李俊達 Chun-Ta Li
English Version Curriculum Vitae ORCID Scopus Google Scholar 旅遊生活
基本資料
姓名:李俊達 (CHUN-TA LI)
現任:輔仁大學 人工智慧與資訊安全學士學位學程 教授 (2023/02 ~ 迄今)
經歷:台南應用科技大學 資訊管理系 教授 (2020/08 ~ 2023/01) ;副教授 (2016/08 ~ 2020/07) ;助理教授 (2008/08 ~ 2016/07)
聯絡地址:242062新北市新莊區中正路510號 (輔仁大學人工智慧與資訊安全學士學位學程)
聯絡電話:02-29052000 轉 分機 6499 (研究室)
系辦電話:02-29056018
研究室:聖言樓SF216
教授課程
資通訊安全實務(全英文授課)
網路概論
數位鑑識
資料庫系統概論
作業系統
資訊管理導論
決策支援系統
資料庫系統與管理
論文寫作技巧
計算機概論
網路安全
資訊安全
多元服務學習
雲端技術概論
專題寫作
企劃書製作與簡報
日程課表
97學年度上學期課表 課表下載
97學年度下學期課表 課表下載
98學年度上學期課表 課表下載
98學年度下學期課表 課表下載
99學年度上學期課表 課表下載
99學年度下學期課表 課表下載
100學年度上學期課表 課表下載
100學年度下學期課表 課表下載
101學年度上學期課表 課表下載
101學年度下學期課表 課表下載
102學年度上學期課表 課表下載
102學年度下學期課表 課表下載
103學年度上學期課表 課表下載
103學年度下學期課表 課表下載
104學年度上學期課表 課表下載
104學年度下學期課表 課表下載
105學年度上學期課表 課表下載
105學年度下學期課表 課表下載
106學年度上學期課表 課表下載
106學年度下學期課表 課表下載
107學年度上學期課表 課表下載
108學年度上學期課表 課表下載
108學年度下學期課表 課表下載
109學年度上學期課表 課表下載
109學年度下學期課表 課表下載
110學年度上學期課表 課表下載
110學年度下學期課表 課表下載
111學年度上學期課表 課表下載
111學年度下學期課表 課表下載
112學年度上學期課表 課表下載
112學年度下學期課表 課表下載
研究興趣
資訊與網路安全
資訊檢索與字典搜尋
區塊鏈安全及其應用
物聯網安全及其應用
雲端運算安全及其應用
RFID安全及其應用
遠距醫療資訊系統安全及其應用
無線感測網路安全及其應用
行動隨意式網路安全及其應用
研究計劃
[智慧電網安全通訊機制的設計與研究],112年度輔仁大學學術研究計畫 A0112014,執行期間 112/08/01 ~ 113/07/31,計畫主持人
[無人機網路安全通訊機制的設計與研究],110年度國科會計畫 NSTC 110-2410-H-165-001-MY2,執行期間 110/08/01 ~ 112/07/31,計畫主持人
[霧運算環境之安全保護與儲存系統的設計與研究],109年度科技部計畫 MOST 109-2410-H-165-001,執行期間 109/08/01 ~ 110/07/31,計畫主持人
[應用區塊鏈於電子醫療紀錄保存與聚合之安全機制的設計與研究],108年度科技部計畫 MOST 108-2410-H-165-004,執行期間 108/08/01 ~ 109/07/31,計畫主持人
[行動社群網路服務系統與其群組通訊服務之安全隱私保護機制的研究],107年度科技部計畫 MOST 107-2410-H-165-001,執行期間 107/08/01 ~ 108/07/31,計畫主持人
[結合醫療雲與無線人體區域網路於安全行動緊急醫療救護系統之研究與實作],105年度科技部計畫 MOST 105-2221-E-165-005,執行期間 105/08/01 ~ 106/07/31,計畫主持人
[物聯網安全通訊機制與驗證系統之設計與研究],104年度科技部計畫 MOST 104-2221-E-165-004,執行期間 104/08/01 ~ 105/07/31,計畫主持人
[可抵抗雲端內部攻擊之關鍵字搜尋法於雲端儲存服務],103年度科技部計畫 MOST 103-2221-E-165-003,執行期間 103/08/01 ~ 104/07/31,計畫主持人
[遠端使用者認證安全機制之研究及實作],101年度國科會計畫 NSC 101-2221-E-165-002,執行期間 101/08/01 ~ 102/07/31,計畫主持人
[具安全繞送與付款機制以避免自私節點於無線隨意式網路之研究及實作],100年度國科會計畫 NSC 100-2221-E-165-002,執行期間 100/08/01 ~ 101/07/31,計畫主持人
[具安全計價機制於對等式網格計算環境之研究及實作],99年度國科會計畫 NSC 99-2221-E-165-001,執行期間 99/08/01 ~ 100/07/31,計畫主持人
[具實用及安全線上遊戲系統之研究及實作],98年度國科會計畫 NSC 98-2218-E-165-001,執行期間 98/08/01 ~ 99/07/31,計畫主持人
[無線隨意式網路安全之研究II],教育部全面提昇學術領域計畫 CC99118,執行期間 99/01/01 ~ 99/12/31,共同主持人
[無線隨意式網路安全之研究I],教育部全面提昇學術領域計畫 CC98118,執行期間 98/05/01 ~ 98/12/31,共同主持人
論文著作
國際期刊論文
Chandrasen Pandey, Vaibhav Tiwari, Agbotiname Lucky Imoize, Chun-Ta Li, Cheng-Chi Lee, Dpitendu Sinha Roy, “5GT-GAN: Enhancing Data Augmentation for 5G-Enabled Mobile Edge Computing in Smart Cities,” IEEE Access, vol. 11, pp. 120983-120996, 2023. [SCIE] (IF: 3.9; Rank: 100/275 = 36.4%)
Moses Kazeem Abiodun, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, Abidemi Emmanuel Adeniyi, Ugbaja Chioma, Chun-Ta Li, “Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhanced Data Security in Cloud Computing Systems,” Journal of Library and Information Studies, vol. 21, no. 2, pp. 1-26, 2023. [TSSCI]
Joseph Isabona, Agbotiname Lucky Imoize, Okiemute Roberts Omasheye, Emughedi Oghu, Cheng-Chi Lee, Chun-Ta Li, “Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms,” Information, vol. 14, no. 11, 621, pp. 1-22, 2023. [EI]
Sambit Pattanaik, Agbotiname Lucky Imoize, Chun-Ta Li, Sharmila Anand John Francis, Cheng-Chi Lee, Diptendu Sinha Roy, “Data-Driven Diffraction Loss Estimation for Future Intelligent Transportation Systems in 6G Networks,” Mathematics, vol. 11, no. 13, 3004, pp. 1-20, 2023. [SCIE] (IF: 2.4; Rank: 23/329 = 6.99%)
Muhammad Bilal Khan, Ali Althobaiti, Cheng-Chi Lee, Mohamed S. Soliman, Chun-Ta Li, “Some New Properties of Convex Fuzzy-Number-Valued Mappings on Coordinates Using Up and Down Fuzzy Relations and Related Inequalities,” Mathematics, vol. 11, no. 13, 2851, pp. 1-25, 2023. [SCIE] (IF: 2.592; Rank: 21/333 = 6.3%)
Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Olasupo Ahmed Olalekan, Agbotiname Lucky Imoize, Chun-Ta Li, Cheng-Chi Lee, “CBFISKD: A Combinatorial-Based Fuzzy Inference System for Keylogger Detection,” Mathematics, vol. 11, no. 8, 1899, pp. 1-24, 2023. [SCIE] (IF: 2.592; Rank: 21/333 = 6.3%)
Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Agbotiname Lucky Imoize, Chun-Ta Li, AbdulRahman Tosho Abdulahi, Abdulwasiu Bolakale Adelodun, Samarendra Nath Sur, Cheng-Chi Lee, “Non-Orthogonal Multiple Access Enabled Mobile Edge Computing in 6G Communications: A Systematic Literature Review,” Sustainability, vol. 15, no. 9, 7315, 2023. [SSCI/SCIE] (IF: 3.889; Rank: 133/279 = 47.67%)
Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, Agbotiname Lucky Imoize, Julius Olusola Odunuga, Cheng-Chi Lee, Chun-Ta Li, Dinh-Thuan Do, “An Emsemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks,” Applied Sciences, vol. 13, no. 4, 2479, pp. 1-24, 2023. [SCIE] (IF: 2.838; Rank: 39/92 = 42.39%)
Oluwakemi Christiana Abikoye, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, Chun-Ta Li, “Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme,” Future Internet, vol. 15, no. 3, 99, pp. 1-34, 2023. [EI]
Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng, Agbotiname Lucky Imoize, “An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications,” Sensors, vol. 22, no. 23, 9534, pp. 1-19, 2022. [SCIE/EI] (IF: 3.847; Rank: 19/64 = 29.7%)
Joseph Bamidele Awotunde, Rasheed Gbenga Jimoh, Agbotiname Lucky Imoize, Akeem Tayo Abdulrazaq, Chun-Ta Li, Cheng-Chi Lee, “An Enhanced Deep Learning-Based DeepFake Video Detection and Classification System,” Electronics, vol. 12, no. 1, 87, pp. 1-25, 2022. [SCIE] (IF: 2.690; Rank: 139/276 = 50.4%)
Chin-Ling Chen, Long-Hui Guo, Ming Zhou, Woei-Jiunn Tsaur, Hongyu Sun, Wanbing Zhan, Yong-Yuan Deng, Chun-Ta Li, “Blockchain-Based Anti-Counterfeiting Management System for Traceable Luxury Products,” Sustainability, vol. 14, no. 19, 12814, 2022. [SSCI/SCIE] (IF: 3.889; Rank: 133/279 = 47.67%)
Joseph Isabona, Agbotiname Lucky Imoize, Stephen Ojo, Olukayode Karunwi, Yongsung Kim, Cheng-Chi Lee, Chun-Ta Li, “Development of a Multilayer Perceptron Neural Network for Optimal Predictive Modeling in Urban Microcellular Radio Environments,” Applied Sciences, vol. 12, no. 11, 5713, pp. 1-27, 2022. [SCIE] (IF: 2.679; Rank: 38/90 = 42.2%)
Umesh Kumar Lilhore, Agbotiname Lucky Imoize, Chun-Ta Li, Sarita Simaiya, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar, Cheng-Chi Lee, “Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities,” Sensors, vol. 22, no. 8, 2908, pp. 1-26, 2022. [SCIE/EI] (IF: 3.576; Rank: 14/64 = 21.8%)
Okiemute Roberts Omasheye, Samuel Azi, Joseph Isabona, Agbotiname Lucky Imoize, Chun-Ta Li, Cheng-Chi Lee, “Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks,” Future Internet, vol. 14, no. 12, 373, pp. 1-26, 2022. [EI]
Umesh Kumar Lilhore, Agbotiname Lucky Imoize, Cheng-Chi Lee, Sarita Simaiya, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar, Chun-Ta Li, “Enhanced Convolutional Neural Network Model for Cassava Leaf Disease Identification and Classification,” Mathematics, vol. 10, no. 4, 580, pp. 1-19, 2022. [SCIE] (IF: 2.258; Rank: 24/330 = 7.3%)
Joseph Isabona, Agbotiname Lucky Imoize, Stephen Ojo, Cheng-Chi Lee, Chun-Ta Li, “Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate,” Information, vol. 13, no. 3, 141, pp. 1-17, 2022. [EI]
Chi-Yao Weng, Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng, “A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services,” IEEE Access, vol. 9, pp. 145522-145537, 2021. [SCIE] (IF: 3.367; Rank: 94/273 = 34.4%)
Chin-Ling Chen, Yong-Yuan Deng, Woei-Jiunn Tsaur, Chun-Ta Li, Cheng-Chi Lee, Chih-Ming Wu, “A Traceable Online Insurance Claims System Based on Blockchain and Smart Contract Technology,” Sustainability, vol. 13, no. 16, 9386, 2021. [SSCI/SCIE] (IF: 3.251; Rank: 60/125 = 48%)
