Publications (著作)


My major research interests include Deep Learning (Machine Learning, Data Mining), Web URL Security, Malware Analysis (Android Reverse-Engineering)Type-2 Fuzzy Logic, and Ontology Applications. Moreover, you may interested with my another talk about my research.

IEEE Xplore: http://goo.gl/TxeyU2

Google Scholar Citations: http://x.twman.org/GoogleScholar
1B(J) + 4C (C) + 1O =  2.285 + ((1.0666 × 2) + (1.142 × 2)) + 1.33 = 8.0322

  • Book Chapter (專書論文) : 1

    • H.-D. Huang, G. Acampora, V. Loia, C.-S. Lee, H. Hagras, M.-H. Wang, H.-Y. Kao, and J.-G. Chang, “Fuzzy markup language for malware behavioral analysis,” in G. Acampora, C. S. Lee, M. H. Wang, and V. Loia (editors), On the Power of Fuzzy Markup Language, Springer-Verlag, Germany, 2012, pp. 113-131.
      DOI:  http://dx.doi.org/10.1007/978-3-642-35488-5_7
      2 * (2^-1/ (2^-1 + 2^-2 + 2^-3 + 2^-4 + 2^-5 + 2^-6 + 2^-7)) = 1.0078
    • H.-D. Huang, C.-S. Lee, H. Hagras, and H.-Y. Kao, "TWMAN+:A Type-2 Fuzzy Ontology Model for Malware Behavior Analysis," in Proceeding of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), COEX, Seoul, Korea, Oct. 14-17, 2012.
      IEEE Xplore | Blog Cited Times | 2 * (2^-1/ (2^-1 + 2^-2 + 2^-3)) = 1.1428
    • H.-D. Huang, G. Acampora, V. Loia, C.-S. Lee, and H.-Y. Kao "Applying FML and Fuzzy Ontologies to Malware Behavioral Analysis," in Proceeding of the 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), Taipei, Taiwan, June. 27-30, 2011.
      IEEE Xplore | Blog  | Cited Times | 2 * (2^-1/ (2^-1 + 2^-2 + 2^-3 + + 2^-4)) = 1.0666

    • H.-D. Huang, C.-S. Lee, H.-Y. Kao Y.-L. Tsai, and J.-G. Chang, "Malware Behavioral Analysis System: TWMAN," in Proceeding of the 2011 IEEE Symposium on Computational Intelligence for Intelligent Agent (IEEE SSCI 2011), Paris, France, Apr. 11-15, 2011.
      IEEE Xplore
       | Blog | Cited Times | 2 * (2^-1/ (2^-1 + 2^-2 + 2^-3 + 2^-4))  = 1.0666
    • H.-D. Huang, T.-Y. Chuang, Y.-L. Tsai, and C.-S. Lee, "Ontology-based intelligent system for malware behavioral analysis," in Proceeding of the 2010 IEEE World Congress on Computational Intelligence (WCCI 2010), Barcelona, Spain, Jul. 18-23, 2010.
      IEEE Xplore | Blog | Cited Times
  • Domestic Conference Papers ( 國內會議論文 ) :4 
  • 黃獻德, 李健興, 莊宗嚴, 蔡一郎, 邱敏乘, "基於知識本體之惡意程式分析平台," 2009全國計算機會議(NCS2009), 台北, 2009.

  • 黃獻德, 蔡一郎, 邱敏乘, 李健興, 莊宗嚴, "知識本體於惡意程式行為分析之應用," 2009年臺灣網際網路研討會 (TANET2009), 彰化, 2009.

  • 李健興, 黃獻德, 莊宗嚴, "基於模糊推論代理人之Web2.0府城美食知識管理平臺," 2007全國計算機會議(NCS2007), 台中, 2007.

  • 黃獻德, 莊宗嚴, 李健興, "Web 2.0概念融入健康美食導覽-以臺南小吃導覽為例," 第二屆數位內容管理與應用學術研討會(DCMA2007), 台南, 2007.

http://ieeexplore.ieee.org/search/searchresult.jsp?newsearch=true&queryText=malware%20behavioral   https://www.google.com.tw/search?q=malware+analysis&source=lnt&tbs=ctr:countryTW&cr=countryTW&sa=X&ei=ITRxVZyTG4zd8AWhn4D4Bg&ved=0CBQQpwU&biw=1536&bih=746

http://dx.doi.org/10.1007/978-3-642-35488-5_7

http://dx.doi.org/10.1007/s00500-013-1056-0 

IEEE SMC 2013

IEEE SMC 2012

IEEE SSCI 2011

IEEE WWCI 2010

IEEE WWCI 2010