Fang-Yie Leu

Fang-Yie Leu
Tunghai University · Computer Science Department

PhD

About

323
Publications
40,670
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,665
Citations

Publications

Publications (323)
Preprint
Full-text available
Recently, 5G networks have gradually surrounded our living environments to color our everyday lives and make our daily activities more convenient than before. However, in 5G networks, packet P transmitted from local UPF A of a 5G network, e.g., 5G-A, to UPF B in P’s destination 5G network, e.g., 5G-B, is not secure, even not encrypted, particularly...
Article
In an environment full of disordered information, the media spreads fake or harmful information into the public arena with a speed which is faster than ever before. A news report should ideally be neutral and factual. Excessive personal emotions or viewpoints should not be included. News articles ought not to be intentionally or maliciously written...
Article
Full-text available
Almond is an extendible open-source virtual assistant designed to help people access Internet services and IoT (Internet of Things) devices. Both are referred to as skills here. Service providers can easily enable their devices for Almond by defining proper APIs (Application Programming Interfaces) for ThingTalk in Thingpedia. ThingTalk is a virtua...
Article
Full-text available
In recent years, word embedding models receive tremendous research attentions due to their capability of capturing textual semantics. This study investigates the issue of employing word embedding models into storage-constrained edge devices for personalized item-of-interest recommendation in a smart store. The challenge lies in that the existing em...
Chapter
Nowadays, due to the rapid growth and popularity of IoT devices, current wireless networks suffer from the huge traffic produced by these devices. On the other hand, with the availably of 5G networks, people expect to have high quality streaming mechanisms. In a 5G network, data transmission between BS and UE is one of the biggest challenges for hi...
Chapter
Due to flexible scheduling requirements for various applications, a cloud platform usually has some temporarily unleased workers. To make cost effective, such considerable amount of idle workers can be collected to perform malleable tasks. These workers, called spot workers, often cannot work unstably since they may be interrupted by an external sc...
Chapter
In this paper, we investigate a text generation scenario that we are given a sequence of keywords and our goal is to automatically turn the sequence into a semantic coherent passage. Moving toward the goal, we propose a scheme called round-robin generation that produces semantic coherent results by overcoming the repeating word problem (commonly ob...
Chapter
In Taiwan, the regular software maintenance is the essential procedure in general commercial banks. However, during system maintenance, the banking system must be suspended and stop related services. Maintenance period usually make many inconveniences for banking customer. Even affect the transaction efficiency and market competitive advantages of...
Chapter
With the fast development of network technology, nowadays mobile communication is popularly employed all over the world. Mobile network services, e.g., Multimedia programs and Internet surfing, have so far enriched our everyday lives and color our surroundings. 5G networks provide more faster, more stable, shorter latency, and more diverse network...
Chapter
A desktop grid federation has enabled the organizations to solve large-scale game tree search applications via resource sharing. Since such applications can generate/prune tasks dynamically, the simple credit-based resource broker can easily lead to resource thrashing, causing a high computing overhead. We develop a credit damping component that is...
Chapter
The Internet of Things (IoT) is an essential infrastructure in many fields, such as industry and agriculture. Sensor design, communication scheme, data security, and data analysis are four important topics in the IoT research field. LoRaWAN, one of unlicensed-band based long range wide area network specifications, is very suitable for an IoT system...
Chapter
Natural language generation (NLG) tasks have received significant research attention in recent years. For tackling various NLG tasks, the Transformer [27] is now consensus to be employed as a fundamental building block. In the literature, there are three main Transformer variants for NLG: full Transformer, Encoder-Only (only using the encoder part...
Chapter
The failure rate of software projects has always been high. One of the key factors is the inability to detect and effectively solve the progress delay problem in time. Progress delay problems will continuous to propagate and extand in software development process to increase software project failure risk greatly. Burn down chart is a simple and use...
Article
Full-text available
Generally, the 5th Generation (5G) network will be soon available in the near future. It will be one with the feature that some of its network functions are handled by Virtual Machines (VMs), rather than by a dedicated one (like that in the 4th generation (4G) networks). Basically, VMs of a specific network function are managed by their own Softwar...
Chapter
Currently, manufacturing industries have begun to employ Artificial Intelligence (AI) technology to enhance production efficiency, and reduce management costs and other problems encountered in their manufacturing processes, e.g., TFT-LCD manufacturing companies are typical examples. During their manufacturing processes, if a dedicated measurement m...
Article
Full-text available
The International Symposium on the Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) has been held on 17–19 October 2019 in Taichung, Taiwan [...]
Chapter
Indoor smartphone positioning is one of the key ICT techniques. Generally, the development and implementation of an indoor positioning system heavily relies on the technology of wireless sensor network (WSN) since wireless sensors can estimate the probable distance between radio source and the sensors themselves by evaluating the strengths of wirel...
Chapter
In this paper, we present BESRES, a BERT-based regression model for extractive document summarization. We mainly explore two techniques for employing the BERT model for extractive document summarization: (1) Token Score Prediction: we propose to decompose the sentence score prediction into token-level score prediction, and (2) Soft Label: we propos...
Chapter
Nowadays, 5G networks (or simply 5G) will soon enter our everyday lives to enrich our colorful living environment. However, current 5G lacks of tools that can automatically detect and relieve DoS or DDoS attacks. Basically, 5G. will push its users to link to its attached subsystem, i.e., edge computers, which will burden some of the tasks originall...
Chapter
The wireless sensor networks have lots of popular applications for years. The efficiency of a wireless sensor network is subject to the monitoring accuracy and limited energy. Thus, event detection and energy efficiency are two important issues in Wireless Sensor Networks. In order to overcome the limit of yield rate for sensor hardware, some studi...
Chapter
Segmenting documents or conversation threads into semantically coherent segments have been one of the challenging tasks in natural language processing. In this work, we introduce three new text segmentation models that employ BERT for post-training. Extensive experiments are conducted based on benchmark datasets to demonstrate that our BERT-based m...
Chapter
The continuous changes environment and the rapid evolution of technology make that information system needs continuously and effectively maintain. The research report of the Standish group showed that the success rate of agile projects far exceeds the traditional projects. However, the agile software project has ignored many maintenance issues and...
Chapter
Recently, many Internet of Things (IoT) related applications have been designed to assist industrial development and human beings’ lives. Among these IoT applications, many of them require small amount of data but long distant communication with the features of high-reliability and high level of security. Moreover, since many IoT user equipments (U...
Article
Indoor smartphone positioning is one of the key information and cummunication technology techniques enabling new opportunities for indoor navigation and mobile location‐based services to enrich our everyday lives. Generally, the development of an indoor positioning system heavily relies on wireless sensor network. Since wireless sensors can estimat...
Chapter
With the development of Internet of Things (IoT), various communication protocols are created to support long range, low cost and low power consumption network environment. The LoRaWAN developed by LoRa Alliance is one of them. The LoRa Alliance Technical Committee proposed LoRaWAN specification version 1.1 to detail message communication structure...
Chapter
Smartphones have become an indispensable part of our lives. Understanding user behaviors based on smartphone usage data is therefore critical to many applications. In this paper, we propose to address a novel task called Intention2Text which attempts to capture user intents based on smartphone usage log. The goal of Intention2Text is to learn a dee...
Article
Contribution: This study applies supervised and unsupervised machine learning (ML) techniques to discover which significant attributes that a successful learner often demonstrated in a computer course. Background: Students often experienced difficulties in learning an introduction to computers course. This research attempts to investigate how succe...
Book
Full-text available
Nowadays, information technology (IT) is widely used as it provides the ability to collect, manipulate, store, disseminate data and information, and provide feedback mechanism to help business organizations in achieving their objectives. IT plays a vital role in enabling improvement in business process reengineering (BPR) activity cycles as it prov...
Book
Full-text available
Human resource (HR) management has broad roles and responsibilities in organizations, such as payroll, administration, and guiding, motivating, and mentoring employees. Manual HR systems may not be adequate in today’s work environment. Systems such as management information systems (MIS) and human resource information systems (HRIS) provide support...
Article
This world will soon enter its ageing and aged era. Many old people will be there on the earth. However, traditional long-term care (LTC) models, particularly for taking care of elderly, consume a huge amount of resources which have been invested and can be invested in current stage are terribly insufficient. To solve a part of this problem, in thi...
Chapter
In this study, we propose a smart routing and bandwidth allocation scheme, named Intelligent Routing and Bandwidth Allocation System with Reinforcement Learning (IRBRL), which mainly developed based on reinforcement learning techniques and SDN controller is responsible for creating and maintaining routing policies, including dynamic routing and lin...
Article
Full-text available
Generally, routing techniques are essential for Wireless Sensor Networks (WSNs) to deliver data packets to their destinations (also known as sinks). For a practical application, sensors are deployed to monitor environmental changes and events. Most WSNs detect specific events in their specific environments. But, different WSNs may monitor different...
Article
Full-text available
In recent years, Internet of Things (IoT) as an essential infrastructure for industrial development, environmental protection and human life enhancement has attracted researchers’ attention. Currently, there are four hot research topics in IoT fields, including sensor design, communication scheme, secure transmission, and data mining. The LoRaWAN,...
Chapter
In this study, we propose a fault tolerant mechanism for 5G end-device authentication, named Fault Tolerant 5G Authentication Scheme (FT5AS), in which a machine, named Mediator, is added to manage and keep track of authentication steps of end devices (UEs as the examples in the following). The purpose is that when a VM fails, other AUSFs can succes...
Chapter
The study highlighted the storage of data and the ability to transmit it at a faster speed securely. It is acknowledged that Big Data represents a large volume of data, and this brings a matter of ways on how to manage storage capacity as data continues to grow exponentially, that may drive to storage technologies to uphold its pace to the predicam...
Chapter
In a cross-region communication system, when a mobile node (referred to as MN), such as a mobile phone, reaches the boundary of a network, it is necessary to consider the relationship among the home network (H-Net), the service network (S-Net) and the target network (T-Net), and whether the three mobile operators mutually trust each other or not. H...
Chapter
In the past few years, the development of Internet of Things (IoT) has demonstrated a great convenience for human beings’ lives. A well-defined IoT communication protocol assists data transmitted on IoT in a secure and efficient way. The LoRaWAN developed by the LoRa Alliance employs asynchronous communication and three communication modes to contr...
Chapter
In the near future, a huge amount of network will flow through the fifth generation (5G) network since a tremendous number of IOT devices/sensors will soon connect to their application platforms via 5G. In such a heavy-traffic environment, low-latency requirement will seriously impact wireless transmission security. Also, 5G adopts Software Defined...
Chapter
To accurately locate pollution sources, in this research, we first create an air-pollution identification system, called Air Pollution Source Identification System (APSIS), which adopts tensorflow to establish three neural-network based analytical models with which to find the sources of air pollution. The APSIS collects environmental data in a rel...
Chapter
With the fast development of news media and freedom of speech in Taiwan, some news is not objectively reported. In fact, in order to attract people’s attention and increase the click rates of news, many journalists did not convey the exact meanings of news, even distorting news meanings or adding some subjective criticisms or opinions. As a result,...
Chapter
In this study, we deal with two topics. The first is that a machine, named Mediator, is added to a 5G system for managing and keeping track of UE’s authentication. The purpose is that when an AUSF fails, other AUSFs can successfully take over its authentication process on UEs. The second is that the proposed mechanism can detect this failure immedi...
Chapter
In this study, we propose a Mobile Physiological Sensor Cloud System for Long-term Care (MPCLC), the main functions of which are collecting carereceiver’s physiological data by using sensors and analyzing and reporting the carereceiver’s healthy condition. With the features of small in size, high convenience for use, and good immediacy of request r...
Book
This book constitutes the refereed proceedings of the 4th International Symposium on Mobile Internet Security, MobiSec 2019, held in Taichung, Taiwan, in October 2019. The 13 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in the topical sections: mobile internet security; mobile app...
Article
Currently, wireless sensor networks (WSNs) have been widely developed in different domains. Generally, sensors work independently, so it is relatively easier for a WSN to add new nodes. Often, a WSN is constrained to low energy consumption. However, data encryption/decryption not only takes a long time but also consumes many network resources. Due...
Article
Full-text available
In recent years, the Internet of Things (IoT) has significantly increased the number of Internet connections to a large number of objects in different domains, including industry, homes and transportation. The LoRaWAN developed by the LoRa Alliance is a long-range wide area network specification suitable for an IoT environment due to its low-power...
Article
Full-text available
Smart production as one of the key issues for the world to advance toward Industry 4.0 has been a research focus in recent years. In a smart factory, hundreds or even thousands of sensors and smart devices are often deployed to enhance product quality. Generally, sensor data provides abundant information for artificial intelligence (AI) engines to...
Article
In this study, we design an enhanced ANDSF, named E-ANDSF, which provides PMAG with information for base-station selection, and propose an improved IP-based handover/offload scheme, called IP-based Handover/offload System assisted by E-ANDSF (IHEAD), which invokes Multilayer Perceptron (MLP), a machine learning technique, to select a base station f...
Chapter
In recent years, social networking platform serves as a new media of news sharing and information diffusion. Social networking platform has become a part of our daily life. As such, social media advertising budgets have explosively expanded worldwide over the past few years. Due to the huge commercial interest, clickbait behaviors are commonly obse...
Chapter
In this study, we would like to deal with two topics. The first one is that we add a machine, named Mediator, to SDN Controller for managing and keeping track of the data generated by MME during UE authentication. When a VM fails, other MMEs can successfully take over its authentication tasks. The second is that when an MME fails, other MMEs can kn...
Chapter
DevOps is an important practice environment and future operation trend for software development and maintenance. DevOps has important features that are continuous integration, continuous delivery, automation and high efficiency to increase enterprise market competition. Micro services architecture is a critical item for keeping the advantages of De...
Chapter
Following the fast development of 5G networks and Internet of Things (IoT) techniques, in the future, billions of User Equipment (UE) and IoT devices will connect to networks and send data to backend servers for situation monitoring or required processes. Since mobile devices roam to everywhere in the world, firewalls which are designed to protect...
Chapter
The rise of AI has prompted the financial business to enter the intelligent financial technology (FinTech). Chatbot with AI technologies is an important member of FinTech. The financial industry is actively introducing chatbot to enhance the market competitive advantage. Many banks and card issuers in the United States have introduced or developed...
Chapter
According to Ericsson Mobility Report announced in 2017, by 2022, billions of User Equipment (UE) and IoT devices will connect to IoT networks for collecting our environmental and surrounding data. Since following users’ traveling, mobile devices, including UEs, healthcare monitoring devices, and other mobility devices, will move to everywhere in t...
Chapter
Bilateral session key exchange as an symmetric encryption scheme is often utilized in temporary data communication. Users can encrypt data with exchanged session keys and then transmit the resulting ciphertext to each other. However, some previous bilateral session key exchange protocols generate only one key in each key exchange procedure, meaning...