| 姓名 | 信箱 |
|---|---|
| 陳靜怡 | cchingyi@nycu.edu.tw |
| 姓名 | 信箱 |
|---|---|
| 劉明合 | aher0116@gmail.com |
| 蔡孟儒 | mengru.tsai@gmail.com |
| 姓名 | 信箱 |
|---|---|
| 陳菀渝 | hjom7356731@gmail.com |
| 張素馨 | sxchong@live.com |
| 吳榕憲 | samuel20010308@gmail.com |
| 林璟翔 | chi.ing.ii11@nycu.edu.tw |
| 詹詠淇 | andydaniel146@gmail.com |
| 李承恩 | chengenli.cs13@nycu.edu.tw |
| 許明瑞 | sgarry.cs13@nycu.edu.tw |
| 祝語辰 | ycchu8992.cs14@nycu.edu.tw |
| 龔弋筠 | yykung.cs14@nycu.edu.tw |
| 張原愷 | cojad8575@gmail.com |
| 陳泓羽 | ethan101040@gmail.com |

| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 孫宏民 | 1990~1995 | hmsun@cs.nthu.edu.tw | 目前任職於國立清華大學資工系 |
| Secure, Fault-Tolerant Parallel Communication Using Optimal Information Dispersal | |||
| 徐英傑 | 1993~1998 | ejshue@csie.nctu.edu.tw | |
| On Designing a Fault_Tolerant and Load-Balancing Clustered Video System | |||
| 林宸堂 | 1992~1999 | ctlin@csie.nctu.edu.tw | 目前任職於嘉義大學資管系 |
| Authentication, Authorization, and Protection for Mobile Computing Services | |||
| 楊文和 | 1993~1998 | whyang@csie.nctu.edu.tw | 目前任職於全景軟體 |
| Designing Authentication and Protection Schemes for Group Communcations | |||
| 黃育綸 | 1995~2000 | ylhuang@csie.nctu.edu.tw | 目前任職於交通大學電控所 |
| On Designing Online Payment and Content Privacy Schemes for Digital Merchandise Trading on the Internet | |||
| 呂正棻 | 1995~2002 | cflu@csie.nctu.edu.tw | 目前任職於大葉技術學院資訊工程系 |
| On Design of Cryptographic Re-Keying Protocols with Applications | |||
| 何福軒 | 1997~2003 | 目前任職於明辨科技 | |
| On Secure Online Services over the Internet with Network Address Translator | |||
| 羅嘉寧 | 1997~2004 | jnluo@csie.nctu.edu.tw | 目前任職於銘傳大學電腦與通訊工程學系 |
| The Design of Secure Multi-homed Architecture in Mobile Networks | |||
| 李富源 | 1998~2004 | leefy@csie.nctu.edu.tw | |
| Designing Protection Mechanisms against DDoS Attacks | |||
| 黃士一 | 2002~2009 | sihuang@csie.nctu.edu.tw | 目前任職於友達光電 |
| The Design of Secure Data Aggregation and Data Searching for Wireless Sensor Networks | |||
| 王繼偉 | 2008~2014 | cwwangabc@gmail.com | 目前任職於聯發科技 |
| ProbeBuilder - Automating Probe Construction in Virtual Machine Introspection through Uncovering Opaque Kernel Data Structures | |||
| 王嘉偉 | 2009~2017 | cwwang.cs98g@g2.nctu.edu.tw | 目前任職於聯發科技 |
| Facilitating Malware Sandbox with Security-Oriented Virtual Machine Introspection | |||
| 許家維 | 2009~2017 | hsucw@cs.nctu.edu.tw | 目前任職聯發科技 |
| Toward App Lifetime Behavior Analysis and Reconstruction | |||
| 卓政逸 | 2009~2017 | michcho@dsns.csie.nctu.edu.tw | 目前任職中華電信研究院 |
| Access Control for Named Data Networking | |||
| 張智凱 | 2010~2018 | skyzhang@dsns.cs.nycu.edu.tw | |
| Adaptive and Combinatorial Input Validation Testing for Large-scale Web Services | |||
| 陳仲寬 | 2010~2018 | bletchley.cs00g@g2.nctu.edu.tw | |
| Automatic Vulnerability Discovery and Patch in Binary Programs | |||
| 黃秀娟 | pattyh@cht.com.tw | ||
| 李善新 | 2017~2024 | shanhsinlee@gmail.com | |
| Identification of Organization-Specific Threat Intelligence,Behavior Modeling, and Variants Generation for 4-Quadrant Assessment | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 王銓祺 | 1991~1993 | ||
| A Distributed Intrusion-Detection Method and Its Applications | |||
| 蘇一中 | 1991~1993 | ||
| An Audit Mechanism for Inference Control in Statistical Databases | |||
| 吳旭林 | 1991~1993 | ||
| Group-Oriented Access Control Model for Distributed Computations in Multilevel Secure Networks | |||
| 劉昌龍 | 1991~1993 | 工研院電通所 | |
