Research

Industry Conference Speaker

  1. TonTon H.-D. Huang, "Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks", AI Village, Defcon 26, Las Vegas, Nevada, 2018. (link)

  2. TonTon H.-D. Huang, Chia-Mu Yu, and Hung-Yu Kao, "Look! Ransomware is there: Large Scale Ransomware Detection with Naked Eye", Ruxcon Security Conference, Melbourne, Australia, 2017. (link)

  3. TonTon H.-D. Huang, Chia-Mu Yu, and Hung-Yu Kao, "R2-D2: Color-Inspired Convolutional Neural Network (CNN)-based Android Malware Detection", OWASP AppSec USA, Orlando, Florida, 2017. (link)

  4. TonTon H.-D. Huang, "New Mindset for Malware Battlefield: Bytecode Analysis and Physical Machine-based for Android", Hacks in Taiwan Conference (HITCON) CMT, Taipei, Taiwan, 2015. (Keynote Speech, link)

  5. TonTon H.-D. Huang, "Building Adaptive Heterogeneous Architecture for Malware Behavior Analysis: MAN in Taiwan", Hacks in Taiwan Conference (HITCON) PLG, Taipei, Taiwan, 2014. (link)

This paper focus on the basic tenets of ZT and how state-of-the-art approaches can be used to accomplish these.

ZTA is not a single network architecture which can be achieved using just one technology. Rather, ZTA comprises various guiding principles that need to be strategically implemented to secure enterprise assets such as data, devices, users and other components of infrastructure.

The key principles for achieving ZTA are authentication and access control, as these are the means by which the user’s identity is established and privileges ascertained for the conduct of different operations involving protected resource(s).

For implementing ZTA in a critical infrastructure context, a strong authentication scheme which identifies both users and devices is required. Beyond this, rather than simply relying on entry-point authentication, the use of a context-aware and continuous authentication scheme which takes into account both the user and device contexts on an ongoing basis to ‘‘actively’’ authenticate is also recommended. In terms of access control, ZTA strategies should include a risk-aware access control scheme which determines the risk associated with the granting of an access request.

Academic Conferences/Journal Papers (Google Scholar)

  1. TonTon H.-D. Huang* and Hung-Yu Kao, "R2-D2: Color-inspired Convolutional Neural Network (CNN)-based Android Malware Detections", IEEE International Conference on Big Data 2018 (IEEE Big Data 2018), Seattle, WA, USA, Dec 10-13, 2018. (link)

  2. TonTonH.-D. Huang, "Hunting the ethereum smart con-tract:Color-inspired inspection of potential attacks", arXiv preprint, arXiv:1807.01868, 2018. (link)

  3. TonTon H.-D. Huang*, Chia-Mu Yu, and Hung-Yu Kao, "Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection", 2017 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2017), Taipei, Taiwan, Dec. 1-3, 2017. (link)

  4. TonTon H.-D. Huang*, Chia-Mu Yu, "Poster: Adaptive Data-Driven and Region-Aware Detection for Deceptive Advertising", IEEE Symposium on Security and Privacy 2016 (IEEE S&P 2016), San Jose, CA, USA, May 23-25, 2016. (link)

  5. TonTon H.-D. Huang*, C.-S. Lee, M.-H. Wang, and Hung-Yu Kao, "IT2FLS-based Malware Analysis Mechanism: Malware Analysis Network in Taiwan (MiT)", in Proceeding of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), Manchester, United-Kingdom, Oct. 13-16, 2013. (link)

  6. TonTon H.-D. Huang*, C.-S. Lee, H. Hagras, and Hung-Yu Kao, "TWMAN+:A Type-2 Fuzzy Ontology Model for Malware Behavior Analysis," in Proceeding of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), COEX, Seoul, Korea, Oct. 14-17, 2012. (link)

  7. TonTon H.-D. Huang*, G. Acampora, V. Loia, C.-S. Lee, and Hung-Yu Kao, "Applying FML and Fuzzy Ontologies to Malware Behavioral Analysis," in Proceeding of the 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), Taipei, Taiwan, June. 27-30, 2011. (link)

  8. TonTon H.-D. Huang*, C.-S. Lee, Hung-Yu Kao, Y.-L. Tsai, and J.-G. Chang, "Malware Behavioral Analysis System: TWMAN," in Proceeding of the 2011 IEEE Symposium on Computational Intelligence for Intelligent Agent (IEEE SSCI 2011), Paris, France, Apr. 11-15, 2011. (link)

