About us

Hao-Ting PaiAssistant Professor

Hao-Ting Pai
05-5342601
greatpai@hotmail.com
  • ►highest education/最高學歷
    PhD, in the Department of Information Management, at National Chung Cheng University, Taiwan 國立中正大學 資訊管理 博士

    ►Expertise/專長
    1. Explainable AI (XAI);可解釋人工智慧
    2. Big Data Analytics;大數據分析
    3. Anomaly Detection & Exploration;異常偵測與探索
    4. Information Security;資訊安全
    5. Cloud Computing;雲端運算
    6. Internet of Things (IoT);物聯網

    ►Course subjects/任教科目
    1. Java Programming;Java程式設計)
    2. Database Administration(Ⅰ);資料庫管理(一)
    3. Data Science with Excel;Excel在資料科學上的運用
  • Journal Papers 期刊論文
    1. S. Wang, M. Wu, F. Wu, W. Wu, & H. Pai, “Application of virtual force method for deploying mobile sensor networks” In Journal of Physics Conference Series, vol. 1064, no. 1, 2018. (EI)
    2. S.L. Wang, H.T. Pai, M.F. Wu, F. Wu, C.L. Li, “The evaluation of trustworthiness to identify health insurance fraud in dentistry,” Artificial Intelligence in Medicine, vol. 75, pp. 40-50, 2017. (SCI, Q1, 本人為通訊作者)
    3. H.T. Pai, F. Wu, P.Y. Hsueh, “A relative patterns discovery for enhancing outlier detection in categorical data,” Decision Support Systems, vol. 67, pp. 90-99, 2014. (SCI, Q1, 本人為第一作者)
    4. F. Wu, H.T. Pai, Y.F. Yan, J. Chuang, “Clustering results of image searches by annotations and visual features,” Telematics and Informatics, vol. 31, no. 3, pp. 477-491, 2014. (SSCI, Q1, 本人為第二作者)
    5. F. Wu, H.T. Pai, X. Zhu, P.Y. Hsueh, Y.H. Hu, “An adaptable and scalable group access control scheme for managing wireless sensor networks,” Telematics and Informatics, vol. 30, no. 2, pp. 144-157, 2013. (SSCI, Q1, 本人為通訊作者)
    6. H.T. Pai and F. Wu, “Prevention of wormhole attacks in mobile commerce based on non-infrastructure wireless networks,” Electronic Commerce Research and Applications, vol. 10, no. 4, pp. 384-397, 2011. (SCI & SSCI, Q1, 本人為第一作者)
    ►Conference Papers 研討會論文
    1. H.T. Pai, H.W. Lai, S.L. Wang, M.F. Wu and Y.T. Chuang, “Recommendations for mobile applications: Facilitating commerce in Google Play,” Proceedings of the 1st ACM International Conference on Internet of Things and Machine Learning, no. 10, 2017.
    2. H.T. Pai, F. Wu, P.Y. Hsueh, G. Lin, Y.H. Chan, “Relative Patterns Discovery toward Big Data Analytics,” Proceedings of the 12th IEEE International Conference on e-Business Engineering (ICEBE 2015), Beijing, pp. 401-407, 2015. (EI) [Acceptance rate 20%]
    3. H.T. Pai, F. Wu, Y.H. Hu, “A Highly Parallel-able Method for Discovering Frequent Itemsets,” Proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014), Nový Smokovec, High Tatras, Slovakia, 2014. [NSC Fellowship, Grant: NT$ 49,000]
    4. P.Y. Hsueh, T. Grandison, C.W. Lan, I.H. Hsiao, H. Chang, H.T. Pai, “Privacy protection for personal data integration and sharing in care coordination services: A case study on wellness cloud,” Proceedings of the 2012 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), pp. 111-116, 2012. (EI)
    5. H. Chang, P.Y. Hsueh, T. Grandison, and X.X. Zhu, H.T. Pai, “Challenges and Requirements on Privacy in Enabling Evidence Use Service on Wellness Cloud,” Proceedings of the the 21st Annual Frontiers in Service Conference, Co-Sponsored by the Center for Excellence in Service, Robert H. Smith School of Business, University of Maryland, USA, 2012.
    6. F. Wu, H.T. Pai, X.X. Zhu, P.Y. Hsueh, and Y. H. Hu, “Dynamic Access Control for Secure Group Communication in Wireless Sensor Networks,” Proceedings of the 2011 IEEE International Conference on Electrical Engineering/Electronics Computer Telecommunications and Information Technology (ECTI-CON 2011), Khon Kaen, pp. 288-291, May 2011. (EI) [NSC Fellowship, Grant: NT$ 16,000]
    7. H.T. Pai and F. Wu, “Preventing Wormhole Attacks in Mobile Commerce,” Proceedings of the 2009 IEEE International Conference on e-Business Engineering (ICEBE 2009), Macau, pp. 437-442, October 2009. (EI) [Acceptance rate 18%]
    8. W.J. Tsaur and H.T. Pai, “Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks,” Proceedings of the AIP (American Institute of Physics) International Electronic Conference on Computer Science, Athens, Volume 1060, pp. 417-420, November 2008. (EI)
    9. W.J. Tsaur and H.T. Pai, “Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile Ad Hoc Networks,” Lecture Notes in Computer Science, Springer-Verlag, Canada, pp. 475-484, August 2007. (EI)
    10. W.J. Tsaur and H.T. Pai, “A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks,” Lecture Notes in Computer Science, Springer-Verlag, Canada, pp. 513-522, August 2007. (EI)
    11. W.J. Tsaur and H.T. Pai, “A New Security Scheme for On-Demand Source Routing in Mobile Ad Hoc Networks,” Proceedings of the 2007 ACM International Conference on Communications and Mobile Computing (IWCMC '07), Hawaii, pp. 577-582, August 2007. (EI)
Home / About us / Teacher presentation