Publication

SCI Journal

  1. Fu-Hau Hsu, Yan-Ling Hwang, Chia-Hao Lee*, Chieh-Ju Lin, Kai-Wei Chang, Chen-Chia Huang, A Cloud-Based Protection Approach against JavaScript-Based Attacks to Browsers, Computers & Electrical Engineering, Volume 68, Pages 241–251., May 2018
    • IF: 1.57 [2016/2017]
  2. Fu-Hau Hsu, Yan-Ling Hwang, Kai-Wei Chang*, Chia-Hao Lee, Chuan-Sheng Wang, Chuan-Kai Kao, Zhi-Yao Zhong, Handover: A Mechanism to Improve the Reliability and Availability of Network Services for Clients behind a Network Address Translator, Computers & Electrical Engineering, Volume 67, Pages 159-169, April 2018
    • IF: 1.57 [2016/2017]
  3. Fu-Hau Hsu, Chih-Wen Ou*, Yan-Ling Hwang, Ya-Ching Chang, Po-Ching Lin, Detecting Web-based Botnets Using Bot Communication Traffic Features, Security and Communication Networks (Hindawi - Wiley) , 5960307:1-5960307:11, 2017
    • IF: 1.067 [2016/2017]
  4. Fu-Hau Hsu, Chuan-Sheng Wang*, Yu-Liang Hsu, Yung-Pin Cheng, Yu-Hsiang Hsueh, A Client-side Detection Mechanism for Evil Twins, Computers & Electrical Engineering, Volume 59, Pages 76-85, April 2017
    • IF: 1.57 [2016/2017]
  5. Fu-Hau Hsu, Yu-Liang Hsu*, Yan-Ling Hwang, Li-Han Chen, Chang-Kuo Tso, Chi-Hsien Hsu, Szu-Chi Liu, Po-Ching Lin, and Chuan-Sheng Wang,, VRS: A Values-based Reputation System for Web Services, Security and Communication Networks (Wiley), Volume 9, Issue 18, Pages 6335–6350, December 2016
    • IF: 1.067 [2016]
  6. Fu-Hau Hsu, Yan-Ling Hwang, Cheng-Yu Tsai, Wei-Tai Cai, Chia-Hao Lee*, and Kai-Wei Chang, TRAP: A Three-Way Handshake Server for TCP Connection Establishment, APPLIED SCIENCES-BASEL, Volume 6, Issue 11, Pages 358, Nov. 2016
    • IF: 1.679 [2016]
    • DOI:10.3390/app6110358
    • MOST 105-2221-E-008-074-MY3 and MOST 104-2221-E-008-056-
  7. Fu-Hau Hsu, Min-Hao Wu, Syun-Cheng Ou, Shiuh-Jeng Wang*, Data Concealments with High Privacy in New Technology File System, Journal of Supercomputing, Volume 72, Issue 1, Pages 120-140, January 2016
    • IF: 1.326 [2016]
    • MOST 103-2221-E-008-087-, MOST 104-2221-E-008-056-
  8. Fu-Hau Hsu, Chi-Hsien Hsu*, Chuan-Sheng Wang, Pei-Hsun Lee, Ruei-Min Jiang, and Jia-Sian Jhang, Bypass Cell-phone-verification through a Smartphone-based Botnet, Journal of Information Science and Engineering, Vol. 31, No. 3, pp. 1097-1111, May 2015
    • IF: 0.414 [2015]
    • NSC 101-2221-E-008-028-MY2, NSC 100-2218-E-008-013-MY3
  9. Fu-Hau Hsu, Min-Hao Wu, Yi-Wen Chang, and Shiuh-Jeng Wang*, Web Security in a Windows System As Privacy Defender in Private Browsing Mode, Multimedia Tools and Applications, Volume 74, Issue 5, pp. 1667-1688, March 2015
    • IF: 1.346 [2015]
    • NSC 101-2221-E-008-028-MY2
  10. Fu-Hau Hsu, Li-Han Chen*, and Chia-Jun Lin, Defeat Scanning Worms in Cyber Warfare, Security and Communication Networks - Wiley, Volume 8, Issue 5, pp. 715–726, 25, March 2015.
    • IF: 0.72 [2015]
    • NSC 100-2218-E-008-013-MY3, NSC 101-2221-E-008-028-MY2, NSC 103-2623-E-008-003-D
  11. Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, and Shiuh-Jeng Wang*, Image reversibility in data embedding on the basis of blocking-predictions, Peer-to-Peer Networking and Applications, Volume 7, Issue 4, pp. 723-736, December 2014
    • IF: 0.632 [2014]
    • NSC 101-2221-E-008-028-MY2
