李榮三

教授兼系主任


學歷

  • 中正大學 資訊工程學系 博士
  • 中正大學 資訊工程學系 學士

專長

  • 無線通訊
    Wireless Communications
  • 資訊安全
    Information Security
  • 電子商務
    E-Commerce
  • 密碼學
    Cryptography
  • 數位影像處理
    Image Processing
  • 區塊鏈技術與應用
    Blockchain technique and its application

校內經歷

  • 校務企劃組 組長
  • 系統維運組 組長
  • 資源管理中心 主任
  • 資訊工程學系 副教授
  • 資訊工程學系 助理教授
  • 資訊工程學系 教授
  • 資訊工程學系 系主任
  • 資訊教學中心 主任
  • 資通安全研究中心 主任
  • 資通安全研究中心 副主任

校外經歷

論文及參與計畫

  1. Lee, J.S., Chen, Y. C., Chew, C. J., Chen, C.L., Huynh, T.N., and Kuo, C.W., "CoNN-IDS: Intrusion Detection System based on Collaborative Neural Networks and Agile Training," Accepted byComputers & Security, 000, 2022-09. (SCI)
  2. Lee, J.S., Fan, Y.Y., Lee, H.Y., Yong, G.W., and Chen, Y. C,, "Image dehazing technique based on sky weight detection and fusion transmission," Accepted byJournal of Internet Technology, 000, 2022-03. (SCI)
  3. Lee, J.S., Chew, C.J. , Liu, J.Y., Chen, Y.C., and Tsai, K.Y., "Medical Blockchain: Data Sharing and Privacy Preserving of EHR based on Smart Contract," Accepted byJournal of Information Security and Applications, 000, 2022-01. (SCI)
  4. Chew, C. J., Chen, Y. C, Lee, J.S.*, Chen, C. L., and Tsai, K. Y., "Preserving Indomitable DDoS Vitality through Resurrection Social Hybrid Botnet," Computers & Security, vol. 106, 2021-07. (SCI)
  5. Cheng, T.F., Chen, Y.C., Song Z.D., Tu, H. N., and Lee, J.S*.,, "Secure Session between an IoT Device and a Cloud Server based on Elliptic Curve Cryptosystem," International Journal of Information and Computer Security, vol. pp. 67-87, 2021-05. (EI)
  6. Lee, J.S., Liu, C., Chen, Y. C., Hong, W. Z., and Li, B., "Robust 3D Mesh Zero-watermarking based on Spherical Coordinate and Skewness Measurement," Multimedia Tools and Applications, vol. 80, pp. 25757–25772, 2021-04. (SCI)
  7. Hong, W.C. Yang, R. K., Chen, Y. C, Li, B., and Lee, J.S., "Efficient Peer-to-Peer E-Payment based on Asynchronous Dual Blockchain," Journal of Internet Technology, vol.21, no. 5, 1375-1385, 2020-10. (SCI)
  8. Lee, J.S., Chew, C. J., Chen, Y. C, and Wei, K. J., "Preserving Liberty and Fairness in Combinatorial Double Auction Games based on Blockchain," IEEE Systems Journal, vol. 14, pp. 1-11, 2020-10. (SCI)
  9. Hong, W.C. Huang, D. Y., Chen, C. L, and Lee, J.S., "Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks," IEEE Access, DOI: 10.1109/ACCESS.2020.3007609, 2020-07. (SCI)
  10. Chou, Y. C, Nien, Y. W, and Chen, Y. C., Li, B., Lee, J.S.*, "Learning Salient Seeds Refer to the Manifold Ranking and Background-Prior Strategy," Multimedia Tools and Applications, vol.79, pp. 5859-5879, 2020-03. (SCI)
  11. Lee, J.S., Chen, Y. C, Hong, W.C., Yang, R. K., and Lee, K.Y., "Reputation-oriented electronic micro-loaning based on smart contracts in a solidarity group," Journal of Internet Technology, vol. 21, no. 4 , pp. 1073-1085, 2020-03. (SCI)
  12. Chen, C.L., Wei, K.J., Chen, Y.C., and Lee, J.S., "Zero-day Intrusion Detection System based on Dual Neural Network and Aggregation Mechanism," Communications of the Chinese Cryptology and Information Security Association, vol. 26, no. 1 , pp. 8-24, 2020-02. (ECONLIT)
  13. Bui, Q.A., Lee, W.B., Lee, J.S.*, Wu, H.L., and Liu, J.U.,, "Biometric-based key management for satisfying patient’s control over health information in the HIPAA regulations," KSII Transactions on Internet and Information Systems, vol. 14, no. 1, pp. 437-453, 2020-01. (SCI)
