自我介紹
別號:赫爾博士
筆名:蓮如
學歷:國立中央大學電機工程博士
美國南加州大學電機碩士(Univ. of Southern California)前三名畢業
研究領域
資訊安全
多媒體及影像處理
無線網路與通訊理論
密碼學
興趣
1.籃球/音樂/照顧小女兒
2.藏密
3.想東想西一大堆賺錢的點子
經歷
中國文化大學資訊工程系助理教授(96.02~迄今)
台北科技大學電機系兼任助理教授(97.08~迄今)
萬能科技大學資工系助理教授(95.08~96.01)
龍華科技大學資訊網工系與資管系兼任助理教授(93.08~97.07)
國家安全局(77.07~95.07)
經濟部標準檢驗局資訊及通信國家標準技術委員會委員(96年~)
專長
資訊安全(駭客技術)、影像處理、密碼學、衛星通訊、 多媒體處理技術
著作
(一)期刊論文
1.Chang-Lung Tsai, Jan-Ru Chen, Heui-Fen Chiang, and Kuo-Chin Fan, “A Survey on Digital Data Embedding”, Journal of Computers, Computer Society of Republic of China, Vol. 13, No. 1, March 2001, Pages 33~50
2.Chang-Lung Tsai, Huei-Fen Chiang, Kuo-Chin Fan, and Char-Dir Chung, “Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-wise Logical Computation Mechanism”, Pattern Recognition (SCI), Vol. 38, Issue 11, Pages 1993-2006, November 2005.
3.Tzu-Lung Sun and Chang-Lung Tsai *, “Target Detection in the EO-1 Hyperspectral image by Utilizing Noise Effect Removal Algorithm”, Hwa-Kang Engineering Journal, Chinese Culture University, No. 21, Pages 77~85,Jun 30, 2007
4.Chang-Lung Tsai*, Kuo-Chin Fan, Thomas Chiang Chuang and Char-Dir Chung, “Lossless Data Hiding of Color Images Using Pixel Decomposition and Phase Difference”, Journal of Information and Science Engineering(SCI-E, EI), Vol. 23, No. 5, Sep 2007, Pages 1481~1498, ISSN 1016-2364
5.蔡昌隆*、洪政賢、周立平, “網路駭客入侵訊標偵測與資訊安全防護”, Hwa-Kang Engineering Journal, Chinese Culture University, No. 22, Pages 143~151,Jun 30, 2008
6.Wei-Leih Hsu, Chang-Lung Tsai, and Tsung-Lun Chen,“Traffic Detection at Night-time Using Entropy Manipulation”, Journal of Cybernetics and Systems, Vol. 1, No.1, Pages 1~4, Sep 2008
7.Jui-Yu Cheng, Min-Hsiung Hung, Jen-Wei Chang and Chang-Lung Tsai,“Development of a Power Monitoring System with Direct Load Control Capabilities using ZigBee Technology”, Hwa-Kang Engineering Journal, Chinese Culture University, No. 23, Pages 135~148, Jan 31, 2009
8.吳宗憲、蔡昌隆*, “LINUX作業環境下無線網路攻擊與防禦之研究”, Hwa-Kang Engineering Journal, Chinese Culture University, No. 24, Pages 115~122, Jun 30, 2009
9.李凱祺、江莉瑋、李冠儀、蔡昌隆*, “以螞蟻演算法與誘捕網路為基之駭客入侵行為分析”, Hwa-Kang Engineering Journal, Chinese Culture University, No. 25, Pages 59~68, Jan 31, 2010
10.陳俊榮、蔡昌隆、孫振東、李志仁、張耀鴻、周立平、楊泰寧、鄭一鴻,“於模擬大型MOSFET電路的走訪波形鬆弛演算法中處理總體回授迴路” , Hwa-Kang Engineering Journal, Chinese Culture University, No. 25, Pages 69~76, Jan 31, 2010
11.Chang-Lung Tsai and Uei-Chin Lin, “Information Security of Cloud Computing for Enterprises”, AISS : Advances in Information Sciences and Service Sciences, Vol. 3, No. 1, Pages 132 ~ 142, 2011 (ISSN : 1976-3700)(EI)
12.Chang-Lung Tsai and Min-Hsiung Hung, “Intrusive Behavior Analysis Based on Dynamic Honeynet and Multidimensional Hidden Markov Model”, Journal of Chung Cheng Institute of Technology(EI), Vol.40, No.1, Pages 29~42, May 2011
13.陳俊榮、蔡昌隆、孫振東、李志仁、張耀鴻、周立平、楊泰寧, “Large-scale Circuit Simulation for MOSFET Circuits with Interconnects Using Iterated Timing Analysis and Latency-checking Method”, Hwa-Kang Engineering Journal, Chinese Culture University, No. 27, Pages 125~131, Jan 31, 2011
14.陳炳男、林世崧、洪敏雄、蔡昌隆,“基於ZigBee技術之校園照明設備遠端監控系統設計與實作” Hwa-Kang Engineering Journal, Chinese Culture University, No. 27, Pages 132~139, Jan 31, 2011
15.Chang-Lung Tsai, Traffic Monitoring and Event Analysis based on Integrated Multi-Video and Petri Net Process, Accepted byJOURNAL OF MARINE SCIENCE AND TECHNOLOGY(SCI-E, EI)

(二)研討會論文
1.Chang-Lung Tsai, Kuo-Chin Fan, and Char-Dir Chung, “Secure information by using digital data embedding and spread spectrum techniques”, IEEE 35th International Carnahan Conference on Security Technology(EI), London, U.K., Oct 11~14, 2001, Pages 156-162
