洪維志

副教授


學歷

  • 台灣大學 電信工程學系 博士
  • 台灣大學 電機工程學系 碩士
  • 台灣大學 電機工程學系 學士

專長

  • 無線網路
    Wireless Networks
  • 行動網路
    Mobile Networks
  • 資訊安全
    Information Security
  • 密碼分析
    Cryptanalysis
  • 硬體安全
    Hardware Security

校內經歷

  • 資訊工程學系 副教授
  • 資訊工程學系 助理教授

校外經歷

  • 中央研究院 資訊科學研究所 博士後研究人員
  • 中華電信研究所 網路維運研究室 助理研究員

論文及參與計畫

  1. Hong, W.C. Yang, R. K., Chen, Y. C, Li, B., and Lee, J.S., "Efficient Peer-to-Peer E-Payment based on Asynchronous Dual Blockchain," Journal of Internet Technology, vol.21, no. 5, 1375-1385, 2020-10. (SCI)
  2. Hong, W.C. Huang, D. Y., Chen, C. L, and Lee, J.S., "Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks," IEEE Access, DOI: 10.1109/ACCESS.2020.3007609, 2020-07. (SCI)
  3. Lee, J.S., Chen, Y. C, Hong, W.C., Yang, R. K., and Lee, K.Y., "Reputation-oriented electronic micro-loaning based on smart contracts in a solidarity group," Journal of Internet Technology, vol. 21, no. 4 , pp. 1073-1085, 2020-03. (SCI)
  4. J.-Y. Huang, W.-C. Hong, P.-S. Tsai, I-E. Liao*, "A Model for Aggregation and Filtering on Encrypted XML Streams in Fog Computing," International Journal of Distributed Sensor Networks, Volume: 13 issue: 5, 2017-05. (SCI)
  5. W.C. Hong* and Z. Tsai, "A Multichannel Scheduler for High-Speed Wireless Backhaul Links with Packet Concatenation," IEEE Transactions on Mobile Computing, vol. 9, no. 2, pp. 201-214, 2010-02. (SCI)
  1. Jia-Ying Chuang, Bing-Jie Ji, Wei-Chih Hong*, Chu-Hsiang Lee, Jeng-Da Huang and Huang-Kai Huang,"Design and Implementation of Smart Contract Based IoT Services ," The International Conference on Innovative Computing and Management Science (ICMS 2019), pp. 1-4, 2019-07. HOTEL MYSTAYS SHIN OSAKA CONFERENCE CENTER .
  2. Shao-Yu Peng, Wei-Chih Hong*, Jun-Ting Li, Sheng-Jun Huang,"Framework for efficient SCA resistance verification of IoT devices ," 2018 IEEE International Conference on Applied System Invention (ICASI), pp. 468-471, 2018-04. 幕張展覽館 .
  3. Y.-J. Huang, W.-C. Hong, C.-M. Cheng, J.-M. Chen and B.-Y. Yang,"A Memory Efficient Variant of an Implementation of the F4 Algorithm for Computing Gröbner Bases ," The 6th International conference on Trustworthy Computing, InTrust 2014, pp. 374-393, 2014-12. Beijing Institute of Technology .
  4. H. Lee, W.-C. Hong, C.-H. Kao, and C.-M. Cheng,"A User-friendly Authentication Solution Using NFC Card Emulation on Android ," IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 271-278, 2014-11. Kunibiki Messe, Shimane Prefectural Convention Center .
  5. A. Loch*, W.-C. Hong and M. Hollick,"Dynamic Curve Adaptation for Geographic Routing in Wireless Multihop Networks ," The 39th IEEE Conference on Local Computer Networks (LCN), pp. 1-5, 2014-09. Chateau Lacombe Hotel .
  6. Y.-A. Chang, W.-C. Hong, M.-C. Hsiao, B.-Y Yang, and C.-M. Cheng*,"Hydra: An Energy-efficient Programmable Cryptographic Coprocessor Supporting Elliptic-curve Pairings over Fields of Large Characteristics ," The 9th International Workshop on Security, IWSEC2014, pp. 174-186, 2014-08. Hirosaki University .
  7. Y.-H. Chiu, W.-C. Hong, L.-P. Chou, J. Ding, B.-Y. Yang and C.-M. Cheng*,"A Practical Attack on Patched MIFARE Classic ," 9th China International Conference on Information Security and Cryptology (Inscrypt 2013), pp. 1-5, 2013-11. Guangzhou, China .