  14. Lee, J.S., Chen, Y. C, Kang, Y. H, and Yang, R. K., "Preserving Privacy and Fairness for an Innovative E-Commerce Model: Penny M-lottery," Journal of Internet Technology, vol. 20, no. 5, pp. 1387-1400, 2019-10. (SCI)
  15. Chen, Y.C., Wei, K.J., Lee, J.S., Tu, H. N., and Lin, J.H.,, "AAVSS: Auxiliary Authorization Mechanism based on Arbitrary-Angle VSS," International Journal of Network Security, vol.21, no. 4, 2019-07. (EI,ECONLIT)
  16. Lee, J.S., Li, C. H., and Lee, H. Y., "Visibility dehazing based on channel-weighted analysis and illumination tuning," Multimedia Tools and Applications, vol. 78, no. 2, pp. 1831-1856, 2019-01. (SCI)
  17. Chen, Y.C., Lee, J.S., and Su, H.C., "Selective scalable secret image sharing with adaptive pixel-embedding technique," Multimedia Tools and Applications, vol. 77, no. 20, pp. 27107-27121, 2018-10. (SCI)
  18. Lee, J.S. and Wang, Y.H., "DNT-based Image Illumination Refinement System with Concurrent Copyright Embedding," Journal of Testing and Evaluation, vol. 46, no. 5, pp. 2151-2170, 2018-09. (SCI)
  19. Lee, J.S., Su, H.C., and Wei, K.J., "Refining irregular image illumination with concurrent ownership embedding," Multimedia Tools and Application, vol. 77, no. 15, pp. pp. 19851-19868, 2018-08. (SCI)
  20. Lee, J.S., "An Effective Preprocessor of Edge Detection for Distorted Images," Journal of Testing and Evaluation, vol. 45, no. 4, 2017-07. (SCI)
  21. Lee, J.S., Huang, B.R., and Wei, K.J., "Preserving copyright in renovating large-scale image smudges based on advanced SSD and Edge confidence," Optik - International Journal for Light and Electron Optics, vol. 140, pp. 887-899, 2017-07. (SCI)
  22. Lee, J.S., Li, B., and Huang, B. R., "Oblivious Transfer System for Information Concealing and Recovery in Cloud Computing," Journal of Internet Technology, vol. 18, no. 1, pp. 55-63, 2017-01. (SCI)
  23. Lee, J.S. Wei, K.J., and Wen, K.R., "Image structure rebuilding technique using fractal dimension on the best match patch searching," Multimedia Tools and Applications, vol. 76, no. 2, pp. 1875-1899, 2017-01. (SCI)
  24. Wei, K.J., Lee, J.S. and Li, B., "SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks," International Journal of Network Security, vol. 19, no. 1, pp. 60-71, 2017-01. (EI)
  25. Wei, K.J., Lee, J.S., Tu, H. N., and Lin, F.P., "Design on Two-Factor Authentication Mechanism for Telecare Medical Information systems," International Journal of Digital Content Technology and its Applications, vol. 10, no. 5, pp. 144-154, 2016-12. (EI)
  26. Lee, J.S. Wei, K.J., Chen Y. C. and Sun, Y.H., "Provable secure brand-new Multi-auction Mechanism with Dynamic Identity," KSII Transactions on Internet and Information Systems, vol. 10, no. 12, pp. 5616-5642, 2016-12. (SCI)
  27. Lee, J.S., Wen, K.R., and Li, B., "Renovating Contaminative Image Archives based on Patch Propagation and Adaptive Confidence Collation," IEEE Transactions on Circuits and Systems for Video Technolo, vol. 26, no. 5, 2016-05. (SCI,EI)
  28. Lee, J.S.,Wei, K. J.,Chen, S.J.,Wang, Y.H., "Tele-micropayment Scam Prevention based on Visual Secret Sharing Technique," Multimedia Tools and Applications, vol. 75, no. 4, 2016-02. (SCI)
  29. Lee, J.S. Wei, K.J., and Kao, W.C., "Robust t-out-of-n Internet Lottery Games with Player Anonymity," International Journal of Computers and communications, vol. 10, 2016-01.