2.Chin-Chuang Han and Chang-Lung Tsai, “A Multi-resolutional face verification system via filter-based integration”, IEEE 35th International Carnahan Conference on Security Technology(EI), London, U.K., Oct 11~14, 2001, Pages 278-281
3.Chang-Lung Tsai, Kuo-Chin Fan, Char-Dir Chung, and Thomas Chiang Chuang, “Data Hiding of Binary Images Using Pair-wise Logical Computation Mechanism”, IEEE International Conference on Multimedia and Expo (ICME) (EI), Taiwan, Jun 27~30, 2004, Pages 951-954
4.Chang-Lung Tsai, Kuo-Chin Fan, Char-Dir Chung, and Thomas Chiang Chuang, “Reversible and Lossless Data Hiding with Application in Digital Library”, Proceedings of IEEE, 38th International Carnahan Conference on Security Technology(EI), New Mexico, U.S.A., Oct 11~14, 2004, 04CH37572, Pages 226~232
5.Chang-Lung Tsai and Thomas Chiang Chuang, “Intelligent Language Comprehension System for Automatic data Analysis”, Proceedings of IEEE, 40th International Carnahan Conference on Security Technology(EI), Kentucky, U.S.A., Oct 16~20, 2006, 06CH37768, Pages 298~302
6.Chang-Lung Tsai and Wei-Leih Hsu, “無線通訊資訊竊取防護”, 2007 Conference of Digital Technology and Innovation Management, Taipei, Taiwan, Jun 03, 2007, Pages 1374~1380
7.Chin-Chuan Han, Cheng-Ta Hsieh, Gang-Feng Ho, Chang-Lung Tsai, and Kuo-Chin Fan, “License Plate Detection & Recognition Using a Dual-Camera Module in a Large Space”, IEEE 41th International Carnahan Conference on Security Technology(EI), Ottawa, Canada, Oct 8~11, 2007, Pages 307~312
8.Tzu-Lung Sun, Chang-Lung Tsai, and Wei-Leih Hsu, “DETECT TARGET BY NER ALGORITHM FOR EO-1 HYPERSPECTRAL IMAGERY”, 20th Computer Vision, Graphics, and Image Processing, CVGIP 2007, Taiwan, Aug 20, 2007, Pages 732~738
9.Wei-Leih Hsu, Chang-Lung Tsai and Tsung-Lun Chen, “Traffic Detection at Nighttime Using Entropy Measurement”, Proceedings of IEEE 3rd international Conference on Intelligent Information Hiding and Multimedia Signal Processing(EI), Taiwan, Nov 2007, Pages 585~588
10.洪政賢、吳宗憲、蔡昌隆, “無線網路駭客訊號標定與資訊安全防護”, 2008知識社群與系統發展研討會, Taipei, Taiwan, May 23, 2008, Pages 1~8
11.Wei-Leih Hsu, Chang-Lung Tsai and Yang-Lang Chang, “Abnormal Event Detection for Home Care Using Cellular Model”, 21th Computer Vision, Graphics, and Image Processing, CVGIP 2008, Taiwan, Aug 22, 2008
12.Chang-Lung Tsai, Wei-Leih Hsu, and Chin-Chuan Han “Embedded Traffic Analysis System based on Fourier Descriptor and Motion Homogeneity Measurement”, IEEE 41th International Carnahan Conference on Security Technology(EI),Czech, Oct 13~16, 2008, Pages 272~276
13.Chang-Lung Tsai and Tsung-Hsian Wu,“Information Protection from Network Sniffing of Bandwidths Sharing”, IEEE 42th International Carnahan Conference on Security Technology(EI),Czech, Oct 13~16, 2008,Pages 84~88
14.吳美鈴、張書銓、林建宏、蔡昌隆、陳俊榮,“資訊系統委外開發安全需求之研究”, 2009資訊安全實務研討會, No. 22, Pages 133~137, Taipei, Taiwan, Apr 17, 2009
15.吳宗憲、李凱祺、甯光程、黃子恆、蔡昌隆,“LINUX 作業環境下無線網路攻擊與防禦之研究” , 2009資訊安全實務研討會, No. 5, Pages 29~35, Taipei, Taiwan, Apr 17, 2009
16.余文傑、陳亮宏、蔡昌隆,“中長距無線網路攻擊策略之研究”,2009知識社群研討會, Taipei, Taiwan, May 23, 2009, KC50-3, Pages 1~9
17.Chun-Jung Chen, Chun-Chia Chang, Tai-Ning Yang, Chih-Jen Lee, Allen Y. Chang, and Chang-Lung Tsai, “A New Strategy for Handling Global Feedback Loops in Selective-Tracing Waveform Relaxation Algorithm for Large Scale MOSFET Circuit Simulation,” 5th International Conference on Networked Computing and Advanced Information Management (EI), pp. 1872-1875, Seoul Korea, Aug. 25-27 2009.
