If you made any changes in Pure these will be visible here soon.

Personal profile

Education

  • 1999 PhD,Technical University of Berlin

Research Interests

  • Communication Network Agreement
  • Communications Engineering
  • Information Security Product Testing
  • Network Security

Experience

  • 1994/12 ~ 1995/07 Engineer & lecturer, MiTAC
  • 1994/12 ~ 1995/07 Engineer, Taipei City Traffic Engineering Office
  • 2002/01 ~ 2002/12 Information Security Adviser, Telecom Technology Center
  • 2007/09~ present Professor, Department of Electrical Engineering, National Cheng Kung University
  • 2009/08 ~ 2011/04 Deputy Director of Computer and Network Center, National Cheng Kung University
  • 2017/02~ present Deputy Director General, National Center for High-performance Computing
  • 2017/02~ present Director, Taiwan Information Security Center @ NCKU

Fingerprint Dive into the research topics where Jung-Shian Li is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 23 Similar Profiles
Scheduling Engineering & Materials Science
Routers Engineering & Materials Science
Topology Engineering & Materials Science
Quality of service Engineering & Materials Science
Mobile ad hoc networks Engineering & Materials Science
Internet Engineering & Materials Science
Bandwidth Engineering & Materials Science
Ad hoc networks Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 1999 2020

Research Output 1998 2019

A novel tag searching protocol with time efficiency and searching accuracy in RFID systems

Liu, C. G., Liu, I. H., Lin, C. D. & Li, J-S., 2019 Feb 26, In : Computer Networks. 150, p. 201-216 16 p.

Research output: Contribution to journalArticle

Radio frequency identification (RFID)
Industry

A survey on SCADA security and honeypot in industrial control system

Lu, K. C., Liu, I. H., Sun, M. W. & Li, J-S., 2019 Jan 1, Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. Mohammed, F., Saeed, F., Gazem, N. & Busalim, A. (eds.). Springer Verlag, p. 598-604 7 p. (Advances in Intelligent Systems and Computing; vol. 843).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SCADA systems
Data acquisition
Control systems
Monitoring
Logistics

A new colluded adversarial VNet embeddings attack in cloud

Liu, I. H., Fang, T. J., Li, J-S., Sun, M. W. & Liu, C. G., 2018 Mar 27, Proceedings - 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017. Horng, S-J. (ed.). IEEE Computer Society, p. 9-16 8 p. (Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings; vol. 2017-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attack
Topology
Disclosure
Tomography
Virtualization

A Secure Multi-Keyword Fuzzy Search with Polynomial Function for Encrypted Data in Cloud Computing

Liu, I. H., Lin, Y. H., Li, J-S., Kuo, W. C. & Liu, C. G., 2018 Sep 11, 2018 3rd International Conference on Computer and Communication Systems, ICCCS 2018. Institute of Electrical and Electronics Engineers Inc., p. 227-232 6 p. 8463248

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Cloud computing
Servers
Polynomials
Hardware

Design and implement of capture the flag based on cloud offense and defense platform

Chain, K., Kuo, C. C., Liu, I. H., Li, J-S. & Yang, C-S., 2018 Jun 22, Proceedings of 4th IEEE International Conference on Applied System Innovation 2018, ICASI 2018. Lam, A. D. K-T., Prior, S. D. & Meen, T-H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 686-689 4 p. (Proceedings of 4th IEEE International Conference on Applied System Innovation 2018, ICASI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Attack
Testbed
Exercise
Immediately

Thesis

Anomaly Detection on Cloud Application Based on Service Pattern Statistics

Author: 家駿, 張., 2016 Aug 24

Supervisor: Li, J. (Supervisor)

Student thesis: Master's Thesis

A Novel Tag Searching Protocol based on Manchester Signal Collision in RFID Systems

Author: 長德, 林., 2016 Aug 23

Supervisor: Li, J. (Supervisor)

Student thesis: Master's Thesis

Distributed Log System in Cloud Digital Forensics

Author: 怡臻, 陳., 2014 Jul 10

Supervisor: Li, J. (Supervisor)

Student thesis: Master's Thesis

Efficient Tag Collection and Defense Against DDoS Attacks in the Internet of Things

Author: 舜智, 蔡., 2017 Jul 25

Supervisor: Li, J. (Supervisor)

Student thesis: Doctoral Thesis

Exploring Global Botnet Patterns based on Honeypot Log Similarity

Author: 啟賓, 江., 2016 Jul 18

Supervisor: Li, J. (Supervisor)

Student thesis: Doctoral Thesis