I-Te Yiter Chen Publications
    Journal Papers

  1. Chia-Chun Liu, I-Te Chen & Shih-Feng Weng, “Increased risk of sudden sensorineural hearing loss in patients with cervical spondylosis,” Scientific Reports, 5, February, 2024. (IF=3.8(2023), Multidisciplinary Sciences 23/135=17.03%) [SCI]
  2. I-Te Chen, Chien-Chang Chen, Hong-Jie Dai, Babam Rianto, Si-Kai Huang, Chung-Hong Lee*, "An Incremental Learning Method for Preserving World Coffee Aromas by Using an Electronic Nose and Accumulated Specialty Coffee Datasets" in IEEE Transactions on AgriFood Electronics, vol. 2, no. 1, pp. 12-27, March-April 2024, doi: 10.1109/TAFE.2023.3337887. spectrum
  3. Hsueh-Fen Chen, Huey-Er Lee*, I-Te Chen, Yu-Ting Huang, Pei-Shan Ho, and Saleema Karim, “Rural–urban disparities in the incidence and treatment intensity of periodontal disease among patients with diabetes,” Frontier in Public Health, Volume 11 - 06 September 2023. doi: 10.3389/ fpubh.2023.1241150. (IF=5.2(2022), Public, Environmental & Occupational Health 25/180=13.9%) [SCI]
  4. Der-Ming Chang, Yu-Fu Chen, Hong-Yaw Chen, Chong-Chi Chiu, King-Teh Lee, Jhi-Joung Wang, Ding-Ping Sun, Hao-Hsien Lee, Yu-Tsz Shiu, I-Te Chen* and Hon-Yi Shi*, “Inverse Probability of Treatment Weighting in 5-Year Quality-of-Life Comparison among Three Surgical Procedures for Hepatocellular Carcinoma,” Cancers, 2023, 15(1), 252; 30 December 2022, https://doi.org/10.3390/cancers15010252. (IF=6.575(2021), Oncology 76/318=23.9%) [SCI]
  5. I-Te Chen, Jer-Min Tsai, Yin-Tung Chen, Chung-Hong Lee*, “Lightweight Mutual Authentication for Healthcare IoT,” Sustainability, 14(20), 13411; https://doi.org/10.3390/su142013411, Oct. 18 2022. (IF=3.889(2021), Environmental Studies 57/128=44.5%) [SCI]
  6. Chung-Hong Lee*, I-Te Chen*, Hsin-Chang Yang, and Yenming J. Chen, “An AI-powered Electronic Nose System with Fingerprint Extraction for Aroma Recognition of Coffee Beans,” Micromachines, 13(8), 1313; https://doi.org/10.3390/mi13081313, Aug. 13 2022. (IF= 3.523 (2021), Instruments & Instrumentation 21/64=32.81%) [SCI]
  7. Chun-I Fan, Jheng-Jia Huang, Shang-Wei Tseng and I-Te Chen* "Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach," IEEE Transactions on Cloud Computing, doi:10.1109/TCC.2018.2871181, Volume: 9, Issue: 2, pp.546-561, June 1 2021. (IF=4.714, Computer Science/Theory & Methods 11/108= 10.19%) [SCI]
  8. Rung-Shiang, Lee, Hung-Yuan Huang, Pei-Zhen Lin, Hao-Rui,Wu, Ting-Shyuan Lu, I-Te Chen* “Sign language recognition system using CNN,” Journal of Medicine and Healthcare, Vol.2(4): pp. 1-6, December 30, 2020. [本人未同意刊登]
  9. I-Te Chen, Yu-Hsien Chiu, Han-Chun Liao, Jer-Min Tsai, Wen-Hsien Ho, Chen-Sen Ouyang*, “Multisensors-based Verification Mechanism with Encryption and Decryption on Fault-tolerant databases,” Sensors and Materials, Volume:32, Number: 6(3), pp.2187-2197, June 30, 2020. (IF=0.759, Instruments & Instrumentation 59/64 =92.19%) [SCI]
  10. Chun-I Fan, I-Te Chen*, Chen-Kai Cheng, Jheng-Jia Huang, and Wen-Tsuen Chen, "FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Non-Designated Receivers," IEEE System Journal, Volume:22, Issue:1, pp.473 - 484, March, 2018. (IF=4.463, Computer Science/Information systems 15/155= 9.68%) [SCI]
  11. Jer-Min Tsai, I-Te Chen, Ying-Fong Huang and Cheng-Che Lin*, "Watermarking Technique for Improved Management of Digital Medical Images," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 18, No. 6, pp.785-799, December, 2015. [EI]
  12. Fu-I Chou, Yi-Lung Chiang, I-Te Chen and Jinn-Tsong Tsai*, "Genetic Algorithm for Optimal Resolution Planning in DOE-based Taguchi Method," Journal of Chinese Society of Mechanical Engineers, Vol.36, No.6, pp.481~490, Dec, 2015. (IF=0.274, Engineering, Mechanical 114/125) [SCI]
  13. Shi HY, Hwang SL, Lee IC, Chen IT, Lee KT,* Lin CL, "Trends and Outcome Predictors after Traumatic Brain Injury Surgery: A Nationwide Population-Based Study in Taiwan," Journal of Neurosurgery, Accepted 2014.(SCI, 1st Revision, IF=3.148, SURGERY 21/198)
  14. I-Te Chen “Random Numbers Generated from Audio and Video Sources,” Vol. 2013, Article ID: 285373, Mathematical Problems in Engineering, 2013. IF: 1.383, ranking: 23/90 (25.56%) [SCI]
  15. I-Te Chen, Jinn-Tsong Tsai, Ching-Feng Wen and Wen-Hsien Ho*, “Artificial neural network with hybrid Taguchi-genetic algorithm for nonlinear MIMO model of machining processes”, Int. J. of Innovative Computing, Information and Control, Vol. 9, No.4, pp.1455-1475, April, 2013. [SCIE]
  16. I-Te Chen, Jer-Min Tsai, and Jengnan Tzeng*, “Re-encryption method designed by Row Complete Matrix,” Mathematical Problems in Engineering, Vol. 2012, Article ID 402890. [SCI] IF: 0.777, ranking: 42/90 (46.67%)
  17. Jer-Min Tsai, Jengnan Tzeng, and I-Te Chen*, "Random Number Generated from white noise of Video," ICIC Express Letter, Vol.6, No.7, pp. 1827-1832, 2012. [EI]
  18. Wen-Hsien Ho, Shinn-Horng Chen, I-Te Chen, Jyh-Horng Chou and Chun-Chin Shuk, "Design of Stable and Quadratic-Optimal Static Output Feedback Controllers for TS-Fuzzy-Model- Based Control Systems: An Integrative Computational Approach," International Journal of Innovative Computing, Information and Control, (IJICIC-10-09039), Vol.8, No.1(A), pp. 403-418, January 2012,. [SCIE]
  19. Chieh-Fan Chen, Wen-Hsien Ho, Shu-Mei Yang, I-Te Chen and Hon-Yi Shi*, "Long-term prediction of emergency department revenue and visitor volume using autoregressive integrated moving average model", Computational and Mathematical Methods in Medicine, 2011, Article ID 395690. [SCI, EI] IF:0.814
  20. Ming-Hsin Chang, I-Te Chen*, and Ming-Te Chen, "Design of Proxy signature in ECDSA," Journal of Information Assurance and Security (JIAS), Vol.5 Issue 1, pp. 360-366. 2010.
  21. Yi-Shiung Yeh, Ting-Yu Huang, I-Te Chen, and Shih-Chin Chou, “Analyze SHA-1 in message schedule,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 10(2007), No. 1, pp.1-7. Feb. 2007.
  22. Yi-Shiung Yeh, I-Te Chen, Ting-Yu Huang, and Chan-Chi Wang, “ Dynamic Extended DES,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9(2006), No.2, pp.321-330, Aug. 2006.
  23. I-Te Chen, Ming-Hsin Chang, and Yi-Shiung Yeh “ Design of proxy signature schemes in the Digital Signature Algorithm (DSA)”Journal of Information Science and Engineering, Vol. 22 No. 4, pp. 965-973 (July 2006)[SCIE/EI]
  24. I-Te Chen, and Yi-Shiung Yeh “ Security analysis of Transformed-Key Asymmetric Watermarking System,” IEEE Signal Processing Letters, Vol. 13, Issue 4, pp.213- 215, April 2006. [SCIE/EI]
  25. Yi-Shiung Yeh, I-Te Chen, and Chan-Chi Wang, “ Randomizing Encryption Mode,” Journal of Discrete Mathematical Sciences & Cryptography. Vol. 8(2005), No.3, pp.355-364.
  26. I-Te Chen, and Yi-Shiung Yeh, “ Proxy Signature Scheme Based on Quadratic Residues,” Asian Journal of Information Technology, Vol. 4 No. 5, pp. 541-549, May, 2005.
  27. Yi-Shiung Yeh, Ming-Hsin Chang, I-Te Chen and I-Chen Wu “ Schnorr Blind Signature Scheme based on Elliptic Curves, ” Asian Journal of Information Technology, Vol. 2 No. 3, pp.130-134, July-September, 2003.
  28. Yi-Shiung Yeh, Wei Shen Lai, and I-Te Chen, “ An N-D Cryptoscheme ,” Journal of Information & Optimization Sciences, Vol. 23, No.1, pp. 19-36,2002. [EI]
    Journal Papers (Chinese)

  1. 莊宜達、莊濱鴻、邱毓賢、陳以德、楊珮菁*, “大學生網球課程的身體運動強度監測分析,” 興大體育學刊, Vol.23 pp. 79-92, May, 2023.
  2. 陳以德、陳胤彤、蔡哲民, “以屬性加密為基礎的輕量化雙向認證,” 資訊安全通訊, Communications of the CCISA, Vol. 27 No. 2, pp.41-65, May, 2021.
  3. 蔡哲民, 曾正男, 陳以德*, “參數式列完備矩陣之轉加密方法,”資訊安全通訊, Communications of the CCISA, Vol. 21 No. 4, pp.22-31, October, 2015.
  4. 曾正男, 陳以德*, "利用破壞自格函數的平滑性設計之亂數產生器,"資訊安全通訊, Communications of the CCISA, Vol 15 No. 1, pp.22-31, January , 2009.
  5. 簡文山、陳以德、郭乃文, 楊哲銘, ”可攜式電子病歷的初步安全基礎架構---以TMT為例,” 資訊安全通訊, Communications of the CCISA, Vol. 14 No. 4, pp.149-161, October 10, 2008.
  6. 張靜芬, 郭宏亮, 陳以德, 盧天鴻* ”MRI作業場所的電磁輻射強度之調查,” 中華民國環境保護學會學刊, Journal of the environmental protection society, Vol. 30 No. 2, pp. 114-122, Feb. 2007. ISSN: 0254-0010.
  7. Chan-Chi Wang, Wei Shen Lai, I-Te Chen*, and Yi-Shiung Yeh, “一個同態墊塞機制,” Journal of Computers,Vol.16, No.5, pp.17-21, June 2005.

    Conference Papers

  1. Xuan-Ren Guo, Fu-I Chou*, Po-Yuan Yang*, Wen-Hsien Ho, I-Te Chen and Jinn-Tsong Tsai, “Automatic Detection of Breast Cancer on MRI Based on RCNN,” International Conference on Applied System Innovation(ICASI) 2023, April 21-25, Japan, 2023.
  2. Cheng-Yuan Wang, Yao-Siang Lai, I-Te Chen*, Wen-Hsien Ho*, “Design of Assisted Medical Diagnosis E-learning System,” International Multi-conference on Engineering and Technology Innovation (IMETI) 2021, October 29 - November 02, 2021.
  3. Kuan-Yuan Wang, Cheng-Sheng Chen, Hui-Mei Chen, and I-Te Chen, “A Pilot Study of an Innovative Model of Care Delivery: Service Robot for Older People with Dementia in a Rural Community,” Innovation in Aging, 4(Suppl 1) pp. 927–928, Dec 16, 2020.
  4. I-Te Chen, Han-Chun Liao, Jer-Min Tsai, Wen-Hsien Ho*, “Secure Access and Transmission in Modular Cloud Computing System,” International Multi-conference on Engineering and Technology Innovation (IMETI) 2019, November 15-19, 2019.
  5. Cheng-Yuan Wang, Wen-Yu Ho, Ying-Fong Huang, Jer-Min Tsai, I-Te Chen, and Jer-Chia Tsai, “Genetic-Psycho-Social-Biological Encounter (GPSBE) SOAP mind map approach for clinical reasoning and medical record: A pilot study for medical clerk ship in general internal medicine,” Association for Medical Education in Europe (AMEE), Poster Presentation. 24-28 30 August~3 September 2014.
  6. Jer-Min Tsai, I-Te Chen, and Jengnan Tzeng*, “Rounding error type random number generator designed by subspace projection,” International Workshop on Cloud Computing and Information Security (CCIS 2013), Paper ID: CS29252, pp.123-126, Shanghai, 2013.11-9~11.
  7. Yu-Hsien Chiu, Hao-Yun Kao, I-Te Chen, I-Nong Lee, Wen-Hsien Ho, Liang-Yu Chen, Pin-Han Huang, Sin-Hao Chen, Chih-Yun Liu, Hsiao-Yan Lu, “A Body-Sensed Motor Assessment System for Stroke Upper-Limb Rehabilitation: A Preliminary Study,” 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp.3819- 3824, 13-16 Oct. 2013.
  8. Jer-Min Tsai, I-Te Chen, Ying-Fong Huang and Cheng-Che Lin*, “Watermarking Technique for Improved Management of Digital Medical Images,” The Second Cross-Straits Conference on Information Security (CSCIS 2013), pp.13-25, 2013. 9.11~13.
  9. Shi, H.-Y, Tsai, J.-T, Ho, W.-H, Wang, S.-C, Chen, I-Te, Lee, K.-T, “Comparison of artificial neural network and logistic regression models for predicting in-hospital survival after hepatocellular carcinoma surgery,” Society of Instrument and Control Engineers of Japan, SICE 2012, Article number:6318640, pp. 1262-1265, Akita, 2012.8.20~23.
  10. Jengnan Tzeng, Jer-Min Tsai and I-Te Chen* “Secure File Sharing in the Cloud by Row Complete Matrix Re-encryption Method,” Innovative Management, Information & Production in Otaru (IMIP2011 Excellent paper award), pp.13-24, October 8-10, 2011.
  11. I-Te Chen, Jer-Min Tsai, and Jengnan Tzeng, “Audio Random Number Generator and its Application,” International Conference on Machine Learning and Cybernetics (ICMLC 2011), pp.1678-1683, July 10-13, 2011. [EI]
  12. Jer-Min Tsai, I-Te Chen*, and Jengnan Tzeng, “Random number generated from white noise of webcam,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), September 12-14, 2009.
  13. Jengnan Tzeng, I-Te Chen*, and, Jer-Min Tsai “Random Number Generator designed by the divergence of scaling functions,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), September 12-14, 2009.
  14. 11. Ming-Hsin Chang, I-Te Chen*, and Ming-Te Chen “Design of Proxy Signature in ECDSA,” IEEE International Conference on Intelligent Systems Design and Applications (ISDA 2008, ISBN 978-0-7695-3382-7), Vol.3, pp. 17~22, 2008.11.26-28. [EI]
  15. I-Te Chen, Yi-Shiung Yeh, and Ming-Hsin Chang, “ Proactive secret sharing proxy signature scheme with proxy share recovery,” International Association for Computer Information Systems (IACIS) Pacific 2005. pp.52-58. 2005.5.20.
    Conference Papers (Chinese)

  1. 杜伯庸, 邱毓賢、楊珮菁、莊宜達、陳以德*, "AI動作影像最佳化特徵分析及量化評估,"第4屆運動照護與運動表現國際研討會(ICACP2024), 2024.11.16~17.
  2. 蔡永欽, 陳以德, 李昭賢*, "以隨機線性網路編碼改進可靠且安全之虛擬私人網路," 台灣網際網路研討會(TANET 2023), 2023.11.1~3
  3. 陳以德, 曾煥松, 李昭賢*, “基於公開金鑰基礎建設之物聯網快速雙向認證,”第31屆全國資訊安全會議, A2-03, August 5-6, 2021.
  4. 李榮祥, 黃泓源, 林佩蓁, 吳昊叡, 魯亭萱, 陳以德*, “手語溝通辨識系統,” 臺灣網際網路研討會(TANET 2019), 2019.9.25~27.
  5. 鄭宜崴, 何文獻, 鄭雅倫, 陳以德*, “運用機器學習演算法於肌電圖手勢訊號辨識,” 全國計算機會議National Computer Symposium (NCS 2017), 2017.12.14~15
  6. 蔡哲民, 曾正男, 陳以德*, “參數式列完備矩陣之轉加密方法,” 全國資訊安全會議 (CISC2015), pp. 129-133, 2015.5.28~29.
  7. 蔡哲民, 陳以德, 楊東霖, 劉澔暐, “以手機搖動亂數為基礎的LBS餐廳選擇器,” NCS 2013.
  8. 林皇辰, 黃英峰*, 鍾相彬, 陳以德, 蔡哲民, “核子醫學全身骨掃描及鎵-67掃描影像融合,” International Symposium on Frontier Biomedical and Molecular Imaging(ISFBMI), Poster. Nov. 5-6, 2011.
  9. 盧天鴻, 陳以德, 黃英峰, 蔡哲民, 林正哲* ”運用Watermark 增進電子病歷影像之安全性,”第十四屆電子商務研討會, 2010.10.30.
  10. 陳以德, 曾正男, 蔡哲民*, ”適用於多媒體時代的亂數產生器,” 2010 International Conference on Multimedia Communication Technology and Application (IMCTA 2010),台南, pp.35-42, 2010.10.29
  11. 李正崙, 朱慧媛, 孫靖婷, 楊縢清, 廖晏辰, 莊峻鴻, 陳以德*, 陳明德, “結合憑證之安全電子病歷傳輸系統,” 全國計算機會議National Computer Symposium (NCS 2009), 2009.11.27~28
  12. 葉義雄, 陳以德, 黃定宇, 及周士欽, “ 分析與改進SHA-1 的訊息處理模式,” 全國資訊安全會議ISC2005, 2005.6.9
  13. 陳以德, 李正國 “利用層級分析法進行國中生教育類網站評鑑,” 「學習與創造.教育與創新」國際研討會論文集, pp. 354-364, 2005.5.20.
    Patent(獲證)
  1. 美國發明專利(公開號: US 2013/0204915A1, 授權US 8793296 B2):Random number generating method, 2014-07-29獲證
  2. 美國發明專利(公開號: US2013/0246789A1, 授權US 8533493 B1):Method for Securing Transmission Data, 2013-9-10獲證
  3. 美國發明專利(公開號:US-2015-0261925-A1, 授權US 10,061,898 B2):Avatar-based Charting System for Assisted Diagnosis 2015-9-17公開, 2018-8獲證
  4. 發明專利(證號: I462009):亂數產生方法, 2014-11-21獲證
  5. 發明專利(證號: I488476):基於完整列矩陣之再加密方法, 2015-06-11獲證
  6. 發明專利(證號: I501189):擬人化醫療資訊紀錄方法及輔助診療系統, 2015-09-21獲證
  7. 發明專利(證號: I505228):一種自主復健動作量化評估系統, 2015-10-21獲證
  8. 發明專利(證號: I509556):目標導向復健輔助系統與其工作設定方法, 2015-11-21獲證
  9. 發明專利(證號: I591569):復健動作編輯與圖形化評量系統, 2017-07-11獲證
  10. 發明專利(證號: I621870):X光機輻射劑量攝影參數估測系統及其估測方法,2018-04-21獲
  11. 新型專利(申請號:M563135):組合式支架, 2018-07-1獲證

    Patent(申請中)
  1. 發明專利(申請號: 105110617):資料加解密系統及其加解密方法(一種門檻式存取驗證之容錯式資料庫加解密方法與系統), 2016-04-1

    Submitted Papers

  1. Ming-Hsin Chang, I-Te Chen, and Yi-Shiung Yeh, “Partially Blind Threshold Signature with Low Computation”(Submit to Computer Systems, Science and Engineering) 2003.2.6
  2. Yi-Shiung Yeh, and I-Te Chen, “Padding problem solution on block ciphers with homophony approach,” (Submit to IPL) 2004.4.20
  3. Yi-Shiung Yeh, and I-Te Chen “Extended SHA-1 for security enhancement,” (Submit to Applied Mathematics and Computation AMC_518) 2005.1.28
    Ongoing Papers

  1. Ming-Hsin Chang, I-Te Chen, Tzu-Shin Lin, and Yi-Shiung Yeh,“Forward Secure Proxy Signature and its applications,” (Submit to
  2. Yi-Shiung Yeh, I-Te Chen, and Wei Shen Lai, “The Orthogonal Signature,” (Submit to
  3. I-Te Chen, Chan-Chi Wang, and Yi-Shiung Yeh, “Dynamic CBC-MACs,” (Submit to Electronic Letters)
  4. I-Te Chen, Yi-Shiung Yeh, and Ming-Hsin Chang, “Proactive secret sharing proxy signature scheme with proxy share recovery,” (Submit to JCIS)
  5. I-Te Chen, C-J Fang and Jengnan Tseng, “Audio watermark,” (Submit to xxx)
  6. I-Te Chen, Ming-Hsin Chang, and Yi-Shiung Yeh, “Improving encoded Lamport’s one-time signature scheme without trapdoors,” (Submit to xxx)

    著作

  1. 陳以德、陳明德、簡文山, "可攜性電子病歷保護," 資通安全專論, T97014, 行政院國家科學委員會科學技術資料中心, 2009.
  2. 張明信、陳以德、葉義雄, “帳戶式支付之行動電子交易,”資通安全專輯之四:系統安全, 行政院國家科學委員會科學技術資料中心,2002.12.25.
  3. 葉義雄、林祝興、王銓祺、詹進科、陳以德, “密碼標準,”第一章與第四章, 資通安全專輯之六, 行政院國家科學委員會科學技術資料中心, 2004.12.25.
    參與過計劃

  1. 國科會,113年度大專學生研究計畫-劉芯妤(醫資管3), NSTC113-2813-C-037-002-H, 113/7/1~114/2/28,51,000.
  2. 國科會,112年度大專學生研究計畫-劉芯妤(醫資管2), NSTC112-2813-C-037-002-H, 112/7/1~113/2/29,68,000.
  3. 國科會,112年度大專學生研究計畫-蘇璿(醫資管2), NSTC112-2813-C-037-006-E, 112/7/1~113/2/29,58,000.
  4. 國科會,建立糖尿病微血管病變進展之預測模型-以機器學習法對臨床和營養變數進行全面評估,2024/08 ~ 2026/07,共同主持人
  5. 國科會,FHIR架構下安全存取健康資訊機制的研究與開發,2022/8-2023/7,主持人, 111-2221-E-037 -005,700,000.-
  6. 高科-高醫研發暨產學合作補助計畫(110KK023),一個支援遠距診療資訊安全的區塊鏈與AI多模態病患特徵辨識系統的開發研究,110/11/05~111/11/04,主持人, 400,000.-
  7. 國科會,健走與台語聽覺化認知的同步結合型訓練在社區認知障礙長者之手機軟體開發與成效驗證,2022/08/01∼2023/10/31,111-2410-H-037-008-,共同主持人,635,000.-
  8. 科技部,大學生約會暴力旁觀者助人意圖及行為之研究--應用計畫行為理論探討、建構並評值約會暴力防治教育方案,2021/08/01 ~ 2023/07/31,110-2410-H-037 -005 -SS2,共同主持人,1,508,000.-
  9. 主恩興業有限公司,產學合作,兌幣機網路測試S108024,主持人,2020/3/20~2020/12/31,100,000.-
  10. 高雄醫學大學計畫(KMU-M109007),FHIR生醫物聯網之安全分析與研發,主持人,2020/1/1~2020/12/31,190,000.-
  11. 科技部,智慧機器人應用在失智病人居家遠距照護之創新模式,協同主持人, 2019/7/19~2020/8/31
  12. 科技部,健走加認知同步訓練對思覺失調症個案認知功能之成效:手機軟體開發與成效驗證,2018/08/01~2021/07/31,107-2410-H-037 -006 -MY3,共同主持人,2,763,000
  13. 科技部,健康促進與照護器材產學技術聯盟跨領域技術服務提升計畫(1/3),2017/02/01 ~ 2018/01/31,106-2622-8-037 -001 -TB1,共同主持人,2,400,000
  14. 高雄醫學大學教學創新實踐計畫,網路攻防演練,2017/09/01~2018/01/31,45,000
  15. 高雄醫學大學產品導向計畫, 擬人化醫療資訊紀錄方法及輔助診療系統, 200,000.-, 2016.
  16. 高雄醫學大學計畫(KMU-M105020),醫療雲加密與轉加密機制,105/1/1~105/12/31,主持人, 150,000.-
  17. 中山高醫,整合生醫訊號之雲端化安全電子病歷系統,103/1/1~103/12/31, NSYSUKMU 103-I- 001, 子計畫主持人, 480,000
  18. 國科會,密碼與亂數產生系統之研發,2013/08/01~2014/07/31,102-2218-E-168-001-,協同主持人,373,000
  19. 中山高醫,直覺式安全電子病歷之研發,102/1/1~102/12/31, NSYSUKMU-P001, 主持人, 400,000
  20. 教育部,公民素養陶塑計畫,2011/8/1-2013/1/31,計畫參與人。9,000,000.-
  21. 國科會,植基於個人設備之亂數產生器,2010/7-2011/7,NSC 99-2221-E-037-04, 主持人. 490,000.
  22. 教育部, 98 高醫「教學卓越計畫」主軸2 -子計畫4:提升語文與資訊能力,2011/1-2011/12,計畫參與人
  23. 教育部, 98 高醫「教學卓越計畫」主軸1 - 子計畫6:建構數位學習環境,提升學生資訊能力,2009/8-2010/7,主持人
  24. 教育部, 96~97 高醫「教學卓越計畫」主軸5 - 子計畫3:建置全校學習社群網路,促進學生合作學習,2007/8-2009/7,主持人
  25. 教育部,「人文教育革新計畫」中綱計畫,紅樓夢課程發展計畫,2010/1-2010/7,協同主持人
  26. 教育部,「人文教育革新計畫」中綱計畫,醫學人文課程發展計畫,2010/1-2010/7,主持人
  27. 教育部,「人文教育革新計畫」中綱計畫,蘇試課程發展計畫,2008/8-2009/1,協同主持人
  28. 教育部,「人文教育革新計畫」中綱計畫,文化創意產業課程發展計畫,2007/8-2008/1,主持人
  29. 工研院,數位電視 – Security Manager Part,2005-2007
  30. 中華電信,SSL Relay 計劃,2002
  31. 中華電信,憑證中心計劃,2001-2002
  32. 國科會,用行動代理人設計與實作可存活性之感測器網路,2005-2008
  33. 國科會,行動代理人入侵偵測系統,2002-2005
  34. 國科會,具抵擋錯誤攻擊能力的對稱型塊狀加密器之研製,1998-2001
  35. 國科會,符合AES標準之衍生DES密碼系統之研究,2000
  36. 推廣教育中心,線上教務系統、ICEE2000會議網頁小組,2000
Last revised is :