Vishesh P. Gaikwad, Jitendra V. Tembhurne, Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li, “An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS,” IEEE Access, vol. 9, pp. 108586-108600, 2021. [SCIE] (IF: 3.367; Rank: 94/273 = 34.4%)
Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, Chin-Ling Chen, Cheng-Chi Lee, “A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System,” IEEE Access, vol. 8, pp. 173904-173917, 2020. [SCI/EI] (IF: 3.745; Rank: 35/156 = 22.4%)
Chin-Ling Chen, Yong-Yuan Deng, Chun-Ta Li, Shunzhi Zhu, Yi-Jui Chiu, Pei-Zhi Chen, “An IoT-Based Traceable Drug Anti-Counterfeiting Management System,” IEEE Access, vol. 8, pp. 224532-224548, 2020. [SCI/EI] (IF: 3.745; Rank: 35/156 = 22.4%)
Chandrashekhar Meshram, Cheng-Chi, Lee, A. S. Ranadive, Chun-Ta Li, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne, “A Subtree-based Transformation Model for Cryptosystem using Chaotic Maps under Cloud Computing Environment for Fuzzy User Data Sharing,” International Journal of Communication Systems, vol. 33, no. 7, e4307, 2020. [SCI] (IF: 1.278; Rank: 73/88 = 82.9%)
Chin-Ling Chen, Jin-Xin Hu, Chun-Ta Li, Yong-Yuan Deng, Shunzhi Zhu, “Traceable and Private Satelite Communication for Emergency Notifications in VANET,” Journal of Internet Technology, vol. 21, no. 1, pp. 223-240, 2020. [SCI/EI] (IF: 0.715; Rank: 81/88 = 92.0%)
Cheng-Chi Lee, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai, Athanasios V. Vasilakos, “A Novel Group Ownership Delegate Protocol for RFID Systems,” Information Systems Frontiers, vol. 21, no. 5, pp. 1153-1166, 2019. [SCI/EI] (IF: 2.521; Rank: 20/104 = 19.2%)
Chandrashekhar Meshram, Cheng-Chi, Lee, Sarita Gajbhiye Meshram, Chun-Ta Li, “An Efficient ID-based Cryptographic Transformation Model for Extended Chaotic Map-Based Cryptosystem,” Soft Computing, vol. 23, no. 16, pp. 6937-6946, 2019. [SCI] (IF: 2.367; Rank: 40/105 = 38.1%)
Cheng-Chi Lee, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai, “A Novel Group Ownership Transfer Protocol for RFID Systems,” Ad Hoc Networks, vol. 91, no. 101873, 2019. [SCI/EI] (IF: 3.151; Rank: 29/148 = 19.6%)
Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, “A Secure Trapdoor-Indistinguishable Public Encryption Scheme with Keyword Search for Cloud Storage Service,” Journal of Advances in Computer Networks, vol. 7, no. 1, pp. 1-6, 2019. [EI]
Cheng-Chi Lee, Shun-Der Chen, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai, “Security Enhancement on An RFID Ownership Transfer Protocol Based on Cloud,” Future Generation Computer Systems, vol. 93, pp. 266-277, 2019. [SCI/EI] (IF: 4.639; Rank: 7/103 = 6.8%)
Chandrashekhar Meshram, Chun-Ta Li, Sarita Gajbhiye Meshram, “An Effeicient Online/Offline ID-based Short Signature Procedure using Extended Chaotic Maps,” Soft Computing, vol. 23, no. 3, pp. 747-753, 2019. [SCI] (IF: 2.367; Rank: 40/105 = 38.1%)
Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Shun-Der Chen, Yan-Ming Lai, “A Novel Authentication Scheme for Anonymity and Digital Right Management Based on Elliptic Curve Cryptography,” International Journal of Electronic Security and Digital Forensics, vol. 11, no. 1, pp. 96-117, 2019. [EI]
Chun-Ta Li, Tsu-Yang Wu, Chien-Ming Chen, “A Provably Secure Group Key Agreement Scheme with Privacy Preservation for Online Social Networks Using Extended Chaotic Maps,” IEEE Access, vol. 6, pp. 66742-66753, 2018. [SCI/EI] (IF: 3.244; Rank: 27/146 = 18.5%)
Chin-Ling Chen, Yan-Ting Li, Yong-Yuan Deng, Chun-Ta Li, “Robust Identification and Authentication in a Robot Cloud Service System,” IEEE Access, vol. 6, pp. 56488-56503, 2018. [SCI/EI] (IF: 3.244; Rank: 27/146 = 18.5%)
Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai, “A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System,” Information Technology and Control, vol. 47, no. 2, pp. 262-274, 2018. [SCI] (IF: 0.800; Rank: 109/132 = 82.6%)
Chun-Ta Li, Chi-Yao Weng, Chien-Ming Chen, Cheng-Chi Lee, “An Improved Group Key Agreement Scheme with Privacy Preserving Based on Chaotic Maps,” Journal of Advances in Computer Networks, vol. 6, no. 1, pp. 1-6, 2018. [EI]
Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, “An Enhanced Network Admission and Communication Scheme for Internet of Things Based Body Area Network Healthcare System,” Journal of Advances in Computer Networks, vol. 6, no. 1, pp. 41-47, 2018. [EI]
Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai, Jiann-Cherng Shih, “An Improved E-DRM Scheme for Mobile Environments,” Journal of Information Security and Applications, DOI: 10.1016/j.jisa.2018.02.001, vol. 39, pp. 19-30, 2018. [EI]
Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen, “A Novel Three-party Password-based Authenticated Key Exchange Protocol with User Anonymity Based on Chaotic Maps,” Soft Computing, DOI: 10.1007/s00500-017-2504-z, vol. 22, no. 8, pp. 2495-2506, 2018. [SCI] (IF: 2.472; Rank: 33/105 = 31.4%)
Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, “Cloud-Assisted Mutual Authentication and Privacy Preservation Protocol for Telecare Medical Information Systems,” Computer Methods and Programs in Biomedicine, DOI: 10.1016/j.cmpb.2018.02.002, vol. 157, pp. 191-203, 2018. [SCI/EI] (IF: 2.503; Rank: 21/104 = 20.2%)
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, “Cryptanalysis and Improvement of A ECDLP Based Proxy Blind Signature Scheme,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 21, no. 1, pp. 23-34, 2018. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment,” Journal of Internet Technology, vol. 19, no. 1, pp. 147-155, 2018. [SCI/EI] (IF: 1.930; Rank: 39/89 = 43.8%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “Security and Efficiency Enhancement of Robust ID based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks,” Journal of Information Science and Engineering, DOI: 10.6688/JISE.2018.34.1.10, vol. 34, no. 1, pp. 155-170, 2018. [SCI/EI] (IF: 0.468; Rank: 141/146 = 96.6%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen, “Towards Secure Authenticating of Cache in the Reader for RFID-based IoT Systems,” Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-017-0564-6, vol. 11, no. 1, pp. 198-208, 2018. [SCI/EI] (IF: 1.262; Rank: 60/89 = 67.4%)
Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, “A Secure Key Authentication Scheme for Cryptosystems Based on GDLP and IFP,” Soft Computing, vol. 21, no. 24, pp. 7285-7291, 2017. [SCI] (IF: 2.472; Rank: 33/105 = 31.4%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Chaotic Maps Based Key Agreement and User Anonymity Protocol Without Using Smart Cards and Symmetric Key En/Decryptions,” Journal of Internet Technology, vol. 18, no. 5, pp. 975-984, 2017. [SCI/EI] (IF: 1.930; Rank: 39/89 = 43.8%)
Chun-Ta Li, Tsu-Yang Wu, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen, “An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-based Medical Care System,” Sensors, DOI: 10.3390/s17071482, vol. 17, no. 7, article 1482, pp. 1-18, 2017. [SCI/EI] (IF: 2.677; Rank: 10/58 = 17.2%)
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, “Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys,” International Journal of Network Security, vol. 19, no. 3, pp. 340-346, 2017. [EI]
Chien-Ming Chen, Chun-Ta Li, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan, “A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System,” IEEE Access, DOI: 10.1109/ACCESS.2017.2675163, vol. 5, no. 1, pp. 3410-3422, 2017. [SCI/EI] (IF: 3.244; Rank: 27/146 = 18.5%)
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, “A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem,” Parallel Processing Letters, vol. 26, no. 4, article 1650018, pp. 1-10, 2016. [EI]
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, “A CAE Scheme Using ECC Based Self Certified PKC,” Journal of Computer Science, vol. 12, no. 11, pp. 527-533, 2016.