  30. Lee, J.S. and Chen, Y. R., "Selective Scalable Secret Image Sharing with Verification," Multimedia Tools and Applications, vol. 74, no. 21, 2015-11. (SCI)
  31. Wei, K. J., Lee, J.S., and Chen, S.J., "Enhancing the Security of Credit Card Transaction based on Visual DSC," KSII Transactions on Internet and Information Systems, vol. 9, no. 3, 2015-03. (SCI)
  32. Lee, J.S., Chang, C.C., Huynh, N. T., and Tsai, H. Y., "Preserving User-Friendly Shadow and High-Contrast Quality for multiple Visual Secret Sharing Technique," Digital Signal Processing, vol. 40, 2015-03. (SCI)
  33. Lee, J.S., Chang, C.C. and Tsai, H. Y., "A User-Friendly and Authenticatable Secret Image Sharing Scheme," Journal of Internet Technology, vol.15, no. 3, 2014-05. (SCI)
  34. Lee, J.S., Wong, H.S., Chen, Y. R., and Wang, Y. H., "Stable Watermarking Technique based on XNOR operation and Scale Relationship," Multimedia Tools and Applications, vol. 69, no. 3, 2014-04. (SCI)
  35. Lee, J.S. and Li, Bo, "Self-recognized Watermarking Technique that Resists Large-Scale Cropping," IEEE Multimedia, vol. 21, no. 1, 2014-03. (SCI,EI)
  36. Yang, C.C., Wei, K.J, Li, B. and Lee, J.S., "HORME: Hierarchical-Object-Relational Medical management for Electronic record," Security and Communication Networks, vol. 6, no. 10, 2013-10. (SCI,EI)
  37. Lee, J.S., "RII: Renovating Irregular Illumination of Digital Image Archives," Journal of Visual Communication & Image Representation, vol. 27, no. 7, 2013-10. (SCI,EI)
  38. Lee, J.S., Chang, C.C., and Wei, K.J., "Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy," International Journal of Network Security, vol. 16, no. 2, 2013-08. (EI)
  39. Lee, J.S., Kao, W.C. and Li, B., "ART-Based Non-Iterative Electronic Lottery Mechanism with Robustness," IET Information Security, pp. 1-9, 2013-08. (SCI)
  40. Lee, J.S. and Tseng, W.T., "A Wide-adapted Bantam Protocol for Roaming across Wireless Areas," Wireless Networks, vol. 19, 2013-08. (SCI)
  41. Lee, J.S. and Huang Y.C., "Fast Authentication Mechanism with Provable Correctness for Cluster-based VANETs," Security and Communication Networks, pp. 1016-1030, 2013-06. (SCI)
  42. Lee, J.S. and Hsieh, M.H., "Preserving User-Participation for Insecure Network Communications with CAPTCHA and Visual Secret Sharing Technique," IET Networks, vol. 2, no. 2, 2013-06.
  43. Lee, J.S. and Li, B., "Note on "Authentication protocol using an identifier in an ad hoc network environment," Mathematical and Computer Modelling, vol. 57, no. 5-6, 2013-03. (SCI,EI)
  44. Lee, J.S. and Lin, K.S., "An Innovative Electronic Group-buying System for Mobile Commerce," Electronic Commerce Research and Applications, vol. 12, no. 1, 2013-02. (SCI)
  45. Lin, P.Y., Chen, Y.H., Chang, C.C., Lee, J.S., "Contrast-Adaptive Removable Visible Watermarking (CARVW) for Digital Internet Media," Image and Vision Computing, vol. 31, pp.311-321, 2013-02. (SCI,EI)
  46. Lee, J.S. and Lin, K.S., "A Robust E-commerce Service: Light-weight Secure Mail-order Mechanism," Electronic Commerce Research and Applications, vol. 11, pp.388-396, 2012-08. (SCI,EI)
  47. J.S. Lee and M.H. Hsieh, "An Interactive Mobile SMS Confirmation Method using Secret Sharing Technique," Computers & Security, vol. 30, no. 8, 2011-11. (SCI,EI)
  48. Wong, H.S., Chen, Y.R., and Lee, J.S., "An Improved CRT-based Watermarking Scheme with Voting Strategy," Journal of Computers, vol. 22, no. 3, 2011-10. (EI)
  49. Lin, P.Y., Lee, J.S. and Chang, C.C., "Protecting the Content Integrity of Digital Imagery with Fidelity Preservation," ACM Transactions on Multimedia Computing Communications and, vol. 7, no. 3, 2011-08. (SCI,EI)
  50. Li, B. and Lee, J.S., "A Cryptographic Alternative for Preserving PHI in Compliance with HIPAA Privacy/Security Regulations," Journal of Computers, vol. 21, no. 3, PP. 27~36, 2010-10. (EI)
