Projects, Publications, Academic Services, Talks, and Graduate Students Adversing


Projects


  1. Outsourcing Secured Machine Learning (ML)-as-a-Service for Data Analytics in Multi-Tenant Public Cloud (MOST-2017 106-2221-E-004-013-)(2017/08/01-2018/07/31).
  2. Crafting the Balance between Big Data Analysis Utility and Protection in the Semantic Data Cloud (NSC 102-2221-E-004-014)(2013/08/01-2014/07/31).
  3. Data Integration and Protection for the Inter-Domain Data Cloud (NSC 100-2221-E-004-011-MY2)(2011/08/01-2013/07/31).
  4. Semantics-enabled Policies for Data Sharing and Protection in the Cloud ( NSC 99-2221-E-004-010)(2010/08/01-2011/07/31).
  5. Semantics-enabled Web Policy Interchange Format (SewPIF) for Privacy Protection and Digital Rights Management (NSC 98-2221-E-004-009)(2009/08/01 - 2010/10/31).
  6. Semantics-enabled Web Policies for Privacy Protection and Digital Rights Management (NSC 98-2918-I-004-003)(2009/02/01-2009/06/01),  National Research Council (NRC), Fredericton, Canada.
  7. Trusted Semantic Web Services Infrastructure: Certification Theory vs. Social Network (NSC 95-2221-E-004-001-MY3)(2006/08/01 - 2009/07/31).
  8. 教育部五年五百億(5Y50B)頂尖計畫資訊與社會:資訊與社會 (2006-2011)(資訊與法律)
  9. Combining Ontology and Rules as Policy to Constrain Services in the Peer-to-Peer (P2P) Information Sharing Systems (NSC 94-2213-E-004-009).
  10. Some Issues and Challenges for Policy Representation and Enforcement on the Semantic Web (NSC 93-2213-E-004-005).
  11. Resolving Some Trusted Agent Issues on the Semantic Web (NSC 92-2213-E-004-005).
  12. Trust Verification Through Digital Certificates for Open Agent E-Services Environment (NSC 91-2213-E-004-014).
  13. Agent-Oriented Public Key Infrastructure (PKI) for Distributed Trust Management (NSC 90-2213-E-004-008).
  14. The Evaluation and Development of Embedded Online Intrusion Detection Prototype Systems (EOIDS) (XU90H72P).
  15. The Study of Monitoring Mechanisms and Systems for Encryption Messages on the Information Network (NSC 90-CS-7-004-001).
  16. The Study of Cyberspace Users to Participate Government Affairs (RDEC-MIS-089-027).
  17. A Secure Software Agent Framework for Robust Agent Management Services (NSC 89-2213-E-004-002).
  18. Internet Security Technology and its Applications MOE (Ministry of Education) for the improvement of network and communication course.
  19. Cooperative Agent Group for a Highly Efficient Web Service Environment (NSC 88-2213-E-004-005).
  20. Automated Negotiation Protocols: Embedded the Negotiation Policies into the Agent Conversation Protocols (NSC 87-2213-E-004-005).
  21. Secure Agent Communication Protocols for Distributed Open Multi-Agent Systems (NSC 86-2213-E-004-007).
  22. Agent Communication Protocols for Automatic Services and Resources Allocation (NSC 83-0408-E-004-001, NSC 84-2213-E-004-002).
  23. Design Open On-Line Transaction Processing Application Systems (NSC 82-0415-E-004-004).
  24. The Framework of Taiwan EDGAR System for Information Dissemination, SEC, Department of Finance, Taiwan, Dec/1992.
  25. The Multimedia Tourism Information Systems, The Bureau of Tourism, Taiwan, Aug/1992.