  8. M.-P. Lin, W.-C. Hong*, C.-H. Chen, and C.-M. Cheng,"Design and Implementation of Multi-user Secure Indices for Encrypted Cloud Storage ," Eleventh Annual Conference on Privacy, Security and Trust (PST 2013), pp. 1-5, 2013-07. Tarragona, Catalonia .
  9. W.-C. Hong* and Z. Tsai,"Improving the Autonomous Component Carrier Selection for Home eNodeBs in LTE-Advanced ," IEEE Consumer Communications and Networking Conference (CCNC 2011), pp. 1-5, 2011-01. Las Vegas, USA .
  10. W.-C. Hong* and Z. Tsai,"On the Femtocell-based MVNO Model: A Game Theoretic Approach for Optimal Power Setting ," IEEE 71st Vehicular Technology Conference: VTC2010-Spring, pp. 1-5, 2010-05. Taipei, Taiwan .
  11. W.-C. Hong* and Z. Tsai,"Adaptive Bandwidth Allocation via Dynamic Programming in a Shared Wireless Network ," 18th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), pp. 1-5, 2007-09. Athens, Greece .
  1. 以深度學習技術改進旁通道抵禦能力檢測與訊號軌跡預處理/2021-08~2022-07 /MOST110-2221-E-035-017- /主持人
  2. (興大)人工智慧時代的硬體安全:威脅與防護(1/2)/2021-05~2022-04 /MOST110-2218-E-005-009-MBK /主持人
  3. (中興)關鍵資訊基礎設施的資安與隱私防護機制的設計與實作/2020-06~2021-05 /MOST109-2218-E-005-005- /主持人
  4. (中興)關鍵資訊基礎設施的資安與隱私防護機制的設計與實作-關鍵資訊基礎設施的資安與隱私防護機制的設計與實作(3/3)/2019-06~2020-05 /MOST108-2218-E-005-016- /主持人
  5. 控制物聯網之智慧合約技術/2018-07~2019-02 /107CFD0600044 /主持人
  6. (中興)關鍵資訊基礎設施的資安與隱私防護機制的設計與實作-關鍵資訊基礎設施的資安與隱私防護機制的設計與實作(2/3)/2018-06~2019-05 /MOST107-2218-E-005-018- /主持人
  7. 以通用圖形處理器加速之旁通道攻防能力檢測工具研究與開發/2017-08~2018-07 /MOST106-2221-E-035-021- /主持人
  8. 物聯網裝置旁通道攻擊抵禦能力之高效檢測方法/2016-08~2017-07 /MOST105-2221-E-035-067- /主持人
  9. 新型代數側通道攻擊之研究—以RC6區塊密碼演算法為例/2014-11~2015-10 /MOST103-2218-E-035-017- /主持人
  1. 密碼裝置硬體旁通道抵禦分析能力訓練暨顧問專案計畫 /2022-05~2022-11 /主持人
  2. 資安服務 /2022-01~2022-12 /共同主持人
  3. 111年度學術網路資訊分享與分析暨縣市網資訊安全維運計畫 /2022-01~2022-12 /共同主持人
  4. 旁通道攻擊自動化偵測與防禦計畫 /2021-04~2021-12 /主持人
  5. 「資安服務」專案 /2021-01~2021-12 /共同主持人
  6. 學術網路資訊分享與分析暨縣市網資訊安全維運計畫 /2021-01~2021-12 /共同主持人
  7. 資安服務專案 /2019-01~2019-12 /共同主持人
  8. 學術網路資訊分享與分析暨縣市網資訊安全維運計畫 /2019-01~2019-12 /共同主持人
  9. 資安服務專案 /2018-01~2018-12 /共同主持人
  10. A-ISAC暨Mini-SOC服務與維運計畫 /2018-01~2018-12 /協同主持人
  11. A-ISAC暨 Mini-SOC服務與維運計畫 /2018-01~2018-12 /協同主持人
  12. 106年度新型態資安實務課程計畫─課程計畫名稱:「資訊與網路安全」 /2017-02~2018-01 /主持人
  13. 資安服務專案 /2017-01~2017-12 /共同主持人
  14. A-ISAC暨Mini-SOC維運與服務計畫 /2017-01~2017-12 /協同主持人
  15. 欣銓科技-『105年主機弱點掃描服務專案』 /2016-05~2016-12 /主持人
  16. 105年度新型態資安實務課程計畫-「系統安全」 /2016-02~2017-01 /主持人
  17. A-ISAC暨Mini-SOC維運與服務計畫 /2016-01~2016-12 /協同主持人
  18. A-ISAC暨Mini-SOC維運與服務-性能提升暨可用性強化計畫 /2015-08~2016-02 /協同主持人
  19. A-ISAC暨MiniSOC-維運與服務計畫 /2015-01~2015-12 /協同主持人
  20. 資安服務專案 /2014-10~2015-10 /共同主持人
  1. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Efficient Peer-to-Peer E-Payment based on Asynchronous Dual Blockchain
  2. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Reputation-oriented electronic micro-loaning based on smart contracts in a solidarity group
  3. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks
  1. 設計與實作下一個世代智慧型電表-密碼裝置硬體之旁通道攻擊抵禦能力分析/TWISC/2019-01
  2. 即時傳輸方式與影像辨識研究說明/中央健康保險署台北業務組、逢甲大學/2018-10
  3. Design and Implementation of a Side-Channel Resistance Verification System for IoT Devices/中央研究院資訊科技創新研究中心/2018-02
  4. A Practical Attack on EasyCard 2.0/逢甲大學資訊工程學系/2014-11
  5. An Algebraic Side Channel Attack on RC6/中興大學/2014-10
最後更新時間:2022-10-6, 9:03 a.m. 下次更新時間:2022-10-7, 9 a.m.