  51. Lee, J.S., Lin, P.Y. and Chang, C.C., "Lightweight Secure Roaming Mechanism between GPRS/UMTS and Wireless LANs," Wireless Personal Communications, vol. 53, no. 4, PP. 569~580, 2010-08. (SCI,EI)
  52. Chang, C.C., Li, B. and Lee, J.S., "Secret Sharing Using Visual Cryptography," Journal of Electronic Science and Technology, vol. 8, no. 4, PP. 289~299, 2010-08. (EI)
  53. Chang, C. C., Lee, J. S. and Le, T. H. N., "Hybrid Wet Paper Coding Mechanism for Steganography Employing n-Indicator and Fuzzy Edge Detector," Digital Signal Processing, Vol.20, No. 4, PP. 1286~1307, 2010-07. (SCI,EI)
  54. Lee, J.S., Chan, C.S. and Chang, C.C., "Non-Iterative Privacy Preservation for Online Lotteries," IET Information Security, vol. 3, no. 4, 2009-12. (SCI,EI)
  55. Chang, C.C., Chang, S.C. and Lee, J.S., "An On-line Electronic Check System with Mutual Authentication," Computers & Electrical Engineering, vol. 35, no. 5, PP. 757~763, 2009-09. (SCI,EI)
  56. Lin, P.Y., Lee, J.S. and Chang, C.C., "Dual Digital Watermarking for Internet Media Based on Hybrid Strategies," IEEE Transactions on Circuits and Systems for Video Technolo, vol. 19, no. 8, PP. 1169~1177, 2009-08. (SCI,EI)
  57. Lee, J.S. and Chang, C.C., "A Secure Multicast Framework in Large and High-Mobility Network Groups," IEICE Transactions on Communications, vol. E92-B, no. 7, PP. 2365~2373, 2009-07. (SCI,EI)
  58. Lee, J.S., Chen, C.H. and Chang, C.C., "A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images," IEEE Transactions on Circuits and Systems for Video Technolo, vol. 19, no. 6, PP. 900~905, 2009-06. (SCI,EI)
  59. Lin, P.Y., Lee, J.S. and Chang, C.C., "Distortion-Free Secret Image Sharing Mechanism Using Modulus Operator," Pattern Recognition, vol. 42, PP. 886~895, 2009-05. (SCI,EI,TSSCI)
  60. Lee, J.S. and Chang, C.C., "Design of Electronic t-out-of-n Lotteries on the Internet," Computer Standards & Interfaces, vol. 31, PP. 395~400, 2009-02. (SCI,EI)
  61. Chang, C.C., Lee, J.S. and Kuo, J.Y., "Time-bound Based Password Authentication Scheme for Multi-server Architecture," Int.Journal of Innovative Computing,Information and Control, vol. 4, no. 11, PP. 2987~2996, 2008-11. (SCI,EI)
  62. Chang, C.C. and Lee, J.S., "Robust t-out-of-n Oblivious Transfer Mechanism Based on CRT," Journal of Network and Computer Applications, vol. 32, PP. 226~235, 2008-11. (SCI,EI)
  63. Lee, J.S., Chang, Y.F. and Chang, C.C., "Secure Authentication Protocols for Mobile Commerce Transactions," Int. Journal of Innovative Computing,Information and Control, vo. 4, no. 9, PP. 2305~2314, 2008-09. (SCI,EI)
  64. Lee, J.S., Chang, Y.F. and Chang, C.C, "A Novel Authentication Protocol for Multi-server Architecture without Smart Cards," Int. Journal of Innovative Computing,Information and Control, vol. 4, no. 6,, PP. 1357~1364, 2008-06. (SCI,EI)
  65. Lee, J.S. and Chang, C.C., "Preserving Data Integrity with Variant Diffie-Hellman Protocol for Mobile Ad Hoc Networks," Security and Communication Networks, vol. 1, PP. 277~286, 2008-06. (SCIE)
  66. Lee, J.S. and Chang, C.C., "Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities," Journal of Network and Computer Applications, vol. 30, PP. 1377~1396, 2007-08. (SCI,EI)
  67. Lee, J.S., Chang, C.C. and Chang, P.Y., "Anonymous Authentication Scheme for Wireless Communications," International Journal of Mobile Communications, vol. 5, no. 5, PP. 590~901, 2007-06. (SSCI,EI)
  68. Cheng, T.F., Lee, J.S. and Chang, C.C., "Security Enhancement of an IC-Card-Based Remote Login Mechanism," Computer Networks, vol. 51, no. 9, PP. 2280~2287, 2007-06. (SCI,EI)
  69. Chang, Y.F., Lee, J.S. and Chang, C.C., "A Secure and Efficient Authentication Scheme for Mobile Users," International Journal of Mobile Communications, vol. 4, no. 5, PP. 581~594, 2006-08. (SSCI,EI)
  70. Lee, J.S. and Chang, C.C., "Choosing t-out-of-n Secrets by Oblivious Transfer," Information & Security, vol. 18, PP. 67~84, 2006-07.