  12. Fu-Hau Hsu, Chuan-Sheng Wang*, Chi-Hsien Hsu, Chang-Kuo Tso, Li-Han Chen, and Song-Hui Lin, Detect Fast-Flux Domains through Response Time Differences, IEEE Journal on Selected Areas in Communications, Volume 32, Issue 10, pp. 1947-1956,, OCTOBER 2014
    • DOI: 10.1109/JSAC.2014.2358814
    • IF: 3.453 [2014]
    • NSC 101-2221-E-008-028-MY2, NSC 103-2623-E-008-003-D, NSC 100-2218-E-008-013-MY3
  13. Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, Shiuh-Jeng Wang*, Visible watermarking with reversibility of multimedia images for ownership declarations, Journal of Supercomputing, Volume 70, Issue 1, pp. 247-268, October 2014
    • IF: 0.858 [2014]
    • NSC 101-2221-E-008-028-MY2, NSC 100-2218-E-008-013-MY3
  14. Fu-Hau Hsu, Min-Hao Wu, and Shiuh-Jeng Wang*, Reversible Data Hiding Using Side-match Predictions on Steganographic Images, Multimedia Tools and Applications, Volume 67, Issue 3, pp. 571-591, December 2013
    • IF: 1.058 [2013]
  15. Fu-Hau Hsu, Min-Hao Wu, and Shiuh-Jeng Wang*, Chia-Ling Huang, Reversibility of Image with balanced Fidelity and Capacity upon Pixels Differencing Expansion, Journal of Supercomputing, Volume 66, Issue 2, pp. 812-828, November 2013
    • IF: 0.841 [2013]
    • NSC 101-2221-E-008-028-MY2
  16. Li-Han Chen*, Fu-Hau Hsu, Yanling Hwang, Mu-Chun Su, Wei-Shinn Ku, and Chi-Hsuan Chang, ARMORY: An Automatic Security Testing Tool for Buffer Overflow Bug Detection, Computers & Electrical Engineering, Volume 39, Issue 7, Pages 2233–2242, October 2013
    • IF: 0.992 [2013]
  17. Fu-Hau Hsu*, Min-Hao Wu, Chang-Kuo Tso, Chi-Hsien Hsu, Chieh-Wen Chen, Antivirus Software Shield against Antivirus Terminators, IEEE Transactions on Information Forensics and Security, VOL. 7, NO.5, Pages 1439 - 1447, October 2012
    • IF: 1.895 [2012]
    • NSC 100-2221-E-008-077-, NSC 100-2218-E-008-013-MY3, and NSC 101-2221-E-008-028-MY2
  18. Jieh-Haur Chen*, Mu-Chun Su, Chang-Yi Chen, Fu-Hau Hsu, Chin-Chao Wu, Application of Neural Networks for Detecting Erroneous Tax Reports from Construction Companies, Automation in Construction, Volume 20, Issue 7, Pages 935-939, November 2011
    • IF: 1.5 [2011]
  19. Fu-Hau Hsu*, Chang-Kuo Tso, Yi-Chun Yeh, Wei-Jen Wang, and Li-Han Chen, BrowserGuard: A Behavior-based Solution to Drive-by-Download Attacks, IEEE Journal on Selected Areas in Communications, Volume 29, Issue:7, pages 1461 - 1468, August 2011
    • IF: 3.413 [2011]
    • NSC 99-2220-E-008-001 and NSC 99-2219-E-008-001
  20. Li-Han Chen, Fu-Hau Hsu*, Cheng-Hsien Huang, Chih-Wen Ou, Chia-Jun Lin, and Szu-Chi Liu,, A Robust Kernel-based Solution to Control-Hijacking Buffer Overflow Attacks, Journal of Information Science and Engineering, Vol. 27, No. 3 , pp. 869-890, May, 2011
    • NSC 97-2218-E-008-006
  21. Mu-Chun Su, Hsu-Hsun Lo, and Fu-Hau Hsu, A Neural Tree and Its Application to Spam E-mail Detection, Expert Systems with Applications, Volume 37, Issue 12, pp. 7976-7985, December, 2010
    • IF: 1.924 [2010]
  22. Fu-Hau Hsu, Cheng-Hsien Huang, Chi-Hsien Hsu, Chih-Wen Ou*, Li-Han Chen, and Ping-Cheng Chiu, HSP: A solution against heap sprays, Journal of Systems and Software, Volume 83, Issue 11, Pages 2227-2236, November, 2010
    • IF: 1.277 [2010]
    • NSC 99-2220-E-008-001 and NSC 98-2220-E-008-006

