教師履歷
教師履歷
吳敏豪助理教授
英文姓名:Wu, Min-Hao
學 歷:國立中央大學資訊工程研究所博士
專長領域:網路安全、系統安全、物聯網安全、行動裝置安全、雲計算安全
聯絡信箱:wuminhao@nkust.edu.tw
聯絡電話:07-3814526 #32611
專利
國際發明專利
專利名稱: Method for analyzing threat of Bluetooth worms to security of Internet of Things tel que decrit dans les duplicate des piecestechniques joints en annexe
專利案號:LU506052
專利申請日期: 2024/08/01
國際發明專利
專利名稱: Methoden und Systeme zur Verund Entschlüsselung von Gehirnwellen auf derGrundlage von emotionaler Sprache
專利案號: LU505929
專利日期: 2024/06/28
發明專利
專利名稱: 基於情感語音的腦波加解密方法和系統
專利案號:ZL202210501444.8
專利日期:2023/04/1
新型發明專利
專利名稱: 一種癱瘓病人通訊輔助設備
專利案號:ZL 2022 21448843.4
專利日期:2022/09/02
新型發明專利
專利名稱: 一種可調式電動病床
專利案號:ZL 2022 21079545.2
專利日期:2022/05/07
論文(期刊)
[1] M.-H. Wu, F.-H. Hsu * et al., "MPSD: A Robust Defense Mechanism Against Malicious PowerShell Scripts in Windows Systems," Electronics, 2024. (SCIE, Impact Factor= 2.6 CiteScore Rank:115/249 = 46.18%, COMPUTER SCIENCE, INFORMATION SYSTEMS)
[2] M.-H. Wu, F.-H. Hsu * et al., " Enhancing Linux System Security: A Kernel-Based Approach to Fileless Malware Detection and Mitigation," Electronics, 2024. (SCIE, Impact Factor= 2.6 CiteScore Rank:115/249 = 46.18%, COMPUTER SCIENCE, INFORMATION SYSTEMS)
[3] F.-H. Hsu, M.-H. Wu* et al., "Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy," Information, vol. 14, no. 10, p. 525, 2023. (ESCI, Impact Factor= 3.1 CiteScore Rank: 125/251 = 52.39 %, ENGINEERING) DOI: https://doi.org/10.3390/info14100525
[4] F.-H. Hsu, M.-H. Wu* et al., "Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy," Information, vol. 14, no. 10, p. 525, 2023. (ESCI, Impact Factor= 3.1 CiteScore Rank: 125/251 = 52.39 %, ENGINEERING) DOI: https://doi.org/10.3390/info14100525 (solicited)
[5] M.-H. Wu, Y.-J. Lai, Y.-L. Hwang, T.-C. Chang, and F.-H. Hsu, "MinerGuard: A Solution to Detect Browser-Based Cryptocurrency Mining through Machine Learning," Applied Sciences, vol. 12, no. 19, p. 9838, 2022. (SCIE, Impact Factor= 2.7 CiteScore Rank: 65/178 = 63.76 %, ENGINEERING) DOI: https://doi.org/10.3390/app12199838
[6] F.-H. Hsu, M.-H. Wu* , Y.-L. Hwang, C.-H. Lee, C.-S. Wang, and T.-C. Chang, "WPFD: Active User-Side Detection of Evil Twins," Applied Sciences, vol. 12, no. 16, p. 8088, 2022. (SCIE, Impact Factor= 2.7 CiteScore Rank: 65/178 = 63.76 %, ENGINEERING) DOI: https://doi.org/10.3390/app12168088
[7] M.-H. Wu, T.-C. Chang, H. Chen, Z. Yang, and S. Liu, "Reversible Information Hiding in Images Based on Histogram Shift Method," Sensors and Materials, vol. 34, no. 7, pp. 2555-2566, 2022. (SCIE, Impact Factor= 1.4 CiteScore Rank: 317/345 = 91.88%, MULTIDISCIPLINARY) DOI: 10.1007/s11042-022-14300-1
[8] M.-H. Wu et al., "Simple and Ingenious Mobile Botnet Covert Network Based on Adjustable Unit (SIMBAIDU)," Mathematical Problems in Engineering, vol. 2021. (SCIE, Impact Factor= 1.43 CiteScore Rank: 80/175 = 54.57 %, ENGINEERING) DOI: https://doi.org/10.1155/2021/9920883
[9] M.-H. Wu, T.-C. Chang, and Y. Li-Min, "Digital Forensics Security Analysis on iOS Devices," Journal of Web Engineering, pp. 775–794- 775–794, 2021. (SCIE, Impact Factor= 0.575 CiteScore Rank: 6 127/143 = 11.54%, COMPUTER SCIENCE) DOI: https://doi.org/10.13052/jwe1540-9589.20310
[10]M.-H. Wu and T.-C. Chang, "Evaluation of Effect of Music on Human Nervous System by Heart Rate Variability Analysis Using ECG Sensor," Sens. Mater, vol. 33, pp. 739-753, 2021. (SCIE, Impact Factor= 1.4 CiteScore Rank: 317/345 = 91.88%, MULTIDISCIPLINARY) DOI: https://doi.org/10.18494/SAM.2021.3040
