Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ee-Chien Chang
@article{DBLP:journals/tdsc/FangQQZCZC24, author = {Han Fang and Yupeng Qiu and Guorui Qin and Jiyi Zhang and Kejiang Chen and Weiming Zhang and Ee{-}Chien Chang}, title = {DP\({}^{\mbox{2}}\)Dataset Protection by Data Poisoning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {636--649}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3227945}, doi = {10.1109/TDSC.2022.3227945}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FangQQZCZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-04640, author = {Jiyi Zhang and Han Fang and Ee{-}Chien Chang}, title = {Domain Bridge: Generative model-based domain forensic for black-box models}, journal = {CoRR}, volume = {abs/2402.04640}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.04640}, doi = {10.48550/ARXIV.2402.04640}, eprinttype = {arXiv}, eprint = {2402.04640}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-04640.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-13851, author = {Jiawei Liang and Siyuan Liang and Man Luo and Aishan Liu and Dongchen Han and Ee{-}Chien Chang and Xiaochun Cao}, title = {VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models}, journal = {CoRR}, volume = {abs/2402.13851}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.13851}, doi = {10.48550/ARXIV.2402.13851}, eprinttype = {arXiv}, eprint = {2402.13851}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-13851.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-14872, author = {Xiaoxia Li and Siyuan Liang and Jiyi Zhang and Han Fang and Aishan Liu and Ee{-}Chien Chang}, title = {Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs}, journal = {CoRR}, volume = {abs/2402.14872}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.14872}, doi = {10.48550/ARXIV.2402.14872}, eprinttype = {arXiv}, eprint = {2402.14872}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-14872.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-05448, author = {Zhiang Li and Daisuke Mashima and Wen Shei Ong and Ertem Esiner and Zbigniew Kalbarczyk and Ee{-}Chien Chang}, title = {On Practicality of Using {ARM} TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers}, journal = {CoRR}, volume = {abs/2403.05448}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.05448}, doi = {10.48550/ARXIV.2403.05448}, eprinttype = {arXiv}, eprint = {2403.05448}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-05448.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-16257, author = {Siyuan Liang and Kuanrong Liu and Jiajun Gong and Jiawei Liang and Yuan Xun and Ee{-}Chien Chang and Xiaochun Cao}, title = {Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning}, journal = {CoRR}, volume = {abs/2403.16257}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.16257}, doi = {10.48550/ARXIV.2403.16257}, eprinttype = {arXiv}, eprint = {2403.16257}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-16257.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-16271, author = {Siyuan Liang and Wei Wang and Ruoyu Chen and Aishan Liu and Boxi Wu and Ee{-}Chien Chang and Xiaochun Cao and Dacheng Tao}, title = {Object Detectors in the Open Environment: Challenges, Solutions, and Outlook}, journal = {CoRR}, volume = {abs/2403.16271}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.16271}, doi = {10.48550/ARXIV.2403.16271}, eprinttype = {arXiv}, eprint = {2403.16271}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-16271.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/RoomiHMCU23, author = {Muhammad M. Roomi and S. M. Suhail Hussain and Daisuke Mashima and Ee{-}Chien Chang and Taha Selim Ustun}, title = {Analysis of False Data Injection Attacks Against Automated Control for Parallel Generators in {IEC} 61850-Based Smart Grid Systems}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {3}, pages = {4603--4614}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3236951}, doi = {10.1109/JSYST.2023.3236951}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/RoomiHMCU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/softx/HussainYRMC23, author = {S. M. Suhail Hussain and Chen Yaohao and Muhammad M. Roomi and Daisuke Mashima and Ee{-}Chien Chang}, title = {An open-source framework for publishing/subscribing {IEC} 61850 {R-GOOSE} and {R-SV}}, journal = {SoftwareX}, volume = {23}, pages = {101415}, year = {2023}, url = {https://doi.org/10.1016/j.softx.2023.101415}, doi = {10.1016/J.SOFTX.2023.101415}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/softx/HussainYRMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/FangJQZZC23, author = {Han Fang and Zhaoyang Jia and Yupeng Qiu and Jiyi Zhang and Weiming Zhang and Ee{-}Chien Chang}, title = {De-END: Decoder-Driven Watermarking Network}, journal = {{IEEE} Trans. Multim.}, volume = {25}, pages = {7571--7581}, year = {2023}, url = {https://doi.org/10.1109/TMM.2022.3223559}, doi = {10.1109/TMM.2022.3223559}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/FangJQZZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/FangQCZ0C23, author = {Han Fang and Yupeng Qiu and Kejiang Chen and Jiyi Zhang and Weiming Zhang and Ee{-}Chien Chang}, editor = {Brian Williams and Yiling Chen and Jennifer Neville}, title = {Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions}, booktitle = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI} 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February 7-14, 2023}, pages = {5054--5061}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.1609/aaai.v37i4.25633}, doi = {10.1609/AAAI.V37I4.25633}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/FangQCZ0C23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/YangWYW0CZ023, author = {Ziqi Yang and Lijin Wang and Da Yang and Jie Wan and Ziming Zhao and Ee{-}Chien Chang and Fan Zhang and Kui Ren}, editor = {Brian Williams and Yiling Chen and Jennifer Neville}, title = {Purifier: Defending Data Inference Attacks via Transforming Confidence Scores}, booktitle = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI} 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February 7-14, 2023}, pages = {10871--10879}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.1609/aaai.v37i9.26289}, doi = {10.1609/AAAI.V37I9.26289}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaai/YangWYW0CZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BaiSZWCCR23, author = {Jianli Bai and Xiangfu Song and Xiaowu Zhang and Qifan Wang and Shujie Cui and Ee{-}Chien Chang and Giovanni Russello}, title = {Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {799--813}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627131}, doi = {10.1145/3627106.3627131}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BaiSZWCCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ZhangFTXFC23, author = {Jiyi Zhang and Han Fang and Wesley Joon{-}Wie Tann and Ke Xu and Chengfang Fang and Ee{-}Chien Chang}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {704--715}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3582824}, doi = {10.1145/3579856.3582824}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ZhangFTXFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/MashimaRNKHC23, author = {Daisuke Mashima and Muhammad M. Roomi and Bennet Ng and Zbigniew Kalberczyk and S. M. Suhail Hussain and Ee{-}Chien Chang}, title = {Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training}, booktitle = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2023 - Supplemental Volume, Porto, Portugal, June 27-30, 2023}, pages = {49--55}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSN-S58398.2023.00024}, doi = {10.1109/DSN-S58398.2023.00024}, timestamp = {Thu, 17 Aug 2023 15:16:15 +0200}, biburl = {https://dblp.org/rec/conf/dsn/MashimaRNKHC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/TannC23, author = {Wesley Joon{-}Wie Tann and Ee{-}Chien Chang}, title = {Poisoning Online Learning Filters by Shifting on the Move}, booktitle = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023}, pages = {239--251}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSN58367.2023.00033}, doi = {10.1109/DSN58367.2023.00033}, timestamp = {Tue, 15 Aug 2023 11:43:57 +0200}, biburl = {https://dblp.org/rec/conf/dsn/TannC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/FangZQLXFC23, author = {Han Fang and Jiyi Zhang and Yupeng Qiu and Jiayang Liu and Ke Xu and Chengfang Fang and Ee{-}Chien Chang}, title = {Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence}, booktitle = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023, Paris, France, October 1-6, 2023}, pages = {4312--4321}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCV51070.2023.00400}, doi = {10.1109/ICCV51070.2023.00400}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/FangZQLXFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/HussainRMC23, author = {S. M. Suhail Hussain and Muhammad M. Roomi and Daisuke Mashima and Ee{-}Chien Chang}, title = {End-to-End Performance Evaluation of {R-SV} / {R-GOOSE} Messages for Wide Area Protection and Control Applications}, booktitle = {{IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2023, Washington, DC, USA, January 16-19, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISGT51731.2023.10066414}, doi = {10.1109/ISGT51731.2023.10066414}, timestamp = {Tue, 28 Mar 2023 19:49:46 +0200}, biburl = {https://dblp.org/rec/conf/isgt/HussainRMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/FangCQLXFZC23, author = {Han Fang and Kejiang Chen and Yupeng Qiu and Jiayang Liu and Ke Xu and Chengfang Fang and Weiming Zhang and Ee{-}Chien Chang}, editor = {Abdulmotaleb El{-}Saddik and Tao Mei and Rita Cucchiara and Marco Bertini and Diana Patricia Tobon Vallejo and Pradeep K. Atrey and M. Shamim Hossain}, title = {DeNoL: {A} Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness}, booktitle = {Proceedings of the 31st {ACM} International Conference on Multimedia, {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}, pages = {7345--7353}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581783.3612068}, doi = {10.1145/3581783.3612068}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/FangCQLXFZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-01218, author = {Han Fang and Jiyi Zhang and Yupeng Qiu and Ke Xu and Chengfang Fang and Ee{-}Chien Chang}, title = {Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence}, journal = {CoRR}, volume = {abs/2301.01218}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.01218}, doi = {10.48550/ARXIV.2301.01218}, eprinttype = {arXiv}, eprint = {2301.01218}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-01218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-05869, author = {Jiyi Zhang and Han Fang and Hwee Kuan Lee and Ee{-}Chien Chang}, title = {Finding Meaningful Distributions of {ML} Black-boxes under Forensic Investigation}, journal = {CoRR}, volume = {abs/2305.05869}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.05869}, doi = {10.48550/ARXIV.2305.05869}, eprinttype = {arXiv}, eprint = {2305.05869}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-05869.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-01400, author = {Jiyi Zhang and Han Fang and Ee{-}Chien Chang}, title = {Adaptive Attractors: {A} Defense Strategy against {ML} Adversarial Collusion Attacks}, journal = {CoRR}, volume = {abs/2306.01400}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.01400}, doi = {10.48550/ARXIV.2306.01400}, eprinttype = {arXiv}, eprint = {2306.01400}, timestamp = {Mon, 12 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-01400.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-10443, author = {Wesley Joon{-}Wie Tann and Yuancheng Liu and Jun Heng Sim and Choon Meng Seah and Ee{-}Chien Chang}, title = {Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions}, journal = {CoRR}, volume = {abs/2308.10443}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.10443}, doi = {10.48550/ARXIV.2308.10443}, eprinttype = {arXiv}, eprint = {2308.10443}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-10443.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-17124, author = {Jianli Bai and Xiangfu Song and Xiaowu Zhang and Qifan Wang and Shujie Cui and Ee{-}Chien Chang and Giovanni Russello}, title = {Mostree : Malicious Secure Private Decision Tree Evaluation with Sublinear Communication}, journal = {CoRR}, volume = {abs/2309.17124}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.17124}, doi = {10.48550/ARXIV.2309.17124}, eprinttype = {arXiv}, eprint = {2309.17124}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-17124.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-11017, author = {Jiayang Liu and Siyu Zhu and Siyuan Liang and Jie Zhang and Han Fang and Weiming Zhang and Ee{-}Chien Chang}, title = {Improving Adversarial Transferability by Stable Diffusion}, journal = {CoRR}, volume = {abs/2311.11017}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.11017}, doi = {10.48550/ARXIV.2311.11017}, eprinttype = {arXiv}, eprint = {2311.11017}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-11017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongYBDC23, author = {Xiangfu Song and Dong Yin and Jianli Bai and Changyu Dong and Ee{-}Chien Chang}, title = {Secret-Shared Shuffle with Malicious Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1794}, year = {2023}, url = {https://eprint.iacr.org/2023/1794}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SongYBDC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/SarkarTC22, author = {Sajal Sarkar and Yong Meng Teo and Ee{-}Chien Chang}, title = {A cybersecurity assessment framework for virtual operational technology in power system automation}, journal = {Simul. Model. Pract. Theory}, volume = {117}, pages = {102453}, year = {2022}, url = {https://doi.org/10.1016/j.simpat.2021.102453}, doi = {10.1016/J.SIMPAT.2021.102453}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simpra/SarkarTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NingPHDCC22, author = {Jianting Ning and Geong Sen Poh and Xinyi Huang and Robert H. Deng and Shuwei Cao and Ee{-}Chien Chang}, title = {Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {1164--1180}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3015997}, doi = {10.1109/TDSC.2020.3015997}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NingPHDCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangCQQWW22, author = {Qin Jiang and Ee{-}Chien Chang and Yong Qi and Saiyu Qi and Pengfei Wu and Jianfeng Wang}, title = {Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel {SGX}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1053--1068}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3144877}, doi = {10.1109/TIFS.2022.3144877}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JiangCQQWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ace/SufatrioVC22, author = {Sufatrio and Jan Vykopal and Ee{-}Chien Chang}, editor = {Judy Sheard and Paul Denny}, title = {Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications}, booktitle = {{ACE} '22: Australasian Computing Education Conference, Virtual Event, Australia, February 14 - 18, 2022}, pages = {114--122}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3511861.3511874}, doi = {10.1145/3511861.3511874}, timestamp = {Sun, 26 Nov 2023 13:55:41 +0100}, biburl = {https://dblp.org/rec/conf/ace/SufatrioVC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ZhangCL22, author = {Jiyi Zhang and Ee{-}Chien Chang and Hwee Kuan Lee}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Confusing and Detecting {ML} Adversarial Attacks with Injected Attractors}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {322--336}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497752}, doi = {10.1145/3488932.3497752}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ZhangCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/BaiSCCR22, author = {Jianli Bai and Xiangfu Song and Shujie Cui and Ee{-}Chien Chang and Giovanni Russello}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Scalable Private Decision Tree Evaluation with Sublinear Communication}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {843--857}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517413}, doi = {10.1145/3488932.3517413}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/BaiSCCR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/FangJMCZ22, author = {Han Fang and Zhaoyang Jia and Zehua Ma and Ee{-}Chien Chang and Weiming Zhang}, editor = {Jo{\~{a}}o Magalh{\~{a}}es and Alberto Del Bimbo and Shin'ichi Satoh and Nicu Sebe and Xavier Alameda{-}Pineda and Qin Jin and Vincent Oria and Laura Toni}, title = {PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network}, booktitle = {{MM} '22: The 30th {ACM} International Conference on Multimedia, Lisboa, Portugal, October 10 - 14, 2022}, pages = {2267--2275}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3503161.3548049}, doi = {10.1145/3503161.3548049}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/FangJMCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WuNSWC22, author = {Pengfei Wu and Jianting Ning and Jiamin Shen and Hongbing Wang and Ee{-}Chien Chang}, title = {Hybrid Trust Multi-party Computation with Trusted Execution Environment}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-222/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/WuNSWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-01284, author = {Jianli Bai and Xiangfu Song and Shujie Cui and Ee{-}Chien Chang and Giovanni Russello}, title = {Scalable Private Decision Tree Evaluation with Sublinear Communication}, journal = {CoRR}, volume = {abs/2205.01284}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.01284}, doi = {10.48550/ARXIV.2205.01284}, eprinttype = {arXiv}, eprint = {2205.01284}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-01284.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-13032, author = {Han Fang and Zhaoyang Jia and Yupeng Qiu and Jiyi Zhang and Weiming Zhang and Ee{-}Chien Chang}, title = {De-END: Decoder-driven Watermarking Network}, journal = {CoRR}, volume = {abs/2206.13032}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.13032}, doi = {10.48550/ARXIV.2206.13032}, eprinttype = {arXiv}, eprint = {2206.13032}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-13032.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-01946, author = {Mingyuan Gao and Hung Dang and Ee{-}Chien Chang and Jialin Li}, title = {Mixed Fault Tolerance Protocols with Trusted Execution Environment}, journal = {CoRR}, volume = {abs/2208.01946}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.01946}, doi = {10.48550/ARXIV.2208.01946}, eprinttype = {arXiv}, eprint = {2208.01946}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-01946.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-15493, author = {Wesley Joon{-}Wie Tann and Akhil Vuputuri and Ee{-}Chien Chang}, title = {Predicting Non-Fungible Token {(NFT)} Collections: {A} Contextual Generative Approach}, journal = {CoRR}, volume = {abs/2210.15493}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.15493}, doi = {10.48550/ARXIV.2210.15493}, eprinttype = {arXiv}, eprint = {2210.15493}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-15493.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-00612, author = {Ziqi Yang and Lijin Wang and Da Yang and Jie Wan and Ziming Zhao and Ee{-}Chien Chang and Fan Zhang and Kui Ren}, title = {Purifier: Defending Data Inference Attacks via Transforming Confidence Scores}, journal = {CoRR}, volume = {abs/2212.00612}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.00612}, doi = {10.48550/ARXIV.2212.00612}, eprinttype = {arXiv}, eprint = {2212.00612}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-00612.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaoDC21, author = {Mingyuan Gao and Hung Dang and Ee{-}Chien Chang}, title = {{TEEKAP:} Self-Expiring Data Capsule using Trusted Execution Environment}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {235--247}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485919}, doi = {10.1145/3485832.3485919}, timestamp = {Tue, 07 Dec 2021 18:41:40 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GaoDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/TannWPC21, author = {Wesley Joon{-}Wie Tann and Jackie Tan Jin Wei and Joanna Purba and Ee{-}Chien Chang}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {432--446}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453083}, doi = {10.1145/3433210.3453083}, timestamp = {Wed, 09 Jun 2021 15:14:39 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/TannWPC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhangTCL21, author = {Jiyi Zhang and Wesley Joon{-}Wie Tann and Ee{-}Chien Chang and Hwee Kuan Lee}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Common Component in Black-Boxes Is Prone to Attacks}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {584--604}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_28}, doi = {10.1007/978-3-030-88418-5\_28}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZhangTCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/RisdiantoC21, author = {Aris Cahyadi Risdianto and Ee{-}Chien Chang}, title = {OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity Generation}, booktitle = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484537}, doi = {10.1109/INFOCOMWKSHPS51825.2021.9484537}, timestamp = {Fri, 23 Jul 2021 09:24:13 +0200}, biburl = {https://dblp.org/rec/conf/infocom/RisdiantoC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-12612, author = {Wesley Joon{-}Wie Tann and Ee{-}Chien Chang}, title = {Poisoning of Online Learning Filters: DDoS Attacks and Countermeasures}, journal = {CoRR}, volume = {abs/2107.12612}, year = {2021}, url = {https://arxiv.org/abs/2107.12612}, eprinttype = {arXiv}, eprint = {2107.12612}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-12612.