Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Fu-Hau Hsu
@article{DBLP:journals/information/HsuWHCHWL23, author = {Fu{-}Hau Hsu and Min{-}Hao Wu and Yanling Hwang and Jian{-}Xin Chen and Jian{-}Hong Huang and Hao{-}Jyun Wang and Yi{-}Wen Lai}, title = {Defending IoT Devices against Bluetooth Worms with Bluetooth {OBEX} Proxy}, journal = {Inf.}, volume = {14}, number = {10}, pages = {525}, year = {2023}, url = {https://doi.org/10.3390/info14100525}, doi = {10.3390/INFO14100525}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/HsuWHCHWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/HsuWOLZ21, author = {Fu{-}Hau Hsu and Jyun{-}Shao Wu and Chih{-}Wen Ou and Tzu{-}Chi Liu and Yung{-}Yu Zhuang}, title = {IoTD: An approach to identify E-mails sent by IoT devices}, journal = {Comput. Commun.}, volume = {179}, pages = {62--72}, year = {2021}, url = {https://doi.org/10.1016/j.comcom.2021.07.024}, doi = {10.1016/J.COMCOM.2021.07.024}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/HsuWOLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/WangYHLLZ21, author = {Chun{-}Yi Wang and Chi{-}Yu You and Fu{-}Hau Hsu and Chia{-}Hao Lee and Che{-}Hao Liu and YungYu Zhuang}, title = {{SMS} Observer: {A} dynamic mechanism to analyze the behavior of SMS-based malware}, journal = {J. Parallel Distributed Comput.}, volume = {156}, pages = {25--37}, year = {2021}, url = {https://doi.org/10.1016/j.jpdc.2021.05.004}, doi = {10.1016/J.JPDC.2021.05.004}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/WangYHLLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HsuLWHZ21, author = {Fu{-}Hau Hsu and Chia{-}Hao Lee and Chun{-}Yi Wang and Rui{-}Yi Hung and YungYu Zhuang}, title = {DDoS Flood and Destination Service Changing Sensor}, journal = {Sensors}, volume = {21}, number = {6}, pages = {1980}, year = {2021}, url = {https://doi.org/10.3390/s21061980}, doi = {10.3390/S21061980}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HsuLWHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HsuLHLWC21, author = {Fu{-}Hau Hsu and Nien{-}Chi Liu and Yanling Hwang and Che{-}Hao Liu and Chuan{-}Sheng Wang and Chang{-}Yi Chen}, title = {{DPC:} {A} Dynamic Permission Control Mechanism for Android Third-Party Libraries}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1751--1761}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2937925}, doi = {10.1109/TDSC.2019.2937925}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HsuLHLWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icce-tw/WuHL21, author = {Jyun{-}Shao Wu and Fu{-}Hau Hsu and Chia{-}Hao Lee}, title = {Identifying IoT Devices with {SMTP}}, booktitle = {{IEEE} International Conference on Consumer Electronics-Taiwan, {ICCE-TW} 2021, Penghu, Taiwan, September 15-17, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCE-TW52618.2021.9603238}, doi = {10.1109/ICCE-TW52618.2021.9603238}, timestamp = {Tue, 23 Nov 2021 09:27:55 +0100}, biburl = {https://dblp.org/rec/conf/icce-tw/WuHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/HsuWOH20, author = {Fu{-}Hau Hsu and Chuan{-}Sheng Wang and Chih{-}Wen Ou and Yu{-}Liang Hsu}, title = {A passive user-side solution for evil twin access point detection at public hotspots}, journal = {Int. J. Commun. Syst.}, volume = {33}, number = {14}, year = {2020}, url = {https://doi.org/10.1002/dac.4460}, doi = {10.1002/DAC.4460}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/HsuWOH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icce-tw/HungHL20, author = {Rui{-}Yi Hung and Fu{-}Hau Hsu and Chia{-}Hao Lee}, title = {A Kernel Module Based Mechanism to Establish a {TCP/IP} Connection When Destination Service Changing}, booktitle = {{IEEE} International Conference on Consumer Electronics - Taiwan, {ICCE-TW} 2020, Taoyuan, Taiwan, September 28-30, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCE-Taiwan49838.2020.9258258}, doi = {10.1109/ICCE-TAIWAN49838.2020.9258258}, timestamp = {Wed, 24 Nov 2021 09:22:55 +0100}, biburl = {https://dblp.org/rec/conf/icce-tw/HungHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/HsuHW19, author = {Fu{-}Hau Hsu and Yu{-}Liang Hsu and Chuan{-}Sheng Wang}, title = {A solution to detect the existence of a malicious rogue {AP}}, journal = {Comput. Commun.