Jing-Chiou Liou, Ph.D.

Education

  • Ph.D. E.C.E.    1995    New Jersey Institute of Technology
  • M.S.E.E.          1993    New Jersey Institute of Technology
  • Graduate Studies     1990    National Taiwan University
  • B.S.E.E.                      1983    National Taiwan University of Science and Technology

Research and Teaching Interests

Software Engineering, Software Quality and Security Assurance, IT Technology Management, Communication Networks, Computer Architecture, E-Commerce/ERP, Parallel and Distributed Processing.

Professional Activities and Training

  • Editor, International Journal of Advancements in Computing Technology (IJACT).
  • Member, International Committee on Advanced Institute of Convergence Information Technology (AICIT) international conference series.
  • Member, IASTED Technical Committee on Software Engineering (TCSE) for the term 2009-2012.
  • Member, IEEE Computer Society Technical Committee on Parallel Processing (TCPP).
  • Member, IEEE Computer Society.
  • Member, Software Productivity Consortium (SPC).
  • Founding Member, AEL National Honor Graduate Student Society NJIT Chapter.
  • Certified TL 9000/ISO 9000 Internal Auditing.
  • Certificates: training for Project Management, Practical Software Measurement, CMM Level-II, Level-III and Level-IV.

Industry Experience

  • Software Engineering: Research publications in software development model, Software Process Maturity, software size /testing efforts estimates. Invited talks given in universities.
  • Information Technology Management: Program/Project planning, schedule maintenance (MS project), operation analysis, size and effort/cost estimation, configuration and risk management and software release management.
  • IT Process/ Quality Improvement: Statistical process analysis and control, metrics and measurement, CMMI model. Identifying process flaw and improvement planning. Certified TL 9000/ISO 9000-2000 internal auditor. SQA activities in CMMI.
  • Information Technology Training: Organization training program for new technologies, processes and people, and technology transfer between functional groups.
  • System validation and security: Features testing, testing methodology, XRunner Automated Testing Tools, change control and quality gates.
  • Telecommunication Networking: Strong background in All Optical Network, SONET/SDH, Broadband (HFC) networks, ATM, VoIP and Network Management.

Academic Appointments

  • Associate professor, School of Computer Science, Kean University, Union, NJ9/2008 – present.
  • Graduate Coordinator, Computer Information Science, Department of Computer Science, Kean University, Union, NJ. 9/2011 – present
  • Visiting Professor, Department of Computer Science, Wenzhou-Kean University, Wenzhou, Zhejiang, China, 5/2016 – 7/2016
  • Adjunct Faculty, Kean University, Union, NJ. 2007 – 2008.
  • Assistant Professor, Department of Computer Science and Information Engineering, National Formosa University, Taiwan, R.O.C. 8/2005 – 7/2006.
  • Adjunct Faculty, New Jersey Institute of Technology, Newark, NJ. 1996.

Publications

US Patent

  • Systems and Methods for Authenticating Devices Using Single Factor Dynamic Authentication. Kean University, US Provisional Patent Application 62/184507, June 2015, US Patent Application 15/141076, April 28, 2016.

Book Chapter

  • C.-Y. Huang and J.-C. Liou, Chinese Multimedia Contest – A New Horizon in Interactive Digital Chinese Language Learning, in Chinese Language Teaching and Computer Usage (華語教學與電腦輔助運用), pp. 163 – 176, ISBN:9789571181875, 2016

