BibTeX records: Ee-Chien Chang

download as .bib file

@article{DBLP:journals/tdsc/FangQQZCZC24,
  author       = {Han Fang and
                  Yupeng Qiu and
                  Guorui Qin and
                  Jiyi Zhang and
                  Kejiang Chen and
                  Weiming Zhang and
                  Ee{-}Chien Chang},
  title        = {DP\({}^{\mbox{2}}\)Dataset Protection by Data Poisoning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {636--649},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3227945},
  doi          = {10.1109/TDSC.2022.3227945},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FangQQZCZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-04640,
  author       = {Jiyi Zhang and
                  Han Fang and
                  Ee{-}Chien Chang},
  title        = {Domain Bridge: Generative model-based domain forensic for black-box
                  models},
  journal      = {CoRR},
  volume       = {abs/2402.04640},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.04640},
  doi          = {10.48550/ARXIV.2402.04640},
  eprinttype    = {arXiv},
  eprint       = {2402.04640},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-04640.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-13851,
  author       = {Jiawei Liang and
                  Siyuan Liang and
                  Man Luo and
                  Aishan Liu and
                  Dongchen Han and
                  Ee{-}Chien Chang and
                  Xiaochun Cao},
  title        = {VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive
                  Visual Language Models},
  journal      = {CoRR},
  volume       = {abs/2402.13851},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.13851},
  doi          = {10.48550/ARXIV.2402.13851},
  eprinttype    = {arXiv},
  eprint       = {2402.13851},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-13851.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-14872,
  author       = {Xiaoxia Li and
                  Siyuan Liang and
                  Jiyi Zhang and
                  Han Fang and
                  Aishan Liu and
                  Ee{-}Chien Chang},
  title        = {Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts
                  Against Open-source LLMs},
  journal      = {CoRR},
  volume       = {abs/2402.14872},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.14872},
  doi          = {10.48550/ARXIV.2402.14872},
  eprinttype    = {arXiv},
  eprint       = {2402.14872},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-14872.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-05448,
  author       = {Zhiang Li and
                  Daisuke Mashima and
                  Wen Shei Ong and
                  Ertem Esiner and
                  Zbigniew Kalbarczyk and
                  Ee{-}Chien Chang},
  title        = {On Practicality of Using {ARM} TrustZone Trusted Execution Environment
                  for Securing Programmable Logic Controllers},
  journal      = {CoRR},
  volume       = {abs/2403.05448},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.05448},
  doi          = {10.48550/ARXIV.2403.05448},
  eprinttype    = {arXiv},
  eprint       = {2403.05448},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-05448.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-16257,
  author       = {Siyuan Liang and
                  Kuanrong Liu and
                  Jiajun Gong and
                  Jiawei Liang and
                  Yuan Xun and
                  Ee{-}Chien Chang and
                  Xiaochun Cao},
  title        = {Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal
                  Contrastive Learning via Local Token Unlearning},
  journal      = {CoRR},
  volume       = {abs/2403.16257},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.16257},
  doi          = {10.48550/ARXIV.2403.16257},
  eprinttype    = {arXiv},
  eprint       = {2403.16257},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-16257.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-16271,
  author       = {Siyuan Liang and
                  Wei Wang and
                  Ruoyu Chen and
                  Aishan Liu and
                  Boxi Wu and
                  Ee{-}Chien Chang and
                  Xiaochun Cao and
                  Dacheng Tao},
  title        = {Object Detectors in the Open Environment: Challenges, Solutions, and
                  Outlook},
  journal      = {CoRR},
  volume       = {abs/2403.16271},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.16271},
  doi          = {10.48550/ARXIV.2403.16271},
  eprinttype    = {arXiv},
  eprint       = {2403.16271},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-16271.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/RoomiHMCU23,
  author       = {Muhammad M. Roomi and
                  S. M. Suhail Hussain and
                  Daisuke Mashima and
                  Ee{-}Chien Chang and
                  Taha Selim Ustun},
  title        = {Analysis of False Data Injection Attacks Against Automated Control
                  for Parallel Generators in {IEC} 61850-Based Smart Grid Systems},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {3},
  pages        = {4603--4614},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3236951},
  doi          = {10.1109/JSYST.2023.3236951},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/RoomiHMCU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/softx/HussainYRMC23,
  author       = {S. M. Suhail Hussain and
                  Chen Yaohao and
                  Muhammad M. Roomi and
                  Daisuke Mashima and
                  Ee{-}Chien Chang},
  title        = {An open-source framework for publishing/subscribing {IEC} 61850 {R-GOOSE}
                  and {R-SV}},
  journal      = {SoftwareX},
  volume       = {23},
  pages        = {101415},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.softx.2023.101415},
  doi          = {10.1016/J.SOFTX.2023.101415},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/softx/HussainYRMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/FangJQZZC23,
  author       = {Han Fang and
                  Zhaoyang Jia and
                  Yupeng Qiu and
                  Jiyi Zhang and
                  Weiming Zhang and
                  Ee{-}Chien Chang},
  title        = {De-END: Decoder-Driven Watermarking Network},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {25},
  pages        = {7571--7581},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMM.2022.3223559},
  doi          = {10.1109/TMM.2022.3223559},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/FangJQZZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/FangQCZ0C23,
  author       = {Han Fang and
                  Yupeng Qiu and
                  Kejiang Chen and
                  Jiyi Zhang and
                  Weiming Zhang and
                  Ee{-}Chien Chang},
  editor       = {Brian Williams and
                  Yiling Chen and
                  Jennifer Neville},
  title        = {Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box
                  Distortions},
  booktitle    = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2023, Thirty-Fifth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February
                  7-14, 2023},
  pages        = {5054--5061},
  publisher    = {{AAAI} Press},
  year         = {2023},
  url          = {https://doi.org/10.1609/aaai.v37i4.25633},
  doi          = {10.1609/AAAI.V37I4.25633},
  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/FangQCZ0C23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/YangWYW0CZ023,
  author       = {Ziqi Yang and
                  Lijin Wang and
                  Da Yang and
                  Jie Wan and
                  Ziming Zhao and
                  Ee{-}Chien Chang and
                  Fan Zhang and
                  Kui Ren},
  editor       = {Brian Williams and
                  Yiling Chen and
                  Jennifer Neville},
  title        = {Purifier: Defending Data Inference Attacks via Transforming Confidence
                  Scores},
  booktitle    = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2023, Thirty-Fifth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February
                  7-14, 2023},
  pages        = {10871--10879},
  publisher    = {{AAAI} Press},
  year         = {2023},
  url          = {https://doi.org/10.1609/aaai.v37i9.26289},
  doi          = {10.1609/AAAI.V37I9.26289},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aaai/YangWYW0CZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaiSZWCCR23,
  author       = {Jianli Bai and
                  Xiangfu Song and
                  Xiaowu Zhang and
                  Qifan Wang and
                  Shujie Cui and
                  Ee{-}Chien Chang and
                  Giovanni Russello},
  title        = {Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear
                  Communication},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {799--813},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627131},
  doi          = {10.1145/3627106.3627131},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BaiSZWCCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ZhangFTXFC23,
  author       = {Jiyi Zhang and
                  Han Fang and
                  Wesley Joon{-}Wie Tann and
                  Ke Xu and
                  Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Mitigating Adversarial Attacks by Distributing Different Copies to
                  Different Buyers},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {704--715},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3582824},
  doi          = {10.1145/3579856.3582824},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ZhangFTXFC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/MashimaRNKHC23,
  author       = {Daisuke Mashima and
                  Muhammad M. Roomi and
                  Bennet Ng and
                  Zbigniew Kalberczyk and
                  S. M. Suhail Hussain and
                  Ee{-}Chien Chang},
  title        = {Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity
                  Experiments and Training},
  booktitle    = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2023 - Supplemental Volume, Porto, Portugal, June
                  27-30, 2023},
  pages        = {49--55},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSN-S58398.2023.00024},
  doi          = {10.1109/DSN-S58398.2023.00024},
  timestamp    = {Thu, 17 Aug 2023 15:16:15 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/MashimaRNKHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/TannC23,
  author       = {Wesley Joon{-}Wie Tann and
                  Ee{-}Chien Chang},
  title        = {Poisoning Online Learning Filters by Shifting on the Move},
  booktitle    = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023},
  pages        = {239--251},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSN58367.2023.00033},
  doi          = {10.1109/DSN58367.2023.00033},
  timestamp    = {Tue, 15 Aug 2023 11:43:57 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/TannC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/FangZQLXFC23,
  author       = {Han Fang and
                  Jiyi Zhang and
                  Yupeng Qiu and
                  Jiayang Liu and
                  Ke Xu and
                  Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Tracing the Origin of Adversarial Attack for Forensic Investigation
                  and Deterrence},
  booktitle    = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023,
                  Paris, France, October 1-6, 2023},
  pages        = {4312--4321},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCV51070.2023.00400},
  doi          = {10.1109/ICCV51070.2023.00400},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/FangZQLXFC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/HussainRMC23,
  author       = {S. M. Suhail Hussain and
                  Muhammad M. Roomi and
                  Daisuke Mashima and
                  Ee{-}Chien Chang},
  title        = {End-to-End Performance Evaluation of {R-SV} / {R-GOOSE} Messages for
                  Wide Area Protection and Control Applications},
  booktitle    = {{IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2023, Washington, DC, USA, January 16-19, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISGT51731.2023.10066414},
  doi          = {10.1109/ISGT51731.2023.10066414},
  timestamp    = {Tue, 28 Mar 2023 19:49:46 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/HussainRMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/FangCQLXFZC23,
  author       = {Han Fang and
                  Kejiang Chen and
                  Yupeng Qiu and
                  Jiayang Liu and
                  Ke Xu and
                  Chengfang Fang and