18.Wei-Leih Hsu, Chang-Lung Tsai and Po-Lun Chang, “Automatic Traffic Monitoring Based on Feature Extraction and Cellular Model”, Proceedings of IEEE 5rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing(EI), Tokyo, Sep 12~14, 2009, Pages 640~643
19.Chang-Lung Tsai and Wei-Leih Hsu “Traffic Warning and Vehicular Homogeneity Measurement Based on Multidimensional HMM Algorithm”, Proceedings of IEEE 5rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing(EI), Tokyo, Sep 12~14, 2009, Pages 246~249
20.Chang-Lung Tsai, Chun-Chi Tseng, and Chin-Chuan Han,“Intrusive Behavior Analysis Based on Honey Pot Tracking and Ant Algorithm Analysis”, IEEE 43th International Carnahan Conference on Security Technology(EI),Switzerland, Oct 6~8, 2009,Pages 248~252.
21.Chang-Lung Tsai, Allen Y. Chang, Chun-Jung Chen, Wen-Jieh Yu, and Ling-Hong Chen,“Dynamic Intrusion Detection System Based on Feature Extraction and Multidimensional Hidden Markov Model Analysis”, IEEE 43th International Carnahan Conference on Security Technology(EI),Switzerland, Oct 6~8, 2009,Pages 85~88.
22.Allen Y. Chang, Dwen-Ren Tsai, Chang-Lung Tsai, and Yong-Jiang Lin, “An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone”, IEEE 43th International Carnahan Conference on Security Technology(EI),Switzerland, Oct 6~8, 2009,Pages 36~40.
23.張書銓、吳美鈴、蔡昌隆,“個人機敏電子資料保護與存取安全機制研究”,2009資訊安全技術創新應用研討會, Taipei, Taiwan, Dec 25, 2009
24.李凱祺、蔡昌隆,“基於螞蟻演算法與誘捕網路之動態入侵偵測” , 2009資訊安全技術創新應用研討會, Taipei, Taiwan, Dec 25, 2009
25.鄭一鴻、劉仲鑫、林葳秦、王宏揚、翁皓雲、廖思涵、蔡昌隆,“從行動通訊設備之資料外洩擬定資訊安全防護機制” , 2009資訊安全技術創新應用研討會, Taipei, Taiwan, Dec 25, 2009
26.林葳秦、李冠儀、蔡宗志、林宗賢、蔡昌隆,“企業應用雲端運算服務之資安探析”,2010知識社群研討會, Taipei, Taiwan, May 29, 2010, IS0402, Pages 1~8
27.Chun-Jung Chen, Bin-Cheng Chen, Chih-Jen Lee, Chang-Lung Tsai, Li-Ping Chou, and Allen Y. Chang, “Methods to Enhance the Performance of Iterated Timing Analysis Algorithm”, Proceedings of the 2010 IEEE, International Conference on Information and Automation, Pages 1432-1437, June 20 - 23, Harbin, China
28.Chang-Lung Tsai, Uei-Chin Lin, Allen Y. Chang, and Chun-Jung Chen, “Information Security Issue of Enterprises Adopting the Application of Cloud Computing”, 6th International Conference on Networked Computing and Advanced Information Management (EI), pp. xxxx-yyyy, Seoul Korea, Aug. 16-18, 2010
29.Chang-Lung Tsai, Allen Y. Chang, and Huang Ming-Szu, “ Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network”, In press Proceedings of IEEE 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing(EI), Oct 2010.