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-15160, author = {Jiyi Zhang and Wesley Joon{-}Wie Tann and Ee{-}Chien Chang}, title = {Mitigating Adversarial Attacks by Distributing Different Copies to Different Users}, journal = {CoRR}, volume = {abs/2111.15160}, year = {2021}, url = {https://arxiv.org/abs/2111.15160}, eprinttype = {arXiv}, eprint = {2111.15160}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-15160.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuGLWC21, author = {Jia Xu and Yiwen Gao and Hoon Wei Lim and Hongbing Wang and Ee{-}Chien Chang}, title = {Stateful {KEM:} Towards Optimal Robust Combiner for Key Encapsulation Mechanism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2021}, url = {https://eprint.iacr.org/2021/989}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuGLWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/KouLCN20, author = {Connie Kou and Hwee Kuan Lee and Ee{-}Chien Chang and Teck Khim Ng}, title = {Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier}, booktitle = {8th International Conference on Learning Representations, {ICLR} 2020, Addis Ababa, Ethiopia, April 26-30, 2020}, publisher = {OpenReview.net}, year = {2020}, url = {https://openreview.net/forum?id=BkgWahEFvr}, timestamp = {Thu, 07 May 2020 17:11:47 +0200}, biburl = {https://dblp.org/rec/conf/iclr/KouLCN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/VykopalSC20, author = {Jan Vykopal and Valdemar Sv{\'{a}}bensk{\'{y}} and Ee{-}Chien Chang}, editor = {Jian Zhang and Mark Sherriff and Sarah Heckman and Pamela A. Cutter and Alvaro E. Monge}, title = {Benefits and Pitfalls of Using Capture the Flag Games in University Courses}, booktitle = {Proceedings of the 51st {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2020, Portland, OR, USA, March 11-14, 2020}, pages = {752--758}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3328778.3366893}, doi = {10.1145/3328778.3366893}, timestamp = {Tue, 23 Mar 2021 10:54:19 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/VykopalSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/RoomiBMFC20, author = {Muhammad M. Roomi and Partha P. Biswas and Daisuke Mashima and Yuting Fan and Ee{-}Chien Chang}, title = {False Data Injection Cyber Range of Modernized Substation System}, booktitle = {2020 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020, Tempe, AZ, USA, November 11-13, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SmartGridComm47815.2020.9302951}, doi = {10.1109/SMARTGRIDCOMM47815.2020.9302951}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/RoomiBMFC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-02732, author = {Jiyi Zhang and Ee{-}Chien Chang and Hwee Kuan Lee}, title = {Detection and Recovery of Adversarial Attacks with Injected Attractors}, journal = {CoRR}, volume = {abs/2003.02732}, year = {2020}, url = {https://arxiv.org/abs/2003.02732}, eprinttype = {arXiv}, eprint = {2003.02732}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-02732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-11556, author = {Jan Vykopal and Valdemar Sv{\'{a}}bensk{\'{y}} and Ee{-}Chien Chang}, title = {Benefits and Pitfalls of Using Capture the Flag Games in University Courses}, journal = {CoRR}, volume = {abs/2004.11556}, year = {2020}, url = {https://arxiv.org/abs/2004.11556}, eprinttype = {arXiv}, eprint = {2004.11556}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-11556.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-03915, author = {Ziqi Yang and Bin Shao and Bohan Xuan and Ee{-}Chien Chang and Fan Zhang}, title = {Defending Model Inversion and Membership Inference Attacks via Prediction Purification}, journal = {CoRR}, volume = {abs/2005.03915}, year = {2020}, url = {https://arxiv.org/abs/2005.03915}, eprinttype = {arXiv}, eprint = {2005.03915}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-03915.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-03774, author = {Wesley Joon{-}Wie Tann and Ee{-}Chien Chang and Bryan Hooi}, title = {{SHADOWCAST:} Controlling Network Properties to Explain Graph Generation}, journal = {CoRR}, volume = {abs/2006.03774}, year = {2020}, url = {https://arxiv.org/abs/2006.03774}, eprinttype = {arXiv}, eprint = {2006.03774}, timestamp = {Fri, 12 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-03774.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-06805, author = {Wesley Joon{-}Wie Tann and Jackie Tan Jin Wei and Joanna Purba and Ee{-}Chien Chang}, title = {Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning}, journal = {CoRR}, volume = {abs/2012.06805}, year = {2020}, url = {https://arxiv.org/abs/2012.06805}, eprinttype = {arXiv}, eprint = {2012.06805}, timestamp = {Sat, 02 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-06805.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NingXLZC19, author = {Jianting Ning and Jia Xu and Kaitai Liang and Fan Zhang and Ee{-}Chien Chang}, title = {Passive Attacks Against Searchable Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {3}, pages = {789--802}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2866321}, doi = {10.1109/TIFS.2018.2866321}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NingXLZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangZCL19, author = {Ziqi Yang and Jiyi Zhang and Ee{-}Chien Chang and Zhenkai Liang}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {225--240}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354261}, doi = {10.1145/3319535.3354261}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangZCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NingPLCC19, author = {Jianting Ning and Geong Sen Poh and Jia{-}Ch'ng Loh and Jason Chia and Ee{-}Chien Chang}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1657--1670}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354204}, doi = {10.1145/3319535.3354204}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NingPLCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DangTC19, author = {Hung Dang and Dat Le Tien and Ee{-}Chien Chang}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Towards a Marketplace for Secure Outsourced Computations}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {790--808}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_38}, doi = {10.1007/978-3-030-29959-0\_38}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DangTC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/DangDLCLO19, author = {Hung Dang and Tien Tuan Anh Dinh and Dumitrel Loghin and Ee{-}Chien Chang and Qian Lin and Beng Chin Ooi}, editor = {Peter A. Boncz and Stefan Manegold and Anastasia Ailamaki and Amol Deshpande and Tim Kraska}, title = {Towards Scaling Blockchain Systems via Sharding}, booktitle = {Proceedings of the 2019 International Conference on Management of Data, {SIGMOD} Conference 2019, Amsterdam, The Netherlands, June 30 - July 5, 2019}, pages = {123--140}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3299869.3319889}, doi = {10.1145/3299869.3319889}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/DangDLCLO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-08552, author = {Ziqi Yang and Ee{-}Chien Chang and Zhenkai Liang}, title = {Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment}, journal = {CoRR}, volume = {abs/1902.08552}, year = {2019}, url = {http://arxiv.org/abs/1902.08552}, eprinttype = {arXiv}, eprint = {1902.08552}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-08552.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-06460, author = {Hung Dang and Ee{-}Chien Chang}, title = {Autonomous Membership Service for Enclave Applications}, journal = {CoRR}, volume = {abs/1905.06460}, year = {2019}, url = {http://arxiv.org/abs/1905.06460}, eprinttype = {arXiv}, eprint = {1905.06460}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-06460.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-00258, author = {Connie Kou and Hwee Kuan Lee and Teck Khim Ng and Ee{-}Chien Chang}, title = {Enhancing Transformation-based Defenses using a Distribution Classifier}, journal = {CoRR}, volume = {abs/1906.00258}, year = {2019}, url = {http://arxiv.org/abs/1906.00258}, eprinttype = {arXiv}, eprint = {1906.00258}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-00258.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-06046, author = {Ziqi Yang and Hung Dang and Ee{-}Chien Chang}, title = {Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking}, journal = {CoRR}, volume = {abs/1906.06046}, year = {2019}, url = {http://arxiv.org/abs/1906.06046}, eprinttype = {arXiv}, eprint = {1906.06046}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-06046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-09305, author = {Hung Dang and Ee{-}Chien Chang}, title = {Self-Expiring Data Capsule using Trusted Execution Environment}, journal = {CoRR}, volume = {abs/1911.09305}, year = {2019}, url = {http://arxiv.org/abs/1911.09305}, eprinttype = {arXiv}, eprint = {1911.09305}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-09305.