Journal

  1. J. J Li, F. Neto and J.-C. Liou, An Experiment of Hit-and-Run Wireless Attacks, International Journal of Information Privacy, Security and Integrity, 2017.
  2. J.-C. Liou, Performance Measures for Evaluating the Dynamic Authentication Techniques, The International Journal of Cyber Security and Digital Forensics, Vol. 5, No. 2, pp. 83-93, 2016.
  3. J.-C. Liou, A Perspective on Embedded Software Agents in Software Security Assurance, The International Journal of Advanced Computer Science, Vol. 3, No. 1, 2013.
  4. J.-C. Liou, G. Egan, J. K. Patel and S. Bhashyam, RFID Factor Authentication Application for Trusted Identities in Cyberspace, The International Journal of Software Engineering, Vol. 5, No. 2, pp. 71-87, 2012
  5. J.-C. Liou, Toward Better Software Test Estimates and Requirement Tracking, Journal of Computational Methods in Science and Engineering, Vol. 11, Supplement 1, pp.127-137, 2011. (1 world citations)
  6. J.-C. Liou, On Improving CMMI in an Immature World of Software Development, Journal of Information Science and Engineering. Vol. 27, No. 1, pp. 213 – 226, 2011. (9 world citations)
  7. J.-C. Liou and S. Bhashyam, On Improving Feasibility and Security Measures of Online Authentication, IJACT : International Journal of Advancements in Computing Technology, Vol. 2, No. 4, pp. 6 ~ 16, 2010. (16 world citations)
  8. J.-C. Liou, and M. A. Palis, On the Effectiveness of Compiler-time Scheduling Approaches for Distributed Memory Multiprocessor. Journal of Information Science and Engineering, Vol. 14, No. 1, pp. 7-26, 1998. (1 world citations)
  9. J.-C. Liou, M. A. Palis, and D. S. L. Wei, Performance Analysis of Task Clustering Heuristics for Scheduling Static DAGs on Multiprocessor. Parallel Algorithms and Applications, Vol. 12, pp. 185-203, 1997. (8 world citations)
  10. M. A. Palis, J.-C. Liou and D. S. L. Wei, Task Clustering and Scheduling for Distributed Memory Parallel Architectures. IEEE Transactions on Parallel and Distributed Systems, Vol. 7, No. 1, pp.46-55, January 1996. (209 world citations)
  11. M. A. Palis, J.-C. Liou, S. Rajasekaran, S. Shende and D. S. L. Wei, Online Scheduling of Dynamic Trees. Parallel Processing Letters, Vol. 5, No. 4, pp. 635-646, December 1995. (11 world citations)

