• International Industry Conference Speaker:3

    • TonTon H.-D. Huang, "Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks", AI Village, Defcon 26, Las Vegas, Nevada, 2018.

    • TonTon H.-D. Huang, Chia-Mu Yu, and Hung-Yu Kao, "Look! Ransomware is there: Large Scale Ransomware Detection with Naked Eye", Ruxcon Security Conference, Melbourne, Australia, 2017.

    • TonTon H.-D. Huang, Chia-Mu Yu, and Hung-Yu Kao, "R2-D2: Color-Inspired Convolutional Neural Network (CNN)-based Android Malware Detection", OWASP AppSec USA, Orlando, Florida, 2017.

My major research interests include Deep Learning (Deep Learning 101), Block Chain, Malware Analysis (TWMAN & R2-D2), Type-2 Fuzzy Logic, and Ontology Applications. 
Moreover, you may be interested in my research detail, here are my talk information and presentation video.

    • Ph.D.'s thesis基於深度學習的網路威脅異常分析 (Deep learning based anomaly analysis in cyber threats)

    • Master's thesis :知識本體與推論法則於台南小吃之應用 ( Applying Ontology and Inference Rules in Tainan Delicacies )

    • Book Chapter:1

      • TonTon H.-D. Huang*, G. Acampora, V. Loia, C.-S. Lee, H. Hagras, M.-H. Wang, Hung-Yu. Kao, and J.-G. Chang, “Fuzzy markup language for malware behavioral analysis,” in G. Acampora, C. S. Lee, M. H. Wang, and V. Loia (editors), On the Power of Fuzzy Markup Language, Springer-Verlag, Germany, 2012, pp. 113-131.

    • Patent:6

      • 基於卷積神經網絡的以太坊智能合約惡意識別方法 (submitted)
      • 基於循環神經網路的虛擬幣交易欺詐檢測系統 (submitted)
      • 基於卷積神經網絡的安卓智能手機惡意軟件識別方法 (submitted)
      • 基於深層類神經網絡的Android的智能型手機通知欄彈窗邏輯管理方法 (submitted)
      • 基於卷積神經網絡的欺詐廣告頁面識別方法 (submitted)
      • 基於深層類神經網絡的騷擾電話識別方法 (submitted)

    • Domestic Conference Papers:4 
    • 黃獻德, 李健興, 莊宗嚴, 蔡一郎, 邱敏乘, "基於知識本體之惡意程式分析平台," 2009全國計算機會議(NCS2009), 台北, 2009.
    • 黃獻德, 蔡一郎, 邱敏乘, 李健興, 莊宗嚴, "知識本體於惡意程式行為分析之應用," 2009年臺灣網際網路研討會 (TANET2009), 彰化, 2009.
    • 李健興, 黃獻德, 莊宗嚴, "基於模糊推論代理人之Web2.0府城美食知識管理平臺," 2007全國計算機會議(NCS2007), 台中, 2007.
    • 黃獻德, 莊宗嚴, 李健興, "Web 2.0概念融入健康美食導覽-以臺南小吃導覽為例," 第二屆數位內容管理與應用學術研討會(DCMA2007), 台南, 2007.

    • Reviewer:
      • IEEE Access
      • Soft Computing
      • IEEE Systems Journal
      • IEEE Transactions on Mobile Computing
      • Journal of Network and Computer Applications
      • Journal of Information Security and Applications
      • IEEE International Conference on Systems, Man, and Cybernetics