Research Library · AI Agents · Cybersecurity

Doctoral Researcher, Artificial Intelligence in Medical Imaging / Signal Analysis Lab

Jason Chia-Sheng Lin

Trustworthy AI systems for evidence-heavy work.

A technical portfolio for collaborators, hiring teams, and organizers who need to inspect the research agenda, system builds, talks, and writing behind my work in AI agents, speech intelligence, cybersecurity, and regulated deployment.

  • Agent workflows that preserve evidence and reviewer control
  • Speech and transcript pipelines built for long-form analysis
  • Security-aware deployment thinking for regulated environments

Research base

Doctoral research in the Artificial Intelligence in Medical Imaging / Signal Analysis Lab at NYCU.

Speaking signal

Official CYBERSEC 2026 breakout session on cybersecurity design for AI software medical devices.

Publication activity

Two English CISC 2025 conference papers connecting security analysis with practical deployment and defense.

Read the web keynote
About the Library

A site organized like a technical system, not a loose portfolio.

The redesign borrows Triton's clarity: a direct technical promise, a compact capability list, getting-started paths, and evidence sections that let visitors inspect what has been built, written, and presented.

Working model

Evidence enters through speech, text, threat, and research sources, then moves through grounded AI workflows before a human review or deployment decision.

  1. 01
    Capture

    audio, transcripts, evidence, threat signals

  2. 02
    Reason

    retrieval, agents, extraction, system evaluation

  3. 03
    Review

    traceability, uncertainty, human approval

  4. 04
    Deploy

    security, governance, regulated workflows

Selected Systems

Case studies that make the architecture inspectable.

Each project explains the problem, the system design, and the evidence that matters in practice.

Browse all systems
Project Readiness

Every featured build carries a maturity signal.

The labels separate early research, concrete prototypes, paper-backed work, production-style case studies, and archived artifacts so visitors know how to read each project.

Research seed

A scoped research direction with a clear question, references, and next evaluation work.

Prototype

A system or pipeline direction concrete enough to discuss as an implementation path.

Paper-backed

A project connected to a publication, formal submission, or conference-facing artifact.

Production-style case study

A polished system narrative with deployment assumptions, user workflow, and risk controls.

Archived

A finished or historical artifact kept for reference rather than active development.

Papers / Talks

Public technical framing for serious deployment.

Speaking spans official sessions and English conference papers across AI agents, cybersecurity, speech systems, and deployment work where reliability and traceability matter.

Browse talks and topics
Official session CYBERSEC 2026

AI 軟體醫材的資安實戰:從美國 FDA 524B 規範到 Threat Modeling 與 Patch SLA 的完整落地

Breakout session on cybersecurity practice for AI software medical devices, using FDA 524B to connect threat modeling, SBOM, Zero Trust design, and auditable risk governance in heavily regulated environments.

May 6, 2026 · 16:15-16:45 Medical Cybersecurity Forum
Conference paper CISC 2025

Evolution and Defense Challenges of Ransomware-as-a-Service in the AI Era: A Technical and Strategic Analysis Using Medusa and CrazyHunter as a Case Study

English conference paper examining how AI-era RaaS operations evolve through BYOVD, LOTL, covert C2, and adaptive tradecraft, then mapping those threats to a ZTAID-grounded zero-trust defense strategy.

May 28-29, 2025 Cryptology and Information Security Conference

Trustworthy AI Beyond Benchmark Performance

How to think about reliability, evidence, human review, and system behavior when AI is used in environments where mistakes carry real cost.

Research groups, labs, interdisciplinary audiences

AI-Era Ransomware and Zero-Trust Defense

How modern RaaS campaigns combine automation, BYOVD, LOTL, and covert C2 techniques, and how ZTAID-aligned zero-trust strategy can structure practical detection, containment, and recovery.

Cybersecurity conferences, blue teams, graduate seminars

Threat Pulse Modeling and Continuous Assessment

How cyber threat intelligence can be translated into pulse events, ZTAID pillar scores, and measurable maturity signals to support faster defensive adaptation.

Cybersecurity researchers, zero-trust programs, graduate seminars

ASR + LLM + RAG for Operational Workflows

Design patterns for speech and language pipelines that move from raw transcripts to grounded, inspectable outputs in analyst-facing settings.

NLP teams, speech researchers, applied AI practitioners

AI Agents and IDE-Like Assistant Systems

How to design tool-using agents and coding-assistant workflows that stay inspectable, grounded, and useful for real work.

AI product teams, research labs, engineering groups

Security-Minded AI System Design

Why privacy, leakage risk, adversarial thinking, and deployment assumptions should be treated as core system questions rather than compliance afterthoughts.

Security teams, engineering groups, policy-adjacent stakeholders

Jason Chia-Sheng Lin
About Snapshot

An interdisciplinary path from investigation to AI and agent systems.

The work combines doctoral research, agent building, and an investigation-informed view of evidence and failure.

I bring together medical AI lab research, system building, and investigation-informed thinking to design AI agents and IDE-like agent systems that stay useful when evidence, regulation, and deployment constraints matter.

Role

Doctoral researcher at NYCU

Focus

AI agents, speech intelligence, and cybersecurity

Approach

Evidence-aware agents and systems for real-world use

Contact

Open to collaboration, technical discussion, and speaking invitations.

I welcome thoughtful conversations around AI agents, IDE-like agent systems, trustworthy AI, speech and language systems, and deployment in security-sensitive or regulated environments.

Email is the fastest route. The contact page also shows the context that helps most.

Research collaboration and interdisciplinary lab conversations

Speaking invitations for AI agents, speech systems, or cybersecurity

Hiring, technical peer exchange, and IDE-like agent system design

Helpful first message

Share your context, why the conversation fits, and what kind of next step would be most useful.

Email Jason Open contact page LinkedIn