default search action
Ee-Chien Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j24]Han Fang, Yupeng Qiu, Guorui Qin, Jiyi Zhang, Kejiang Chen, Weiming Zhang, Ee-Chien Chang:
DP2Dataset Protection by Data Poisoning. IEEE Trans. Dependable Secur. Comput. 21(2): 636-649 (2024) - [c106]Zhiang Li, Daisuke Mashima, Wen Shei Ong, Ertem Esiner, Zbigniew Kalbarczyk, Ee-Chien Chang:
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers. AsiaCCS 2024 - [c105]Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang:
DISCO: Dynamic Searchable Encryption with Constant State. AsiaCCS 2024 - [i53]Jiyi Zhang, Han Fang, Ee-Chien Chang:
Domain Bridge: Generative model-based domain forensic for black-box models. CoRR abs/2402.04640 (2024) - [i52]Jiawei Liang, Siyuan Liang, Man Luo, Aishan Liu, Dongchen Han, Ee-Chien Chang, Xiaochun Cao:
VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models. CoRR abs/2402.13851 (2024) - [i51]Xiaoxia Li, Siyuan Liang, Jiyi Zhang, Han Fang, Aishan Liu, Ee-Chien Chang:
Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs. CoRR abs/2402.14872 (2024) - [i50]Zhiang Li, Daisuke Mashima, Wen Shei Ong, Ertem Esiner, Zbigniew Kalbarczyk, Ee-Chien Chang:
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers. CoRR abs/2403.05448 (2024) - [i49]Siyuan Liang, Kuanrong Liu, Jiajun Gong, Jiawei Liang, Yuan Xun, Ee-Chien Chang, Xiaochun Cao:
Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning. CoRR abs/2403.16257 (2024) - [i48]Siyuan Liang, Wei Wang, Ruoyu Chen, Aishan Liu, Boxi Wu, Ee-Chien Chang, Xiaochun Cao, Dacheng Tao:
Object Detectors in the Open Environment: Challenges, Solutions, and Outlook. CoRR abs/2403.16271 (2024) - [i47]Daisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalbarczyk, S. M. Suhail Hussain, Ee-Chien Chang:
Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training. CoRR abs/2404.00869 (2024) - [i46]Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang:
AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models. CoRR abs/2405.04753 (2024) - [i45]Siyuan Liang, Jiawei Liang, Tianyu Pang, Chao Du, Aishan Liu, Ee-Chien Chang, Xiaochun Cao:
Revisiting Backdoor Attacks against Large Vision-Language Models. CoRR abs/2406.18844 (2024) - [i44]Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang:
DISCO: Dynamic Searchable Encryption with Constant State. IACR Cryptol. ePrint Arch. 2024: 950 (2024) - 2023
- [j23]Muhammad M. Roomi, S. M. Suhail Hussain, Daisuke Mashima, Ee-Chien Chang, Taha Selim Ustun:
Analysis of False Data Injection Attacks Against Automated Control for Parallel Generators in IEC 61850-Based Smart Grid Systems. IEEE Syst. J. 17(3): 4603-4614 (2023) - [j22]S. M. Suhail Hussain, Chen Yaohao, Muhammad M. Roomi, Daisuke Mashima, Ee-Chien Chang:
An open-source framework for publishing/subscribing IEC 61850 R-GOOSE and R-SV. SoftwareX 23: 101415 (2023) - [j21]Han Fang, Zhaoyang Jia, Yupeng Qiu, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
De-END: Decoder-Driven Watermarking Network. IEEE Trans. Multim. 25: 7571-7581 (2023) - [c104]Han Fang, Yupeng Qiu, Kejiang Chen, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions. AAAI 2023: 5054-5061 - [c103]Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren:
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. AAAI 2023: 10871-10879 - [c102]Jianli Bai, Xiangfu Song, Xiaowu Zhang, Qifan Wang, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication. ACSAC 2023: 799-813 - [c101]Jiyi Zhang, Han Fang, Wesley Joon-Wie Tann, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers. AsiaCCS 2023: 704-715 - [c100]Daisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalberczyk, S. M. Suhail Hussain, Ee-Chien Chang:
Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training. DSN-S 2023: 49-55 - [c99]Wesley Joon-Wie Tann, Ee-Chien Chang:
Poisoning Online Learning Filters by Shifting on the Move. DSN 2023: 239-251 - [c98]Han Fang, Jiyi Zhang, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. ICCV 2023: 4312-4321 - [c97]S. M. Suhail Hussain, Muhammad M. Roomi, Daisuke Mashima, Ee-Chien Chang:
End-to-End Performance Evaluation of R-SV / R-GOOSE Messages for Wide Area Protection and Control Applications. ISGT 2023: 1-5 - [c96]Han Fang, Kejiang Chen, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Weiming Zhang, Ee-Chien Chang:
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness. ACM Multimedia 2023: 7345-7353 - [i43]Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. CoRR abs/2301.01218 (2023) - [i42]Jiyi Zhang, Han Fang, Hwee Kuan Lee, Ee-Chien Chang:
Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation. CoRR abs/2305.05869 (2023) - [i41]Jiyi Zhang, Han Fang, Ee-Chien Chang:
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks. CoRR abs/2306.01400 (2023) - [i40]Wesley Joon-Wie Tann, Yuancheng Liu, Jun Heng Sim, Choon Meng Seah, Ee-Chien Chang:
Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions. CoRR abs/2308.10443 (2023) - [i39]Jianli Bai, Xiangfu Song, Xiaowu Zhang, Qifan Wang, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Mostree : Malicious Secure Private Decision Tree Evaluation with Sublinear Communication. CoRR abs/2309.17124 (2023) - [i38]Jiayang Liu, Siyu Zhu, Siyuan Liang, Jie Zhang, Han Fang, Weiming Zhang, Ee-Chien Chang:
Improving Adversarial Transferability by Stable Diffusion. CoRR abs/2311.11017 (2023) - [i37]Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang:
Secret-Shared Shuffle with Malicious Security. IACR Cryptol. ePrint Arch. 2023: 1794 (2023) - 2022
- [j20]Sajal Sarkar, Yong Meng Teo, Ee-Chien Chang:
A cybersecurity assessment framework for virtual operational technology in power system automation. Simul. Model. Pract. Theory 117: 102453 (2022) - [j19]Jianting Ning, Geong Sen Poh, Xinyi Huang, Robert H. Deng, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. IEEE Trans. Dependable Secur. Comput. 19(2): 1164-1180 (2022) - [j18]Qin Jiang, Ee-Chien Chang, Yong Qi, Saiyu Qi, Pengfei Wu, Jianfeng Wang:
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX. IEEE Trans. Inf. Forensics Secur. 17: 1053-1068 (2022) - [c95]Sufatrio, Jan Vykopal, Ee-Chien Chang:
Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications. ACE 2022: 114-122 - [c94]Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee:
Confusing and Detecting ML Adversarial Attacks with Injected Attractors. AsiaCCS 2022: 322-336 - [c93]Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Scalable Private Decision Tree Evaluation with Sublinear Communication. AsiaCCS 2022: 843-857 - [c92]Han Fang, Zhaoyang Jia, Zehua Ma, Ee-Chien Chang, Weiming Zhang:
PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. ACM Multimedia 2022: 2267-2275 - [c91]Pengfei Wu, Jianting Ning, Jiamin Shen, Hongbing Wang, Ee-Chien Chang:
Hybrid Trust Multi-party Computation with Trusted Execution Environment. NDSS 2022 - [i36]Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Scalable Private Decision Tree Evaluation with Sublinear Communication. CoRR abs/2205.01284 (2022) - [i35]Han Fang, Zhaoyang Jia, Yupeng Qiu, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
De-END: Decoder-driven Watermarking Network. CoRR abs/2206.13032 (2022) - [i34]Mingyuan Gao, Hung Dang, Ee-Chien Chang, Jialin Li:
