On Manipulating Routing Table to Realize Redirect Attacks in O-RAN by Malicious xApp
Tseng, Chi-heng, Hung, Cheng-Feng, Hong, Bing-Kai, Cheng, Shin-Ming
Published in 2023 26th International Symposium on Wireless Personal Multimedia Communications (WPMC) (19.11.2023)
Published in 2023 26th International Symposium on Wireless Personal Multimedia Communications (WPMC) (19.11.2023)
Get full text
Conference Proceeding
Conformance Testing for 5G O-RAN Entities through MEC
Lin, Yu-Xiang, Hong, Bing-Kai, Cheng, Shin-Ming
Published in 2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW) (01.11.2022)
Published in 2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW) (01.11.2022)
Get full text
Conference Proceeding
Non-invasive liquid level detection with dielectric capacitive method
Fang-Ming Yu, Bing-Kai Hong, Wen-Pin Lin, Chien-Hung Chao, Ko-Wen Jwo
Published in 2013 IEEE International Symposium on Consumer Electronics (ISCE) (01.06.2013)
Published in 2013 IEEE International Symposium on Consumer Electronics (ISCE) (01.06.2013)
Get full text
Conference Proceeding
Toward Large-Scale Rogue Base Station Attacks Using Container-Based Virtualization
Heish, Wan-Lin, Hong, Bing-Kai, Cheng, Shin-Ming
Published in 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall) (01.09.2019)
Published in 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall) (01.09.2019)
Get full text
Conference Proceeding
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures
Cheng, Shin-Ming, Ban, Tao, Huang, Jr-Wei, Hong, Bing-Kai, Inoue, Daisuke
Published in 2020 IEEE Security and Privacy Workshops (SPW) (01.05.2020)
Published in 2020 IEEE Security and Privacy Workshops (SPW) (01.05.2020)
Get full text
Conference Proceeding
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices
Hong, Bing-Kai, Huang, Jr-Wei, Ban, Tao, Isawa, Ryoichi, Cheng, Shin-Ming, Inoue, Daisuke, Nakao, Koji
Published in 2019 14th Asia Joint Conference on Information Security (AsiaJCIS) (01.08.2019)
Published in 2019 14th Asia Joint Conference on Information Security (AsiaJCIS) (01.08.2019)
Get full text
Conference Proceeding
A Cloud-based Intelligent Skin and Scalp Analysis System
Huang, Wen-Shiung, Hong, Bing-Kai, Cheng, Wen-Huang, Sun, Shih-Wei, Hua, Kai-Lung
Published in 2018 IEEE Visual Communications and Image Processing (VCIP) (01.12.2018)
Published in 2018 IEEE Visual Communications and Image Processing (VCIP) (01.12.2018)
Get full text
Conference Proceeding
Toward Intelligent IoT Endpoint Detection and Response Using Digital Twins via Firmware Emulation
Cheng, Shin-Ming, Lui, Yi-Ching, Tsai, Nien-Jen, Hong, Bing-Kai
Published in IEEE internet of things magazine (01.11.2024)
Published in IEEE internet of things magazine (01.11.2024)
Get full text
Magazine Article
Attack Detection and Mitigation in MEC-Enabled 5G Networks for AIoT
Cheng, Shin-Ming, Hong, Bing-Kai, Hung, Cheng-Feng
Published in IEEE internet of things magazine (01.09.2022)
Published in IEEE internet of things magazine (01.09.2022)
Get full text
Magazine Article
An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds
Hsiao, Hsu-Chun, Huang, Chun-Ying, Cheng, Shin-Ming, Hong, Bing-Kai, Hu, Hsin-Yuan, Wu, Chia-Chien, Lee, Jian-Sin, Wang, Shih-Hong, Jeng, Wei
Year of Publication 09.11.2020
Year of Publication 09.11.2020
Get full text
Journal Article
Predicting the Endpoint Phosphorus Content of Molten Steel in BOF by Two-stage Hybrid Method
WANG, Hong-bing, CAI, Jun, FENG, Kai
Published in Journal of iron and steel research, international (01.04.2014)
Published in Journal of iron and steel research, international (01.04.2014)
Get full text
Journal Article