                  Weiming Zhang and
                  Ee{-}Chien Chang},
  editor       = {Abdulmotaleb El{-}Saddik and
                  Tao Mei and
                  Rita Cucchiara and
                  Marco Bertini and
                  Diana Patricia Tobon Vallejo and
                  Pradeep K. Atrey and
                  M. Shamim Hossain},
  title        = {DeNoL: {A} Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel
                  Watermarking Robustness},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Multimedia,
                  {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023},
  pages        = {7345--7353},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581783.3612068},
  doi          = {10.1145/3581783.3612068},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/FangCQLXFZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-01218,
  author       = {Han Fang and
                  Jiyi Zhang and
                  Yupeng Qiu and
                  Ke Xu and
                  Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Tracing the Origin of Adversarial Attack for Forensic Investigation
                  and Deterrence},
  journal      = {CoRR},
  volume       = {abs/2301.01218},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.01218},
  doi          = {10.48550/ARXIV.2301.01218},
  eprinttype    = {arXiv},
  eprint       = {2301.01218},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-01218.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-05869,
  author       = {Jiyi Zhang and
                  Han Fang and
                  Hwee Kuan Lee and
                  Ee{-}Chien Chang},
  title        = {Finding Meaningful Distributions of {ML} Black-boxes under Forensic
                  Investigation},
  journal      = {CoRR},
  volume       = {abs/2305.05869},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.05869},
  doi          = {10.48550/ARXIV.2305.05869},
  eprinttype    = {arXiv},
  eprint       = {2305.05869},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-05869.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-01400,
  author       = {Jiyi Zhang and
                  Han Fang and
                  Ee{-}Chien Chang},
  title        = {Adaptive Attractors: {A} Defense Strategy against {ML} Adversarial
                  Collusion Attacks},
  journal      = {CoRR},
  volume       = {abs/2306.01400},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.01400},
  doi          = {10.48550/ARXIV.2306.01400},
  eprinttype    = {arXiv},
  eprint       = {2306.01400},
  timestamp    = {Mon, 12 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-01400.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-10443,
  author       = {Wesley Joon{-}Wie Tann and
                  Yuancheng Liu and
                  Jun Heng Sim and
                  Choon Meng Seah and
                  Ee{-}Chien Chang},
  title        = {Using Large Language Models for Cybersecurity Capture-The-Flag Challenges
                  and Certification Questions},
  journal      = {CoRR},
  volume       = {abs/2308.10443},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.10443},
  doi          = {10.48550/ARXIV.2308.10443},
  eprinttype    = {arXiv},
  eprint       = {2308.10443},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-10443.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-17124,
  author       = {Jianli Bai and
                  Xiangfu Song and
                  Xiaowu Zhang and
                  Qifan Wang and
                  Shujie Cui and
                  Ee{-}Chien Chang and
                  Giovanni Russello},
  title        = {Mostree : Malicious Secure Private Decision Tree Evaluation with Sublinear
                  Communication},
  journal      = {CoRR},
  volume       = {abs/2309.17124},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.17124},
  doi          = {10.48550/ARXIV.2309.17124},
  eprinttype    = {arXiv},
  eprint       = {2309.17124},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-17124.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-11017,
  author       = {Jiayang Liu and
                  Siyu Zhu and
                  Siyuan Liang and
                  Jie Zhang and
                  Han Fang and
                  Weiming Zhang and
                  Ee{-}Chien Chang},
  title        = {Improving Adversarial Transferability by Stable Diffusion},
  journal      = {CoRR},
  volume       = {abs/2311.11017},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.11017},
  doi          = {10.48550/ARXIV.2311.11017},
  eprinttype    = {arXiv},
  eprint       = {2311.11017},
  timestamp    = {Wed, 22 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-11017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongYBDC23,
  author       = {Xiangfu Song and
                  Dong Yin and
                  Jianli Bai and
                  Changyu Dong and
                  Ee{-}Chien Chang},
  title        = {Secret-Shared Shuffle with Malicious Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1794},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1794},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SongYBDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/SarkarTC22,
  author       = {Sajal Sarkar and
                  Yong Meng Teo and
                  Ee{-}Chien Chang},
  title        = {A cybersecurity assessment framework for virtual operational technology
                  in power system automation},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {117},
  pages        = {102453},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.simpat.2021.102453},
  doi          = {10.1016/J.SIMPAT.2021.102453},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpra/SarkarTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NingPHDCC22,
  author       = {Jianting Ning and
                  Geong Sen Poh and
                  Xinyi Huang and
                  Robert H. Deng and
                  Shuwei Cao and
                  Ee{-}Chien Chang},
  title        = {Update Recovery Attacks on Encrypted Database Within Two Updates Using
                  Range Queries Leakage},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {1164--1180},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3015997},
  doi          = {10.1109/TDSC.2020.3015997},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/NingPHDCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangCQQWW22,
  author       = {Qin Jiang and
                  Ee{-}Chien Chang and
                  Yong Qi and
                  Saiyu Qi and
                  Pengfei Wu and
                  Jianfeng Wang},
  title        = {Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed
                  Index Using Intel {SGX}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1053--1068},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3144877},
  doi          = {10.1109/TIFS.2022.3144877},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangCQQWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ace/SufatrioVC22,
  author       = {Sufatrio and
                  Jan Vykopal and
                  Ee{-}Chien Chang},
  editor       = {Judy Sheard and
                  Paul Denny},
  title        = {Collaborative Paradigm of Teaching Penetration Testing using Real-World
                  University Applications},
  booktitle    = {{ACE} '22: Australasian Computing Education Conference, Virtual Event,
                  Australia, February 14 - 18, 2022},
  pages        = {114--122},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3511861.3511874},
  doi          = {10.1145/3511861.3511874},
  timestamp    = {Sun, 26 Nov 2023 13:55:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ace/SufatrioVC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ZhangCL22,
  author       = {Jiyi Zhang and
                  Ee{-}Chien Chang and
                  Hwee Kuan Lee},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Confusing and Detecting {ML} Adversarial Attacks with Injected Attractors},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {322--336},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3497752},
  doi          = {10.1145/3488932.3497752},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ZhangCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/BaiSCCR22,
  author       = {Jianli Bai and
                  Xiangfu Song and
                  Shujie Cui and
                  Ee{-}Chien Chang and
                  Giovanni Russello},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Scalable Private Decision Tree Evaluation with Sublinear Communication},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {843--857},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517413},
  doi          = {10.1145/3488932.3517413},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/BaiSCCR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/FangJMCZ22,
  author       = {Han Fang and
                  Zhaoyang Jia and
                  Zehua Ma and
                  Ee{-}Chien Chang and
                  Weiming Zhang},
  editor       = {Jo{\~{a}}o Magalh{\~{a}}es and
                  Alberto Del Bimbo and
                  Shin'ichi Satoh and
                  Nicu Sebe and
                  Xavier Alameda{-}Pineda and
                  Qin Jin and
                  Vincent Oria and
                  Laura Toni},
  title        = {PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based
                  Watermarking Network},
  booktitle    = {{MM} '22: The 30th {ACM} International Conference on Multimedia, Lisboa,
                  Portugal, October 10 - 14, 2022},
  pages        = {2267--2275},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3503161.3548049},
  doi          = {10.1145/3503161.3548049},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/FangJMCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WuNSWC22,
  author       = {Pengfei Wu and
                  Jianting Ning and
                  Jiamin Shen and
                  Hongbing Wang and
                  Ee{-}Chien Chang},
  title        = {Hybrid Trust Multi-party Computation with Trusted Execution Environment},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-222/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/WuNSWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-01284,
  author       = {Jianli Bai and
                  Xiangfu Song and
                  Shujie Cui and
                  Ee{-}Chien Chang and
                  Giovanni Russello},
  title        = {Scalable Private Decision Tree Evaluation with Sublinear Communication},
  journal      = {CoRR},
  volume       = {abs/2205.01284},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.01284},
  doi          = {10.48550/ARXIV.2205.01284},
  eprinttype    = {arXiv},
  eprint       = {2205.01284},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-01284.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-13032,
  author       = {Han Fang and
                  Zhaoyang Jia and
                  Yupeng Qiu and
                  Jiyi Zhang and
                  Weiming Zhang and
                  Ee{-}Chien Chang},
  title        = {De-END: Decoder-driven Watermarking Network},
  journal      = {CoRR},
  volume       = {abs/2206.13032},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.13032},
  doi          = {10.48550/ARXIV.2206.13032},
  eprinttype    = {arXiv},
  eprint       = {2206.13032},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-13032.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-01946,
  author       = {Mingyuan Gao and
                  Hung Dang and
                  Ee{-}Chien Chang and
                  Jialin Li},
  title        = {Mixed Fault Tolerance Protocols with Trusted Execution Environment},
  journal      = {CoRR},
  volume       = {abs/2208.01946},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.01946},
  doi          = {10.48550/ARXIV.2208.01946},
  eprinttype    = {arXiv},
  eprint       = {2208.01946},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-01946.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-15493,
  author       = {Wesley Joon{-}Wie Tann and
                  Akhil Vuputuri and
                  Ee{-}Chien Chang},
  title        = {Predicting Non-Fungible Token {(NFT)} Collections: {A} Contextual
                  Generative Approach},
  journal      = {CoRR},
  volume       = {abs/2210.15493},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.15493},
  doi          = {10.48550/ARXIV.2210.15493},
  eprinttype    = {arXiv},
  eprint       = {2210.15493},
  timestamp    = {Fri, 28 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-15493.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-00612,
  author       = {Ziqi Yang and
                  Lijin Wang and
                  Da Yang and
                  Jie Wan and