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Song-Jhih Chen, “A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems,” Journal of Medical Systems, vol. 40, no. 11, article 233, pp. 1-10, DOI: 10.1007/s10916-016-0586-2, 2016. [SCI] (IF: 2.456; Rank: 28/90 = 31.1%)
Chun-Ta Li, “A Secure Chaotic Maps Based Privacy-protection Scheme for Multi-server Environments,” Security and Communication Networks, vol. 9, no. 14, pp. 2276-2290, 2016. [SCI/EI] (IF: 1.067; Rank: 111/146 = 76.0%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System,” Journal of Medical Systems, vol. 40, no. 5, article 117, pp. 1-15, DOI: 10.1007/s10916-016-0474-9, 2016. [SCI] (IF: 2.456; Rank: 28/90 = 31.1%)
Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Shih-Ting Chiu, “A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services,” Information Technology and Control, vol. 45, no. 3, pp. 289-299, 2016. [SCI] (IF: 0.475; Rank: 140/146 = 95.9%)
Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-Der Chen, “Time-bound Key-aggregate Encryption for Cloud Storage,” Security and Communication Networks, vol. 9, no. 13, pp. 2059-2069, 2016. [SCI/EI] (IF: 1.067; Rank: 111/146 = 76.0%)
Chun-Ta Li, Chin-Wen Lee, Jau-Ji Shen, “An Extended Chaotic Maps Based Keyword Search Scheme over Encrypted Data resist Outside and Inside Keyword Guessing Attacks in Cloud Storage Services,” Nonlinear Dynamics, vol. 80, no. 3, pp. 1601-1611, DOI: 10.1007/s11071-015-1965-9, 2015. [SCI/EI] (IF: 2.849; Rank: 7/130 = 5.4%)
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang, “A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System,” Journal of Medical Systems, vol. 39, no. 11, article 144, pp. 1-11, DOI: 10.1007/s10916-015-0322-3, 2015. [SCI] (IF: 2.213; Rank: 7/24 = 29.2%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture,” Journal of Information Science and Engineering, vol. 31, no. 6, pp. 1975-1992, 2015. [SCI/EI] (IF: 0.414; Rank: 129/139 = 92.8%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Dynamic Identity-based User Authentication Scheme for Remote Login Systems,” Security and Communication Networks, vol. 8, no. 18, pp. 3372-3382, 2015. [SCI/EI] (IF: 0.806; Rank: 57/82 = 69.5%)
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, “A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information Systems,” Journal of Medical Systems, vol. 39, no. 8, article 77, pp. 1-8, DOI: 10.1007/s10916-015-0260-0, 2015. [SCI] (IF: 2.213; Rank: 7/24 = 29.2%)
Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Yan-Ming Lai, “A New Three-party Authenticated Key Agreement Scheme Based on Chaotic Maps without Password Table,” Nonlinear Dynamics, vol. 79, no. 4, pp. 2485-2495, 2015. [SCI/EI] (IF: 2.849; Rank: 7/130 = 5.4%)
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang, “Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS,” Procedia Computer Science, vol. 52, pp. 21-28, 2015. [EI]
Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li, “Improving Security of A Communication-efficient Three-party Password Authenticated Key Exchange Protocol,” International Journal of Network Security, vol. 17, no. 1, pp. 1-6, 2015. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems,” Journal of Medical Systems, vol. 38, no. 9, article 77, pp. 1-11, DOI: 10.1007/s10916-014-0077-2, 2014. [SCI] (IF: 2.213; Rank: 7/24 = 29.2%)
Cheng-Chi Lee, Chi-Tung Chen, Chun-Ta Li, Ping Hsien Wu, “A Practical RFID Authentication Mechanism for Digital Television,” Telecommunication Systems, vol. 57, no. 3, pp. 239-246, DOI: 10.1007/s11235-013-09844-5, 2014. [SCI/EI] (IF: 0.705; Rank: 55/77 = 71.4%)
Chun-Ta Li, Cheng-Chi Lee, “A Novel User Authentication and Key Agreement Scheme with Smart Cards over Insecure Networks,” Information: An International Interdisciplinary Journal, vol. 17, no. 4, pp. 1271-1284, 2014. [SCI] (IF: 0.358; Rank: 71/90 = 78.9%)
Cheng-Chi Lee, Der-Chyuan Lou, Chun-Ta Li, Che-Wei Hsu, “An Extended Chaotic-Maps-Based Protocol with Key Agreement for Multiserver Environments,” Nonlinear Dynamics, vol. 76, no. 1, pp. 853-866, 2014. [SCI/EI] (IF: 2.849; Rank: 7/130 = 5.4%)
Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu, “A Novel Frequency Billing Service in Digital Television System,” Journal of Information Hiding and Mutimedia Signal Processing, vol. 5, no. 3, pp. 439-450, 2014. [EI]
Cheng-Chi Lee, Chun-Ta Li, Chia-Ying Wu, Shiow-Yuan Huang, “An Enhanced Fault-Tolerant Conference Key Agreement Protocol,” International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no. 12, pp. 2125-2129, 2014.
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “An Extended Chaotic Maps Based User Authentication and Privacy Preserving Scheme against DoS Attacks in Pervasive and Ubiquitous Computing Environments,” Nonlinear Dynamics, vol. 74, no. 4, pp. 1133-1143, DOI 10.1007/s11071-013-1029-y, 2013. [SCI/EI] (IF: 2.419; Rank: 11/138 = 7.9%)
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, “An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks,” Sensors, vol. 13, no. 8, pp. 9589-9603, 2013. [SCI/EI] (IF: 2.048; Rank: 10/57 = 17.5%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity,” KSII Transactions on Internet and Information Systems, vol. 7, no. 1, pp. 119-131, 2013. [SCI/EI] (IF: 0.345; Rank: 72/78 = 92.3%)
Chun-Ta Li, “A New Password Authentication and User Anonymity Scheme Based on Elliptic Curve Cryptography and Smart Card,” IET Information Security, vol. 7, no. 1, pp. 3-10, 2013. [SCI/EI] (IF: 0.631; Rank: 63/102 = 61.8%)
Chun-Ta Li, Cheng-Chi Lee, Chin-Wen Lee, “An Improved Two-Factor User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography,” Sensor Letters, vol. 11, no. 5, pp. 958-965, 2013. [SCI] (IF: 0.558; Rank: 45/57 = 78.9%)
Chun-Ta Li, Cheng-Chi Lee, “More Secure Authenticated Group Key Agreement in a Mobile Environment,” Information: An International Interdisciplinary Journal, vol. 16, no. 9(B), pp. 6817-6830, 2013. [SCI] (IF: 0.358; Rank: 71/90 = 78.9%)
Cheng-Chi Lee, Chun-Ta Li, Che-Wei Hsu, “A Three-party Password-based Authenticated Key Exchange Protocol with User Anonymity using Extended Chaotic Maps,” Nonlinear Dynamics, vol. 73, no. 1-2, pp. 125-132, 2013. [SCI/EI] (IF: 2.419; Rank: 11/138 = 7.9%)
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chin-Wen Lee, “Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks,” International Journal of Security and Its Applications, vol. 7, no. 3, pp. 249-257, 2013. [EI]
Chun-Ta Li, Min-Shiang Hwang, “A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol,” International Journal of Security and Its Applications, vol. 7, no. 1, pp. 59-70, 2013. [EI]
Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang, “An Undetectable On-line Password Guessing Attack on Nam et al.'s Three-party Key Exchange Protocol,” Journal of Computational Methods in Sciences and Engineering, vol. 13, no. 5-6, pp. 455-460, 2013. [EI]
Chun-Ta Li, Yan-Ming Lai, Cheng-Chi Lee, “Enhanced Threshold Anonymous Announcement in VANETs,” International Journal of Information Technology and Computer Science, vol. 12, no. 2, pp. 16-23, 2013.
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chin-Wen Lee, Ping-Nan Chiu, Cheng-Yi Wu, “Security Flaws of A Password Authentication Scheme for Hierarchical WSNs,” Journal of Advances in Computer Networks, vol. 1, no. 2, pp. 121-124, 2013.
