Shin-Ming Cheng 鄭欣明

Professor,
Dept. of Computer Science and Information Engineering,
National Taiwan University of Science and Technology

Joint Appointment Associate Research Fellow,
Research Center for Information Technology Innovation,
Academia Sinica,

Email: smcheng@mail.ntust.edu.tw

Shin-Ming Cheng 鄭欣明

Professor,
Dept. of Computer Science and Information Engineering, National Taiwan University of Science and Technology

Books & Book Chapters

[B3] P.-Y. Chen, S.-M. Cheng, W. C. Ao, H.-Y. Hsu, and K.-C. Chen, "Delay models for epidemic-like routing in multihop secondary networks," invited chapter on Introduction to Cognitive Radio Networks and Applications, G. Tomar, A. Bagwari, and J. Kanti, CRC Press, July 2016.
[B2] S.-M. Cheng, P.-Y. Chen, and K.-C. Chen, "Malware propagation and control in Internet of Things," invited chapter on Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, F. Hu, CRC Press, Mar. 2016.
[B1] S.-M. Cheng and K.-C. Chen, "Cognitive radios to mitigate interference in macro/femto heterogeneous networks," invited chapter on Heterogeneous Cellular Networks, R. Q. Hu and Y. Qian, Wiley, June 2013.

International Journals

[J42] G.-Y. Lin, P.-Y. Wang, S.-M. Cheng, and H.-M. Lee, "Improving robustness in IoT malware detection through execution order analysis", ACM Transactions on Embedded Computing Systems, vol. 24, no. 1, Jan. 2025.
[J41] C.-H. Yang, B. M. Maina, S.-M. Cheng, and H.-M. Lee, "An adversarial attack on artificial intelligence malware detection in consumer Internet of Things", IEEE Consumer Electronic Magazine, accepted for publication, Oct. 2024. (SI on Adversarial Examples in CE: Deceptive Threats to AI Systems)
[J40] S.-M. Cheng, Y.-C. Lui, N.-J. Tsai, and B.-K. Hong, "Toward intelligent IoT endpoint detection and response using digital twins via firmware emulation", IEEE Internet of Things Magazine, vol. 7, no. 6, pp. 20-26, Nov. 2024. (SI on IoT Security and Provisioning in Cyber-Enabled Niche Critical Infrastructure)
[J39] C.-F. Hung, Y.-R. Chen, C.-H. Tseng, and S.-M. Cheng, "Security threats to xApps access control and E2 interface in O-RAN", IEEE Open Journal of the Communications Society, vol. 5, pp. 1197-1203, Feb. 2024.
[J38] R. Kaliski and S.-M. Cheng, "Supporting 6G mission critical services on O-RAN", IEEE Internet of Things Magazine, vol. 6. no. 3, pp. 32-37, Sep. 2023. (SI on 6G Mission-Critical Internet of Things: Services and Enabling Technologies)
[J37] C.-Y. Wu, T. Ban, S.-M. Cheng, T. Takahashi, and D. Inoue, "IoT malware classification based on reinterpreted function-call graphs", Computers & Security, vol. 125, Feb. 2023.
[J36] B.-R. Chen, S.-M. Cheng, and M. B. Mwangi, "A mobility-based epidemic model for IoT malware spread," IEEE Access, vol. 10, pp. 107929-107941, Oct. 2022.
[J35] S.-M. Cheng, B.-K. Hong, and C.-F. Hung, "Attack detection and mitigation in MEC-Enabled 5G networks for AIoT," IEEE Internet of Things Magazine, vol. 5, no. 3, pp. 76-81, Sep. 2022. (SI on Secure Communications over The Internet of Artificially Intelligent Things)
[J34] Z. Kotulski, W. Niewolski, T. Nowak, M. Sepczuk, R.-H. Hsu, S.-M. Cheng, S.-C. Chang, T.-Y. Yu, and C.-F. Hung, "ACMEC - Access control in 5G MEC, joint research project of NTUST (Taiwan) and WUT (Poland)," Telecommunications Review - Telecommunications News, vol. 4, pp. 172-176, Apr. 2022.
[J33] C.-H. Lee, R. Y. Chang, S.-M. Cheng, C.-H. Lin, and C.-H. Hsiao, "Joint beamforming and power allocation for M2M/H2H co-existence in green dynamic TDD networks: Low-complexity optimal designs," IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4799-4815, Mar. 2022.
[J32] T.-L. Wan, T. Ban, S.-M. Cheng, Y.-T. Lee, B. Sun, R. Isawa, T. Takahashi, and D. Inoue, "An efficient approach to detect and classify IoT malware based on byte sequences from executable files," IEEE Open Journal of the Computer Society, vol. 1, pp. 262—275, Nov. 2020.
[J31] S.-Y. Lien, D.-J. Deng, C.-C. Lin, H.-L. Tsai, T. Chen, C. Cuo, and S.-M. Cheng, "3GPP NR sidelink transmissions toward 5G V2X," IEEE Access, vol.8, pp. 35368—35382, Feb. 2020.
[J30] Y.-C. Li and S.-M. Cheng, "Privacy preserved mobile sensing using region-based group signature," IEEE Access, vol. 6, no. 1, pp. 61556—61568, Dec. 2018.
[J29] S.-C. Hung, H. Hsu, S.-M. Cheng, Q. Chu, and K.-C. Chen, "Delay guaranteed network association for mobile machines in heterogeneous cloud radio access network," IEEE Transactions on Mobile Computing, vol. 17, no. 12, pp. 2744—2760, Dec. 2018.
[J28] P.-Y. Chen, S.-M. Cheng, and M.-H. Sung, "Analysis of data dissemination and control in Social Internet of Vehicles," IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2467—2477, Aug. 2018. (SI on Recent Advances on Social Internet of Vehicles)
[J27] P.-Y. Chen, S.-M. Cheng, and H.-Y. Hsu, "Analysis of information delivery dynamics in cognitive sensor networks using epidemic models," IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2333—2342, Aug. 2018. (SI on Cognitive Internet of Things)
[J26] Y.-J. Liu, S.-M. Cheng, and Y.-L. Hsueh, "eNB selection for machine type communications using reinforcement learning based markov decision process," IEEE Transactions on Vehicular Technology, vol. 66, no. 12, pp. 11330—11338, Dec. 2017.