                  Ziming Zhao and
                  Ee{-}Chien Chang and
                  Fan Zhang and
                  Kui Ren},
  title        = {Purifier: Defending Data Inference Attacks via Transforming Confidence
                  Scores},
  journal      = {CoRR},
  volume       = {abs/2212.00612},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.00612},
  doi          = {10.48550/ARXIV.2212.00612},
  eprinttype    = {arXiv},
  eprint       = {2212.00612},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-00612.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaoDC21,
  author       = {Mingyuan Gao and
                  Hung Dang and
                  Ee{-}Chien Chang},
  title        = {{TEEKAP:} Self-Expiring Data Capsule using Trusted Execution Environment},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {235--247},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485919},
  doi          = {10.1145/3485832.3485919},
  timestamp    = {Tue, 07 Dec 2021 18:41:40 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GaoDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/TannWPC21,
  author       = {Wesley Joon{-}Wie Tann and
                  Jackie Tan Jin Wei and
                  Joanna Purba and
                  Ee{-}Chien Chang},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online
                  Deep Learning},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {432--446},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453083},
  doi          = {10.1145/3433210.3453083},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/TannWPC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangTCL21,
  author       = {Jiyi Zhang and
                  Wesley Joon{-}Wie Tann and
                  Ee{-}Chien Chang and
                  Hwee Kuan Lee},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Common Component in Black-Boxes Is Prone to Attacks},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {584--604},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_28},
  doi          = {10.1007/978-3-030-88418-5\_28},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangTCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RisdiantoC21,
  author       = {Aris Cahyadi Risdianto and
                  Ee{-}Chien Chang},
  title        = {OctoBot: An Open-Source Orchestration System for a Wide Range Network
                  Activity Generation},
  booktitle    = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484537},
  doi          = {10.1109/INFOCOMWKSHPS51825.2021.9484537},
  timestamp    = {Fri, 23 Jul 2021 09:24:13 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/RisdiantoC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-12612,
  author       = {Wesley Joon{-}Wie Tann and
                  Ee{-}Chien Chang},
  title        = {Poisoning of Online Learning Filters: DDoS Attacks and Countermeasures},
  journal      = {CoRR},
  volume       = {abs/2107.12612},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.12612},
  eprinttype    = {arXiv},
  eprint       = {2107.12612},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-12612.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-15160,
  author       = {Jiyi Zhang and
                  Wesley Joon{-}Wie Tann and
                  Ee{-}Chien Chang},
  title        = {Mitigating Adversarial Attacks by Distributing Different Copies to
                  Different Users},
  journal      = {CoRR},
  volume       = {abs/2111.15160},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.15160},
  eprinttype    = {arXiv},
  eprint       = {2111.15160},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-15160.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuGLWC21,
  author       = {Jia Xu and
                  Yiwen Gao and
                  Hoon Wei Lim and
                  Hongbing Wang and
                  Ee{-}Chien Chang},
  title        = {Stateful {KEM:} Towards Optimal Robust Combiner for Key Encapsulation
                  Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/989},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuGLWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/KouLCN20,
  author       = {Connie Kou and
                  Hwee Kuan Lee and
                  Ee{-}Chien Chang and
                  Teck Khim Ng},
  title        = {Enhancing Transformation-Based Defenses Against Adversarial Attacks
                  with a Distribution Classifier},
  booktitle    = {8th International Conference on Learning Representations, {ICLR} 2020,
                  Addis Ababa, Ethiopia, April 26-30, 2020},
  publisher    = {OpenReview.net},
  year         = {2020},
  url          = {https://openreview.net/forum?id=BkgWahEFvr},
  timestamp    = {Thu, 07 May 2020 17:11:47 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/KouLCN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/VykopalSC20,
  author       = {Jan Vykopal and
                  Valdemar Sv{\'{a}}bensk{\'{y}} and
                  Ee{-}Chien Chang},
  editor       = {Jian Zhang and
                  Mark Sherriff and
                  Sarah Heckman and
                  Pamela A. Cutter and
                  Alvaro E. Monge},
  title        = {Benefits and Pitfalls of Using Capture the Flag Games in University
                  Courses},
  booktitle    = {Proceedings of the 51st {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2020, Portland, OR, USA, March 11-14, 2020},
  pages        = {752--758},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3328778.3366893},
  doi          = {10.1145/3328778.3366893},
  timestamp    = {Tue, 23 Mar 2021 10:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/VykopalSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/RoomiBMFC20,
  author       = {Muhammad M. Roomi and
                  Partha P. Biswas and
                  Daisuke Mashima and
                  Yuting Fan and
                  Ee{-}Chien Chang},
  title        = {False Data Injection Cyber Range of Modernized Substation System},
  booktitle    = {2020 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2020, Tempe,
                  AZ, USA, November 11-13, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SmartGridComm47815.2020.9302951},
  doi          = {10.1109/SMARTGRIDCOMM47815.2020.9302951},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/RoomiBMFC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-02732,
  author       = {Jiyi Zhang and
                  Ee{-}Chien Chang and
                  Hwee Kuan Lee},
  title        = {Detection and Recovery of Adversarial Attacks with Injected Attractors},
  journal      = {CoRR},
  volume       = {abs/2003.02732},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.02732},
  eprinttype    = {arXiv},
  eprint       = {2003.02732},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-02732.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-11556,
  author       = {Jan Vykopal and
                  Valdemar Sv{\'{a}}bensk{\'{y}} and
                  Ee{-}Chien Chang},
  title        = {Benefits and Pitfalls of Using Capture the Flag Games in University
                  Courses},
  journal      = {CoRR},
  volume       = {abs/2004.11556},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.11556},
  eprinttype    = {arXiv},
  eprint       = {2004.11556},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-11556.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-03915,
  author       = {Ziqi Yang and
                  Bin Shao and
                  Bohan Xuan and
                  Ee{-}Chien Chang and
                  Fan Zhang},
  title        = {Defending Model Inversion and Membership Inference Attacks via Prediction
                  Purification},
  journal      = {CoRR},
  volume       = {abs/2005.03915},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.03915},
  eprinttype    = {arXiv},
  eprint       = {2005.03915},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-03915.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-03774,
  author       = {Wesley Joon{-}Wie Tann and
                  Ee{-}Chien Chang and
                  Bryan Hooi},
  title        = {{SHADOWCAST:} Controlling Network Properties to Explain Graph Generation},
  journal      = {CoRR},
  volume       = {abs/2006.03774},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.03774},
  eprinttype    = {arXiv},
  eprint       = {2006.03774},
  timestamp    = {Fri, 12 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-03774.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-06805,
  author       = {Wesley Joon{-}Wie Tann and
                  Jackie Tan Jin Wei and
                  Joanna Purba and
                  Ee{-}Chien Chang},
  title        = {Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online
                  Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2012.06805},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.06805},
  eprinttype    = {arXiv},
  eprint       = {2012.06805},
  timestamp    = {Sat, 02 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-06805.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NingXLZC19,
  author       = {Jianting Ning and
                  Jia Xu and
                  Kaitai Liang and
                  Fan Zhang and
                  Ee{-}Chien Chang},
  title        = {Passive Attacks Against Searchable Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {3},
  pages        = {789--802},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2866321},
  doi          = {10.1109/TIFS.2018.2866321},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NingXLZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangZCL19,
  author       = {Ziqi Yang and
                  Jiyi Zhang and
                  Ee{-}Chien Chang and
                  Zhenkai Liang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Neural Network Inversion in Adversarial Setting via Background Knowledge
                  Alignment},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {225--240},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354261},
  doi          = {10.1145/3319535.3354261},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangZCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NingPLCC19,
  author       = {Jianting Ning and
                  Geong Sen Poh and
                  Jia{-}Ch'ng Loh and
                  Jason Chia and
                  Ee{-}Chien Chang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable
                  Obfuscated Rules},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1657--1670},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354204},
  doi          = {10.1145/3319535.3354204},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NingPLCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DangTC19,
  author       = {Hung Dang and
                  Dat Le Tien and
                  Ee{-}Chien Chang},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Towards a Marketplace for Secure Outsourced Computations},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {790--808},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_38},
  doi          = {10.1007/978-3-030-29959-0\_38},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DangTC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/DangDLCLO19,
  author       = {Hung Dang and
                  Tien Tuan Anh Dinh and
                  Dumitrel Loghin and
                  Ee{-}Chien Chang and
                  Qian Lin and
                  Beng Chin Ooi},
  editor       = {Peter A. Boncz and
                  Stefan Manegold and
                  Anastasia Ailamaki and
                  Amol Deshpande and
                  Tim Kraska},
  title        = {Towards Scaling Blockchain Systems via Sharding},
  booktitle    = {Proceedings of the 2019 International Conference on Management of
                  Data, {SIGMOD} Conference 2019, Amsterdam, The Netherlands, June 30
                  - July 5, 2019},
  pages        = {123--140},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3299869.3319889},
  doi          = {10.1145/3299869.3319889},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmod/DangDLCLO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-08552,
  author       = {Ziqi Yang and
                  Ee{-}Chien Chang and
                  Zhenkai Liang},
  title        = {Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment},
  journal      = {CoRR},
  volume       = {abs/1902.08552},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.08552},
  eprinttype    = {arXiv},
  eprint       = {1902.08552},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-08552.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-06460,
  author       = {Hung Dang and
                  Ee{-}Chien Chang},
  title        = {Autonomous Membership Service for Enclave Applications},
