Soliaudit: Smart contract vulnerability assessment based on machine learning and fuzz testing JW Liao, TT Tsai, CK He, CW Tien 2019 Sixth International Conference on Internet of Things: Systems …, 2019 | 166 | 2019 |
KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches CW Tien, TY Huang, CW Tien, TC Huang, SY Kuo Engineering reports 1 (5), e12080, 2019 | 63 | 2019 |
Machine learning framework to analyze iot malware using elf and opcode features CW Tien, SW Chen, T Ban, SY Kuo Digital Threats: Research and Practice 1 (1), 1-19, 2020 | 52 | 2020 |
Using autoencoders for anomaly detection and transfer learning in IoT CW Tien, TY Huang, PC Chen, JH Wang Computers 10 (7), 88, 2021 | 42 | 2021 |
Memory forensics using virtual machine introspection for Malware analysis CW Tien, JW Liao, SC Chang, SY Kuo 2017 IEEE Conference on Dependable and Secure Computing, 518-519, 2017 | 40 | 2017 |
Android privacy TE Wei, AB Jeng, HM Lee, CH Chen, CW Tien 2012 international conference on machine learning and cybernetics 5, 1830-1837, 2012 | 37 | 2012 |
Efficient and effective NIDS for cloud virtualization environment CH Lin, CW Tien, HK Pao 4th IEEE International Conference on Cloud Computing Technology and Science …, 2012 | 29 | 2012 |
Evaluating robustness of ai models against adversarial attacks CL Chang, JL Hung, CW Tien, CW Tien, SY Kuo Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial …, 2020 | 27 | 2020 |
Ufo-hidden backdoor discovery and security verification in iot device firmware CW Tien, TT Tsai, Y Chen, SY Kuo 2018 IEEE International Symposium on Software Reliability Engineering …, 2018 | 27 | 2018 |
Virtual time control apparatus, method, and non-transitory computer readable storage medium thereof W Sheng-Hao, JD Jiang, T Chin-Wei, CH Lin US Patent 10,846,114, 2020 | 23 | 2020 |
Efficient spear-phishing threat detection using hypervisor monitor CH Lin, CW Tien, CW Chen, CW Tien, HK Pao 2015 International Carnahan Conference on Security Technology (ICCST), 299-303, 2015 | 18 | 2015 |
AOS: An optimized sandbox method used in behavior-based malware detection HJ Li, CW Tien, CW Tien, CH Lin, HM Lee, AB Jeng 2011 International conference on machine learning and cybernetics 1, 404-409, 2011 | 18 | 2011 |
Virtual machine monitoring method, system and computer readable storage medium ZW Chen, CW Tien, T Chin-Wei, CH Lin US Patent 8,650,567, 2014 | 15 | 2014 |
ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies PY Lin, CW Tien, TC Huang, CW Tien Cybersecurity 4, 1-15, 2021 | 12 | 2021 |
Detection system and method thereof CH Lin, CW Tien, T Huang, T Chin-Wei US Patent 10,489,591, 2019 | 9 | 2019 |
Monitor apparatus, method, and non-transitory computer readable storage medium thereof L Jian-Wei, T Chin-Wei, HO Chia-Kang US Patent 10,621,339, 2020 | 8 | 2020 |
MAS: mobile-apps assessment and analysis system CW Tien, TY Huang, TC Huang, WH Chung, SY Kuo 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 7 | 2017 |
Device and method for producing test data CW Tien, PY Lin, T Chin-Wei US Patent 10,846,188, 2020 | 6 | 2020 |
RePEF—A system for restoring packed executable file for malware analysis TE Wei, ZW Chen, CW Tien, JS Wu, HM Lee, AB Jeng 2011 International Conference on Machine Learning and Cybernetics 2, 519-527, 2011 | 6 | 2011 |
Design and implement binary fuzzing based on libfuzzer WC Chao, SC Lin, YH Chen, CW Tien, CY Huang 2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-2, 2018 | 5 | 2018 |