[J25] S.-M. Cheng, P.-Y. Chen, C.-C. Lin, and H.-C. Hsiao, "Traffic-aware patching for cyber security in mobile IoT," IEEE Communications Magazines, vol. 55, no. 7, pp. 29—35, July 2017. (SI on Traffic Measurements for Cyber Security, IEEE Xplore Innovation Spotlight )
[J24] S.-Y. Lien, S.-M. Cheng, K.-C. Chen, and D. I. Kim, "Resource-optimal licensed-assisted access in heterogeneous cloud radio access networks with heterogeneous carrier communications," IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 9915—9930, Dec. 2016.
[J23] P.-Y. Chen, C.-C. Lin, S.-M. Cheng, H.-C. Hsiao, and C.-Y. Huang, "Decapitation via digital epidemics: A bio-inspired transmissive attack," IEEE Communications Magazines, vol. 54, no. 6, pp. 75—81, June 2016. (SI on Bio-inspired Cyber Security for Communications and Networking)
[J22] P.-Y. Chen, S.-M. Cheng, P.-S. Ting, C.-W. Lien, and F.-J. Chu, "When crowdsourcing meets mobile sensing: A social network perspective," IEEE Communications Magazines, vol. 53, no. 10, pp. 157—163, Oct. 2015. (SI on Social Networks Meet Next Generation Mobile Multimedia Internet)
[J21] P.-Y. Chen and S.-M. Cheng, "Sequential defense against random and intentional attacks in complex networks," Physical Review E, vol. 91, no. 2, pp. 022805, Feb. 2015.
[J20] P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Optimal control of epidemic information dissemination over networks," IEEE Transactions on Cybernetics, vol. 44, no. 12, pp. 2316—2328, Dec. 2014.
[J19] P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Information fusion to defend intentional attack in Internet of Things," IEEE Internet of Things Journal, vol. 1, no. 4, pp. 337—348, Aug. 2014.
[J18] S.-Y. Lien, S.-M. Cheng, and K.-C. Chen, "Interference mitigation in CR-enabled heterogeneous networks," IEICE Transactions on Communications, vol. E96-B, no. 6, June 2013. (invited paper)
[J17] D. Liau, K.-C. Chen, and S.-M. Cheng, "A predator-prey model for dynamics of cognitive radios," IEEE Communications Letters, vol. 17, no. 3, pp. 467—470, Mar. 2013.
[J16] S.-Y. Lien, S.-M. Cheng, S.-Y. Shih, and K.-C. Chen, "Radio resource management for QoS guarantees in cyber-physical systems," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1752—1761, Sep. 2012. (SI on Cyber-Physical Systems)
[J15] P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Smart attacks in smart grid communication networks," IEEE Communications Magazine, vol. 50, no. 8, pp. 24—29, Aug. 2012. (SI on Cyber Security for Smart Grid Communications, highlighted by IEEE COMSOC Technology News, Sep. 2012)
[J14] S.-M. Cheng, W. C. Ao, F.-M. Tseng and K.-C. Chen, "Design and analysis of downlink spectrum sharing in two-tier cognitive femto networks," IEEE Transactions on Vehicular Technology, vol. 61, no. 5, pp. 2194—2207, June 2012.
[J13] W. C. Ao, S.-M. Cheng, and K.-C. Chen, "Connectivity of multiple cooperative cognitive radio ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 263—270, Feb. 2012. (SI on Advances in Cognitive Radio Networking and Communications)
[J12] S.-M. Cheng, P.-Y. Chen, and K.-C. Chen, "Ecology of cognitive radio ad hoc networks," IEEE Communications Letters, vol. 15, no. 7, pp. 764—766, July 2011.
[J11] S.-M. Cheng, S.-Y. Lien, F.-S. Chu, and K.-C. Chen, "On exploiting cognitive radio to mitigate interference in Macro/femto heterogeneous networks," IEEE Wireless Communications Magazine, vol. 18, no. 3, pp. 40—47, June 2011. (SI on HetNets - A New Paradigm for Increasing Cellular Capacity and Coverage)
[J10] S.-M. Cheng, W. C. Ao, and K.-C. Chen, "Efficiency of a cognitive radio link with opportunistic interference mitigation," IEEE Transactions on Wireless Communications, vol. 10 no. 6, pp. 1715—1720, June 2011.
[J9] S.-M. Cheng, W. C. Ao, P.-Y. Chen, and K.-C. Chen, "On modeling malware propagation in generalized social networks," IEEE Communications Letters, vol. 15. no. 1, pp. 25—27, Jan. 2011.
[J8] C.-K. Yu, K.-C. Chen, and S.-M. Cheng, "Cognitive radio network tomography," IEEE Transactions on Vehicular Technology, vol. 59. no. 4, pp. 1980—1997, May 2010.
[J7] P. Lin, S.-M. Cheng, and W. Liao "Modeling key caching for mobile IP authentication, authorization, and accounting (AAA) services," IEEE Transactions on Vehicular Technology, vol. 58. no. 7, pp. 3596—3608, Sept. 2009.
[J6] Y.-C. Lai, P. Lin, and S.-M. Cheng, "Performance modeling for application-level integration of heterogeneous wireless networks," IEEE Transactions on Vehicular Technology, vol. 58. no. 5, pp. 2426—2434, June 2009.
[J5] M. Guizani, P. Lin, S.-M. Cheng, D.-W. Huang, and H.-L Fu, "Performance evaluation for minislot allocation for wireless mesh network," IEEE Transactions on Vehicular Technology, vol. 57, no. 6, pp. 3732—3745, Nov. 2008.
[J4] S.-M. Cheng, W.-R. Lai, P. Lin, and K.-C. Chen, "Key management for UMTS MBMS," IEEE Transactions on Wireless Communications, vol. 7, no. 9, pp. 3619—3628, Sept. 2008.
[J3] P. Lin, H.-M. Chang, Y. Fang, and S.-M. Cheng, "HISNs: distributed gateways for application-level integration of heterogenous wireless networks," ACM Wireless Network, vol. 14, no. 1, pp. 71—85, Feb. 2008.
[J2] R.-G. Cheng, S.-M. Cheng, and P. Lin, "Power-efficient routing (PER) mechanism for ODMA systems," IEEE Transactions on Vehicular Technology, vol. 55, no. 4, pp. 1311—1319, July 2006.
[J1] S.-M. Cheng, P. Lin, G.-H. Tu, L.-C. Fu, and C.-F. Liang, "An intelligent GGSN dispatching mechanism for UMTS," Computer Communications, vol. 28, no. 8, pp. 947—955, May 2005.

