Categories
Engineering and Technologies

Engineering and Technologies

Outstanding Young Scholar Spotlight: Associate Professor Jian-Jhih Kuo

Outstanding Young Scholar Spotlight: Associate Professor Jian-Jhih Kuo

Sep 18, 2025

  As information technology continues to evolve rapidly, the new generation of scholars is taking on the challenge of exploring emerging research frontiers and shaping the future of the field. Associate Professor Jian-Jhih Kuo from the Department of Computer Science and Information Engineering at National Chung Cheng University has shown strong dedication and focus in his work. He has produced outstanding results in quantum networks, distributed machine learning, path planning, and traffic engineering. In recent years, he was honored with the prestigious Ta-You Wu Memorial Award, marking him as a rising figure in the computer science community.   Academic Journey: From CCU to NTHU, and Back Again to Grow Roots   After earning his bachelor’s degree in computer science from National Chung Cheng University, Associate Professor Jian-Jhih Kuo developed a strong interest in research. He recalls that during his undergraduate years, the excellent faculty not only helped him build a solid theoretical foundation, but also sparked his curiosity and strengthened his ability to solve problems. This period marked both his academic awakening and the beginning of his research journey.   He then pursued a Ph.D. at National Tsing Hua University under the guidance of Professor Ming-Jer Tsai. That stage of training was both challenging and deeply inspiring. Professor Tsai valued research freedom and encouraged students to take on forward-looking networking topics, while also pushing them to read difficult papers. More importantly, he constantly reminded his students to ask the right questions and to understand the mindset and reasoning behind each author’s research design. Under this kind of mentorship, Professor Kuo gradually developed his independence as a researcher and began thinking about technology and research value from a broader perspective.   After completing his doctorate, he joined the Institute of Information Science at Academia Sinica as a postdoctoral researcher, working with Professors Wen-Tsuen Chen and De-Nian Yang on software-defined networking. This experience exposed him to the high academic standards and dedication of senior scholars. Despite being close to 70 years old at the time, Professor Chen actively participated in every research discussion and never compromised on quality, leaving a lasting impression on Professor Kuo’s academic mindset. Professor Yang, on the other hand, often emphasized that “working hard is a given, but only real results count.” This helped shape Professor Kuo’s early-career perspective that academic work requires not only passion and persistence, but also concrete, visible outcomes.   With support from senior colleagues, including Professor Ren-Hung Hwang who hosted his job talk and helped facilitate his return, Professor Kuo eventually launched his academic career at his alma mater, National Chung Cheng University. Having started his academic path at National Chung Cheng University, returning to serve his alma mater carries special meaning and reinforces his dedication to teaching and research.   Academic Honor: Ta-You Wu Memorial Award   In 2025, Associate Professor Jian-Jhih Kuo was honored with the Ta-You Wu Memorial Award. To him, this national-level recognition is not only an affirmation but also a meaningful reminder. With humility, he emphasizes that this achievement does not belong to him alone, but to the many people who have supported him along the way, including his mentors, research collaborators, students, and family. Being able to continuously pursue both teaching and research, accumulate meaningful results, and ultimately receive such a prestigious award, has been an extraordinary journey.   For Professor Kuo, the true value of this recognition lies not only in affirming his past efforts, but also in inspiring future progress. He hopes the award will encourage more young scholars to stay true to their passion, embrace challenges with courage, and learn to give back and share as they strive for breakthroughs. He especially emphasizes, “Research is not only a personal achievement, but also a legacy to be passed on.” With this belief, upon returning to his alma mater, he has committed himself to guiding students in research projects, helping them develop skills in independent thinking, academic writing, and interdisciplinary collaboration. Research Achievements: Bridging Theory and Application   Associate Professor Jian-Jhih Kuo's research focuses on three main areas, all centered around problem modeling and algorithm design, with a strong emphasis on connecting theoretical analysis with practical implementation: Resource Allocation and Routing Optimization in Quantum Networks. As one of the first scholars in Taiwan to explore this emerging field, Professor Kuo's team addresses key challenges such as quantum memory limitations, fidelity degradation, entanglement swapping, and purification. They have developed approximation algorithms with theoretical guarantees and adaptive decision-making frameworks that lay the groundwork for future quantum communications. Distributed Machine Learning and Security Defense. His work tackles critical issues including non-IID data distributions, malicious attacks, and model splitting. He has proposed low-overhead defense mechanisms, clustering strategies, and flexible deployment techniques to improve both the efficiency and robustness of learning systems. Traffic Engineering and Path Planning Optimization. This includes multicast routing in software-defined networks, content caching and energy-aware scheduling in edge computing, as well as application-driven problems such as UAV data collection, battery swapping logistics for electric vehicles, and emergency communication support. By combining optimization theory with real-world needs, Professor Kuo has designed algorithms with provable guarantees or learning flexibility, validated through real-data simulations. These solutions strike a balance between theoretical rigor and practical relevance.   Since 2020, he has led several NSTC-funded projects and collaborated closely with leading research teams in Taiwan and abroad. His work has been published in over 40 papers across top-tier international conferences such as IEEE INFOCOM, GLOBECOM, and ICC, as well as prestigious journals including IEEE TMC, TSC, TVT, and COMST, receiving increasing recognition from the academic community.   Educational Mission: Inspiring Students and Nurturing Future Talent   As an early-career faculty member, Associate Professor Jian-Jhih Kuo deeply values the role and responsibility of education. He believes that the legacy of academic research lies not only in accumulated results but also in inspiring the next generation. He actively encourages undergraduate students to engage in research early on, guiding them through hands-on experience to learn how to raise meaningful questions, design methods, write papers, and deliver presentations. Through this process, students not only enhance their academic abilities but also develop the critical thinking and independent research skills that define their competitive edge.   He often says that the greatest sense of accomplishment for a teacher comes from seeing students shine on their academic or professional paths. He also expresses his gratitude to Professor Chih-Yu Wang for his early insights and advice, which helped shape his approach to mentoring undergraduates and building their problem-solving capabilities. Looking ahead, he hopes to cultivate more students with a global perspective, so that Taiwan’s research capacity can continue to grow and gain visibility on the international stage.   Looking Ahead: Research Vision and Global Collaboration   Looking forward, Associate Professor Jian-Jhih Kuo plans to continue advancing two core research directions. The first is quantum networking, with a focus on multiparty entangled states, integration of heterogeneous quantum platforms, and hybrid quantum network architectures that combine fiber, free-space optics, and satellite communications. The second involves traffic engineering and path optimization in classical networks, with practical applications in smart city infrastructure such as drones, electric vehicles, and next-generation communication technologies, bridging theoretical research with real-world implementation.   At the same time, he emphasizes the importance of international and inter-institutional collaboration. He is actively expanding his global research network to foster more cross-disciplinary exchanges and contribute to Taiwan’s continued growth in emerging technologies.   Associate Professor Jian-Jhih Kuo’s academic journey is one shaped by passion, perseverance, and a willingness to take on challenges. As a young scholar, he continues to push the boundaries of research, while as an educator, he shares his dedication to academic growth and responsibility with the next generation. His work not only marks him as a rising figure in Taiwan’s computer science community but also as a promising leader for the future.

Critical analysis of the technological affordances, challenges and future directions of Generative AI in education: a systematic review

Critical analysis of the technological affordances, challenges and future directions of Generative AI in education: a systematic review

Sep 18, 2025

  This systematic review synthesizes 27 core-journal papers (2020–2023) on generative AI in education using a PRISMA-guided selection and inductive thematic coding. It maps technological affordances, key challenges, and actionable directions for future research and practice.   Highlights Four technological affordances: Accessibility (always-on support; remote learning), Personalization (context-aware feedback/materials), Automation (offloading repetitive tasks; boosting preparation/assessment), and Interactivity (AI as conversational partner supporting language and conceptual learning). Five central challenges: Academic integrity (plagiarism/cheating), Response errors & bias (hallucinations, fabricated citations, data bias), Over-dependence (risks to higher-order thinking), Digital divide (paywalls and bans), and Privacy & security. Roles in educational settings: Generative AI can function as an intelligent tutor, tutee, learning tool/partner, and domain expert—supporting curriculum design, learning assistance, and teacher PD. Fig 1. Roles of generative AI in education   Methods   The review searched Web of Science, Scopus, and ScienceDirect, and coded contexts, sectors, and methods to portray the research landscape and use-cases. Fig 2. Guidelines about the future directions of research and practice   Conclusions and Recommendations Assessment & policy: Adopt diverse assessments (proctored open-ended tasks, orals, process portfolios) and enhance misconduct detection; establish and maintain institutional AI ethics guidelines. Bias mitigation & capacity building: Continuously monitor model bias and equip educators with AI literacy (including prompt design) to ensure human–AI collaboration that improves material design and feedback. Curricular integration: Integrate Generative AI into learning activities to foster higher-order skills; position AI as a thinking aid rather than an answer engine, with robust data protection and informed consent.   Contribution   The review bridges role-based perspectives with technological affordances to present a balanced account of opportunities and risks, offering concrete guidance for policymakers, educators, and learners.

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

Jul 14, 2025

Introduction           Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. Inspired by security evolution in prior generations, this work provides a systematic review of existing research efforts on security and privacy for 6G networks. The article reviews the issues of 6G enabling technologies and state-of-the-art defense methods. By conducting the problems in each technology, our goal is to provide a holistic view of the evolution of core security and privacy issues, along with the remaining challenges for further enhancements. To this end, the study aims to answer the fundamental question: What are the major potential changes of 6G security infrastructure from the prior generations? What are new challenges and prospective approaches for privacy preservation in 6G to satisfy the requirements in laws, such as General Data Protection Regulation (GDPR)? The main contributions of this article are multi-fold. First, the work provides a systematic overview of the evolution of security architecture and vulnerabilities in legacy networks. By investigating the shortcomings of the standards and technical insights of protocol flaws in such networks, required enhancements to 6G security and privacy are highlighted. Second, our survey provides a holistic view of security and privacy issues and how the existing solutions must be changed to satisfy the new demands in 6G. Since 6G will continue on the techno-economic trajectory of 5G, a systematic review on transition and possible changes of 6G security and privacy can shed light on the best plan for the operators/developers to upgrade the security infrastructure/defense systems at the right time. Finally, our discussions about lessons learned from the shortcomings of existing security architecture and remaining technical challenges may help researchers/developers quickly identify relevant issues and starting points for further works. The key security aspects are summarized in Figure 1.   Figure 1. A taxonomy of key points of our survey on security & privacy for 6G   Key findings from the research:      1. Major differences between 5G and 6G:  5G introduced substantial advancements like improved subscriber identity protection through SUCI (Subscription Concealed Identifier), and basic AI-assisted threat detection, it still carries many vulnerabilities, including weaknesses in mutual authentication, susceptibility to fake base stations, and the reuse of legacy protocols that expose outdated threats. In contrast, 6G security is envisioned to go far beyond patching existing flaws. It will operate in a space-air-ground-sea integrated network environment with radically diverse applications such as brain-computer interfaces, holographic telepresence, and autonomous systems. However, new technologies mean novel vulnerabilities. Unlike 5G, 6G will incorporate quantum-safe cryptography, AI-empowered real-time adaptive security, and physical layer security in beamforming and directional communications that leverages wireless channel characteristics. Also, unlike 5G’s centralized identity model, 6G may move toward decentralized, passwordless authentication through biometrics and system-on-chip identities. Blockchain and distributed ledgers are also considered for ensuring data integrity and mutual trust across domains. Furthermore, 6G networks are expected to fully support real-time zero-touch threat responses and zero-trust architectures, emphasizing dynamic, policy-based access control. This leap from static protection models to intelligent, self-defending infrastructures marks a transformative shift from 5G’s reactive posture to 6G’s proactive and predictive security paradigm. A summary of typical 6G vs 5G applications and security requirements is illustrated in Figure 2. 6G security will upgrade 5G security with new capability in terms of intelligence, automation, and energy efficiency. Figure 2. 6G security vs 5G security.         2. Space-Air-Ground-Sea Integrated Networks will be the next frontier of security defense, probably national security: As the rising popularity of satellite-based broadband networks and drones in civil applications, Space-Air-Ground-Sea Integrated Networks (SAGIN) will be the reachable target of mobile networks in the coming years. By combining terrestrial, aerial, maritime, and satellite systems, 6G SAGIN will achieve expansive coverage and support critical applications like emergency rescue and autonomous navigation. However, this integration introduces heightened risks, including jamming, eavesdropping, and masquerading attacks on high-altitude platforms. Given the strategic relevance of SAGIN infrastructure for national defense, public safety, and global communications, securing it becomes essential. Further research on efficient and secure SAGIN models for national targets will be critical.      3. AI-based functions in 6G will be the new target of the tit-for-tat battle between attackers and security defenders: AI-based functions in 6G are expected to revolutionize network operations through automation, real-time decision-making, and adaptive security responses. However, this reliance on AI introduces a new battleground where attackers and defenders will continually outmaneuver each other. Adversaries may exploit vulnerabilities in AI models, such as data poisoning or adversarial inputs, to mislead or disable security mechanisms. Meanwhile, defenders must develop more robust, transparent, and resilient AI systems to detect and neutralize evolving threats. This cat-and-mouse dynamic will define the future of 6G security, demanding continuous innovation to stay ahead of increasingly intelligent and adaptive cyberattacks. Figure 3 summarizes key attacks and defense approaches for AI-based functions and case studies in 6G. Figure 3. Attack and defense methods in AI-based functions for 6G and case studies for security in AI-based 6G V2X.         4. The starting era of post-quantum cryptography, quantum security, and semantic communications: 6G will mark the starting era of post-quantum cryptography, where traditional encryption methods can no longer withstand the power of quantum computing. To ensure long-term data protection and mitigate the risks of “collect now, decrypt later” attacks, 6G will adopt quantum-safe cryptographic algorithms, such as ML-KEM and HQC, and explore quantum key distribution technologies (e.g., using satellites or aerial systems). In parallel, semantic communication—a paradigm that transmits meaning rather than raw bits—will transform how information is conveyed and protected amid the explosion of data and the limitations of Shannon’s theory. Together, these advancements will redefine digital trust, enhancing network intelligence, security, and resilience for the quantum age.   Provided by: Van-Linh Nguyen

Wavelet Approximation-Aware Residual Network for Single Image Deraining

Wavelet Approximation-Aware Residual Network for Single Image Deraining

May 15, 2025

It has been made great progress on single image deraining based on deep convolutional neural networks (CNN). In most existing deep deraining methods, CNNs aim to learn a direct mapping from rainy images to clean rain-less images, and their architectures are becoming more and more complex. However, due to the limitation of mixing rain with object edges and background, it is difficult to separate rain and object/background, and the edge details of the image cannot be effectively recovered in the reconstruction process. To address this problem, we propose a novel wavelet approximation-aware residual network (WAAR), wherein rain is effectively removed from both low-frequency structures and high-frequency details at each level separately, especially in low-frequency sub-images at each level. After wavelet transform, we propose novel approximation aware (AAM) and approximation level blending (ALB) mechanisms to further aid the low-frequency networks at each level recover the structure and texture of low-frequency sub-images recursively, while the high-frequency network can effectively eliminate rain streaks through block connection and achieve different degrees of edge detail enhancement by adjusting hyperparameters. In addition, we also introduce block connection to enrich the high-frequency details in the high-frequency network, which is favorable for obtaining potential interdependencies between high- and low-frequency features. Experimental results indicate that the proposed WAAR exhibits strong performance in reconstructing clean and rain-free images, recovering real and undistorted texture structures, and enhancing image edges in comparison with the state-of-the-art approaches on synthetic and real image datasets. It shows the effectiveness of our method, especially on image edges and texture details.

Deep-Learning Technique for Bed-exit Action Prediction of Elderly Using Extremely Low-resolution Thermopile Sensor Array

Deep-Learning Technique for Bed-exit Action Prediction of Elderly Using Extremely Low-resolution Thermopile Sensor Array

Mar 01, 2025

Elderly Care is becoming an increasingly important issue in aging and super-aged societies. In particular, Taiwan’s Long-Term Care 3.0 policy highlights “smart assistive technologies” as one of its key areas for promotion. A critical focus in elderly care is fall prevention, as falls in older adults often result in serious or even fatal injuries. Given that bedrooms and bathrooms are the two primary hotspots for falls, this study focuses on the former. The core objective of this research is to prevent falls. However, predicting when a fall will occur is extremely difficult—even in healthy individuals (e.g., someone might trip unexpectedly). Therefore, we considered the typical routines and potential fall causes among elderly individuals and identified a high-risk period during the transition out of bed. During this period, conditions such as orthostatic hypotension or musculoskeletal weakness may lead to momentary dizziness and result in falls. To address this issue, our approach transforms the goal of “fall prevention” into a strategy of “early bed-exit prediction.” By detecting—or even predicting—the elderly person’s intention to get out of bed, our system can alert caregivers, who can then assist verbally (e.g., calling out) or physically, thereby preventing potential falls. To provide caregivers with sufficient response time, this study emphasizes bed-exit prediction rather than simple detection, allowing a buffer of 5–8 seconds for verbal or physical intervention. Currently, smart assistive devices in many care centers rely on air cushions or pressure mats (placed under mattresses) that detect movement only after the person has already gotten out of bed. This is often too late to prevent a fall. Our technology, by contrast, provides an alert during the critical 5–8 second window, significantly improving the chances of fall prevention. Because cameras often raise privacy concerns, our study uses a thermopile-type far-infrared sensor with very low resolution (32×32 pixels). This sensor is inexpensive and inherently privacy-preserving, as the images it produces are unrecognizable to the human eyes. We apply cutting-edge AI and deep learning technologies to predict bed-exit intent on average 5.78 seconds before the actual action. Our database tests show 99.37% accuracy and 99.09% precision. The system supports real-time, online, continuous operation, not just offline database testing, placing it at the forefront of international research. The thermopile sensor used in this study does not present the privacy risks associated with RGB color cameras and is affordably priced between NT$1,500–10,000. However, due to its low resolution (32×32 pixels), traditional image processing and computer vision algorithms perform poorly. To overcome this, we adopted the latest AI and deep learning techniques for practical effectiveness in action prediction. We installed 1–3 far-infrared sensors above the bed (non-intrusive to daily activities) to continuously capture thermal imagery. The data is integrated to anticipate the senior’s intent to get out of bed, allowing caregivers to assist before a fall might occur due to orthostatic hypotension or insufficient leg support. Our system utilizes a combined CNN/LSTM/GRU neural network, along with a custom early-prediction loss function, to accurately predict the senior’s intent to get up—without triggering false alarms caused by minor movements like turning over or lifting a leg during sleep. The results of this research have been showcased at our university’s CIRAS center (Center of Innovative Research for Aging Society) on several occasions, leaving a strong impression on visitors. The findings were also published in 2023 in the IEEE Transactions on Circuits and Systems for Video Technology, an SCI Q1 journal (Ranking: 91.1%) 圖 1 本研究熱電堆紅外線 (TPA) 影像實拍圖 圖 2. 本研究三個紅外線影像感測器 (TPA) 實際配置圖 (床上天花板處) 圖 3. TPA 紅外線影像動作預測系統介面 (左上為三個 TPA 影像,右面為估測之離床機率曲線之時間變化及使用之紅色門檻線(threshold), 當超越門檻線,及發出告警。   Research team:Intelligent Signal Processing, ISP: 520 多媒體實驗室 賴文能老師團隊 (Lie group), Lie group team, R520 laboratory of Intelligent Signal Processing (ISP) group, Department of Electrical Engineering, National Chung Cheng University, Taiwan

1