Wei-Chih Hong
Education:
Research Interest:
-
Hong, W.C. Yang, R. K., Chen, Y. C, Li, B., and Lee, J.S., "Efficient Peer-to-Peer E-Payment based on Asynchronous Dual Blockchain," Journal of Internet Technology, vol.21, no. 5, 1375-1385, 2020-10. (SCIE) -
Hong, W.C. Huang, D. Y., Chen, C. L, and Lee, J.S., "Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks," IEEE Access, DOI: 10.1109/ACCESS.2020.3007609, 2020-07. (SCIE) -
Lee, J.S., Chen, Y. C, Hong, W.C., Yang, R. K., and Lee, K.Y., "Reputation-oriented electronic micro-loaning based on smart contracts in a solidarity group," Journal of Internet Technology, vol. 21, no. 4 , pp. 1073-1085, 2020-03. (SCIE) -
J.-Y. Huang, W.-C. Hong, P.-S. Tsai, I-E. Liao*, "A Model for Aggregation and Filtering on Encrypted XML Streams in Fog Computing," International Journal of Distributed Sensor Networks, Volume: 13 issue: 5, 2017-05. (SCIE) -
W.C. Hong* and Z. Tsai, "A Multichannel Scheduler for High-Speed Wireless Backhaul Links with Packet Concatenation," IEEE Transactions on Mobile Computing, vol. 9, no. 2, pp. 201-214, 2010-02. (SCIE)
-
Jia-Ying Chuang, Bing-Jie Ji, Wei-Chih Hong*, Chu-Hsiang Lee, Jeng-Da Huang and Huang-Kai Huang,"Design and Implementation of Smart Contract Based IoT Services ," The International Conference on Innovative Computing and Management Science (ICMS 2019), pp. 1-4, 2019-07. HOTEL MYSTAYS SHIN OSAKA CONFERENCE CENTER . -
Shao-Yu Peng, Wei-Chih Hong*, Jun-Ting Li, Sheng-Jun Huang,"Framework for efficient SCA resistance verification of IoT devices ," 2018 IEEE International Conference on Applied System Invention (ICASI), pp. 468-471, 2018-04. 幕張展覽館 . -
Y.-J. Huang, W.-C. Hong, C.-M. Cheng, J.-M. Chen and B.-Y. Yang,"A Memory Efficient Variant of an Implementation of the F4 Algorithm for Computing Gröbner Bases ," The 6th International conference on Trustworthy Computing, InTrust 2014, pp. 374-393, 2014-12. Beijing Institute of Technology . -
H. Lee, W.-C. Hong, C.-H. Kao, and C.-M. Cheng,"A User-friendly Authentication Solution Using NFC Card Emulation on Android ," IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 271-278, 2014-11. Kunibiki Messe, Shimane Prefectural Convention Center . -
A. Loch*, W.-C. Hong and M. Hollick,"Dynamic Curve Adaptation for Geographic Routing in Wireless Multihop Networks ," The 39th IEEE Conference on Local Computer Networks (LCN), pp. 1-5, 2014-09. Chateau Lacombe Hotel . -
Y.-A. Chang, W.-C. Hong, M.-C. Hsiao, B.-Y Yang, and C.-M. Cheng*,"Hydra: An Energy-efficient Programmable Cryptographic Coprocessor Supporting Elliptic-curve Pairings over Fields of Large Characteristics ," The 9th International Workshop on Security, IWSEC2014, pp. 174-186, 2014-08. Hirosaki University . -
Y.-H. Chiu, W.-C. Hong, L.-P. Chou, J. Ding, B.-Y. Yang and C.-M. Cheng*,"A Practical Attack on Patched MIFARE Classic ," 9th China International Conference on Information Security and Cryptology (Inscrypt 2013), pp. 1-5, 2013-11. Guangzhou, China . -
M.-P. Lin, W.-C. Hong*, C.-H. Chen, and C.-M. Cheng,"Design and Implementation of Multi-user Secure Indices for Encrypted Cloud Storage ," Eleventh Annual Conference on Privacy, Security and Trust (PST 2013), pp. 1-5, 2013-07. Tarragona, Catalonia . -
W.-C. Hong* and Z. Tsai,"Improving the Autonomous Component Carrier Selection for Home eNodeBs in LTE-Advanced ," IEEE Consumer Communications and Networking Conference (CCNC 2011), pp. 1-5, 2011-01. Las Vegas, USA . -
W.-C. Hong* and Z. Tsai,"On the Femtocell-based MVNO Model: A Game Theoretic Approach for Optimal Power Setting ," IEEE 71st Vehicular Technology Conference: VTC2010-Spring, pp. 1-5, 2010-05. Taipei, Taiwan . -
W.-C. Hong* and Z. Tsai,"Adaptive Bandwidth Allocation via Dynamic Programming in a Shared Wireless Network ," 18th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), pp. 1-5, 2007-09. Athens, Greece .