}, volume = {142-143}, pages = {62--68}, year = {2019}, url = {https://doi.org/10.1016/j.comcom.2019.03.013}, doi = {10.1016/J.COMCOM.2019.03.013}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/HsuHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/OuHL19, author = {Chih{-}Wen Ou and Fu{-}Hau Hsu and Chia{-}Min Lai}, title = {Keep Rogue IoT Away: IoT Detector Based on Diversified {TLS} Negotiation}, booktitle = {2019 {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August 5-8, 2019}, pages = {548--555}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00109}, doi = {10.1109/DASC/PICOM/CBDCOM/CYBERSCITECH.2019.00109}, timestamp = {Sun, 10 Nov 2019 16:47:28 +0100}, biburl = {https://dblp.org/rec/conf/dasc/OuHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/HsuHCLWKZ18, author = {Fu{-}Hau Hsu and Yanling Hwang and Kai{-}Wei Chang and Chia{-}Hao Lee and Chuan{-}Sheng Wang and Chuan{-}Kai Kao and Zhi{-}Yao Zhong}, title = {Handover: {A} mechanism to improve the reliability and availability of network services for clients behind a network address translator}, journal = {Comput. Electr. Eng.}, volume = {67}, pages = {159--169}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2018.03.020}, doi = {10.1016/J.COMPELECENG.2018.03.020}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/HsuHCLWKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/HsuHLLCH18, author = {Fu{-}Hau Hsu and Yanling Hwang and Chia{-}Hao Lee and Chieh{-}Ju Lin and Kai{-}Wei Chang and Chen{-}Chia Huang}, title = {A Cloud-based Protection approach against JavaScript-based attacks to browsers}, journal = {Comput. Electr. Eng.}, volume = {68}, pages = {241--251}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2018.03.050}, doi = {10.1016/J.COMPELECENG.2018.03.050}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/HsuHLLCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/HsuWHCH17, author = {Fu{-}Hau Hsu and Chuan{-}Sheng Wang and Yu{-}Liang Hsu and Yung{-}Pin Cheng and Yu{-}Hsiang Hsneh}, title = {A client-side detection mechanism for evil twins}, journal = {Comput. Electr. Eng.}, volume = {59}, pages = {76--85}, year = {2017}, url = {https://doi.org/10.1016/j.compeleceng.2015.10.010}, doi = {10.1016/J.COMPELECENG.2015.10.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/HsuWHCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HsuOHCL17, author = {Fu{-}Hau Hsu and Chih{-}Wen Ou and Yanling Hwang and Ya{-}Ching Chang and Po{-}Ching Lin}, title = {Detecting Web-Based Botnets Using Bot Communication Traffic Features}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {5960307:1--5960307:11}, year = {2017}, url = {https://doi.org/10.1155/2017/5960307}, doi = {10.1155/2017/5960307}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HsuOHCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/WangHHCC16, author = {Chun{-}Yi Wang and Chieh{-}Wei Huang and Fu{-}Hau Hsu and Shih{-}Jen Chen and Yao{-}Hsin Chen}, title = {Libra: An Adaptive Method for Protecting Memory from Arbitrary Overwrite}, journal = {J. Comput.}, volume = {11}, number = {4}, pages = {280--288}, year = {2016}, url = {https://doi.org/10.17706/jcp.11.4.280-288}, doi = {10.17706/JCP.11.4.280-288}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/WangHHCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HsuHHCWTLLH16, author = {Fu{-}Hau Hsu and Yu{-}Liang Hsu and Yanling Hwang and Li{-}Han Chen and Chuan{-}Sheng Wang and Chang{-}Kuo Tso and Szu{-}Chi Liu and Po{-}Ching Lin and Chi{-}Hsien Hsu}, title = {{VRS:} a values-based reputation system for web services}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {6335--6350}, year = {2016}, url = {https://doi.org/10.1002/sec.1704}, doi = {10.1002/SEC.1704}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HsuHHCWTLLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/HsuWOW16, author = {Fu{-}Hau Hsu and Min{-}Hao Wu and Syun{-}Cheng Ou and Shiuh{-}Jeng Wang}, title = {Data concealments with high privacy in new technology file system}, journal = {J. Supercomput.}, volume = {72}, number = {1}, pages = {120--140}, year = {2016}, url = {https://doi.org/10.1007/s11227-015-1492-y}, doi = {10.1007/S11227-015-1492-Y}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/HsuWOW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/HsuHWLJJ15, author = {Fu{-}Hau Hsu and Chi{-}Hsien Hsu and Chuan{-}Sheng Wang and Pei{-}Hsun Lee and Ruei{-}Min Jiang and Jia{-}Sian Jhang}, title = {Bypass Cell-phone-verification Through a Smartphone-based Botnet}, journal = {J. Inf. Sci. Eng.}, volume = {31}, number = {3}, pages = {1097--1111}, year = {2015}, url = {http://www.iis.sinica.edu.tw/page/jise/2015/201505\_18.