  71. Chang, C.C. and Lee, J.S., "An Anonymous Voting Mechanism Based on the Key Exchange Protocol," Computers and Security, vol. 25, PP. 307~314, 2006-02. (SCI,EI)
  72. Chang, C.C., Lee, J.S. and Chang, Y.F., "Efficient Authentication Protocols of GSM," Computer Communications, vol. 28, no. 8, PP. 921~928, 2005-01. (SCI,EI)
  1. 紀帛伸、蔡國裕、李榮三,"適用於IoT環境中具隱私保護之輕量化RFID協定之改進 ," 第三十屆全國資訊安全會議, NA, 2020-09. 中山大學 .
  2. 吳承翰、吳威震、蔡國 裕、洪緯哲、李榮三,"基於區塊鏈與智能合約實現具隱密性之雙重隨意組合拍賣平台 ," 第三十屆全國資訊安全會議, NA, 2020-09. 中山大學` .
  3. Jung-San Lee, Chit-Jie Chew, Ying-Chin Chen, Chih-Lung Chen, and Kuo-Yu Tsai,"Preserving tenacious DDoS vitality via resurrection social hybrid botnet ," The 3rd International Conference on Security with Intelligent Computing and Big-data Services, 1-7, 2019-12. ChihLee University of Technology .
  4. 王銘宏,李坤印,李維,周可恆,李榮三,"運用非監督式學習於工業物聯網之異常設備偵測 ," 第二十九屆全國資訊安全會議, 1-6, 2019-05. 靜宜大學 .
  5. Chit-Jie Chew, Ying-Chin Chen, Jung-San Lee,"Indomitable Vitality DDoS with Resurrectional Mechanism in Hybrid Social Network ," (CISC 2019) Cryptology and Information Security Conference 2019, 000, 2019-05. Providence University .
  6. Lee, J.S., Li, C. H., and Lee, H. Y.,"Dehazing technique based on channel-weighted analysis and illumination tuning ," The 310th International Conference on Science, Technology, Engineering and Management (ICSTEM 2018 ), pp. 18-23, 2018-02. Hotel ibis Schiphol Amsterdam Airport .
  7. Chen. Y.C., Wei, K.J., Yang, R.K., Lee, J.S*. and Lee K.Y.,"Table-free visual secret sharing technique with arbitrary-angle stacking ," International Conference on Science and Innovative Engineering, pp. 11-13, 2018-01. Tokyo, Japan .
  8. Lee, J.S., Huang, B.R., Su, H.C., and Chen, Y.C.,"Renovating large-scale smudges from digital image based on edge confidence ," The 3rd International Conference on Issues in Applied Business, Management, Social Sciences Research, vol. 1, no. 3, 2016-12. Cryptal City Hotel, Greece .
  9. Chen, Y.C., Wei, K. R, Lee, K.Y, and Lee, J.S.,"A Value-added Service tacked on LTE : Mobile Check ," International Symposium on Electrical, Electronic Engineering and Digital Technology, pp. 150-162, 2016-12. Sunshine City, Toshima, Tokyo, Japan .
  10. Wang, Y.H. and Lee, J.S.,"A Hybrid Illumination Refinement Technique based on Double Niblack Thresholds ," International Conference on Communication and Information Systems, 2015-07. 羅馬 .
  11. Lee, J.S., Wei, K.J., and Li, B.,"On the security of two ECC-based authentication mechanisms for confirming authorization ," Progress on Cryptography- 20 years of Cryptography in Taiwan, Vol., 2014-11. 逢甲大學 .
  12. Lee, J.S., Lin, F.P., Wen, K.R., Wang, Y.H, and Wei, K.J.,"Two-Factor Authentication Using Smartphone and Quick Response Code ," 2014 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology, pp. 1609-1625, 2014-04. Nagoya University, Japan .
  13. Lee, J.S., Wong, H.S., and Wang, Y. H.,"Variation-free Watermarking Technique based on Scale Relationship ," The Third International Conference on Signal & Image Processing (SIP 2014), pp. 225-239, 2014-01. Zurich, Swiss .
  14. Li, B. and Lee, J.S.,"A wally watermarking scheme with blind extraction based on structured encoding system ," The 2011 2nd World Congress on Computer Science and Information Engineering, 2011-06. Changchun, China .
