About
Education
Publications
Knowledge Sharing

WenBin Hsieh

Assistant Professor

謝文彬博士於國立台灣科技大學電子工程獲得博士學位。擁有十多年協助政府機構進行資訊安全及密碼學相關研發專案之經驗,並曾在知名金控銀行開發財金系統。此後,曾於國立台北科技大學資訊工程系及創新前瞻科技研究學院擔任專任助理教授。現任國立台東大學綠能與資訊科技學系助理教授,研究領域涵蓋機器學習、金融科技、通訊協議、網絡安全與行動通訊等。

Dr. Wen-Bin Hsieh received his Ph.D. in Electronic Engineering from National Taiwan University of Science and Technology. With over ten years of experience in supporting government agencies in research and development projects related to information security and cryptography, he has also worked on financial systems development at a renowned financial holding company. Subsequently, he served as a full-time Assistant Professor in the Department of Computer Science & Information Engineering and the Innovation Frontier Institute at National Taipei University of Technology. Currently, he is an assistant professor in the Department of Green Energy and Information Technology at National Taitung University. His research interests encompass machine learning, financial technology, communication protocols, network security, and mobile communications.

Education

博士, 台灣科技大學電子工程所
Ph.D., Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology

碩士, 台灣科技大學電子工程所(全校前10%逕讀博班)
M.S., Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology
(Top 10% of the entire school, direct entry to the doctoral program)

學士, 淡江大學資訊工程系(第一名畢業)
B.S., Department of Computer Science and Information Engineering, Tamkang University
(Graduated as the top of the class)

Publications

For more publications, visit my DBLP page.

  • 2025 - [j15] Ransomware detection with CNN and deep learning based on multiple features of portable executable files

    J. Supercomput. , Vol. 81, article number 680, April 1, 2025. (SCI-E, EI)

  • 2025 - [j14] BF-ACS—Intelligent and Immutable Face Recognition Access Control System

    IET Inf. Secur. , 6755170, March 3, 2025. (SCI-E, EI)

  • 2025 - [j13] Reference Phone Number: A Secure and Quality of Service-Improved SIP-Based Phone System

    Electronics, Vol. 14, No. 5, February 23, 2025. (SCI-E, EI)

  • 2024 - [j12] Securing Internet of Vehicles with a provable secure post-quantum mutually authenticated protocol based on Small Integer Solution

    KSII Transactions on Internet and Information Systems, Vol. 18, No. 10, October 31, 2024. (SCI-E, EI)

  • 2022 - [j11] Use chains to block DNS attacks: A trusty blockchain-based domain name system

    J. Commun. Networks 24(3): 347-356 (2022) (SCI-E, EI)

  • 2022 - [j10] Biometric-based Remote Mutual Authentication Scheme for Mobile Device

    Wirel. Pers. Commun. 126(2): 1649-1664 (2022). (SCI-E, EI)

  • 2018 - [j9] Implementing a secure VoIP communication over SIP-based networks

    Wirel. Networks 24(8): 2915-2926 (2018). (SCI-E, EI)

  • 2017 - [j8] An Improved Mutual Authentication Mechanism for Securing Smart Phones

    Wirel. Pers. Commun. 97(2): 2911-2924 (2017). (SCI-E, EI)

  • 2016 - [j7] Implementing Billing as a Service by an IPDR Aggregator System

    Wirel. Pers. Commun. 87(4): 1223-1240 (2016). (SCI-E, EI)

  • 2014 - [j6] Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards

    IET Inf. Secur. 8(2): 104-113 (2014). (SCI-E, EI)

  • 2014 - [j5] An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures

    J. Supercomput. 70(1): 133-148 (2014). (SCI-E, EI)

  • 2014 - [j4] Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks

    Wirel. Commun. Mob. Comput. 14(10): 995-1006 (2014). (SCI-E, EI)

  • 2014 - [j3] A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks

    Wirel. Pers. Commun. 77(2): 979-989 (2014). (SCI-E, EI)

  • 2013 - [j2] A Time and Location Information Assisted OTP Scheme

    Wirel. Pers. Commun. 72(1): 509-519 (2013). (SCI-E, EI)

  • 2013 - [c2] A dynamic identity user authentication scheme in wireless sensor networks

    IWCMC 2013: 1132-1137

  • 2012 - [j1] Exploiting hash functions to intensify the remote user authentication scheme

    Comput. Secur. 31(6): 791-798 (2012)

  • 2011 - [c1] Design of a time and location based One-Time Password authentication scheme

    IWCMC 2011: 201-206