{"id":1018,"date":"2023-12-18T14:27:11","date_gmt":"2023-12-18T14:27:11","guid":{"rendered":"https:\/\/iim.nycu.edu.tw\/?page_id=1018"},"modified":"2026-05-05T11:10:24","modified_gmt":"2026-05-05T11:10:24","slug":"chuang-yung-ting","status":"publish","type":"page","link":"https:\/\/iim.nycu.edu.tw\/en\/teacher\/chuang-yung-ting","title":{"rendered":"Chuang, Yung-Ting"},"content":{"rendered":"<div class=\"wp-block-group alignfull has-palette-color-5-background-color has-background is-layout-constrained wp-container-core-group-is-layout-4d477f34 wp-block-group-is-layout-constrained wp-container-1 is-position-sticky\" style=\"border-radius:5px;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--30);padding-right:0;padding-bottom:var(--wp--preset--spacing--30);padding-left:0\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Chuang, Yung-Ting<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-bottom is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-right has-link-color wp-elements-aced355b3b7588503e766416235696b2\"><a href=\"https:\/\/iim.nycu.edu.tw\/en\/faculty\/all\/\" title=\"Faculty Members\">Faculty<\/a> \/ <a href=\"https:\/\/iim.nycu.edu.tw\/en\/faculty\/all\/#professors\" title=\"Faculty Members\">Faculty Members<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide has-palette-color-6-background-color has-background is-layout-constrained wp-container-core-group-is-layout-592f268c wp-block-group-is-layout-constrained\" style=\"border-radius:5px;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-bb1401d6\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-989d72c3 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Chen-Po-An\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Chen, Po-An<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-36c53abd wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Liu-Duen-Ren\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Liu, Duen-Ren<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-2eed99c2 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Tsai-Min-Jen\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Tsai, Min-Jen<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-ccf4151b wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Lin-Miao-Tsung\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Lin, Bertrand M.T.<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-2f758b70 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Li-Yung-Ming\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Li, Yung-Ming<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-89f01295 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/iim.nycu.edu.tw\/en\/teacher\/Ku-Cheng-Yuan\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Ku, Cheng-Yuan<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-5a1aa5e7 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"#\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Chuang, Yung-Ting<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-402b6bc0 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--80);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--80)\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2558\" height=\"2560\" src=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u838a\u8a60\u5a77-scaled.jpg\" alt=\"\" class=\"wp-image-1440\" style=\"width:184px;height:auto\" srcset=\"https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u838a\u8a60\u5a77-scaled.jpg 2558w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u838a\u8a60\u5a77-300x300.jpg 300w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u838a\u8a60\u5a77-1024x1024.jpg 1024w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u838a\u8a60\u5a77-150x150.jpg 150w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u838a\u8a60\u5a77-768x769.jpg 768w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u838a\u8a60\u5a77-1536x1536.jpg 1536w, https:\/\/iim.nycu.edu.tw\/wp-content\/uploads\/2024\/01\/\u838a\u8a60\u5a77-200x200.jpg 200w\" sizes=\"(max-width: 2558px) 100vw, 2558px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<h1 class=\"wp-block-heading has-text-align-left has-palette-color-4-color has-text-color has-link-color wp-elements-794820bb1ec2303c48da28ef5d97ec0d\">Chuang, Yung-Ting<\/h1>\n\n\n\n<pre class=\"wp-block-preformatted\">Office Extension Email Laboratory<\/pre>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<h1 class=\"wp-block-heading has-text-align-left has-palette-color-4-color has-text-color has-link-color wp-elements-01576ccb6b33fc490cb526d4b086ef1f\">Professor and Section Chief of In-service Master Program<\/h1>\n\n\n\n<pre class=\"wp-block-preformatted\" style=\"padding-right:0;padding-left:0\">Management Building 2 MB307R 57407 ytchuang@nycu.edu.tw Network Distributed Systems and Information Security Management Laboratory<\/pre>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top has-palette-color-7-background-color has-background is-layout-flex wp-container-core-columns-is-layout-5243a9a1 wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--80);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--80)\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading has-text-align-center\">Distributed Systems and Information Security Lab<\/h5>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Office: MB107R, Management Building 2<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading has-text-align-center\"><strong>Research<\/strong><\/h5>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Computer &amp; Communication Networks<br>Federated Learning &amp; Distributed Architecture<br>Network Security &amp; Attack Detection<br>Wireless Networks<br>Educational Technology<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading has-text-align-center\"><strong>Courses<\/strong><\/h5>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Corporate Information and Communications<br>Distributed Systems<br>Information Security<br>Decentralized Networks and Social Applications<br>System Analysis and Design<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-getwid-tabs\" data-active-tab=\"0\"><ul class=\"wp-block-getwid-tabs__nav-links\"><\/ul>\n<div class=\"wp-block-getwid-tabs__nav-link\"><span class=\"wp-block-getwid-tabs__title-wrapper\"><a href=\"#\"><span class=\"wp-block-getwid-tabs__title\">Research areas and major experiences<\/span><\/a><\/span><\/div><div class=\"wp-block-getwid-tabs__tab-content-wrapper\"><div class=\"wp-block-getwid-tabs__tab-content\">\n<table id=\"tablepress-47\" class=\"tablepress tablepress-id-47\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Academic Background<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">PhD in Electrical and Computer Engineering from the University of California, Santa Barbara<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Department of Electrical and Computer Engineering, University of California, Santa Barbara<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-47 from cache -->\n\n\n<table id=\"tablepress-63\" class=\"tablepress tablepress-id-63\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Curriculum Vitae<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Professor, Institute of Information Management, National Chiao Tung University<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Associate Professor, Institute of Information Management, National Yang Ming Chiao Tung University<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Associate Professor, Department of Information Management, National Chung Cheng University<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Assistant Professor, Department of Information Management, National Chung Cheng University<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Research Assistant, Department of Electrical and Computer Engineering, University of California, Santa Barbara<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-63 from cache --><\/div><\/div>\n\n\n\n<div class=\"wp-block-getwid-tabs__nav-link\"><span class=\"wp-block-getwid-tabs__title-wrapper\"><a href=\"#\"><span class=\"wp-block-getwid-tabs__title\">Papers and Books<\/span><\/a><\/span><\/div><div class=\"wp-block-getwid-tabs__tab-content-wrapper\"><div class=\"wp-block-getwid-tabs__tab-content\">\n<table id=\"tablepress-78\" class=\"tablepress tablepress-id-78\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Journal Paper<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Chuang, Y. T. &amp; Zhang, Q. X. Adaptive Aggregation and Robust Client Selection against Poisoning and Backdoor Attacks in Federated Learning, Engineering Applications of Artificial Intelligence, accepted. (SCIE)<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Chuang, Y. T. &amp; Chuang, W. Y. Bibliometric analysis and visualization of global trends in cyber-attacks and defenses, International Journal of Data Science and Analysis, 22(88), 03\/2026. (ESCI)<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Chuang, Y. T. &amp; Su, K. C. (2025). The Impact of Programming Experience and Gender on Coding Behavior, Thinking Skills and Creativity, 60(2026), 102126, 06\/2026 (SSCI)<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Chuang, Y. T. &amp; Chen, J. S. (2025). Global Academic Networks of MIS Scholars in Taiwan, Journal of Scholarly Publishing, to appear (SSCI)<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Chuang, Y. T. &amp; Wang, H. T. (2025). A ChatGPT-Based Dynamic Assessment Chatbot, Journal of Computer Languages, 85(2025), 101366, 11\/2025 (SCIE)<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Chuang, Y. T., &amp; Tu, C. H. (2025). Mitigating DDoS Attacks in Containerized Environments: A Comparative Analysis of Docker and Kubernetes, Journal of Parallel and Distributed Computing, 204(2025), 105130, 10\/2025 (SCIE)<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">Chuang, Y. T., &amp; Chang, H. Y. (2024). Analyzing novice and competent programmers&#8217; problem-solving behaviors using an automated evaluation system. Science of Computer Programming, 237(2024) , 103138, 10\/2024 (SCIE)<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">Chuang, YT, &amp; Jhang, JZ (2024). Trustworthy Retrieval System in Large and Mobile P2P Wireless Network. Ad Hoc Networks, 154 (2024), 103369. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">Chuang, YT, &amp; Hung, YT (2023). A Real-Time and ACO-based Offloading Algorithm in Edge Computing, Journal of Parallel and Distributed Computing, 179(2023), 104703 (SCI)<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">Chuang, YT, &amp; Wang, CH (2022). MSQ: a Mobile and Social-based Q&amp;A system. Library Hi Tech, Nov 2022, https:\/\/doi.org\/10.1108\/LHT-06-2022-0284 (SSCI)<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">Chuang, YT, &amp; Hsiang, CS (2022). A popularity-aware and energy-efficient offloading mechanism in fog computing, Journal of Supercomputing, 73, 19435-19458. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">Chuang, YT, &amp; Kuan, HP (2022). MIS Faculty collaboration in research and journal publication. Library Hi Tech, 40(3), 623-650 (SSCI)<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">Chuang, YT (2022). EMFL: An EMI &amp; Mobile-Assisted Flipped Learning System. Journal of Technology, 37(1), 29-41 (EI)<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">Chuang, YT, &amp; Chen, YH (2022). Social network analysis and data visualization of MIS international collaboration in Taiwan. Library Hi Tech, 40(5), 1422-1458. (SSCI)<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">Chuang, YT, &amp; Tsai, JJ (2021). cRedit-based and reputation retrieval system. The Journal of Supercomputing, 77(9), 10184-10225. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">Chuang, YT, &amp; Li, FW (2020). TCR: a trustworthy and churn-resilient academic distribution and retrieval system in P2P networks. The Journal of Supercomputing, 76, 7107-7139, (SCI).<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">Chuang, YT, Lee, YF (2018). Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks. The Computer Journal, Section D: Security in Computer Systems and Networks, 61(12), 1862-1879. ( SCI) (recommended journal for second-level management disciplines)<\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">Yang, PT, Huang, CK, Chu, HL, Chuang, YT (2018). Discovering diverse human behavior from two-dimensional preferences. Knowledge-Based Systems, 152, 11-25. (SCI) IF: 4.396<\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">Wu, F., Chuang, YT, Lai, HW (2018). Facilitating apps recommendation in Google Play. The Electronic Library, 36(5). (SSCI)<\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">Chuang, YT, Yu, CY, Wu, QW (2018). DSLM: a decentralized search for large and mobile networks. The Journal of Supercomputing, 74(2), 738-767 (SCI).<\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">Chuang, YT (2017). MEMIS: A Mobile-Supported English-Medium Instruction System. Telematics and Informatics, 34(2), 640-656 (SSCI). IF: 3.789<\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">Chuang, YT (2017). Protecting against malicious and selective forwarding attacks for P2P search &amp; retrieval system. Peer-to-Peer Networking and Applications, 10(4), 1079-1100. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">Yu, CY, Chuang, YT, Kuan, HP (2017). Understanding Faculty Collaboration and Productivity: A Case Study. Asian Social Science, 13(3), 1-20.<\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">Chuang, YT (2017). TCSC: A Trustworthy and Communal Social Classifieds. Transactions on Networks and Communications, 5(1), 21-38.<\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">Chuang, YT (2016). CIRCLE: A Cloud-Based Mobile Wellness Management System. Journal of Biomedical Engineering and Medical Imaging, 3(6): 69-95.<\/td>\n<\/tr>\n<tr class=\"row-27\">\n\t<td class=\"column-1\">Chuang, YT, Melliar-Smith, PM, Moser, LE, &amp; Lombera, IM (2016). Statistical Estimation and Dynamic Adaptation Algorithms for the iTrust Publication, Search and Retrieval System. The Computer Journal, Section B: Computer and Communications Networks and Systems, 59(10), 1492-1510 (SCI) (Recommended Journal for Secondary Schools of Management)<\/td>\n<\/tr>\n<tr class=\"row-28\">\n\t<td class=\"column-1\">Huang, TCK, Huang, CH, &amp; Chuang, YT (2016). Change discovery of learning performance in dynamic educational environments. Telematics and Informatics, 33(3), 773-792. (SSCI) IF: 3.789<\/td>\n<\/tr>\n<tr class=\"row-29\">\n\t<td class=\"column-1\">Chuang, YT, Melliar-Smith, PM, Moser, LE, &amp; Lombera, IM (2016). Maintaining censorship resistance in the iTrust network for publication, search and retrieval. Peer-to-Peer Networking and Applications, 9(2), 266-283. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-30\">\n\t<td class=\"column-1\">Chuang, YT (2015) An EMI Pedagogy That Facilitates Students&#039; Learning, English Language Teaching, 8(12), 63-73 (ProQuest\/EBSCO)<\/td>\n<\/tr>\n<tr class=\"row-31\">\n\t<td class=\"column-1\">Chuang, YT (2015). An adaptable and scalable membership management for the iTrust information search and retrieval system. Security and Communication Networks, 8(18), 3492-3510. (SCI)<\/td>\n<\/tr>\n<tr class=\"row-32\">\n\t<td class=\"column-1\">Chuang, YT (2015). A teaching philosophy that utilizes instructional technologies to improve learning motivation. The International Journal of E-Learning and Educational Technologies in the Digital Media, 1(2), 121-132.<\/td>\n<\/tr>\n<tr class=\"row-33\">\n\t<td class=\"column-1\">Chuang, YT (2015). SSCLS: A smartphone-supported collaborative learning system. Telematics and Informatics, 32(3), 463-474. (SSCI). IF: 3.789<\/td>\n<\/tr>\n<tr class=\"row-34\">\n\t<td class=\"column-1\">Chuang, YT, Smith, PMM, Moser, LE, &amp; Lombera, IM (2015). Membership protocols for the iTrust network. Transactions on Networks and Communications, 3(2), 133-158.<\/td>\n<\/tr>\n<tr class=\"row-35\">\n\t<td class=\"column-1\">Chuang, YT (2014). Increasing learning motivation and student engagement through the technology-supported learning environment. Creative Education, 5(23), 1969-1978. (EBSCO\/ProQuest)<\/td>\n<\/tr>\n<tr class=\"row-36\">\n\t<td class=\"column-1\">Lombera, IM, Moser, LE, Melliar-Smith, PM, &amp; Chuang, YT (2014). Peer-to-peer publication, search and retrieval using the Android mobile platform. Computer networks, 65, 56-72. (SCI) IF: 2.522<\/td>\n<\/tr>\n<tr class=\"row-37\">\n\t<td class=\"column-1\">Lombera, IM, Moser, LE, Melliar-Smith, PM, &amp; Chuang, YT (2013). Mobile decentralized search and retrieval using SMS and HTTP. Mobile Networks and Applications, 18(1), 22-41. (SCI) IF : 2.497<\/td>\n<\/tr>\n<tr class=\"row-38\">\n\t<td class=\"column-1\">Chuang, YT, Melliar-Smith, PM, Moser, LE, &amp; Lombera, I. (2012). Protecting the iTrust information retrieval network against malicious attacks. Journal of Computing Science and Engineering, 6(3), 179-192. ( Scopus)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-78 from cache -->\n\n\n<table id=\"tablepress-93\" class=\"tablepress tablepress-id-93\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Conference Paper<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Chuang, Y. T., Hsu, C. T., (2025). A Data Compression-Enabled ACO Offloading Method for Efficient Edge Computing: Proceedings of the Annual Meeting of Decision Sciences Institute (DSI), Orlando, FL, USA, November 2025 (\u7ba1\u4e8c\u5b78\u9580\u63a8\u85a6\u6703\u8b70)<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Chuang, Y. T., Wu, H. Y., (2024). Leveraging Swarm Intelligence Algorithms For Optimizing Task Allocation In Mobile Edge Computing: Proceedings of the Annual Meeting of Decision Sciences Institute (DSI), Phoenix, AZ, USA, November 2024 (\u7ba1\u4e8c\u5b78\u9580\u63a8\u85a6\u6703\u8b70)<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Chuang, Y. T., Chuang, W. Y., (2024). Data Visualization and Analysis of Cyber-attacks and Defenses: Proceedings of the Annual Meeting of the Southwest Decision Sciences Institute (SWDSI), Galveston, TX, USA, April 2024<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Chuang, YT, Chen, YH, Chen, JS (2022). Visualization of international collaboration patterns in Taiwan in early COVID-19: Proceedings of the 53th Annual Meeting of the Decision Sciences Institute (DSI), Houston, TX, USA, November 2022 (Recommendation Meeting for the Second School of Management)<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Chuang, YT, Lin, SY (2021). A decision-aid and context-aware task offloading algorithm: Proceedings of the 52th Annual Meeting of the Decision Sciences Institute (DSI), Online, November 2021 (Guan Er Xuemen Recommendation Meeting)<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Chuang, YT, Hung, YT (2021). A reliable task offloading algorithm with Ant Colony Optimization: Proceedings of the 52th Annual Meeting of the Decision Sciences Institute (DSI), Online, November 2021 (Guan Er Xuemen Recommendation Meeting)<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">Chuang, YT, Chang, HY (2021). Visualizing learning behaviors in novice\/non-novice programmers: Proceedings of the 2021 International Conference on INFORMS annual meeting (INFORMS), Anaheim, CA, USA, October 2021. (Guan Er Xuemen Recommended meeting)<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">Hsiang, CS, Chuang, YT (2021). A system for popularity-aware and energy-efficient offloading decision with load balancing in fog computing: Proceedings of the 27th International Conference on Parallel &amp; Distributed Processing Techniques &amp; Applications (PDPTA), Las Vegas , NV, USA, July 2021<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">Chuang, YT, Chen YH (2018). Observing the effectiveness of English-medium instruction in Taiwan higher education: Proceedings of the 49th Annual Meeting of the Decision Sciences Institute, Chicago, IL, November 2018 (Guan Er Xuemen Recommendation Meeting)<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">Chuang, YT, Lee, YF (2018). Detecting and Defending suspicious nodes in Large &amp; Mobile Networks: Proceedings of the 49th Annual Meeting of the Decision Sciences Institute, Chicago, IL, November 2018 (Guan Er Xuemen Recommendation Meeting)<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">Chuang, YT (2018). A reputation- and credit-based information retrieval system for hybrid wireless networks: Proceedings of the International Conference on INFORMS annual meeting (INFORMS), Phoenix, Arizona, USA, Nov, 2018. (Guan Er Xuemen Recommended meeting)<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">Chuang, YT, Kuan, HP (2018). Analysis of MIS Journal Publication in Taiwan: Proceedings of the International Conference on Internet Computing and IoT (ICOMP), Las Vegas, Nevada, USA, July, 2018.<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">Chen, YH, &amp; Chuang, YT (2018). English-medium Instruction in English as a Foreign Language Computer Science Courses: Observation and Suggestion: Proceedings of the International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS), Las Vegas, Nevada, USA, July, 2018.<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">Chuang, YT (2017). A Trustworthy P2P Retrieval System for Dense Mobile Networks: Proceedings of the 7th International Conference on Electronics, Communications, and Networks, Hualien, Taiwan, November 2017<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">Chuang, YT, Wu, QW (2017). A Trustworthy PHP Retrieval for Dense Mobile Networks: Proceedings of the 48th Annual Meeting of the Decision Sciences Institute, Washington, DC, November 2017 (Guan Er Xuemen Recommendation Meeting)<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">Pai, HT, Lai, HW, Wang, SL, Wu, F., Chuang, YT (2017). Recommendations for Mobile Applications: Facilitating Commerce in Google Play: Proceedings of the International Conference on Internet of Things and Machine Learning, Liverpool City , UK, October 2017<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">Wu, HH, Chuang, YT (2017). Low-Cost Smart Refrigerator: Proceedings of the 1st IEEE International Conference on Edge Computing, Honolulu, Hawaii, June 2017<\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">Ku, CY, Yang, FY, Chuang, YT, Yen, David (2017). A Study of Multi-Party Electronic Contract Signing Protocol: Proceedings of the 46th International Conference on Western Decision Sciences Institute, Vancouver, BC, Canada, April 2017 .<\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">Chuang, YT, &amp; Wu, QW (2016). A Trustworthy Information Publication and Search System for Large-Scale &amp; Mobile Wireless Networks: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, Nevada, USA, July, 2016, pp. p. 57-58..<\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">Chuang, YT (2016), A Pedagogy-Supported English-Medium Instruction Course: Proceedings of the 12th International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS), Las Vegas, Nevada, USA, July 2016.<\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">Chuang, YT (2015). Trustworthy and Communal Social Classifieds Using HTTP and Wi-Fi: Proceedings of the 2015 IEEE International Conference on Social Computing and Networking, Chengdu, China, December 2015, pp. 486-493. (Guan Erxuemen Recommended meeting)<\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">Chuang, YT (2014). TCSC: A Trustworthy and Communal Social Classifieds: Proceedings of the 43th International Conference on Western Decision Sciences Institute, Napa Valley, CA, USA, April 2014<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-93 from cache --><\/div><\/div>\n\n\n\n<div class=\"wp-block-getwid-tabs__nav-link\"><span class=\"wp-block-getwid-tabs__title-wrapper\"><a href=\"#\"><span class=\"wp-block-getwid-tabs__title\">Laboratory<\/span><\/a><\/span><\/div><div class=\"wp-block-getwid-tabs__tab-content-wrapper\"><div class=\"wp-block-getwid-tabs__tab-content\">\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-c4d77bb198e6930f12de071925628c06 is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\"><summary>Laboratory introduction<\/summary>\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-27a07db5e94a33ed49d639e6b51a257a\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">This laboratory is dedicated to the integrated application of information technology and networking. Our research scope covers the development of computer network application technologies and their underlying theories. Our core research directions focus on combining distributed system architectures with federated learning to develop high-performance collaborative computing models while ensuring data privacy. We also investigate security issues across various network environments \u2014 from theoretical derivation and model optimization to system simulation and implementation \u2014 with the goal of building next-generation network infrastructure that achieves both high performance and robust security.<\/h6>\n<\/details>\n\n\n\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-509d2a367085ff4cac76e8b8be10397f is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\"><summary>Laboratory Direction<\/summary>\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-27b0a36a9ae28fd955af6f5e836b0dfa\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Distributed Systems<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-bdfa4dfd556282ef186539d43b788b94\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Federated Learning Framework<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-252e0305093e33cb0d1899ff8b00b164\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Network Attack and Defense<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-82ae73244589893ee0deb88220452a36\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Computers and Communication Networks<\/h6>\n<\/details>\n\n\n\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-c2ad383f3f1537a3db583f621aec8087 is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\"><summary>Research tool<\/summary>\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-1db0cdc6e6baa155e353bb5eafd75772\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Java or C++ or C#<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-47ded056849f62fa885ab659a796b1e0\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Networking Simulators<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-37c3eed2ba771f8cccb95564f551e78c\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Computer Networks<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-a9cb4f2787143c2276d84c48c239ed11\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Information Security<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-fb29ba21ea08634d2196e9fcc64df4c9\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Python<\/h6>\n<\/details>\n\n\n\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-feddbcf466ac2306046e540b53176e96 is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\"><summary>Basic Requirements<\/summary>\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-5dab5d60de0f697d4e73bb1141cf1868\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Programming<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-37c3eed2ba771f8cccb95564f551e78c\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Computer Networks<\/h6>\n\n\n\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-5f83ff1a6a3b668ba13ce9e2b2b49a9c\" style=\"margin-right:var(--wp--preset--spacing--60);margin-left:var(--wp--preset--spacing--60)\">Network Security &amp; Defense<\/h6>\n<\/details>\n\n\n\n<details class=\"wp-block-details has-black-color has-text-color has-link-color has-medium-font-size wp-elements-3c3f011ae7669da540811cdf16f7eec1 is-layout-flow wp-container-core-details-is-layout-8a368f38 wp-block-details-is-layout-flow\"><summary>Contact<\/summary>\n<h6 class=\"wp-block-heading has-palette-color-3-color has-text-color has-link-color wp-elements-90c7a42d909e2639ef8fca77394138f9\" style=\"margin-top:0;margin-right:var(--wp--preset--spacing--60);margin-bottom:0;margin-left:var(--wp--preset--spacing--60)\">\u65bd\u90c1\u771f \/ yujhen.mg14@nycu.edu.tw<\/h6>\n<\/details>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>\u838a\u8a60\u5a77-\u6559\u6388 \u517c \u5c08\u73ed\u7d44\u9577 \u5e2b\u8cc7\u8207\u5be6\u9a57\u5ba4 \/ \u5c08\u4efb\u6559\u5e2b \u838a\u8a60\u5a77 \u7814\u7a76\u5ba4 \u6821\u5167\u5206\u6a5f \u96fb\u5b50\u90f5\u4ef6 \u5be6\u9a57\u5ba4 \u6559\u6388 \u517c  [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":1568,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-1018","page","type-page","status-publish","hentry"],"blocksy_meta":[],"aioseo_notices":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"\u912d \u701a","author_link":"https:\/\/iim.nycu.edu.tw\/en\/author\/hanworld"},"uagb_comment_info":0,"uagb_excerpt":"\u838a\u8a60\u5a77-\u6559\u6388 \u517c \u5c08\u73ed\u7d44\u9577 \u5e2b\u8cc7\u8207\u5be6\u9a57\u5ba4 \/ \u5c08\u4efb\u6559\u5e2b \u838a\u8a60\u5a77 \u7814\u7a76\u5ba4 \u6821\u5167\u5206\u6a5f \u96fb\u5b50\u90f5\u4ef6 \u5be6\u9a57\u5ba4 \u6559\u6388 \u517c &hellip;","_links":{"self":[{"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/pages\/1018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/comments?post=1018"}],"version-history":[{"count":23,"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/pages\/1018\/revisions"}],"predecessor-version":[{"id":3941,"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/pages\/1018\/revisions\/3941"}],"up":[{"embeddable":true,"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/pages\/1568"}],"wp:attachment":[{"href":"https:\/\/iim.nycu.edu.tw\/en\/wp-json\/wp\/v2\/media?parent=1018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}