• International Industry Conference Speaker:3






My major research interests include Deep Learning (Deep Learning 101), Block Chain, Malware Analysis (TWMAN & R2-D2), Type-2 Fuzzy Logic, and Ontology Applications. 
Moreover, you may be interested in my research detail, here are my talk information and presentation video.




    • TonTon H.-D. Huang*, C.-S. Lee, M.-H. Wang, and Hung-Yu Kao, "IT2FLS-based Malware Analysis Mechanism: Malware Analysis Network in Taiwan (MiT)", in Proceeding of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), Manchester, United-Kingdom, Oct. 13-16, 2013.
      IEEE Xplore | Blog
    • TonTon H.-D. Huang*, C.-S. Lee, H. Hagras, and Hung-Yu Kao, "TWMAN+:A Type-2 Fuzzy Ontology Model for Malware Behavior Analysis," in Proceeding of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), COEX, Seoul, Korea, Oct. 14-17, 2012.
      IEEE Xplore | Blog
    • TonTon H.-D. Huang*, G. Acampora, V. Loia, C.-S. Lee, and Hung-Yu Kao, "Applying FML and Fuzzy Ontologies to Malware Behavioral Analysis," in Proceeding of the 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), Taipei, Taiwan, June. 27-30, 2011.
      IEEE Xplore | Blog

    • TonTon H.-D. Huang*, C.-S. Lee, Hung-Yu Kao, Y.-L. Tsai, and J.-G. Chang, "Malware Behavioral Analysis System: TWMAN," in Proceeding of the 2011 IEEE Symposium on Computational Intelligence for Intelligent Agent (IEEE SSCI 2011), Paris, France, Apr. 11-15, 2011.
      IEEE Xplore | Blog
    • TonTon H.-D. Huang*, T.-Y. Chuang, Y.-L. Tsai, and C.-S. Lee, "Ontology-based intelligent system for malware behavioral analysis," in Proceeding of the 2010 IEEE World Congress on Computational Intelligence (WCCI 2010), Barcelona, Spain, Jul. 18-23, 2010.
      IEEE Xplore | Blog

  • Patent:6

    • 基於卷積神經網絡的以太坊智能合約惡意識別方法 (submitted)
    • 基於循環神經網路的虛擬幣交易欺詐檢測系統 (submitted)
    • 基於卷積神經網絡的安卓智能手機惡意軟件識別方法 (submitted)
    • 基於深層類神經網絡的Android的智能型手機通知欄彈窗邏輯管理方法 (submitted)
    • 基於卷積神經網絡的欺詐廣告頁面識別方法 (submitted)
    • 基於深層類神經網絡的騷擾電話識別方法 (submitted)

  • Book Chapter:1

    • TonTon H.-D. Huang*, G. Acampora, V. Loia, C.-S. Lee, H. Hagras, M.-H. Wang, Hung-Yu. Kao, and J.-G. Chang, “Fuzzy markup language for malware behavioral analysis,” in G. Acampora, C. S. Lee, M. H. Wang, and V. Loia (editors), On the Power of Fuzzy Markup Language, Springer-Verlag, Germany, 2012, pp. 113-131.
      http://dx.doi.org/10.1007/978-3-642-35488-5_7

  • Domestic Conference Papers:4 
  • 黃獻德, 李健興, 莊宗嚴, 蔡一郎, 邱敏乘, "基於知識本體之惡意程式分析平台," 2009全國計算機會議(NCS2009), 台北, 2009.
  • 黃獻德, 蔡一郎, 邱敏乘, 李健興, 莊宗嚴, "知識本體於惡意程式行為分析之應用," 2009年臺灣網際網路研討會 (TANET2009), 彰化, 2009.
  • 李健興, 黃獻德, 莊宗嚴, "基於模糊推論代理人之Web2.0府城美食知識管理平臺," 2007全國計算機會議(NCS2007), 台中, 2007.
  • 黃獻德, 莊宗嚴, 李健興, "Web 2.0概念融入健康美食導覽-以臺南小吃導覽為例," 第二屆數位內容管理與應用學術研討會(DCMA2007), 台南, 2007.

  • Ph.D.'s thesis基於深度學習的網路威脅異常分析 (Deep learning based anomaly analysis in cyber threats)
  • Master's thesis知識本體與推論法則於台南小吃之應用 ( Applying Ontology and Inference Rules in Tainan Delicacies )

  • Reviewer:
    • IEEE Access
    • Soft Computing
    • IEEE Systems Journal
    • IEEE Transactions on Mobile Computing
    • Journal of Network and Computer Applications
    • Journal of Information Security and Applications
    • IEEE International Conference on Systems, Man, and Cybernetics