  journal      = {CoRR},
  volume       = {abs/1905.06460},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.06460},
  eprinttype    = {arXiv},
  eprint       = {1905.06460},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-06460.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-00258,
  author       = {Connie Kou and
                  Hwee Kuan Lee and
                  Teck Khim Ng and
                  Ee{-}Chien Chang},
  title        = {Enhancing Transformation-based Defenses using a Distribution Classifier},
  journal      = {CoRR},
  volume       = {abs/1906.00258},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.00258},
  eprinttype    = {arXiv},
  eprint       = {1906.00258},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-00258.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-06046,
  author       = {Ziqi Yang and
                  Hung Dang and
                  Ee{-}Chien Chang},
  title        = {Effectiveness of Distillation Attack and Countermeasure on Neural
                  Network Watermarking},
  journal      = {CoRR},
  volume       = {abs/1906.06046},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.06046},
  eprinttype    = {arXiv},
  eprint       = {1906.06046},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-06046.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-09305,
  author       = {Hung Dang and
                  Ee{-}Chien Chang},
  title        = {Self-Expiring Data Capsule using Trusted Execution Environment},
  journal      = {CoRR},
  volume       = {abs/1911.09305},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.09305},
  eprinttype    = {arXiv},
  eprint       = {1911.09305},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-09305.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgrawalAC18,
  author       = {Anand Agrawal and
                  Chuadhry Mujeeb Ahmed and
                  Ee{-}Chien Chang},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Poster: Physics-Based Attack Detection for an Insider Threat Model
                  in a Cyber-Physical System},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {821--823},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201587},
  doi          = {10.1145/3196494.3201587},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AgrawalAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KannanSCC18,
  author       = {Pravein Govindan Kannan and
                  Ahmad Soltani and
                  Mun Choon Chan and
                  Ee{-}Chien Chang},
  editor       = {Christian S. Collberg and
                  Peter A. H. Peterson},
  title        = {{BNV:} Enabling Scalable Network Experimentation through Bare-metal
                  Network Virtualization},
  booktitle    = {11th {USENIX} Workshop on Cyber Security Experimentation and Test,
                  {CSET} 2018, Baltimore, MD, USA, August 13, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/cset18/presentation/kannan},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KannanSCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/SarkarATC18,
  author       = {Sajal Sarkar and
                  Anand Agrawal and
                  Yong Meng Teo and
                  Ee{-}Chien Chang},
  editor       = {Bj{\"{o}}rn Johansson and
                  Sanjay Jain},
  title        = {Votnet: Hybrid simulation of Virtual Operational Technology Network
                  for Cybersecurity Assessment},
  booktitle    = {2018 Winter Simulation Conference, {WSC} 2018, Gothenburg, Sweden,
                  December 9-12, 2018},
  pages        = {1168--1179},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WSC.2018.8632410},
  doi          = {10.1109/WSC.2018.8632410},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wsc/SarkarATC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-04504,
  author       = {Jiyi Zhang and
                  Hung Dang and
                  Hwee Kuan Lee and
                  Ee{-}Chien Chang},
  title        = {Learning Inverse Mappings with Adversarial Criterion},
  journal      = {CoRR},
  volume       = {abs/1802.04504},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.04504},
  eprinttype    = {arXiv},
  eprint       = {1802.04504},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-04504.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-00399,
  author       = {Hung Dang and
                  Anh Dinh and
                  Ee{-}Chien Chang and
                  Beng Chin Ooi},
  title        = {Chain of Trust: Can Trusted Hardware Help Scaling Blockchains?},
  journal      = {CoRR},
  volume       = {abs/1804.00399},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.00399},
  eprinttype    = {arXiv},
  eprint       = {1804.00399},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-00399.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-09682,
  author       = {Hung Dang and
                  Dat Le Tien and
                  Ee{-}Chien Chang},
  title        = {Fair Marketplace for Secure Outsourced Computations},
  journal      = {CoRR},
  volume       = {abs/1808.09682},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.09682},
  eprinttype    = {arXiv},
  eprint       = {1808.09682},
  timestamp    = {Mon, 03 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-09682.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NingDHC18,
  author       = {Jianting Ning and
                  Hung Dang and
                  Ruomu Hou and
                  Ee{-}Chien Chang},
  title        = {Keeping Time-Release Secrets through Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1166},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NingDHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DangDCO17,
  author       = {Hung Dang and
                  Tien Tuan Anh Dinh and
                  Ee{-}Chien Chang and
                  Beng Chin Ooi},
  title        = {Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {3},
  pages        = {21},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0026},
  doi          = {10.1515/POPETS-2017-0026},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DangDCO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/DangC17,
  author       = {Hung Dang and
                  Ee{-}Chien Chang},
  editor       = {Geoffrey C. Fox},
  title        = {Privacy-Preserving Data Deduplication on Trusted Processors},
  booktitle    = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD),
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {66--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CLOUD.2017.18},
  doi          = {10.1109/CLOUD.2017.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/DangC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DangHC17,
  author       = {Hung Dang and
                  Yue Huang and
                  Ee{-}Chien Chang},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Evading Classifiers by Morphing in the Dark},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {119--133},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133978},
  doi          = {10.1145/3133956.3133978},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DangHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DangPC17,
  author       = {Hung Dang and
                  Erick Purwanto and
                  Ee{-}Chien Chang},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Proofs of Data Residency: Checking whether Your Cloud Files Have Been
                  Relocated},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {408--422},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053016},
  doi          = {10.1145/3052973.3053016},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DangPC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XuC017,
  author       = {Jia Xu and
                  Ee{-}Chien Chang and
                  Jianying Zhou},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {A New Functional Encryption for Multidimensional Range Query (Short
                  Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {361--372},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_21},
  doi          = {10.1007/978-3-319-72359-4\_21},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XuC017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/KannanCMC17,
  author       = {Pravein Govindan Kannan and
                  Mun Choon Chan and
                  Richard T. B. Ma and
                  Ee{-}Chien Chang},
  title        = {Raptor: Scalable rule placement over multiple path in software defined
                  networks},
  booktitle    = {2017 {IFIP} Networking Conference, {IFIP} Networking 2017 and Workshops,
                  Stockholm, Sweden, June 12-16, 2017},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.23919/IFIPNetworking.2017.8264843},
  doi          = {10.23919/IFIPNETWORKING.2017.8264843},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/KannanCMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/RamapantuluTC17,
  author       = {Lavanya Ramapantulu and
                  Yong Meng Teo and
                  Ee{-}Chien Chang},
  title        = {A conceptural framework to federate testbeds for cybersecurity},
  booktitle    = {2017 Winter Simulation Conference, {WSC} 2017, Las Vegas, NV, USA,
                  December 3-6, 2017},
  pages        = {457--468},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WSC.2017.8247807},
  doi          = {10.1109/WSC.2017.8247807},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wsc/RamapantuluTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/BalutaRTC17,
  author       = {Teodora Baluta and
                  Lavanya Ramapantulu and
                  Yong Meng Teo and
                  Ee{-}Chien Chang},
  title        = {Modeling the effects of insider threats on cybersecurity of complex
                  systems},
  booktitle    = {2017 Winter Simulation Conference, {WSC} 2017, Las Vegas, NV, USA,
                  December 3-6, 2017},
  pages        = {4360--4371},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WSC.2017.8248141},
  doi          = {10.1109/WSC.2017.8248141},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wsc/BalutaRTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DangYC17,
  author       = {Hung Dang and
                  Yue Huang and
                  Ee{-}Chien Chang},
  title        = {Evading Classifier in the Dark: Guiding Unpredictable Morphing Using
                  Binary-Output Blackboxes},
  journal      = {CoRR},
  volume       = {abs/1705.07535},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.07535},
  eprinttype    = {arXiv},
  eprint       = {1705.07535},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DangYC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TopleDSC17,
  author       = {Shruti Tople and
                  Hung Dang and
                  Prateek Saxena and
                  Ee{-}Chien Chang},
  title        = {PermuteRam: Optimizing Oblivious Computation for Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {885},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/885},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TopleDSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuC017,
  author       = {Jia Xu and
                  Ee{-}Chien Chang and
                  Jianying Zhou},
  title        = {A New Functional Encryption for Multidimensional Range Query},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {970},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/970},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuC017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/AppavooCAC16,
  author       = {Paramasiven Appavoo and
                  Mun Choon Chan and
                  Bhojan Anand and
                  Ee{-}Chien Chang},
  title        = {Efficient and privacy-preserving access to sensor data for Internet
                  of Things (IoT) based services},
  booktitle    = {8th International Conference on Communication Systems and Networks,
                  {COMSNETS} 2016, Bangalore, India, January 5-10, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMSNETS.2016.7439941},
  doi          = {10.1109/COMSNETS.2016.7439941},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/AppavooCAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DangCBC16,
  author       = {Hung Dang and
                  Yun Long Chong and
                  Francois Brun and
                  Ee{-}Chien Chang},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Practical and Scalable Sharing of Encrypted Data in Cloud Storage
                  with Key Aggregation},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {69--80},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930795},
  doi          = {10.1145/2909827.2930795},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DangCBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KuribayashiCF16,
