Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Chengfang Fang"
@article{DBLP:journals/spl/LiFLLS24, author = {Chengfang Li and Gaoyun Fang and Yang Liu and Jing Liu and Liang Song}, title = {Decoding Silent Reading {EEG} Signals Using Adaptive Feature Graph Convolutional Network}, journal = {{IEEE} Signal Process. Lett.}, volume = {31}, pages = {1--5}, year = {2024}, url = {https://doi.org/10.1109/LSP.2023.3337727}, doi = {10.1109/LSP.2023.3337727}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/LiFLLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YeHMZHFS23, author = {Qingqing Ye and Haibo Hu and Xiaofeng Meng and Huadi Zheng and Kai Huang and Chengfang Fang and Jie Shi}, title = {PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {1}, pages = {17--35}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2021.3107512}, doi = {10.1109/TDSC.2021.3107512}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YeHMZHFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/LinXFZJS23, author = {Zijun Lin and Ke Xu and Chengfang Fang and Huadi Zheng and Aneez Ahmed Jaheezuddin and Jie Shi}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {{QUDA:} Query-Limited Data-Free Model Extraction}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {913--924}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3590336}, doi = {10.1145/3579856.3590336}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/LinXFZJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ZhangFTXFC23, author = {Jiyi Zhang and Han Fang and Wesley Joon{-}Wie Tann and Ke Xu and Chengfang Fang and Ee{-}Chien Chang}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {704--715}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3582824}, doi = {10.1145/3579856.3582824}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ZhangFTXFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/HuangTYSYCK23, author = {Jhih{-}Cing Huang and Yu{-}Lin Tsai and Chao{-}Han Huck Yang and Cheng{-}Fang Su and Chia{-}Mu Yu and Pin{-}Yu Chen and Sy{-}Yen Kuo}, title = {Certified Robustness of Quantum Classifiers Against Adversarial Examples Through Quantum Noise}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10095030}, doi = {10.1109/ICASSP49357.2023.10095030}, timestamp = {Sun, 05 Nov 2023 16:51:21 +0100}, biburl = {https://dblp.org/rec/conf/icassp/HuangTYSYCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/FangZQLXFC23, author = {Han Fang and Jiyi Zhang and Yupeng Qiu and Jiayang Liu and Ke Xu and Chengfang Fang and Ee{-}Chien Chang}, title = {Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence}, booktitle = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023, Paris, France, October 1-6, 2023}, pages = {4312--4321}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCV51070.2023.00400}, doi = {10.1109/ICCV51070.2023.00400}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/FangZQLXFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/Du0F00FS23, author = {Rong Du and Qingqing Ye and Yue Fu and Haibo Hu and Jin Li and Chengfang Fang and Jie Shi}, title = {Differential Aggregation against General Colluding Attackers}, booktitle = {39th {IEEE} International Conference on Data Engineering, {ICDE} 2023, Anaheim, CA, USA, April 3-7, 2023}, pages = {2180--2193}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDE55515.2023.00169}, doi = {10.1109/ICDE55515.2023.00169}, timestamp = {Thu, 27 Jul 2023 14:59:05 +0200}, biburl = {https://dblp.org/rec/conf/icde/Du0F00FS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlc/PintorDSLFDB23, author = {Maura Pintor and Luca Demetrio and Angelo Sotgiu and Hsiao{-}Ying Lin and Chengfang Fang and Ambra Demontis and Battista Biggio}, title = {Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving}, booktitle = {International Conference on Machine Learning and Cybernetics, {ICMLC} 2023, Adelaide, Australia, July 9-11, 2023}, pages = {57--62}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICMLC58545.2023.10327986}, doi = {10.1109/ICMLC58545.2023.10327986}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmlc/PintorDSLFDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interspeech/ZhangXLWFS23, author = {Mengao Zhang and Ke Xu and Hao Li and Lei Wang and Chengfang Fang and Jie