Publications

  1. Yuh-Jong Hu and Shu-Wei Huang, Challenges of Automated Machine Learning on Causal Impact Analytics  for  Policy Evaluation, IEEE Conf. on 2017 2nd International Conference on Telecommunication and Networks (TEL-NET-2017), Amity University, Uttar Pradersh, Noida, India , Aug. 10-11, 2017 (slides).
  2. Hu, Yuh-Jong, Win-Nan Wu, Wen-Yu Liu, "Composite Big Data Modeling for Security Analytics", a book chapter in Big Data: Storage, Sharing, and Security (3S), Taylor & Francis LLC, CRC Press, May, 3, 2016 (a book chapter).
  3. Hu, Yuh-Jong, Wen-Yu Liu,Win-Nan Wu,  "Structured Machine Learning for Data Analytics and Modeling: Intelligent Security as An Example", IEEE Int. Conference on Web-Intelligence-2015, Singapore, IEEE Xplore digital library.
  4. Hu, Yuh-Jong, "Propagation Control Services for WebID Analytics on the Decentralized Social Web", Technical Report, Dept. of Computer Science, National Chengchi University, 17th Dec., 2014 (pdf).
  5. Hu, Yuh-Jong, "Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web", Special sessions on Big Data Analytics, 2014 IEEE Web Intelligence Conference, 11-14 August, 2014, Warsaw, Poland (slides).
  6. Hu, Yuh-Jong, "Balancing Data Utility and Privacy Protection in the Socially Aware Data Cloud ", International Conference on Arts, Culture, New Media, and Entertainment 2013 (EITA-New Media 2013), National Taiwan University, Taipei, Taiwan, Nov. 23-24, 2013 (slides) (conference proceedings).
  7. 胡毓忠、吳啟文, 建置兼具國家安全與個人隱私保護的資通訊情蒐與分析系統, 102國土安全論壇,102年12月4日-5日, 行政院國土安全辦公室 (會議議程)(Invited) ( paper  and slides)。
  8. Hu, Y. J., K. P. Cheng, Y. L. Huang, "Crafting a Balance between Big Data Utility and Protection in the Semantic Data Cloud",  International Conference on Web Intelligence, Mining and Semantics  (WIMS13), June 12-14, 2013, Madrid, Spain, ACM  (slides), ACM.
  9. Hu, Y. J. and S. C. Liang. , "Challenges of Access and Reuse Open Government's Statistical Public Data",  Session "National and Regional Policies on Data and Information" , 23rd International CODATA Conference  (CODA2012), Oct. 28-31, 2012, Academia Sinica, Taipei, Taiwan (slides).
  10. Hu, Y. J., W. N. Wu,  K. P. Cheng , and Y. L.  Huang,  "Semantic legal policies for data exchange and protection across super-peer domains in the cloud", Special Issue: "Semantic Interoperability and Knowledge Building", Future Internet   (ISSN 1999-5903), MDPI, Oct. 2012.
  11. Hu, Y. J., W. N. Wu, D. R. Cheng, "Towards Law-Aware Semantic Cloud Policies with Exceptions for Data Integration and Protection ", International Conference on Web Intelligence, Mining and Semantics (WIMS12), June 13-15, 2012, Craiova, Romania, (slides),  ACM.
  12.  Hu, Y. J., W. N. Wu, J. J. Yang, "Semantics-enabled Policies for Super-Peer Data Integration and Protection", International Journal of Computer Science and Applications (IJCSA),  Vol. 9, No. 1, pp. 23-49 (pdf), 2012.
  13. Hu, Y. J., W. N. Wu, J. J. Yang, "Semantics-enabled Policies for Information Sharing and Protection in the Cloud", 3rd Int. Conference on Social Informatics (SocInfo2011),  Oct. 6-8, 2011, Singapore, LNCS 6984, Springer, pp. 198-211,(slides,pdf).