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/HsuHWLJJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HsuWCW15, author = {Fu{-}Hau Hsu and Min{-}Hao Wu and Yi{-}Wen Chang and Shiuh{-}Jeng Wang}, title = {Web security in a windows system as PrivacyDefender in private browsing mode}, journal = {Multim. Tools Appl.}, volume = {74}, number = {5}, pages = {1667--1688}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-2003-5}, doi = {10.1007/S11042-014-2003-5}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HsuWCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HsuCL15, author = {Fu{-}Hau Hsu and Li{-}Han Chen and Chia{-}Jun Lin}, title = {Defeat scanning worms in cyber warfare}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {715--726}, year = {2015}, url = {https://doi.org/10.1002/sec.1019}, doi = {10.1002/SEC.1019}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HsuCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/WangJWCHC15, author = {Chun{-}Yi Wang and Ya{-}Lyue Jhao and Chuan{-}Sheng Wang and Shih{-}Jen Chen and Fu{-}Hau Hsu and Yao{-}Hsin Chen}, title = {The bilateral communication-based dynamic extensible honeypot}, booktitle = {International Carnahan Conference on Security Technology, {ICCST} 2015, Taipei, Taiwan, September 21-24, 2015}, pages = {263--268}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CCST.2015.7389693}, doi = {10.1109/CCST.2015.7389693}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iccst/WangJWCHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/HsuWHTCL14, author = {Fu{-}Hau Hsu and Chuan{-}Sheng Wang and Chi{-}Hsien Hsu and Chang{-}Kuo Tso and Li{-}Han Chen and Song{-}Hui Lin}, title = {Detect Fast-Flux Domains Through Response Time Differences}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {32}, number = {10}, pages = {1947--1956}, year = {2014}, url = {https://doi.org/10.1109/JSAC.2014.2358814}, doi = {10.1109/JSAC.2014.2358814}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/HsuWHTCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/HsuWYW14, author = {Fu{-}Hau Hsu and Min{-}Hao Wu and Cheng{-}Hsing Yang and Shiuh{-}Jeng Wang}, title = {Image reversibility in data embedding on the basis of blocking-predictions}, journal = {Peer-to-Peer Netw. Appl.}, volume = {7}, number = {4}, pages = {723--736}, year = {2014}, url = {https://doi.org/10.1007/s12083-013-0212-8}, doi = {10.1007/S12083-013-0212-8}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/HsuWYW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/HsuWYW14, author = {Fu{-}Hau Hsu and Min{-}Hao Wu and Cheng{-}Hsing Yang and Shiuh{-}Jeng Wang}, title = {Visible watermarking with reversibility of multimedia images for ownership declarations}, journal = {J. Supercomput.}, volume = {70}, number = {1}, pages = {247--268}, year = {2014}, url = {https://doi.org/10.1007/s11227-014-1258-y}, doi = {10.1007/S11227-014-1258-Y}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/HsuWYW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnoms/LiHCWCH14, author = {Chia{-}Heng Li and Fu{-}Hau Hsu and Shih{-}Jen Chen and Chuan{-}Sheng Wang and Yao{-}Hsin Chen and Yanling Hwang}, title = {Hawkeye: Finding spamming accounts}, booktitle = {The 16th Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2014, Hsinchu, Taiwan, September 17-19, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/APNOMS.2014.6996106}, doi = {10.1109/APNOMS.2014.6996106}, timestamp = {Wed, 13 Nov 2019 15:14:09 +0100}, biburl = {https://dblp.org/rec/conf/apnoms/LiHCWCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ChenHHSKC13, author = {Li{-}Han Chen and Fu{-}Hau Hsu and Yanling Hwang and Mu{-}Chun Su and Wei{-}Shinn Ku and Chi{-}Hsuan Chang}, title = {{ARMORY:} An automatic security testing tool for buffer overflow defect detection}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {7}, pages = {2233--2242}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2012.07.005}, doi = {10.1016/J.COMPELECENG.2012.07.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/ChenHHSKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HsuWW13, author = {Fu{-}Hau Hsu and Min{-}Hao Wu and Shiuh{-}Jeng Wang}, title = {Reversible data hiding using side-match predictions on steganographic images}, journal = {Multim. Tools Appl.}, volume = {67}, number = {3}, pages = {571--591}, year = {2013}, url = {https://doi.org/10.1007/s11042-012-1047-7}, doi = {10.1007/S11042-012-1047-7}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HsuWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/HsuWWH13, author = {Fu{-}Hau Hsu and Min{-}Hao Wu and Shiuh{-}Jeng Wang and Chia{-}Ling Huang}, title = {Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion}, journal = {J. Supercomput.