Shi}, editor = {Naomi Harte and Julie Carson{-}Berndsen and Gareth Jones}, title = {DoubleDeceiver: Deceiving the Speaker Verification System Protected by Spoofing Countermeasures}, booktitle = {24th Annual Conference of the International Speech Communication Association, Interspeech 2023, Dublin, Ireland, August 20-24, 2023}, pages = {4014--4018}, publisher = {{ISCA}}, year = {2023}, url = {https://doi.org/10.21437/Interspeech.2023-371}, doi = {10.21437/INTERSPEECH.2023-371}, timestamp = {Fri, 14 Jun 2024 14:12:12 +0200}, biburl = {https://dblp.org/rec/conf/interspeech/ZhangXLWFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/FangCQLXFZC23, author = {Han Fang and Kejiang Chen and Yupeng Qiu and Jiayang Liu and Ke Xu and Chengfang Fang and Weiming Zhang and Ee{-}Chien Chang}, editor = {Abdulmotaleb El{-}Saddik and Tao Mei and Rita Cucchiara and Marco Bertini and Diana Patricia Tobon Vallejo and Pradeep K. Atrey and M. Shamim Hossain}, title = {DeNoL: {A} Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness}, booktitle = {Proceedings of the 31st {ACM} International Conference on Multimedia, {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}, pages = {7345--7353}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581783.3612068}, doi = {10.1145/3581783.3612068}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/FangCQLXFZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiYHLWFS23, author = {Haoyang Li and Qingqing Ye and Haibo Hu and Jin Li and Leixia Wang and Chengfang Fang and Jie Shi}, title = {3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1893--1907}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179401}, doi = {10.1109/SP46215.2023.10179401}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiYHLWFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-01218, author = {Han Fang and Jiyi Zhang and Yupeng Qiu and Ke Xu and Chengfang Fang and Ee{-}Chien Chang}, title = {Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence}, journal = {CoRR}, volume = {abs/2301.01218}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.01218}, doi = {10.48550/ARXIV.2301.01218}, eprinttype = {arXiv}, eprint = {2301.01218}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-01218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-09315, author = {Rong Du and Qingqing Ye and Yue Fu and Haibo Hu and Jin Li and Chengfang Fang and Jie Shi}, title = {Differential Aggregation against General Colluding Attackers}, journal = {CoRR}, volume = {abs/2302.09315}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09315}, doi = {10.48550/ARXIV.2302.09315}, eprinttype = {arXiv}, eprint = {2302.09315}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09315.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-05369, author = {Li Wang and Jiaqi Li and Yuhao Luo and Jiahao Zheng and Lei Wang and Hao Li and Ke Xu and Chengfang Fang and Jie Shi and Zhizheng Wu}, title = {AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification}, journal = {CoRR}, volume = {abs/2310.05369}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.05369}, doi = {10.48550/ARXIV.2310.05369}, eprinttype = {arXiv}, eprint = {2310.05369}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-05369.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengYHFS22, author = {Huadi Zheng and Qingqing Ye and Haibo Hu and Chengfang Fang and Jie Shi}, title = {Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {2007--2022}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3043382}, doi = {10.1109/TDSC.2020.3043382}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengYHFS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibe/LiMNS22, author = {Tai{-}Yue Li and Venugopala Reddy Mekala and Ka{-}Lok Ng and Cheng{-}Fang Su}, title = {Classification of Tumor Metastasis Data by Using Quantum kernel-based Algorithms}, booktitle = {22nd {IEEE} International Conference on Bioinformatics and Bioengineering, {BIBE} 2022, Taichung, Taiwan, November 7-9, 2022}, pages = {351--354}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BIBE55377.2022.00078}, doi = {10.1109/BIBE55377.2022.00078}, timestamp = {Mon, 02 Jan 2023 14:34:27 +0100}, biburl = {https://dblp.org/rec/conf/bibe/LiMNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/Xiao00ZFS22, author = {Yaxin Xiao and Qingqing Ye and Haibo Hu and Huadi Zheng and Chengfang Fang and Jie Shi}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {MExMI: Pool-based Active Model Extraction Crossover Membership Inference}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/4241c27d3161c7a7064bfc1a6e539563-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/Xiao00ZFS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-00887, author = {Jhih{-}Cing Huang and Yu{-}Lin Tsai and Chao{-}Han Huck Yang and Cheng{-}Fang Su and Chia{-}Mu Yu and Pin{-}Yu Chen and Sy{-}Yen Kuo}, title = {Certified Robustness of Quantum Classifiers against Adversarial Examples through Quantum Noise}, journal = {CoRR}, volume = {abs/2211.00887}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.00887}, doi = {10.48550/ARXIV.2211.00887}, eprinttype = {arXiv}, eprint = {2211.00887}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-00887.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-06123, author = {Ambra Demontis and Maura Pintor and Luca Demetrio and Kathrin Grosse and Hsiao{-}Ying Lin and Chengfang Fang and Battista Biggio and Fabio Roli}, title = {A Survey on Reinforcement Learning Security with Application to Autonomous Driving}, journal = {CoRR}, volume = {abs/2212.06123}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.06123}, doi = {10.48550/ARXIV.2212.06123}, eprinttype = {arXiv}, eprint = {2212.06123}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-06123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuJSZLSFYB021, author = {Tianyu Du and Shouling Ji and Lujia Shen and Yao Zhang and Jinfeng Li and Jie Shi and Chengfang Fang and Jianwei Yin and Raheem Beyah and Ting Wang}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {516--534}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484538}, doi = {10.1145/3460120.3484538}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DuJSZLSFYB021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShenJ0LCSFYW21, author = {Lujia Shen and Shouling Ji and Xuhong Zhang and Jinfeng Li and Jing Chen and Jie Shi and Chengfang Fang and Jianwei Yin and Ting Wang}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Backdoor Pre-trained Models Can Transfer to All}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {3141--3158}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485370}, doi = {10.1145/3460120.3485370}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShenJ0LCSFYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-05527, author = {An Zhang and Xiang Wang and Chengfang Fang and Jie Shi and Tat{-}Seng Chua and Zehua Chen}, title = {{A-FMI:} Learning Attributions from Deep Networks via Feature Map Importance}, journal = {CoRR}, volume = {abs/2104.05527}, year = {2021}, url = {https://arxiv.org/abs/2104.05527}, eprinttype = {arXiv}, eprint = {2104.05527}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-05527.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-05921, author = {Xinyi Zhang and Chengfang Fang and Jie Shi}, title = {Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack}, journal = {CoRR}, volume = {abs/2104.05921}, year = {2021}, url = {https://arxiv.org/abs/2104.05921}, eprinttype = {arXiv}, eprint = {2104.05921}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-05921.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-00197, author = {Lujia Shen and Shouling Ji and Xuhong Zhang and Jinfeng Li and Jing Chen and Jie Shi and Chengfang Fang and Jianwei Yin and Ting Wang}, title = {Backdoor Pre-trained Models Can Transfer to All}, journal = {CoRR}, volume = {abs/2111.00197}, year = {2021}, url = {https://arxiv.org/abs/2111.00197}, eprinttype = {arXiv}, eprint = {2111.00197}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-00197.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/LiFZMS20, author = {Chengfang Li and Xiaojie Fang and Xiaokang Zhou and Lin Mei and Xuejun Sha}, title = {Enhanced signalling provisioning for UAV-enabled {MEC:} {A} GWFRFT-based energy-spreading transmission approach}, journal = {{IET} Commun.}, volume = {14}, number = {15}, pages = {2524--2531}, year = {2020}, url = {https://doi.org/10.1049/iet-com.2019.1219}, doi = {10.1049/IET-COM.2019.1219}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/LiFZMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joi/HuTLC20, author = {Ya{-}Han Hu and Chun{-}Tien Tai and Kang Ernest Liu and Cheng{-}Fang Cai}, title = {Identification of highly-cited papers using topic-model-based and bibliometric features: the consideration of keyword popularity}, journal = {J. Informetrics}, volume = {14}, number = {1}, pages = {101004}, year = {2020}, url = {https://doi.org/10.1016/j.joi.2019.101004}, doi = {10.1016/J.JOI.2019.101004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joi/HuTLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiaoCFS20, author = {Chang Liao and Yao Cheng and Chengfang Fang and Jie Shi}, editor = {Jay Ligatti and Xinming Ou}, title = {Where Does the Robustness Come from?: {A} Study of the Transformation-based Ensemble Defence}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {1--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421380}, doi = {10.1145/3411508.3421380}, timestamp = {Tue, 02 Nov 2021 16:38:38 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiaoCFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LinFS20, author = {Hsiao{-}Ying Lin and Chengfang Fang and Jie Shi}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Bident Structure for Neural Network Model Protection}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {377--384}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008923403770384}, doi = {10.5220/0008923403770384}, timestamp = {Tue, 14 Apr 2020 10:48:30 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LinFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-13033, author = {Chang Liao and Yao Cheng and Chengfang Fang and Jie Shi}, title = {Where Does the Robustness Come from? {A} Study of the Transformation-based Ensemble Defence}, journal = {CoRR}, volume = {abs/2009.13033}, year = {2020}, url = {https://arxiv.org/abs/2009.13033}, eprinttype = {arXiv}, eprint = {2009.13033}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-13033.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhengYHFS19, author = {Huadi Zheng and Qingqing Ye and Haibo Hu and Chengfang Fang and Jie Shi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {{BDPL:} {A} Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {66--83}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_4}, doi = {10.1007/978-3-030-29959-0\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZhengYHFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jns/KwonLS18, author = {Young{-}Sam Kwon and Ying{-}Chieh Lin and Cheng{-}Fang Su}, title = {Derivation of Inviscid Quasi-geostrophic Equation from Rotational Compressible Magnetohydrodynamic Flows}, journal = {J. Nonlinear Sci.}, volume = {28}, number = {2}, pages = {599--620}, year = {2018}, url = {https://doi.org/10.1007/s00332-017-9420-3}, doi = {10.1007/S00332-017-9420-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jns/KwonLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/PengHLC18, author = {Cheng{-}Fang Peng and Jun{-}Wei Hsieh and Shao{-}Wei Leu and Chi{-}Hung Chuang}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Marek R. Ogiela and Lidia Ogiela and Nadeem Javaid}, title = {Drone-Based Vacant Parking Space Detection}, booktitle = {32nd International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2018 workshops, Krakow, Poland, May 16-18, 2018}, pages = {618--622}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/WAINA.2018.00155}, doi = {10.1109/WAINA.2018.00155}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/PengHLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i2mtc/WengLHHWLCH17, author = {Rui{-}Cian Weng and Yen{-}Pei Lu and Wan{-}Hsuan Hsu and Cheng{-}Fang Ho and Jun{-}Sheng Wang and Min{-}Yu Lin and Shih{-}Jye Chou and Chi{-}Hung Hwang}, title = {Blood urea nitrogen analyzer developed to prevent acute stroke-in-evolution}, booktitle = {{IEEE} International Instrumentation and Measurement Technology Conference, {I2MTC} 2017, Torino, Italy, May 22-25, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/I2MTC.2017.7969723}, doi = {10.1109/I2MTC.2017.7969723}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i2mtc/WengLHHWLCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/FangC14, author = {Chengfang Fang and Ee{-}Chien Chang}, title = {Optimal strategy of coupon subset collection when each package contains half of the coupons}, journal = {Inf. Process. Lett.}, volume = {114}, number = {12}, pages = {703--705}, year = {2014}, url = {https://doi.org/10.1016/j.ipl.2014.06.012}, doi = {10.1016/J.IPL.2014.06.012}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/FangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FangC14, author = {Chengfang Fang and Ee{-}Chien Chang}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Differential privacy with {\(\delta\)}-neighbourhood for spatial and dynamic datasets}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {159--170}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590320}, doi = {10.1145/2590296.2590320}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmm/FangZC14, author = {Chengfang Fang and Chunwang Zhang and Ee{-}Chien Chang}, editor = {Cathal Gurrin and Frank Hopfgartner and Wolfgang H{\"{u}}rst and H{\aa}vard D. Johansen and Hyowon Lee and Noel E. O'Connor}, title = {An Optimization Model for Aesthetic Two-Dimensional Barcodes}, booktitle = {MultiMedia Modeling - 20th Anniversary International Conference, {MMM} 2014, Dublin, Ireland, January 6-10, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8325}, pages = {278--290}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04114-8\_24}, doi = {10.1007/978-3-319-04114-8\_24}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmm/FangZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TsengLLC13, author = {Yen{-}Chieh Tseng and Da{-}Sheng Lee and Cheng{-}Fang Lin and Ching{-}Yuan Chang}, title = {A Novel Sensor Platform Matching the Improved Version of {IPMVP} Option {C} for Measuring Energy Savings}, journal = {Sensors}, volume = {13}, number = {5}, pages = {6811--6831}, year = {2013}, url = {https://doi.org/10.3390/s130506811}, doi = {10.3390/S130506811}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/TsengLLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbsn/YenYCWCK12, author = {Ju{-}Yu Yen and Cheng{-}Fang Yen and Cheng{-}Sheng Chen and Peng{-}Wei Wang and Yi{-}Hsin Chang and Chih{-}Hung Ko}, title = {Social Anxiety in Online and Real-Life Interaction and Their Associated Factors}, journal = {Cyberpsychology Behav. Soc. Netw.}, volume = {15}, number = {1}, pages = {7--12}, year = {2012}, url = {https://doi.org/10.1089/cyber.2011.0015}, doi = {10.1089/CYBER.2011.0015}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbsn/YenYCWCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/HuangLCY12, author = {Cheng{-}Fang Huang and Teh{-}Lu Liao and Chih{-}Yung Chen and Jun{-}Juh Yan}, title = {The design of quasi-sliding mode control for a permanent magnet synchronous motor with unmatched uncertainties}, journal = {Comput. Math. Appl.}, volume = {64}, number = {5}, pages = {1036--1043}, year = {2012}, url = {https://doi.org/10.1016/j.camwa.2012.03.022}, doi = {10.1016/J.CAMWA.2012.03.022}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/HuangLCY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hac/LeiH12, author = {Lih{-}Wei Lei and Cheng{-}Fang Huang}, title = {Learning english through musicals: a case study of social economically disadvantaged aboriginal students in Eastern Taiwan}, journal = {Int. J. Humanit. Arts Comput.}, volume = {6}, number = {1-2}, pages = {204--210}, year = {2012}, url = {https://doi.org/10.3366/ijhac.2012.0049}, doi = {10.3366/IJHAC.2012.0049}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/hac/LeiH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/FangC12, author = {Chengfang Fang and Ee{-}Chien Chang}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {Adaptive Differentially Private Histogram of Low-Dimensional Data}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {160--179}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_9}, doi = {10.1007/978-3-642-31680-7\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/FangC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbsn/YenYWHK11, author = {Ju{-}Yu Yen and Cheng{-}Fang Yen and Hsiu{-}Yi Wu and Chun{-}Jen Huang and Chih{-}Hung Ko}, title = {Hostility in the Real World and Online: The Effect of Internet Addiction, Depression, and Online Activity}, journal = {Cyberpsychology Behav. Soc. Netw.}, volume = {14}, number = {11}, pages = {649--655}, year = {2011}, url = {https://doi.org/10.1089/cyber.2010.0393}, doi = {10.1089/CYBER.2010.0393}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbsn/YenYWHK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuLXFXC11, author = {Jie Yu and Zhoujun Li and Peng Xiao and Chengfang Fang and Jia Xu and Ee{-}Chien Chang}, title = {{ID} Repetition in Structured {P2P} Networks}, journal = {Comput. J.}, volume = {54}, number = {6}, pages = {962--975}, year = {2011}, url = {https://doi.org/10.1093/comjnl/bxr017}, doi = {10.1093/COMJNL/BXR017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuLXFXC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cphysics/YangHL11, author = {Chao{-}Tung Yang and Chih{-}Lin Huang and Cheng{-}Fang Lin}, title = {Hybrid CUDA, OpenMP, and {MPI} parallel programming on multicore {GPU} clusters}, journal = {Comput. Phys. Commun.}, volume = {182}, number = {1}, pages = {266--269}, year = {2011}, url = {https://doi.org/10.1016/j.cpc.2010.06.035}, doi = {10.1016/J.CPC.2010.06.035}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cphysics/YangHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuFX11, author = {Xuejiao Liu and Chengfang Fang and Debao Xiao}, title = {Intrusion diagnosis and prediction with expert system}, journal = {Secur. Commun. Networks}, volume = {4}, number = {12}, pages = {1483--1494}, year = {2011}, url = {https://doi.org/10.1002/sec.293}, doi = {10.1002/SEC.293}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuFX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/HsiaoCTLC11, author = {Ya{-}Li Hsiao and Po{-}Fon Chen and Cheng{-}Fang Tsai and Hsiang{-}Chuan Liu and Pei{-}Chun Chang}, title = {Choquet integral algorithm for T-cell epitope prediction based on fuzzy measure}, booktitle = {Eighth International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2011, 26-28 July 2011, Shanghai, China}, pages = {1588--1591}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/FSKD.2011.6019854}, doi = {10.1109/FSKD.2011.6019854}, timestamp = {Fri, 13 Aug 2021 09:26:01 +0200}, biburl = {https://dblp.org/rec/conf/fskd/HsiaoCTLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/FangLC11, author = {Chengfang Fang and Qiming Li and Ee{-}Chien Chang}, title = {Identity leakage mitigation on asymmetric secure sketch}, booktitle = {2011 {IEEE} International Joint Conference on Biometrics, {IJCB} 2011, Washington, DC, USA, October 11-13, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IJCB.2011.6117542}, doi = {10.1109/IJCB.2011.6117542}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icb/FangLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-6677, author = {Chengfang Fang and Ee{-}Chien Chang}, title = {Publishing Location Dataset Differential Privately with Isotonic Regression}, journal = {CoRR}, volume = {abs/1111.6677}, year = {2011}, url = {http://arxiv.org/abs/1111.6677}, eprinttype = {arXiv}, eprint = {1111.6677}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-6677.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/LinHLY10, author = {Jui{-}Sheng Lin and Cheng{-}Fang Huang and Teh{-}Lu Liao and Jun{-}Juh Yan}, title = {Design and implementation of digital secure communication based on synchronized chaotic systems}, journal = {Digit. Signal Process.}, volume = {20}, number = {1}, pages = {229--237}, year = {2010}, url = {https://doi.org/10.1016/j.dsp.2009.04.006}, doi = {10.1016/J.DSP.2009.04.006}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/LinHLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FangLC10, author = {Chengfang Fang and Qiming Li and Ee{-}Chien Chang}, editor = {Jianying Zhou and Moti Yung}, title = {Secure Sketch for Multiple Secrets}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {367--383}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_22}, doi = {10.1007/978-3-642-13708-2\_22}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/FangLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FangC10, author = {Chengfang Fang and Ee{-}Chien Chang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Securing interactive sessions using mobile device through visual channel and visual inspection}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {69--78}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920272}, doi = {10.1145/1920261.1920272}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ChangFX10, author = {Ee{-}Chien Chang and Chengfang Fang and Jia Xu}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {A chameleon encryption scheme resistant to known-plaintext attack}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {25--34}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866876}, doi = {10.1145/1866870.1866876}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/ChangFX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/YangHLC10, author = {Chao{-}Tung Yang and Chih{-}Lin Huang and Cheng{-}Fang Lin and Tzu{-}Chieh Chang}, title = {Hybrid Parallel Programming on {GPU} Clusters}, booktitle = {{IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA} 2010, Taipei, Taiwan, 6-9 September 2010}, pages = {142--147}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ISPA.2010.97}, doi = {10.1109/ISPA.2010.97}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/YangHLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1003-0723, author = {Chengfang Fang and Ee{-}Chien Chang}, title = {Securing Kiosk using Mobile Devices coupled with Visual Inspection}, journal = {CoRR}, volume = {abs/1003.0723}, year = {2010}, url = {http://arxiv.org/abs/1003.0723}, eprinttype = {arXiv}, eprint = {1003.0723}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1003-0723.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbsn/YenYCTK09, author = {Ju{-}Yu Yen and Cheng{-}Fang Yen and Cheng{-}Sheng Chen and Tze{-}Chun Tang and Chih{-}Hung Ko}, title = {The Association between Adult {ADHD} Symptoms and Internet Addiction among College Students: The Gender Difference}, journal = {Cyberpsychology Behav. Soc. Netw.}, volume = {12}, number = {2}, pages = {187--191}, year = {2009}, url = {https://doi.org/10.1089/cpb.2008.0113}, doi = {10.1089/CPB.2008.0113}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbsn/YenYCTK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ChengHCY09, author = {Da{-}Long Cheng and Cheng{-}Fang Huang and Shun{-}Yuan Cheng and Jun{-}Juh Yan}, title = {Synchronization of optical chaos in vertical-cavity surface-emitting lasers via optimal {PI} controller}, journal = {Expert Syst. Appl.}, volume = {36}, number = {3}, pages = {6854--6858}, year = {2009}, url = {https://doi.org/10.1016/j.eswa.2008.08.005}, doi = {10.1016/J.ESWA.2008.08.005}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/ChengHCY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoscale/YuFLL09, author = {Jie Yu and Chengfang Fang and Liming Lu and Zhoujun Li}, editor = {Peter Mueller and Jiannong Cao and Cho{-}Li Wang}, title = {A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks}, booktitle = {Scalable Information Systems, 4th International {ICST} Conference, Infoscale 2009, Hong Kong, June 10-11, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {18}, pages = {175--191}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10485-5\_13}, doi = {10.1007/978-3-642-10485-5\_13}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoscale/YuFLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/YuFXCL09, author = {Jie Yu and Chengfang Fang and Jia Xu and Ee{-}Chien Chang and Zhoujun Li}, editor = {Henning Schulzrinne and Karl Aberer and Anwitaman Datta}, title = {{ID} Repetition in Kad}, booktitle = {Proceedings {P2P} 2009, Ninth International Conference on Peer-to-Peer Computing, 9-11 September 2009, Seattle, Washington, {USA}}, pages = {111--120}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/P2P.2009.5284551}, doi = {10.1109/P2P.2009.5284551}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/p2p/YuFXCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbsn/KoYYCW08, author = {Chih{-}Hung Ko and Ju{-}Yu Yen and Cheng{-}Fang Yen and Chung{-}Sheng Chen and Shing{-}Yaw Wang}, title = {The Association between Internet Addiction and Belief of Frustration Intolerance: The Gender Difference}, journal = {Cyberpsychology Behav. Soc. Netw.}, volume = {11}, number = {3}, pages = {273--278}, year = {2008}, url = {https://doi.org/10.1089/cpb.2007.0095}, doi = {10.1089/CPB.2007.0095}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbsn/KoYYCW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbsn/KoYYCWC08, author = {Chih{-}Hung Ko and Ju{-}Yu Yen and Cheng{-}Fang Yen and Cheng{-}Sheng Chen and Chih{-}Chi Weng and Cheng{-}Chung Chen}, title = {The Association between Internet Addiction and Problematic Alcohol Use in Adolescents: The Problem Behavior Model}, journal = {Cyberpsychology Behav. Soc. Netw.}, volume = {11}, number = {5}, pages = {571--576}, year = {2008}, url = {https://doi.org/10.1089/cpb.2007.0199}, doi = {10.1089/CPB.2007.0199}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbsn/KoYYCWC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FangC08, author = {Chengfang Fang and Ee{-}Chien Chang}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Information Leakage in Optimal Anonymized and Diversified Data}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {30--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_3}, doi = {10.1007/978-3-540-88961-8\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/FangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FangC08, author = {Chengfang Fang and Ee{-}Chien Chang}, title = {Information Leakage in Optimal Anonymized and Diversified Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2008}, url = {http://eprint.iacr.org/2008/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbsn/KoYYLY07, author = {Chih{-}Hung Ko and Ju{-}Yu Yen and Cheng{-}Fang Yen and Huang{-}chi Lin and Ming{-}Jen Yang}, title = {Factors Predictive for Incidence and Remission of Internet Addiction in Young Adolescents: {A} Prospective Study}, journal = {Cyberpsychology Behav. Soc. Netw.}, volume = {10}, number = {4}, pages = {545--551}, year = {2007}, url = {https://doi.org/10.1089/cpb.2007.9992}, doi = {10.1089/CPB.2007.9992}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbsn/KoYYLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbsn/YenYCCK07, author = {Ju{-}Yu Yen and Cheng{-}Fang Yen and Cheng{-}Chung Chen and Sue{-}Huei Chen and Chih{-}Hung Ko}, title = {Family Factors of Internet Addiction and Substance Use Experience in Taiwanese Adolescents}, journal = {Cyberpsychology Behav. Soc. Netw.}, volume = {10}, number = {3}, pages = {323--329}, year = {2007}, url = {https://doi.org/10.1089/cpb.2006.9948}, doi = {10.1089/CPB.2006.9948}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbsn/YenYCCK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/YangSLC07, author = {Chao{-}Tung Yang and Po{-}Chi Shih and Cheng{-}Fang Lin and Sung{-}Yi Chen}, title = {A resource broker with an efficient network information model on grid environments}, journal = {J. Supercomput.}, volume = {40}, number = {3}, pages = {249--267}, year = {2007}, url = {https://doi.org/10.1007/s11227-006-0025-0}, doi = {10.1007/S11227-006-0025-0}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/YangSLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/YangLC06, author = {Chao{-}Tung Yang and Cheng{-}Fang Lin and Sung{-}Yi Chen}, title = {A Workflow-based Computational Resource Broker with Information Monitoring in Grids}, booktitle = {Grid and Cooperative Computing - {GCC} 2006, 5th International Conference, Changsha, Hunan, China, 21-23 October 2006, Proceedings}, pages = {199--206}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/GCC.2006.23}, doi = {10.1109/GCC.2006.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gcc/YangLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/YangSLHL05, author = {Chao{-}Tung Yang and Po{-}Chi Shih and Cheng{-}Fang Lin and Ching{-}Hsien Hsu and Kuan{-}Ching Li}, editor = {Yi Pan and Daoxu Chen and Minyi Guo and Jiannong Cao and Jack J. Dongarra}, title = {A Chronological History-Based Execution Time Estimation Model for Embarrassingly Parallel Applications on Grids}, booktitle = {Parallel and Distributed Processing and Applications, Third International Symposium, {ISPA} 2005, Nanjing, China, November 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3758}, pages = {425--430}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576235\_45}, doi = {10.1007/11576235\_45}, timestamp = {Tue, 14 Apr 2020 13:23:09 +0200}, biburl = {https://dblp.org/rec/conf/ispa/YangSLHL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.