Big data analytics has becoming one of the most important research areas of computer science and related fields. In Emerging Network Technology (ENT) Lab., we are exploiting new trend of big data analytics research areas through secure machine learning (ML)-as-a-Service to provide three types of analytics services, i.e., correlation, prediction, and causal impact, in the multi-tenant public cloud. Possible applications are intelligent security analytics, Bitcoin/Blockchain analytics, new policy evaluation, causal inference in economic and marketing, etc.

Public cloud platform provides multi-tenant software leased services. Therefore, various participants can use software agents to effectively conduct their own services in an automated machine learning (AutoML) pipeline. We are exploiting on how to construct numerous software-as-a-service (SaaS) services on a Platform-as-a-Service (PaaS) framework delivered by well-known cloud service providers, such as Amazon AWS and Google GCP, to achieve secure big data analytics on correlation discovery, trend predication, and causal impact inference. Moreover, we are also interested in extending secure machine learning techniques to emerging field of security and privacy of Bitcoin/Blockchain, and Bitcoin/Blockchain analytics services.

Given a secure public cloud provider, it is still considered as an honest-but-curious adversary. Similar assumption will also be applied to other participants, including data brokers, data users, machine learning model builders and service users. These participants could leverage their software agents from SaaS perspectives to provide services in an AutoML pipeline process. The greatest research challenge is how to integrate these types of SaaS, i.e. security-as-a-service (SecaaS), machine learning-as-a-service (MLaaS) and data broker-as-a-service (DBaaS), to achieve secure big data analytics without violating the secuirty and privacy prinicples in multi-tenant public cloud.

We are establishing three types of SaaS on the well-known multi-tenant public cloud computing platforms. We assume machine learning model software, including SaaS programs and software agents, and datasets are all confidential so they should be well-protected while proceeding secure machine learning model’s offline training and online testing phases of data analytics.

We consider using machine learning algorithms and integrating them with secure data and program protection algorithms, such as fully homomorphic encryption (FHE), indistinguishability obfuscation (iO), differential privacy, secure multi-party computation techniques, to enable a two-phase machine learning process. Furthermore, we are exploiting on how to effectively empower types of SaaS into AutoML pipeline to achieve automated secure machine learning without too much human intervention in the analytics service loop for correlation, prediction, and even causal impact inference in the multi-tenant public cloud.

We are currently recruiting master and Ph.D. students for big data analytics of intelligent security for data and program protection research project, research issues include automated security and privacy of secure machine learning on the public cloud, big data analytics for intelligent security, security and privacy of Bitcoin/Blockchain analytics, big data analytics for causal impact inference, etc.

For more detailed information, please refer to the head of ENT Lab., Prof. Yuh-Jong Hu(Email: jong at


  1. Yuh-Jong Hu and Shu-Wei Huang, Challenges of Automated Machine Learning on Causal Impact Analytics for Policy Evaluation, IEEE Conf. on 2017 2nd International Conference on Telecommunication and Networks (TEL-NET-2017), Amity University, Uttar Pradersh, Noida, India , Aug. 10-11, 2017 (slides)

  2. Hu, Yuh-Jong, Win-Nan Wu, Wen-Yu Liu, "Composite Big Data Modeling for Security Analytics"
    ---a book chapter in Big Data: Storage, Sharing, and Security (3S), Taylor & Francis LLC, CRC Press, May, 3, 2016

  3. Hu, Yuh-Jong, Wen-Yu Liu,Win-Nan Wu, "Structured Machine Learning for Data Analytics and Modeling: Intelligent Security as An Example", IEEE Int. Conference on Web-Intelligence-2015, Singapore, IEEE Xplore digital library

  4. Hu, Yuh-Jong, "Propagation Control Services for WebID Analytics on the Decentralized Social Web", Technical Report, Dept. of Computer Science, National Chengchi University, 17th Dec., 2014 ( pdf )

  5. Hu, Yuh-Jong, "Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web", Special sessions on Big Data Analytics, 2014 IEEE Web Intelligence Conference, 11-14 August, 2014, Warsaw, Poland ( slides )

  6. Hu, Yuh-Jong, "Balancing Data Utility and Privacy Protection in the Socially Aware Data Cloud ", International Conference on Arts, Culture, New Media, and Entertainment 2013 ( EITA-New Media 2013 ), National Taiwan University, Taipei, Taiwan, Nov. 23-24, 2013
    ( slides ) ( conference proceedings )

  7. 胡毓忠、吳啟文, 建置兼具國家安全與個人隱私保護的資通訊情蒐與分析系統, 102國土安全論壇,102年12月4日-5日, 行政院國土安全辦公室
    ( Invited )( 會議議程 ) ( paper ) ( slides )