  15. Lin, F.P., Li, Bo and Lee, J.S.,"A neoteric progressive scheme for visual secret sharing ," The First National Conference on Web Intelligence and Applications, 2011-04. National University of Kaohsiung .
  16. Li, B., Chang, C. C. and Lee, J. S.,"Providing Anonymous Channels and Mutual Authentication for Mobile Communications ," Proceedings of the Fourth International Conference on Genetic and Evolutionary Computing (ICGEC 2010), pp. 618-621, 2010-12. Shenzhen, China .
  17. Lee, J.S., Li, B. and Chou, Y.C,"A Brand-new Mobile Value-added Service: M-Check ," Proceedings of International Conference on Networked Computing, Advanced Information Management and Digital Content and Multimedia Technologies (NCM2009), pp. 2050-2055, 2009-08. Seoul, Korea .
  18. Lee, J.S. and Le, T.H.N.,"Hybrid (2, n) Visual Secret Sharing Scheme for Color Images ," Proceedings of the 2009 IEEE-RIVF International Conference on Computing and Telecommunication Technologies, pp. 320-327, 2009-07. Danang, Vietnam .
  19. Chang, C.C. and Lee, J.S.,"Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol ," The Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), pp. 467-471, 2008-11. Kaohsiung City, Taiwan .
  20. Li, J., Lee, J.S. and Chang, C.C.,"Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques ," The Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp. 1545-1548, 2008-08. Harbin, China .
  1. 專業書籍/王旭正、李榮三、魏國瑞/資訊生活安全、行動智慧應用與網駭實務/ 博碩 出版/ 中華民國 /2020-09-01/616/ /
  2. 專業書籍/王旭正、李榮三、許富皓/資訊安全與智慧、行動網路安全應用實務/ 博碩 出版/ 中華民國 /2015-08-01/624/ /
  3. 專業書籍/王旭正、楊中皇、李榮三/電腦、網路與行動服務安全實務/ 博碩文化/ 中華民國 /2012-09-01/550/ /
  4. 專業書籍/Jung-San Lee/Security Technology on Wireless Communications and Electronic Commerce/ VDM Verlag/ 德國 /2009-12-01/148/ /
  1. 植基於深度學習之未知網路攻擊暨惡意程式行為偵察技術/2022-08~2023-07 /NSTC111-2221-E-035-053- /主持人
  2. 基於行動裝置之輕量化3D浮水印演算法/2022-07~2023-02 /111-2813-C-035-043-E /主持人
  3. 具隱密性與回溯性之數位資料監管區塊鏈暨運算資源即時分配平台/2021-08~2022-07 /MOST110-2221-E-035-018- /主持人
  4. 應用區塊鏈以建構具公平性及自由度之雙向隨意組合拍賣平台與高效能電子交付機制(2/2)/2020-08~2021-07 /MOST108-2221-E-035-031-MY2 /主持人
  5. 基於區塊鏈之監控影像竄改判定系統/2020-07~2021-02 /109-2813-C-035-028-E /主持人
  6. 應用區塊鏈以建構具公平性及自由度之雙向隨意組合拍賣平台與高效能電子交付機制(1/2)/2019-08~2020-07 /MOST108-2221-E-035-031-MY2 /主持人
  7. 導入人工智慧及自適應色軌權重分析之影像除霧霾技術/2019-07~2020-02 /108-2813-C-035-003-E /主持人
  8. Active defense strategy in hybrid social network botnet based on reputation accumulation/2018-07~2019-02 /107CFD0600157 /主持人
  9. 具備除霧霾與結構修復能力之內容導向典藏檢索系統/2017-08~2018-07 /MOST106-2221-E-035-093- /主持人
  10. 可自選功能之App生成平台/2017-07~2018-02 /106-2813-C-035-079-E /主持人
  11. 適用於大範圍及結構毀損影像修復之典藏保護技術/2016-08~2017-07 /MOST105-2221-E-035-084- /主持人
  12. 抵抗側錄惡意程式之視覺密碼OTP/2016-07~2017-02 /105-2815-C-035-097-E /主持人
  13. 基於視覺密碼之電子商務安全防禦系統設計與實作/2015-08~2016-07 /MOST104-2221-E-035-036- /主持人
  14. 數位典藏修繕系統之建置/2014-08~2015-07 /MOST103-2221-E-035-055- /主持人
  15. 數位多媒體曝光補償及授權機制/2013-08~2014-07 /NSC 102-2221-E-035-058- /主持人
  16. Android光影平衡器/2012-07~2013-02 /NSC101-2815-C-035-031-E /主持人
  17. 數位典藏暨版權保護技術/2011-08~2012-07 /NSC100-2221-E-035-067- /主持人
  18. 數位多媒體典藏與保護技術(3/3)/2010-08~2011-07 /NSC98-2218-E-035-001-MY3 /主持人
  19. 數位多媒體典藏與保護技術(2/3)/2009-08~2010-07 /NSC98-2218-E-035-001-MY3 /主持人
  20. 數位多媒體典藏與保護技術(1/3)/2009-01~2009-07 /NSC98-2218-E-035-001-MY3 /主持人
  1. 資安服務 /2022-01~2022-12 /主持人
  2. 111年度學術網路資訊分享與分析暨縣市網資訊安全維運計畫 /2022-01~2022-12 /共同主持人
  3. 「資安服務」專案 /2021-01~2021-12 /主持人
  4. 學術網路資訊分享與分析暨縣市網資訊安全維運計畫 /2021-01~2021-12 /共同主持人
  5. 資安服務專案 /2020-01~2020-12 /主持人
  6. 資安服務專案 /2019-01~2019-12 /主持人
  7. 學術網路資訊分享與分析暨縣市網資訊安全維運計畫 /2019-01~2019-12 /共同主持人
  8. 資安服務專案 /2018-01~2018-12 /共同主持人
  9. A-ISAC暨Mini-SOC服務與維運計畫 /2018-01~2018-12 /協同主持人
  10. A-ISAC暨 Mini-SOC服務與維運計畫 /2018-01~2018-12 /協同主持人
  11. 資安服務專案 /2017-01~2017-12 /共同主持人
  12. A-ISAC暨Mini-SOC維運與服務計畫 /2017-01~2017-12 /協同主持人
  13. A-ISAC暨Mini-SOC維運與服務計畫 /2016-01~2016-12 /協同主持人
