Research

Industry Conference Speaker

  1. TonTon H.-D. Huang, "Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks", AI Village, Defcon 26, Las Vegas, Nevada, 2018.

  2. TonTon H.-D. Huang, Chia-Mu Yu, and Hung-Yu Kao, "Look! Ransomware is there: Large Scale Ransomware Detection with Naked Eye", Ruxcon Security Conference, Melbourne, Australia, 2017.

  3. TonTon H.-D. Huang, Chia-Mu Yu, and Hung-Yu Kao, "R2-D2: Color-Inspired Convolutional Neural Network (CNN)-based Android Malware Detection", OWASP AppSec USA, Orlando, Florida, 2017.

  4. TonTon H.-D. Huang, "New Wars for Reputation: From Understanding to Problem Solving: Applying Deep Learning to defend against the Deceptive Advertising", CSA Taiwan Summit, Taipei, Taiwan, 2016.

  5. TonTon H.-D. Huang, "New Mindset for Malware Battlefield: Bytecode Analysis and Physical Machine-based for Android", Hacks in Taiwan Conference (HITCON) CMT, Taipei, Taiwan, 2015.

  6. TonTon H.-D. Huang, "Building Adaptive Heterogeneous Architecture for Malware Behavior Analysis: MAN in Taiwan", Hacks in Taiwan Conference (HITCON) PLG, Taipei, Taiwan, 2014.

International Academic Conference Papers

  1. TonTon H.-D. Huang* and Hung-Yu Kao, "R2-D2: Color-inspired Convolutional Neural Network (CNN)-based Android Malware Detections", IEEE International Conference on Big Data 2018 (IEEE Big Data 2018), Seattle, WA, USA, Dec 10-13, 2018.

  2. TonTon H.-D. Huang*, Chia-Mu Yu, and Hung-Yu Kao, "Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection", 2017 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2017), Taipei, Taiwan, Dec. 1-3, 2017.

  3. TonTon H.-D. Huang*, Chia-Mu Yu, "Poster: Adaptive Data-Driven and Region-Aware Detection for Deceptive Advertising", IEEE Symposium on Security and Privacy 2016 (IEEE S&P 2016), San Jose, CA, USA, May 23-25, 2016.

  4. TonTon H.-D. Huang*, C.-S. Lee, M.-H. Wang, and Hung-Yu Kao, "IT2FLS-based Malware Analysis Mechanism: Malware Analysis Network in Taiwan (MiT)", in Proceeding of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), Manchester, United-Kingdom, Oct. 13-16, 2013.

  5. TonTon H.-D. Huang*, C.-S. Lee, H. Hagras, and Hung-Yu Kao, "TWMAN+:A Type-2 Fuzzy Ontology Model for Malware Behavior Analysis," in Proceeding of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), COEX, Seoul, Korea, Oct. 14-17, 2012.

  6. TonTon H.-D. Huang*, G. Acampora, V. Loia, C.-S. Lee, and Hung-Yu Kao, "Applying FML and Fuzzy Ontologies to Malware Behavioral Analysis," in Proceeding of the 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), Taipei, Taiwan, June. 27-30, 2011.

  7. TonTon H.-D. Huang*, C.-S. Lee, Hung-Yu Kao, Y.-L. Tsai, and J.-G. Chang, "Malware Behavioral Analysis System: TWMAN," in Proceeding of the 2011 IEEE Symposium on Computational Intelligence for Intelligent Agent (IEEE SSCI 2011), Paris, France, Apr. 11-15, 2011.

  8. TonTon H.-D. Huang*, T.-Y. Chuang, Y.-L. Tsai, and C.-S. Lee, "Ontology-based intelligent system for malware behavioral analysis," in Proceeding of the 2010 IEEE World Congress on Computational Intelligence (WCCI 2010), Barcelona, Spain, Jul. 18-23, 2010.

2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), COEX, Seoul, Korea, Oct. 14-17, 2012.
https://doi.org/10.1109/ICSMC.2012.6378176http://blog.twman.org/2012/10/IEEE SMC 2012
2011 IEEE Symposium on Computational Intelligence for Intelligent Agent (IEEE SSCI 2011), Paris, France, Apr. 11-15, 2011.
https://doi.org/10.1109/IA.2011.5953604http://blog.twman.org/2011/04/IEEE SSCI 2011
2010 IEEE World Congress on Computational Intelligence (WCCI 2010), Barcelona, Spain, Jul. 18-23, 2010.
https://doi.org/10.1109/FUZZY.2010.5584325http://blog.twman.org/2010/07/IEEE WCCI 2010

Invited Talks

  1. 2020年11月12日:淡江大學 資訊工程學系

  2. 2020年10月19日:國立臺南大學 資訊工程學系

  3. 2020年03月27日:國立臺南大學 數位學習科技學系 專題演講:校友來開講 - 手把手帶你翻轉菸酒生,未來不止這就是人蔘

  4. 2017年04月29日:國立成功大學 資訊工程學系智慧聯網融入跨領域工程人才培育計畫 機器學習技術與應用介紹

  5. 2017年02月20日:中華電信學院 資訊學系:深度學習在網路安全的應用

  6. 2016年03月01日:RSA USA 2016 - Cheetah Mobile Booth Speech: Data-Driven Mobile Security.

  7. 2015年12月11日:元智大學 資訊工程學系:Talk is cheap, Show me the code.

  8. 2015年05月28日: 國立成功大學 電腦與通訊工程研究所 網路安全業界講師 - Android 逆向工程分析

  9. 2014年12月26日:Workshop on Understanding Botnets of Taiwan 2014 (BoT 2014) - 實體異質惡意行為分析架構

  10. 2014年11月20日:內政部警政署 - 網路安全與Linux 教育訓練

  11. 2013年09月11日:2013 NSC-Inria International Program - Associate Team II, TAO Team, Inria, France

  12. 2013年09月11日:2013 NSC-Inria International Program - Associate Team II, LIAS Lab. ENSMA, France

  13. 2012年11月19日:國立臺南大學 University of Essex 課程說明會

  14. 2012年11月07日:康寧大學 數位應用學系 校友經驗分享

  15. 2012年04月24日:2012 Research Collaboration Workshopfor Top UK-TW Universities

  16. 2011年11月22日:曼徹斯特大學 計算機科學系 - Genetic Type-2 Fuzzy Ontology Model to Malware Behavioral Analysis

  17. 2009年06月17日:國立臺南大學 數位學習科技學系 社會新鮮人就業系列講座

  18. 2010年09月24日:國防部憲兵司令部刑事鑑識中心 - 封閉型惡意程式網路建置之探討

  19. 2010年09月13日:國家安全局 網路安全專精訓練 - 惡意程式收集與分析 (二) 進階課程 - 惡意程式行為分析

  20. 2010年05月07日:國立高雄第一科技大學 資訊管理學系 - 業界師資演講 : 抬丸郎

  21. 2009年04月10日:立德大學 數位應用學系 就業升學講座

  22. 2006年10月30日:立德大學 資訊工程學系 升學講座

Patent submitted

International Journal Papers

  1. TonTon H.-D. Huang* and Hung-Yu Kao, "C-3PO: Click-sequence-aware DeeP Neural Network (DNN)-based Pop-uPs RecOmmendation", Soft Computing, Vol. 23, no. 22, pp. 11793–11799, 2019.

  2. TonTon H.-D. Huang*, C.-S. Lee, M.-H. Wang, and Hung-Yu Kao, "IT2FS-based ontology with soft-computing mechanism for malware behavior analysis," Soft Computing, vol. 18, no. 2, pp. 267-284, 2014.

  3. TonTon H.-D. Huang*, G. Acampora, V. Loia, C.-S. Lee, H. Hagras, M.-H. Wang, Hung-Yu. Kao, and J.-G. Chang, “Fuzzy markup language for malware behavioral analysis,” in G. Acampora, C. S. Lee, M. H. Wang, and V. Loia (editors), On the Power of Fuzzy Markup Language, Springer-Verlag, Germany, 2012, pp. 113-131.

Soft Computing, vol. 18, no. 2, pp. 267-284, 2014.
On the Power of Fuzzy Markup Language, Springer-Verlag, Germany, 2012, pp. 113-131.

Thesis

  • Ph.D. thesis基於深度學習的網路威脅異常分析 (Deep learning based anomaly analysis in cyber threats)

  • Master thesis知識本體與推論法則於台南小吃之應用 ( Applying Ontology and Inference Rules in Tainan Delicacies )

Domestic Conference Papers

  1. 黃獻德, 李健興, 莊宗嚴, 蔡一郎, 邱敏乘, "基於知識本體之惡意程式分析平台," 2009全國計算機會議(NCS2009), 台北, 2009.

  2. 黃獻德, 蔡一郎, 邱敏乘, 李健興, 莊宗嚴, "知識本體於惡意程式行為分析之應用," 2009年臺灣網際網路研討會 (TANET2009), 彰化, 2009.

  3. 李健興, 黃獻德, 莊宗嚴, "基於模糊推論代理人之Web2.0府城美食知識管理平臺," 2007全國計算機會議(NCS2007), 台中, 2007.

  4. 黃獻德, 莊宗嚴, 李健興, "Web 2.0概念融入健康美食導覽-以臺南小吃導覽為例," 第二屆數位內容管理與應用學術研討會(DCMA2007), 台南, 2007.