Non-SCI Journal

EI Journal

  1. Fu-Hau Hsu, Meng-Jia Yan, KaiWei Chang*, Chih-Wen Ou, Hung-Min Sun, Itus: Behavior-based Spamming Group Detection on Facebooks, Journal of Computers, accepted and to be published, Unknow
  2. Chun-Yi Wang, Chieh-Wei Huang, Fu-Hau Hsu, Shih-Jen Chen, and Yao-Hsin Chen, Libra: An Adaptive Method for Protecting Memory from Arbitrary Overwrite, Journal of Computers, Vol. 11, No. 4, pp. 280-288, July 2016
  3. Yu-Hsiang Hsueh, Fu-Hau Hsu, Shih-Jen Chen, Yao-Hsin Chen, Yan-Ling Hwang, Chuan-Sheng Wang, Yu-Liang Hsu*, ET Detector: A Client-based Solution to Detect an Evil Twin Access Point, Applied Mechanics and Materials (Modern Design Technologies and Experiment for Advanced Manufacture and Industry), Vols. 764-765, pp 900-904, 2015
  4. Wei-Ling Liao, Chih-Wen Ou*, Shih-Jen Chen, Yan-Ling Hwang, Fu-Hau Hsu, Taurus: Preventing Stealthy SMS Activities on Android, Applied Mechanics and Materials (Modern Design Technologies and Experiment for Advanced Manufacture and Industry), Vols. 764-765, pp 960-964, 2015
  5. Chuan-Sheng Wang*, Fu-Hau Hsu, Shih-Jen Chen, Yan-Ling Hwang and Min-Hao Wu, Detecting Phishing Sites Using URLs Collected from Emails, Applied Mechanics and Materials (Applied Science and Precision Engineering Innovation), Vols. 479-480, pp 916-922, 2014
  6. Li-Han Chen*, Fu-Hau Hsu, Shih-Jen Chen, Chia-Jun Lin and Yan-Ling Hwang, Serum System: An Automatic Curing System for Worms and Buffer Overflow-Based Botnets, Applied Mechanics and Materials (Applied Science and Precision Engineering Innovation), Vols. 479-480, pp 923-927, 2014
  7. Ruei-Min Jiang, Jia-Sian Jhang, Fu-Hau Hsu*, YanLing Hwang, Peiwen Huang, Yung-Hoh Sheu, JokerBot - An Android-Based Botnet, Applied Mechanics and Materials (Innovation for Applied Science and Technology), Vols. 284-287, pp 3454-3458, 2013
  8. Chien-Wei Hung, Fu-Hau Hsu*, Shih-Jen Chen, Yan-Ling Hwang, Chang-Kuo Tso, Li-Pin Hsu, Defend a System against Keyloggers with a Privilege-limited Account, Applied Mechanics and Materials (Innovation for Applied Science and Technology), Vols. 284-287, pp 3385-3389, 2013
  9. Chien-Hsing Chou*, Mu-Chun Su, Yu-Xiang Zhao, and Fu-Hau Hsu, A Reinforcement-Learning Approach to Color Quantization, Tamkang Journal of Science and Engineering, Vol. 14, No. 2, pp. 141-150, June, 2011

Non-EI Journal

  1. Mu-Chun Su, Shao-Jui Wang, Chen-Ko Huang, Pa-Chun Wang, and Fu-Hau Hsu, A Signal-Representation-Based Parser to Extract Text-based Information from the Web, Journal of Advanced Computational Intelligence and Intelligent Informatics, Special issue on Software Engineering for Web Intelligence, Vol.14, No.5, pp. 531-539, July, 2010
  2. Hung-Yi Wu, Fu-Hau Hsu*, Hong-Wei Chen, Yu-Liang Hsu, and Chia-Jun Lin, IP Spoofing Detector with High Precision, International Journal of Computer Science and Information Engineering, Volume 1, Number 1, Pages 71-81, June, 2010

Domestic Journal

  1. Chang-Kuo Tso, Shih-Jen Chen, Fu-Hau Hsu*, A Browser-side Solution to Drive-by-Download-Based Malicious Web Pages, Communications of the CCISA, Vol. 15, No. 4, pp. 70-79, Oct, 2009
  2. Chung-Li Lin, Li-Han Chen, Cheng-Hsien Huang, Chih-Wen Ou, Fu-Hau Hsu*, A Novel Method of Detecting Buffer Overflow Attacks, Communications of the CCISA, Vol. 14, No. 2, pp. 99-111, April, 2008