  14. A-ISAC暨Mini-SOC維運與服務-性能提升暨可用性強化計畫 /2015-08~2016-02 /協同主持人
  15. A-ISAC暨MiniSOC-維運與服務計畫 /2015-01~2015-12 /協同主持人
  16. 資安服務專案 /2014-10~2015-10 /共同主持人
  1. 110/110年度科技部補助大專校院研究獎勵 /產學合作處/ 2021-10-15/
  2. 107/IEET教學傑出獎 /IEET/ 2019-05-24/2019IEET教學傑出獎
  3. 107/最佳學生論文 /Chinese Cryptology and Information Security Association/ 2019-05-24/
  4. 105/105學年度優良導師 /學生事務處/ 2017-11-15/
  1. 110/逢甲大學優良教材獎勵優等獎 /逢甲大學/ 2021-11-15/資訊生活安全、行動智慧應用與網駭實務
  2. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Efficient Peer-to-Peer E-Payment based on Asynchronous Dual Blockchain
  3. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Learning Salient Seeds Refer to the Manifold Ranking and Background-Prior Strategy
  4. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Preserving Liberty and Fairness in Combinatorial Double Auction Games based on Blockchain
  5. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Reputation-oriented electronic micro-loaning based on smart contracts in a solidarity group
  6. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Biometric-based key management for satisfying patient’s control over health information in the HIPAA regulations
  7. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks
  8. 109/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2020-11-15/AAVSS: Auxiliary Authorization Mechanism based on Arbitrary-Angle VSS
  9. 109/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2020-11-15/Visibility dehazing based on channel-weighted analysis and illumination tuning
  10. 109/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2020-11-15/Preserving Privacy and Fairness for an Innovative E-Commerce Model: Penny M-lottery
  11. 109/109年度科技部補助大專校院研究獎勵 /逢甲大學/ 2020-10-15/
  12. 108/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2019-11-15/Refining irregular image illumination with concurrent ownership embedding
  13. 108/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2019-11-15/Selective scalable secret image sharing with adaptive pixel-embedding technique
  14. 108/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2019-11-15/DNT-based Image Illumination Refinement System with Concurrent Copyright Embedding
  15. 107/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2018-11-15/An Effective Preprocessor of Edge Detection for Distorted Images
  16. 107/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2018-11-15/SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks
  17. 107/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2018-11-15/Oblivious Transfer System for Information Concealing and Recovery in Cloud Computing
  18. 107/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2018-11-15/Image structure rebuilding technique using fractal dimension on the best match patch searching
  19. 107/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2018-11-15/Preserving copyright in renovating large-scale image smudges based on advanced SSD and Edge confidence
  20. 107/107年度科技部補助大專校院研究獎勵 /逢甲大學/ 2018-08-01/
  21. 106/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2017-11-15/Provable secure brand-new Multi-auction Mechanism with Dynamic Identity
  22. 106/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2017-11-15/Tele-micropayment Scam Prevention based on Visual Secret Sharing Technique
  23. 106/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2017-11-15/Renovating Contaminative Image Archives based on Patch Propagation and Adaptive Confidence Collation
  24. 105/105學年度教學優良教師 /逢甲大學/ 2016-11-15/
  25. 105/逢甲大學優良教材獎勵優等獎 /逢甲大學/ 2016-11-15/資訊安全與智慧、行動網路安全應用實務
  26. 105/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2016-11-15/Selective Scalable Secret Image Sharing with Verification
  27. 105/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2016-11-15/Enhancing the Security of Credit Card Transaction based on Visual DSC
  28. 105/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2016-11-15/Preserving User-Friendly Shadow and High-Contrast Quality for multiple Visual Secret Sharing Technique
  29. 104/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2015-11-15/A User-Friendly and Authenticatable Secret Image Sharing Scheme
  30. 104/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2015-11-15/Self-recognized Watermarking Technique that Resists Large-Scale Cropping
  31. 104/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2015-11-15/Stable Watermarking Technique based on XNOR operation and Scale Relationship
  32. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/An Innovative Electronic Group-buying System for Mobile Commerce
  33. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/RII: Renovating Irregular Illumination of Digital Image Archives
  34. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/A Wide-adapted Bantam Protocol for Roaming across Wireless Areas
  35. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/ART-Based Non-Iterative Electronic Lottery Mechanism with Robustness
  36. 103/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2014-11-15/HORME: Hierarchical-Object-Relational Medical management for Electronic record
  37. 103/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2014-11-15/Fast Authentication Mechanism with Provable Correctness for Cluster-based VANETs
  38. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/Contrast-Adaptive Removable Visible Watermarking (CARVW) for Digital Internet Media
  39. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/Note on "Authentication protocol using an identifier in an ad hoc network environment
  40. 102/逢甲大學優良教材獎勵傑出獎 /逢甲大學/ 2013-11-15/電腦、網路與行動服務安全實務
  41. 102/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2013-11-15/A Robust E-commerce Service: Light-weight Secure Mail-order Mechanism
  42. 101/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2012-11-15/An Improved CRT-based Watermarking Scheme with Voting Strategy
  43. 101/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2012-11-15/An Interactive Mobile SMS Confirmation Method using Secret Sharing Technique
  44. 101/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2012-11-15/Protecting the Content Integrity of Digital Imagery with Fidelity Preservation
  45. 100/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2011-11-15/Hybrid Wet Paper Coding Mechanism for Steganography Employing n-Indicator and Fuzzy Edge Detector
  46. 100/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2011-11-15/A Cryptographic Alternative for Preserving PHI in Compliance with HIPAA Privacy/Security Regulations
  47. 99/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2010-11-15/Distortion-Free Secret Image Sharing Mechanism Using Modulus Operator
  48. 99/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2010-11-15/Dual Digital Watermarking for Internet Media Based on Hybrid Strategies
  49. 98/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2009-11-15/Secure Authentication Protocols for Mobile Commerce Transactions
  1. 視覺密碼的最新發展/教育部顧問室資通安全聯盟中心/2009-06
  2. 資訊安全技術之發展與應用/中區三校聯合資安研討會/2008-06
  3. 資訊安全技術之發展與應用/逢甲大學資訊工程學系/2008-04
  1. Lee, J.S. and Chang, C.C./Recent Developments on Multimedia Security Technologies/資通安全專論彙編之一,國家實驗研究院科技政策研究與資訊中心 /國家實驗研究院 /2008-10-01
  2. Chang, C.C., Lee, J.S. and Lee, W.B/Secure Mechanisms for Electronic Commerce/資通安全專論彙編之一,國家實驗研究院科技政策研究與資訊中心 /國家實驗研究院 /2006-12-01
  3. Lee, J.S., Chang, Y.F. and Chang, C.C./Authentication Protocols for Wireless Communications/Communication of the Chinese Cryptology and Information Security Association /2005-12-01/ vol. 12, pp. 24-38
  1. 博碩 出版/資訊生活安全、行動智慧應用與網駭實務/王旭正、李榮三、魏國瑞/教科書
最後更新時間:2022-10-6, 9:03 a.m. 下次更新時間:2022-10-7, 9 a.m.