International Conferences

[C61] W.-R. Zhuang, T. Ban, S.-M. Cheng, T. Morikawa, and T. Takahashi, "Novel malware similarity analysis: Regional longest common substring algorithm with elastic suffix tree" in Proc. I-SPAN 2025, Bangkok, Thailand, Jan. 2025.
[C60] M.-Y. Chen, T. Ban, S.-M. Cheng, and T. Takahashi, "Classifying IoT malware with limited data: A few-shot learning framework", in Proc. ICONIP 2024, Auckland, New Zealand, Dec. 2024.
[C59] W.-J. Liao, T. Ban, S.-M. Cheng, and T. Takahashi, "Reinterpreting system calls for enhanced IoT malware analysis using function call graphs," in Proc. ICISC 2024, Seoul, Korea, Nov. 2024.
[C58] S.-M. Cheng, B.-H. ChangChien, W.-H. Lin, C.-C. Fan, C.-Y. Chen, and C.-C. Liao, "A highly scalable automated universal binary malware analysis framework for healthcare and medical SaaS", in Proc. ICMHI 2024, Yokohama, Japan, May 2024, pp. 102-107.
[C57] J.-W. Huang, N.-J. Tsai, and S.-M. Cheng, "Poster: Discovering authentication bypass vulnerabilities in IoT devices through guided concolic execution," in Proc. NDSS 2024, San Diego, CA, USA, Feb. 2024.
[C56] Y.-T. Cheng and S.-M. Cheng, "Firmulti Fuzzer: Discovering multi-process vulnerabilities in IoT devices with full system emulation and VMI," in Proc. ACM CCS Workshop (CPSIoTSec 2023), Copenhagen, Denmark, Nov. 2023.
[C55] C.-H. Tseng, C.-F. Hung, B.-K. Hong and S.-M. Cheng, "On manipulating routing table to realize redirect attacks in O-RAN by malicious xApp," in Proc. IEEE WPMC 2023, Tampa, Florida, Nov. 2023.
[C54] G.-Y. Lin, M. H. Lin, C.-F. Hung, and S.-M. Cheng, "Hash-based function call graph fusion method for IoT malware detection," in Proc. IEEE WPMC 2023, Tampa, Florida, Nov. 2023.
[C53] F. Lo, S.-M. Cheng, and R. Kaliski, "Optimization of lightweight malware detection models for AIoT devices," in Proc. IEEE WF-IoT 2023, Aveiro, Portugal, Oct. 2023.
[C52] G.-Y. Lin, S.-M. Cheng, and H.-M. Lee, "A framework for robustness evaluation in AI-based malware detectors," in Proc. IEEE ICCE-TW 2023, Pingtung, Taiwan, July 2023.
[C51] J.-H. Huang, S.-M. Cheng, R. Kaliski, and C.-F. Hung, "Developing xApps for rogue base station detection in SDR-enabled O-RAN," in Proc. IEEE INFOCOM 2023 Workshop, Hoboken, NJ, USA, May 2023.
[C50] Y.-X. Lin, B.-K. Hong, and S.-M. Cheng, "Conformance testing for 5G O-RAN entities through MEC," in Proc. CANDAR 2022, Himeji, Japan, Nov. 2022.
[C49] C.-Y. Wu, T. Ban, S.-M. Cheng, B. Sun, and T. Takahashi, "IoT malware detection using Function-Call-Graph embedding," in Proc. PST 2021, Auckland, New Zealand, Dec. 2021.
[C48] S.-M. Cheng and M.-W. Tseng, "Analysis of invisible data poisoning backdoor attacks against malware classifiers," in Proc. HITCON 2021, Taipei, Taiwan, Nov. 2021.
[C47] Y.-T. Lee, T. Ban, T.-L. Wan, S.-M. Cheng, R. Isawa, T. Takahashi, and D. Inoue, "Cross platform IoT-malware family classification based on printable strings," in Proc. IEEE TrustCom 2020, Guangzhou, China, Dec. 2020, pp. 775-784. (received the Best Paper Award)
[C46] S.-M. Cheng and B.-K. Hong, "Development of signaling spoofing attacks using function containerization of rogue base stations," in Proc. HITCON 2020, Taipei, Taiwan, Sep. 2020.
[C45] S.-H. Ma and S.-M. Cheng, "Reversing in wonderland: Neural network based malware detection techniques," in Proc. HITCON 2020, Taipei, Taiwan, Sep. 2020.
[C44] C.-H. Lee, R. Y. Chang, and S.-M. Cheng, "Beamforming and power allocation in dynamic TDD based H2H/M2M networks with energy harvesting," in Proc. IEEE PIMRC 2020, London, England, Aug. 2020.
[C43] T.-L. Wan, T. Ban, Y.-T. Lee, S.-M. Cheng, R. Isawa, T. Takahashi, and D. Inoue, "IoT-malware detection based on byte sequences of executable files," in Proc. AsiaJCIS 2020, Taipei, Taiwan, Aug. 2020, pp. 143-150.
[C42] C.-H. Lee, R. Y. Chang, C.-T. Lin, and S.-M. Cheng, "Beamforming and power allocation in dynamic TDD networks supporting machine-type communication," in Proc. IEEE ICC 2020, Dublin, Ireland, June 2020.
[C41] S.-M. Cheng, T. Ban, J.-W. Huang, B.-K. Hong, and D. Inoue, "ELF analyzer demo: Online identification for IoT malwares with multiple hardware architectures," in Proc. IEEE S&P 2020 Workshop, San Francisco, California, May 2020, pp. 126-126.
[C40] J. Feng, B.-K. Hong, and S.-M. Cheng, "DDoS attacks in experimental LTE networks," in Proc. AINA 2020, Caserta, Italy, Apr. 2020, pp. 545-553.
[C39] C.-C. Tu, P. Ting, P.-Y. Chen, S. Liu, H. Zhang, J. Yi, C.-J. Hsieh, and S.-M. Cheng, "Toward large-scale rogue base station attacks using container-based virtualization," in Proc. IEEE VTC-fall 2019, Honolulu, Hawaii, Sep. 2019.
[C38] B.-K. Hong, J.-W. Huang, T. Ban, Ry. Isawa, S.-M. Cheng, D. Inoue, and K. Nakao, "Measurement study towards a unified firmware updating scheme for legacy IoT devices," in Proc. AsiaJCIS 2019, Kobe, Japan, Aug. 2019.
[C37] S.-M. Cheng and S.-H. Ma, "Demo: An emulator-based active protection system against IoT malware," in Proc. IEEE S\&P Workshop SafeThings 2019, San Francisco, CA, USA, May 2019, pp. 9-15.
[C36] C.-C. Tu, P. Ting, P.-Y. Chen, S. Liu, H. Zhang, J. Yi, C.-J. Hsieh, and S.-M. Cheng, "AutoZOOM: Autoencoder-based zeroth order optimization method for attacking black-box neural networks," in Proc. AAAI 2019, Honolulu, Hawaii, Jan. 2019, pp. 742-749.
[C35] C.-H. Lee, R. Y. Chang, C.-T. Lin, and S.-M. Cheng, "Energy-efficient D2D underlaid MIMO cellular networks with energy harvesting," in Proc. IEEE Globecom 2018, Abu Dhabi, UAE, Dec. 2018.
[C34] B.-R. Chen, S.-M. Cheng, and Jia-Jhun Lin, "Energy-efficient BLE device discovery for Internet of Things," in Proc. CANDAR 2017, Aomori, Japan, Nov. 2017, pp. 75-79.
[C33] C.-H. Lee, R. Y. Chang, C.-T. Lin, and S.-M. Cheng, "Sum-rate maximization for energy harvesting-aided D2D communications underlaid cellular networks," in Proc. IEEE PIMRC 2017, Montreal, Canada, Oct. 2017.
[C32] J.-W. Ciou, S.-M. Cheng, and Y.-H. Hsu, "Retransmission-based access class barring for Machine Type Communications," in Proc. IoTaas 2017, Taichung, Taiwan, Sep. 2017, pp. 145-154.
[C31] J.-J. Lin, K.-C. Wang, S.-M. Cheng, and Y.-C. Liu, "On exploiting SDN to facilitate IPv4/IPv6 coexistence and transition," in Proc. IEEE DSC 2017, Taipei, Taiwan, Aug. 2017, pp. 473—474.
[C30] S.-M. Cheng, Y.-J. Wang, and Y.-C. Chen, "Secure location tracking of femtocells in heterogeneous cellular networks," in Proc. IEEE DSC 2017, Taipei, Taiwan, Aug. 2017, pp. 267—272.
[C29] C.-C. Liao, S.-M. Cheng and M. Domb, "On designing energy efficient Wi-Fi P2P connections for Internet of Things," in Proc. IEEE VTC 2017-Spring, Sydney, Australia, June 2017.
[C28] P.-S. Ting, C.-C. Tu, P.-Y. Chen, Y.-Y. Lo, and S.-M. Cheng, "FEAST: An automated feature selection framework for compilation tasks," in Proc. IEEE AINA 2017, Taipei, Taiwan, Mar. 2017, pp. 1138-1145.
[C27] E. Loe, H.-C. Hsiao, T. Kim, S.-C. Lee, and S.-M. Cheng, "SandUSB: An installation-free sandbox for USB peripherals," in Proc. IEEE WF-IoT 2016 Workshop, Reston, VA, Dec. 2016, pp. 621-626.
[C26] H.-C. Lee, S.-M. Cheng, K.-P. Wu, and H.-M. Lee, "A responsive probing approach to detect dynamic intrusion in a MANET," in Proc. IISA 2016 Workshop, Piraeus, Greece, July 2016.
[C25] Z.-Y. Yang, S.-M. Cheng, and Y. J. Wang, "Mode selection for device-to-device communications with Voronoi tessellation," in Proc. IGBSG 2016, Prague, Czech Republic, June 2016.
[C24] S.-M. Cheng and P.-Y. Chen, "Ecology-based DoS attack in cognitive radio networks," in Proc. IEEE S&P 2016 Workshop (BioSTAR 2016), San Jose, CA, May 2016, pp. 104-110.
[C23] P.-Y. Chen, C.-W. Lien, F.-J. Chu, P.-S. Ting, and S.-M. Cheng, "Supervised collective classification for crowdsourcing," in Proc. IEEE Globecom 2015 Workshop, San Diego, CA, Dec. 2015.
[C22] P.-Y. Chen, Z. Qi, Y. Pan, and S.-M. Cheng, "Multivariate and categorical analysis of gaming statistics," in Proc. NBiS 2015, Taipei, Taiwan, Sep. 2015.
[C21] S.-M. Cheng, W.-R. Huang, R.-G. Cheng, and C.-H. Gan, "Experimential emergency communication systems using USRP and GNU radio platform," in Proc. QShine 2015, Taipei, Taiwan, Aug. 2015, pp. 75—79.
[C20] Y.-J Liu, S.-M. Cheng, and P.-Y. Huang, “Cognitive vertical handover in heterogeneous networks," in Proc. QShine 2015, Taipei, Taiwan, Aug. 2015, pp. 392—397.
[C19] H.-F. Lin, S.-M. Cheng, and P.-Y. Huang," Cognitive access in multichannel wireless networks using two-dimension markov chain," in Proc. IWCMC 2014, Nicosia, Cyprus, Aug. 2014, pp. 169—173.
[C18] S.-M. Cheng, C.-H. Ho, S. Chen, and S.-H. Chang," Distributed anonymous authentication in heterogeneous networks," in Proc. IWCMC 2014, Nicosia, Cyprus, Aug. 2014, pp.505—510.
[C17] S.-Y, Lien, S.-M. Cheng, and Y.-Y. Lin," Duality on timing alignment and radio resources orthogonality toward 5G heterogeneous networks," in Proc. VITAE 2014, Aalborg, Denmark, May 2014.
[C16] P.-Y. Chen, H.-F. Lin, K.-H. Hsu, and S.-M. Cheng, "Modeling dynamics of malware with incubation period from the view of individual," in Proc. IEEE VTC 2014-Spring, Seoul, Korea, May 2014.
[C15] S.-H. Chang, Y.-S. Chen, and S.-M. Cheng, "Detection of Sybil attacks in participatory sensing using cloud based trust management system," in Proc. ISWPC 2013, Taipei, Taiwan, Nov. 2013.
[C14] N.-T. Chou, S.-H. Lin, S.-M. Cheng, and S.-H. Chang, "Performance evaluation of self-configured two-tier heterogeneous cellular networks," in Proc. IEEE SMC 2013, Manchester, UK, Oct. 2013, pp. 2968—2972.
[C13] W. C. Ao and S.-M. Cheng, "A lower bound on multi-hop transmission delay in cognitive radio ad hoc networks," in Proc. IEEE PIMRC 2013, London, UK, Sep. 2013, pp. 3323—3327. (received the Best Paper Award)
[C12] S.-Y. Lien and S.-M. Cheng, "Resource-optimal network resilience for real-time data exchanges in cyber-physical systems," in Proc. IEEE PIMRC 2013, London, UK, Sep. 2013, pp. 1603—1608.
[C11] S.-Y. Lien and S.-M. Cheng, "Performance guaranteed statistical traffic control in cognitive cellular networks," in Proc. WPMC 2013, Atlantic City, NJ, June 2013.
[C10] P.-Y. Chen, S.-M. Cheng, W. C. Ao, and K.-C. Chen, "Multi-path routing with end-to-end statistical QoS provisioning in underlay cognitive radio networks," in Proc. IEEE INFOCOM 2011 Workshop on Cognitive and Cooperative Network, Shanghai, China, Apr. 2011, pp. 7—14.
[C9] W. C. Ao, S.-M. Cheng, and K.-C. Chen, "Phase transition diagram for underlay heterogeneous cognitive radio networks," in Proc. IEEE Globecom 2010, Miami, FL, Dec. 2010.
[C8] H.-B. Chang, S.-M. Cheng, S.-Y. Lien, and K.-C. Chen, "Statistical delay control of opportunistic links in cognitive radio networks," in Proc. IEEE PIMRC 2010, Istanbul, Turkey, Sept. 2010, pp. 2248—2252.
[C7] S.-M. Cheng, W. C. Ao, and K.-C. Chen, "Downlink capacity of two-tier cognitive femto networks," in Proc. IEEE PIMRC 2010, Istanbul, Turkey, Sept. 2010, pp. 1303—1308.
[C6] W. C. Ao, S.-M. Cheng, and K.-C. Chen, "Power and interference control with relaying in cooperative cognitive radio networks," in Proc. IEEE ICC 2010 Workshop on CRISP, Cape Town, South Africa, May 2010.
[C5] S.-M. Cheng, K.-C. Chen, and P. Lin, "Performance modeling on handover latency in mobile IP regional registration," in Proc. IEEE PIMRC 2008, Cannes, France, Sept. 2008.
[C4] S.-M. Cheng, W.-R. Lai, and P. Lin, "A Hash function scheme for key management in UMTS MBMS," in Proc. IEEE Globecom 2007, Washington, DC, Nov. 2007, pp. 5148—5152.
[C3] S.-M. Cheng, P. Lin, D.-W. Huang, and S.-R. Yang, "A study on distributed/centralized scheduling for wireless mesh network," in Proc. ACM IWCMC 2006, Vancouver, Canada, July 2006, pp. 599—604.
[C2] S.-M. Cheng, P. Lin, and W.-H. Chen, "Key caching mechanism for AAA over mobile IP," in Proc. IEEE VTC 2005-Fall, vol. 2, Dallas, TX, Sept. 2005, pp. 1222—1226.
[C1] R.-G. Cheng, S.-M. Cheng, and P. Lin, "Power-efficient routing (PER) mechanism for ODMA systems," in Proc. IEEE WirelessCom, vol. 1, Maui, HI, June 2005, pp. 129—134.

Patents

[P8] Y.-K. Lee, S.-H. Wang, W.-K. Tseng, S.-M. Cheng, J.-D. Cheng, T.-Y. Lin, Y.-H. Huang, C.-W. Lai, and Y.-C. Huang, "醫療用容器中液量變化偵測裝置", ROC Application Number: M525194, July 2016.
[P7] R.-G. Cheng, W.-R. Huang, S.-M. Cheng, and T.-H. Liu, "Method and System for Detecting and Locating Trapped People (受困者偵測及定位之方法與系統)," with NTUST, ROC Patent Number: I533727, May 2016.
[P6] R.-L. Li, C.-E. Wang, C.-C. Chen, P.-T. Huang, C.-W. Lin, P. Lin, S.-M. Cheng, and C.-I. Cheng, "Integrated with OSS/J for telecommunication support (相容於OSS/J規格的電信營運支援系統中介器與其資訊拆解、組合方法)," with Chunghwa Telecom, ROC Patent Number: I348293, Sept. 2011.
[P5] P. Lin, S.-M. Cheng, S.-R. Yang, and P.-T. Huang, "Intelligent method for dynamically switching communication modes of a dual-mode communication module (動態切換雙網通訊模組之通訊模式的智慧型方法)," with Inventec Appliances Corp., ROC Patent Number: I342148, May 2011.
[P4] P. Lin, S.-M. Cheng, S.-R. Yang, and P.-T. Huang, "Application-oriented and intelligent method of switching communication modes of a dual-mode communication module (用於切換雙網通訊模組中通訊模式之應用程式導向智慧型方法)," with Inventec Appliances Corp., ROC Patent Number: I326550, June 2010.
[P3] F. Lin, S.-M. Cheng, S.-R. Yang, and P.-T. Huang, "Intelligent method for dynamically switching communication modes of a dual-mode communication module," with Inventec Appliances Corp., US Patent Number: 7630735, Dec. 2009.
[P2] F. Lin, S.-M. Cheng, S.-R. Yang, and P.-T. Huang, "Application-oriented and intelligent method for switching communication modes of a dual-mode communication module," with Inventec Appliances Corp., US Patent Number: 7627339, Dec. 2009.
[P1] P. Lin, H.-C. Hsu, S.-M. Cheng, W.-H. Chen, and K.-L. Chen, "A mobile IP Authentication method with AAA and key cache and a recordable medium thereof (在行動網址認證、授權、計費機制上之金鑰快取認證方法及其儲存媒體)," with ITRI/CCL, ROC Patent Number: I301027, Sept. 2008.

Common Vulnerabilities and Exposures

[V5] CVE-2023-42358, Aug. 2023.
[V4] CVE-2023-41628, Aug. 2023.
[V3] CVE-2023-41627, Aug. 2023.
[V2] CVE-2023-40998, Aug. 2023.
[V1] CVE-2023-40997, Aug. 2023.

Local Journals and Conferences

[LJ5] B.-K. Hong, S.-S. He, Y.-X. Lin, J.-H. Huang, and S.-M. Cheng, "Detection and notification of rogue BS attack in 4G LTE non-public networks," Communications of the CCISA, vol. 27, no. 4 , pp. 15-35, Nov. 2021.
[LJ4] H.-C. Hsiao, C.-Y. Huang, S.-M. Cheng, S.-K. Huang, Y.-C. Liu, and T.-C. Wu, "台灣資安菁英人才培育," Communications of the CCISA, vol. 24, no. 4 , pp. 58-72, Oct. 2018.
[LJ3] S.-M. Cheng, C.-Y. Shen, and K.-C. Chen, "Introduction to network science behind social networks," NCP Newsletters, no. 22, pp. 2—9, Dec. 2010.
[LJ2] P. Lin, S.-M. Cheng, P.-T. Huang, J.-Y. Jeng, and Y.-K. Chen, "A survey for GAN: A generic access standard for 3G and WLAN interworking," TL Technical Journal, vol. 37, no. 5, pp. 635—658, Oct. 2007.
[LJ1] S.-M. Cheng, C.-H. Gan, P. Lin, G.-H. Tu, "Key issues and technologies for UMTS high speed downlink packet access," Bulletin of the College of Engineering, N.T.U., no. 90, pp. 57—63, Feb. 2004.
[LC52] C.-F. Hung, Z.-M. Lee, B.-K. Hong, and S.-M. Cheng, "以物聯網為基礎的惡意程式檢測器之穩固性評估框架," in Proc. CISC 2022, Taichung, Jun. 2022.
[LC51] J.-H. Huang, B.-K. Hong, and S.-M. Cheng, "以物聯網為基礎的惡意程式檢測器之穩固性評估框架," in Proc. CISC 2022, Taichung, Jun. 2022. (nominated the Best Student Paper Award)
[LC50] G.-Y. Lin, H.-L. Hsu, S.-C. Ma, P.-Y. Wang, S.-M. Cheng, and H.-M. Lee, "以物聯網為基礎的惡意程式檢測器之穩固性評估框架," in Proc. CISC 2022, Taichung, Jun. 2022.
[LC49] C.-Y. Chung and S.-M. Cheng, "基於雙層式符號執行強化物聯網韌體動態分析真實度," in Proc. CISC 2022, Taichung, Jun. 2022.
[LC48] C.-Y. Wu and S.-M. Cheng, "透過重新命名函式呼叫圖嵌入進行物聯網惡意軟體家族分類," in Proc. CISC 2022, Taichung, Jun. 2022.
[LC47] W.-Y. Tseng and S.-M. Cheng, "應用於物聯網設備韌體更新自動化分析漏洞系統," in Proc. CISC 2022, Taichung, Jun. 2022.
[LC46] C.-H. Yang, S.-M. Cheng, and H.-M. Lee, "利用可解釋性分析生成基於圖特徵惡意軟體檢測器的對抗式樣本," in Proc. CISC 2022, Taichung, Jun. 2022. (nominated the Best Paper Award)
[LC45] Y.-X. Lin, B.-K. Hong, Y.-R. Chen, and S.-M. Cheng, "以 MEC 檢測 5G SA 的異常信令及行為," in Proc. CISC 2022, Taichung, Jun. 2022.
[LC44] S.-Z. Tsai and S.-M. Cheng, "基於執行流程分割的物聯網惡意軟體動態分類器," in Proc. CISC 2022, Taichung, Jun. 2022.
[LC43] Y.-T. Cheng, J.-J. Wu, A.-C. Cheng, S.-H. Wan , and S.-M. Cheng, "MCU 韌體模擬系統調查及效率評估," in Proc. CISC 2022, Taichung, Jun. 2022.
[LC42] C.-F. Hung, B.-K. Hong, and S.-M. Cheng, "企業專網內部攻擊偵測 - 以DNS放大攻擊為例," in Proc. NST 2022, Taipei, Jan. 2022.
[LC41] Z.-M. Lee, B.-K. Hong, Y.-R. Chen, and S.-M. Cheng, "基於 O-RAN 架構之基地台流量安全檢測," in Proc. NST 2022, Taipei, Jan. 2022.
[LC40] S.-Z. Tsai, C.-Y. Wu, Y.-X. Lin, J.-H. Huang, B.-K. Hong and S.-M. Cheng, "針對MEC上惡意流量偵測的後門攻擊之雙層檢測," in Proc. NST 2022, Taipei, Jan. 2022.
[LC39] C.-Y. Wu and S.-M. Cheng, "透過函數調⽤圖嵌⼊檢測物聯網惡意軟件," in Proc. TANET 2021, Taichung, Dec. 2021.
[LC38] S.-S. He and S.-M. Cheng, "4G LTE 中惡意基地台攻擊之檢測," in Proc. TANET 2021, Taichung, Dec. 2021.
[LC37] B.-K. Hong, J.-H. Huang, and S.-M. Cheng, "5G 專網內以 MEC 為基礎的惡意基地台偵測與提醒 APP 之開發," in Proc. TANET 2021, Taichung, Dec. 2021. (received the Best Paper Award)
[LC36] K.-L. Zhang, J.-W. Huang, C.-Y. Chung, and S.-M. Cheng, "基於符號執行實現裝置驅動之物聯網韌體動態分析," in Proc. TANET 2021, Taiwan, Aug. 2021.
[LC35] B. Mwangi and S.-M. Cheng, "Modelling Botnet Formation in Energy Heterogeneous IoT WSNs," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC34] K.-L. Zhang, J.-W. Huang, C.-Y. Chung, and S.-M. Cheng, "基於符號執行實現裝置驅動之物聯網韌體動態分析," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC33] J.-Y. Jhan, S.-M. Cheng, and H.-M. Lee, "基於語意分析進行惡意程式檢測," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC32] B.-K. Hong, Y.-X. Lin, J.-H. Huang, and S.-M. Cheng, "具 5G 專網設備資安偵測功能之 Honeynet 實驗平台," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC31] S.-S. He, Y.-R. Chen, and S.-M. Cheng, "可於 5G 專網內偵測偽造基站之實驗平台," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC30] M.-W. Tsang, S.-M. Cheng, and H.-M. Lee, "對抗惡意軟體分類器的後門攻擊," in Proc. CISC 2021, Taipei, Aug. 2021. (received the Best Paper Award)
[LC29] J.-W. Hang and S.-M. Cheng, "基於動態符號執行的物聯網設備漏洞測試框架," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC28] S.-M. Chang, S. Chou, C.-M. Chang, and S.-M. Cheng, "透過韌體模擬實現物聯網端點設備偵測與回應," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC27] L.-B. Ouyang, S.-M. Cheng, and H.-M. Lee, "利用可解釋性針對控制流圖分類器產生對抗式樣本," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC26] E. Lee, S.-M. Cheng, and H.-M. Lee, "運用對抗式攻擊量測深度學習模型對新樣本的誤判風險," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC25] Y.-C. Lui, S.-M. Cheng, and K.-C. Wang, "車內網路之入侵偵測系統的探討與分析," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC24] C.-Y. Wu, S.-Z. Tsai, Q.-M. Lai, B.-X. Wu, J.-J. Xu, H.-M. Lee, and S.-M. Cheng, "深度神經網路後門檢測平台," in Proc. CISC 2021, Taipei, Aug. 2021.
[LC23] Z.-M. Lee, Y.-R. Chen, and S.-M. Cheng, "O-RAN架構調查及其安全問題之實務探討," in Proc. CISC 2021, Taipei, Aug. 2021. (received the Best Student Paper Award)
[LC22] Y.-S. Li, B.-K. Hong, and S.-M. Cheng, "具資安能力的 MEC 之設計 - 檢查資安相關的控制信令," in Proc. CISC 2020, Taipei, Oct. 2020.
[LC21] C.-F. Hung, S.-S. He, W.-X. Wang, and S.-M. Cheng, "具物聯網設備資安檢測功能之MEC實驗平台," in Proc. CISC 2020, Kaohsiung, Sep. 2020. (nominated the Best Student Paper Award)
[LC20] Y.-H. Wu, B.-K. Hong, S.-H. Chang, and S.-M. Cheng, "透過惡意基地台功能容器虛擬化來實現信令偽造攻擊平台," in Proc. CISC 2020, Kaohsiung, Sep. 2020. (received the Best Paper Award)
[LC19] S.-T. Huang, S.-M. Cheng, and H.-M. Lee, "基於分析模型最後隱藏層神經元與輸出的木馬檢測器," in Proc. CISC 2020, Kaohsiung, Sep. 2020. nominated the Best Paper Award)
[LC18] J.-Y. Jhan, L.-B. Ouyang, E. Lee, M.-W. Tsang, C.-H. Yang, S.-M. Cheng, and H.-M. Lee, "神經網路的後門防禦統整," in Proc. CISC 2020, Kaohsiung, Sep. 2020.
[LC17] J.-W. Huang, K.-L. Zhang, Y.-C. Lui, S.-M. Chang, and S.-M. Cheng, "虛擬化物聯網設備之安全漏洞檢測技術的探討與分析," in Proc. CISC 2020, Kaohsiung, Sep. 2020.
[LC16] C.-W. Lo, S.-M. Cheng, and H.-M. Lee, "Deepfake Detector based on Face Recognition Enhanced with Face Alignment," in Proc. CISC 2020, Kaohsiung, Sep. 2020.
[LC15] S.-F. Chang, S.-M. Cheng, and H.-M. Lee, "利用查詢行為分析偵測黑箱對抗式攻擊," in Proc. CISC 2020, Kaohsiung, Sep. 2020. (nominated the Best Paper Award)
[LC14] S.-H. Ma and S.-M. Cheng, "基於程序模擬與詞嵌入之物聯網惡意程式的主動防禦," in Proc. CISC 2020, Kaohsiung, Sep. 2020.
[LC13] Y.-T. Lee and S.-M. Cheng, "透過可讀字串對物聯網惡意軟體進行跨平台家族分類," in Proc. CISC 2020, Kaohsiung, Sep. 2020.
[LC12] B.-R. Chen and S.-M. Cheng, "物聯網上基於移動性的SEIRD惡意程式傳播模型," in Proc. CISC 2020, Kaohsiung, Sep. 2020.
[LC11] T.-L. Wan and S.-M. Cheng, "透過執行檔位元序列對物聯網惡意軟體進行辨識與家族分類," in Proc. CISC 2020, Kaohsiung, Sep. 2020.
[LC10] W.-X. Wang and S.-M. Cheng, "具有實體與虛擬化設備的物聯網誘捕網路之設計與開發," in Proc. CISC 2020, Kaohsiung, Sep. 2020.
[LC9] Y.-X. Lin, X.-Y. Gu, and S.-M. Cheng, "利用惡意LTE基地台實現災防告警訊息偽造攻擊," in Proc. CISC 2020, Kaohsiung, Sep. 2020.
[LC8] Y.-C. Liu and S.-M. Cheng, "Automatic security detection for WiFi hotspots using portable analyzer," in Proc. CISC 2017, Kaohsiung, May 2017. (received the Best Student Paper Award)
[LC7] J.-J. Lin, K.-C. Wang, S.-M. Cheng, "Implementation of SDN-based IPv6 networks for endpoint security and IPv4 coexistence," in Proc. CISC 2016, Taichung, June 2016.
[LC6] Y.-C. Li, C.-C. Lin, S.-C. Chen and S.-M. Cheng, "On exploiting ring signature to preserve privacy in wearable Internet of Things," in Proc. CISC 2015, June 2015.
[LC5] K.-C. Wang and S.-M. Cheng, "The detection and prevention of network crawlers," in Proc. CISC 2015, June 2015. (nominated the Best Student Paper Award)
[LC4] S.-M. Cheng, W.-R. Lai, and P. Lin, "A study on key management for UMTS MBMS," in Proc. NST 2006, Dec. 2006.
[LC3] S.-M. Cheng, P.-T. Huang, and P. Lin, "A survey on AAA in 3G/WLAN interworking network," in Proc. NST 2006, Dec. 2006.
[LC2] S.-M. Cheng, P. Lin, and D.-W. Huang, "A survey on radio resource and mobility management for wireless mesh network," in 12th Mobile Computing Workshop, Mar. 2006, pp. 223—231.
[LC1] Y.-C. Lai, P. Lin, R.-L. Chang, and S.-M. Cheng, "A study on MBMS in UMTS network," in 12th Mobile Computing Workshop, Mar. 2006, pp. 90—99.

Pending Patents

<<