I-Hsien Liu

Postdoctoral Fellow

  • 33 Citations
  • 3 h-Index
20132020
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where I-Hsien Liu is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 25 Similar Profiles
Cloud computing Engineering & Materials Science
Roadsides Engineering & Materials Science
Intrusion detection Engineering & Materials Science
Scheduling algorithms Engineering & Materials Science
SCADA systems Engineering & Materials Science
Topology Engineering & Materials Science
Scheduling Engineering & Materials Science
Vehicular ad hoc networks Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2013 2020

  • 33 Citations
  • 3 h-Index
  • 14 Conference contribution
  • 8 Article

Implementation of an IP Management and Risk Assessment System Based on PageRank

Hou, C. L., Kuo, C. C., Liu, I. H. & Yang, C. S., 2020 Jan 1, Security with Intelligent Computing and Big-data Services - Proceedings of the 2nd International Conference on Security with Intelligent Computing and Big Data Services SICBS-2018. Jain, L. C., Yang, C-N., Peng, S-L., Jain, L. C., Jain, L. C. & Jain, L. C. (eds.). Springer Verlag, p. 438-450 13 p. (Advances in Intelligent Systems and Computing; vol. 895).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Risk assessment
Managers
Internet
Experiments

A novel tag searching protocol with time efficiency and searching accuracy in RFID systems

Liu, C. G., Liu, I. H., Lin, C. D. & Li, J. S., 2019 Feb 26, In : Computer Networks. 150, p. 201-216 16 p.

Research output: Contribution to journalArticle

Radio frequency identification (RFID)
Industry

A survey on SCADA security and honeypot in industrial control system

Lu, K. C., Liu, I. H., Sun, M. W. & Li, J. S., 2019 Jan 1, Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. Mohammed, F., Saeed, F., Gazem, N. & Busalim, A. (eds.). Springer Verlag, p. 598-604 7 p. (Advances in Intelligent Systems and Computing; vol. 843).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SCADA systems
Data acquisition
Control systems
Monitoring
Logistics

Performance analysis of Authentication Information exchange Scheme in WSN

Yang, S. K., Shiue, Y. M., Liu, I. H., Su, Z. Y. & Liu, C. G., 2019 Aug, Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019. Institute of Electrical and Electronics Engineers Inc., p. 23-27 5 p. 8858313. (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

information exchange
Authentication
Industry
Technology
Research

A new colluded adversarial VNet embeddings attack in cloud

Liu, I. H., Fang, T. J., Li, J. S., Sun, M. W. & Liu, C. G., 2018 Mar 27, Proceedings - 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017. Horng, S-J. (ed.). IEEE Computer Society, p. 9-16 8 p. (Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings; vol. 2017-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attack
Topology
Disclosure
Tomography
Virtualization