  9. TonTon H.-D. Huang*, T.-Y. Chuang, Y.-L. Tsai, and C.-S. Lee, "Ontology-based intelligent system for malware behavioral analysis," in Proceeding of the 2010 IEEE World Congress on Computational Intelligence (WCCI 2010), Barcelona, Spain, Jul. 18-23, 2010. (link)

Journal Citation Reports | Scopus

  1. TonTon H.-D. Huang* and Hung-Yu Kao, "C-3PO: Click-sequence-aware DeeP Neural Network (DNN)-based Pop-uPs RecOmmendation", Soft Computing, Vol. 23, no. 22, pp. 11793–11799, 2019. (link / 2020 CiteScore: 5.1 / 2020 Impact factor: 3.643;Q2)

  2. TonTon H.-D. Huang*, C.-S. Lee, M.-H. Wang, and Hung-Yu Kao, "IT2FS-based ontology with soft-computing mechanism for malware behavior analysis," Soft Computing, vol. 18, no. 2, pp. 267-284, 2014. (link / 2020 CiteScore: 5.1 / 2020 Impact factor : 3.643;Q2)

  3. TonTon H.-D. Huang*, G. Acampora, V. Loia, C.-S. Lee, H. Hagras, M.-H. Wang, Hung-Yu. Kao, and J.-G. Chang, “Fuzzy markup language for malware behavioral analysis,” in G. Acampora, C. S. Lee, M. H. Wang, and V. Loia (editors), On the Power of Fuzzy Markup Language, Springer-Verlag, Germany, 2012, pp. 113-131.

2017 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2017), Taipei, Taiwan, Dec. 1-3, 2017.
https://doi.org/10.1109/TAAI.2017.30
2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), COEX, Seoul, Korea, Oct. 14-17, 2012.https://blog.twman.org/2012/10/IEEE-SMC-2012.html
2011 IEEE Symposium on Computational Intelligence for Intelligent Agent (IEEE SSCI 2011), Paris, France, Apr. 11-15, 2011.
https://blog.twman.org/2011/04/IEEE-SSCI-2011.html
2010 IEEE World Congress on Computational Intelligence (WCCI 2010), Barcelona, Spain, Jul. 18-23, 2010.
https://blog.twman.org/2010/07/IEEE-WCCI-2010.html
On the Power of Fuzzy Markup Language, Springer-Verlag, Germany, 2012, pp. 113-131.
Soft Computing, vol. 18, no. 2, pp. 267-284, 2014.

Patent submitted

  1. (PDF) 基於循環神經網路的虛擬幣交易欺詐檢測系統 (数据检测方法、装置、电子设备及存储介质) (2038-03-30 Anticipated expiration)
    Data detection method, device, electronic equipment and storage medium

  2. (PDF) 基於卷積神經網絡的以太坊智能合約惡意識別方法 (缺陷类型检测方法、装置、电子设备及介质) (2018-09-07 Publication of CN108509958A)
    Defect type detection method, device, electronic equipment and medium

  3. (PDF) 基於卷積神經網絡的安卓智能手機惡意軟件識別方法 (一种应用识别方法、装置、电子设备以及存储介质) (2018-02-06 Publication of CN107665307A)
    A kind of application and identification method, device, electronic equipment and storage medium

  4. (PDF) 基於深層類神經網絡的Android的智能型手機通知欄彈窗邏輯管理方法 (信息處理和模型訓練方法,裝置,電子設備,存儲介質)
    Information processing and model training method, device, electronic equipment, storage medium
    (2017-11-28 Publication of CN107402754A)

  5. (PDF) Information processing and model training method, apparatus, electronic device and storage medium (2019-01-03 Publication of WO2019001185A1)

  6. (PDF) 基於卷積神經網絡的欺詐廣告頁面識別方法 (2018-04-06 Publication of CN107886344A)
    The recognition methods of fraud advertisement and device based on convolutional neural networks

  7. (PDF) 基於深層類神經網絡的騷擾電話識別方法 (2018-04-06 Publication of CN107889111A)
    Harassing call recognition methods and device based on deep layer neural network

Invited Talks

  1. 2021年11月22日:國立台北商業大學 資訊與決策科學研究所 專題演講

  2. 2021年04月21日:國立成功大學 創意產業設計研究所

  3. 2021年03月30日:國立臺灣大學 土木工程學系電腦輔助工程組 專題演講:除了電腦視覺(CV)和聊天機器人(Chatbot)之外的AI

  4. 2021年03月13日:國立成功大學 人工智慧與資訊系統碩士在職專班 專題演講:看見你的聲音,聽見你的文字

  5. 2020年12月25日:國立雲林科技大學 智慧辨識產業服務研究中心 專題演講機器人如何學習人類思考?