  author       = {Minoru Kuribayashi and
                  Ee{-}Chien Chang and
                  Nobuo Funabiki},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Watermarking with Fixed Decoder for Aesthetic 2D Barcode},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {379--392},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_28},
  doi          = {10.1007/978-3-319-53465-7\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KuribayashiCF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/XuCZ16,
  author       = {Jia Xu and
                  Ee{-}Chien Chang and
                  Jianying Zhou},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Directed Transitive Signature on Directed Tree},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {91--98},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-91},
  doi          = {10.3233/978-1-61499-617-0-91},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/XuCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/DangC15,
  author       = {Hung Dang and
                  Ee{-}Chien Chang},
  editor       = {Grant McKenzie and
                  Krzysztof Janowicz and
                  Gueorgi Kossinets},
  title        = {PrAd: Enabling Privacy-Aware Location based Advertising},
  booktitle    = {Proceedings of the 2nd Workshop on Privacy in Geographic Information
                  Collection and Analysis, GeoPrivacy@SIGSPATIAL 2015, Bellevue, WA,
                  USA, November 3-6, 2015},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2830834.2830839},
  doi          = {10.1145/2830834.2830839},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gis/DangC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DinhSCOZ15,
  author       = {Tien Tuan Anh Dinh and
                  Prateek Saxena and
                  Ee{-}Chien Chang and
                  Beng Chin Ooi and
                  Chunwang Zhang},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{M2R:} Enabling Stronger Privacy in MapReduce Computation},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {447--462},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dinh},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DinhSCOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/FangC14,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Optimal strategy of coupon subset collection when each package contains
                  half of the coupons},
  journal      = {Inf. Process. Lett.},
  volume       = {114},
  number       = {12},
  pages        = {703--705},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ipl.2014.06.012},
  doi          = {10.1016/J.IPL.2014.06.012},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/FangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/ZhangC14,
  author       = {Chunwang Zhang and
                  Ee{-}Chien Chang},
  title        = {Processing of Mixed-Sensitivity Video Surveillance Streams on Hybrid
                  Clouds},
  booktitle    = {2014 {IEEE} 7th International Conference on Cloud Computing, Anchorage,
                  AK, USA, June 27 - July 2, 2014},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CLOUD.2014.12},
  doi          = {10.1109/CLOUD.2014.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/ZhangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/ZhangCY14,
  author       = {Chunwang Zhang and
                  Ee{-}Chien Chang and
                  Roland H. C. Yap},
  title        = {Tagged-MapReduce: {A} General Framework for Secure Computing with
                  Mixed-Sensitivity Data on Hybrid Clouds},
  booktitle    = {14th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid
                  Computing, CCGrid 2014, Chicago, IL, USA, May 26-29, 2014},
  pages        = {31--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CCGrid.2014.96},
  doi          = {10.1109/CCGRID.2014.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/ZhangCY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FangC14,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Differential privacy with {\(\delta\)}-neighbourhood for spatial and
                  dynamic datasets},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {159--170},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590320},
  doi          = {10.1145/2590296.2590320},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmm/FangZC14,
  author       = {Chengfang Fang and
                  Chunwang Zhang and
                  Ee{-}Chien Chang},
  editor       = {Cathal Gurrin and
                  Frank Hopfgartner and
                  Wolfgang H{\"{u}}rst and
                  H{\aa}vard D. Johansen and
                  Hyowon Lee and
                  Noel E. O'Connor},
  title        = {An Optimization Model for Aesthetic Two-Dimensional Barcodes},
  booktitle    = {MultiMedia Modeling - 20th Anniversary International Conference, {MMM}
                  2014, Dublin, Ireland, January 6-10, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8325},
  pages        = {278--290},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04114-8\_24},
  doi          = {10.1007/978-3-319-04114-8\_24},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmm/FangZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimTSC14,
  author       = {Hoon Wei Lim and
                  Shruti Tople and
                  Prateek Saxena and
                  Ee{-}Chien Chang},
  title        = {Faster Secure Arithmetic Computation Using Switchable Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimTSC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuCZ13,
  author       = {Jia Xu and
                  Ee{-}Chien Chang and
                  Jianying Zhou},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Weak leakage-resilient client-side deduplication of encrypted data
                  in cloud storage},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484340},
  doi          = {10.1145/2484313.2484340},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XuCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud/ZhangCY13,
  author       = {Chunwang Zhang and
                  Ee{-}Chien Chang and
                  Roland H. C. Yap},
  editor       = {Guy M. Lohman},
  title        = {Towards a general framework for secure MapReduce computation on hybrid
                  clouds},
  booktitle    = {{ACM} Symposium on Cloud Computing, {SOCC} '13, Santa Clara, CA, USA,
                  October 1-3, 2013},
  pages        = {36:1--36:2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523616.2525944},
  doi          = {10.1145/2523616.2525944},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloud/ZhangCY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/DialloHCMV12,
  author       = {Mamadou H. Diallo and
                  Bijit Hore and
                  Ee{-}Chien Chang and
                  Sharad Mehrotra and
                  Nalini Venkatasubramanian},
  editor       = {Rong Chang},
  title        = {CloudProtect: Managing Data Privacy in Cloud Applications},
  booktitle    = {2012 {IEEE} Fifth International Conference on Cloud Computing, Honolulu,
                  HI, USA, June 24-29, 2012},
  pages        = {303--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CLOUD.2012.122},
  doi          = {10.1109/CLOUD.2012.122},
  timestamp    = {Wed, 09 Aug 2023 12:14:21 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/DialloHCMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuC12,
  author       = {Jia Xu and
                  Ee{-}Chien Chang},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Towards efficient proofs of retrievability},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {79--80},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414503},
  doi          = {10.1145/2414456.2414503},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XuC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/AnandCCCAO12,
  author       = {Bhojan Anand and
                  Lee Kee Chong and
                  Ee{-}Chien Chang and
                  Mun Choon Chan and
                  Akkihebbal L. Ananda and
                  Wei Tsang Ooi},
  editor       = {Noboru Babaguchi and
                  Kiyoharu Aizawa and
                  John R. Smith and
                  Shin'ichi Satoh and
                  Thomas Plagemann and
                  Xian{-}Sheng Hua and
                  Rong Yan},
  title        = {El-pincel: a painter cloud service for greener web pages},
  booktitle    = {Proceedings of the 20th {ACM} Multimedia Conference, {MM} '12, Nara,
                  Japan, October 29 - November 02, 2012},
  pages        = {399--408},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2393347.2393405},
  doi          = {10.1145/2393347.2393405},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/AnandCCCAO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/FangC12,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {Adaptive Differentially Private Histogram of Low-Dimensional Data},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {160--179},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_9},
  doi          = {10.1007/978-3-642-31680-7\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/FangC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/HoreCDM12,
  author       = {Bijit Hore and
                  Ee{-}Chien Chang and
                  Mamadou H. Diallo and
                  Sharad Mehrotra},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Indexing Encrypted Documents for Supporting Efficient Keyword Search},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_7},
  doi          = {10.1007/978-3-642-32873-2\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/HoreCDM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ZhangJCM12,
  author       = {Chunwang Zhang and
                  Junjie Jin and
                  Ee{-}Chien Chang and
                  Sharad Mehrotra},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage
                  Services},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {111--129},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_8},
  doi          = {10.1007/978-3-642-32873-2\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ZhangJCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuLXFXC11,
  author       = {Jie Yu and
                  Zhoujun Li and
                  Peng Xiao and
                  Chengfang Fang and
                  Jia Xu and
                  Ee{-}Chien Chang},
  title        = {{ID} Repetition in Structured {P2P} Networks},
  journal      = {Comput. J.},
  volume       = {54},
  number       = {6},
  pages        = {962--975},
  year         = {2011},
  url          = {https://doi.org/10.1093/comjnl/bxr017},
  doi          = {10.1093/COMJNL/BXR017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YuLXFXC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChangLWYY11,
  author       = {Ee{-}Chien Chang and
                  Liming Lu and
                  Yongzheng Wu and
                  Roland H. C. Yap and
                  Jie Yu},
  title        = {Enhancing host security using external environment sensors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {5},
  pages        = {285--299},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0130-9},
  doi          = {10.1007/S10207-011-0130-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChangLWYY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/FangLC11,
  author       = {Chengfang Fang and
                  Qiming Li and
                  Ee{-}Chien Chang},
  title        = {Identity leakage mitigation on asymmetric secure sketch},
  booktitle    = {2011 {IEEE} International Joint Conference on Biometrics, {IJCB} 2011,
                  Washington, DC, USA, October 11-13, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IJCB.2011.6117542},
  doi          = {10.1109/IJCB.2011.6117542},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icb/FangLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/LiSCT11,
  author       = {Qiming Li and
                  Bilgehan Sahin and
                  Ee{-}Chien Chang and
                  Vrizlynn L. L. Thing},
  title        = {Content based {JPEG} fragmentation point detection},
  booktitle    = {Proceedings of the 2011 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2011, 11-15 July, 2011, Barcelona, Catalonia, Spain},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICME.2011.6011883},
  doi          = {10.1109/ICME.2011.6011883},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/LiSCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-6677,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Publishing Location Dataset Differential Privately with Isotonic Regression},
  journal      = {CoRR},
  volume       = {abs/1111.6677},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.6677},