[11] T.-C. Chang, M.-H. Wu* , P.-Z. Kim, and M.-H. Yu, "Smart driver drowsiness detection model based on analytic hierarchy process," Sens Mater, vol. 33, no. 1, pp. 485-497, 2020. (SCIE, Impact Factor= 1.4 CiteScore Rank: 317/345 = 91.88%, MULTIDISCIPLINARY) DOI: https://doi.org/10.18494/SAM.2021.3034
[12] F.-H. Hsu, C.-H. Lee, T. Luo, T.-C. Chang, and M.-H. Wu* , "A cloudbased real-time mechanism to protect end hosts against malware," Applied Sciences, vol. 9, no. 18, p. 3748, 2019. (SCIE, Impact Factor= 2.7 CiteScore Rank: 43/110 = 61.36 %, 61.36), DOI: https://doi.org/10.3390/app9183748
論文(國際研討會)
[1] M.-H. Wu, C.-Y. Chiu, J.-H. Huang, J.-X. Chen, H.-J. Wang, and Y. Lin, "Protection Mechanism in JavaScript Attacks," in 2023 IEEE 6th Eurasian Conference on Educational Innovation (ECEI), 2023: IEEE, pp. 14-17. DOI: 10.1109/ECEI57668.2023.10105425
[2] C.-Y. Chiu, M.-H. Wu* , J.-H. Huang, J.-X. Chen, and H.-J. Wang, "Machine Learning Detection of Ransomware by Lightweight Minifilters," in 2023 IEEE 6th Eurasian Conference on Educational Innovation (ECEI), 2023: IEEE, pp. 183-187. DOI: 10.1109/ECEI57668.2023.10105315
[3] M.-H. Wu, C.-Y. Chiu, J.-Z. Wu, J.-H. Huang, J.-X. Chen, and H.-J. Wang, "Mechanisms for Enhancing Network Services by Live Migration in the Network," in 2023 IEEE 6th Eurasian Conference on Educational Innovation (ECEI), 2023: IEEE, pp. 10-13. DOI: 10.1109/ECEI57668.2023.10105337
[4] M.-H. Wu, J.-H. Huang, J.-X. Chen, H.-J. Wang, and C.-Y. Chiu, "Machine Learning to Identify Bitcoin Mining by Web Browsers," in 2022 2nd International Conference on Computation, Communication and Engineering (ICCCE), 2022: IEEE, pp. 66-69. DOI: 10.1109/ICCCE55785.2022.10036239
[5] M.-H. Wu, L. Yi, T.-C. Chang, Y. Chen, C. Dai, and S. Chen, "Detection of Android Malware Behavior in Browser Downloads," in 2022 IEEE 4th Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS), 2022: IEEE, pp. 163-166. DOI: 10.1109/ECBIOS54627.2022.9944991 8
[6] J. Yuan, M.-H. Wu* , T.-C. Chang, Z. Zhan, and H. Chen, "Reversible Data Hiding in Color Image with Grayscale Invariance using Sorting," in 2021 IEEE International Conference on Artificial Intelligence, Robotics, and Communication (ICAIRC), 2021: IEEE, pp. 25-29.DOI: https://doi.org/10.1109/ICAIRC52191.2021.9544663
[7] M.-H. Wu, T.-C. Chang, J.-L. Wu, H. Ruomei, C.-H. Chang, and J. Wang, "Research on Music Based on Autonomic Nervous System," in Education and Awareness of Sustainability: Proceedings of the 3rd Eurasian Conference on Educational Innovation 2020 (ECEI 2020), 2020: World Scientific, pp. 615-618. DOI: https://doi.org/10.1142/9789811228001_0140
[8] S. Zeng and M. Wu* , "Based on Public Health Service in Smart Medical Comprehensive Service Platform," in 2019 IEEE International Conference on Computation, Communication and Engineering (ICCCE), 2019: IEEE, pp. 48-51. DOI: https://doi.org/10.1109/ICCCE48422.2019.9010766
[9] M.-H. Wu, F.-H. Hsu, T.-C. Chang, and L. H. Lin, "Preventing activity hijacking attacks in android app," in 2019 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS), 2019: IEEE, pp. 170-173. DOI: https://doi.org/10.1109/ECBIOS.2019.8807833
[10]M.-H. Wu, Y.-H. Chang, T.-C. Chang, and M.-L. Chen, "Reversible Data Hiding on the Basis of Dynamic Prediction Strategy," in 2019 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS), 2019: IEEE, pp. 166-169. DOI: https://doi.org/10.1109/ECBIOS.2019.8807842
[11]M.-H. Wu, T.-C. Chang, M.-L. Chen, and P.-H. Ch, "Reversible Data Hiding in Image System by Histogram-Shift Strategy," in 2019 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS), 2019: IEEE, pp. 181-184. DOI: https://doi.org/10.1109/ECBIOS.2019.8807840