  8. Hu, Yuh-Jong, K. P. Cheng, Y. L. Huang, "Crafting a Balance between Big Data Utility and Protection in the Semantic Data Cloud", International Conference on Web Intelligence, Mining and Semantics ( WIMS13 ), June 12-14, 2013, Madrid, Spain, ACM ( slides ) ( ACM )

  9. Hu, Yuh-Jong and S. C. Liang. , "Challenges of Access and Reuse Open Government's Statistical Public Data", Session "National and Regional Policies on Data and Information" , 23rd International CODATA Conference ( CODA2012 ), Oct. 28-31, 2012, Academia Sinica, Taipei, Taiwan ( slides )

  10. Hu, Y. J., W. N. Wu, K. P. Cheng , and Y. L. Huang, "Semantic legal policies for data exchange and protection across super-peer domains in the cloud", Special Issue: "Semantic Interoperability and Knowledge Building", Future Internet" ( ISSN 1999-5903 ), ( MPDI ), Oct. 2012

  11. Hu, Y. J., W. N. Wu, D. R. Cheng, "Towards Law-Aware Semantic Cloud Policies with Exceptions for Data Integration and Protection ", International Conference on Web Intelligence, Mining and Semantics ( WIMS12 ), June 13-15, 2012, Craiova, Romanias ( slides ) ( ACM )

  12. Hu, Y. J., W. N. Wu, J. J. Yang, "Semantics-enabled Policies for Super-Peer Data Integration and Protection", International Journal of Computer Science and Applications ( IJCSA ), Vol. 9, No. 1, pp. 23-49 ( pdf ), 2012

  13. Hu, Y. J., W. N. Wu, J. J. Yang, "Semantics-enabled Policies for Information Sharing and Protection in the Cloud", 3rd Int. Conference on Social Informatics ( SocInfo2011 ), Oct. 6-8, 2011, Singapore, LNCS 6984, Springer, pp. 198-211,( slides )

  14. Hu, Y. J. and J. J. Yang, "A Semantic Privacy-Preserving Model for Data Sharing and Integration", International Conference on Web Intelligence, Mining and Semantics ( WIMS'11 ), May 25-27, 2011, Norway ( slides ) ( ACM )

  15. 胡毓忠,雲端運算最新發展:建構數位圖書館於雲端環境中, 數位資源管理與雲端圖書館自動化研討會, Nov.-5, 2010( Invited ) ( slides )

  16. Hu, Y.J., "Unifying Semantic Privacy Protection Web Policies for Digital Rights Management (DRM) System", (Book Chapter), iConcept, Press, pp. 181-200, ( pdf ), 2010

  17. Hu, Y.J. and H. Boley, "SemPIF: A Semantic Meta-Policy Interchange Format for Multiple Web Policies", 2010 IEEE Web Intelligence (WI) Conference, Aug. 31-Sep. 3, 2010 (slides,pdf).

  18. Hu, Y. J., C. L. Yeh, and W. Laun, "Challenges for Rule Systems on the Web", The International RuleML Symposium on Rule Interchange and Applications (RuleML 2009), Las Vegas, Neveda, USA, Nov. 5-7, 2009, LNCS 5858, pp. 4-16, Springer, ( slides )

  19. Hu, Y. J., Hong-Yi Guo, and Guang-De Lin, "Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and Rules", IEEE International Workshop on Ambient Semantic Computing (ASC2008), Taichung, Taiwan, June 12, 2008 ( slides )

  20. Hu, Y. J., "Semantic-Driven Enforcement of Rights Delegation Policies via the Combination of Rules and Ontologies", Workshop on Privacy Enforcement and Accountability with Semantics at ISWC+ASWC 2007, Busan Korea, 2007 ( pdf ) ( slides ) ( panel slides ), CEUR-WS Vol-320 Proceedings

  21. Hu, Y. J. and Yu, Cheng-Yuan, "Bridging Different Generation of Web via Exploiting Semantic Social Web Blog Portal",Between Ontologies and Folksonomies ( BOF ) workshop at Communities & Technologies (C&T) 2007, Michigan State University, USA ( pdf ) (slides of bof-talk), CEUR-WS Vol-312 Proceedings

  22. 胡毓忠,如何在對等式資訊系統下合法且公平的共享及使用數位內容:科技創新和著作權保護的均衡點,資訊時代之公共領域與資訊取得研究先導計畫學術研究研討會,中研院法律研究所,2005年10月14日 p2p-legal.pdf p2p-legal-talk slides

  23. Hu, Y. J., "Pre-proposal Idea" Semantic Web Services with Constraints Policy for P2P (Grid) Systems. 2005 Euro-Taiwan IT Co-operation Event (EuroTaiwan 2005), Sem-Grid, Apr. 28-29, 2005, Taiwan

  24. Hu, Y. J., Combining Ontology and Rules as Service Constraint Policy for P2P Systems. Web Service Semantics :Towards Dynamic Business Integration Workshop at WWW2005 ( position statements ), May 10-14, 2005.