}, volume = {66}, number = {2}, pages = {812--828}, year = {2013}, url = {https://doi.org/10.1007/s11227-013-0896-9}, doi = {10.1007/S11227-013-0896-9}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/HsuWWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HsuWTHC12, author = {Fu{-}Hau Hsu and Min{-}Hao Wu and Chang{-}Kuo Tso and Chi{-}Hsien Hsu and Chieh{-}Wen Chen}, title = {Antivirus Software Shield Against Antivirus Terminators}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {5}, pages = {1439--1447}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2206028}, doi = {10.1109/TIFS.2012.2206028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HsuWTHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/HsuWW12, author = {Fu{-}Hau Hsu and Min{-}Hao Wu and Shiuh{-}Jeng Wang}, editor = {Bernady O. Apduhan and Ching{-}Hsien Hsu and Tadashi Dohi and Kenji Ishida and Laurence Tianruo Yang and Jianhua Ma}, title = {Dual-Watermarking by QR-code Applications in Image Processing}, booktitle = {9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, {UIC/ATC} 2012, Fukuoka, Japan, September 4-7, 2012}, pages = {638--643}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/UIC-ATC.2012.91}, doi = {10.1109/UIC-ATC.2012.91}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/HsuWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ChenHHOLL11, author = {Li{-}Han Chen and Fu{-}Hau Hsu and Cheng{-}Hsien Huang and Chih{-}Wen Ou and Chia{-}Jun Lin and Szu{-}Chi Liu}, title = {A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks}, journal = {J. Inf. Sci. Eng.}, volume = {27}, number = {3}, pages = {869--890}, year = {2011}, url = {http://www.iis.sinica.edu.tw/page/jise/2011/201105\_05.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ChenHHOLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/HsuTYWC11, author = {Fu{-}Hau Hsu and Chang{-}Kuo Tso and Yi{-}Chun Yeh and Wei{-}Jen Wang and Li{-}Han Chen}, title = {BrowserGuard: {A} Behavior-Based Solution to Drive-by-Download Attacks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {29}, number = {7}, pages = {1461--1468}, year = {2011}, url = {https://doi.org/10.1109/JSAC.2011.110811}, doi = {10.1109/JSAC.2011.110811}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/HsuTYWC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgec/WuHYW11, author = {Min{-}Hao Wu and Fu{-}Hau Hsu and Cheng{-}Hsing Yang and Shiuh{-}Jeng Wang}, editor = {Junzo Watada and Pau{-}Choo Chung and Jim{-}Min Lin and Chin{-}Shiuh Shieh and Jeng{-}Shyang Pan}, title = {Reversible Watermarking Scheme with Visibility Using Randomize Distance}, booktitle = {Fifth International Conference on Genetic and Evolutionary Computing, {ICGEC} 2011, Kinmen, Taiwan / Xiamen, China, August 29 - September 1, 2011}, pages = {204--207}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICGEC.2011.56}, doi = {10.1109/ICGEC.2011.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgec/WuHYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rvsp/ZhangLCHHH11, author = {Kaixiang Zhang and Chia{-}Jun Lin and Shih{-}Jen Chen and Yanling Hwang and Hao{-}Lun Huang and Fu{-}Hau Hsu}, editor = {Tien{-}Szu Pan and Mong{-}Fong Horng and Jianrong Tan and Jeng{-}Shyang Pan}, title = {TransSQL: {A} Translation and Validation-Based Solution for SQL-injection Attacks}, booktitle = {First International Conference on Robot, Vision and Signal Processing, {RVSP} 2011, Kaohsiung City, Taiwan, November 21-23, 2011}, pages = {248--251}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/RVSP.2011.59}, doi = {10.1109/RVSP.2011.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rvsp/ZhangLCHHH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/SuLH10, author = {Mu{-}Chun Su and Hsu{-}Hsun Lo and Fu{-}Hau Hsu}, title = {A neural tree and its application to spam e-mail detection}, journal = {Expert Syst. Appl.