- 控制物聯網之智慧合約技術/2018-07~2019-02/ 107CFD0600044/主持人
- 物聯網裝置旁通道攻擊抵禦能力之高效檢測方法/2016-08~2017-07/ MOST105-2221-E-035-067-/主持人
- (興大)人工智慧時代的硬體安全:威脅與防護(1/2)/2021-05~2022-04/ MOST110-2218-E-005-009-MBK/主持人
- 新型代數側通道攻擊之研究—以RC6區塊密碼演算法為例/2014-11~2015-10/ MOST103-2218-E-035-017-/主持人
- 以深度學習技術改進旁通道抵禦能力檢測與訊號軌跡預處理/2021-08~2022-07/ MOST110-2221-E-035-017-/主持人
- (中興)關鍵資訊基礎設施的資安與隱私防護機制的設計與實作/2020-06~2021-05/ MOST109-2218-E-005-005-/主持人
- 以通用圖形處理器加速之旁通道攻防能力檢測工具研究與開發/2017-08~2018-07/ MOST106-2221-E-035-021-/主持人
- (中興)關鍵資訊基礎設施的資安與隱私防護機制的設計與實作-關鍵資訊基礎設施的資安與隱私防護機制的設計與實作(2/3)/2018-06~2019-05/ MOST107-2218-E-005-018-/主持人
- (中興)關鍵資訊基礎設施的資安與隱私防護機制的設計與實作-關鍵資訊基礎設施的資安與隱私防護機制的設計與實作(3/3)/2019-06~2020-05/ MOST108-2218-E-005-016-/主持人
- 資安服務/2022-01~2022-12/ 共同主持人
- 資安服務專案/2014-10~2015-10/ 共同主持人
- 資安服務專案/2017-01~2017-12/ 共同主持人
- 資安服務專案/2018-01~2018-12/ 共同主持人
- 資安服務專案/2019-01~2019-12/ 共同主持人
- 「資安服務」專案/2021-01~2021-12/ 共同主持人
- A-ISAC暨MiniSOC-維運與服務計畫/2015-01~2015-12/ 協同主持人
- A-ISAC暨Mini-SOC維運與服務計畫/2016-01~2016-12/ 協同主持人
- A-ISAC暨Mini-SOC維運與服務計畫/2017-01~2017-12/ 協同主持人
- A-ISAC暨Mini-SOC服務與維運計畫/2018-01~2018-12/ 協同主持人
- 旁通道攻擊自動化偵測與防禦計畫/2021-04~2021-12/ 主持人
- A-ISAC暨 Mini-SOC服務與維運計畫/2018-01~2018-12/ 協同主持人
- 欣銓科技-『105年主機弱點掃描服務專案』/2016-05~2016-12/ 主持人
- 105年度新型態資安實務課程計畫-「系統安全」/2016-02~2017-01/ 主持人
- 密碼裝置硬體旁通道抵禦分析能力訓練暨顧問專案計畫/2022-05~2022-11/ 主持人
- 學術網路資訊分享與分析暨縣市網資訊安全維運計畫/2021-01~2021-12/ 共同主持人
- A-ISAC暨Mini-SOC維運與服務-性能提升暨可用性強化計畫/2015-08~2016-02/ 協同主持人
- 學術網路資訊分享與分析暨縣市網資訊安全維運計畫/2019-01~2019-12/ 共同主持人
- 111年度學術網路資訊分享與分析暨縣市網資訊安全維運計畫/2022-01~2022-12/ 共同主持人
- 106年度新型態資安實務課程計畫─課程計畫名稱:「資訊與網路安全」/2017-02~2018-01/ 主持人
- 110/逢甲大學論文著作獎勵傑出獎/逢甲大學/ 2021-11-15/Efficient Peer-to-Peer E-Payment based on Asynchronous Dual Blockchain
- 110/逢甲大學論文著作獎勵傑出獎/逢甲大學/ 2021-11-15/Reputation-oriented electronic micro-loaning based on smart contracts in a solidarity group
- 110/逢甲大學論文著作獎勵傑出獎/逢甲大學/ 2021-11-15/Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks
- 設計與實作下一個世代智慧型電表-密碼裝置硬體之旁通道攻擊抵禦能力分析/TWISC/2019-01
- 即時傳輸方式與影像辨識研究說明/中央健康保險署台北業務組、逢甲大學/2018-10
- Design and Implementation of a Side-Channel Resistance Verification System for IoT Devices/中央研究院資訊科技創新研究中心/2018-02
- A Practical Attack on EasyCard 2.0/逢甲大學資訊工程學系/2014-11
- An Algebraic Side Channel Attack on RC6/中興大學/2014-10
Last update:2024-11-24, 午夜
Next update:2024-11-24, 9 a.m.