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalAC18, author = {Anand Agrawal and Chuadhry Mujeeb Ahmed and Ee{-}Chien Chang}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {821--823}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201587}, doi = {10.1145/3196494.3201587}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KannanSCC18, author = {Pravein Govindan Kannan and Ahmad Soltani and Mun Choon Chan and Ee{-}Chien Chang}, editor = {Christian S. Collberg and Peter A. H. Peterson}, title = {{BNV:} Enabling Scalable Network Experimentation through Bare-metal Network Virtualization}, booktitle = {11th {USENIX} Workshop on Cyber Security Experimentation and Test, {CSET} 2018, Baltimore, MD, USA, August 13, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/cset18/presentation/kannan}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KannanSCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/SarkarATC18, author = {Sajal Sarkar and Anand Agrawal and Yong Meng Teo and Ee{-}Chien Chang}, editor = {Bj{\"{o}}rn Johansson and Sanjay Jain}, title = {Votnet: Hybrid simulation of Virtual Operational Technology Network for Cybersecurity Assessment}, booktitle = {2018 Winter Simulation Conference, {WSC} 2018, Gothenburg, Sweden, December 9-12, 2018}, pages = {1168--1179}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/WSC.2018.8632410}, doi = {10.1109/WSC.2018.8632410}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wsc/SarkarATC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-04504, author = {Jiyi Zhang and Hung Dang and Hwee Kuan Lee and Ee{-}Chien Chang}, title = {Learning Inverse Mappings with Adversarial Criterion}, journal = {CoRR}, volume = {abs/1802.04504}, year = {2018}, url = {http://arxiv.org/abs/1802.04504}, eprinttype = {arXiv}, eprint = {1802.04504}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-04504.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-00399, author = {Hung Dang and Anh Dinh and Ee{-}Chien Chang and Beng Chin Ooi}, title = {Chain of Trust: Can Trusted Hardware Help Scaling Blockchains?}, journal = {CoRR}, volume = {abs/1804.00399}, year = {2018}, url = {http://arxiv.org/abs/1804.00399}, eprinttype = {arXiv}, eprint = {1804.00399}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-00399.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-09682, author = {Hung Dang and Dat Le Tien and Ee{-}Chien Chang}, title = {Fair Marketplace for Secure Outsourced Computations}, journal = {CoRR}, volume = {abs/1808.09682}, year = {2018}, url = {http://arxiv.org/abs/1808.09682}, eprinttype = {arXiv}, eprint = {1808.09682}, timestamp = {Mon, 03 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-09682.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NingDHC18, author = {Jianting Ning and Hung Dang and Ruomu Hou and Ee{-}Chien Chang}, title = {Keeping Time-Release Secrets through Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1166}, year = {2018}, url = {https://eprint.iacr.org/2018/1166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NingDHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DangDCO17, author = {Hung Dang and Tien Tuan Anh Dinh and Ee{-}Chien Chang and Beng Chin Ooi}, title = {Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {3}, pages = {21}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0026}, doi = {10.1515/POPETS-2017-0026}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DangDCO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/DangC17, author = {Hung Dang and Ee{-}Chien Chang}, editor = {Geoffrey C. Fox}, title = {Privacy-Preserving Data Deduplication on Trusted Processors}, booktitle = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 25-30, 2017}, pages = {66--73}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CLOUD.2017.18}, doi = {10.1109/CLOUD.2017.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/DangC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DangHC17, author = {Hung Dang and Yue Huang and Ee{-}Chien Chang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Evading Classifiers by Morphing in the Dark}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {119--133}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133978}, doi = {10.1145/3133956.3133978}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DangHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DangPC17, author = {Hung Dang and Erick Purwanto and Ee{-}Chien Chang}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {408--422}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053016}, doi = {10.1145/3052973.3053016}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DangPC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XuC017, author = {Jia Xu and Ee{-}Chien Chang and Jianying Zhou}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {A New Functional Encryption for Multidimensional Range Query (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {361--372}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_21}, doi = {10.1007/978-3-319-72359-4\_21}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XuC017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/KannanCMC17, author = {Pravein Govindan Kannan and Mun Choon Chan and Richard T. B. Ma and Ee{-}Chien Chang}, title = {Raptor: Scalable rule placement over multiple path in software defined networks}, booktitle = {2017 {IFIP} Networking Conference, {IFIP} Networking 2017 and Workshops, Stockholm, Sweden, June 12-16, 2017}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.23919/IFIPNetworking.2017.8264843}, doi = {10.23919/IFIPNETWORKING.2017.8264843}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/networking/KannanCMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/RamapantuluTC17, author = {Lavanya Ramapantulu and Yong Meng Teo and Ee{-}Chien Chang}, title = {A conceptural framework to federate testbeds for cybersecurity}, booktitle = {2017 Winter Simulation Conference, {WSC} 2017, Las Vegas, NV, USA, December 3-6, 2017}, pages = {457--468}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WSC.2017.8247807}, doi = {10.1109/WSC.2017.8247807}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wsc/RamapantuluTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/BalutaRTC17, author = {Teodora Baluta and Lavanya Ramapantulu and Yong Meng Teo and Ee{-}Chien Chang}, title = {Modeling the effects of insider threats on cybersecurity of complex systems}, booktitle = {2017 Winter Simulation Conference, {WSC} 2017, Las Vegas, NV, USA, December 3-6, 2017}, pages = {4360--4371}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WSC.2017.8248141}, doi = {10.1109/WSC.2017.8248141}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wsc/BalutaRTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DangYC17, author = {Hung Dang and Yue Huang and Ee{-}Chien Chang}, title = {Evading Classifier in the Dark: Guiding Unpredictable Morphing Using Binary-Output Blackboxes}, journal = {CoRR}, volume = {abs/1705.07535}, year = {2017}, url = {http://arxiv.org/abs/1705.07535}, eprinttype = {arXiv}, eprint = {1705.07535}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DangYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TopleDSC17, author = {Shruti Tople and Hung Dang and Prateek Saxena and Ee{-}Chien Chang}, title = {PermuteRam: Optimizing Oblivious Computation for Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2017}, url = {http://eprint.iacr.org/2017/885}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TopleDSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuC017, author = {Jia Xu and Ee{-}Chien Chang and Jianying Zhou}, title = {A New Functional Encryption for Multidimensional Range Query}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {970}, year = {2017}, url = {http://eprint.iacr.org/2017/970}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuC017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/AppavooCAC16, author = {Paramasiven Appavoo and Mun Choon Chan and Bhojan Anand and Ee{-}Chien Chang}, title = {Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services}, booktitle = {8th International Conference on Communication Systems and Networks, {COMSNETS} 2016, Bangalore, India, January 5-10, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/COMSNETS.2016.7439941}, doi = {10.1109/COMSNETS.2016.7439941}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/AppavooCAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DangCBC16, author = {Hung Dang and Yun Long Chong and Francois Brun and Ee{-}Chien Chang}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {69--80}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930795}, doi = {10.1145/2909827.2930795}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DangCBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/KuribayashiCF16, author = {Minoru Kuribayashi and Ee{-}Chien Chang and Nobuo Funabiki}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Feng Liu}, title = {Watermarking with Fixed Decoder for Aesthetic 2D Barcode}, booktitle = {Digital Forensics and Watermarking - 15th International Workshop, {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10082}, pages = {379--392}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53465-7\_28}, doi = {10.1007/978-3-319-53465-7\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/KuribayashiCF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/XuCZ16, author = {Jia Xu and Ee{-}Chien Chang and Jianying Zhou}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Directed Transitive Signature on Directed Tree}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {91--98}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-91}, doi = {10.3233/978-1-61499-617-0-91}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/XuCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/DangC15, author = {Hung Dang and Ee{-}Chien Chang}, editor = {Grant McKenzie and Krzysztof Janowicz and Gueorgi Kossinets}, title = {PrAd: Enabling Privacy-Aware Location based Advertising}, booktitle = {Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis, GeoPrivacy@SIGSPATIAL 2015, Bellevue, WA, USA, November 3-6, 2015}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2830834.2830839}, doi = {10.1145/2830834.2830839}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gis/DangC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DinhSCOZ15, author = {Tien Tuan Anh Dinh and Prateek Saxena and Ee{-}Chien Chang and Beng Chin Ooi and Chunwang Zhang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{M2R:} Enabling Stronger Privacy in MapReduce Computation}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {447--462}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dinh}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/DinhSCOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/FangC14, author = {Chengfang Fang and Ee{-}Chien Chang}, title = {Optimal strategy of coupon subset collection when each package contains half of the coupons}, journal = {Inf. Process. Lett.