  eprinttype    = {arXiv},
  eprint       = {1111.6677},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-6677.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuC11,
  author       = {Jia Xu and
                  Ee{-}Chien Chang},
  title        = {Practically Efficient Proof of Retrievability in Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuC11a,
  author       = {Jia Xu and
                  Ee{-}Chien Chang},
  title        = {Towards Efficient Provable Data Possession},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuC11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThingNC10,
  author       = {Vrizlynn L. L. Thing and
                  Kian{-}Yong Ng and
                  Ee{-}Chien Chang},
  title        = {Live memory forensics of mobile phones},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S74--S82},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.010},
  doi          = {10.1016/J.DIIN.2010.05.010},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThingNC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FangLC10,
  author       = {Chengfang Fang and
                  Qiming Li and
                  Ee{-}Chien Chang},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Secure Sketch for Multiple Secrets},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {367--383},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_22},
  doi          = {10.1007/978-3-642-13708-2\_22},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FangLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FangC10,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Securing interactive sessions using mobile device through visual channel
                  and visual inspection},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {69--78},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920272},
  doi          = {10.1145/1920261.1920272},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/ChooCC10,
  author       = {Fai Cheong Choo and
                  Mun Choon Chan and
                  Ee{-}Chien Chang},
  editor       = {P. R. Kumar and
                  Henning Schulzrinne and
                  Harrick M. Vin},
  title        = {Robustness of {DTN} against routing attacks},
  booktitle    = {Second International Conference on Communication Systems and Networks,
                  {COMSNETS} 2010, Bangalore, India, January 5-9, 2010},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/COMSNETS.2010.5432014},
  doi          = {10.1109/COMSNETS.2010.5432014},
  timestamp    = {Thu, 08 Apr 2021 08:40:48 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/ChooCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ChangFX10,
  author       = {Ee{-}Chien Chang and
                  Chengfang Fang and
                  Jia Xu},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {A chameleon encryption scheme resistant to known-plaintext attack},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866876},
  doi          = {10.1145/1866870.1866876},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/ChangFX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LuCC10,
  author       = {Liming Lu and
                  Ee{-}Chien Chang and
                  Mun Choon Chan},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Website Fingerprinting and Identification Using Ordered Feature Sequences},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {199--214},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_13},
  doi          = {10.1007/978-3-642-15497-3\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LuCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChangLWYY10,
  author       = {Ee{-}Chien Chang and
                  Liming Lu and
                  Yongzheng Wu and
                  Roland H. C. Yap and
                  Jie Yu},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Enhancing Host Security Using External Environment Sensors},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {362--379},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_21},
  doi          = {10.1007/978-3-642-16161-2\_21},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChangLWYY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-0723,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Securing Kiosk using Mobile Devices coupled with Visual Inspection},
  journal      = {CoRR},
  volume       = {abs/1003.0723},
  year         = {2010},
  url          = {http://arxiv.org/abs/1003.0723},
  eprinttype    = {arXiv},
  eprint       = {1003.0723},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1003-0723.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuC10,
  author       = {Jia Xu and
                  Ee{-}Chien Chang},
  title        = {Authenticating Aggregate Range Queries over Multidimensional Dataset},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YuCOCC09,
  author       = {Hang Yu and
                  Ee{-}Chien Chang and
                  Wei Tsang Ooi and
                  Mun Choon Chan and
                  Wei Cheng},
  title        = {Integrated Optimization of Video Server Resource and Streaming Quality
                  Over Best-Effort Network},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {19},
  number       = {3},
  pages        = {374--385},
  year         = {2009},
  url          = {https://doi.org/10.1109/TCSVT.2009.2013501},
  doi          = {10.1109/TCSVT.2009.2013501},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YuCOCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChangLX09,
  author       = {Ee{-}Chien Chang and
                  Chee Liang Lim and
                  Jia Xu},
  editor       = {Marc Fischlin},
  title        = {Short Redactable Signatures Using Random Trees},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_9},
  doi          = {10.1007/978-3-642-00862-7\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChangLX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/YuFXCL09,
  author       = {Jie Yu and
                  Chengfang Fang and
                  Jia Xu and
                  Ee{-}Chien Chang and
                  Zhoujun Li},
  editor       = {Henning Schulzrinne and
                  Karl Aberer and
                  Anwitaman Datta},
  title        = {{ID} Repetition in Kad},
  booktitle    = {Proceedings {P2P} 2009, Ninth International Conference on Peer-to-Peer
                  Computing, 9-11 September 2009, Seattle, Washington, {USA}},
  pages        = {111--120},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/P2P.2009.5284551},
  doi          = {10.1109/P2P.2009.5284551},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/YuFXCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangLX09,
  author       = {Ee{-}Chien Chang and
                  Chee Liang Lim and
                  Jia Xu},
  title        = {Short Redactable Signatures Using Random Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangLX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuCC08,
  author       = {Liming Lu and
                  Mun Choon Chan and
                  Ee{-}Chien Chang},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {A general model of probabilistic packet marking for {IP} traceback},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {179--188},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368337},
  doi          = {10.1145/1368310.1368337},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LuCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/LiGC08,
  author       = {Qiming Li and
                  Muchuan Guo and
                  Ee{-}Chien Chang},
  title        = {Fuzzy extractors for asymmetric biometric representations},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  Workshops 2008, Anchorage, AK, USA, 23-28 June, 2008},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CVPRW.2008.4563113},
  doi          = {10.1109/CVPRW.2008.4563113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/LiGC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChangX08,
  author       = {Ee{-}Chien Chang and
                  Jia Xu},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Remote Integrity Check with Dishonest Storage Server},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_15},
  doi          = {10.1007/978-3-540-88313-5\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChangX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FangC08,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Information Leakage in Optimal Anonymized and Diversified Data},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_3},
  doi          = {10.1007/978-3-540-88961-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/FangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HoC08,
  author       = {Nicholas Zhong{-}Yang Ho and
                  Ee{-}Chien Chang},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Residual Information of Redacted Images Hidden in the Compression
                  Artifacts},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_7},
  doi          = {10.1007/978-3-540-88961-8\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HoC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangX08,
  author       = {Ee{-}Chien Chang and
                  Jia Xu},
  title        = {Remote Integrity Check with Dishonest Storage Server},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FangC08,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Information Leakage in Optimal Anonymized and Diversified Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/YeSC07,
  author       = {Shuiming Ye and
                  Qibin Sun and
                  Ee{-}Chien Chang},
  title        = {Statistics- and Spatiality-Based Feature Distance Measure for Error
                  Resilient Image Authentication},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {2},
  pages        = {48--67},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73092-7\_3},
  doi          = {10.1007/978-3-540-73092-7\_3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/YeSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DuttaCM07,
  author       = {Ratna Dutta and
                  Ee{-}Chien Chang and
                  Sourav Mukhopadhyay},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Efficient Self-healing Key Distribution with Revocation for Wireless
                  Sensor Networks Using One Way Key Chains},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {385--400},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_25},
  doi          = {10.1007/978-3-540-72738-5\_25},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DuttaCM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/ChangR07,
  author       = {Ee{-}Chien Chang and
                  Sujoy Roy},
  editor       = {Seong{-}Whan Lee and
                  Stan Z. Li},
  title        = {Robust Extraction of Secret Bits from Minutiae},
  booktitle    = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul,
                  Korea, August 27-29, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4642},
  pages        = {750--759},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74549-5\_79},
  doi          = {10.1007/978-3-540-74549-5\_79},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/ChangR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/YeSC07,
  author       = {Shuiming Ye and
                  Qibin Sun and
                  Ee{-}Chien Chang},
  title        = {Detecting Digital Image Forgeries by Measuring Inconsistencies of
                  Blocking Artifact},
  booktitle    = {Proceedings of the 2007 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China},
  pages        = {12--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICME.2007.4284574},
  doi          = {10.1109/ICME.2007.4284574},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/YeSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcga/ChangCKPY06,
  author       = {Ee{-}Chien Chang and
                  Sung Woo Choi and
                  DoYong Kwon and
                  Hyungju Park and
                  Chee{-}Keng Yap},
  title        = {Shortest Path amidst Disc Obstacles Is Computable},
  journal      = {Int. J. Comput. Geom. Appl.},
  volume       = {16},
  number       = {5-6},
  pages        = {567--590},
  year         = {2006},
  url          = {https://doi.org/10.1142/S0218195906002191},
  doi          = {10.1142/S0218195906002191},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcga/ChangCKPY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChanCLN06,
  author       = {Mun Choon Chan and
                  Ee{-}Chien Chang and
                  Liming Lu and
                  Peng Song Ngiam},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Effect of Malicious Synchronization},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {114--129},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_8},