30.Chang-Lung Tsai, Chun-Jung Chen, and Wei-Lieh Hsu,“Traffic Monitoring and Event Analysis based on 3D Video Process”, IEEE 44th International Carnahan Conference on Security Technology(EI),San Jose, U.S.A., Oct 5~8, 2010, Pages 429~433
31.Chun-Jung Chen, Chih-Jen Lee, Chang-Lung Tsai, Allen Y. Chang, Tai-Ning Yang, and Jenn-Dong Sun, "Using Backward-traversing Waveform Relaxation Algorithm to Perform Incremental Simulation and Simulation-on-demand for Circuit Simulation," The International Conference on Electrical Engineering and Automatic Control (EI)2010, Vol. 3, Pages. 629-632, Zibo China, Nov. 26-28, 2010.
32.Chun-Jung Chen, Chih-Jen Lee, Chang-Lung Tsai, Allen Y. Chang, and Tien-Hao Shih, "Waveform Relaxation-based Large-scale Circuit Simulation for MOSFET and Lossy Coupled Transmission Line Circuits," The International Conference on Electrical Engineering and Automatic Control (EI)2010, Vol. 11, Pages. 581-585, Zibo China, Nov. 26- 28, 2010.
33.Chun-Jung Chen, Chih-Jen Lee, Chang-Lung Tsai, Tai-Ning Yang, and Allen Y. Chang, "The Local Time Step Iterated Timing Analysis Algorithm for Circuit Simulation," The International Conference on Electrical Engineering and Automatic Control (EI)2010, Vol. 1, Pages. 465-469,Zibo China, Nov. 26-28, 2010.
34.Chun-Jung Chen, Chun-Chia Chang, Chih-Jen Lee, Chang-Lung Tsai, Allen Y. Chang, and Jenn-Dong Sun, “The Multi-rate Iterated Timing Analysis Algorithm for Circuit Simulation,” 53rd IEEE International Midwest Symposium on Circuits and Systems(EI), Seattle USA, pp. 821-824, Aug. 1-4 2010.
35.Chang-Lung Tsai and Shih-Chao Tai,“Traffic monitoring and event analysis at intersection based on integrated multi-video and Petri net process”, Proceedings of Advances in Multimedia Modeling–17th International Multimedia Modeling Conference, MMM 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 6524 LNCS, Issue PART 2, Pages 304-314, Taiwan, January 5- 7, 2011

(三)著書:
1.計算機組織與設計,學貫行銷公司(96年4月30日出版)
2.計算機結構,博碩公司出版,100年5月
3.數位邏輯設計,博碩公司出版,預定100年12月

(四)研究計畫:
1.頻寬分享資訊側錄與安全防護研究計畫,97年11月1日至98年6月30日,中國文化大學
2.基於特徵萃取與多維度隱藏馬可夫模型之動態入侵偵測系統研究,99年4月1日至99年7月31日,中國文化大學
3.基於多觀測點與三維視訊處理之交通事件分析(Traffic event analysis based on the application of multi-viewpoint and 3D video process),國科會計畫編號NSC 100-2221-E-034 -014,執行期程100年8月1日至101年7月31日,NT$319,000

(五)指導碩士論文:
1.吳美鈴(Mei-Ling Wu):個人及公司企業之機敏電子資料保護與存取安全研究(The Research on Confidential Electronic Data for Individual and Enterprise of Information Protection and Secure Access),99年7月畢業
2.呂寅甲(YIN-CHIA LUI):資訊安全事件自動觸發機制之建立(Implementation of automatically initiated mechanism for information security events),99年7月畢業(與蔡所長敦仁教授共同指導)
3.李凱祺:網路入侵偵測與行為模式分析(The research on Network intrusion detection and behavior analysis),100年6月12日口試,7月畢業
4.林葳秦(Uei-Chin Lin):建置適用於企業具安全機制之虛擬主機自動生成模板(The implementation of automatically generated template for enterprises based on secure virtual machine),100年6月12日口試,7月畢業(與蔡所長敦仁教授共同指導)
5.廖思涵(資安產碩三):基於魔術方塊演算法之影像加密研究(與蔡所長敦仁教授共同指導)
6.莊登傑(數位機電碩二):手機銀行之資訊安全研究
7.萬明峰(數位機電碩一):雲端計算之資訊安全研究(與孫振東教授共同指導)
8.劉凱勛(數位機電碩一):Android手機行動商務資訊安全研究
9.陳耀文(資安產碩二):伺服系統資安監控設計研究
10. 舒東正(資管所碩二): Implementation and Research of Wireless Sensor Network on Emergence Light System, Master Degree expected on Jul 2012.
備註
詩集:蓮花落(遺失中待尋回)
個人影音