Conferences

  1. J.-C. Liou and A. Jr. Scaduto, A Study of Biometric Feature for a Recall-Based Behavioral Graphical Mobile Authentication, in Proc. 3rd Multidisciplinary International Social Networking Conference 2016, Paper No. 17, Union, NJ, August 2016.
  2. J.-C. Liou, M. Logapriyan, T. W. Lai, D. Pareja, and S. Sewell, A Study of the Internet Privacy in Private Browsing Mode, in Proc. 3rd Multidisciplinary International Social Networking Conference 2016, Paper No. 40, Union, NJ, August 2016.
  3. J. Li, F. Neto, and J.-C. Liou, Clouds for Hit-and-Run, in Proc. 2016 IEEE Big Data Security on Cloud, pp. 67-72, NYC, NY, April 2016.
  4. J.-C. Liou, Analysis of Feasibility and Security Measures on Dynamic Authentication, Proc. 2015 International Conference on Security and Management, pp. 29-35, Las Vegas, NV, July 2015.
  5. C.-Y. Huang J.-C. Liou, and G. Hunag, Pathway from Learning Multimedia Software to Computer Science Education, Proc. 2015 International Conference on Frontiers in Education: Computer Science and Computer Engineering, pp. 181-186, Las Vegas, NV, July 2015. (1 world citations)
  6. C.-Y. Huang and J.-C. Liou, Learning Mandarin in a Virtual Multimedia Environment System, Proc. 10th International Conference for Internet Chinese Education ( ICICE 2015). Boston, MA, June, 2015.
  7. J.-C. Liou, A Study of Current Authentication Schemes using Security Measures, Proc. 25th Cryptology and Information Security Conference , Kaohsiung, Taiwan, May 2015
  8. J.-C. Liou, A Single-Factor Dynamic Authentication for Computer Systems with Touch Screens, Proc. 23rd International Conference on Software Engineering and Data Engineering (SEDE ’14), pp. 31-36, New Orleans, LA, October 2014.
  9. C.-Y. Huang and J.-C. Liou, Chinese Multimedia Contest – A New Horizon in Interactive Digital Chinese Language Learning, Proc. 8th International Conference for Internet Chinese Education ( ICICE 2013).
  10. J.-C. Liou, When the Software Goes Beyond Its Requirements – A Software Security Perspective, Proc. 9th International Conference on Information Technology: New generation, pp. 403-408, Las Vegas, NV, April 2012. (2 world citations)
  11. J.-C. Liou, An Efficient Process Model for Distributed Software Application Developments, in Proc. 13th IEEE Joint International Computer Science and Information Technology Conference (JICSIT 2011), Chongqing, China, August, 2011.
  12. J.-C. Liou, G. Egan, J. K. Patel and S. Bhashyam, A Sophisticated RFID Application on Multi-Factor Authentication, in Proc. 8th International Conference on Information Technology: New generation, pp. 180-185, Las Vegas, NV, April 2011. (12 world citations)
  13. J.-C. Liou and S. Bhashyam, A Feasible and Cost Effective Two-Factor Authentication for Online Transaction, In Proc. 2nd IEEE International Conference on Software Engineering and Data Mining (SEDM’10), pp. 47-51, Chengdu, China, June 2010. (16 world citations)
  14. J.-C. Liou, On Software Test Estimate and Requirement Tracking, Proc. 19th International Conference on Software Engineering and Data Engineering (SEDE ’10), Paper ID. 45 in CD-ROM, San Francisco, CA, June 2010. (2 world citations)
  15. C.-Y. Huang and J.-C. Liou, Computer-Assisted Multimedia Language Learning Approach for Heritage Chinese Schools, Proc. 14th Global Chinese Conference on Computers in Education (GCCCE ’10), Singapore, June 2010.
  16. J.-C. Liou and C.-Y. Huang, Integrated Computer-Assisted Language Learning Environment for Different Background Students at an Oversea Weekend Chinese School, Proc. 6nd International Conference for Internet Chinese Education ( ICICE 2009).
  17. J.-C. Liou, On Software Architecture Design for Progressive Development Model, Proc. 9th IASTED International Conference on Software Engineering and Applications (SEA ‘05), pp. 647-652, Phoenix, AZ, USA, November, 2005 (1 world citations)
  18. J.-C. Liou, PLUS: A Release Management Process for Progressive Software Development Model. Proc. 8th IASTED International Conference on Software Engineering and Applications (SEA ‘04), pp. 647-652, Boston, MA, USA, November, 2004.
  19. J.-C. Liou, PDM: A Process Model for Software Development in the E-Era. Proc. 7th IASTED International Conference on Software Engineering and Applications (SEA), pp. 309 – 313, CA, USA, November, 2003.
  20. J.-C. Liou, OPA for sizing the object-Oriented Software Applications. Proc. 7th IASTED International Conference on Software Engineering and Applications (SEA), pp. 290 – 295, CA, USA, November, 2003.
  21. J.-C. Liou, CMM and Software Process Maturity – An Industry Experience, Proc. 6th IASTED International Conference on Software Engineering and Applications (SEA), pp. 367-372 Boston, MA, USA, November, 2002.
  22. J.-C. Liou, Measuring the Size of Object-Oriented Software Applications, Proc. 17th International Symposium on Computer and Information Sciences, Orlando, FL, USA, October, 2002.
  23. J.-C. Liou, How Human Factors Impact on Software Process Maturity, Proc. 17th International Symposium on Computer and Information Sciences, Orlando, FL, USA, October, 2002.
  24. J.-C. Liou, and S.-C. Tsay, Estimate Your Software Testing Right. Proc. The Fifth International Conference on Computer Science and Informatics 2000, pp. 615 – 618, Atlantic City, NJ, USA, March, 2000.
  25. J.-C. Liou, and M. A. Palis, A New Heuristic for Scheduling Parallel Programs on Multiprocessor. Proc. The International Conference on Parallel Architectures and Compilation Techniques 1998, pp. Paris, France, October 1998. (25 world citations)
  26. J.-C. Liou, and M. A. Palis, CASS: An Efficient Task Management System for Distributed Memory Architectures. Proc. 1997 International Symposium on Parallel Architectures, Algorithms, and Networks, pp. 289 — 295, Taipei, Taiwan, December 1997. (11 world citations)
  27. J.-C. Liou, and M. A. Palis, A Comparison of General Approaches to Multiprocessor Scheduling. Proc. 11th International Parallel Processing Symposium, pp. 152 -156, Geneva, Switzerland, April, 1997. (95 world citations)
  28. J.-C. Liou, and M. A. Palis, An Efficient Clustering Heuristic for Scheduling DAGs on Multiprocessors. Proc. The Workshop on Resource Management in Computer Systems and Networks, 8th Symposium on Parallel and Distributed Processing, New Orleans, Louisiana, October, 1996. (75 world citations)
  29. M. A. Palis, J.-C. Liou and D. S. L. Wei, A Greedy Task Clustering Heuristic That is Provably Good. Proc. 1994 International Symposium on Parallel Architectures, Algorithms, and Networks, pp. 398-405, Kanazawa, Japan, December 1994. (8 world citations)

Honors & Awards

  1. 2017 Excellence in Graduate Faculty Award
  2. 2015 NSF Workshop: Cybersecurity Summer Research and Training for College Faculty
  3. 2014 – 2019 Co-PI of NSF DUE S-STEM grant #1355582
  4. 2012-2013 Untenured Faculty Research Initiative program (UFRI)
  5. 2010 Students Participating with Faculty (SpF10) Summer Research Program. Kean University
  6. 07/2005-06/2006 DoE SEC-01 Foundation Education in Undergraduate Software Engineering Project- Plan A (Department of Education, Taiwan, R.O.C.): Curriculum design for Undergraduate Software Engineering Education.

Invited Visits and Presentations

  1. A Pathway Toward Your Career Success in Global IT Industry, Huanyu Chinese Learning Center, Beijing, China, June 18, 2016.
  2. Software Assurance: Developing Trustworthy Software Systems in the 21st Century, National Chia-Yi University, Taiwan, January 7, 2016
  3. A Pathway Toward Your Career Success in Global IT Industry, National Chia-Yi University, Taiwan, December 23, 2015.
  4. The First Line of Defense in Cybersecurity and Trustworthiness of Online Services, National University of Kaohsiung, June 10, 2015.
  5. Cybersecurity and US IT Industry Trend in the 21st Century, Tainan University of Science and Technology, June 8, 2015
  6. The First Line of Defense in Cybersecurity and Trustworthiness of Online Services, National Kaohsiung Normal University, May 27, 2015.
  7. Catch Me If You Can: Digital Forensics and Cyber Warfare, National Formosa University, May 21, 2015.
  8. Catch Me If You Can: Digital Forensics and Cyber Warfare, National Yunlin University of Science and Technology, May 20, 2015.
  9. 2012 Short Term Visiting Scholar at National Kaohsiung Normal University, Taiwan, ROC.
  10. Impacts of Embedded Sleeping Agents on Software Security, 2012 Research Day faculty research presentation, Kean University, April 2012.
  11. PDM: An Efficient Software Development Model for Cloud Computing, National Kaohsiung Normal University, Taiwan, June 16, 2011.
  12. Software Assurance: Developing Trustworthy Software Systems in the 21st Century, National Formosa University, Taiwan, June 7, 2011.
  13. Recruiting, Retaining, and Re-Training of Technology Talents – An US Industry Perspective, Kean University, Taiwan, April 20, 2010.
  14. Software security – A Software Engineering Perspective, National Formosa University, Taiwan, July 6, 2009.
  15. On Software Architecture Design for Progressive Development Model, Chung Yuan Christian University, Taiwan, June 12, 2009.
  16. Information Technology Innovation in New Era, Tainan University of Technology, Taiwan, June 11, 2009.
  17. On Software Test Estimate and Requirements Tracking, National Formosa University, Taiwan, June 9, 2009.
  18. How Human Factors Impact on Software Process Maturity, Nation Taiwan University of Science and Technology, Taiwan, December 30, 2002.
  19. Rule –Based Software Development, Telecommunication Laboratories, Chunghwa Telecom Co. Ltd., Taiwan, December 26, 2002.
  20. CMM and Software Process Maturity, Nation Chung Cheng University, Taiwan, December 23, 2002.
  21. CMM and Software Process Maturity, Nation Cheng Kung University, Taiwan, December 20, 2002.
  22. Total Management for Software Development – A Software Engineering Perspective, New Jersey City University, USA, April 12, 2002.
  23. Grain-Size Optimization for Distributed Memory Parallel Architectures. University of Aizu, Japan, December 1994.

Thesis & Projects Advisements

  1. A Study of the Internet Privacy in Private Browsing Mode, Kean University 2016.
  2. Online Training and Examination System, Kean University 2015.
  3. Smart Parking System, Kean University, 2014.
  4. Ph.D. Thesis Examiner (committee member), Visvesvaraya Technological University, Karnataka State, India, 2012.
  5. Toward a Safe and Secure Cyber Identity. Presented at the 2012 Nation Conference of Undergraduate Research (NCUR) held at Weber State University, Utah, March29-31, 2012.
  6. How Software Agents Impact on Software Security. Kean University, 2011.
  7. 2010/2011 Kean University Research Day Student Post.
  8. Software Security in Information Technology Age. Ronald E. McNair Summer Research Institute (SRI) faculty mentor, Kean University, 2010.
  9. J.-C. Liou and Y. Tsay, “Object Point Analysis and Measurement,” Version 1.0, AT&T, 200 Laurel Ave. Middletown, NJ 07748, 1999.