Chun-Ta Li, Cheng-Chi Lee, “A Novel User Authentication and Privacy Preserving Scheme with Smart Cards for Wireless Communications,” Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 35-44, 2012. [SCI/EI] (IF: 1.420; Rank: 38/247 = 15.4%) (This article was one of the Top 25 Hottest Articles during January to December 2011 full year of Mathematical and Computer Modelling)
Chun-Ta Li, Chou-Chen Yang, Min-Shiag Hwang, “A Secure Routing Protocol with Node Selfishness Resistance in MANETs,” International Journal of Mobile Communications, vol. 10, no. 1, pp. 103-118, 2012. [SSCI/EI] (IF: 0.94; Rank: 25/67 = 37.3%)
Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang, “A Simple and Efficient Authentication Scheme for Mobile Satellite Communication Systems,” International Journal of Satellite Communications and Networking, vol. 30, no. 1, pp. 29-38, 2012. [SCI/EI] (IF: 0.535; Rank: 14/27 = 51.9%)
Chun-Ta Li, “A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications,” Information Technology and Control, vol. 41, no. 1, pp. 69-76, 2012. [SCI] (IF: 0.667; Rank: 88/132 = 66.7%)
Cheng-Chi Lee, Chun-Ta Li, Te-Yu Chen, Chia-Ying Wu, “Towards Secure User Authentication and Key Agreement Protocol Based on Bilinear Pairings for Mobile Client-Server Environments,” Telecommunication Systems, 2013, Article in press. [SCI/EI] (IF: 1.163; Rank: 37/78 = 47.4%)
Chun-Ta Li, Cheng-Chi Lee, Hsing Mei, Chia-Hao Yang, “A Password and Smart Card Based User Authentication Mechanism for Multi-Server Environments,” International Journal of Future Generation Communication and Networking, vol. 5, no. 4, pp. 153-163, 2012. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “A RFID-Based Macro-Payment Scheme with Security and Authentication for Retailing Services,” ICIC Express Letters, vol. 6, no. 12, pp. 3163-3170, 2012. [EI]
Chun-Ta Li, Chi-Yao Weng, Chun-I Fan, “Two-Factor User Authentication in Multi-Server Networks,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 261-267, 2012. [EI]
Chun-Ta Li, Min-Shiang Hwang, “Security Enhancement of Chang-Lee Anonymous E-Voting Scheme,” International Journal of Smart Home, vol. 6, no. 2, pp. 45-51, 2012. [EI]
Cheng-Chi Lee, Yan-Ming Lai, Chun-Ta Li, “An Improved Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 203-209, 2012. [EI]
Chun-Ta Li, Min-Shiang Hwang, “A Lightweight Anonymous Routing Protocol Without Public Key En/Decryptions for Wireless Ad Hoc Networks,” Information Sciences, vol. 181, no. 23, pp. 5333-5347, 2011. [SCI/EI] (IF: 2.833; Rank: 9/133 = 6.8%)
Chun-Ta Li, Cheng-Chi Lee, “A Robust Remote User Authentication Scheme Using Smart Card,” Information Technology and Control, vol. 40, no. 3, pp. 236-245, 2011. [SCI] (IF: 0.880; Rank:73/133 = 54.9%)
Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang, Chen-Ju Liu, “A Secure Billing Service with Two-Factor User Authentication in Wireless Sensor Networks,” International Journal of Innovative Computing, Information and Control, vol. 7, no. 8, pp. 4821-4831, 2011. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)
Chun-Ta Li, “Secure Smart Card Based Password Authentication Scheme with User Anonymity,” Information Technology and Control, vol. 40, no. 2, pp. 157-162, 2011. [SCI] (IF: 0.880; Rank:73/133 = 54.9%)
Cheng-Chi Lee, Chun-Ta Li, Kou-You Huang, Shiow-Yuan Huang, “An Improvement of Remote Authentication and Key Agreement Schemes,” Journal of Circuits, Systems, and Computers, vol. 20, no. 4, pp. 697-707, 2011. [SCI/EI] (IF: 0.281; Rank: 216/244 = 88.5%)
Cheng-Chi Lee, Chun-Ta Li, Shun-Der Chen, “Two Attacks on A Two-Factor User Authentication in Wireless Sensor Networks,” Parallel Processing Letters, vol. 21, no. 1, pp. 21-26, 2011. [EI]
Chun-Ta Li, Min-Shiang Hwang, “An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1-5, 2010. [SCI/EI] (IF: 0.66; Rank: 34/48 = 71%) (This article was one of the Most Cited Journal of Network and Computer Applications Articles published since 2008)
Chun-Ta Li, Min-Shiang Hwang, “An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 5, pp. 2181-2188, 2010. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)
Chun-Ta Li, C. H. Wei, C. C. Lee, Y. H. Chin, L. J. Wang, “A Secure and Undeniable Billing Protocol among Charged Parties for Grid Computing Environments,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 11, pp. 5061-5076, 2010. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)
Chun-Ta Li, Min-Shiang Hwang, “A Batch Verifying and Detecting the Illegal Signatures,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 12, pp. 5311-5320, 2010. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)
Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang, “A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels,” Journal of Information Assurance and Security, vol. 5, no. 3, pp. 201-208, 2010.
Chun-Ta Li, C. H. Wei, Y. H. Chin, “A Secure Event Update Protocol for Peer-To-Peer Massively Multiplayer Online Games Against Masquerade Attacks,” International Journal of Innovative Computing, Information and Control, vol. 5, no. 12(A), pp. 4715-4723, 2009. [SCI/EI] (IF: 2.932; Rank: 3/59 = 5.1%)
Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “An Efficient Sensor-To-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks,” International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, 2009. [SCI/EI] (IF: 2.932; Rank: 3/59 = 5.1%) (This article won 2011 IJICIC Most Cited Paper Award)
Chun-Ta Li, “An Efficient and Secure Communication Scheme for Trusted Computing Environments,” Journal of Computers, vol. 20, no. 3, pp. 17-24, 2009.
Chun-Ta Li, Yen-Ping Chu, “Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks,” International Journal of Network Security, vol. 8, no. 2, pp. 166-168, 2009. [EI]
Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks,” Computer Communications, vol. 31, no. 12, pp. 2803-2814, 2008. [SCI/EI] (IF: 0.884; Rank: 32/67 = 47.8%) (This article was one of the Most Cited Computer Communications Articles published since 2008)
Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Improving the Security of A Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc Networks,” International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, 2008. [SCI/EI] (IF: 0.277; Rank: 41/45 = 91.1%)
Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Further Improvement on A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments,” Computer Communications, vol. 31, no. 18, pp. 4255-4258, 2008. [SCI/EI] (IF: 0.884; Rank: 32/67 = 47.8%)
Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu, “An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks,” Computer Communications, vol. 31, no. 10, pp. 2534-2540, 2008. [SCI/EI] (IF: 0.884; Rank: 32/67 = 47.8%)
Jau-Ji Shen, Chun-Ta Li, “A Two-Layer Dictionary Organization for Quickly Retrieval,” Journal of Applied Sciences, vol. 6, no. 5, pp. 1066-1070, 2006.
Min-Shiang Hwang, Chun-Ta Li, Jau-Ji Shen, Yen-Ping Chu, “Challenges in E-Government and Security of Information," Information & Security. An International Journal, vol. 15, no. 1, pp. 9-20, 2004.
專書章節論文
Cheng-Hsing Yang, Chi-Yao Weng, Chia-Ling Hung, Chun-Ta Li, “Reversible Data Hiding in Encrypted Image Based on MSB Inversion,” The 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021), Smart Innovation, Systems and Technologies, vol. 314, pp. 3-13, Springer, Cham (2023), November 18-20, 2021, Taichung, Taiwan. [EI]
Chun-Ta Li, Chi-Yao Weng, Chien-Ming Chen,Chin-Ling Chen, Cheng-Chi Lee, “A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System,” The 5th International Conference on Internet of Vehicles (IOV 2018), Lecture Notes in Computer Science, vol. 11253, pp. 278-288, Springer, Switzerland (2018), November 19-22, 2018, Paris, France. [EI]
Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen, “Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme using Elliptic Curve Cryptosystems",” The 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), Lecture Notes in Computer Science, vol. 10232, pp. 116-126, Springer, Switzerland (2017), May 11-14, 2017, Cetara, Amalfi Coast, Italy. [EI]
Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, “On the Security of A Privacy Authentication Scheme Based on Cloud for Medical Environment,” 8th iCatse Conference on Information Science and Applications (ICISA 2017), Lecture Notes in Electrical Engineering, vol. 424, pp. 241-248, Springer, Singapore (2017), March 20-23, 2017, Macau, China. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu, Chien-Ming Chen, “Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-based System",” 8th iCatse Conference on Information Science and Applications (ICISA 2017), Lecture Notes in Electrical Engineering, vol. 424, pp. 282-289, Springer, Singapore (2017), March 20-23, 2017, Macau, China. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen, “Design Flaws in A Secure Medical Data Exchange Protocol Based on Cloud Environments,” The 2nd International Workshop on Security and Privacy Protection in Computer and Network Systems (SPPCN 2015), Lecture Notes in Computer Science, vol. 9532, pp. 435-444, Springer, Switzerland (2015), November 18-20, 2015, Zhangjiajie, China. [EI]
Chun-Ta Li, Jau-Ji Shen, Chin-Wen Lee, “Security and Efficiency Analysis on A Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services,” The 4th International Symposium on Cloud and Services Computing (SC2 2014), Lecture Notes in Computer Science, vol. 8662, pp. 367-375, Springer, Switzerland (2014), September 01-03, 2014, Beijing, China. [EI]
Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu, “Cryptanalysis and Improvement of An ECC-based Password Authentication Scheme Using Smart Cards,” The 5th International Symposium on Cyberspace Safety and Security (CSS 2013), Lecture Notes in Computer Science, vol. 8300, pp. 338-348, Springer, Switzerland (2013), November 13-15, 2013, Zhangjiajie, China. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee, “A Robust Remote User Authentication Scheme Against Smart Card Security Breach,” 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2011), Lecture Notes in Computer Science, vol. 6818, pp. 231-238, Springer, Heidelberg (2011), July 11-13, 2011, Richmond, USA. [EI]
Chun-Ta Li, “Security of Wireless Sensor Networks: Current Status and Key Issues,” INTECH, Book: Smart Wireless Sensor Networks, ISBN 978-953-307-261-6, pp. 299-313, December 2010.
Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang, “On the Security Enhancement of An Efficient and Secure Event Signature Protocol for P2P MMOGs,” The 2010 International Conference on Computational Science and Its Applications (ICCSA 2010), Lecture Notes in Computer Science, vol. 6016, pp. 599-609, Springer, Heidelberg (2010), March 23-26, 2010, Fukuoka, Japan. [EI]
Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li, “A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period,” The 2007 International Conference on Computational Science and Its Applications (ICCSA 2007), Lecture Notes in Computer Science, vol. 4707, pp. 273-284, Springer, Heidelberg (2007), August 26-29, 2007, Kuala Lumpur, Malaysia. [EI]
國內期刊論文
李正吉,林聖邦,李俊達,“網路文學閱讀情況之研究:以巴哈姆特電玩資訊站閱讀網路文學的用戶為例”,教育傳播與科技研究,第133期,第21至43頁,2023年12月。
李俊達,“無人機—新興科技還是威脅?”,清流雙月刊,第42卷,第11月號,第22至28頁,2022年11月。
楊政興,翁麒耀,江佳峻,李俊達,“機密分享機制在加密影像中實現高容量可逆式隱藏技術”,資訊管理學報,第29卷,第2期,第181至197頁,2022年4月。
李俊達,黃明祥,“應用無線感測網路技術於整合型人事行政資訊系統─安全門禁管制”,人事月刊,第47卷,第1期,第22至29頁,2008年7月。
國際會議論文
Chun-Ta Li, Cheng-Chi Lee, Chin-Ling Chen, Chi-Yao Weng, “Cryptanalysis of a Lightweight Authentication and Key Agreement Scheme for Internet of Drones,” The 2021 International Conference on Security and Management (SAM'21), Springer Nature - Book Series: Transactions on Computational Science & Computational Intelligence, July 26-29, 2021, Las Vegas, USA. [EI]
Cheng-Chi Lee, Chung-Wei Li, Chun-Ta Li, Chin-Ling Chen, “E-book Circulation System Based on Blockchain,” 2021 International Conference on Computational Science and Computational Intelligence (CSCI 2021), IEEE CS, pp. 615-619, December 15-17, 2021, Las Vegas, USA. [EI]
Chi-Yao Weng, Cheng-Hsing Yang, Guang-Yih Hsu, Rong-Jaye Chen, Chun-Ta Li, “Reversible Data Hiding in Encrypted Image Based on Flipping MSB Encryption Process,” 2020 5th International Conference on Knowledge Engineering and Applications (ICKEA 2020), ACM Digital Library, pp. 108-112, June 5-8, 2020, Tokyo, Japan. [EI]
Cheng-Chi Lee, Shun-Der Chen, Chun-Ta Li, Chun-Lun Cheng, Yan-Ming Lai, “Cryptanalysis of An RFID Ownership Transfer Protocol Based on Cloud,” 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2018), IEEE CS, pp. 134-139, June 22-24, 2018, Shanghai, China. [EI]
Cheng-Chi Lee, Chun-Lun Cheng, Yan-Ming Lai, Chun-Ta Li, “Cryptanalysis of Dimitriou's Key Evolving RFID Systems,” 2016 5th International Conference on Network Communication and Computing (ICNCC 2016), ACM Digital Library, pp. 229-233, Dec. 17-21, 2016, Kyoto, Japan. [EI]
Chun-Ta Li, Chin-Wen Lee, Jau-Ji Shen, “A Secure Three-party Authenticated Key Exchange Protocol Based on Extended Chaotic Maps in Cloud Storage Service,” The 2015 International Conference on Information Networking (ICOIN 2015), IEEE CS, pp. 31-36, Jan. 12-14, 2015, Siem Reap, Cambodia. [EI]
Chun-Ta Li, Cheng-Chi Lee, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang, “Cryptanalysis of An Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics,” The 2015 International Conference on Information Networking (ICOIN 2015), IEEE CS, pp. 498-502, Jan. 12-14, 2015, Siem Reap, Cambodia. [EI]
Chun-Ta Li, Chin-Wen Lee, Yi-Rui Zhu, Jian-Jhong Jheng, Xiao-Qian Zhang, “Cryptanalysis of A Dynamic Password Based User Authentication Scheme for HWSNs,” The 7th International Conference on Information Security and Assurance (ISA 2013), Advanced Science and Technology Letters, vol. 21, pp. 1-4, April 26-28, 2013, Cebu, Philippines.
Cheng-Chi Lee, Chun-Ta Li, “Security Analysis on Two Diffie-Hellman Based Protocols,” The 2013 FTRA International Conference on Advanced IT, Engineering and Management (AIM 2013), Feb. 21-23, 2013, Seoul, Korea.
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “A Secure Payment Scheme Using RFID Technique for Retailing Services,” The Third International Conference Ubiquitous Computing and Multimedia Applications (UCMA 2012), Advanced Science and Technology Letters, vol. 7, pp. 36-41, June 28-30, 2012, Bali, Indonesia.
Chun-Ta Li, Chi-Yao Weng, Chun-I Fan, “Cryptanalysis of A Robust and Efficient Smart Card Based Remote Login Mechanism for Multi-Server Architecture,” The 6th International Conference on Information Security and Assurance (ISA 2012), Advanced Science and Technology Letters, vol. 1, pp. 4-6, April 28-30, 2012, Shanghai, China.
Chun-Ta Li, Min-Shiang Hwang, “Comments on Chang-Lee's Anonymous E-Voting Scheme,” The 6th International Conference on Information Security and Assurance (ISA 2012), Advanced Science and Technology Letters, vol. 1, pp. 41-43, April 28-30, 2012, Shanghai, China.
Cheng-Chi Lee, Yan-Ming Lai, Chun-Ta Li, “On Security of A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment,” The 6th International Conference on Information Security and Assurance (ISA 2012), Advanced Science and Technology Letters, vol. 1, pp. 22-25, April 28-30, 2012, Shanghai, China.
Cheng-Chi Lee, Chun-Ta Li, Te-Yu Chen, Ping-Hsien Wu, Chi-Tung Chen, “A New Key Exchange Protocol with Anonymity between STB and Smart Card in IPTV Broadcasting,” 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 2011), IEEE CS, Sep. 23-25, 2011, Wuhan, China. [EI]
Chun-Ta Li, Min-Shiag Hwang, Pin-Chieh Huang, “An Efficient Authenticated Key Agreement Scheme Without Using Smart Card,” 4th International Multi-Conference on Engineering and Technological Innovation (IMETI 2011), vol. 2, pp. 94-98, July 19-22, 2011, Orlando, Florida, USA.
Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee, “Cryptanalysis of Khan et al.'s Dynamic ID-based Remote User Authentication Scheme,” 10th International Conference on Intelligent Systems Design and Applications (ISDA 2010), IEEE CS, pp. 1382-1387, Nov. 29-Dec. 01, 2010, Cairo, Egypt. [EI]
Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Rui-Xiang Chang, “On Security of A More Efficient and Secure Dynamic ID-based Remote User Authentication Scheme,” 10th International Conference on Intelligent Systems Design and Applications (ISDA 2010), IEEE CS, pp. 1371-1375, Nov. 29-Dec. 01, 2010, Cairo, Egypt. [EI]
Chun-Ta Li, “An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards,” 5th International Conference on Information Assurance and Security (IAS 2009), IEEE CS, pp. 517-520, August 18-20, 2009, Xi'an, China. [EI]
Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai, “A Verifiable Electronic Voting Scheme Over the Internet,” 6th International Conference on Information Technology: New Generations (ITNG 2009), IEEE CS, pp. 449-454, April 27-29, 2009, Las Vegas, Nevada, USA. [EI]
Chun-Ta Li, Min-Shiang Hwang, “Improving the Security of Non-PKI Methods for Public Key Distribution,” 6th International Conference on Information Technology: New Generations (ITNG 2009), IEEE CS, pp. 1695-1696, April 27-29, 2009, Las Vegas, Nevada, USA. [EI]
C. H. Wei, Y. H. Chin, Chun-Ta Li, “A Secure Billing Protocol for Grid Computing,” 6th International Conference on Information Technology: New Generations (ITNG 2009), IEEE CS, pp. 320-325, April 27-29, 2009, Las Vegas, Nevada, USA. [EI]
Chun-Ta Li, Yan-Chi Lai, Min-Shiang Hwang, Yen-Ping Chu, “An Electronic Cash Scheme with Crime-Resistance,” International Computer Symposium 2006 (ICS 2006), December, 2006, Taipei, Taiwan.
Jau-Ji Shen, Chun-Ta Li, “Full Text Retrieval on Distributed Digital Libraries,” 2003 International Conference on Informatics, Cybernetics and Systems (ICICS 2003), December, 2003, Kaohsiung, Taiwan.
國內會議論文
曾治程,王宜宏,許崇祐,黃柏翔,陳睿煬,李俊達,“以臉部捕捉技術為基礎之虛擬人物建置及其應用”,2022第二十屆離島資訊技術與應用研討會,第385至389頁,國立澎湖科技大學,澎湖,2022年05月27~29日。
翁麒耀,姜秉翰,謝奉根,李俊達,“結合虛擬骨架與肢體辨識之數位遊戲開發與設計-以屏大魔法校園為例”,2022第二十屆離島資訊技術與應用研討會,第390至394頁,國立澎湖科技大學,澎湖,2022年05月27~29日。
曾治程,黃柏翔,王宜宏,鄭凱鴻,林原右,方珮溱,劉澤勳,郭家弘,李俊達,“植基於RFID技術之生存遊戲系統”,2021數位生活科技研討會,國立屏東大學,屏東,2021年05月14~15日。
鄭凱鴻,林原右,方珮溱,劉澤勳,郭家弘,余振維,莊紹文,王璿閔,侯淑娟,林宗蒝,李俊達,“以無線射頻辨識技術為基礎之遠距醫療應用系統”,2019全國計算機會議,國立金門大學,金門,2019年11月14~15日。
李俊達,王浚丞,陳松志,“一個使用者認證方法於無線健康照護感測網路之安全性分析”,2016數位生活科技研討會,第359至366頁,國立屏東大學,屏東,2016年06月18~19日。
李俊達,王浚丞,徐敏傑,陳華宣,陳松志,“一個結合具記名式儲值卡之郵件寄送系統”,2015數位生活科技研討會,第1073至1079頁,高雄第一科技大學,高雄,2015年06月26~27日。
李俊達,李欽文,李正吉,吳政毅,“一個改善無同步交易問題之電子付款機制”,2013企業電子化實務應用研討會,第1至14頁,ISBN 978-986-6341-39-7,台南應用科技大學,台南,2013年05月16日。
李俊達,劉貞汝,姚建竹,陳昭翔,林宗穎,“一個結合RFID技術與被動式標籤之識別與定位系統-以遊樂園為例”,EITS 2012數位教學暨資訊實務研討會,ISBN 978-986-6975-50-9,南台科技大學,台南,2012年03月28日。
李俊達,李正吉,李欽文,邱炳諵,吳政毅,“一個使用RFID技術之無人化點餐及送餐服務系統”,2011企業電子化實務應用研討會,第27至44頁,ISBN 978-986-6541-53-7,台南應用科技大學,台南,2011年12月09日。
李正吉,吳秉憲,李俊達,“一具匿名性及安全性金鑰交換協定於網路電視廣播系統之研究”,CISC2011第二十一屆資訊安全會議,虎尾科技大學,雲林,2011年05月26~27日。
李正吉,吳佳盈,李俊達,黃秀園,“Cryptanalysis and Improvement of Fault-tolerant Conference Key Agreement Protocol”,2011資訊管理學術與實務研討會,景文科技大學,台北,2011年05月24日。(此論文榮獲2011資訊管理學術與實務研討會「優等獎」)
李俊達,李正吉,劉貞汝,李欽文,姚建竹,陳昭翔,“一個具多國語言之RFID展覽解說系統”,2010電子化企業實務研討暨論文發表會,第1至15頁,ISBN 978-986-6541-31-5,台南應用科技大學,台南,2010年12月23日。
李正吉,吳孟佳,李俊達,“一種新的RFID互相認證機制符合EPC Class 1 Generation 2標準”,2010網路與RFID技術研討會,大葉大學,彰化,2010年06月04日。
李俊達,王廉軍,蘇威鴻,曾瑞彬,黃意婷,林秀芸,林怡秀,陳信廷,謝俊緯,王郁婷,“RFID大額付款系統於高級酒應用”,2009電子化企業實務研討暨論文發表會,第512至527頁,台南科技大學,台南,2009年12月17日。
李俊達,楊雅雯,李翊綺,吳怡慧,“一個具安全通訊與雙向認證特性之RFID交易機制”,2009電子化企業實務研討暨論文發表會,第528至543頁,台南科技大學,台南,2009年12月17日。
黃明祥,李俊達,“應用無線感測器於教學環境之研究 ─ 以國內某校資管系為例”,2008全球運籌管理產業研討暨論文發表會,第538至554頁,台南科技大學,台南,2008年12月25日。
學術活動
參與期刊及會議論文審查工作
Editorial Board: International Journal of Network Security (2012/01~Now)
Publishing Editor: International Journal of Network Security (2005/07~2011/12)
Guest Editor: Mathematics (Special Issue on Network Security in Artificial Intelligence Systems)
Guest Editor: Sensors (Special Issue on Blockchain Security and Its Application in Internet of Things)
Guest Editor: Cryptography (Special Issue on Advances in Authentication, Authorization and Privacy for Securing Smart Communications)
Guest Editor: Future Internet (Special Issue on Privacy and Authentication for Communication Networks)
Guest Editor: Cryptography (Special Issue on RFID Security and Its Application)
Guest Editor: Journal of Computers (Special Issue on Trusted Computing and Communications)
Program Committee: 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023)
Technique Program Committee: 2021 4th International Conference on Computer Science and Software Engineering (CSSE 2021)
Technical Committee: 2020 5th International Conference on Knowledge Engineering and Applications (ICKEA 2020)
Program Committee: 2019 7th International Conference on Smart City and Informatization (iSCI 2019)
Technique Program Committee: 2019 4th International Conference on Information and Network Technologies (ICINT 2019)
Technique Program Committee: 2018 3rd International Conference on Information and Network Technologies (ICINT 2018)
Technical Committee: 2017 International Conference on Communication and Information Systems (ICCIS 2017)
Program Committee: The First International Conference on Vehicular Technology, Transportation, Communication and Applications (VTCA 2017)
Technical Committee: 2016 International Conference on Communication and Information Systems (ICCIS 2016)
Program Committee: The 6th International Symposium on Cyberspace Safety and Security (CSS 2014)
Program Committee: The 5th International Conference on Computer and Communication Technology (ICCCT-2014)
Technical Committee: 2014 The 6th International Conference on Communication Software and Networks (ICCSN 2014)
Technique Program Committee: The 2013 National Computer Symposium Workshop on Digital - Forensics, Security and Privacy (NCS 2013)
Program Committee: The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)
Program Committee: The International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking (InfoSecHiComNet 2011)
Program Committee: The 2010 International Conference on Computer Technology (ICCT 2010)
Session Chair: The 2010 International Conference on Intelligent Systems Design and Applications (ISDA 2010)
Paper Review: Cognitive Systems Research: 2018 (一篇)
Paper Review: Information Sciences: 2018 (一篇)
Paper Review: Neural Computing and Applications: 2018 (一篇)
Paper Review: Future Generation Computer Systems: 2018 (三篇)
Paper Review: Journal of Ambient Intelligence and Humanized Computing: 2018 (二篇)
Paper Review: Wireless Communications and Mobile Computing: 2018 (一篇)
Paper Review: Multimedia Tools and Applications: 2018 (一篇)
Paper Review: Journal of Internet Technology: 2018 (一篇)
Paper Review: Quality & Quantity: 2018 (一篇)
Paper Review: IEEE Internet of Things: 2018 (一篇)
Paper Review: IEEE Access: 2018 (一篇)
Paper Review: IEEE Systems Journal: 2018 (一篇)
Paper Review: IEEE Transactions on Dependable and Secure Computing: 2018 (二篇)
Paper Review: ACM Transactions on Privacy and Security: 2018 (一篇)
Paper Review: IEEE Transactions on Cloud Computing: 2018 (一篇)
Paper Review: IEEE Transactions on Industrial Informatics: 2018 (一篇)
Paper Review: IEEE Consumer Electronics Magazine: 2018 (一篇)
Paper Review: International Journal of Communication Systems: 2018 (一篇)
Paper Review: International Journal of Network Security: 2018 (一篇)
Paper Review: Journal of Medical Systems: 2018 (一篇)
Paper Review: Security and Communication Networks: 2018 (一篇)
Paper Review: IEEE Consumer Electronics Magazine: 2017 (一篇)
Paper Review: Informatics in Medicine Unlocked: 2017 (一篇)
Paper Review: Journal of the Chinese Institute of Engineers: 2017 (一篇)
Paper Review: Energies: 2017 (一篇)
Paper Review: China Communications: 2017 (一篇)
Paper Review: Future Generation Computer Systems: 2017 (一篇)
Paper Review: Journal of Parallel and Distributed Computing: 2017 (一篇)
Paper Review: International Journal of Distributed Sensor Networks: 2017 (一篇)
Paper Review: Wireless Communications and Mobile Computing: 2017 (一篇)
Paper Review: International Journal of Communication Systems: 2017 (一篇)
Paper Review: Journal of Internet Technology: 2017 (一篇)
Paper Review: International Journal of Electronic Security and Digital Forensics: 2017 (一篇)
Paper Review: International Journal of Communication Systems: 2017 (一篇)
Paper Review: IEEE Access: 2017 (六篇)
Paper Review: IEEE Transactions on Industrial Informatics: 2017 (二篇)
Paper Review: Computers & Electrical Engineering: 2017 (一篇)
Paper Review: Nonlinear Dynamics: 2017 (一篇)
Paper Review: Computers & Electrical Engineering: 2016 (一篇)
Paper Review: Transactions on Emerging Telecommunications Technologies: 2016 (一篇)
Paper Review: KSII Transactions on Internet and Information Systems: 2016 (一篇)
Paper Review: Journal of Internet Technology: 2016 (一篇)
Paper Review: Computer Methods and Programs in Biomedicine: 2016 (二篇)
Paper Review: Journal of Information Science and Engineering: 2016 (四篇)
Paper Review: International Journal of Distributed Sensor Networks: 2016 (一篇)
Paper Review: Nonlinear Dynamics: 2016 (五篇)
Paper Review: Security and Communication Networks: 2016 (一篇)
Paper Review: IET Networks: 2016 (一篇)
Paper Review: IEEE Transactions on Industrial Electronics: 2015 (一篇)
Paper Review: Sensors: 2015 (二篇)
Paper Review: Journal of the Chinese Institute of Engineers: 2015 (一篇)
Paper Review: Information Security Journal: 2015 (一篇)
Paper Review: International Journal of Network Management: 2015 (一篇)
Paper Review: Journal of Intelligent Transportation Systems: 2015 (一篇)
Paper Review: Information Sciences: 2015 (一篇)
Paper Review: Nonlinear Dynamics: 2015 (一篇)
Paper Review: Journal of Medical Systems: 2015 (三篇)
Paper Review: Future Generation Computer Systems: 2015 (一篇)
Paper Review: Journal of Internet Services and Information Security: 2015 (一篇)
Paper Review: International Journal of Satellite Communications and Networking: 2015 (一篇)
Paper Review: Cryptologia: 2015 (一篇)
Paper Review: Telecommunication Systems: 2015 (二篇)
Paper Review: Security and Communication Networks: 2015 (三篇)
Paper Review: IEEE Systems Journal: 2015 (一篇)
Paper Review: IEEE Transactions on Vehicular Technology: 2014 (一篇)
Paper Review: IEEE Access: 2014 (一篇)
Paper Review: Pervasive and Mobile Computing: 2014 (一篇)
Paper Review: Computers & Security: 2014 (一篇)
Paper Review: Soft Computing: 2014 (一篇)
Paper Review: Security and Communication Networks: 2014 (一篇)
Paper Review: Computers: 2014 (一篇)
Paper Review: Sensors: 2014 (二篇)
Paper Review: Nonlinear Dynamics: 2014 (二篇)
Paper Review: Information Sciences: 2014 (一篇)
Paper Review: KSII Transactions on Internet and Information Systems: 2014 (一篇)
Paper Review: International Journal of Internet Protocol Technology: 2014 (一篇)
Paper Review: Journal of Communications Networks and Communications: 2014 (一篇)
Paper Review: Computer Methods and Programs in Biomedicine: 2014 (一篇)
Paper Review: International Journal of Ad Hoc and Ubiquitous Computing: 2014 (一篇)
Paper Review: Journal of Medical Systems: 2014 (三篇)
Paper Review: Computers in Biology and Medicine: 2014 (一篇)
Paper Review: Information Sciences Letters: 2014 (一篇)
Paper Review: International Journal of Communication Systems: 2014 (一篇)
Paper Review: Future Generation Computer Systems: 2014 (一篇)
Paper Review: Journal of Information Security and Applications: 2014 (二篇)
Paper Review: ICCCT 2014: The International Conference on Computer and Communication Technology (三篇)
Paper Review: IEEE Transactions on Dependable and Secure Computing: 2013 (一篇)
Paper Review: Journal of King Saud University - Computer and Information Sciences: 2013 (一篇)
Paper Review: Journal of Information Security and Applications: 2013 (一篇)
Paper Review: Security and Communication Networks: 2013 (一篇)
Paper Review: International Journal of Communication Systems: 2013 (二篇)
Paper Review: International Journal of Distributed Sensor Networks: 2013 (二篇)
Paper Review: International Journal of Communication Networks and Distributed Systems: 2013 (一篇)
Paper Review: Computers & Electrical Engineering: 2013 (一篇)
Paper Review: Journal of Medical Systems: 2013 (二篇)
Paper Review: IET Information Security: 2013 (一篇)
Paper Review: Information Security Journal: 2013 (一篇)
Paper Review: Information Technology and Control: 2013 (二篇)
Paper Review: Journal of Medical and Biological Engineering: 2013 (一篇)
Paper Review: Journal of Communications and Networks: 2013 (一篇)
Paper Review: International Journal of Ad Hoc and Ubiquitous Computing: 2013 (一篇)
Paper Review: Information Technology and Control: 2013 (一篇)
Paper Review: TANET 2013: Taiwan Academic Network Conference 2013 (二篇)
Paper Review: IEEE Transactions on Services Computing: 2012 (一篇)
Paper Review: IEEE Transactions on Industrial Informatics: 2012 (一篇)
Paper Review: IEEE Transactions on Parallel and Distributed Systems: 2012 (一篇)
Paper Review: Scientia Iranica: 2012 (一篇)
Paper Review: IET Information Security: 2012 (一篇)
Paper Review: Journal of Medical Systems: 2012 (一篇)
Paper Review: International Journal of Communication Systems: 2012 (二篇)
Paper Review: Information Technology and Control: 2012 (二篇)
Paper Review: Wireless Networks: 2012 (一篇)
Paper Review: Networking Science: 2012 (二篇)
Paper Review: Journal of Computer Science and Technology: 2012 (二篇)
Paper Review: ISA 2012: The 6th International Conference on Information Security and Assurance (二篇)
Paper Review: IEEE Transactions on Dependable and Secure Computing: 2011 (一篇)
Paper Review: IEEE Transactions on Mobile Computing: 2011 (一篇)
Paper Review: IEEE Journal on Selected Areas in Communications: 2011 (一篇)
Paper Review: International Journal of Communication Systems: 2011 (一篇)
Paper Review: Information Technology and Control: 2011 (一篇)
Paper Review: KSII Transactions on Internet and Information Systems: 2011 (一篇)
Paper Review: Mathematical and Computer Modelling: 2011 (一篇)
Paper Review: Scientia Iranica: 2011 (一篇)
Paper Review: IETE Technical Review: 2011 (一篇)
Paper Review: IET Wireless Sensor Systems: 2011 (一篇)
Paper Review: The Image Science Journal: 2011 (一篇)
Paper Review: Computers and Mathematics with Applications: 2011 (一篇)
Paper Review: Sensors: 2011 (一篇)
Paper Review: Journal of Medical Systems: 2011 (一篇)
Paper Review: Networking and Electronic Commerce Journal: 2011 (一篇)
Paper Review: The Computer Journal: 2011 (一篇)
Paper Review: Security and Communication Networks: 2011 (三篇)
Paper Review: Journal of Computers: 2011 (一篇)
Paper Review: IEEE Transactions on Vehicular Technology: 2010 (一篇)
Paper Review: Security and Communication Networks: 2010 (一篇)
Paper Review: International Journal of Network Security: 2010 (六篇)
Paper Review: Sensors: 2010 (一篇)
Paper Review: Wireless Communications and Mobile Computing: 2010 (二篇)
Paper Review: ICCT 2010: The 2010 International Conference on Computer Technology (三篇)
Paper Review: International Journal of Network Security: 2009 (八篇)
Paper Review: IET Communications: 2009 (一篇)
Paper Review: Journal of Internet Technology: 2009 (一篇)
Paper Review: IETE Technical Review: 2009 (一篇)
Paper Review: ITNG 2009: 6th International Conference on Information Technology: New Generations (三篇)
Paper Review: Computer Communications: 2008 (一篇)
Paper Review: Security and Communication Networks: 2008 (一篇)
Paper Review: International Journal of Network Security: 2008 (七篇)
Paper Review: IET Communications: 2008 (一篇)
Paper Review: Computer Systems Science and Engineering: 2008 (二篇)
參加研討會
2023/12/07-12/09(臺灣,新北) 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023) - 論文發表
2023/04/21-04/25(日本,東京) 2023 9th International Conference on Applied System Innovation (ICASI 2023) - 海報發表
2022/05/27-05/29(臺灣,澎湖) 2022第二十屆離島資訊技術與應用研討會 (ITAOI 2022) - 論文發表(澎湖科技大學主辦)
2021/11/18-11/20(臺灣,台中) 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021) - 論文發表
2021/07/26-07/29(美國,拉斯維加斯) 2021 International Conference on Security and Management (SAM'21) - 線上論文發表
2021/05/14-05/15(臺灣,屏東) 2021數位生活科技研討會 (DLT 2021) - 論文發表(屏東大學主辦)
2020/06/05-06/08(日本,東京) 2020 5th International Conference on Knowledge Engineering and Applications (ICKEA 2020) - 線上論文發表
2019/05/25-05/27(日本,京都) 2019 4th International Conference on Information and Network Technologies (ICINT 2019) - 論文發表
2018/11/19-11/22(法國,巴黎) 2018 5th International Conference on Internet of Vehicles (IOV 2018) - 論文發表
2018/05/24-05/26(日本,大阪) 2018 3rd International Conference on Information and Network Technologies (ICINT 2018) - 論文發表
2017/05/11-05/14(義大利,阿瑪菲海岸) 2017 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017) - 論文發表
2017/03/20-03/23(中國大陸,澳門) 2017 8th iCatse Conference on Information Science and Applications (ICISA 2017) - 論文發表
2016/06/18-06/19(臺灣,屏東) 2016數位生活科技研討會 (DLT 2016) - 論文發表(屏東大學主辦)
2016/06/14-06/17(日本,橫濱) 2016 IEEE 17th International Conference on High Performances Switching and Routing (IEEE HPSR 2016) - 論文發表
2015/11/18-11/20(中國大陸,張家界) The 2nd International Workshop on Security and Privacy Protection in Computer and Network Systems (SPPCN 2015) - 論文發表
2015/06/26-06/27(臺灣,高雄) 2015數位生活科技研討會 (DLT 2015) - 論文發表(高雄第一科技大學主辦)
2015/06/02-06/05(英國,倫敦) The 6th International Conference on Ambient Systems, Networks and Technologies (ANT 2015) - 論文發表
2015/01/12-01/14(柬埔寨,暹粒) The 2015 International Conference on Information Networking (ICOIN 2015) - 論文發表
2014/09/01-09/03(中國大陸,北京) The 2014 International Symposium on Cloud and Services Computing (SC2 2014) - 論文發表
2013/10/30-10/31(澳洲,雪梨) The 2013 International Conference on Advances in Computer, Electrical & Electronic Engineering (ICACEEE 2013) - 論文發表
2013/05/16(臺灣,台南) 2013企業電子化實務應用研討會 - 論文發表(台南應用科技大學主辦)
2013/04/26-04/28(菲律賓,宿霧) The 2013 International Conference on Information Security and Assurance (ISA 2013) - 論文發表
2013/04/08-04/09(泰國,曼谷) The 2013 International Conference on Information and Network Security (ICINS 2013) - 論文發表
2012/06/28-06/30(印尼,峇里島) The Third International Conference Ubiquitous Computing and Multimedia Applications (UCMA 2012) - 論文發表
2012/04/28-04/30(中國大陸,上海) The 6th International Conference on Information Security and Assurance (ISA 2012) - 論文發表
2012/03/28(臺灣,台南) EITS 2012數位教學暨資訊實務應用研討會 - 論文發表(南台科技大學主辦)
2011/12/12-12/15(韓國,濟州) The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2011) - 論文發表
2011/12/09(臺灣,台南) 2011企業電子化實務應用研討會 - 主持人及論文發表(台南應用科技大學主辦)
2011/07/11-07/13(美國,裡奇蒙) 25th Annual WG 11.3 Conference on Data and Applications Security and Prvacy (DBSEC 2011) - 論文發表
2010/12/23(臺灣,台南) 2010電子化企業實務研討暨論文發表會 - 論文發表(台南應用科技大學主辦)
2010/12/09-12/11(韓國,光州) The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010) - 論文發表
2010/11/29-12/01(埃及,開羅) The 2010 International Conference on Intelligent Systems Design and Applications (ISDA 2010) - 論文發表
2010/03/23-03/26(日本,福岡) The 2010 International Conference on Computational Science and Its Applications (ICCSA 2010) - 論文發表
2009/12/17(臺灣,台南) 2009電子化企業實務研討暨論文發表會 - 主持人及論文發表(台南科技大學主辦)
2009/08/18-08/20(中國大陸,西安) The 5th International Conference on Information Assurance and Security (IAS 2009) - 論文發表
2009/04/27-04/29(美國,拉斯維加斯) The 6th International Conference on Information Technology: New Generations (ITNG 2009) - 論文發表
2008/12/25(臺灣,台南) 2008全球運籌管理產業研討暨論文發表會 - 主持人及論文發表(台南科技大學主辦)
2007/08/26-08/29(馬來西亞,吉隆坡) The 2007 International Conference on Computational Science and Its Applications (ICCSA 2007) - 論文發表
2006/12/04-12/06(臺灣,台北) International Computer Symposium 2006 (ICS 2006) - 論文發表
2003/12/14-12/16(臺灣,高雄) 2003 International Conference on Informatics, Cybernetics and Systems (ICICS 2003) - 論文發表
參與學術團體
國際電子電機工程師學會(IEEE)資深會員,會員編號:91163422
中華民國資訊安全學會(CCISA)永久會員,會員編號:R109009
中華智慧運算學會(SSCI)永久會員
台灣E化資安分析管理協會(ESAM)永久會員
計算機智慧研究學會(MIR Labs)會員
參與學位論文口試工作
東海大學數位創新碩士學位學程研究生蔣依倫碩士學位考試委員 (2024/04/19)
東海大學數位創新碩士學位學程研究生林楷碩士學位考試委員 (2024/01/26)
東海大學數位創新碩士學位學程研究生董映彤碩士學位考試委員 (2023/07/13)
東海大學數位創新碩士學位學程研究生劉子瑜碩士學位考試委員 (2023/07/13)
屏東大學電腦科學與人工智慧學系研究生張文奕碩士學位考試委員 (2023/07/12)
屏東大學電腦科學與人工智慧學系研究生姜秉翰碩士學位考試委員 (2023/07/12)
屏東大學電腦科學與人工智慧學系多媒體動畫碩士在職學位學程研究生邱荻芬碩士學位考試委員 (2023/07/12)
輔仁大學圖書資訊所研究生林聖邦碩士學位考試委員 (2021/11/26)
雲林科技大學資訊管理所研究生王浚丞碩士學位考試委員 (2018/07/10)
雲林科技大學資訊管理所研究生徐祥理碩士學位考試委員 (2018/07/10)
屏東大學資訊科學系多媒體動畫所研究生周仁禾碩士學位考試委員 (2018/01/11)
輔仁大學圖書資訊所研究生鄭仲倫碩士學位考試委員 (2017/06/30)
輔仁大學圖書資訊所研究生陳致瑋碩士學位考試委員 (2017/06/30)
東海大學資訊管理所研究生李嘉慈碩士學位考試委員 (2015/07/16)
中興大學資訊管理所研究生李欽文碩士學位考試委員 (2015/06/26)
輔仁大學圖書資訊所研究生邱詩婷碩士學位考試委員 (2014/12/03)
輔仁大學圖書資訊所研究生許哲維碩士學位考試委員 (2013/07/17)
輔仁大學圖書資訊所研究生賴彥銘碩士學位考試委員 (2013/07/17)
中興大學資訊管理所研究生徐詩婷碩士學位考試委員 (2013/06/21)
中興大學資訊管理所研究生鍾佩珊碩士學位考試委員 (2013/06/21)
輔仁大學圖書資訊所研究生吳秉憲碩士學位考試委員 (2013/01/29)
台南應用科技大學國際企業經營所研究生黃清華碩士學位考試委員 (2013/01/25)
中興大學資訊管理所研究生呂勇志碩士學位考試委員 (2012/01/13)
台南科技大學商學與管理所研究生傅一帆碩士學位考試委員 (2010/07/14)
亞洲大學光電與通訊所研究生張瑞翔碩士學位考試委員 (2010/06/23)
參與公民營機構活動
李俊達,“102年公務人員高等考試三級考試暨普通考試閱卷委員”,考試院,考授選高二字第1021400390號
專利核准
李俊達,李欽文,“應用於雲端儲存服務之關鍵字搜尋方法”,中華民國專利發明,專利核准,證書號數:I585608,有效日期:2017-06-01~2035-11-24
李俊達,沈肇基,“字典索引之建立方法及使用方法”,中華民國專利發明,專利核准,證書號數:I463338,有效日期:2014-12-01~2030-09-12
李俊達,“線上遊戲裝置”,中華民國專利新型,專利核准,證書號數:M384690,有效日期:2010-07-21~2020-03-21
李俊達,“多國語言之導覽裝置”,中華民國專利新型,專利核准,證書號數:M395863,有效日期:2011-01-01~2020-08-25
李俊達,李欽文,“自助付費之點餐設備”,中華民國專利新型,專利核准,證書號數:M425350,有效日期:2012-03-21~2021-11-21
李俊達,鄭建忠,朱奕叡,張孝虔,“植基於RFID技術之車輛監控管理系統”,中華民國專利新型,專利核准,證書號數:M463403,有效日期:2013-10-11~2023-06-04
李俊達,王浚丞,陳華宣,許瓊儷,徐敏傑,“植基於RFID技術之票卷與走失人口的管理系統”,中華民國專利新型,專利核准,證書號數:M504290,有效日期:2015-07-01~2024-12-22
李俊達,王浚丞,陳松志,“結合記名式儲值卡之郵票購買與郵件寄送設備”,中華民國專利新型,專利核准,證書號數:M520170,有效日期:2016-04-11~2025-12-24
榮譽
李俊達,“入選史丹福大學2020~2023年發佈「全球前2%頂尖科學家」榜單”
2020 Version 2, Published: 8 October 2020 (Source: https://elsevier.digitalcommonsdata.com/datasets/btchxktzyw/2)
「終身科學影響力排行榜」,排名159,945
「2019 年度科學影響力排行榜」,排名80,937
2021 Version 3, Published: 20 October 2021 (Source: https://elsevier.digitalcommonsdata.com/datasets/btchxktzyw/3)
「終身科學影響力排行榜」,排名152,864
「2020 年度科學影響力排行榜」,排名89,840
2022 Version 4, Published: 10 Oct 2022 (Source: https://elsevier.digitalcommonsdata.com/datasets/btchxktzyw/4)
「終身科學影響力排行榜」,排名157,277
「2021 年度科學影響力排行榜」,排名141,360
2023 Version 6, Published: 4 Oct 2023 (Source: https://elsevier.digitalcommonsdata.com/datasets/btchxktzyw/6)
「終身科學影響力排行榜」,排名155,020
「2022 年度科學影響力排行榜」,排名153,093
李俊達,“行政院科技部108年度補助大專校院獎勵特殊優秀人才”,行政院科技部,計畫編號:108-3114-C-165-001-ES
李俊達,“行政院科技部106年度補助大專校院獎勵特殊優秀人才”,行政院科技部,計畫編號:106-3114-C-165-001-ES
李俊達,“2017年台南市國際龍舟錦標賽-教師組第二名”,台南應用科技大學,台南市政府教體處動字第1060319496號
李俊達,“行政院科技部105年度補助大專校院獎勵特殊優秀人才”,行政院科技部,計畫編號:105-3114-C-165-001-ES
李俊達,“2016年台南市國際龍舟錦標賽-教師組第四名”,台南應用科技大學,台南市政府教體處動字第1050505763號
李俊達,“2015年大專院校物聯網暨RFID專題競賽優等獎”,RFID遊樂園管理系統-以義大世界為例,參與學生 :王浚丞、許瓊儷
李俊達,“104年專利分析暨先進技術布局競賽佳作”,植基於RFID技術之票卷與走失人口的管理系統,參與學生 :王浚丞、 徐敏傑
李俊達,“行政院科技部104年度補助大專校院獎勵特殊優秀人才”,行政院科技部,計畫編號:104-3114-C-165-001-ES
李俊達,“行政院科技部103年度補助大專校院獎勵特殊優秀人才”,行政院科技部,計畫編號:103-3114-C-165-001-ES
李俊達,“行政院國科會102年度補助大專校院獎勵特殊優秀人才”,行政院國科會,計畫編號:102-3114-C-165-001-ES
李俊達,“2013年台南市國際龍舟錦標賽-公教混合組第五名”,台南應用科技大學,台南市政府教體處動字第1020484876號
李俊達,“2011 IJICIC Most Cited Paper Award”,International Journal of Innovative Computing, Information and Control,論文名稱:An Efficient Sensor-To-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks
李俊達,“名列Marquis Who's Who in the World 2012”,29th Edition世界名人錄,2012年01月
李俊達,“103學年度第1學期教學評量成績優等”,台南應用科技大學,台南科大進獎字第1030000002號
李俊達,“102學年度第2學期教學評量成績優等”,台南應用科技大學,(103)台南科大教課獎字第581號
李俊達,“102學年度第1學期教學評量成績優等”,台南應用科技大學,台南科大進獎字第102001號
李俊達,“99學年度教師評鑑成績優等”,台南應用科技大學,台南科大人教評字第100173號
李俊達,“99學年度第1學期教學評量成績優等”,台南應用科技大學,台南科大進獎字第099003號
李俊達,“98學年度教師評鑑成績優等”,台南科技大學,台南科大人教評字第099178號
李俊達,“2009電子化企業資訊與管理專題競賽第二名”,植基於RFID技術之大額付款系統於高級酒應用,參與學生:王廉軍、曾瑞彬、蘇威鴻、黃意婷、陳信廷、林秀芸、林怡秀、謝俊緯
李俊達,“97學年度教師評鑑成績優等”,台南科技大學,台南科大人教評字第098177號
專業證照
李俊達,“CCEA-App Inventor雲端手機應用程式設計師”,中華民國電腦教育發展協會,證書號數:TIEA-CCPMT-10400089,有效日期:2019-07-31
李俊達,“CCPMT-文化創意事業經營行銷講師”,臺灣數位教學創意發展協會,證書號數:9389958,有效日期:2015-08-19
李俊達,“CCPMP-文化創意產品行銷企劃員”,臺灣數位教學創意發展協會,證書號數:TIEA-CCPMP-10400083,有效日期:2015-08-18
李俊達,“Google Apps Education Docs Individual Qualification”,Google Apps,證書號數:307058,有效日期:2013-07-05
李俊達,“Google Apps Education Sites Individual Qualification”,Google Apps,證書號數:205072,有效日期:2013-07-04
李俊達,“ECM-電子商務管理師”,臺灣數位教學創意發展協會,證書號數:TDTCDA-ECM-10000285,有效日期:2011-11-23
李俊達,“電腦軟體應用乙級”,行政院勞工委員會,證書號數:001924,有效日期:2001-02-19
學生專題指導
以臉部捕捉技術為基礎之虛擬人物建置及其應用,曾治程、王宜宏、許崇祐、黃柏翔、陳睿煬、莊子昌、許育銘,台南應用科大資管系110級,四資四A
無人機模組化之設計與研究,古宗翰、林柏辰、潘俐瑄,台南應用科大資管系110級,四資四A
植基於RFID技術之生存遊戲計分系統,鄭凱鴻、林原右、方珮溱、劉澤勳、郭家弘,台南應用科大資管系108級,四資四A/B
以無線射頻辨識技術為基礎之網頁認證系統-以遠距醫療應用為例,王璿閔、余振維、林宗蒝、莊紹文、侯淑娟,台南應用科大資管系107級,四資四B
雲端儲存之關鍵字搜尋與群組權限分級系統,陳松志、江泉龍、陳家得、葉子源、鍾偉光,台南應用科大資管系106級,四資四B
RFID遊樂園管理系統-以義大世界為例,王浚丞、許淯淇,台南應用科大資管系105級,四資四A
一個以RFID技術為基礎之識別與定位系統,方怡婷、何怡潔、郭柏姍、蔡哲、吳柏錡,台南應用科大資管系104級,四資四A
RFID餐飲管理系統,李欽文、邱炳諵、吳政毅、鄭亦棨、吳政霖,台南應用科大資管系102級,四資四A/B
RFID多國語言展覽解說系統,劉貞汝、林宗穎、姚建竹、陳昭翔,台南應用科大資管系101級,四資四B
WiCash交易系統,王廉軍、曾瑞彬、謝俊緯、陳信廷,台南科大資管系99級,資四A
RFID之高級酒應用,蘇威鴻、黃意婷、林怡秀、林秀芸、王郁婷,台南科大資管系99級,資四A
一個具安全通訊與雙向認證之RFID交易機制,楊雅雯、李翊綺、吳怡慧,台南科大資管系99級,四資四A
碩博士論文
李俊達,博士論文:On the Security Mechanisms for Wireless Ad Hoc Networks and Their Applications (June 2008)
李俊達,碩士論文:A Multi-Layer Searching Technique for Quickly Retrieval (June 2004)
常用連結
輔仁大學
輔仁大學人工智慧與資訊安全學士學位學程
輔仁大學教職員資訊入口網
FJU Web Mail
TUT Web Mail
國科會
Facebook
Yahoo!奇摩
Google
International Journal of Network Security
Security Call for Papers at WikiCFP
Research Bible
大專校院校務資訊公開平臺
最近一次更新:2024年04月24日