  14. Hu, Y. J. and J. J. Yang, "A Semantic Privacy-Preserving Model for Data Sharing and Integration", International Conference on Web Intelligence, Mining and Semantics (WIMS'11), May 25-27, 2011, Norway  (slides,pdf), ACM.
  15.   胡毓忠,雲端運算最新發展:建構數位圖書館於雲端環境中, 數位資源管理與雲端圖書館自動化研討會, Nov.-5, 2010(pdf)(slides)(invited)。
  16. Hu, Y.J., "Unifying Semantic Privacy Protection Web Policies for Digital Rights Management (DRM) System", (Book Chapter),  iConcept, Press, pp. 181-200, (pdf), 2010.
  17. Hu, Y.J. and H. Boley, "SemPIF: A Semantic Meta-Policy Interchange Format for Multiple Web Policies", 2010 IEEE Web Intelligence (WI) Conference  , Aug. 31-Sep. 3, 2010 (slides,pdf).
  18. Hu, Y. J., C. L. Yeh, and W. Laun, "Challenges for Rule Systems on the Web", The International RuleML Symposium on Rule Interchange and Applications (RuleML 2009), Las Vegas, Neveda, USA, Nov. 5-7, 2009, LNCS 5858 , pp. 4-16, Springer, (slides,pdf).
  19. Hu, Y. J., Hong-Yi Guo, and Guang-De Lin, "Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and Rules", IEEE International Workshop on Ambient Semantic Computing (ASC2008), Taichung, Taiwan, June 12, 2008 (slides,pdf).
  20. Hu, Y. J., "Semantic-Driven Enforcement of Rights Delegation Policies via the Combination of Rules and Ontologies", Workshop on Privacy Enforcement and Accountability with Semantics at ISWC+ASWC 2007, Busan Korea, 2007 ( pdf) (slides, pdf) (panel slides, pdf), CEUR-WS Vol-320 Proceedings.
  21. Hu, Y. J. and Yu, Cheng-Yuan, "Bridging Different Generation of Web via Exploiting Semantic Social Web Blog Portal",Between Ontologies and Folksonomies (BOF) workshop at Communities & Technologies (C&T) 2007, Michigan State University, USA (pdf)(slides,bof-talk.pdf), CEUR-WS Vol-312 Proceedings.
  22. 胡毓忠,如何在對等式資訊系統下合法且公平的共享及使用數位內容:科技創新和著作權保護的均衡點,資訊時代之公共領域與資訊取得研究先導計畫學術研究研討會,中研院法律研究所,2005年10月14日(p2p-legal.pdf  p2p-legal-talk.pdf ).
  23. Hu, Y. J., "Pre-proposal Idea" Semantic Web Services with Constraints Policy for P2P (Grid) Systems. 2005 Euro-Taiwan IT Co-operation Event (EuroTaiwan 2005), Sem-Grid, Apr. 28-29, 2005, Taiwan.
  24. Hu, Y. J., Combining Ontology and Rules as Service Constraint Policy for P2P Systems. Web Service Semantics :Towards Dynamic Business Integration Workshop at WWW2005 (position statements), May 10-14, 2005. 
  25. 胡毓忠,電子化政府的新架構:建立以知識管理為主的政府資訊網服務入口網站 (A New Infrastructure for E-Government: Building A Knowledge Management Portal for E-Government Services), 電子化政府趨勢下的公務人員職能, 台北大學公共行政暨管理研究所,(e-gov.pdf),(slides, e-gov-talk.pdf)workshop web site 2004年12月11日。
  26. Hu, Y. J. and C. W. Tang, Agent-Oriented Public Key Infrastructure for Multi-Agent E-Service. Seventh International Conference on Knowledge-Based Intelligent Information & Engineering Systems (KES'2003) , University of Oxford, UK (pdf), Sep., 2003, Springer-Verlag.
  27. Hu, Y.J., Trusted Agent-Mediated E-Commerce Transaction Services via Digitial Certificates Management. Electronic Commerce Research Journal (ECR Journal) Vol. 3, Issues 3-4, July-October, 2003, pp. 221-243 (pdf), Springer Verlag. 
  28. Huang, Ting-Chien and Yuh-Jong Hu, ``Incentives of Agent-Based Distributed Intrusion Detection Systems on the Open Internet." ,The 2002 International Conference on Security and Management SAM'02 (pdf)).
  29. Hu, Y. J., A Secure Software Agent Framework for Robust Agent Management Services, Engineering Science & Technology Bulletin,NSC, July, 2002, pp. 97-101 (pdf ).
  30. Lee, I. C. and Y. J. Hu, An Agent-Based Secure E-Commerce Environment with Distributed Authentication and Authorization Services. The 2001 International Conference on Internet Computing (IC-2001) Session on ``Agents for E-Business on the Internet", Monte Carlo Resort, Las-Vegas, USA, June 25-28, 2001.
  31. Hu, Y. J., Some Thoughts on Agent Trust and Delegation. The Fifth International Conference on Autonomous Agents (AA'01), May 28-June 1, 2001, Montreal, Canada (pd), ACM.
  32. Hu, Y. J., Agent-Based Attack and Defense for an Intranet Environment. RSA Conference 2000, 16-20 January San Jose, CA.
  33. Hu, Y. J., Autonomous Security Agents: Negotiating Compatible Crypto Protocols on Behalf of the End-User. 1998 RSA Data Security Conference , January 13-16, 1998 in San Francisco, CA.
  34. Hu, Y. J., My Secure Java Agents Use Secure Agent Communication Protocols to Autonomously Proceed Secure Conversation. The First Agent Technology Workshop in Taiwan December-4-1997.
  35. Hu, Y. J., Cooperation, Negotiation, and Conflict Resolution Protocols for Automatic Services and Resources Allocation. Seventh European Workshop on Modelling Autonomous Agents in a Multi-Agent World, MAAMAW'96 , Eidhoven, The Netherlands, Jan. 1996.
  36. Hu, Y. J., Interaction Protocols for Intelligent Agents in Distributed Services Environment. International Conference on Distributed Platforms, ICDP'96 , Dresden, Germany Feb. 1996.
  37. Hu, Y.J., Intelligent Autonomous Resources Allocation in Distributed Open Multiagent System. Decentralized Intelligent and Multi-Agent Systems, DIMAS'95 , Cracow, Poland, Nov.,1995, pp. 435-442.
  38. Hu, Y.J., et al. How to Use a Client-Server Framework to Build Application Systems in the Heterogeneous Environment. 5th International Conference on Information Management , Taipei, May 1994, pp. 229-237 (In Chinese).
  39. Hu, Y. J., The Strategic Planning for Open Systems Environments. 1993 Pan Pacific Conference on Information Systems , May 1993, Kaohsiung, Taiwan, R.O.C., pp. 127-132.
  40. Hu, Y. J. and Billy E. Gillett, In Search of the Optimal Adaptive Load Sharing Policy for Distributed Systems. The Second International Computer Science Conference, Data and Knowledge Engineering: Theory and Applications , Hong-Kong, Dec. 1992, pp. 523-529.
  41. Ming-Ch'uan Wu, Hu, Y.J., Implementing a Workload Notifier System for Adaptive Load Balancing by Remote Procedure Calls. Proceeding of the Third National Conference on Information Management , Taipei, May 1992, pp. 119-127.
  42. Hu, Y. J. and Billy E. Gillett, Simulating Adaptive Load Sharing Policies on an iPSC/2 Multicomputer, MIS Review, Naional Chengchi University, Dec. 1991, pp. 73-80.
  43. Hu, Y. J. and Billy E. Gillett, Simulating Adaptive Load Sharing Policies on an iPSC/2 Multicomputer. The Sixth Distributed Memory Computing Conference , Portland, OR, Apr. 1991, pp. 238-241.

Academic Services


Year 2017

    1. The International Conference on Web Intelligence, Mining and Semantics 2016 (WIMS'17)(PC).
    2. 18th International Conference on Web Information Systems Engineering (WISE 2017), Moscow Region, Russia, Oct. 7-11, 2017 (PC).
    3. The Seven International Conference on Ambient Computing, Applications, Services and Technologies, (AMBIENT, 2017), Nov. 12-16, 2017 - Barcelona, Spain (Steering Committee).
    4. Web Intelligence and Agent Systems: An International Journal, (WIAS)  (2017 Reviewer).
    5. 13th Int. Conf. on Web Information Systems and Technologies (WEBIST) 2017, Porto, Portugal, 25-27, Apr., 2017 (PC).

    Year 2016

    1. Rule Markup Language-2016(RuleML-2016)(Publicity Chairs, PC).
    2. 17th International Conference on Web Information System Engineering (WISE 2016), Shanghai, China, 7-10, Nov. 2016(PC).
    3. The International Conference on Web Intelligence, Mining and Semantics 2016 (WIMS'16)(PC).
    4. Journal of Information Science and Engineering (JISE) (Reviewer).

    Year 2015 

    1. The International Conference on Web Intelligence, Mining and Semantics 2015 (WIMS'15)(PC).
    2. 17th International Conference on Web Information System Engineering (WISE 2015),, Miami, Florida, USA,  18-20, October 18-20, 2015 (PC).
    3. 7th Workshop on Web Intelligence & Communities (WI&C'15), Collocated with theWWW2015, May 18-19, 2015, Florence, Italy (PC).
    4. 7th International KES Conference on Intelligent Decision Technologies (KES-IDT-15), Smart Digital Futures, 2015, Bay of Naples, Italy, 10-12, June, 2015 (PC).
    5. The First International Conference on Human and Social Analytics (HUSO 2015 ), IARIA, Oct 11-16, 2015, St. Julians, Malta (PC). 
    6. Web Intelligence and Agent Systems (WIAS): An International Journal (Reviewer).
    7. Rule Markup Language-2015 (RuleML-2015)(PC)./
    8. The 2015 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology"(WI-15)(PC).

    Year 2014

    1. The International Conference on Web Intelligence, Mining and Semantics  2014 (WIMS'14)(PC).
    2. Journal of Information Science and Engineering, Academia, Sinica, Taiwan, 2014 (Reviewer).
    3. The Fourth International Conference on Social Eco-Informatics (SOTICS 2014) , Oct. 12-16, Nice, France (PC).
    4. 15th International Conference on Web Information System Engineering (WISE 2014), Thessaloniki, Greece,  12-14 Oct., 2014 (PC).
    5. International Journal of Computer Science & Applications, A member of Editorial Board, since 2014. 
    6. The 6th Workshop on Web Intelligence & Communities collocates with the WWW'14 Conference, 8th April 2014 at Seoul, Korea (PC).
    7. Encyclopedia of Information Science & Technology, 3rd Edition, IGI, 2014 (Reviewer).
    8. Rule Markup Language-2014 (RuleML-2014)(PC).
    9. The 2014 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology"(WI-14)(PC).

    Year 2013

    1. Rule Markup Language-2013 (RuleML-2013)(PC).
    2. The International Conference on Web Intelligence, Mining and Semantics  2013 (WIMS'13)(PC).
    3. 2013 11th IFIP Workshop on Virtual Goods co-located with with the (very big) annual conference of the German Society of Informatics  (PC).
    4. The Fifth International Conference on Social Informatics (SocInfo2013)  (PC).
    5. The 2013 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology"(WI-13)(PC).

    Year 2012

    1. Rule Markup Language (RuleML@ECAI)-2012 (RuleML-2012@ECAI)(Challenge Co-Chairs).
    2. Rule Markup Language (RuleML@ECAI)-2012 (RuleML-2012@ECAI)(PC).
    3. The International Conference on Web Intelligence, Mining and Semantics  2012 (WIMS'12) (PC).
    4. 2012 Cloud Computing Workshop (ccw2012) (PC).
    5. The Fourth International Conference on Social Informatics (SocInfo2012)  (PC).
    6. The 2012 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology"(WI-12)(PC).

    Year 2011 

    1. Security and Communication Networks, Wiley, 2011 (reviewer).
    2. The Third International Conference on Social Informatics (SocInfo2011) (PC).
    3. First International Conference on Ambient Computing, Applications, Services and Technologies (AMBIENT 2011)(PC).
    4. Rule Markup Language (RuleML@BRF)-2011 (RuleML-2011@BRF)(PC).
    5. Rule Markup Language (RuleML@IJCAI)-2011 (RuleML-2011@IJCAI)(PC).
    6. The 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology" (WI-11)(PC).

    Year 2010

    1. Rule Markup Language (RuleML) - 2010 (RuleML-2010)(PC).
    2. The 2010 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology" (WI-10) (PC).

    Year 2009

    1. The 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology" (WI-09) (PC).
    2. Rule Markup Language (RuleML) - 2009 (PC) and Challenge Co-Chairs (RuleML-2009).
    3. Co-Chair and Editor of Proceedings of the RuleML 2009 Challenge 3rd International RuleML-2009 Challenge, collocated with
      the 3rd International Symposium on Rules, Applications and Interoperability (RuleML-2009), Las Vegas, Nevada, USA, November 5-7, 2009, CEUR Vol-549,
       http://sunsite.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-549/.

    Year 2008

    1. The 2008 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology" (WI-08) (PC).
    2. Rule Markup Language (RuleML) Consortium Steering Committee, starting from 2008/10-.
    3. Rule Markup Language (RuleML) -2008 (PC) and Challenge Co-Chairs (RuleML-2008).
    4. Handbook of Research on Emerging Rule-Based (HRER2008) Languages and Technologies: Open Solutions and Approaches ( 2008), IGI Global (Reviewer).
    5. Data & Knowledge Engineering Journal (DKE) (2008), Elsevier (Reviewer).
    6. IEEE International Workshop on Ambient Semantic Computing (ASC2008) In conjunction with IEEE International Conference on Sensor Networks, Ubiquitous,
      and Trustworthy Computing (SUTC2008), Taichung, Taiwan (PC).

    Year 2007

    1. The 2007 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology" (WI-07) (PC).
    2. Journal of Autonomous Agents and Multi-Agent Systems (JAAMAS) (Reviewer) .
    3. Web Intelligence and Agent Systems: An International Journal, (WIAS)  (Reviewer).
    4. Journal of Information Technology and Politics (2007-)(JITP)(Reviewer).

    Year 2006

    1. Taiwan National Science Council Information Project Review Board Committee (國科會資訊學門二諮議委員)(2003-2006)(Review Board Committee)
    2.  The Handbook of Computer Networks (John Wiley & Sons) (Handbook of Computer Networks) (2006) (Reviewer).

    Year 2005

    1.  AAMAS (Autonomous Agents & Multi-Agent System) 2005 (AAMAS2005) (PC).
    2. The 2005 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology" (WI-05) (PC).

    Year 2004

    1. AAMAS (Autonomous Agents & Multi-Agent System) 2004 (AAMAS2004) (PC).
    2. The 2004 International Conference on "Agent Technology for Autonomous Business Processing" (ABA) (PC).

    Year 2003

    1. AAMAS (Autonomous Agents & Multi-Agent System) 2003 (AAMAS2003) (PC).
    2. The 2003 International Conference on "Agent Technology for Autonomous Business Processing" (ABA) (PC).

    Year 2002

    1. AAMAS (Autonomous Agents & Multi-Agent System) 2002 (AAMAS2002) (PC).
    2. Electronic Commerce Research Journal (ECR) (Reviewer).
    3. IEEE Transactions on Systems, Man, and Cybernetics (Reviewer).
    4. Journal of E-Business (JEB) (Reviewer).

    Talks


    1. Outsourcing Secured Machine Learning (ML)-as-a-Services for Causal Impact Analytics in Multi-Tenant Public Cloud, TEL-NET-2017, Amity University, Uttar Pradesh, Nolda, India, Aug., 2017 (Invited Keynote Speaker)(slides).
    2. Some Research Challenges for Big Data Analytics of Intelligent Security, April-10-2015, Seminar at CS&E, Yuan Ze University (元智大學研討會)(slides).
    3. Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web, Seminar at TIGP-SNHCC, Academia Sinica, Taipei, Taiwan, Oct-28-2014 (slides).
    4. 資訊安全與法規, 電子治理菁英訓練課程, 電子治理研究中心(Taiwan E-Governance Research Center), 國立政治大學, 2013年11月14日至15日。
    5. Towards Law-Aware Semantic Cloud Policies with Exceptions for Data Integration and Protection, Legal Informatics, School of Law, University of Bologna, June-19, 2012 (slides).
    6. 從雲端運算發展談跨國服務與法制環境之協調座談會,資策會科技與法律研究中心,20111020日。
    7. Semantics-Enable Web Policies for Privacy Protection: Current Status and Future Trend,苗栗聯合大學、2010年12月15日 (slides).
    8. 雲端運算服務興起後法制環境因應與變革座談會,資策會科技與法律研究中心,20101124日。
    9. Privacy Preserving Data Sharing Policy for National Security Enforcement, FP7 RISE Project Taiwan Conference \, Invited Talk, Oct. 21-22, 2010 (slides).
    10. Semantics-Enable Web Policies for Privacy Protection and Digital Rights Management: Current Status and Future Trend, Computer Science Dept., University of Toronto, May-13, 2009.
    11. Semantics-Enable Web Policies for Privacy Protection and Digital Rights Management: Current Status and Future Trend, IIT, NRC at Ottawa, May-11, 2009.
    12. Semantics-Enable Web Policies for Privacy Protection and Digital Rights Management: Current Status and Future Trend, Concordia University, Montreal, Canada, May-7, 2009.
    13. Semantics-Enable Web Policies for Privacy Protection and Digital Rights Management: Current Status and Future Trend, IIT-Colloquium, NRC-CNRC, Canada, March-11, 2009 (slides).
    14. Some Issues for Semantic-Enabled Privacy Protection Policies in the Ambient Networks, Panel viewpoints for IEEE International Workshop on Ambient Semantic Computing (ASC2008) In conjunction with IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2008), Taichung, Taiwan, June 12 (panel slides, pdf), 2008.
    15. Some Research Issues on the Semantic Web Services for Public Domain and Private Domain.  The Future Trend and Emerging Issues of Taiwan Information Society Forum (台灣社會資訊化發展熱門趨勢與前瞻議題論壇. Science & Technology Policy Research and Information Center (STPI), National Applied Research Laboratories (科技政策研究與資訊中心 國家實驗研究院)Talk Slides and Printouts (pdf in English 2.4MB)), May-27-2008.
    16. Semantic Enforcement of Rights Delegation Policies via Ontologies+Rules. Semantic Computing Session, 2008 AI Forum (2008 人工智慧論壇).  National Taipei University, May 17, 2008 (Talk Slides and Printouts (pdf in English 1.1MB)).
    17. DRM vs. CC: Knowledge Creation and Diffusion on the Internet Panel Discussion for Information and Law, Law School, National Chengchi University, Taipei, Taiwan, Oct. 13, 2006 (Talk Slides (pdf in English 1.5MB)).
    18. The Semantic Web: From Teaching To Research, 雲林科技大學資訊管理學系,2005年11月21日( Talk Slides (pdf in English, 1.6MB)).
    19. The New Trend of Electronic Democracy: The Trust and Security Issues of E-Voting, Panel Discussion for 2004 e-Democracy, Kaoshioung, Taiwan, Sep. 2, 2004 (Talk Slides (powerpoint in Chinese, 353KB)).
    20. The Semantic Web: Current Status and Future Directions, MIS Dept., National Chengchi University, June 1, 2004 (Talk Slides (pdf, 1.64MB)).
    21. Information Security, iThome, Apr.-22 and Apr.-30, 2003 (4-22 talk (ppt, 1.51MB)) (4-30 talk (ppt, 8.80MB)).
    22. A Pyramid Framework for the Semantic Web: Some Issues and Challenges, Agent, Mobile Commerce, and Security Seminar, III. (talk (pdf, 490KB)).
    23. Trusted Agent-Mediated E-Services via Semantic Web Rules Inference (2002 AI_Forum), May 25-26, 2002 (talk (pdf, 659KB)).
    24. Trusted Agent-Mediated E-Services via Semantic Web Rules Inference, Dept. of CSIE, National Chiao-Tung University, Taiwan, (talk (pdf 1.28MB)).
    25. Exploring the Authenticity, Privacy, and Security Issues from the Existing Cyberspace, Dept. of Computer Engineering, National Tsing Hua University, Taiwan,  on Nov-8, 2001 (talk (ppt 894KB)).
    26. FIPA 23rd Meeting for Agent Security Working Group , FIPA, California, USA.
    27. Some Thoughts on Agent Trust and Delegation, Information Management Department at Sun Yat-Sen University, April-19-2001 (talk (pdf, 247KB)) .
    28. Secure Electronic Commerce , World Consulting Corp., Taiwan, July 19-20, 2000.
    29. Agent Trust and Delegation , Panel Discussion for ATWORK2000, May 30, 2000 at Academic Sinica.
    30. Internet Security Technology and its Applications , World Consulting Corp., Taiwan, April 24-25, 2000.
    31. Agent-Based Information Warfare for an Intranet Environment , National Tsing Hua University, Taiwan, Mar-22, 2000.
    32. Some Design Issues on Generic Software Agent Systems Framework , Tatung Institute Technology University, Jan-11, 1999.
    33. A Generic Framework for Agent-Based Software Systems , National Dong Hwa Univ. CSIE Dept, Oct-30, 1998.
    34. Security and Billing , Panel Discussion for Rams'98, Sep-12, 1998 at Academic Sinica.
    35. Network Security and Cryptography Applications Seminar , National Security Bureau (國安局), July-30, 1998.
    36. Internet Security Technology and its Applications , World Consulting Corp., Taiwan, May-28, 1998.

     Graduate Students Advising


    現有博(碩)士生(年份)         (論文題目)


    1. 江芳俊(博)
    2. 吳穩男(博)
    3. 吳明倫(碩)
    4. 林佑駿(碩)
    5. 吳宇翔(碩)
    6. 林上人(碩)
    7. 林靖耀(碩)
    8. 呂柏漢(碩)
    9. 劉永鈞(碩)
    10. 黃為德(碩)
    11. 邱怡翔(碩)
    12. 鄒昊霖(碩)
    13. 陳維睿(碩)
    14. 林信甫(碩)
    15. 王衍晰(碩)
    16. 鄭葵翰(碩)
    17. 游憶文(碩)
    18. 周敬軒(碩)
    19. 陳柏廷(碩)


    歷年博(碩)士生(畢業年份)     (論文題目)


    1. 黃書瑋(碩)(105)                  建構GDELT數位新聞分析流程於Spark大數據平台?以新聞事件影響力探究美國S&P股市指數變化為例
    2. 張翔   (碩)(105)                  結合線性上信賴邊界與K-平均算法來分析個人化點擊率:以雅虎新聞推薦為例
    3. 林博仁(碩)(105)                  貸款違約預測:使用Spark平台分析P2P借貸資料   
    4. 潘宗哲(碩)(104)                  透過Spark平台實現大數據分析與建模的比較:以微博為例
    5. 劉文友(碩)(104)                  在Spark大數據平台上分析DBPedia開放式資料:以電影票房預測為例
    6. 陳郁婷(碩)(104)                  透過時間序列的波動特徵分群協助資料分類:以公司危機事件為例
    7. 孫肇祥(碩)(103)                  整合R與Hadoop/MapReduce來分析FOAF社群網路
    8. 黃雅玲(碩)(102)                  在語意式雲端環境上資料交換的保護:以醫療病歷為例
    9. 鄭國平(碩)(102)                  雲端委外語意式資料保護
    10. 梁世麒(碩)(101)                  本體論為基礎的統計資料整合:以政府公開資訊為例
    11. 楊竣展(碩)(100)                  整合資料在雲端環境上的分享與隱私保護:以電子病歷資料為例
    12. 楊協達(碩)(100)                  結合本體論與案例推理之合理使用推薦
    13. 吳建輝(碩)(099)                  個人隱私揭露意願之推論
    14. 郭弘毅(碩)(099)                  使用本體論與規則執行企業隱私保護規範
    15. 黃宏傑(碩)(098)                  建構具有語意隱私偏好保護平台
    16. 林光德(碩)(098)                  實踐具語意的著作權管理規範來逼近合理使用
    17. 李家輝(碩)(097)                  語意性的隱私政策:落實於銀行內部隱私保護的研究
    18. 宋昆銘(碩)(097)                  在社會網路上透過Tag-Theaurus模型達到有效的資源彙整
    19. 張易修(碩)(097)                  在點對點網路上以BT為基礎的數位媒體語意式搜尋系統
    20. 雷嘉慶(碩)(097)                  網頁論壇作語意擷取
    21. 余承遠(碩)(096)                  建構以語意社會網路為主的部落格入口網站
    22. 楊均筑(碩)(096)                  在對等式網路上建構創用CC之著作權說明控管系統
    23. 陳進棋(碩)(096)                  在網路上建構以SWRL為主的數位版權管理規範與應用
    24. 王奕淳(碩)(095)                  在對等式網路上以RDF(S)為基礎的MP3音樂推薦系統
    25. 唐朝緯(碩)(093)                  建立一個以服務多代理者系統為主的公鑰匙架構
    26. 楊銘煇(碩)(092)                  利用可信度本體論與代理者程式以建構具有語意溝通的資訊網服務
    27. 陳世庭(碩)(092)                  以規則分類機制來建立一個具有可信度的網路服務架構
    28. 黃廷謙(碩)(091)                  開發以代理者為主的分散式入侵偵防系統之誘因
    29. 李英宗(碩)(090)                  一個以代理人為基礎具有分散式認證授權服務的安全式電子交易環境

    Last Updated: Aug.-23rd-2017
    Prof. Hu's homepage
    jong at cs.nccu.edu.tw

    Valid HTML 4.01!