}, volume = {114}, number = {12}, pages = {703--705}, year = {2014}, url = {https://doi.org/10.1016/j.ipl.2014.06.012}, doi = {10.1016/J.IPL.2014.06.012}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/FangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/ZhangC14, author = {Chunwang Zhang and Ee{-}Chien Chang}, title = {Processing of Mixed-Sensitivity Video Surveillance Streams on Hybrid Clouds}, booktitle = {2014 {IEEE} 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27 - July 2, 2014}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CLOUD.2014.12}, doi = {10.1109/CLOUD.2014.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/ZhangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/ZhangCY14, author = {Chunwang Zhang and Ee{-}Chien Chang and Roland H. C. Yap}, title = {Tagged-MapReduce: {A} General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds}, booktitle = {14th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2014, Chicago, IL, USA, May 26-29, 2014}, pages = {31--40}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CCGrid.2014.96}, doi = {10.1109/CCGRID.2014.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/ZhangCY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FangC14, author = {Chengfang Fang and Ee{-}Chien Chang}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Differential privacy with {\(\delta\)}-neighbourhood for spatial and dynamic datasets}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {159--170}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590320}, doi = {10.1145/2590296.2590320}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmm/FangZC14, author = {Chengfang Fang and Chunwang Zhang and Ee{-}Chien Chang}, editor = {Cathal Gurrin and Frank Hopfgartner and Wolfgang H{\"{u}}rst and H{\aa}vard D. Johansen and Hyowon Lee and Noel E. O'Connor}, title = {An Optimization Model for Aesthetic Two-Dimensional Barcodes}, booktitle = {MultiMedia Modeling - 20th Anniversary International Conference, {MMM} 2014, Dublin, Ireland, January 6-10, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8325}, pages = {278--290}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04114-8\_24}, doi = {10.1007/978-3-319-04114-8\_24}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmm/FangZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimTSC14, author = {Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee{-}Chien Chang}, title = {Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2014}, url = {http://eprint.iacr.org/2014/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimTSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuCZ13, author = {Jia Xu and Ee{-}Chien Chang and Jianying Zhou}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Weak leakage-resilient client-side deduplication of encrypted data in cloud storage}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {195--206}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484340}, doi = {10.1145/2484313.2484340}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XuCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/ZhangCY13, author = {Chunwang Zhang and Ee{-}Chien Chang and Roland H. C. Yap}, editor = {Guy M. Lohman}, title = {Towards a general framework for secure MapReduce computation on hybrid clouds}, booktitle = {{ACM} Symposium on Cloud Computing, {SOCC} '13, Santa Clara, CA, USA, October 1-3, 2013}, pages = {36:1--36:2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523616.2525944}, doi = {10.1145/2523616.2525944}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloud/ZhangCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/DialloHCMV12, author = {Mamadou H. Diallo and Bijit Hore and Ee{-}Chien Chang and Sharad Mehrotra and Nalini Venkatasubramanian}, editor = {Rong Chang}, title = {CloudProtect: Managing Data Privacy in Cloud Applications}, booktitle = {2012 {IEEE} Fifth International Conference on Cloud Computing, Honolulu, HI, USA, June 24-29, 2012}, pages = {303--310}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CLOUD.2012.122}, doi = {10.1109/CLOUD.2012.122}, timestamp = {Wed, 09 Aug 2023 12:14:21 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcloud/DialloHCMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuC12, author = {Jia Xu and Ee{-}Chien Chang}, editor = {Heung Youl Youm and Yoojae Won}, title = {Towards efficient proofs of retrievability}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {79--80}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414503}, doi = {10.1145/2414456.2414503}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XuC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/AnandCCCAO12, author = {Bhojan Anand and Lee Kee Chong and Ee{-}Chien Chang and Mun Choon Chan and Akkihebbal L. Ananda and Wei Tsang Ooi}, editor = {Noboru Babaguchi and Kiyoharu Aizawa and John R. Smith and Shin'ichi Satoh and Thomas Plagemann and Xian{-}Sheng Hua and Rong Yan}, title = {El-pincel: a painter cloud service for greener web pages}, booktitle = {Proceedings of the 20th {ACM} Multimedia Conference, {MM} '12, Nara, Japan, October 29 - November 02, 2012}, pages = {399--408}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2393347.2393405}, doi = {10.1145/2393347.2393405}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/AnandCCCAO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/FangC12, author = {Chengfang Fang and Ee{-}Chien Chang}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {Adaptive Differentially Private Histogram of Low-Dimensional Data}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {160--179}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_9}, doi = {10.1007/978-3-642-31680-7\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/FangC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/HoreCDM12, author = {Bijit Hore and Ee{-}Chien Chang and Mamadou H. Diallo and Sharad Mehrotra}, editor = {Willem Jonker and Milan Petkovic}, title = {Indexing Encrypted Documents for Supporting Efficient Keyword Search}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {93--110}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_7}, doi = {10.1007/978-3-642-32873-2\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/HoreCDM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ZhangJCM12, author = {Chunwang Zhang and Junjie Jin and Ee{-}Chien Chang and Sharad Mehrotra}, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {111--129}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_8}, doi = {10.1007/978-3-642-32873-2\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ZhangJCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuLXFXC11, author = {Jie Yu and Zhoujun Li and Peng Xiao and Chengfang Fang and Jia Xu and Ee{-}Chien Chang}, title = {{ID} Repetition in Structured {P2P} Networks}, journal = {Comput. J.}, volume = {54}, number = {6}, pages = {962--975}, year = {2011}, url = {https://doi.org/10.1093/comjnl/bxr017}, doi = {10.1093/COMJNL/BXR017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuLXFXC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChangLWYY11, author = {Ee{-}Chien Chang and Liming Lu and Yongzheng Wu and Roland H. C. Yap and Jie Yu}, title = {Enhancing host security using external environment sensors}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {5}, pages = {285--299}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0130-9}, doi = {10.1007/S10207-011-0130-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChangLWYY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/FangLC11, author = {Chengfang Fang and Qiming Li and Ee{-}Chien Chang}, title = {Identity leakage mitigation on asymmetric secure sketch}, booktitle = {2011 {IEEE} International Joint Conference on Biometrics, {IJCB} 2011, Washington, DC, USA, October 11-13, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IJCB.2011.6117542}, doi = {10.1109/IJCB.2011.6117542}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icb/FangLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LiSCT11, author = {Qiming Li and Bilgehan Sahin and Ee{-}Chien Chang and Vrizlynn L. L. Thing}, title = {Content based {JPEG} fragmentation point detection}, booktitle = {Proceedings of the 2011 {IEEE} International Conference on Multimedia and Expo, {ICME} 2011, 11-15 July, 2011, Barcelona, Catalonia, Spain}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICME.2011.6011883}, doi = {10.1109/ICME.2011.6011883}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/LiSCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-6677, author = {Chengfang Fang and Ee{-}Chien Chang}, title = {Publishing Location Dataset Differential Privately with Isotonic Regression}, journal = {CoRR}, volume = {abs/1111.6677}, year = {2011}, url = {http://arxiv.org/abs/1111.6677}, eprinttype = {arXiv}, eprint = {1111.6677}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-6677.