  25. 胡毓忠,電子化政府的新架構:建立以知識管理為主的政府資訊網服務入口網站 (A New Infrastructure for E-Government: Building A Knowledge Management Portal for E-Government Services), 電子化政府趨勢下的公務人員職能, 台北大學公共行政暨管理研究所, ( e-gov.pdf )e-gov-talk slides( workshop website ), 2004年12月11日。

  26. Hu, Y. J. and C. W. Tang, Agent-Oriented Public Key Infrastructure for Multi-Agent E-Service. Seventh International Conference on Knowledge-Based Intelligent Information & Engineering Systems ( KES'2003 ) , University of Oxford, UK ( pdf ), Sep., 2003, Springer-Verlag

  27. Hu, Y.J., Trusted Agent-Mediated E-Commerce Transaction Services via Digitial Certificates Management. Electronic Commerce Research Journal ( ECR Journal ) Vol. 3, Issues 3-4, July-October, 2003, pp. 221-243 ( pdf ), Springer Verlag

  28. Huang, Ting-Chien and Yuh-Jong Hu, ``Incentives of Agent-Based Distributed Intrusion Detection Systems on the Open Internet." ,The 2002 International Conference on Security and Management ( SAM'02 pdf )

  29. Hu, Y. J., A Secure Software Agent Framework for Robust Agent Management Services, Engineering Science & Technology Bulletin,NSC, July, 2002, pp. 97-101 ( pdf )

  30. Lee, I. C. and Y. J. Hu, An Agent-Based Secure E-Commerce Environment with Distributed Authentication and Authorization Services. The 2001 International Conference on Internet Computing ( IC-2001 ) Session on ``Agents for E-Business on the Internet", Monte Carlo Resort, Las-Vegas, USA, June 25-28, 2001

  31. Hu, Y. J., Some Thoughts on Agent Trust and Delegation. The Fifth International Conference on Autonomous Agents ( AA'01 ), May 28-June 1, 2001, Montreal, Canada ( pdf ), ACM

  32. Hu, Y. J., Agent-Based Attack and Defense for an Intranet Environment. RSA Conference 2000, 16-20 January San Jose, CA.

  33. Hu, Y. J., Autonomous Security Agents: Negotiating Compatible Crypto Protocols on Behalf of the End-User. 1998 RSA Data Security Conference , January 13-16, 1998 in San Francisco, CA

  34. Hu, Y. J., My Secure Java Agents Use Secure Agent Communication Protocols to Autonomously Proceed Secure Conversation. The First Agent Technology Workshop in Taiwan December-4-1997

  35. Hu, Y. J., Cooperation, Negotiation, and Conflict Resolution Protocols for Automatic Services and Resources Allocation. Seventh European Workshop on Modelling Autonomous Agents in a Multi-Agent World, MAAMAW'96 , Eidhoven, The Netherlands, Jan. 1996

  36. Hu, Y. J., Interaction Protocols for Intelligent Agents in Distributed Services Environment. International Conference on Distributed Platforms, ICDP'96 , Dresden, Germany Feb. 1996

  37. Hu, Y.J., Intelligent Autonomous Resources Allocation in Distributed Open Multiagent System. Decentralized Intelligent and Multi-Agent Systems, DIMAS'95 , Cracow, Poland, Nov.,1995, pp. 435-442

  38. Hu, Y.J., et al. How to Use a Client-Server Framework to Build Application Systems in the Heterogeneous Environment. 5th International Conference on Information Management , Taipei, May 1994, pp. 229-237 (In Chinese)

  39. Hu, Y. J., The Strategic Planning for Open Systems Environments. 1993 Pan Pacific Conference on Information Systems , May 1993, Kaohsiung, Taiwan, R.O.C., pp. 127-132

  40. Hu, Y. J. and Billy E. Gillett, In Search of the Optimal Adaptive Load Sharing Policy for Distributed Systems. The Second International Computer Science Conference, Data and Knowledge Engineering: Theory and Applications , Hong-Kong, Dec. 1992, pp. 523-529

  41. Ming-Ch'uan Wu, Hu, Y.J., Implementing a Workload Notifier System for Adaptive Load Balancing by Remote Procedure Calls. Proceeding of the Third National Conference on Information Management , Taipei, May 1992, pp. 119-127

  42. Hu, Y. J. and Billy E. Gillett, Simulating Adaptive Load Sharing Policies on an iPSC/2 Multicomputer, MIS Review, Naional Chengchi University, Dec. 1991, pp. 73-80

  43. Hu, Y. J. and Billy E. Gillett, Simulating Adaptive Load Sharing Policies on an iPSC/2 Multicomputer. The Sixth Distributed Memory Computing Conference , Portland, OR, Apr. 1991, pp. 238-241

 Email: jong at