International Conference

  1. Chi-Yu You, Yan-Ling Hwang, Chuan-Kai Kao, Fu-Hau Hsu, Chia-Hao Lee*, A Light-weight Method to Send and Receive SMS Messages in an Emulator, The 16th International Conference on Security and Management (SAM'17), Las Vegas, USA, July 17 - 20, 2017
  2. Meng-Jia Yen, Yang-Ling Hwang, Cheng-Yu Tsai, Fu-Hau Hsu, Chih-Wen Ou*, A Generic Feature-based Detection for Facebook Spamming Groups, The Tenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2016), Nice, France, July 24 - 28, 2016
  3. Chun-Yi Wang*, Ya-Lyue Jhao, Shih-Jen Chen, Chuan-Sheng Wang, Fu-Hau Hsu, and Yao-Hsin Chen, The Bilateral Communication based Dynamic Extensible Honeypot, The 49th IEEE Annual International Carnahan Conference on Security Technology (ICCST 2015), Taipei, Taiwan R.O.C, September 21-24, 2015
  4. Chia-Hao Lee*, Yan-Ling Hwang, Shih-Jen Chen, Chih-Wen Ou, Fu-Hau Hsu, Yu-Liang Hsu, CIDP Treatment: An Innovative Mobile Botnet Covert Channel based on Caller IDs with P8 Treatment, International Multi-Conference on Engineering and Technology Inovation, Kaohisung,Taiwan, R.O.C, Oct. 30 ~ Nov. 3, 2015
  5. Yanling Hwang*, Peiwen Huang, and Fu-Hau Hsu, The Implementation of Alternative Assessments on College Students English Learning, The Third European Conference on Language Learning (ECLL2015), Brighton, East Sussex, United Kingdom, July 1 ~ July 5, 2015
  6. Chia-Heng Li, Fu-Hau Hsu, Chuan-Sheng Wang*, Shih-Jen Chen, Yao-Hsin Chen, and Yan-Ling Hwang, Hawkeye : Finding Spamming Accounts, The 16th Asia-Pacific Network Operations and Management Symposium, National Chiao Tung University, Taiwan R.O.C, September 17-19, 2014
  7. Tien-Hao Tsai, Yu-Sheng Su, Shih-Jen Chen, Yan-Ling Hwang, Fu-Hau Hsu*, and Min-Hao Wu, A Network-based Solution to Kaminsky DNS Cache Poisoning Attacks, The Fifth International Conference on Evolving Internet (INTERNET 2013), Nice, France, July 21 - 26, 2013 (Acceptance Ratio: 26%)
  8. Fu-Hau Hsu, Min-Hao Wu, and Shiuh-Jeng Wang*, Dual-watermarking by QR-code Applications in Image Processing, The 9th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2012), Fukuoka, Japan, Sep. 4 - 7, 2012
  9. Chien-Wei Hung, Fu-Hau Hsu*, Shih-Jen Chen, Chang-Kuo Tso, Yan-Ling Hwang, Po-Ching Lin, and Li-Pin Hsu, A QTE-based Solution to Keylogger Attacks, The Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012), Rome, Italy, August 19 - 24, 2012 (Acceptance Ratio: 27%)
  10. Kai-Xiang Zhang, Chia-Jun Lin, Shih-Jen Chen, Yanling Hwang, Hao-Lun Huang, and Fu-Hau Hsu, TransSQL: A Translation and Validation-based Solution for SQL-Injection Attacks, In Proceedings of the First International Conference on Robot, Vision and Signal Processing, Kaohsiung, Taiwan, November 21-23, 2011 EI
  11. Min-Hao Wu, Fu-Hau Hsu, Cheng-Hsing Yang, and Shiuh-Jeng Wang, Reversible Watermarking Scheme with Visibility Using Randomize Distance, In Proceedings of the fifth International Conference on Genetic and Evolutionary Computing, Kinmen, Taiwan, August 29 ~ August 30, 2011, Xiamen, China, August 31 ~ September 1, 2011 EI
  12. Yanling Hwang, Peiwen Huang, Shih-Jen Chen, Fu-Hau Hsu, The Perceptions of Cooperative Learning in Computer-Assisted Language Learning Environmnets, The Global Chinese Conference on Computers in Education (GCCCE), Hangzhou, China, May, 29-31, 2011 EI
  13. Chen-Hsing Yang, Fu-Hau Hsu, Min-Hao Wu, and Shiuh-Jeng Wang, Improving Histogram-based Reversible Data Hiding By Tictactoemidlet Predictions, In Proceedings of the fourth International Conference on Genetic and Evolutionary Computing, Shenzhen, China, Dec. 13-15, 2010 EI
  14. Wei-Jen Wang, Carlos Varela, Fu-Hau Hsu, and Cheng-Hsien Tang, Actor Garbage Collection Using Vertex-Preserving Actor-to-Object Graph Transformations, Lecture Notes in Computer Science, 6104 , ISBN 978-3-642-13066-3, Springer, 2010 EI
  15. Fu-Hau Hsu, Fanglu Guo, and Tzi-cker Chiueh, Scalable Network-based Buffer Overflow Attack Detection, in Proceedings of ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2006), San Jose, California, USA., December 4-5, 2006 (Acceptance Ratio: 19.6% = 19/97). EI
  16. Fu-Hau Hsu and Tzi-cker Chiueh, CTCP: A Transparent Centralized TCP/IP Architecture for Network Security, in Proceedings of Annual Computer Security Application Conference (ACSAC 2004), Tucson, Arizona, USA, Dec. 6-10, 2004 (Acceptance Ratio: 26%=35/134) EI
  17. Fu-Hau Hsu and Tzi-cker Chiueh, A Path Information Caching and Aggregation Approach to Traffic Source Identification, in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS 2003), Providence, Rhode Island, USA, May 19-22, 2003 (Acceptance Ratio: 17.7% = 72/406) EI
  18. T.-C. Chiueh, K. Gopalan, A. Neogi, C. Li, S. Sharma, S.-M. Shan, J. Chen, W. Li, N. Joukov, J. Zhang, F.-H. Hsu, F. Guo, and S.-I. Doong, Sago: A Network Resource Management System for Real-Time Content Distribution, in Proceedngs of International Conference on Parallel and Distributed Systems (ICPADS 2002), National Central University, Taiwan, ROC, Dec., 2002
  19. Tzi-Cker Chiueh and Fu-Hau Hsu, RAD: A Compile-time Solution to Buffer Overflow Attacks, in Proceedings of the 21st IEEE International Conference on Distributed Computing Systems (ICDCS 2001), Phoenix, Arizona, USA, April 16-19, 2001 Google Scholar Citation: 300 (12th June 2017)

Domestic Conference

  1. Syun-Cheng Ou, Fu-Hau Hsu, Shih-Jen Chen, Yu-Sheng Su, Min-Hao Wu, STEALTH: A Method of Hiding and Encrypting Files in NTFS, National Computer Symposium , TaiChung, Taiwan, R.O.C, 13 ~ 14, Dec, 2013
  2. 許富皓, 陳立函, 張嘉顯, 江瑞敏, 凌宗廷, 左昌國, 許齊顯, 傀儡網佈建技術研究, 102年度屆國防科技學術研討會, 桃園, 14th, Nov., 2013
  3. 廖緯玲, 陳世仁, 蘇育生, 許富皓, 吳敏豪, Watch Your Money:A Solution to Protect Your Android from Sending Unknown SMS Messages,, Taiwan Academic Network Conference (TANET), Tai-Chung, Taiwan, 23rd ~ 25th Oct. 2013
  4. Jhen-Li Wang, Shih-Jen Chen, Chia-Hao Lee, and Fu-Hau Hsu, A Server-Side Solution for HTTP Cookie-Stealing-Based XSS Attacks, In proceedings of 2010 International Security Technology and Management Conference, Taipei, Taiwan, September, 8, 2010
  5. Chuan Sheng Wang, Shih-Jen Chen, and Fu-Hau Hsu, Phishing Detection from Spam Mails, In proceedings of 2010 International Security Technology and Management Conference, Taipei, Taiwan, September, 8, 2010
  6. 趙禧綠, 趙梨華, 許富皓, 顏志豪, 蔡天浩, Windows誘捕網情蒐之核心技術與回追技術軟體發展, 第18屆國防科技學術研討會, 桃園, 八德, 27th, Dec., 2009

Technical Report

  1. Fu-Hau Hsu, Sky-walker: An Integrated Solution for Network and Computer Security, Ph.D. Dissertation, SUNY at Stony Brook, Dec., 2004
  2. Fu-Hau Hsu, The Principle, Attack Patterns, and Defense Methods of Buffer Overflow Attacks, RPE report, SUNY at Stony Brook, October, 2000