, Lih-Jiun Lo,William Cheng-Chung Chu, “A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS,” The International Workshop on Cloud, Wireless and e-Commerce Security, University of Technology of Compiegne, Compiegne, France, October 28-30, 2013, pp. 360-365. (EI)
  105. Yu-Shin Huang, Fang-Yie Leu and Yi-Li Huang, “A handover scheme for LTE based on the assistance of GPS,” The International Workshop on Cloud, Wireless and e-Commerce Security, University of Technology of Compiegne, Compiegne, France, October 28-30, 2013, pp.399-403. (EI)
  106. Sen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu, “A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security,” The International Workshop on Cloud, Wireless and e-Commerce Security, University of Technology of Compiegne, Compiegne, France, October 28-30, 2013, pp. 366-371. (EI)
  107. Sueming Hsu, Yalan Chan, Kai-I Huang and Fang-Yie Leu, “An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan’s Senior Care Market: A Case Study of Fitness Equipment Industry,” The International Workshop on Cloud, Wireless and e-Commerce Security, University of Technology of Compiegne, Compiegne, France, October 28-30, 2013, pp. 378-381. (EI)
  108. Chin-Ling Chen, Wei-Chen Tasi and Fang-Yie Leu, “Improve Two Remote User Authentication Scheme Using Smart Card,” The International Workshop on Cloud, Wireless and e-Commerce Security, University of Technology of Compiegne, Compiegne, France, October 28-30, 2013, pp. 404-407. (EI)
  109. Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Ilsun You, Kangbin Yim, Jian-Hong Chen, “A Random Wrapping Encryption Method,” International Workshop on Mobility Management in the Networks of the Future World, Las Vegas, Nevada, USA, 10 January 2014, pp.353-358. (EI)
  110. Fang-Yie Leu*, Yi-Ting Hsiao, “A Real-Time Intrusion Detection and Protection System on System Call Level by using Data Mining and Profiling Techniques Under the Assistance of a Grid,” The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014), Bali Indonesia, 14-17April 2014, pp.375-385. (EI)
  111. Jia-Chun Lin, Fang-Yie Leu, Ying-ping Chen and Waqaas Munawar, “Impact of MapReduce Task Re-execution Policy on Job Completion Reliability and Job Completion Time,” The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria Canada, 13-16 May 2014, pp. 712-718. (EI)
  112. Ming-Chang Lee, Fang-Yie Leu, and Ying-ping Chen, “Cache Replacement Algorithms for YouTube,” The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria Canada, 13-16 May 2014, pp. 743-750. (EI) – Conference Best Paper Award
  113. I-Long Lin, Yun-Sheng Yen, and Fang-Yie Leu, “Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP and ISO27037 SOP,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, Birmingham, UK, 2-4 July 2014, pp.511-516. (EI)
  114. Lung-Pin Chen, Chih-Wei Hsieh and Fang-Yie Leu, “Minimum Cost Content Object Reconstruction in Multi-Tier Servers,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, Birmingham, UK, 2-4 July 2014, pp.523-528. (EI)
  115. Kun-Lin Tsai, Fang-Yie Leu, Yi-Li Huang, Jiu-Soon Tan and MengYuan Ye, “High-efficient Multi-Key Exchange Protocol based on Three-party Authentication,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, Birmingham, UK, 2-4 July 2014, pp.487-492. (EI)
  116. Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu, “A secure authentication scheme of health care based on the cloud,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, Birmingham, UK, 2-4 July 2014, pp.499-504. (EI)
  117. Sen-Tarng Lai, Fang-Yie Leu and WilliamCheng-Chung Chu, “A Multi-Layer Secure Prevention Scheme for Improving E-commerce Security,” International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, Birmingham, UK, 2-4 July 2014, pp.505-510. (EI)
  118. Kun-Lin Tsai, Jiu-Soon Tan, Fang-Yie Leu† and Yi-Li Huang, “A Group File Encryption Method using Dynamic System Environment Key,” The International Conference on Network-Based Information Systems (NBiS), Salerno, Italy, 10-12 September 2014, pp. 476-483. (EI)
  119. Yi-Li Huang, Sheng-Mao Wang, Fang-Yie Leu, Jung-Chun Liu, and Chia-Yin Ko, “A secure mobile shopping system based on credit card transaction,” The 6th International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, 10-12 September 2014, pp. 336-341. (EI)
  120. Yi-Li Huang, Shih-Han Chen, Fang-Yie Leu, Chia-Yin Ko, Jung-Chun Liu, “An efficient traffic control system with emergency handling for ambulances,” The 6th International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, 10-12 September 2014, pp. 356-361. (EI)
  121. Ming-Chang Lee, Fang-Yie Leu, and Ying-ping Chen, “Evaluating Response Time and Reliability of Co-Allocation Schemes from Multi-User Perspectives on a Star-Topology Data Grid,” The 6th International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, 10-12 September 2014, pp. 242-248. (EI)
  122. Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang, “Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters,” The 9th International Conference on Availability, Reliability and Security, Fribourg, Switzerland, 8-12 September 2014, pp. 166–171. (EI)
  123. Fang-Yie Leu, Jung-Chun Liu and Chin-Yu Liu, “S-PMIPv6: Efficient Handover in Proxy Mobile IPv6 Domain by using SCTP,” International Conference on Broadband and Wireless Computing, Communication and Applications, 8-10 November 2014, GuangZhou, China, pp. 287-291. (EI)
  124. Sen-Tarng Lai, Fang-Yie Leu, Chao-Tung Yang and William Cheng-Chung Chu, “Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements,” International Conference on Broadband and Wireless Computing, Communication and Applications, GuangZhou China, 8-10 November 2014, pp. 291-299. (EI)
  125. Fang-Yie Leu, Jung-Chun Liu and Hsin-Liang Chen, “Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA,” International Conference on Broadband and Wireless Computing, Communication and Applications, GuangZhou China, 8-10 November 2014, pp. 300-305. (EI)
  126. Chia-Yin Ko, Fang-Yie Leu and I-Tsen Lin, “Using Smart Phone as a Track and Fall Detector for People with Dementia,” International Conference on Broadband and Wireless Computing, Communication and Applications, GuangZhou China, 8-10 November 2014, pp. 306-311. (EI)
  127. Fang-Yie Leu and Yi-Ting Hsiao, "A Grid System Detecting Internal Malicious Behaviors at System Call Level," The 6th International Workshop on Managing Insider Security Threats, Konkuk University, Seoul, Republic of Korea, 21-22 November 2014, pp. 14-24.
  128. Chin-Yu Liu, Fang-Yie Leu, Ilsun You, Aniello Castiglione and Francesco Palmieri, “Heterogeneous network handover using 3GPP ANDSF,” The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015), Gwangju, Korea, March 25-27, 2015, pp. 171-175. (EI)
  129. Chin-Yu Liu, Fang-Yie Leu, Ilsun You, Aniello Castiglione and Francesco Palmieri, “The Untrusted Handover Security of the S-PMIPv6 on LTE-A,” 6th IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2015), Hong Kong, 26 April – 1 May 2015, pp.161-166. (EI)
  130. Ming-Chang Lee, Fang-Yie Leu, and Ying-ping Chen, “ReMBF: A Reliable Multicast Brute-Force Co-Allocation Scheme for Multi-user Data Grids,” The 39th Annual International Computers, Software & Applications Conference, Taichung Taiwan, 1-5 July 2015, pp.774-783. (EI)
  131. Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu and Fang-Yie Leu, “An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Brazil, 8-10 July 2015, pp. 403-407. (EI)
  132. Yu-Jen Chang, Fang-Yie Leu, Shih-Chieh Chen and Hei-Lam Wong, “Applying Web Crawlers to Develop a Sale Management System for Online Malls,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Brazil, 8-10 July 2015, pp. 408-413. (EI)
  133. Sen-Tarng Lai and Fang-Yie Leu, “A Security Threats Measurement Model for Reducing Cloud Computing Security Risk,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Brazil, 8-10 July 2015, pp.414-419. (EI)
  134. Tien-Sheng Lin, I -Long Lin and Fang-Yie Leu, “Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security,” the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Regional University of Blumenau (FURB), Blumenau Brazil, 8-10 July 2015, pp.420-425. (EI)
  135. Chi-Lun Ho, and Fang-Yie Leu, “A Wireless Physiological Sensor Area Network,” International Conference on Network-Based Information Systems, Taipei Taiwan, 2-4 September 2015, pp.14-19. (EI)
  136. Kun-Lin Tsai, MengYuan Ye and Fang-Yie Leu, “Secure Power Management Scheme for WSN,” The ACM Conference on Computer and Communications Security (CCS)/ Managing Insider Security Threats (MIST) 2015, Denver, USA, 12-16 October 2015, pp. 63-68 (poster). (EI)
  137. Fang-Yie Leu and Sheng-Chieh Chuang, “Establishing a Routing Path with Redundant Link Minimization in Wireless Sensor Networks,” International Conference on Broadband and Wireless Computing, Communication and Applications, Krakow, Poland, 4-6 November 2015, pp. 380-385. (EI)
  138. Sen-Tarng Lai and Fang-Yie Leu, “Applying Continuous Integration for Reducing Web Applications Development Risks,” International Conference on Broadband and Wireless Computing, Communication and Applications, Krakow, Poland, November 4-6 November 2015, pp. 386-391. (EI)
  139. Chia-Yin Ko and Fang-Yie Leu, “Applying data mining to explore students’ self-regulation in learning contexts,” IEEE 30th International Conference on Advanced Information Networking and Applications, March 2016, pp. 74-78. (EI)
  140. Yi-Li Huang and Fang-Yie Leu, Ilsun You, Hsing-Chung Chen, Chishyan Liaw and Jung-Chun Liu, “Random Cladding with Feedback Mechanism for Encrypting Mobile Messages,” 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, 2016, pp. 970-975. (EI)
  141. WooSeok Hyun, Ilsun You, JoungSoon Jang and Fang-Yie Leu, “A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 415-418. (EI)
  142. Fang-Yie Leu and Yi-Ting Hsiao, “Finite State Machine Based Real Time Scheduling for Microchip,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 458-463. (EI)
  143. Sen-Tarng Lai and Fang-Yie Leu, “A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and Quality,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 464-469. (EI)
  144. Yi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu, “A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 470-475. (EI)
  145. Kun-Lin Tsai, Fang-Yie Leu, Yi-Fung Huang, Chi Yang, Cheng-Hsin Chang, King-Shing Yip, Yuchen Xue, and Guan-Chi Lai, “Cloud Encryption Using Distributed Environmental Keys,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 476-481. (EI)
  146. Xia-Yun Guo, Chin-Ling Chen, Chang-Qing Gong and Fang-Yie Leu, “A Secure Official Vehicle Communication Protocol for VANET,” 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2016, pp. 482-485. (EI)
  147. Kun-Lin Tsai, Fang-Yie Leu and King-Shing Yip, “Device Parameter based Secure User Authentication,” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp. 721-730. (EI)
  148. Sen-Tarng Lai and Fang-Yie Leu, “Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality,” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp.731-738. (EI)
  149. Cheng-Ying Hsu, Shang-En Yang, Hung-Yuan Chen, Fang-Yie Leu, Yao-Chung Fan, “Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users’ Privacy Concerns” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp. 739-746. (EI)
  150. Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, “Enhancing Security of LTE using a Double Masking Technique,” the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications, November 5–7, 2016, Korea, pp. 747-754. (EI)
  151. Yi-Li Huang, Fang-Yie Leu, Ilsun You, Rong-Yi Su, Po-Hao Su, Hsing-Chung Chen, “A 3D Encryption with Shifting Mapping Substitution Mechanism,” The 5th IEEE CCNC International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2017) 8 January 2017, Las Vegas, USA, pp.126-131.
  152. Hsing-Chung Chen, Chia-Hui Chang, Fang-Yie Leu, “Implement of Agent with Role-based Hierarchy Access Control for Secure Grouping IoTs,” The 5th IEEE CCNC International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2017) 8 January 2017, Las Vegas, USA, pp.120-125.
  153. Fang-Yie Leu, Guan-Liang Lin, “An MFCC-based Speaker Identification System,” The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017), pp.1055-1062.
  154. Po-Yu Tsai, Leu, Fang-Yie, Ilsun You, Hsing-Chun Chen, “ANDSF-based Congestion Control with Seamless Handover to Target AP in Heterogeneous Wireless Networks,” Infocom 2017.
  155. Fang-Yie Leu and Chih-Chung Cheng, “MIH-based Congestion Control with Seamless Handover in Untrusted Networks,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.502-512.
  156. Chien-Hsiang Kao and Fang-Yie Leu, “Prediction of the Fragment of video streamed to mobile phones under a 5G network base station,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.493-501.
  157. Sen-Tarng Lai and Fang-Yie Leu, “An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.483-492.
  158. Xiu-Shu Zhang, Fang-Yie Leu and Ching-Wen Yang, “Healthcare based on Cloud Electrocardiogram System :A Medical Center Experience in Middle Taiwan,” 2017 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2017, pp.473-482.

圖書著作(Books)

  1. 呂芳懌, MD-150自動控制使用手冊, 1984年, 全華科技圖書公司.
  2. 呂芳懌, MS-DOS使用手冊, 1986年, 全華科技圖書公司.
  3. 呂芳懌等, 計算機概論與基礎資訊教育, 2001年, 全華科技圖書公司.
  4. 張文貴 呂芳懌, 軟體開發技術文件—指引手冊, 2002年, 經濟部工業局.
  5. 張文貴 呂芳懌, 軟體規劃與維護技術文件—指引手冊, 2002年, 經濟部工業局.

專利(Patents)

  1. 呂芳懌 黃耀田, “部署基地台之方法” 發明第I 415485號,2013/11/11-2029/7/30
  2. 黃宜豊 呂芳懌, “具有動態金要雙向認證之無線通訊方法” 發明第I 425845號,2014/2/1-2030/2/1
  3. 黃宜豊 呂芳懌, “在無線/有線環境下安全金鑰交換的方法” 發明第I 434577號,2014/4/11-2030/9/29
  4. 黃宜豊 呂芳懌 林正基, “具有三維運算、反饋控制與動態置換盒設計的加密方法” 發明第I 459784號,2014/11/1-2032/1/5