My major research interests include Deep Learning (Deep Learning 101), Block Chain, Malware Analysis (TWMAN & R2-D2), Type-2 Fuzzy Logic, and Ontology Applications. 
Moreover, you may be interested in my talk which about my research.


  • Domestic Industry/Security Conference Speaker:4

    • TonTon H.-D. Huang"New Wars for Reputation: From Understanding to Problem Solving: Applying Deep Learning to defend against the Deceptive Advertising", CSA Taiwan Summit, Taipei, Taiwan, 2016.

    • TonTon H.-D. Huang"From Understanding to Problem Solving-Applying Deep Learning to Defend Against the Deceptive Advertising and Phone Scams", 8th Hadoop.TW annual conference, Taipei, Taiwan, 2016.

    • TonTon H.-D. Huang"New Mindset for Malware Battlefield: Bytecode Analysis and Physical Machine-based for Android", HITCON CMT, Taipei, Taiwan, 2015.

    • TonTon H.-D. Huang"Building Adaptive Heterogeneous Architecture for Malware Behavior Analysis: MAN in Taiwan", HITCON PLG, Taipei, Taiwan, 2014.

1B(J) + 5C (C) =  2.285 + ((1.0666 × 2) + (1.142 × 2) + 1.33) = 8.032


  • International Academic Conference Papers:7

    • TonTon H.-D. Huang*"Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks", arXiv: 1807.01868(Submitted)

    • TonTon H.-D. Huang*, C.-M. Yu, and H.-Y. Kao, "Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection", 2017 Conference on Technologies and Applications of Artificial  Intelligence (TAAI 2017), Taipei, Taiwan, Dec. 1-3, 2017.
      arXiv:1710.05305
      2 * (2^-1/ (2^-1 + 2^-2))= 1.33

    • TonTon H.-D. Huang*, C.-M. Yu, "Poster: Adaptive Data-Driven and Region-Aware Detection for Deceptive Advertising", IEEE Symposium on Security and Privacy 2016, San Jose, CA, May 23-25, 2016.
    • TonTon H.-D. Huang*, C.-S. Lee, M.-H. Wang, and H.-Y. Kao, "IT2FLS-based Malware Analysis Mechanism: Malware Analysis Network in Taiwan (MiT)", in Proceeding of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), Manchester, United-Kingdom, Oct. 13-16, 2013.
      IEEE Xplore | Blog | 2 * (2^-1/ (2^-1 + 2^-2 + 2^-3)) = 1.1428
    • TonTon H.-D. Huang*, C.-S. Lee, H. Hagras, and H.-Y. Kao, "TWMAN+:A Type-2 Fuzzy Ontology Model for Malware Behavior Analysis," in Proceeding of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), COEX, Seoul, Korea, Oct. 14-17, 2012.
      IEEE Xplore | Blog 2 * (2^-1/ (2^-1 + 2^-2 + 2^-3)) = 1.1428
    • TonTon H.-D. Huang*, G. Acampora, V. Loia, C.-S. Lee, and H.-Y. Kao "Applying FML and Fuzzy Ontologies to Malware Behavioral Analysis," in Proceeding of the 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), Taipei, Taiwan, June. 27-30, 2011.
      IEEE Xplore | Blog  | 2 * (2^-1/ (2^-1 + 2^-2 + 2^-3 + + 2^-4)) = 1.0666

    • TonTon H.-D. Huang*, C.-S. Lee, H.-Y. Kao Y.-L. Tsai, and J.-G. Chang, "Malware Behavioral Analysis System: TWMAN," in Proceeding of the 2011 IEEE Symposium on Computational Intelligence for Intelligent Agent (IEEE SSCI 2011), Paris, France, Apr. 11-15, 2011.
      IEEE Xplore | Blog | 2 * (2^-1/ (2^-1 + 2^-2 + 2^-3 + 2^-4))  = 1.0666
    • TonTon H.-D. Huang*, T.-Y. Chuang, Y.-L. Tsai, and C.-S. Lee, "Ontology-based intelligent system for malware behavioral analysis," in Proceeding of the 2010 IEEE World Congress on Computational Intelligence (WCCI 2010), Barcelona, Spain, Jul. 18-23, 2010.
      IEEE Xplore | Blog

  • Patent:6

    • 基於卷積神經網絡的以太坊智能合約惡意識別方法 (submitted)
    • 基於循環神經網路的虛擬幣交易欺詐檢測系統 (submitted)
    • 基於卷積神經網絡的安卓智能手機惡意軟件識別方法 (submitted)
    • 基於深層類神經網絡的Android的智能型手機通知欄彈窗邏輯管理方法 (submitted)
    • 基於卷積神經網絡的欺詐廣告頁面識別方法 (submitted)
    • 基於深層類神經網絡的騷擾電話識別方法 (submitted)

  • Book Chapter:1

    • TonTon H.-D. Huang*, G. Acampora, V. Loia, C.-S. Lee, H. Hagras, M.-H. Wang, H.-Y. Kao, and J.-G. Chang, “Fuzzy markup language for malware behavioral analysis,” in G. Acampora, C. S. Lee, M. H. Wang, and V. Loia (editors), On the Power of Fuzzy Markup Language, Springer-Verlag, Germany, 2012, pp. 113-131.
      DOI:  http://dx.doi.org/10.1007/978-3-642-35488-5_7

  • Domestic Conference Papers:4 
  • 黃獻德, 李健興, 莊宗嚴, 蔡一郎, 邱敏乘, "基於知識本體之惡意程式分析平台," 2009全國計算機會議(NCS2009), 台北, 2009.
  • 黃獻德, 蔡一郎, 邱敏乘, 李健興, 莊宗嚴, "知識本體於惡意程式行為分析之應用," 2009年臺灣網際網路研討會 (TANET2009), 彰化, 2009.
  • 李健興, 黃獻德, 莊宗嚴, "基於模糊推論代理人之Web2.0府城美食知識管理平臺," 2007全國計算機會議(NCS2007), 台中, 2007.
  • 黃獻德, 莊宗嚴, 李健興, "Web 2.0概念融入健康美食導覽-以臺南小吃導覽為例," 第二屆數位內容管理與應用學術研討會(DCMA2007), 台南, 2007.

  • Master's thesis :知識本體與推論法則於台南小吃之應用 ( Applying Ontology and Inference Rules in Tainan Delicacies )

  • Reviewer:
    • IEEE Access
    • Soft Computing
    • IEEE Systems Journal
    • IEEE Transactions on Mobile Computing
    • Journal of Network and Computer Applications
    • Journal of Information Security and Applications
    • IEEE International Conference on Systems, Man, and Cybernetics