Mixed Fault Tolerance Protocols with Trusted Execution Environment. CoRR abs/2208.01946 (2022) - [i33]Wesley Joon-Wie Tann, Akhil Vuputuri, Ee-Chien Chang:
Predicting Non-Fungible Token (NFT) Collections: A Contextual Generative Approach. CoRR abs/2210.15493 (2022) - [i32]Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren:
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. CoRR abs/2212.00612 (2022) - 2021
- [c90]Mingyuan Gao, Hung Dang, Ee-Chien Chang:
TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment. ACSAC 2021: 235-247 - [c89]Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang:
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning. AsiaCCS 2021: 432-446 - [c88]Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang, Hwee Kuan Lee:
Common Component in Black-Boxes Is Prone to Attacks. ESORICS (1) 2021: 584-604 - [c87]Aris Cahyadi Risdianto, Ee-Chien Chang:
OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity Generation. INFOCOM Workshops 2021: 1-3 - [i31]Wesley Joon-Wie Tann, Ee-Chien Chang:
Poisoning of Online Learning Filters: DDoS Attacks and Countermeasures. CoRR abs/2107.12612 (2021) - [i30]Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Users. CoRR abs/2111.15160 (2021) - [i29]Jia Xu, Yiwen Gao, Hoon Wei Lim, Hongbing Wang, Ee-Chien Chang:
Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2021: 989 (2021) - 2020
- [c86]Connie Kou, Hwee Kuan Lee, Ee-Chien Chang, Teck Khim Ng:
Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier. ICLR 2020 - [c85]Jan Vykopal, Valdemar Svábenský, Ee-Chien Chang:
Benefits and Pitfalls of Using Capture the Flag Games in University Courses. SIGCSE 2020: 752-758 - [c84]Muhammad M. Roomi, Partha P. Biswas, Daisuke Mashima, Yuting Fan, Ee-Chien Chang:
False Data Injection Cyber Range of Modernized Substation System. SmartGridComm 2020: 1-7 - [i28]Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee:
Detection and Recovery of Adversarial Attacks with Injected Attractors. CoRR abs/2003.02732 (2020) - [i27]Jan Vykopal, Valdemar Svábenský, Ee-Chien Chang:
Benefits and Pitfalls of Using Capture the Flag Games in University Courses. CoRR abs/2004.11556 (2020) - [i26]Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, Fan Zhang:
Defending Model Inversion and Membership Inference Attacks via Prediction Purification. CoRR abs/2005.03915 (2020) - [i25]Wesley Joon-Wie Tann, Ee-Chien Chang, Bryan Hooi:
SHADOWCAST: Controlling Network Properties to Explain Graph Generation. CoRR abs/2006.03774 (2020) - [i24]Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang:
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning. CoRR abs/2012.06805 (2020)
2010 – 2019
- 2019
- [j17]Jianting Ning, Jia Xu, Kaitai Liang, Fan Zhang, Ee-Chien Chang:
Passive Attacks Against Searchable Encryption. IEEE Trans. Inf. Forensics Secur. 14(3): 789-802 (2019) - [c83]Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, Zhenkai Liang:
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment. CCS 2019: 225-240 - [c82]Jianting Ning, Geong Sen Poh, Jia-Ch'ng Loh, Jason Chia, Ee-Chien Chang:
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules. CCS 2019: 1657-1670 - [c81]Hung Dang, Dat Le Tien, Ee-Chien Chang:
Towards a Marketplace for Secure Outsourced Computations. ESORICS (1) 2019: 790-808 - [c80]Hung Dang, Tien Tuan Anh Dinh, Dumitrel Loghin, Ee-Chien Chang, Qian Lin, Beng Chin Ooi:
Towards Scaling Blockchain Systems via Sharding. SIGMOD Conference 2019: 123-140 - [i23]Ziqi Yang, Ee-Chien Chang, Zhenkai Liang:
Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment. CoRR abs/1902.08552 (2019) - [i22]Hung Dang, Ee-Chien Chang:
Autonomous Membership Service for Enclave Applications. CoRR abs/1905.06460 (2019) - [i21]Connie Kou, Hwee Kuan Lee, Teck Khim Ng, Ee-Chien Chang:
Enhancing Transformation-based Defenses using a Distribution Classifier. CoRR abs/1906.00258 (2019) - [i20]Ziqi Yang, Hung Dang, Ee-Chien Chang:
Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking. CoRR abs/1906.06046 (2019) - [i19]Hung Dang, Ee-Chien Chang:
Self-Expiring Data Capsule using Trusted Execution Environment. CoRR abs/1911.09305 (2019) - 2018
- [c79]Anand Agrawal, Chuadhry Mujeeb Ahmed, Ee-Chien Chang:
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System. AsiaCCS 2018: 821-823 - [c78]Pravein Govindan Kannan, Ahmad Soltani, Mun Choon Chan, Ee-Chien Chang:
BNV: Enabling Scalable Network Experimentation through Bare-metal Network Virtualization. CSET @ USENIX Security Symposium 2018 - [c77]Sajal Sarkar, Anand Agrawal, Yong Meng Teo, Ee-Chien Chang:
Votnet: Hybrid simulation of Virtual Operational Technology Network for Cybersecurity Assessment. WSC 2018: 1168-1179 - [i18]Jiyi Zhang, Hung Dang, Hwee Kuan Lee, Ee-Chien Chang:
Learning Inverse Mappings with Adversarial Criterion. CoRR abs/1802.04504 (2018) - [i17]Hung Dang, Anh Dinh, Ee-Chien Chang, Beng Chin Ooi:
Chain of Trust: Can Trusted Hardware Help Scaling Blockchains? CoRR abs/1804.00399 (2018) - [i16]Hung Dang, Dat Le Tien, Ee-Chien Chang:
Fair Marketplace for Secure Outsourced Computations. CoRR abs/1808.09682 (2018) - [i15]Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang:
Keeping Time-Release Secrets through Smart Contracts. IACR Cryptol. ePrint Arch. 2018: 1166 (2018) - 2017
- [j16]Hung Dang, Tien Tuan Anh Dinh, Ee-Chien Chang, Beng Chin Ooi:
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute. Proc. Priv. Enhancing Technol. 2017(3): 21 (2017) - [c76]Hung Dang, Ee-Chien Chang:
Privacy-Preserving Data Deduplication on Trusted Processors. CLOUD 2017: 66-73 - [c75]Hung Dang, Yue Huang, Ee-Chien Chang:
Evading Classifiers by Morphing in the Dark. CCS 2017: 119-133 - [c74]Hung Dang, Erick Purwanto, Ee-Chien Chang:
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated. AsiaCCS 2017: 408-422 - [c73]Jia Xu, Ee-Chien Chang, Jianying Zhou:
A New Functional Encryption for Multidimensional Range Query (Short Paper). ISPEC 2017: 361-372 - [c72]Pravein Govindan Kannan, Mun Choon Chan, Richard T. B. Ma, Ee-Chien Chang:
Raptor: Scalable rule placement over multiple path in software defined networks. Networking 2017: 1-9 - [c71]Lavanya Ramapantulu, Yong Meng Teo, Ee-Chien Chang:
A conceptural framework to federate testbeds for cybersecurity. WSC 2017: 457-468 - [c70]Teodora Baluta, Lavanya Ramapantulu, Yong Meng Teo, Ee-Chien Chang:
Modeling the effects of insider threats on cybersecurity of complex systems. WSC 2017: 4360-4371 - [i14]Hung Dang, Yue Huang, Ee-Chien Chang:
Evading Classifier in the Dark: Guiding Unpredictable Morphing Using Binary-Output Blackboxes. CoRR abs/1705.07535 (2017) - [i13]Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang:
PermuteRam: Optimizing Oblivious Computation for Efficiency. IACR Cryptol. ePrint Arch. 2017: 885 (2017) - [i12]Jia Xu, Ee-Chien Chang, Jianying Zhou:
A New Functional Encryption for Multidimensional Range Query. IACR Cryptol. ePrint Arch. 2017: 970 (2017) - 2016
- [c69]Paramasiven Appavoo, Mun Choon Chan, Bhojan Anand, Ee-Chien Chang:
Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services. COMSNETS 2016: 1-8 - [c68]Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang:
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation. IH&MMSec 2016: 69-80 - [c67]Minoru Kuribayashi, Ee-Chien Chang, Nobuo Funabiki:
Watermarking with Fixed Decoder for Aesthetic 2D Barcode. IWDW 2016: 379-392 - [c66]Jia Xu, Ee-Chien Chang, Jianying Zhou:
Directed Transitive Signature on Directed Tree. SG-CRC 2016: 91-98 - 2015
- [c65]Hung Dang, Ee-Chien Chang:
PrAd: Enabling Privacy-Aware Location based Advertising. GeoPrivacy@SIGSPATIAL 2015: 1:1-1:8 - [c64]Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, Chunwang Zhang:
M2R: Enabling Stronger Privacy in MapReduce Computation. USENIX Security Symposium 2015: 447-462 - 2014
- [j15]Chengfang Fang, Ee-Chien Chang:
Optimal strategy of coupon subset collection when each package contains half of the coupons. Inf. Process. Lett. 114(12): 703-705 (2014) - [c63]Chunwang Zhang, Ee-Chien Chang:
Processing of Mixed-Sensitivity Video Surveillance Streams on Hybrid Clouds. IEEE CLOUD 2014: 9-16 - [c62]Chunwang Zhang, Ee-Chien Chang, Roland H. C. Yap:
Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds. CCGRID 2014: 31-40 - [c61]Chengfang Fang, Ee-Chien Chang:
Differential privacy with δ-neighbourhood for spatial and dynamic datasets. AsiaCCS 2014: 159-170 - [c60]Chengfang Fang, Chunwang Zhang, Ee-Chien Chang:
An Optimization Model for Aesthetic Two-Dimensional Barcodes. MMM (1) 2014: 278-290 - [i11]Hoon Wei Lim, Shruti Tople, Prateek Saxena, Ee-Chien Chang:
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2014: 539 (2014) - 2013
- [c59]Jia Xu, Ee-Chien Chang, Jianying Zhou:
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. AsiaCCS 2013: 195-206 - [c58]Chunwang Zhang, Ee-Chien Chang, Roland H. C. Yap:
Towards a general framework for secure MapReduce computation on hybrid clouds. SoCC 2013: 36:1-36:2 - 2012
- [c57]Mamadou H. Diallo, Bijit Hore, Ee-Chien Chang, Sharad Mehrotra, Nalini Venkatasubramanian:
CloudProtect: Managing Data Privacy in Cloud Applications. IEEE CLOUD 2012: 303-310 - [c56]Jia Xu, Ee-Chien Chang:
Towards efficient proofs of retrievability. AsiaCCS 2012: 79-80 - [c55]Bhojan Anand, Lee Kee Chong, Ee-Chien Chang, Mun Choon Chan, Akkihebbal L. Ananda, Wei Tsang Ooi:
El-pincel: a painter cloud service for greener web pages. ACM Multimedia 2012: 399-408 - [c54]Chengfang Fang, Ee-Chien Chang:
Adaptive Differentially Private Histogram of Low-Dimensional Data. Privacy Enhancing Technologies 2012: 160-179 - [c53]Bijit Hore, Ee-Chien Chang, Mamadou H. Diallo, Sharad Mehrotra:
Indexing Encrypted Documents for Supporting Efficient Keyword Search. Secure Data Management 2012: 93-110 - [c52]Chunwang Zhang, Junjie Jin, Ee-Chien Chang, Sharad Mehrotra:
Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services. Secure Data Management 2012: 111-129 - 2011
- [j14]Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu, Ee-Chien Chang:
ID Repetition in Structured P2P Networks. Comput. J. 54(6): 962-975 (2011) - [j13]Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing host security using external environment sensors. Int. J. Inf. Sec. 10(5): 285-299 (2011) - [c51]Chengfang Fang, Qiming Li, Ee-Chien Chang:
Identity leakage mitigation on asymmetric secure sketch. IJCB 2011: 1-6 - [c50]Qiming Li, Bilgehan Sahin, Ee-Chien Chang, Vrizlynn L. L. Thing:
Content based JPEG fragmentation point detection. ICME 2011: 1-6 - [i10]Chengfang Fang, Ee-Chien Chang:
Publishing Location Dataset Differential Privately with Isotonic Regression. CoRR abs/1111.6677 (2011) - [i9]Jia Xu, Ee-Chien Chang:
Practically Efficient Proof of Retrievability in Cloud Storage. IACR Cryptol. ePrint Arch. 2011: 362 (2011) - [i8]Jia Xu, Ee-Chien Chang:
Towards Efficient Provable Data Possession. IACR Cryptol. ePrint Arch. 2011: 574 (2011) - 2010
- [j12]