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuC11, author = {Jia Xu and Ee{-}Chien Chang}, title = {Practically Efficient Proof of Retrievability in Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2011}, url = {http://eprint.iacr.org/2011/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuC11a, author = {Jia Xu and Ee{-}Chien Chang}, title = {Towards Efficient Provable Data Possession}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2011}, url = {http://eprint.iacr.org/2011/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuC11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThingNC10, author = {Vrizlynn L. L. Thing and Kian{-}Yong Ng and Ee{-}Chien Chang}, title = {Live memory forensics of mobile phones}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S74--S82}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.010}, doi = {10.1016/J.DIIN.2010.05.010}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThingNC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FangLC10, author = {Chengfang Fang and Qiming Li and Ee{-}Chien Chang}, editor = {Jianying Zhou and Moti Yung}, title = {Secure Sketch for Multiple Secrets}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {367--383}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_22}, doi = {10.1007/978-3-642-13708-2\_22}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/FangLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FangC10, author = {Chengfang Fang and Ee{-}Chien Chang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Securing interactive sessions using mobile device through visual channel and visual inspection}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {69--78}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920272}, doi = {10.1145/1920261.1920272}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/ChooCC10, author = {Fai Cheong Choo and Mun Choon Chan and Ee{-}Chien Chang}, editor = {P. R. Kumar and Henning Schulzrinne and Harrick M. Vin}, title = {Robustness of {DTN} against routing attacks}, booktitle = {Second International Conference on Communication Systems and Networks, {COMSNETS} 2010, Bangalore, India, January 5-9, 2010}, pages = {1--10}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/COMSNETS.2010.5432014}, doi = {10.1109/COMSNETS.2010.5432014}, timestamp = {Thu, 08 Apr 2021 08:40:48 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/ChooCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ChangFX10, author = {Ee{-}Chien Chang and Chengfang Fang and Jia Xu}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {A chameleon encryption scheme resistant to known-plaintext attack}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {25--34}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866876}, doi = {10.1145/1866870.1866876}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/ChangFX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LuCC10, author = {Liming Lu and Ee{-}Chien Chang and Mun Choon Chan}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Website Fingerprinting and Identification Using Ordered Feature Sequences}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {199--214}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_13}, doi = {10.1007/978-3-642-15497-3\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LuCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChangLWYY10, author = {Ee{-}Chien Chang and Liming Lu and Yongzheng Wu and Roland H. C. Yap and Jie Yu}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Enhancing Host Security Using External Environment Sensors}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {362--379}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_21}, doi = {10.1007/978-3-642-16161-2\_21}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ChangLWYY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1003-0723, author = {Chengfang Fang and Ee{-}Chien Chang}, title = {Securing Kiosk using Mobile Devices coupled with Visual Inspection}, journal = {CoRR}, volume = {abs/1003.0723}, year = {2010}, url = {http://arxiv.org/abs/1003.0723}, eprinttype = {arXiv}, eprint = {1003.0723}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1003-0723.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuC10, author = {Jia Xu and Ee{-}Chien Chang}, title = {Authenticating Aggregate Range Queries over Multidimensional Dataset}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2010}, url = {http://eprint.iacr.org/2010/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YuCOCC09, author = {Hang Yu and Ee{-}Chien Chang and Wei Tsang Ooi and Mun Choon Chan and Wei Cheng}, title = {Integrated Optimization of Video Server Resource and Streaming Quality Over Best-Effort Network}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {19}, number = {3}, pages = {374--385}, year = {2009}, url = {https://doi.org/10.1109/TCSVT.2009.2013501}, doi = {10.1109/TCSVT.2009.2013501}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YuCOCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ChangLX09, author = {Ee{-}Chien Chang and Chee Liang Lim and Jia Xu}, editor = {Marc Fischlin}, title = {Short Redactable Signatures Using Random Trees}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {133--147}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_9}, doi = {10.1007/978-3-642-00862-7\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ChangLX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/YuFXCL09, author = {Jie Yu and Chengfang Fang and Jia Xu and Ee{-}Chien Chang and Zhoujun Li}, editor = {Henning Schulzrinne and Karl Aberer and Anwitaman Datta}, title = {{ID} Repetition in Kad}, booktitle = {Proceedings {P2P} 2009, Ninth International Conference on Peer-to-Peer Computing, 9-11 September 2009, Seattle, Washington, {USA}}, pages = {111--120}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/P2P.2009.5284551}, doi = {10.1109/P2P.2009.5284551}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/p2p/YuFXCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangLX09, author = {Ee{-}Chien Chang and Chee Liang Lim and Jia Xu}, title = {Short Redactable Signatures Using Random Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2009}, url = {http://eprint.iacr.org/2009/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangLX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuCC08, author = {Liming Lu and Mun Choon Chan and Ee{-}Chien Chang}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {A general model of probabilistic packet marking for {IP} traceback}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {179--188}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368337}, doi = {10.1145/1368310.1368337}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LuCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/LiGC08, author = {Qiming Li and Muchuan Guo and Ee{-}Chien Chang}, title = {Fuzzy extractors for asymmetric biometric representations}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} Workshops 2008, Anchorage, AK, USA, 23-28 June, 2008}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CVPRW.2008.4563113}, doi = {10.1109/CVPRW.2008.4563113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/LiGC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChangX08, author = {Ee{-}Chien Chang and Jia Xu}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Remote Integrity Check with Dishonest Storage Server}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {223--237}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_15}, doi = {10.1007/978-3-540-88313-5\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChangX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FangC08, author = {Chengfang Fang and Ee{-}Chien Chang}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Information Leakage in Optimal Anonymized and Diversified Data}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {30--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_3}, doi = {10.1007/978-3-540-88961-8\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/FangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HoC08, author = {Nicholas Zhong{-}Yang Ho and Ee{-}Chien Chang}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Residual Information of Redacted Images Hidden in the Compression Artifacts}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {87--101}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_7}, doi = {10.1007/978-3-540-88961-8\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HoC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangX08, author = {Ee{-}Chien Chang and Jia Xu}, title = {Remote Integrity Check with Dishonest Storage Server}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2008}, url = {http://eprint.iacr.org/2008/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FangC08, author = {Chengfang Fang and Ee{-}Chien Chang}, title = {Information Leakage in Optimal Anonymized and Diversified Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2008}, url = {http://eprint.iacr.org/2008/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/YeSC07, author = {Shuiming Ye and Qibin Sun and Ee{-}Chien Chang}, title = {Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {2}, pages = {48--67}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73092-7\_3}, doi = {10.1007/978-3-540-73092-7\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/YeSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DuttaCM07, author = {Ratna Dutta and Ee{-}Chien Chang and Sourav Mukhopadhyay}, editor = {Jonathan Katz and Moti Yung}, title = {Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {385--400}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_25}, doi = {10.1007/978-3-540-72738-5\_25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DuttaCM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/ChangR07, author = {Ee{-}Chien Chang and Sujoy Roy}, editor = {Seong{-}Whan Lee and Stan Z. Li}, title = {Robust Extraction of Secret Bits from Minutiae}, booktitle = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul, Korea, August 27-29, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4642}, pages = {750--759}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74549-5\_79}, doi = {10.1007/978-3-540-74549-5\_79}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/icb/ChangR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/YeSC07, author = {Shuiming Ye and Qibin Sun and Ee{-}Chien Chang}, title = {Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {12--15}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4284574}, doi = {10.1109/ICME.2007.4284574}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/YeSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcga/ChangCKPY06, author = {Ee{-}Chien Chang and Sung Woo Choi and DoYong Kwon and Hyungju Park and Chee{-}Keng Yap}, title = {Shortest Path amidst Disc Obstacles Is Computable}, journal = {Int. J. Comput. Geom. Appl.}, volume = {16}, number = {5-6}, pages = {567--590}, year = {2006}, url = {https://doi.org/10.1142/S0218195906002191}, doi = {10.1142/S0218195906002191}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcga/ChangCKPY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChanCLN06, author = {Mun Choon Chan and Ee{-}Chien Chang and Liming Lu and Peng Song Ngiam}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Effect of Malicious Synchronization}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {114--129}, year = {2006}, url = {https://doi.org/10.1007/11767480\_8}, doi = {10.1007/11767480\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChanCLN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChangST06, author = {Ee{-}Chien Chang and Ren Shen and Francis Weijian Teo}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Finding the original point set hidden among chaff}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {182--188}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128845}, doi = {10.1145/1128817.1128845}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChangST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChangL06, author = {Ee{-}Chien Chang and Qiming Li}, editor = {Serge Vaudenay}, title = {Hiding Secret Points Amidst Chaff}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {59--72}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_5}, doi = {10.1007/11761679\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChangL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grapp/ChenHYC06, author = {Chen Chen and Zhiyong Huang and Hang Yu and Ee{-}Chien Chang}, editor = {Jos{\'{e}} Braz and Joaquim A. Jorge and Miguel Sales Dias and Ad{\'{e}}rito Marcos}, title = {Progressive transmission and rendering of foveated volume data}, booktitle = {{GRAPP} 2006: Proceedings of the First International Conference on Computer Graphics Theory and Applications, Set{\'{u}}bal, Portugal, February 25-28, 2006}, pages = {67--75}, publisher = {{INSTICC} - Institute for Systems and Technologies of Information, Control and Communication}, year = {2006}, timestamp = {Thu, 23 Oct 2014 11:41:16 +0200}, biburl = {https://dblp.org/rec/conf/grapp/ChenHYC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YeSC06, author = {Shuiming Ye and Qibin Sun and Ee{-}Chien Chang}, editor = {Yun{-}Qing Shi and Byeungwoo Jeon}, title = {Error Resilient Image Authentication Using Feature Statistical and Spatial Properties}, booktitle = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4283}, pages = {461--472}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11922841\_37}, doi = {10.1007/11922841\_37}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YeSC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiC06, author = {Qiming Li and Ee{-}Chien Chang}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Robust, short and sensitive authentication tags using secure sketch}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {56--61}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161377}, doi = {10.1145/1161366.1161377}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/LiC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiC06a, author = {Qiming Li and Ee{-}Chien Chang}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Zero-knowledge watermark detection resistant to ambiguity attacks}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {158--163}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161395}, doi = {10.1145/1161366.1161395}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/LiC06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangFL06, author = {Ee{-}Chien Chang and Vadym Fedyukovych and Qiming Li}, title = {Secure Sketch for Multi-Sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2006}, url = {http://eprint.iacr.org/2006/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangFL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vc/YuCHZ05, author = {Hang Yu and Ee{-}Chien Chang and Zhiyong Huang and Zhijian Zheng}, title = {Fast rendering of foveated volumes in wavelet-based representation}, journal = {Vis. Comput.}, volume = {21}, number = {8-10}, pages = {735--744}, year = {2005}, url = {https://doi.org/10.1007/s00371-005-0331-1}, doi = {10.1007/S00371-005-0331-1}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vc/YuCHZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compgeom/ChangCKPY05, author = {Ee{-}Chien Chang and Sung Woo Choi and DoYong Kwon and Hyungju Park and Chee{-}Keng Yap}, editor = {Joseph S. B. Mitchell and G{\"{u}}nter Rote}, title = {Shortest path amidst disc obstacles is computable}, booktitle = {Proceedings of the 21st {ACM} Symposium on Computational Geometry, Pisa, Italy, June 6-8, 2005}, pages = {116--125}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1064092.1064112}, doi = {10.1145/1064092.1064112}, timestamp = {Mon, 14 Jun 2021 16:24:54 +0200}, biburl = {https://dblp.org/rec/conf/compgeom/ChangCKPY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/YeCS05, author = {Shuiming Ye and Ee{-}Chien Chang and Qibin Sun}, title = {Watermarking based Image Authentication using Feature Amplification}, booktitle = {Proceedings of the 2005 {IEEE} International Conference on Multimedia and Expo, {ICME} 2005, July 6-9, 2005, Amsterdam, The Netherlands}, pages = {610--613}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICME.2005.1521497}, doi = {10.1109/ICME.2005.1521497}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/YeCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LeeCC05, author = {Hui Huang Lee and Ee{-}Chien Chang and Mun Choon Chan}, editor = {Mauro Barni and Jordi Herrera{-}Joancomart{\'{\i}} and Stefan Katzenbeisser and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Pervasive Random Beacon in the Internet for Covert Coordination}, booktitle = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3727}, pages = {53--61}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11558859\_5}, doi = {10.1007/11558859\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/LeeCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiCC05, author = {Qiming Li and Ee{-}Chien Chang and Mun Choon Chan}, title = {On the effectiveness of DDoS attacks on statistical filtering}, booktitle = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer and Communications Societies, 13-17 March 2005, Miami, FL, {USA}}, pages = {1373--1383}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/INFCOM.2005.1498362}, doi = {10.1109/INFCOM.2005.1498362}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/YeSC05, author = {Shuiming Ye and Qibin Sun and Ee{-}Chien Chang}, title = {Error resilient content-based image authentication over wireless channel}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26 May 2005, Kobe, Japan}, pages = {2707--2710}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISCAS.2005.1465185}, doi = {10.1109/ISCAS.2005.1465185}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/YeSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/RoyCN05, author = {Sujoy Roy and Ee{-}Chien Chang and K. Natarajan}, editor = {HongJiang Zhang and Tat{-}Seng Chua and Ralf Steinmetz and Mohan S. Kankanhalli and Lynn Wilcox}, title = {A unified framework for resolving ambiguity in copy detection}, booktitle = {Proceedings of the 13th {ACM} International Conference on Multimedia, Singapore, November 6-11, 2005}, pages = {648--655}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1101149.1101294}, doi = {10.1145/1101149.1101294}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/RoyCN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsp/ZhouHSC05, author = {Zhicheng Zhou and Dajun He and Qibin Sun and Ee{-}Chien Chang}, title = {A New Watermarking Scheme Robust to Print-and-Scan}, booktitle = {{IEEE} 7th Workshop on Multimedia Signal Processing, {MMSP} 2005, October 30 2005 - November 2 2005, Shanghai, China}, pages = {1--4}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/MMSP.2005.248642}, doi = {10.1109/MMSP.2005.248642}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsp/ZhouHSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangL05, author = {Ee{-}Chien Chang and Qiming Li}, title = {Small Secure Sketch for Point-Set Difference}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2005}, url = {http://eprint.iacr.org/2005/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/RoyC04, author = {Sujoy Roy and Ee{-}Chien Chang}, title = {Watermarking with retrieval systems}, journal = {Multim. Syst.}, volume = {9}, number = {5}, pages = {433--440}, year = {2004}, url = {https://doi.org/10.1007/s00530-003-0116-1}, doi = {10.1007/S00530-003-0116-1}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mms/RoyC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/YeSC04, author = {Shuiming Ye and Qibin Sun and Ee{-}Chien Chang}, title = {Edge directed filter based error concealment for wavelet-based images}, booktitle = {Proceedings of the 2004 International Conference on Image Processing, {ICIP} 2004, Singapore, October 24-27, 2004}, pages = {809--812}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICIP.2004.1419421}, doi = {10.1109/ICIP.2004.1419421}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/YeSC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/RoyC04, author = {Sujoy Roy and Ee{-}Chien Chang}, title = {Watermarking color histograms}, booktitle = {Proceedings of the 2004 International Conference on Image Processing, {ICIP} 2004, Singapore, October 24-27, 2004}, pages = {2191--2194}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICIP.2004.1421531}, doi = {10.1109/ICIP.2004.1421531}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/RoyC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/YuNC04, author = {Hang Yu and Vu{-}Thanh Nguyen and Ee{-}Chien Chang}, title = {Rotation of foveated image in the wavelet domain}, booktitle = {Proceedings of the 2004 International Conference on Image Processing, {ICIP} 2004, Singapore, October 24-27, 2004}, pages = {2515--2518}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICIP.2004.1421614}, doi = {10.1109/ICIP.2004.1421614}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/YuNC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/NguyenCO04, author = {Vu{-}Thanh Nguyen and Ee{-}Chien Chang and Wei Tsang Ooi}, title = {Layered coding with good allocation outperforms multiple description coding over multiple paths}, booktitle = {Proceedings of the 2004 {IEEE} International Conference on Multimedia and Expo, {ICME} 2004, 27-30 June 2004, Taipei, Taiwan}, pages = {1067--1070}, publisher = {{IEEE} Computer Society}, year = {2004}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/NguyenCO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/YeSC04, author = {Shuiming Ye and Qibin Sun and Ee{-}Chien Chang}, title = {Error concealment for {JPEG2000} images based on orthogonal edge directed filters}, booktitle = {Proceedings of the 2004 {IEEE} International Conference on Multimedia and Expo, {ICME} 2004, 27-30 June 2004, Taipei, Taiwan}, pages = {1663--1666}, publisher = {{IEEE} Computer Society}, year = {2004}, timestamp = {Mon, 23 May 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/YeSC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiC04, author = {Qiming Li and Ee{-}Chien Chang}, editor = {Jessica J. Fridrich}, title = {On the Possibility of Non-invertible Watermarking Schemes}, booktitle = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3200}, pages = {13--24}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30114-1\_2}, doi = {10.1007/978-3-540-30114-1\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/YangTC04, author = {Xianfeng Yang and Qi Tian and Ee{-}Chien Chang}, editor = {Henning Schulzrinne and Nevenka Dimitrova and Martina Angela Sasse and Sue B. Moon and Rainer Lienhart}, title = {A color fingerprint of video shot for content identification}, booktitle = {Proceedings of the 12th {ACM} International Conference on Multimedia, New York, NY, USA, October 10-16, 2004}, pages = {276--279}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1027527.1027590}, doi = {10.1145/1027527.1027590}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/YangTC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmm/AtreyYCK04, author = {Pradeep K. Atrey and Wei{-}Qi Yan and Ee{-}Chien Chang and Mohan S. Kankanhalli}, editor = {Yi{-}Ping Phoebe Chen}, title = {A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing}, booktitle = {10th International Multimedia Modeling Conference {(MMM} 2004), 5-7 January 2004, Brisbane, Australia}, pages = {330--337}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/MULMM.2004.1265004}, doi = {10.1109/MULMM.2004.1265004}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmm/AtreyYCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/visualization/YuCHZ04, author = {Hang Yu and Ee{-}Chien Chang and Zhiyong Huang and Zhijian Zheng}, title = {Fast Rendering of Foveated Volume in the Wavelet Domain}, booktitle = {15th {IEEE} Visualization Conference, {IEEE} Vis 2004, Austin, TX, USA, October 10-15, 2004, Proceedings}, pages = {26}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/VISUAL.2004.31}, doi = {10.1109/VISUAL.2004.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/visualization/YuCHZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/ChangKGHW03, author = {Ee{-}Chien Chang and Mohan S. Kankanhalli and Xin Guan and Zhiyong Huang and Yinghui Wu}, title = {Robust image authentication using content based compression}, journal = {Multim. Syst.}, volume = {9}, number = {2}, pages = {121--130}, year = {2003}, url = {https://doi.org/10.1007/s00530-003-0083-6}, doi = {10.1007/S00530-003-0083-6}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mms/ChangKGHW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scheduling/ChangY03, author = {Ee{-}Chien Chang and Chee{-}Keng Yap}, title = {Competitive On-Line Scheduling with Level of Service}, journal = {J. Sched.}, volume = {6}, number = {3}, pages = {251--267}, year = {2003}, url = {https://doi.org/10.1023/A:1022904408360}, doi = {10.1023/A:1022904408360}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scheduling/ChangY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/graphite/WuCHK03, author = {Yinghui Wu and Ee{-}Chien Chang and Zhiyong Huang and Mohan S. Kankanhalli}, editor = {Matt Adcock and Ian Gwilt and Yong Tsui Lee}, title = {Feature extraction of volume data based on multi-scale representation}, booktitle = {Proceedings of the 1st International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2003, Melbourne, Australia, February 11-14, 2003}, pages = {175--180}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/604471.604506}, doi = {10.1145/604471.604506}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/graphite/WuCHK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/graphite/ChangHKX03, author = {Ee{-}Chien Chang and Zhiyong Huang and Mohan S. Kankanhalli and Rong Xu}, editor = {Matt Adcock and Ian Gwilt and Yong Tsui Lee}, title = {A 3D shape matching framework}, booktitle = {Proceedings of the 1st International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2003, Melbourne, Australia, February 11-14, 2003}, pages = {269--270}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/604471.604530}, doi = {10.1145/604471.604530}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/graphite/ChangHKX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/RoyC03, author = {Sujoy Roy and Ee{-}Chien Chang}, title = {Watermarking with knowledge of image database}, booktitle = {Proceedings of the 2003 International Conference on Image Processing, {ICIP} 2003, Barcelona, Catalonia, Spain, September 14-18, 2003}, pages = {471--474}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICIP.2003.1246719}, doi = {10.1109/ICIP.2003.1246719}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/RoyC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/LiC03, author = {Qiming Li and Ee{-}Chien Chang}, editor = {Ton Kalker and Ingemar J. Cox and Yong Man Ro}, title = {Public Watermark Detection Using Multiple Proxies and Secret Sharing}, booktitle = {Digital Watermarking, Second International Workshop, {IWDW} 2003, Seoul, Korea, October 20-22, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2939}, pages = {558--569}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24624-4\_45}, doi = {10.1007/978-3-540-24624-4\_45}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/LiC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/YuC03, author = {Hang Yu and Ee{-}Chien Chang}, editor = {Lise Getoor and Ted E. Senator and Pedro M. Domingos and Christos Faloutsos}, title = {Distributed multivariate regression based on influential observations}, booktitle = {Proceedings of the Ninth {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24 - 27, 2003}, pages = {679--684}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/956750.956839}, doi = {10.1145/956750.956839}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kdd/YuC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiC02, author = {Qiming Li and Ee{-}Chien Chang}, editor = {Fabien A. P. Petitcolas}, title = {Security of Public Watermarking Schemes for Binary Sequences}, booktitle = {Information Hiding, 5th International Workshop, {IH} 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2578}, pages = {119--128}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36415-3\_8}, doi = {10.1007/3-540-36415-3\_8}, timestamp = {Sun, 02 Oct 2022 16:07:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/StoneOCM01, author = {Harold S. Stone and Michael T. Orchard and Ee{-}Chien Chang and Stephen A. Martucci}, title = {A fast direct Fourier-based algorithm for subpixel registration of images}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {39}, number = {10}, pages = {2235--2243}, year = {2001}, url = {https://doi.org/10.1109/36.957286}, doi = {10.1109/36.957286}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tgrs/StoneOCM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/ChangY01, author = {Ee{-}Chien Chang and Chee{-}Keng Yap}, editor = {Jie Wang}, title = {Competitive Online Scheduling with Level of Service}, booktitle = {Computing and Combinatorics, 7th Annual International Conference, {COCOON} 2001, Guilin, China, August 20-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2108}, pages = {453--462}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44679-6\_51}, doi = {10.1007/3-540-44679-6\_51}, timestamp = {Mon, 03 Aug 2020 14:08:01 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/ChangY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egmm/KankanhalliCGHW01, author = {Mohan S. Kankanhalli and Ee{-}Chien Chang and Xin Guan and Zhiyong Huang and Yinghui Wu}, editor = {Joaquim A. Jorge and Nuno Correia and H. Jones and M. B. Kamegai}, title = {Authentication of Volume Data Using Wavelet-Based Foveation}, booktitle = {Proceedings of the Eurographics Multimedia Workshop 2001, Manchester, United Kingdom, September 8-9, 2001}, pages = {119--130}, publisher = {Eurographics Association}, year = {2001}, url = {https://doi.org/10.2312/EGMM/egmm01/119-130}, doi = {10.2312/EGMM/EGMM01/119-130}, timestamp = {Thu, 06 Sep 2018 16:17:40 +0200}, biburl = {https://dblp.org/rec/conf/egmm/KankanhalliCGHW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/ChangY00, author = {Ee{-}Chien Chang and Chee{-}Keng Yap}, title = {A Simultaneous Search Problem}, journal = {Algorithmica}, volume = {26}, number = {2}, pages = {255--262}, year = {2000}, url = {https://doi.org/10.1007/s004539910012}, doi = {10.1007/S004539910012}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithmica/ChangY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ChangO00, author = {Ee{-}Chien Chang and Michael T. Orchard}, title = {Geometric Properties of Watermarking Schemes}, booktitle = {Proceedings of the 2000 International Conference on Image Processing, {ICIP} 2000, Vancouver, BC, Canada, September 10-13, 2000}, pages = {714--717}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/ICIP.2000.899554}, doi = {10.1109/ICIP.2000.899554}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/ChangO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Chang98, author = {Ee{-}Chien Chang}, title = {Foveation Techniques and Scheduling Issues in Thinwire Visualization}, school = {New York University, {USA}}, year = {1998}, url = {https://cs.nyu.edu/media/publications/chang\_ee-chien.pdf}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Chang98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compgeom/ChangY97, author = {Ee{-}Chien Chang and Chee{-}Keng Yap}, editor = {Jean{-}Daniel Boissonnat}, title = {A Wavelet Approach to Foveating Images}, booktitle = {Proceedings of the Thirteenth Annual Symposium on Computational Geometry, Nice, France, June 4-6, 1997}, pages = {397--399}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/262839.263024}, doi = {10.1145/262839.263024}, timestamp = {Mon, 14 Jun 2021 16:25:04 +0200}, biburl = {https://dblp.org/rec/conf/compgeom/ChangY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ChangY95, author = {Ee{-}Chien Chang and Chee{-}Keng Yap}, title = {A Note on Improved Deterministic Time Simulation of Nondeterministic Space for Small Space}, journal = {Inf. Process. Lett.}, volume = {55}, number = {3}, pages = {155--157}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(95)00093-R}, doi = {10.1016/0020-0190(95)00093-R}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/ChangY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ChangWK93, author = {Ee{-}Chien Chang and Weiguo Wang and Mohan S. Kankanhalli}, title = {Multidimensional On-Line Bin-Packing: An Algorithm and its Average-Case Analysis}, journal = {Inf. Process. Lett.}, volume = {48}, number = {3}, pages = {121--125}, year = {1993}, url = {https://doi.org/10.1016/0020-0190(93)90253-6}, doi = {10.1016/0020-0190(93)90253-6}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/ChangWK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.