| A Distributed Intrusion-Detection Method and Its Applications | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 蔡育典 | 1992~1994 | 目前任職於台積電 | |
| Penetration Analysis of Large Softwares | |||
| 陳俊男 | 1992~1994 | ||
| Modeling, Specification and Verification of Time-Critical Systems | |||
| 蔣明儒 | 1992~1994 | ||
| Dynamic Load Balancing in Parallel Simulation Using The Time Warp Mechanism | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 黃乾綱 | 1993~1994 | 目前任職於台積電 | |
| On Controlling Object Data and Privilege Flows | |||
| 莊怡賢 | 1993~1995 | 目前任職於華邦電子 | |
| An Inference Control Model for Secure Database Systems | |||
| 楊文和 | 1993~1995 | 目前任職於全景軟體 | |
| Authentication and Key Distribution Protocol for Open Network Systems | |||
| 曾昭順 | 1993~1995 | 目前任職於矽統科技 | |
| A Dynamic Load Balancing Mechanism for Parallel Simulation | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 蔡雅清 | 1994~1996 | 目前任職於聯誠 | |
| Optimal Information Dispersal for Fault-Tolerant Paralled Wireless Communication | |||
| 楊維邦 | 1994~1996 | 目前任職於宏碁 | |
| Digital Multisignature Schemes with Message Recovery | |||
| 沈長毅 | 1994~1996 | 目前任職於東訊 | |
| Virtual Address Tanslation and Protection for Single Address Space Operating Systems on Wide Address Architectures | |||
| 周治平 | 1994~1996 | ||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 何福軒 | 1995~1997 | 目前任職於聯誠 | |
| Efficient Inter-Domain Authentication in Mobile Networks | |||
| 吳先祐 | 1995~1997 | 目前任職於捷發科技 | |
| Software Authorization and Protection in Mobile Code Systems | |||
| 鄭祥廷 | 1994~1996 | 目前任職於工研院 電通所 | |
| The Design of a Secure Group Communication System on the Internet | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 沈志強 | 1996~1998 | ||
| A Systematic Approach to Designing Secure Protocols against Guessing Attacks | |||
| 王堅權 | 1996~1998 | ||
| Key Distribution Schemes for Channel Protection on Pay-TV Systems | |||
| 李國成 | 1996~1998 | ||
| A Transparent and Efficient Mechanism for File System Protection | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 范凱威 | 1997~1999 | 目前任職於全景軟體 | |
| A Scalable and Secure Multicast Protocol on MBone Network | |||
| 張舜理 | 1997~1999 | 目前任職於全景軟體 | |
| A Security Testing System for Vulnerability Detection | |||
| 陳皇文 | 1997~1999 | 目前任職於全景軟體 | |
| Protecting Mobile Agents in an Open Network Environment | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 鄭淑敏 | 1998~2000 | ||
| Designing Authentication Protocols for Third Generation Mobile Communication Systems | |||
| 蔡焜來 | 1998~2000 | 目前任職於異康科技 | |
| Service Probing Protocol for Hidden Services behind NAT | |||
| 吳建宏 | 1998~2000 | 目前任職於VIA, 威盛電子 | |
| Threshold Signature Scheme with Message Recovery | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 吳怜儀 | 1999~2001 | ||
| Integrating NAT with Mobile IP | |||
| 鍾昌翰 | 1999~2001 | ||
| Network Intrusion Detection for Distributed Denial of Service and Distributed Scanning | |||
| 吳裕國 | 1999~2001 | ||
| A Packet-based Load Balancing Approach for High-speed Clustered IPSec Gateway | |||
| 許勝凱 | 1999~2001 | ||
| Reducing Packet Out-of-Order Syndrome on Clustered IPSec Gateways | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 周欣儀 | 2000~2002 | 目前任職於瑞昱 | |
| Information fusion model for Intrusion detection | |||
| 林雅雯 | 2000~2002 | 目前任職於緯創 | |
| Adaptive Packet Classification Using Kd-Tree Based Tuple Space Search | |||
| 賴勇任 | 2000~2002 | ||
| Clustered Architecture for High-Speed IPsec Gateway | |||
| 李倫銓 | 2000~2002 | ||
| A Clustered Architecture for Network Intrusion Detection System | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 張力元 | 2001~2003 | ||
| An Algebraic Marking Scheme for Single-Packet IP Traceback | |||
| 吳尚晏 | 2001~2003 | ||
| Adaptive Random Key Distribution Schemes for Wireless Sensor Networks | |||
| 周剛賢 | 2001~2003 | ||
| Marking-Based Source Identification Scheme for Defending Against DDoS Attacks | |||
| 江檉皇 | 2001~2003 | ||
| Keystroke Statistical Learning Model for Web Authentication | |||
| 張雅婷 | 2001~2003 | ||
| A Model for Optimizing IPsec Cluster Performance | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 林雲太 | 2002~2004 | ||
| Registration-Based Mail Access Control Scheme With Encapsulated Addresses | |||
| 陳志偉 | 2002~2004 | ||
| Preventing Low-Rate TCP Targeted Denial-of-Service Attack | |||
| 張升銘 | 2002~2004 | ||
| An efficient broadcast authentication scheme for wireless sensor networks | |||
| 林立洲 | 2002~2004 | ||
| A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Network | |||
| 王勝鉉 | 2002~2004 | ||
| A Defense Scheme against Spoofed DDoS Attacks at the Source | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 林亞正 | 2003~2005 | ||
| Lightweight, Pollution-Attack Resistant Multicast Authentication Scheme | |||
| 陳宗逸 | 2003~2005 | ||
| Latency-Aware and Energy-Efficient MAC Protocol for Wireless Sensor Networks | |||
| 吳孝展 | 2003~2005 | ||
| An energy efficient transmission scheme for wireless sensor network | |||
| 李卓育 | 2003~2005 | ||
| A Redundancy-Aware Protocol for Power Saving in Wireless Sensor Networks | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 李禮安 | 2004~2006 | ||
| Protecting User Privacy with Dynamic Identity-Based Scheme for Low-cost Passive RFID Tags | |||
| 陳厚坤 | 2004~2006 | ||
| A Fault-Tolerant, Attack-Resistant Multipath Information Delivery Scheme for Wireless Sensor Networks | |||
| 劉士豪 | 2004~2006 | ||
| An Energy-Balancing Secure Routing Scheme in Wireless Sensor Networks | |||
| 林哲正 | 2004~2006 | ||
| Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks | |||
| 簡浩洋 | 2005~2007 | ||
| Outlier-Filtered Time Synchronization Protocol for WSNs | |||
| 林渥人 | 2004~2006 | ||
| A Pollution Resistant Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 沈之涯 | 2005~2007 | ||
| Provable Secure Scheme with Reliable Key Delegation in UMTS Mobile Networks | |||
| 劉仁倩 | 2005~2007 | ||
| Predicting User Behavior for Identity Verification by Fusion of Statistical Methods | |||
| 栗紀樹 | 2005~2007 | ||
| A Statistical Voting Scheme for Detecting Compromised Nodes in Clustered WSNs | |||
| 邱青波 | 2005~2007 | ||
| Enhancing Location Privacy in WLAN using Relative Positioning System | |||
| 王朝彥 | 2005~2007 | ||
| Detecting Anomalous Behaviors in WSNs with Statistical Learning Model | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 王鼎鈞 | 2006~2008 | ||
| Improve Mobile Device Fingerprinting Accuracy by Fusion of Statistical Methods | |||
| 吳經偉 | 2006~2008 | ||
| Network Coding for Secure and Efficient Multicast in Overlay Network | |||
| 吳佳貞 | 2006~2008 | ||
| AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks | |||
| 李政仲 | 2006~2008 | ||
| A Lightweight Fair Payment Protocol for Mobile Devices | |||
| 王繼偉 | 2006~2008 | ||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 宋穎昌 | 2007~2009 | ||
| Light-Weight CSRF Protection by Labeling User-Created | |||
| 施汎勳 | 2007~2009 | ||
| Detecting VM-Aware Malware by Discovering Divergence Points | |||
| 張書綸 | 2007~2010 | ||
| Efficient DNSSEC Resource Record Update Scheme | |||
| 游釗俊 | 2007~2010 | ||
| Authenticating Mobile Peers in HIP Networks with DNSSEC Trust Chain | |||
| 朱信儒 | 2007~2010 | ||
| Lightweight Resource Record Distribution Scheme against Local DNSSEC Attacks | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 劉芳瑜 | 2009~2011 | ||
| Recognizing Malware Families with Invocation Pattern of Kernel Functions | |||
| 蘇修醇 | 2009~2011 | ||
| DroidTracking : Detecting Sensitive Data Stealing on Android with System-Wide Information Flow Tracking | |||
| 江孟寰 | 2009~2011 | ||
| A DNSSEC-based OpenID Service | |||
| 朱慶峰 | 2009~2011 | ||
| Clustering Malware via Measuring Similarity of Instruction Trace | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 鍾凱任 | 2010~2012 | ||
| Protecting Cookies from Unauthorized Modification by Trusted Domain Verification | |||
| 劉晏如 | 2010~2012 | ||
| Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison | |||
| 洪凱峰 | 2010~2012 | ||
| Exploring Malware Behavior by Maximizing Code Coverage | |||
| 鄭昀旻 | 2010~2012 | ||
| Accelerating Taint-Based Concolic Testing by Pruning Pointer Overtaint | |||
| 曾子建 | 2010~2012 | ||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 鄧傑聰 | 2011~2013 | ||
| DroidBear: Evaluating Resistibility of Anti-Virus on Code Reuse | |||
| 陳威志 | 2011~2013 | ||
| Signature Generation for DLL-based Malware | |||
| 張佳惠 | 2011~2013 | ||
| Tracking Information-flow of Storage Access on Android for Analysis | |||
| 沈宗賢 | 2011~2013 | ||
| Modeling Security Relevant Semantics for Android Malware Detection | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 林均翰 | 2012~2014 | ||
| DT-Track: Third-Party Web Tracking Using DNS-Timing Side Channel for Cellular Networks | |||
| 黃麟鈞 | 2012~2014 | ||
| Detecting Mimicry Malicious Emails | |||
| 謝居安 | 2012~2014 | ||
| Vetting Sensitive Behaviors of Android Applications through Inter-Procedural Dataflow Analysis | |||
| 陳怡嫻 | 2012~2014 | ||
| JSEMU: An Emulation Framework for Dynamically Adjustable Binary Instrumentation Policy | |||
| 李善新 | 2012~2014 | ||
| Automated Adaptive Test for Android Apps on Diversified Touchscreen Devices | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 王偋 | 2013~2015 | ||
| Context-aware Data Structure Reversing | |||
| 陳上奎 | 2013~2015 | ||
| Mitigating Over-Permissible Transfer for Control Flow Integrity | |||
| 魏聖儒 | 2013~2015 | ||
| Automatic Data Reconstruction for Inter-Component Analysis on Android | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 吳宗育 | 2014~2016 | ||
| A Study on The Misuse of RSA in the Field | |||
| 趙健賀 | 2014~2016 | ||
| Lifetime Behavior Reconstruction by Inter-Component Communication: An Empirical Study | |||
| 陳鼎文 | 2014~2016 | ||
| Automatic Sourcing for Symbolic Execution in Evasive Malware Analysis | |||
| 鄭皓文 | 2014~2016 | ||
| Input Validation Testing with Evasion Techniques for Web Applications | |||
| 陳祐任 | 2014~2016 | ||
| Automatic Path Inference and Input Reasoning for Use-After-Free Vulnerability Discovery | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 洪偉達 | 2015~2017 | ||
| Selective Entry Point Crawling for Web Vulnerability Scanner | |||
| 張亭儀 | 2015~2017 | ||
| Auto-patching Use-after-free Vulnerability via Memory Access Pattern Tracking | |||
| 謝怡臻 | 2015~2017 | ||
| Automatic Patch Generation for Injection Vulnerability in Web Applications | |||
| 李昊 | 2015~2017 | ||
| Guided Path Exploration for Evasive Malware Analysis | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 籃聖傑 | 2016~2018 | ||
| EM-Drive: Disjoint Representation Extraction of Evolvable Malware through Multi-task Learning | |||
| 何宜霖 | 2016~2018 | ||
| DeepMemIntrospect: Recognizing Data Structures in Raw Memory Using Deep Learning | |||
| 饒瑞謙 | 2016~2018 | ||
| VulCrawl-Adaptive Entry Point Crawler For Web Vulnerability Scanner | |||
| 蘇學翔 | 2016~2018 | ||
| Exploiting SQL Injection with Polymorphism | |||
| 蔣彥亭 | 2016~2018 | ||
| Pro2Vec Learning Program Structures With Graph Embedding | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 吳勃興 | 2017~2019 | ||
| Identifying URL Arguments for Web Penetration Testing | |||
| 蘇煒廸 | 2017~2019 | ||
| Retrieving Backend Logic with Automata Learning for Penetration Tests | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 黃若軒 | 2018~2020 | ||
| CAAS: Cybersecurity Awareness Assessment System based on Bahavior Log | |||
| 黃柏豪 | 2018~2020 | ||
| Advancing Enterprise Network Visibility for UBA by Correlating Multiple Data Sources | |||
| 李冠賢 | 2018~2020 | ||
| ARAM: Adaptable Cybersecurity Risk Assessment for an Enterprise Network | |||
| 黃柏諭 | 2018~2020 | ||
| TPB-Model: Two Phase Behavior Modeling for Data Exfiltration | |||
| 蔡孟軒 | 2018~2020 | ||
| Log-DIA: Determining Key Logs for User Behavior Analytics | |||
| 胡家瑄 | 2018~2020 | ||
| ETAM: Cyber Threat Assessment for an Enterprise Network | |||
| 林祐同 | 2018~2020 | ||
| PADS: Provenance-Aware Threat Detection Based on UEBA | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 張力仁 | 2019~2021 | ||
| Method and System for C&C Detection Using Multi-Layer Correlation | |||
| 廉城 | 2019~2021 | ||
| Method and System for Detecting Web-based Threats | |||
| 孫維崗 | 2019~2021 | ||
| Method and System for Lateral Movement Detection By Correlating Stealthy Activities across Devices | |||
| 陳泳序 | 2019~2021 | ||
| Method and System for Early Warning of Data Exfiltration Using Threat Correlation | |||
| 戴瑋彤 | 2019~2021 | ||
| Method and System for Detecting Serial Adversary Techniques of Privilege Escalation and Persistence | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 吳宗鴻 | 2020~2022 | ||
| ThreatGen - Threat Generator for Foothold Creation and Maintenance | |||
| 洪培軒 | 2020~2022 | ||
| Threat Generator for Malicious Command and Control | |||
| 廖中晧 | 2020~2023 | ||
| Threat Variation in Assessing Detection Capability for LSASS Memory Dumping | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 陳品晴 | 2021~2024 | ||
| Threat Generator for 4 Quadrant Detection Assessment | |||
| 王宗聖 | 2021~2024 | ||
| Threat Variation for Detection Assessment | |||
| 姓名 | 時間 | 信箱 | 任職 |
|---|---|---|---|
| 卓鉦詠 | 2022~2025 | ||
| Polemos AI-Driven Interactive Penetration Tests towards Adaptive and Repeatable Security Assessment | |||
| 巫建泓 | 2022~2025 | ||
| Polemos User Behavior Identification and Generation for Four-Quadrant Security Assessment | |||
| 吳俊毅 | 2022~2025 | ||
| Polemos LLM-Empowered Four-Quadrant Threat Behavior Generator for Enterprise Security Assessment | |||
| 陳冠儒 | 2022~2025 | ||
| Polemos Intelligent Extraction and Integration of Diverse CTI into a Structured Meta-Language Report | |||
| 白耀升 | 2022~2025 | ||
| Polemos Leveraging Knowledge Graph-Enhanced RAG for Automated Threat Payload Generation | |||
| 王映絜 | 2022~2025 | ||
| Erinyes Behavior-Based Threat Hunting in Big Log Data Using LLM | |||