  doi          = {10.1007/11767480\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChanCLN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChangST06,
  author       = {Ee{-}Chien Chang and
                  Ren Shen and
                  Francis Weijian Teo},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Finding the original point set hidden among chaff},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {182--188},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128845},
  doi          = {10.1145/1128817.1128845},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChangST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChangL06,
  author       = {Ee{-}Chien Chang and
                  Qiming Li},
  editor       = {Serge Vaudenay},
  title        = {Hiding Secret Points Amidst Chaff},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {59--72},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_5},
  doi          = {10.1007/11761679\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChangL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grapp/ChenHYC06,
  author       = {Chen Chen and
                  Zhiyong Huang and
                  Hang Yu and
                  Ee{-}Chien Chang},
  editor       = {Jos{\'{e}} Braz and
                  Joaquim A. Jorge and
                  Miguel Sales Dias and
                  Ad{\'{e}}rito Marcos},
  title        = {Progressive transmission and rendering of foveated volume data},
  booktitle    = {{GRAPP} 2006: Proceedings of the First International Conference on
                  Computer Graphics Theory and Applications, Set{\'{u}}bal, Portugal,
                  February 25-28, 2006},
  pages        = {67--75},
  publisher    = {{INSTICC} - Institute for Systems and Technologies of Information,
                  Control and Communication},
  year         = {2006},
  timestamp    = {Thu, 23 Oct 2014 11:41:16 +0200},
  biburl       = {https://dblp.org/rec/conf/grapp/ChenHYC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YeSC06,
  author       = {Shuiming Ye and
                  Qibin Sun and
                  Ee{-}Chien Chang},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Error Resilient Image Authentication Using Feature Statistical and
                  Spatial Properties},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {461--472},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_37},
  doi          = {10.1007/11922841\_37},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YeSC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiC06,
  author       = {Qiming Li and
                  Ee{-}Chien Chang},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Robust, short and sensitive authentication tags using secure sketch},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {56--61},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161377},
  doi          = {10.1145/1161366.1161377},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiC06a,
  author       = {Qiming Li and
                  Ee{-}Chien Chang},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Zero-knowledge watermark detection resistant to ambiguity attacks},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {158--163},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161395},
  doi          = {10.1145/1161366.1161395},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiC06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangFL06,
  author       = {Ee{-}Chien Chang and
                  Vadym Fedyukovych and
                  Qiming Li},
  title        = {Secure Sketch for Multi-Sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangFL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vc/YuCHZ05,
  author       = {Hang Yu and
                  Ee{-}Chien Chang and
                  Zhiyong Huang and
                  Zhijian Zheng},
  title        = {Fast rendering of foveated volumes in wavelet-based representation},
  journal      = {Vis. Comput.},
  volume       = {21},
  number       = {8-10},
  pages        = {735--744},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00371-005-0331-1},
  doi          = {10.1007/S00371-005-0331-1},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vc/YuCHZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compgeom/ChangCKPY05,
  author       = {Ee{-}Chien Chang and
                  Sung Woo Choi and
                  DoYong Kwon and
                  Hyungju Park and
                  Chee{-}Keng Yap},
  editor       = {Joseph S. B. Mitchell and
                  G{\"{u}}nter Rote},
  title        = {Shortest path amidst disc obstacles is computable},
  booktitle    = {Proceedings of the 21st {ACM} Symposium on Computational Geometry,
                  Pisa, Italy, June 6-8, 2005},
  pages        = {116--125},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1064092.1064112},
  doi          = {10.1145/1064092.1064112},
  timestamp    = {Mon, 14 Jun 2021 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/compgeom/ChangCKPY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/YeCS05,
  author       = {Shuiming Ye and
                  Ee{-}Chien Chang and
                  Qibin Sun},
  title        = {Watermarking based Image Authentication using Feature Amplification},
  booktitle    = {Proceedings of the 2005 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2005, July 6-9, 2005, Amsterdam, The Netherlands},
  pages        = {610--613},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICME.2005.1521497},
  doi          = {10.1109/ICME.2005.1521497},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/YeCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LeeCC05,
  author       = {Hui Huang Lee and
                  Ee{-}Chien Chang and
                  Mun Choon Chan},
  editor       = {Mauro Barni and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Stefan Katzenbeisser and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Pervasive Random Beacon in the Internet for Covert Coordination},
  booktitle    = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona,
                  Spain, June 6-8, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3727},
  pages        = {53--61},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11558859\_5},
  doi          = {10.1007/11558859\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LeeCC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiCC05,
  author       = {Qiming Li and
                  Ee{-}Chien Chang and
                  Mun Choon Chan},
  title        = {On the effectiveness of DDoS attacks on statistical filtering},
  booktitle    = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer
                  and Communications Societies, 13-17 March 2005, Miami, FL, {USA}},
  pages        = {1373--1383},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/INFCOM.2005.1498362},
  doi          = {10.1109/INFCOM.2005.1498362},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiCC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/YeSC05,
  author       = {Shuiming Ye and
                  Qibin Sun and
                  Ee{-}Chien Chang},
  title        = {Error resilient content-based image authentication over wireless channel},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26
                  May 2005, Kobe, Japan},
  pages        = {2707--2710},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISCAS.2005.1465185},
  doi          = {10.1109/ISCAS.2005.1465185},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/YeSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/RoyCN05,
  author       = {Sujoy Roy and
                  Ee{-}Chien Chang and
                  K. Natarajan},
  editor       = {HongJiang Zhang and
                  Tat{-}Seng Chua and
                  Ralf Steinmetz and
                  Mohan S. Kankanhalli and
                  Lynn Wilcox},
  title        = {A unified framework for resolving ambiguity in copy detection},
  booktitle    = {Proceedings of the 13th {ACM} International Conference on Multimedia,
                  Singapore, November 6-11, 2005},
  pages        = {648--655},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1101149.1101294},
  doi          = {10.1145/1101149.1101294},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/RoyCN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsp/ZhouHSC05,
  author       = {Zhicheng Zhou and
                  Dajun He and
                  Qibin Sun and
                  Ee{-}Chien Chang},
  title        = {A New Watermarking Scheme Robust to Print-and-Scan},
  booktitle    = {{IEEE} 7th Workshop on Multimedia Signal Processing, {MMSP} 2005,
                  October 30 2005 - November 2 2005, Shanghai, China},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/MMSP.2005.248642},
  doi          = {10.1109/MMSP.2005.248642},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsp/ZhouHSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangL05,
  author       = {Ee{-}Chien Chang and
                  Qiming Li},
  title        = {Small Secure Sketch for Point-Set Difference},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/RoyC04,
  author       = {Sujoy Roy and
                  Ee{-}Chien Chang},
  title        = {Watermarking with retrieval systems},
  journal      = {Multim. Syst.},
  volume       = {9},
  number       = {5},
  pages        = {433--440},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00530-003-0116-1},
  doi          = {10.1007/S00530-003-0116-1},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mms/RoyC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/YeSC04,
  author       = {Shuiming Ye and
                  Qibin Sun and
                  Ee{-}Chien Chang},
  title        = {Edge directed filter based error concealment for wavelet-based images},
  booktitle    = {Proceedings of the 2004 International Conference on Image Processing,
                  {ICIP} 2004, Singapore, October 24-27, 2004},
  pages        = {809--812},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICIP.2004.1419421},
  doi          = {10.1109/ICIP.2004.1419421},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/YeSC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/RoyC04,
  author       = {Sujoy Roy and
                  Ee{-}Chien Chang},
  title        = {Watermarking color histograms},
  booktitle    = {Proceedings of the 2004 International Conference on Image Processing,
                  {ICIP} 2004, Singapore, October 24-27, 2004},
  pages        = {2191--2194},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICIP.2004.1421531},
  doi          = {10.1109/ICIP.2004.1421531},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/RoyC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/YuNC04,
  author       = {Hang Yu and
                  Vu{-}Thanh Nguyen and
                  Ee{-}Chien Chang},
  title        = {Rotation of foveated image in the wavelet domain},
  booktitle    = {Proceedings of the 2004 International Conference on Image Processing,
                  {ICIP} 2004, Singapore, October 24-27, 2004},
  pages        = {2515--2518},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICIP.2004.1421614},
  doi          = {10.1109/ICIP.2004.1421614},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/YuNC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/NguyenCO04,
  author       = {Vu{-}Thanh Nguyen and
                  Ee{-}Chien Chang and
                  Wei Tsang Ooi},
  title        = {Layered coding with good allocation outperforms multiple description
                  coding over multiple paths},
  booktitle    = {Proceedings of the 2004 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2004, 27-30 June 2004, Taipei, Taiwan},
  pages        = {1067--1070},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/NguyenCO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/YeSC04,
  author       = {Shuiming Ye and
                  Qibin Sun and
                  Ee{-}Chien Chang},
  title        = {Error concealment for {JPEG2000} images based on orthogonal edge directed
                  filters},
  booktitle    = {Proceedings of the 2004 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2004, 27-30 June 2004, Taipei, Taiwan},
  pages        = {1663--1666},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  timestamp    = {Mon, 23 May 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/YeSC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiC04,
  author       = {Qiming Li and
                  Ee{-}Chien Chang},
  editor       = {Jessica J. Fridrich},
  title        = {On the Possibility of Non-invertible Watermarking Schemes},
  booktitle    = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto,
                  Canada, May 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3200},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30114-1\_2},
