指導教授

廖宜恩 教授 (Dr. I-En Liao, Office : 理學大樓 705室)

Education 美國俄亥俄州立大學(Ohio State University)

資訊科學博士(Ph.D. in Computer and Information Science)

Research Interests Database Systems, Data Mining, XML Database,Wireless Networks
E-mail ieliao@nchu.edu.tw.
Tel. 886-4-2284-0497 ext 705

04-2285-3869

Perspective on Future Research 人類面臨資料爆炸時代,所最需要的工具,即是資料挖掘與機器學習的技術。本實驗室著重在培養學生以資料庫技術收集大量資料,並運用資料挖掘技術,從資料庫中找出隱含的有用知識或型樣。
一、資料庫效能調校之研究:著重在開放源碼資料庫管理系統PostgreSQL上建立索引調校之新方法與工具。
二、XML資料庫之研究:著重在正規化理論、索引技術、嵌入式XML資料庫實作、以及電子商務應用。
三、無線通訊之研究:著重在定位系統、情境感知服務、資訊安全、感測網路與隨意網路之資料處理。
四、資料挖掘之研究:著重在演算法、個人化搜尋、推薦系統、社交網路分析、生物資訊等議題之研究。Over the past several years, we had some good research results on the areas such as index selection method, location determination for WLAN, wireless network security, cluster analysis techniques, recommender systems, etc. In the future, we’ll continue to work on database performance tuning, normalization and indexing techniques for XML databases, data mining techniques and their applications to context-aware services, sensor networks, recommender systems, bioinformatics, and network security.
Selected Publications:(2006-present)
.
Journal Papers
001
I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang*, “A Password Authentication Scheme over Insecure Networks”, Journal of Computer and System Sciences, Vol. 72, No. 4, pp. 727-740, June 2006. (SCI)
 
002
Cheng-Chi Lee, Min-Shiang Hwang*, and I-En Liao, “Security Enhancement on a New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Industrial Electronics, Vol. 53, No. 5, pp. 1683-1687, October 2006.  (SCI)
003
I-En Liao* and Kuo-Fong Kao, “Enhancing the Accuracy of WLAN-based Location Determination Systems Using Predicted Orientation Information,” Information Sciences, Vol. 178, No. 4, pp. 1049–1068, Feb. 15, 2008. (SCI)
NSC 96-2221-E-005-045
004
Cheng-Chi Lee, Min-Shiang Hwang*, and I-En Liao, “A New Authentication Protocol Based on
Pointer Forwarding for Mobile Communications,” Wireless Communications and Mobile Computing, Vol. 8, No. 5, pp. 661-672, June 2008.(SCI)
005
Shu-Chuan Liao, I-En Liao*, Kuo-Fong Kao, Hui-Lin Chen, and Shu-O Huang, “PORE: A Personal Ontology Recommender System for Digital Library,” The Electronic Library, Vol. 27, No. 3, pp. 496-508, 2009. (SSCI)
006
I-Hui Li, I-En Liao*, Wei-Zhi Pang, “Mining Classification Rules in the Presence of Concept Drift with an Incremental Genetic Algorithm,” Journal of Theoretical and Applied Information Technology, Vol. 4, No. 7, pp. 608-623, July 2008.
007
Kuen-Fang Jea, Ke Chung Lin*, and I-En Liao, “Mining Hybrid Sequential Patterns by Hierarchical Mining Technique,”International Journal of Innovative Computing, Information and Control, Vol. 5, No. 8, pp.2351-2367, August 2009. (SCI)
008
Kuo-Fong Kao*, I-En Liao, Yueh-Chia Li, ”Detecting Rogue Access Points Using Client-side Bottleneck Bandwidth Analysis,” Computers & Security, Vol. 28, No. 3-4, pp. 144-152, May 2009.  NSC 96-2221-E-005-45. (SCI)
009
Shu-Ling Shieh , I-En Liao*, Kuo-Feng Hwang, and Hun-Yu Chen,“ An Efficient Initialization Scheme for SOM Algorithm Based on Reference Point and Filters,” IEICE Transactions on Information and Systems, Vol.E92-D, No.3, pp.422-432, Mar. 2009.(SCI)
010
Cheng-Chi Lee, I-En Liao, and Min-Shiang Hwang, “An Extended Certificate-based Authentication and Security Protocol for Mobile Networks,” Information Technology and Control, Vol. 38, No. 1, pp. 61-66, 2009.  (SCI-E)
011
Kuo-Fong Kao* and I-En Liao, “An Index Selection Method without Repeated Optimizer Estimations,” Information Sciences, Vol. 179, No. 13, pp. 2263-2272, 2009.   (SCI)
 
012
Shu-Ling Shieh , and I-En Liao*, “A New Clustering Validity Index for Cluster Analysis Based on a Two-Level SOM,” IEICE Transactions on Information and Systems, Vol.E92-D, No.9, pp.1668-1674, Sep. 2009.(SCI)
013
I-En Liao*, Wen-Chiao Hsu, Ming-Shen Cheng, and Li-Ping Chen, “A Library Recommender System Based on Personal Ontology Model and Collaborative Filtering Technique for English Collections,” The Electronic Library, Vol. 28, No. 3, pp. 386-400, 2010. (SSCI)
014
Jen-Yan Huang, Yu-Fang Chung, Tzer-Shyong Chen, and I-En Liao, “A Secure Time-Bound Hierarchical Key Management Scheme based on ECC for Mobile Agents,” International Journal of Innovative Computing, Information and Control, Vol.  6, No. 5, pp. 2159-2170, May 2010. (SCI)
015
I-Hui Li, I-En Liao*, and Feng-Nien Wu “An Uncapacitated Facility Location Based Cluster Hierarchy Scheme on Wireless Sensor Networks,”WSEAS Transactions on Communications, Vol. 9, No. 11, pp. 740-757, Nov. 2010. (EI)
016
I-Hui Li, I-En Liao*, and Feng-Nien Wu “TLAEEP: A Traffic Load-Aware Energy Efficient Protocol for  Wireless Sensor Networks,” Journal of Internet Technology, Vol. 12, No. 1, pp. 25-36, 2011. (SCI)
017
Jen-Yan Huang, I-En Liao*, and Hao-Wen Tang, “A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks,” EURASIP Journal on Wireless Communications and Networking, Volume 2011, Article ID 296704, 10 pages, doi:10.1155/2011/296704 (SCI)
018
Cheng-Chi Lee, I-En Liao, and Min-Shiang Hwang*, “An Efficient Authentication Protocol for Mobile Communications,” Telecommunication Systems, Vol. 46, No. 1, pp. 31-41, 2011.  (SCI)
019
Shu-Fen Chiou, I-En Liao, and Min-Shiang Hwang*, “A capacity‐enhanced reversible data hiding scheme based on SMVQ,” Imaging Science Journal,Vol. 59, No. 1, pp. 17-24, February 2011.  (SCI)
020
Hsien-Wei Yang, I-En Liao*, and Chaur-Chen Chen,”Reversible Data Hiding Based on Median Difference Histogram,” Journal of Information Science and Engineering, Vol. 27, No.2, pp. 577-593, March 2011.  (SCI)
021
JenYan Huang, I-En Liao*, Yu-Fang Chung, and Kuen-Tzung Chen, “Shielding Wireless Sensor Networks Using Markovian Intrusion Detection System with Attack Pattern Mining,” Information Sciences, Available online 29 March 2011. (SCI)
022
Ke-Chung Lin, I-En Liao*, Zhi-Sheng Chen, “An Improved Frequent Pattern Growth Method for Mining Association Rules,” Expert Systems With Applications, Vol. 38, No. 5, pp. 5154-5161, May 2011. (SCI)
023
Cheng-Chi Lee, Min-Shiang Hwang, and I-En Liao, “On The Security Of Self-Certified Public Keys,” International Journal of Information Security and Privacy, 5(2), pp. 55-62, April-June 2011.
024
I-Hui Li, Jyun-Yao Huang, and I-En Liao*, “Predicting Sequential Pattern Changes in Data Streams,” International Journal of Innovative Computing, Information and Control, Vol. 8, No. 1(A), pp.285-302, 2012. (SCI)
B.
中文期刊論文(Journal Papers in Chinese)
001
Kuo-Fong Kao, Mark Tsai, I-En Liao, “The implementation of a normalization tool for XML documents,” Journal of Internet Technology, Vol. 9, No. 2, April 2008, pp. 131-137.
002
黃正炎、廖宜恩、唐浩文,「以賽局理論提升無線感測網路入侵偵測系統的防禦能力」,Communications of IICM, Vol. 11, No. 1, March 2008, pp. 15-29.
C.
Conference Papers
001
I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, ”Identity-based Deniable Authentication Protocol from Pairings,” in Proceedings of IASTED International Conference on Internet and Multimedia Systems and Applications, Honolulu, Hawaii, USA, Aug 14-16, 2006. NSC95-3113-P-005-001  (EI)
002
I-En Liao*, Kuo-Fong Kao, and Ke-An Chen, “WLAN Location-Aware Application Based on Accumulated Orientation Strength Algorithm,” in Proceedings of First European Conference on Smart Sensing and Context, Enschede, Netherlands, October 2006, P. Havinga et al. (Eds.), Lecture Notes in Computer Science, Vol. 4272, Springer-Verlag, 2006, pp. 204-217.
NSC95-2221-E-005-114  (EI)
003
I-En Liao*, Shu-Chuan Liao, Kuo-Fong Kao, and Ine-Fei Harn, “A Personal Ontology Model for Library Recommendation System,” in Proceedings of 9th International Conference on Asian Digital Libraries, November 2006, S. Sugimoto et al. (Eds.), Lecture Notes in Computer Science, Vol. 4312, Springer-Verlag, 2006, pp. 173-182.  (EI)
004
I-En Liao and Wei-Chih Lin, “Shopping Path Analysis and Transaction Mining Based on RFID Technology,” RFID Eurasia 2007, Istanbul, Turkey, Sep.5-6, 2007, pp.292-296. (EI)
005
Kuo-Fong Kao, Hsin-Chien Wu, and I-En Liao, “A Rogue Access Point Detection System Based on Packet Analysis for Campus Network,” 4th International Conference on Computer Science and Information Systems, Athens, Greece, July 21-24, 2008. NSC 96-2221-E-005-45.
006
I-En Liao, Shu-Ling Shieh, and Hui-Ching Chen, “An evolutionary classifier based on adaptive resonance theory network II and genetic algorithm,”  in Proceedings of the 8th International Conference on Intelligent Systems Design and Applications, ISDA 2008, pp. 318-322. (EI)
007
I-Hui Li, I-En Liao, and Feng-Nien Wu, “A Traffic Load-Aware Energy Efficient Protocol for Wireless Sensor Networks,” in Proceedings of Mobility Conference 2008, National Ilan University, Taiwan, Sep. 10-12, 2008. NSC95-2221-E-005-114  (EI)
008
Hsien-Wei Yang, I-En Liao, Chaur-Chin Chen, “Reversible Data Hiding Based on Grayscale Value Histogram with Optimal Multiple Pairs of Crests andTroughs,” in Proceedings of the International Conference on Information Networking, Chiang Mai, Thailand, Jan. 21-24, 2009.
009
Wen-Chiao Hsu, I-En Liao, Su-Yu Wu, Kuo-Fong Kao, “An Efficient XML Indexing Method Based on Path Clustering,” in Proceedings of 20th IASTED International Conference on Modeling and Simulation, Banff, Alberta, Canada, July 6 – 8, 2009, pp. 339-344.NSC 97-2221-E-005-083,  NSC 97-2218-E-164-003 (EI)
010
I-En Liao, Ke-Chung Lin, and Hong-Bin Chen, “Mining Frequent Itemsets by Transaction Decomposition with Itemset Clustering,” in Proceedings of 2009 International Conference on Data Mining, Las Vegas, July 13-16, 2009. NSC 97-2221-E-005-083
011
Hsien-Wei Yang, Kuo Feng Hwang, and I-En Liao, “Reversible data hiding based on interleaving max-min difference histogram,” in Proceedings of 2009 Joint Conferences on Pervasive Computing,2009, pp. 823-828. (EI)
012
I-En Liao, Wen-Chiao Hsu, and Yu-Lin Chen, “An Efficient Indexing and Compressing Scheme for XML Query Processing,” in Proceedings of 2nd International Conference on Networked Digital Technologies, July 2010, Filip Zavoral, Jakub Yaghob, Pit Pichappan, and Eyas El-Qawasmeh (Eds.), Communications in Computer and Information Science, Vol. 87, Springer-Verlag, 2010, pp. 70-84. (EI) NSC 98-2221-E-005 -083
013
Kuo-Fong Kao, I-En Liao, and Jia-Siang Lyu,” An Indoor Location Based Service Using Access Points as Signal Strength Data Collectors,” in Proceedings of International Conference on Indoor Positioning and Indoor Navigation (IPIN), 15-17 September 2010, Zürich, Switzerland. (EI) NSC 99-2221-E-005 -080
014
I-Hui Li, I-En Liao*, and Feng-Nien Wu, “Performance Enhancement in Wireless Sensor Network Clustering,” in Proceedings of International Computer Symposium (ICS 2010), National Cheng Kung University, Dec 16-18, 2010, pp. 728-733. (EI)
015
Jyun-Yao Huang, I-En Liao, and Chen-Kang Chiang, “Efficient Identity-Based Key Management for Configurable Hierarchical Cloud Computing Environment,”in Proceedings of  IEEE 17th International Conference on Parallel and Distributed Systems, Dec 7-9, 2011, Tainan, Taiwan. (EI) NSC 100-2221-E-005-070
016
Wen-Chiao Hsu, I-En Liao, and Hsiao-Chen Shih, “A Cloud Computing Implementation of XML Indexing Method Using Hadoop,” in Proceedings of 4th Asian Conference on Intelligent Information and Database Systems (ACIIDS-2012), March 19-21, 2012, Kaohsiung, Taiwan, Jeng-Shyang Pan et al. (Eds.), Lecture Notes inArtificail Intelligence, Vol. 7198, Springer-Verlag, 2012, pp. 256-265. (EI) NSC 100-2221-E-005-070
017
Wen-Chiao Hsu, I-En Liao, and Pei-Hua Lu, “Supporting Efficient XML Query Evaluation Using Double Indexes,” in Proceedings of 26th International Conference on Advanced Information Networking and Applications Workshops, Fukuoka, Japan, March 26-29, 2012, pp. 197-202. (EI)  NSC 100-2221-E-005-070
D.
中文研討會論文 (Conference Papers in Chinese)
001
李岳家、高國峰、廖宜恩,「植基於SVM分類方法之非法無線基地台偵測研究」,in Proceedings of the 12th Mobile Computing Workshop, Taichung, Taiwan, March 2006, pp.536-541.
002
I-Hui Li, Feng-Nien Wu, and I-En Liao, ”An Energy-efficient Three-layer Clustering Hierarchy for Wireless Sensor Networks,” in Proceedings of 2nd Workshop on Wireless, Ad Hoc, and Sensor Networks, National Central University, Aug. 10, 2006, pp.27-34. NSC95-2221-E-005-114
003
趙漢強、廖宜恩、高國峰,「植基於本體論的RSS個人化推薦系統的設計與實作」,台灣網際網路學術研討會,TANET2006,Nov. 1-3,2006。
004
謝盈存、廖宜恩、高國峰,「一個以覆蓋率與定位準確率為目標函數的無線存取點配置演算法」,台灣網際網路學術研討會,TANET2006,Nov. 1-3,2006。
005
廖宜恩、高國峰、侯柏村,「植基於嵌入式資料庫之為陣列資料分析工具的設計與實作」,2006開放原始碼技術與應用研討會,Nov. 10,2006。NSC95-3113-P-005-001
006
龐偉智、廖宜恩、李怡慧,「基因演算法應用在動態資料的分類規則探勘」,第十一屆人工智慧與應用研討會(TAAI2006),Dec. 15-16,2006。
007
高國峰、黃傳育、廖宜恩,「一個XML文件第四正規化工具的實作」,2007數位生活科技研討會,June 7-8, 2007, pp.123-131.
008
廖宜恩、李怡慧、吳豐年,「一個無線感測網路上流量感知的省電通訊協定」,in Proceedings of the 3rd Workshop on Wireless, Ad Hoc, and Sensor Networks, Tamkang University, Taiwan, Sep. 6-7, 2007, pp.91-96. NSC95-2221-E-005-114.
009
高國峰、蔡儀男、廖宜恩,「一個相當於BCNF形式的XML文件正規化工具的實作」,
台灣網際網路學術研討會,TANET2007,Oct. 22-25,2007,pp.417-422。
010
廖宜恩、張嫄萱,「一個XML文件上的節省空間索引方法」,台灣網際網路學術研討會,TANET2007,Oct. 22-25,2007,pp.447-452。NSC95-2221-E-005-114
011
謝傳祿、劉耀凱、廖宜恩,「植基於MPEG-7與XQuery之嵌入式XML資料庫查詢系統設計與實作」,2007開放源碼國際研討會,Nov. 1-2,  2007。NSC 95-3113-P-005-001
012
廖宜恩、吳素玉,「植基於路徑群聚的有效率XML索引方法」,第七屆離島資訊技術與應用研討會(ITAOI2008),澎湖吉貝,May 30-31, 2008, pp.175-182。
013
廖宜恩、蔡侑燐,「分散式無線區域網路入侵偵測系統」,第七屆離島資訊技術與應用研討會(ITAOI2008),澎湖吉貝,May 30-31, 2008, pp.43-47。
014
廖宜恩、陳志勝、林克仲,「一個改進頻繁樣式成長法的挖掘關聯規則探勘方法」,第七屆離島資訊技術與應用研討會(ITAOI2008),澎湖吉貝,May 30-31, 2008, pp.183-191。
015
廖宜恩、許正怡、高國峰,「基於個人本體論與合作式過濾技術之圖書館推薦系統研究」,第七屆離島資訊技術與應用研討會(ITAOI2008),澎湖吉貝,May 30-31, 2008, pp.48-55。
016
廖宜恩、張琇婷、林克仲,「一個具有彈性時間限制的頻繁子圖探勘演算法」,第七屆離島資訊技術與應用研討會(ITAOI2008),澎湖吉貝,May 30-31, 2008, pp.192-199。
017
廖宜恩、許雯絞、鄭名珊,「植基於個人本體論與合作式過濾的英文館藏推薦系統」,2008 數位生活科技研討會,成功大學,June 5-6, 2008。
018
廖宜恩、謝淑玲、楊志偉,「類神經網路於虛擬量測系統之應用」,2008 數位科技與創新管理研討會,華梵大學,June 18, 2008, pp. 436-449。
019
廖宜恩、李怡慧、鄭之瑞,“A Multi-Dimensional Sequential Patterns Mining Method for Wireless Sensor Networks”, in Proceedings of the Fourth Workshop on Wireless, Ad Hoc, and Sensor Networks, National Cheng Kung University, Taiwan, Sep. 4-5, 2008, pp.54-60.
NSC 96-2221-E-005-045
020
高國峰、廖宜恩、許正怡,「基於個人本體論相似度之圖書館個人化推薦系統」,台灣網際網路學術研討會,TANET2008,Oct. 20-22,2008。
021
陳雨霖、廖宜恩、許雯絞,「植基於節點群聚的有效率XML 索引方法」,2009 數位生活科技研討會,成功大學,May 28-29, 2009。NSC 97-2221-E-005-083
022
李亞蓉、廖宜恩、謝淑玲,「一個自我組織映射圖的新視覺化方法」,2009 數位生活科技研討會,成功大學,May 28-29, 2009。NSC 97-2221-E-005-083
023
廖宜恩、高國峰、王煥宇,「一個應用三角不等式的個人本體論相似度演算法」,2009 數位生活科技研討會,成功大學,May 28-29, 2009。NSC 97-2221-E-005-083
024
劉耀凱、高國峰、廖宜恩,「一個協同式無線裝置定位演算法之設計」,2009 數位生活科技研討會,成功大學,May 28-29, 2009。NSC 97-2221-E-005-083
025
陳宏賓、林克仲、廖宜恩,「一種改進支持度傳遞的有效分群演算法」,2009 數位生活科技研討會,成功大學,May 28-29, 2009。NSC 97-2221-E-005-083
026
陳坤宗、廖宜恩、黃正炎,「以Markovian IDS 提升無線感測網路的防禦能力」,第十九屆資訊安全會議(CISC 2009),台灣科技大學,June 3-5, 2009。NSC 97-2221-E-005-083
027
唐浩文、廖宜恩、黃正炎,「異質性無線感測網路之可前向驗證金鑰管理方法」,第十九屆資訊安全會議(CISC 2009),台灣科技大學,June 3-5, 2009。NSC 97-2221-E-005-083
028
戴昱銓、林克仲、廖宜恩,「一個改善排容原理探勘高頻項目集的演算法」,2010數位生活科技研討會,成功大學,June 24-25, 2010。NSC 98-2221-E-005-083
029
程閎廉、廖宜恩、許雯絞,「植基於分群演算法的混合式合作過濾推薦系統」,2010 數位生活科技研討會,成功大學,June 24-25, 2010。NSC 98-2221-E-005-083
030
黃俊堯、李怡慧、廖宜恩,「在資料串流中預測序列樣式變化的模型」,2010 數位生活科技研討會,成功大學,June 24-25, 2010。NSC 98-2221-E-005-083
031
林孟秋、李怡慧、廖宜恩,「一個以序列樣式長度為考量的序列資料分類模型」, 22th  International Conference on Information Management (ICIM2011), 朝陽科技大學,May 21, 2011. NSC 99-2221-E-005-080
032
巫俊卿、廖宜恩、高國峰,「以多類別關聯規則探勘方法預測疾病分類」, 22th  International Conference on Information Management (ICIM2011), 朝陽科技大學,May 21, 2011. NSC 99-2221-E-005-080
033
高飄逸、廖宜恩、高國峰,「一個具備HL7 CDA R2簡化界接介面的電子病歷系統之設計與實作」, 22th  International Conference on Information Management (ICIM2011), 朝陽科技大學,May 21, 2011. NSC 99-2221-E-005-080
034
蔡明翰、廖宜恩、黃正炎,「有效率之異質性無線感測網路的分群與金鑰管理方法」,第二十一屆資訊安全會議(CISC 2011),虎尾科技大學,May 26, 2011。NSC 99-2221-E-005-080
035
林書帆、林克仲、廖宜恩,「一個基於排容原理與交易映射的頻繁項目集探勘演算法」,2011 數位生活科技研討會,雲林科技大學,July 7-8, 2011。NSC 99-2221-E-005-080
036
呂加祥、廖宜恩、高國峰,「一個依環境變化自動調整並產生虛擬訓練資料之室內無線網路定位模型」,2011 數位生活科技研討會,雲林科技大學,July 7-8, 2011。NSC 99-2221-E-005-080
037
呂珮華、許雯絞、廖宜恩,「以雙索引機制支援有效率的XML查詢方法」,2011 數位生活科技研討會,雲林科技大學,July 7-8, 2011。NSC 99-2221-E-005-080
038
江淑如、許雯絞、廖宜恩,「以法則式分類器預測手術時間」,2011 數位生活科技研討會,雲林科技大學,July 7-8, 2011。NSC 99-2221-E-005-080