}, volume = {37}, number = {12}, pages = {7976--7985}, year = {2010}, url = {https://doi.org/10.1016/j.eswa.2010.04.038}, doi = {10.1016/J.ESWA.2010.04.038}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/SuLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaciii/SuWHWHLH10, author = {Mu{-}Chun Su and Shao{-}Jui Wang and Chen{-}Ko Huang and Pa{-}Chun Wang and Fu{-}Hau Hsu and Shih{-}Chieh Lin and Yi{-}Zeng Hsieh}, title = {A Signal-Representation-Based Parser to Extract Text-Based Information from the Web}, journal = {J. Adv. Comput. Intell. Intell. Informatics}, volume = {14}, number = {5}, pages = {531--539}, year = {2010}, url = {https://doi.org/10.20965/jaciii.2010.p0531}, doi = {10.20965/JACIII.2010.P0531}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaciii/SuWHWHLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/HsuHHOCC10, author = {Fu{-}Hau Hsu and Cheng{-}Hsien Huang and Chi{-}Hsien Hsu and Chih{-}Wen Ou and Li{-}Han Chen and Ping{-}Cheng Chiu}, title = {{HSP:} {A} solution against heap sprays}, journal = {J. Syst. Softw.}, volume = {83}, number = {11}, pages = {2227--2236}, year = {2010}, url = {https://doi.org/10.1016/j.jss.2010.06.045}, doi = {10.1016/J.JSS.2010.06.045}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/HsuHHOCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/WangVHT10, author = {Wei{-}Jen Wang and Carlos A. Varela and Fu{-}Hau Hsu and Cheng{-}Hsien Tang}, editor = {Paolo Bellavista and Ruay{-}Shiung Chang and Han{-}Chieh Chao and Shin{-}Feng Lin and Peter M. A. Sloot}, title = {Actor Garbage Collection Using Vertex-Preserving Actor-to-Object Graph Transformations}, booktitle = {Advances in Grid and Pervasive Computing, 5th International Conference, {GPC} 2010, Hualien, Taiwan, May 10-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6104}, pages = {244--255}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13067-0\_28}, doi = {10.1007/978-3-642-13067-0\_28}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/gpc/WangVHT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/HsuGC06, author = {Fu{-}Hau Hsu and Fanglu Guo and Tzi{-}cker Chiueh}, editor = {Laxmi N. Bhuyan and Michel Dubois and Will Eatherton}, title = {Scalable network-based buffer overflow attack detection}, booktitle = {Proceedings of the 2006 {ACM/IEEE} Symposium on Architecture for Networking and Communications Systems, {ANCS} 2006, San Jose, California, USA, December 3-5, 2006}, pages = {163--172}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1185347.1185370}, doi = {10.1145/1185347.1185370}, timestamp = {Tue, 07 Dec 2021 14:33:43 +0100}, biburl = {https://dblp.org/rec/conf/ancs/HsuGC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HsuC04, author = {Fu{-}Hau Hsu and Tzi{-}cker Chiueh}, title = {{CTCP:} {A} Transparent Centralized {TCP/IP} Architecture for Network Security}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {335--344}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.14}, doi = {10.1109/CSAC.2004.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HsuC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/HsuC03, author = {Fu{-}Hau Hsu and Tzi{-}cker Chiueh}, title = {A Path Information Caching and Aggregation Approach to Traffic Source Identification}, booktitle = {23rd International Conference on Distributed Computing Systems {(ICDCS} 2003), 19-22 May 2003, Providence, RI, {USA}}, pages = {332--339}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICDCS.2003.1203482}, doi = {10.1109/ICDCS.2003.1203482}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/HsuC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ChiuehGNLSSCLJZHGD02, author = {Tzi{-}cker Chiueh and Kartik Gopalan and Anindya Neogi and Chang Li and Srikant Sharma and Sheng{-}Ming Shan and Jiawu Chen and Wei Li and Nikolai Joukov and Jie Zhang and Fu{-}Hau Hsu and Fanglu Guo and Sheng{-}I Doong}, title = {Sago: {A} Network Resource Management System for Real-Time Content Distribution}, booktitle = {9th International Conference on Parallel and Distributed Systems, {ICPADS} 2002, Taiwan, ROC, December 17-20, 2002}, pages = {557--562}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICPADS.2002.1183456}, doi = {10.1109/ICPADS.2002.1183456}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ChiuehGNLSSCLJZHGD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ChiuehH01, author = {Tzi{-}cker Chiueh and Fu{-}Hau Hsu}, title = {{RAD:} {A} Compile-Time Solution to Buffer Overflow Attacks}, booktitle = {Proceedings of the 21st International Conference on Distributed Computing Systems {(ICDCS} 2001), Phoenix, Arizona, USA, April 16-19, 2001}, pages = {409--417}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICDSC.2001.918971}, doi = {10.1109/ICDSC.2001.918971}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ChiuehH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.