Search dblp for Publications

export results for "Chengfang Fang"

 download as .bib file

@article{DBLP:journals/spl/LiFLLS24,
  author       = {Chengfang Li and
                  Gaoyun Fang and
                  Yang Liu and
                  Jing Liu and
                  Liang Song},
  title        = {Decoding Silent Reading {EEG} Signals Using Adaptive Feature Graph
                  Convolutional Network},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {31},
  pages        = {1--5},
  year         = {2024},
  url          = {https://doi.org/10.1109/LSP.2023.3337727},
  doi          = {10.1109/LSP.2023.3337727},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/LiFLLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YeHMZHFS23,
  author       = {Qingqing Ye and
                  Haibo Hu and
                  Xiaofeng Meng and
                  Huadi Zheng and
                  Kai Huang and
                  Chengfang Fang and
                  Jie Shi},
  title        = {PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential
                  Privacy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {17--35},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2021.3107512},
  doi          = {10.1109/TDSC.2021.3107512},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/YeHMZHFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/LinXFZJS23,
  author       = {Zijun Lin and
                  Ke Xu and
                  Chengfang Fang and
                  Huadi Zheng and
                  Aneez Ahmed Jaheezuddin and
                  Jie Shi},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {{QUDA:} Query-Limited Data-Free Model Extraction},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {913--924},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3590336},
  doi          = {10.1145/3579856.3590336},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/LinXFZJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ZhangFTXFC23,
  author       = {Jiyi Zhang and
                  Han Fang and
                  Wesley Joon{-}Wie Tann and
                  Ke Xu and
                  Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Mitigating Adversarial Attacks by Distributing Different Copies to
                  Different Buyers},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {704--715},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3582824},
  doi          = {10.1145/3579856.3582824},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ZhangFTXFC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/HuangTYSYCK23,
  author       = {Jhih{-}Cing Huang and
                  Yu{-}Lin Tsai and
                  Chao{-}Han Huck Yang and
                  Cheng{-}Fang Su and
                  Chia{-}Mu Yu and
                  Pin{-}Yu Chen and
                  Sy{-}Yen Kuo},
  title        = {Certified Robustness of Quantum Classifiers Against Adversarial Examples
                  Through Quantum Noise},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing
                  {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICASSP49357.2023.10095030},
  doi          = {10.1109/ICASSP49357.2023.10095030},
  timestamp    = {Sun, 05 Nov 2023 16:51:21 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/HuangTYSYCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/FangZQLXFC23,
  author       = {Han Fang and
                  Jiyi Zhang and
                  Yupeng Qiu and
                  Jiayang Liu and
                  Ke Xu and
                  Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Tracing the Origin of Adversarial Attack for Forensic Investigation
                  and Deterrence},
  booktitle    = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023,
                  Paris, France, October 1-6, 2023},
  pages        = {4312--4321},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCV51070.2023.00400},
  doi          = {10.1109/ICCV51070.2023.00400},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/FangZQLXFC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/Du0F00FS23,
  author       = {Rong Du and
                  Qingqing Ye and
                  Yue Fu and
                  Haibo Hu and
                  Jin Li and
                  Chengfang Fang and
                  Jie Shi},
  title        = {Differential Aggregation against General Colluding Attackers},
  booktitle    = {39th {IEEE} International Conference on Data Engineering, {ICDE} 2023,
                  Anaheim, CA, USA, April 3-7, 2023},
  pages        = {2180--2193},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDE55515.2023.00169},
  doi          = {10.1109/ICDE55515.2023.00169},
  timestamp    = {Thu, 27 Jul 2023 14:59:05 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/Du0F00FS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc/PintorDSLFDB23,
  author       = {Maura Pintor and
                  Luca Demetrio and
                  Angelo Sotgiu and
                  Hsiao{-}Ying Lin and
                  Chengfang Fang and
                  Ambra Demontis and
                  Battista Biggio},
  title        = {Detecting Attacks Against Deep Reinforcement Learning for Autonomous
                  Driving},
  booktitle    = {International Conference on Machine Learning and Cybernetics, {ICMLC}
                  2023, Adelaide, Australia, July 9-11, 2023},
  pages        = {57--62},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICMLC58545.2023.10327986},
  doi          = {10.1109/ICMLC58545.2023.10327986},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmlc/PintorDSLFDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interspeech/ZhangXLWFS23,
  author       = {Mengao Zhang and
                  Ke Xu and
                  Hao Li and
                  Lei Wang and
                  Chengfang Fang and
                  Jie Shi},
  editor       = {Naomi Harte and
                  Julie Carson{-}Berndsen and
                  Gareth Jones},
  title        = {DoubleDeceiver: Deceiving the Speaker Verification System Protected
                  by Spoofing Countermeasures},
  booktitle    = {24th Annual Conference of the International Speech Communication Association,
                  Interspeech 2023, Dublin, Ireland, August 20-24, 2023},
  pages        = {4014--4018},
  publisher    = {{ISCA}},
  year         = {2023},
  url          = {https://doi.org/10.21437/Interspeech.2023-371},
  doi          = {10.21437/INTERSPEECH.2023-371},
  timestamp    = {Fri, 14 Jun 2024 14:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/interspeech/ZhangXLWFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/FangCQLXFZC23,
  author       = {Han Fang and
                  Kejiang Chen and
                  Yupeng Qiu and
                  Jiayang Liu and
                  Ke Xu and
                  Chengfang Fang and
                  Weiming Zhang and
                  Ee{-}Chien Chang},
  editor       = {Abdulmotaleb El{-}Saddik and
                  Tao Mei and
                  Rita Cucchiara and
                  Marco Bertini and
                  Diana Patricia Tobon Vallejo and
                  Pradeep K. Atrey and
                  M. Shamim Hossain},
  title        = {DeNoL: {A} Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel
                  Watermarking Robustness},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Multimedia,
                  {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023},
  pages        = {7345--7353},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581783.3612068},
  doi          = {10.1145/3581783.3612068},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/FangCQLXFZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiYHLWFS23,
  author       = {Haoyang Li and
                  Qingqing Ye and
                  Haibo Hu and
                  Jin Li and
                  Leixia Wang and
                  Chengfang Fang and
                  Jie Shi},
  title        = {3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack
                  in Federated Learning},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1893--1907},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179401},
  doi          = {10.1109/SP46215.2023.10179401},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiYHLWFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-01218,
  author       = {Han Fang and
                  Jiyi Zhang and
                  Yupeng Qiu and
                  Ke Xu and
                  Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Tracing the Origin of Adversarial Attack for Forensic Investigation
                  and Deterrence},
  journal      = {CoRR},
  volume       = {abs/2301.01218},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.01218},
  doi          = {10.48550/ARXIV.2301.01218},
  eprinttype    = {arXiv},
  eprint       = {2301.01218},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-01218.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-09315,
  author       = {Rong Du and
                  Qingqing Ye and
                  Yue Fu and
                  Haibo Hu and
                  Jin Li and
                  Chengfang Fang and
                  Jie Shi},
  title        = {Differential Aggregation against General Colluding Attackers},
  journal      = {CoRR},
  volume       = {abs/2302.09315},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.09315},
  doi          = {10.48550/ARXIV.2302.09315},
  eprinttype    = {arXiv},
  eprint       = {2302.09315},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-09315.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-05369,
  author       = {Li Wang and
                  Jiaqi Li and
                  Yuhao Luo and
                  Jiahao Zheng and
                  Lei Wang and
                  Hao Li and
                  Ke Xu and
                  Chengfang Fang and
                  Jie Shi and
                  Zhizheng Wu},
  title        = {AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification},
  journal      = {CoRR},
  volume       = {abs/2310.05369},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.05369},
  doi          = {10.48550/ARXIV.2310.05369},
  eprinttype    = {arXiv},
  eprint       = {2310.05369},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-05369.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengYHFS22,
  author       = {Huadi Zheng and
                  Qingqing Ye and
                  Haibo Hu and
                  Chengfang Fang and
                  Jie Shi},
  title        = {Protecting Decision Boundary of Machine Learning Model With Differentially
                  Private Perturbation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {3},
  pages        = {2007--2022},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3043382},
  doi          = {10.1109/TDSC.2020.3043382},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengYHFS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibe/LiMNS22,
  author       = {Tai{-}Yue Li and
                  Venugopala Reddy Mekala and
                  Ka{-}Lok Ng and
                  Cheng{-}Fang Su},
  title        = {Classification of Tumor Metastasis Data by Using Quantum kernel-based
                  Algorithms},
  booktitle    = {22nd {IEEE} International Conference on Bioinformatics and Bioengineering,
                  {BIBE} 2022, Taichung, Taiwan, November 7-9, 2022},
  pages        = {351--354},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BIBE55377.2022.00078},
  doi          = {10.1109/BIBE55377.2022.00078},
  timestamp    = {Mon, 02 Jan 2023 14:34:27 +0100},
  biburl       = {https://dblp.org/rec/conf/bibe/LiMNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/Xiao00ZFS22,
  author       = {Yaxin Xiao and
                  Qingqing Ye and
                  Haibo Hu and
                  Huadi Zheng and
                  Chengfang Fang and
                  Jie Shi},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {MExMI: Pool-based Active Model Extraction Crossover Membership Inference},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/4241c27d3161c7a7064bfc1a6e539563-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/Xiao00ZFS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-00887,
  author       = {Jhih{-}Cing Huang and
                  Yu{-}Lin Tsai and
                  Chao{-}Han Huck Yang and
                  Cheng{-}Fang Su and
                  Chia{-}Mu Yu and
                  Pin{-}Yu Chen and
                  Sy{-}Yen Kuo},
  title        = {Certified Robustness of Quantum Classifiers against Adversarial Examples
                  through Quantum Noise},
  journal      = {CoRR},
  volume       = {abs/2211.00887},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.00887},
  doi          = {10.48550/ARXIV.2211.00887},
  eprinttype    = {arXiv},
  eprint       = {2211.00887},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-00887.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-06123,
  author       = {Ambra Demontis and
                  Maura Pintor and
                  Luca Demetrio and
                  Kathrin Grosse and
                  Hsiao{-}Ying Lin and
                  Chengfang Fang and
                  Battista Biggio and
                  Fabio Roli},
  title        = {A Survey on Reinforcement Learning Security with Application to Autonomous
                  Driving},
  journal      = {CoRR},
  volume       = {abs/2212.06123},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.06123},
  doi          = {10.48550/ARXIV.2212.06123},
  eprinttype    = {arXiv},
  eprint       = {2212.06123},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-06123.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuJSZLSFYB021,
  author       = {Tianyu Du and
                  Shouling Ji and
                  Lujia Shen and
                  Yao Zhang and
                  Jinfeng Li and
                  Jie Shi and
                  Chengfang Fang and
                  Jianwei Yin and
                  Raheem Beyah and
                  Ting Wang},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {516--534},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484538},
  doi          = {10.1145/3460120.3484538},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DuJSZLSFYB021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShenJ0LCSFYW21,
  author       = {Lujia Shen and
                  Shouling Ji and
                  Xuhong Zhang and
                  Jinfeng Li and
                  Jing Chen and
                  Jie Shi and
                  Chengfang Fang and
                  Jianwei Yin and
                  Ting Wang},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Backdoor Pre-trained Models Can Transfer to All},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {3141--3158},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485370},
  doi          = {10.1145/3460120.3485370},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShenJ0LCSFYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-05527,
  author       = {An Zhang and
                  Xiang Wang and
                  Chengfang Fang and
                  Jie Shi and
                  Tat{-}Seng Chua and
                  Zehua Chen},
  title        = {{A-FMI:} Learning Attributions from Deep Networks via Feature Map
                  Importance},
  journal      = {CoRR},
  volume       = {abs/2104.05527},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.05527},
  eprinttype    = {arXiv},
  eprint       = {2104.05527},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-05527.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-05921,
  author       = {Xinyi Zhang and
                  Chengfang Fang and
                  Jie Shi},
  title        = {Thief, Beware of What Get You There: Towards Understanding Model Extraction
                  Attack},
  journal      = {CoRR},
  volume       = {abs/2104.05921},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.05921},
  eprinttype    = {arXiv},
  eprint       = {2104.05921},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-05921.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-00197,
  author       = {Lujia Shen and
                  Shouling Ji and
                  Xuhong Zhang and
                  Jinfeng Li and
                  Jing Chen and
                  Jie Shi and
                  Chengfang Fang and
                  Jianwei Yin and
                  Ting Wang},
  title        = {Backdoor Pre-trained Models Can Transfer to All},
  journal      = {CoRR},
  volume       = {abs/2111.00197},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.00197},
  eprinttype    = {arXiv},
  eprint       = {2111.00197},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-00197.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/LiFZMS20,
  author       = {Chengfang Li and
                  Xiaojie Fang and
                  Xiaokang Zhou and
                  Lin Mei and
                  Xuejun Sha},
  title        = {Enhanced signalling provisioning for UAV-enabled {MEC:} {A} GWFRFT-based
                  energy-spreading transmission approach},
  journal      = {{IET} Commun.},
  volume       = {14},
  number       = {15},
  pages        = {2524--2531},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-com.2019.1219},
  doi          = {10.1049/IET-COM.2019.1219},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/LiFZMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joi/HuTLC20,
  author       = {Ya{-}Han Hu and
                  Chun{-}Tien Tai and
                  Kang Ernest Liu and
                  Cheng{-}Fang Cai},
  title        = {Identification of highly-cited papers using topic-model-based and
                  bibliometric features: the consideration of keyword popularity},
  journal      = {J. Informetrics},
  volume       = {14},
  number       = {1},
  pages        = {101004},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.joi.2019.101004},
  doi          = {10.1016/J.JOI.2019.101004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joi/HuTLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiaoCFS20,
  author       = {Chang Liao and
                  Yao Cheng and
                  Chengfang Fang and
                  Jie Shi},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {Where Does the Robustness Come from?: {A} Study of the Transformation-based
                  Ensemble Defence},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421380},
  doi          = {10.1145/3411508.3421380},
  timestamp    = {Tue, 02 Nov 2021 16:38:38 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiaoCFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LinFS20,
  author       = {Hsiao{-}Ying Lin and
                  Chengfang Fang and
                  Jie Shi},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Bident Structure for Neural Network Model Protection},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {377--384},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008923403770384},
  doi          = {10.5220/0008923403770384},
  timestamp    = {Tue, 14 Apr 2020 10:48:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LinFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-13033,
  author       = {Chang Liao and
                  Yao Cheng and
                  Chengfang Fang and
                  Jie Shi},
  title        = {Where Does the Robustness Come from? {A} Study of the Transformation-based
                  Ensemble Defence},
  journal      = {CoRR},
  volume       = {abs/2009.13033},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.13033},
  eprinttype    = {arXiv},
  eprint       = {2009.13033},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-13033.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhengYHFS19,
  author       = {Huadi Zheng and
                  Qingqing Ye and
                  Haibo Hu and
                  Chengfang Fang and
                  Jie Shi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {{BDPL:} {A} Boundary Differentially Private Layer Against Machine
                  Learning Model Extraction Attacks},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {66--83},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_4},
  doi          = {10.1007/978-3-030-29959-0\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhengYHFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jns/KwonLS18,
  author       = {Young{-}Sam Kwon and
                  Ying{-}Chieh Lin and
                  Cheng{-}Fang Su},
  title        = {Derivation of Inviscid Quasi-geostrophic Equation from Rotational
                  Compressible Magnetohydrodynamic Flows},
  journal      = {J. Nonlinear Sci.},
  volume       = {28},
  number       = {2},
  pages        = {599--620},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00332-017-9420-3},
  doi          = {10.1007/S00332-017-9420-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jns/KwonLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/PengHLC18,
  author       = {Cheng{-}Fang Peng and
                  Jun{-}Wei Hsieh and
                  Shao{-}Wei Leu and
                  Chi{-}Hung Chuang},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Marek R. Ogiela and
                  Lidia Ogiela and
                  Nadeem Javaid},
  title        = {Drone-Based Vacant Parking Space Detection},
  booktitle    = {32nd International Conference on Advanced Information Networking and
                  Applications Workshops, {AINA} 2018 workshops, Krakow, Poland, May
                  16-18, 2018},
  pages        = {618--622},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/WAINA.2018.00155},
  doi          = {10.1109/WAINA.2018.00155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/PengHLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i2mtc/WengLHHWLCH17,
  author       = {Rui{-}Cian Weng and
                  Yen{-}Pei Lu and
                  Wan{-}Hsuan Hsu and
                  Cheng{-}Fang Ho and
                  Jun{-}Sheng Wang and
                  Min{-}Yu Lin and
                  Shih{-}Jye Chou and
                  Chi{-}Hung Hwang},
  title        = {Blood urea nitrogen analyzer developed to prevent acute stroke-in-evolution},
  booktitle    = {{IEEE} International Instrumentation and Measurement Technology Conference,
                  {I2MTC} 2017, Torino, Italy, May 22-25, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/I2MTC.2017.7969723},
  doi          = {10.1109/I2MTC.2017.7969723},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i2mtc/WengLHHWLCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/FangC14,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Optimal strategy of coupon subset collection when each package contains
                  half of the coupons},
  journal      = {Inf. Process. Lett.},
  volume       = {114},
  number       = {12},
  pages        = {703--705},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ipl.2014.06.012},
  doi          = {10.1016/J.IPL.2014.06.012},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/FangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FangC14,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Differential privacy with {\(\delta\)}-neighbourhood for spatial and
                  dynamic datasets},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {159--170},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590320},
  doi          = {10.1145/2590296.2590320},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmm/FangZC14,
  author       = {Chengfang Fang and
                  Chunwang Zhang and
                  Ee{-}Chien Chang},
  editor       = {Cathal Gurrin and
                  Frank Hopfgartner and
                  Wolfgang H{\"{u}}rst and
                  H{\aa}vard D. Johansen and
                  Hyowon Lee and
                  Noel E. O'Connor},
  title        = {An Optimization Model for Aesthetic Two-Dimensional Barcodes},
  booktitle    = {MultiMedia Modeling - 20th Anniversary International Conference, {MMM}
                  2014, Dublin, Ireland, January 6-10, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8325},
  pages        = {278--290},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04114-8\_24},
  doi          = {10.1007/978-3-319-04114-8\_24},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmm/FangZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TsengLLC13,
  author       = {Yen{-}Chieh Tseng and
                  Da{-}Sheng Lee and
                  Cheng{-}Fang Lin and
                  Ching{-}Yuan Chang},
  title        = {A Novel Sensor Platform Matching the Improved Version of {IPMVP} Option
                  {C} for Measuring Energy Savings},
  journal      = {Sensors},
  volume       = {13},
  number       = {5},
  pages        = {6811--6831},
  year         = {2013},
  url          = {https://doi.org/10.3390/s130506811},
  doi          = {10.3390/S130506811},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/TsengLLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbsn/YenYCWCK12,
  author       = {Ju{-}Yu Yen and
                  Cheng{-}Fang Yen and
                  Cheng{-}Sheng Chen and
                  Peng{-}Wei Wang and
                  Yi{-}Hsin Chang and
                  Chih{-}Hung Ko},
  title        = {Social Anxiety in Online and Real-Life Interaction and Their Associated
                  Factors},
  journal      = {Cyberpsychology Behav. Soc. Netw.},
  volume       = {15},
  number       = {1},
  pages        = {7--12},
  year         = {2012},
  url          = {https://doi.org/10.1089/cyber.2011.0015},
  doi          = {10.1089/CYBER.2011.0015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbsn/YenYCWCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/HuangLCY12,
  author       = {Cheng{-}Fang Huang and
                  Teh{-}Lu Liao and
                  Chih{-}Yung Chen and
                  Jun{-}Juh Yan},
  title        = {The design of quasi-sliding mode control for a permanent magnet synchronous
                  motor with unmatched uncertainties},
  journal      = {Comput. Math. Appl.},
  volume       = {64},
  number       = {5},
  pages        = {1036--1043},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.camwa.2012.03.022},
  doi          = {10.1016/J.CAMWA.2012.03.022},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/HuangLCY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hac/LeiH12,
  author       = {Lih{-}Wei Lei and
                  Cheng{-}Fang Huang},
  title        = {Learning english through musicals: a case study of social economically
                  disadvantaged aboriginal students in Eastern Taiwan},
  journal      = {Int. J. Humanit. Arts Comput.},
  volume       = {6},
  number       = {1-2},
  pages        = {204--210},
  year         = {2012},
  url          = {https://doi.org/10.3366/ijhac.2012.0049},
  doi          = {10.3366/IJHAC.2012.0049},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/hac/LeiH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/FangC12,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {Adaptive Differentially Private Histogram of Low-Dimensional Data},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {160--179},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_9},
  doi          = {10.1007/978-3-642-31680-7\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/FangC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbsn/YenYWHK11,
  author       = {Ju{-}Yu Yen and
                  Cheng{-}Fang Yen and
                  Hsiu{-}Yi Wu and
                  Chun{-}Jen Huang and
                  Chih{-}Hung Ko},
  title        = {Hostility in the Real World and Online: The Effect of Internet Addiction,
                  Depression, and Online Activity},
  journal      = {Cyberpsychology Behav. Soc. Netw.},
  volume       = {14},
  number       = {11},
  pages        = {649--655},
  year         = {2011},
  url          = {https://doi.org/10.1089/cyber.2010.0393},
  doi          = {10.1089/CYBER.2010.0393},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbsn/YenYWHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuLXFXC11,
  author       = {Jie Yu and
                  Zhoujun Li and
                  Peng Xiao and
                  Chengfang Fang and
                  Jia Xu and
                  Ee{-}Chien Chang},
  title        = {{ID} Repetition in Structured {P2P} Networks},
  journal      = {Comput. J.},
  volume       = {54},
  number       = {6},
  pages        = {962--975},
  year         = {2011},
  url          = {https://doi.org/10.1093/comjnl/bxr017},
  doi          = {10.1093/COMJNL/BXR017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YuLXFXC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cphysics/YangHL11,
  author       = {Chao{-}Tung Yang and
                  Chih{-}Lin Huang and
                  Cheng{-}Fang Lin},
  title        = {Hybrid CUDA, OpenMP, and {MPI} parallel programming on multicore {GPU}
                  clusters},
  journal      = {Comput. Phys. Commun.},
  volume       = {182},
  number       = {1},
  pages        = {266--269},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cpc.2010.06.035},
  doi          = {10.1016/J.CPC.2010.06.035},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cphysics/YangHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuFX11,
  author       = {Xuejiao Liu and
                  Chengfang Fang and
                  Debao Xiao},
  title        = {Intrusion diagnosis and prediction with expert system},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {12},
  pages        = {1483--1494},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.293},
  doi          = {10.1002/SEC.293},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuFX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/HsiaoCTLC11,
  author       = {Ya{-}Li Hsiao and
                  Po{-}Fon Chen and
                  Cheng{-}Fang Tsai and
                  Hsiang{-}Chuan Liu and
                  Pei{-}Chun Chang},
  title        = {Choquet integral algorithm for T-cell epitope prediction based on
                  fuzzy measure},
  booktitle    = {Eighth International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2011, 26-28 July 2011, Shanghai, China},
  pages        = {1588--1591},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/FSKD.2011.6019854},
  doi          = {10.1109/FSKD.2011.6019854},
  timestamp    = {Fri, 13 Aug 2021 09:26:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/HsiaoCTLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/FangLC11,
  author       = {Chengfang Fang and
                  Qiming Li and
                  Ee{-}Chien Chang},
  title        = {Identity leakage mitigation on asymmetric secure sketch},
  booktitle    = {2011 {IEEE} International Joint Conference on Biometrics, {IJCB} 2011,
                  Washington, DC, USA, October 11-13, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IJCB.2011.6117542},
  doi          = {10.1109/IJCB.2011.6117542},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icb/FangLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-6677,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Publishing Location Dataset Differential Privately with Isotonic Regression},
  journal      = {CoRR},
  volume       = {abs/1111.6677},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.6677},
  eprinttype    = {arXiv},
  eprint       = {1111.6677},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-6677.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/LinHLY10,
  author       = {Jui{-}Sheng Lin and
                  Cheng{-}Fang Huang and
                  Teh{-}Lu Liao and
                  Jun{-}Juh Yan},
  title        = {Design and implementation of digital secure communication based on
                  synchronized chaotic systems},
  journal      = {Digit. Signal Process.},
  volume       = {20},
  number       = {1},
  pages        = {229--237},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.dsp.2009.04.006},
  doi          = {10.1016/J.DSP.2009.04.006},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/LinHLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FangLC10,
  author       = {Chengfang Fang and
                  Qiming Li and
                  Ee{-}Chien Chang},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Secure Sketch for Multiple Secrets},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {367--383},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_22},
  doi          = {10.1007/978-3-642-13708-2\_22},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FangLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FangC10,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Securing interactive sessions using mobile device through visual channel
                  and visual inspection},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {69--78},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920272},
  doi          = {10.1145/1920261.1920272},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ChangFX10,
  author       = {Ee{-}Chien Chang and
                  Chengfang Fang and
                  Jia Xu},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {A chameleon encryption scheme resistant to known-plaintext attack},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866876},
  doi          = {10.1145/1866870.1866876},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/ChangFX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/YangHLC10,
  author       = {Chao{-}Tung Yang and
                  Chih{-}Lin Huang and
                  Cheng{-}Fang Lin and
                  Tzu{-}Chieh Chang},
  title        = {Hybrid Parallel Programming on {GPU} Clusters},
  booktitle    = {{IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications, {ISPA} 2010, Taipei, Taiwan, 6-9 September 2010},
  pages        = {142--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISPA.2010.97},
  doi          = {10.1109/ISPA.2010.97},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/YangHLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-0723,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Securing Kiosk using Mobile Devices coupled with Visual Inspection},
  journal      = {CoRR},
  volume       = {abs/1003.0723},
  year         = {2010},
  url          = {http://arxiv.org/abs/1003.0723},
  eprinttype    = {arXiv},
  eprint       = {1003.0723},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1003-0723.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbsn/YenYCTK09,
  author       = {Ju{-}Yu Yen and
                  Cheng{-}Fang Yen and
                  Cheng{-}Sheng Chen and
                  Tze{-}Chun Tang and
                  Chih{-}Hung Ko},
  title        = {The Association between Adult {ADHD} Symptoms and Internet Addiction
                  among College Students: The Gender Difference},
  journal      = {Cyberpsychology Behav. Soc. Netw.},
  volume       = {12},
  number       = {2},
  pages        = {187--191},
  year         = {2009},
  url          = {https://doi.org/10.1089/cpb.2008.0113},
  doi          = {10.1089/CPB.2008.0113},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbsn/YenYCTK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ChengHCY09,
  author       = {Da{-}Long Cheng and
                  Cheng{-}Fang Huang and
                  Shun{-}Yuan Cheng and
                  Jun{-}Juh Yan},
  title        = {Synchronization of optical chaos in vertical-cavity surface-emitting
                  lasers via optimal {PI} controller},
  journal      = {Expert Syst. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {6854--6858},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.eswa.2008.08.005},
  doi          = {10.1016/J.ESWA.2008.08.005},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/ChengHCY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoscale/YuFLL09,
  author       = {Jie Yu and
                  Chengfang Fang and
                  Liming Lu and
                  Zhoujun Li},
  editor       = {Peter Mueller and
                  Jiannong Cao and
                  Cho{-}Li Wang},
  title        = {A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks},
  booktitle    = {Scalable Information Systems, 4th International {ICST} Conference,
                  Infoscale 2009, Hong Kong, June 10-11, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {18},
  pages        = {175--191},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10485-5\_13},
  doi          = {10.1007/978-3-642-10485-5\_13},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoscale/YuFLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/YuFXCL09,
  author       = {Jie Yu and
                  Chengfang Fang and
                  Jia Xu and
                  Ee{-}Chien Chang and
                  Zhoujun Li},
  editor       = {Henning Schulzrinne and
                  Karl Aberer and
                  Anwitaman Datta},
  title        = {{ID} Repetition in Kad},
  booktitle    = {Proceedings {P2P} 2009, Ninth International Conference on Peer-to-Peer
                  Computing, 9-11 September 2009, Seattle, Washington, {USA}},
  pages        = {111--120},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/P2P.2009.5284551},
  doi          = {10.1109/P2P.2009.5284551},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/YuFXCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbsn/KoYYCW08,
  author       = {Chih{-}Hung Ko and
                  Ju{-}Yu Yen and
                  Cheng{-}Fang Yen and
                  Chung{-}Sheng Chen and
                  Shing{-}Yaw Wang},
  title        = {The Association between Internet Addiction and Belief of Frustration
                  Intolerance: The Gender Difference},
  journal      = {Cyberpsychology Behav. Soc. Netw.},
  volume       = {11},
  number       = {3},
  pages        = {273--278},
  year         = {2008},
  url          = {https://doi.org/10.1089/cpb.2007.0095},
  doi          = {10.1089/CPB.2007.0095},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbsn/KoYYCW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbsn/KoYYCWC08,
  author       = {Chih{-}Hung Ko and
                  Ju{-}Yu Yen and
                  Cheng{-}Fang Yen and
                  Cheng{-}Sheng Chen and
                  Chih{-}Chi Weng and
                  Cheng{-}Chung Chen},
  title        = {The Association between Internet Addiction and Problematic Alcohol
                  Use in Adolescents: The Problem Behavior Model},
  journal      = {Cyberpsychology Behav. Soc. Netw.},
  volume       = {11},
  number       = {5},
  pages        = {571--576},
  year         = {2008},
  url          = {https://doi.org/10.1089/cpb.2007.0199},
  doi          = {10.1089/CPB.2007.0199},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbsn/KoYYCWC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FangC08,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Information Leakage in Optimal Anonymized and Diversified Data},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_3},
  doi          = {10.1007/978-3-540-88961-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/FangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FangC08,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Information Leakage in Optimal Anonymized and Diversified Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbsn/KoYYLY07,
  author       = {Chih{-}Hung Ko and
                  Ju{-}Yu Yen and
                  Cheng{-}Fang Yen and
                  Huang{-}chi Lin and
                  Ming{-}Jen Yang},
  title        = {Factors Predictive for Incidence and Remission of Internet Addiction
                  in Young Adolescents: {A} Prospective Study},
  journal      = {Cyberpsychology Behav. Soc. Netw.},
  volume       = {10},
  number       = {4},
  pages        = {545--551},
  year         = {2007},
  url          = {https://doi.org/10.1089/cpb.2007.9992},
  doi          = {10.1089/CPB.2007.9992},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbsn/KoYYLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbsn/YenYCCK07,
  author       = {Ju{-}Yu Yen and
                  Cheng{-}Fang Yen and
                  Cheng{-}Chung Chen and
                  Sue{-}Huei Chen and
                  Chih{-}Hung Ko},
  title        = {Family Factors of Internet Addiction and Substance Use Experience
                  in Taiwanese Adolescents},
  journal      = {Cyberpsychology Behav. Soc. Netw.},
  volume       = {10},
  number       = {3},
  pages        = {323--329},
  year         = {2007},
  url          = {https://doi.org/10.1089/cpb.2006.9948},
  doi          = {10.1089/CPB.2006.9948},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbsn/YenYCCK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/YangSLC07,
  author       = {Chao{-}Tung Yang and
                  Po{-}Chi Shih and
                  Cheng{-}Fang Lin and
                  Sung{-}Yi Chen},
  title        = {A resource broker with an efficient network information model on grid
                  environments},
  journal      = {J. Supercomput.},
  volume       = {40},
  number       = {3},
  pages        = {249--267},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11227-006-0025-0},
  doi          = {10.1007/S11227-006-0025-0},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/YangSLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/YangLC06,
  author       = {Chao{-}Tung Yang and
                  Cheng{-}Fang Lin and
                  Sung{-}Yi Chen},
  title        = {A Workflow-based Computational Resource Broker with Information Monitoring
                  in Grids},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2006, 5th International Conference,
                  Changsha, Hunan, China, 21-23 October 2006, Proceedings},
  pages        = {199--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/GCC.2006.23},
  doi          = {10.1109/GCC.2006.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/YangLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/YangSLHL05,
  author       = {Chao{-}Tung Yang and
                  Po{-}Chi Shih and
                  Cheng{-}Fang Lin and
                  Ching{-}Hsien Hsu and
                  Kuan{-}Ching Li},
  editor       = {Yi Pan and
                  Daoxu Chen and
                  Minyi Guo and
                  Jiannong Cao and
                  Jack J. Dongarra},
  title        = {A Chronological History-Based Execution Time Estimation Model for
                  Embarrassingly Parallel Applications on Grids},
  booktitle    = {Parallel and Distributed Processing and Applications, Third International
                  Symposium, {ISPA} 2005, Nanjing, China, November 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3758},
  pages        = {425--430},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11576235\_45},
  doi          = {10.1007/11576235\_45},
  timestamp    = {Tue, 14 Apr 2020 13:23:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/YangSLHL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics