白浩廷/ Pai,Hao-Ting

助理教授/Assistant Professor

信箱:htpai@yuntech.edu.tw

最高學歷

國立中正大學資訊管理博士

Ph.D in Information Management, CCU, Taiwan


研究領域

可解釋人工智慧 Explainable AI (XAI)、大數據分析 Big Data Analytics、異常偵測與探索 Anomaly Detection & Exploration、資訊安全 Information Security、雲端運算 Cloud Computing、物聯網 Internet of Things (IoT)


Journal Papers 期刊論文

  • S. Wang, M. Wu, F. Wu, W. Wu, & H. Pai, “Application of virtual force method for deploying mobile sensor networks” In Journal of Physics Conference Series, vol. 1064, no. 1, 2018. (EI)
  • S.L. Wang, H.T. Pai, M.F. Wu, F. Wu, C.L. Li, “The evaluation of trustworthiness to identify health insurance fraud in dentistry,” Artificial Intelligence in Medicine, vol. 75, pp. 40-50, 2017. (SCI, Q1, 本人為通訊作者)
  • H.T. Pai, F. Wu, P.Y. Hsueh, “A relative patterns discovery for enhancing outlier detection in categorical data,” Decision Support Systems, vol. 67, pp. 90-99, 2014. (SCI, Q1, 本人為第一作者)
  • F. Wu, H.T. Pai, Y.F. Yan, J. Chuang, “Clustering results of image searches by annotations and visual features,” Telematics and Informatics, vol. 31, no. 3, pp. 477-491, 2014. (SSCI, Q1, 本人為第二作者)
  • F. Wu, H.T. Pai, X. Zhu, P.Y. Hsueh, Y.H. Hu, “An adaptable and scalable group access control scheme for managing wireless sensor networks,” Telematics and Informatics, vol. 30, no. 2, pp. 144-157, 2013. (SSCI, Q1, 本人為通訊作者)
  • H.T. Pai and F. Wu, “Prevention of wormhole attacks in mobile commerce based on non-infrastructure wireless networks,” Electronic Commerce Research and Applications, vol. 10, no. 4, pp. 384-397, 2011. (SCI & SSCI, Q1, 本人為第一作者)

Conference Papers 研討會論文

  • H.T. Pai, H.W. Lai, S.L. Wang, M.F. Wu and Y.T. Chuang, “Recommendations for mobile applications: Facilitating commerce in Google Play,” Proceedings of the 1st ACM International Conference on Internet of Things and Machine Learning, no. 10, 2017.
  • H.T. Pai, F. Wu, P.Y. Hsueh, G. Lin, Y.H. Chan, “Relative Patterns Discovery toward Big Data Analytics,” Proceedings of the 12th IEEE International Conference on e-Business Engineering (ICEBE 2015), Beijing, pp. 401-407, 2015. (EI) [Acceptance rate 20%]
  • H.T. Pai, F. Wu, Y.H. Hu, “A Highly Parallel-able Method for Discovering Frequent Itemsets,” Proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014), Nový Smokovec, High Tatras, Slovakia, 2014. [NSC Fellowship, Grant: NT$ 49,000]
  • P.Y. Hsueh, T. Grandison, C.W. Lan, I.H. Hsiao, H. Chang, H.T. Pai, “Privacy protection for personal data integration and sharing in care coordination services: A case study on wellness cloud,” Proceedings of the 2012 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), pp. 111-116, 2012. (EI)
  • H. Chang, P.Y. Hsueh, T. Grandison, and X.X. Zhu, H.T. Pai, “Challenges and Requirements on Privacy in Enabling Evidence Use Service on Wellness Cloud,” Proceedings of the the 21st Annual Frontiers in Service Conference, Co-Sponsored by the Center for Excellence in Service, Robert H. Smith School of Business, University of Maryland, USA, 2012.
  • F. Wu, H.T. Pai, X.X. Zhu, P.Y. Hsueh, and Y. H. Hu, “Dynamic Access Control for Secure Group Communication in Wireless Sensor Networks,” Proceedings of the 2011 IEEE International Conference on Electrical Engineering/Electronics Computer Telecommunications and Information Technology (ECTI-CON 2011), Khon Kaen, pp. 288-291, May 2011. (EI) [NSC Fellowship, Grant: NT$ 16,000]
  • H.T. Pai and F. Wu, “Preventing Wormhole Attacks in Mobile Commerce,” Proceedings of the 2009 IEEE International Conference on e-Business Engineering (ICEBE 2009), Macau, pp. 437-442, October 2009. (EI) [Acceptance rate 18%]
  • W.J. Tsaur and H.T. Pai, “Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks,” Proceedings of the AIP (American Institute of Physics) International Electronic Conference on Computer Science, Athens, Volume 1060, pp. 417-420, November 2008. (EI)
  • W.J. Tsaur and H.T. Pai, “Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile Ad Hoc Networks,” Lecture Notes in Computer Science, Springer-Verlag, Canada, pp. 475-484, August 2007. (EI)
  • W.J. Tsaur and H.T. Pai, “A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks,” Lecture Notes in Computer Science, Springer-Verlag, Canada, pp. 513-522, August 2007. (EI)
  • W.J. Tsaur and H.T. Pai, “A New Security Scheme for On-Demand Source Routing in Mobile Ad Hoc Networks,” Proceedings of the 2007 ACM International Conference on Communications and Mobile Computing (IWCMC '07), Hawaii, pp. 577-582, August 2007. (EI)