  6. 2020年11月12日:淡江大學 資訊工程學系 專題演講手把手帶你跳坑ASR的聲紋識別及NLP的機器閱讀理解

  7. 2020年10月19日:國立臺南大學 資訊工程學系:手把手帶你探索機器人如何理解你

  8. 2020年03月27日:國立臺南大學 數位學習科技學系 專題演講:校友來開講 - 手把手帶你翻轉菸酒生,未來不止這就是人蔘

  9. 2017年04月29日:國立成功大學 資訊工程學系智慧聯網融入跨領域工程人才培育計畫:機器學習技術與應用介紹

  10. 2017年02月20日:中華電信學院 資訊學系:深度學習在網路安全的應用

  11. 2016年09月10日:HadoopCon 2016:From Understanding to Problem Solving: Applying Deep Learning to Defend Against the Deceptive Advertising and Phone Scams

  12. 2016年07月12日:國際資訊安全組織台灣高峰會:From Understanding to Problem Solving: Applying Deep Learning to Defend Against the Deceptive Advertising

  13. 2016年03月01日:RSA USA 2016 - Cheetah Mobile Booth Speech: Data-Driven Mobile Security.

  14. 2015年12月11日:元智大學 資訊工程學系:Talk is cheap, Show me the code.

  15. 2015年05月28日: 國立成功大學 電腦與通訊工程研究所 網路安全業界講師 - Android 逆向工程分析

  16. 2014年12月26日:Workshop on Understanding Botnets of Taiwan 2014 (BoT 2014) - 實體異質惡意行為分析架構

  17. 2014年11月20日:內政部警政署 - 網路安全與Linux 教育訓練

  18. 2013年09月11日:2013 NSC-Inria International Program - Associate Team II, TAO Team, Inria, France

  19. 2013年09月11日:2013 NSC-Inria International Program - Associate Team II, LIAS Lab. ENSMA, France

  20. 2012年11月19日:國立臺南大學 University of Essex 課程說明會

  21. 2012年11月07日:康寧大學 數位應用學系 校友經驗分享

  22. 2012年04月24日:2012 Research Collaboration Workshopfor Top UK-TW Universities

  23. 2011年11月22日:曼徹斯特大學 計算機科學系 - Genetic Type-2 Fuzzy Ontology Model to Malware Behavioral Analysis

  24. 2009年06月17日:國立臺南大學 數位學習科技學系 社會新鮮人就業系列講座

  25. 2010年09月24日:國防部憲兵司令部刑事鑑識中心 - 封閉型惡意程式網路建置之探討

  26. 2010年09月13日:國家安全局 網路安全專精訓練 - 惡意程式收集與分析 (二) 進階課程 - 惡意程式行為分析

  27. 2010年05月07日:國立高雄第一科技大學 資訊管理學系 - 業界師資演講 : 抬丸郎

  28. 2009年04月10日:立德大學 數位應用學系 就業升學講座

  29. 2006年10月30日:立德大學 資訊工程學系 升學講座

Domestic Conference Papers

  1. 黃獻德, 李健興, 莊宗嚴, 蔡一郎, 邱敏乘, "基於知識本體之惡意程式分析平台," 2009全國計算機會議(NCS2009), 台北, 2009. (Blog)

  2. 黃獻德, 蔡一郎, 邱敏乘, 李健興, 莊宗嚴, "知識本體於惡意程式行為分析之應用," 2009年臺灣網際網路研討會 (TANET2009), 彰化, 2009. (Blog)

  3. 李健興, 黃獻德, 莊宗嚴, "基於模糊推論代理人之Web2.0府城美食知識管理平臺," 2007全國計算機會議(NCS2007), 台中, 2007.

  4. 黃獻德, 莊宗嚴, 李健興, "Web 2.0概念融入健康美食導覽-以臺南小吃導覽為例," 第二屆數位內容管理與應用學術研討會(DCMA2007), 台南, 2007.