  doi          = {10.1007/978-3-540-30114-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/YangTC04,
  author       = {Xianfeng Yang and
                  Qi Tian and
                  Ee{-}Chien Chang},
  editor       = {Henning Schulzrinne and
                  Nevenka Dimitrova and
                  Martina Angela Sasse and
                  Sue B. Moon and
                  Rainer Lienhart},
  title        = {A color fingerprint of video shot for content identification},
  booktitle    = {Proceedings of the 12th {ACM} International Conference on Multimedia,
                  New York, NY, USA, October 10-16, 2004},
  pages        = {276--279},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1027527.1027590},
  doi          = {10.1145/1027527.1027590},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/YangTC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmm/AtreyYCK04,
  author       = {Pradeep K. Atrey and
                  Wei{-}Qi Yan and
                  Ee{-}Chien Chang and
                  Mohan S. Kankanhalli},
  editor       = {Yi{-}Ping Phoebe Chen},
  title        = {A Hierarchical Signature Scheme for Robust Video Authentication using
                  Secret Sharing},
  booktitle    = {10th International Multimedia Modeling Conference {(MMM} 2004), 5-7
                  January 2004, Brisbane, Australia},
  pages        = {330--337},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/MULMM.2004.1265004},
  doi          = {10.1109/MULMM.2004.1265004},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmm/AtreyYCK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/visualization/YuCHZ04,
  author       = {Hang Yu and
                  Ee{-}Chien Chang and
                  Zhiyong Huang and
                  Zhijian Zheng},
  title        = {Fast Rendering of Foveated Volume in the Wavelet Domain},
  booktitle    = {15th {IEEE} Visualization Conference, {IEEE} Vis 2004, Austin, TX,
                  USA, October 10-15, 2004, Proceedings},
  pages        = {26},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/VISUAL.2004.31},
  doi          = {10.1109/VISUAL.2004.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/visualization/YuCHZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/ChangKGHW03,
  author       = {Ee{-}Chien Chang and
                  Mohan S. Kankanhalli and
                  Xin Guan and
                  Zhiyong Huang and
                  Yinghui Wu},
  title        = {Robust image authentication using content based compression},
  journal      = {Multim. Syst.},
  volume       = {9},
  number       = {2},
  pages        = {121--130},
  year         = {2003},
  url          = {https://doi.org/10.1007/s00530-003-0083-6},
  doi          = {10.1007/S00530-003-0083-6},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mms/ChangKGHW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scheduling/ChangY03,
  author       = {Ee{-}Chien Chang and
                  Chee{-}Keng Yap},
  title        = {Competitive On-Line Scheduling with Level of Service},
  journal      = {J. Sched.},
  volume       = {6},
  number       = {3},
  pages        = {251--267},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1022904408360},
  doi          = {10.1023/A:1022904408360},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scheduling/ChangY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/graphite/WuCHK03,
  author       = {Yinghui Wu and
                  Ee{-}Chien Chang and
                  Zhiyong Huang and
                  Mohan S. Kankanhalli},
  editor       = {Matt Adcock and
                  Ian Gwilt and
                  Yong Tsui Lee},
  title        = {Feature extraction of volume data based on multi-scale representation},
  booktitle    = {Proceedings of the 1st International Conference on Computer Graphics
                  and Interactive Techniques in Australasia and Southeast Asia 2003,
                  Melbourne, Australia, February 11-14, 2003},
  pages        = {175--180},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/604471.604506},
  doi          = {10.1145/604471.604506},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/graphite/WuCHK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/graphite/ChangHKX03,
  author       = {Ee{-}Chien Chang and
                  Zhiyong Huang and
                  Mohan S. Kankanhalli and
                  Rong Xu},
  editor       = {Matt Adcock and
                  Ian Gwilt and
                  Yong Tsui Lee},
  title        = {A 3D shape matching framework},
  booktitle    = {Proceedings of the 1st International Conference on Computer Graphics
                  and Interactive Techniques in Australasia and Southeast Asia 2003,
                  Melbourne, Australia, February 11-14, 2003},
  pages        = {269--270},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/604471.604530},
  doi          = {10.1145/604471.604530},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/graphite/ChangHKX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/RoyC03,
  author       = {Sujoy Roy and
                  Ee{-}Chien Chang},
  title        = {Watermarking with knowledge of image database},
  booktitle    = {Proceedings of the 2003 International Conference on Image Processing,
                  {ICIP} 2003, Barcelona, Catalonia, Spain, September 14-18, 2003},
  pages        = {471--474},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICIP.2003.1246719},
  doi          = {10.1109/ICIP.2003.1246719},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/RoyC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiC03,
  author       = {Qiming Li and
                  Ee{-}Chien Chang},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Public Watermark Detection Using Multiple Proxies and Secret Sharing},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {558--569},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_45},
  doi          = {10.1007/978-3-540-24624-4\_45},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/YuC03,
  author       = {Hang Yu and
                  Ee{-}Chien Chang},
  editor       = {Lise Getoor and
                  Ted E. Senator and
                  Pedro M. Domingos and
                  Christos Faloutsos},
  title        = {Distributed multivariate regression based on influential observations},
  booktitle    = {Proceedings of the Ninth {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery and Data Mining, Washington, DC, USA, August 24
                  - 27, 2003},
  pages        = {679--684},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/956750.956839},
  doi          = {10.1145/956750.956839},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kdd/YuC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiC02,
  author       = {Qiming Li and
                  Ee{-}Chien Chang},
  editor       = {Fabien A. P. Petitcolas},
  title        = {Security of Public Watermarking Schemes for Binary Sequences},
  booktitle    = {Information Hiding, 5th International Workshop, {IH} 2002, Noordwijkerhout,
                  The Netherlands, October 7-9, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2578},
  pages        = {119--128},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36415-3\_8},
  doi          = {10.1007/3-540-36415-3\_8},
  timestamp    = {Sun, 02 Oct 2022 16:07:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/StoneOCM01,
  author       = {Harold S. Stone and
                  Michael T. Orchard and
                  Ee{-}Chien Chang and
                  Stephen A. Martucci},
  title        = {A fast direct Fourier-based algorithm for subpixel registration of
                  images},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {39},
  number       = {10},
  pages        = {2235--2243},
  year         = {2001},
  url          = {https://doi.org/10.1109/36.957286},
  doi          = {10.1109/36.957286},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgrs/StoneOCM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/ChangY01,
  author       = {Ee{-}Chien Chang and
                  Chee{-}Keng Yap},
  editor       = {Jie Wang},
  title        = {Competitive Online Scheduling with Level of Service},
  booktitle    = {Computing and Combinatorics, 7th Annual International Conference,
                  {COCOON} 2001, Guilin, China, August 20-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2108},
  pages        = {453--462},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44679-6\_51},
  doi          = {10.1007/3-540-44679-6\_51},
  timestamp    = {Mon, 03 Aug 2020 14:08:01 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/ChangY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egmm/KankanhalliCGHW01,
  author       = {Mohan S. Kankanhalli and
                  Ee{-}Chien Chang and
                  Xin Guan and
                  Zhiyong Huang and
                  Yinghui Wu},
  editor       = {Joaquim A. Jorge and
                  Nuno Correia and
                  H. Jones and
                  M. B. Kamegai},
  title        = {Authentication of Volume Data Using Wavelet-Based Foveation},
  booktitle    = {Proceedings of the Eurographics Multimedia Workshop 2001, Manchester,
                  United Kingdom, September 8-9, 2001},
  pages        = {119--130},
  publisher    = {Eurographics Association},
  year         = {2001},
  url          = {https://doi.org/10.2312/EGMM/egmm01/119-130},
  doi          = {10.2312/EGMM/EGMM01/119-130},
  timestamp    = {Thu, 06 Sep 2018 16:17:40 +0200},
  biburl       = {https://dblp.org/rec/conf/egmm/KankanhalliCGHW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/ChangY00,
  author       = {Ee{-}Chien Chang and
                  Chee{-}Keng Yap},
  title        = {A Simultaneous Search Problem},
  journal      = {Algorithmica},
  volume       = {26},
  number       = {2},
  pages        = {255--262},
  year         = {2000},
  url          = {https://doi.org/10.1007/s004539910012},
  doi          = {10.1007/S004539910012},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/algorithmica/ChangY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/ChangO00,
  author       = {Ee{-}Chien Chang and
                  Michael T. Orchard},
  title        = {Geometric Properties of Watermarking Schemes},
  booktitle    = {Proceedings of the 2000 International Conference on Image Processing,
                  {ICIP} 2000, Vancouver, BC, Canada, September 10-13, 2000},
  pages        = {714--717},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICIP.2000.899554},
  doi          = {10.1109/ICIP.2000.899554},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/ChangO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Chang98,
  author       = {Ee{-}Chien Chang},
  title        = {Foveation Techniques and Scheduling Issues in Thinwire Visualization},
  school       = {New York University, {USA}},
  year         = {1998},
  url          = {https://cs.nyu.edu/media/publications/chang\_ee-chien.pdf},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Chang98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compgeom/ChangY97,
  author       = {Ee{-}Chien Chang and
                  Chee{-}Keng Yap},
  editor       = {Jean{-}Daniel Boissonnat},
  title        = {A Wavelet Approach to Foveating Images},
  booktitle    = {Proceedings of the Thirteenth Annual Symposium on Computational Geometry,
                  Nice, France, June 4-6, 1997},
  pages        = {397--399},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/262839.263024},
  doi          = {10.1145/262839.263024},
  timestamp    = {Mon, 14 Jun 2021 16:25:04 +0200},
  biburl       = {https://dblp.org/rec/conf/compgeom/ChangY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ChangY95,
  author       = {Ee{-}Chien Chang and
                  Chee{-}Keng Yap},
  title        = {A Note on Improved Deterministic Time Simulation of Nondeterministic
                  Space for Small Space},
  journal      = {Inf. Process. Lett.},
  volume       = {55},
  number       = {3},
  pages        = {155--157},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(95)00093-R},
  doi          = {10.1016/0020-0190(95)00093-R},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/ChangY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ChangWK93,
  author       = {Ee{-}Chien Chang and
                  Weiguo Wang and
                  Mohan S. Kankanhalli},
  title        = {Multidimensional On-Line Bin-Packing: An Algorithm and its Average-Case
                  Analysis},
  journal      = {Inf. Process. Lett.},
  volume       = {48},
  number       = {3},
  pages        = {121--125},
  year         = {1993},
  url          = {https://doi.org/10.1016/0020-0190(93)90253-6},
  doi          = {10.1016/0020-0190(93)90253-6},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/ChangWK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics