


Остановите войну!
for scientists:


default search action
Ee-Chien Chang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c96]S. M. Suhail Hussain, Muhammad M. Roomi, Daisuke Mashima, Ee-Chien Chang:
End-to-End Performance Evaluation of R-SV / R-GOOSE Messages for Wide Area Protection and Control Applications. ISGT 2023: 1-5 - [i38]Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. CoRR abs/2301.01218 (2023) - [i37]Jiyi Zhang, Han Fang, Hwee Kuan Lee, Ee-Chien Chang:
Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation. CoRR abs/2305.05869 (2023) - 2022
- [j20]Sajal Sarkar
, Yong Meng Teo, Ee-Chien Chang:
A cybersecurity assessment framework for virtual operational technology in power system automation. Simul. Model. Pract. Theory 117: 102453 (2022) - [j19]Jianting Ning
, Geong Sen Poh
, Xinyi Huang
, Robert H. Deng
, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. IEEE Trans. Dependable Secur. Comput. 19(2): 1164-1180 (2022) - [j18]Qin Jiang
, Ee-Chien Chang, Yong Qi
, Saiyu Qi
, Pengfei Wu
, Jianfeng Wang
:
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX. IEEE Trans. Inf. Forensics Secur. 17: 1053-1068 (2022) - [c95]Sufatrio, Jan Vykopal, Ee-Chien Chang:
Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications. ACE 2022: 114-122 - [c94]Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee:
Confusing and Detecting ML Adversarial Attacks with Injected Attractors. AsiaCCS 2022: 322-336 - [c93]Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Scalable Private Decision Tree Evaluation with Sublinear Communication. AsiaCCS 2022: 843-857 - [c92]Han Fang, Zhaoyang Jia, Zehua Ma
, Ee-Chien Chang, Weiming Zhang:
PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. ACM Multimedia 2022: 2267-2275 - [c91]Pengfei Wu, Jianting Ning, Jiamin Shen, Hongbing Wang, Ee-Chien Chang:
Hybrid Trust Multi-party Computation with Trusted Execution Environment. NDSS 2022 - [i36]Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Scalable Private Decision Tree Evaluation with Sublinear Communication. CoRR abs/2205.01284 (2022) - [i35]Han Fang, Zhaoyang Jia, Yupeng Qiu, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
De-END: Decoder-driven Watermarking Network. CoRR abs/2206.13032 (2022) - [i34]Mingyuan Gao, Hung Dang, Ee-Chien Chang, Jialin Li:
Mixed Fault Tolerance Protocols with Trusted Execution Environment. CoRR abs/2208.01946 (2022) - [i33]Wesley Joon-Wie Tann, Akhil Vuputuri, Ee-Chien Chang:
Predicting Non-Fungible Token (NFT) Collections: A Contextual Generative Approach. CoRR abs/2210.15493 (2022) - [i32]Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren:
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. CoRR abs/2212.00612 (2022) - 2021
- [c90]Mingyuan Gao, Hung Dang, Ee-Chien Chang:
TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment. ACSAC 2021: 235-247 - [c89]Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang:
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning. AsiaCCS 2021: 432-446 - [c88]Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang, Hwee Kuan Lee:
Common Component in Black-Boxes Is Prone to Attacks. ESORICS (1) 2021: 584-604 - [c87]Aris Cahyadi Risdianto, Ee-Chien Chang:
OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity Generation. INFOCOM Workshops 2021: 1-3 - [i31]Wesley Joon-Wie Tann, Ee-Chien Chang:
Poisoning of Online Learning Filters: DDoS Attacks and Countermeasures. CoRR abs/2107.12612 (2021) - [i30]Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Users. CoRR abs/2111.15160 (2021) - [i29]Jia Xu, Yiwen Gao, Hoon Wei Lim, Hongbing Wang, Ee-Chien Chang:
Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2021: 989 (2021) - 2020
- [c86]Connie Kou, Hwee Kuan Lee, Ee-Chien Chang, Teck Khim Ng:
Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier. ICLR 2020 - [c85]Jan Vykopal
, Valdemar Svábenský
, Ee-Chien Chang
:
Benefits and Pitfalls of Using Capture the Flag Games in University Courses. SIGCSE 2020: 752-758 - [c84]Muhammad M. Roomi
, Partha P. Biswas, Daisuke Mashima, Yuting Fan, Ee-Chien Chang:
False Data Injection Cyber Range of Modernized Substation System. SmartGridComm 2020: 1-7 - [i28]Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee:
Detection and Recovery of Adversarial Attacks with Injected Attractors. CoRR abs/2003.02732 (2020) - [i27]Jan Vykopal, Valdemar Svábenský, Ee-Chien Chang:
Benefits and Pitfalls of Using Capture the Flag Games in University Courses. CoRR abs/2004.11556 (2020) - [i26]Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, Fan Zhang:
Defending Model Inversion and Membership Inference Attacks via Prediction Purification. CoRR abs/2005.03915 (2020) - [i25]Wesley Joon-Wie Tann, Ee-Chien Chang, Bryan Hooi:
SHADOWCAST: Controlling Network Properties to Explain Graph Generation. CoRR abs/2006.03774 (2020) - [i24]Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang:
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning. CoRR abs/2012.06805 (2020)
2010 – 2019
- 2019
- [j17]Jianting Ning
, Jia Xu, Kaitai Liang
, Fan Zhang
, Ee-Chien Chang
:
Passive Attacks Against Searchable Encryption. IEEE Trans. Inf. Forensics Secur. 14(3): 789-802 (2019) - [c83]Ziqi Yang, Jiyi Zhang, Ee-Chien Chang
, Zhenkai Liang:
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment. CCS 2019: 225-240 - [c82]Jianting Ning, Geong Sen Poh, Jia-Ch'ng Loh
, Jason Chia, Ee-Chien Chang
:
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules. CCS 2019: 1657-1670 - [c81]Hung Dang, Dat Le Tien, Ee-Chien Chang
:
Towards a Marketplace for Secure Outsourced Computations. ESORICS (1) 2019: 790-808 - [c80]Hung Dang, Tien Tuan Anh Dinh, Dumitrel Loghin, Ee-Chien Chang
, Qian Lin, Beng Chin Ooi:
Towards Scaling Blockchain Systems via Sharding. SIGMOD Conference 2019: 123-140 - [i23]Ziqi Yang, Ee-Chien Chang, Zhenkai Liang:
Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment. CoRR abs/1902.08552 (2019) - [i22]Hung Dang, Ee-Chien Chang:
Autonomous Membership Service for Enclave Applications. CoRR abs/1905.06460 (2019) - [i21]Connie Kou, Hwee Kuan Lee, Teck Khim Ng, Ee-Chien Chang:
Enhancing Transformation-based Defenses using a Distribution Classifier. CoRR abs/1906.00258 (2019) - [i20]Ziqi Yang, Hung Dang, Ee-Chien Chang:
Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking. CoRR abs/1906.06046 (2019) - [i19]Hung Dang, Ee-Chien Chang:
Self-Expiring Data Capsule using Trusted Execution Environment. CoRR abs/1911.09305 (2019) - 2018
- [c79]Anand Agrawal, Chuadhry Mujeeb Ahmed
, Ee-Chien Chang
:
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System. AsiaCCS 2018: 821-823 - [c78]Pravein Govindan Kannan, Ahmad Soltani
, Mun Choon Chan, Ee-Chien Chang:
BNV: Enabling Scalable Network Experimentation through Bare-metal Network Virtualization. CSET @ USENIX Security Symposium 2018 - [c77]Sajal Sarkar
, Anand Agrawal, Yong Meng Teo, Ee-Chien Chang
:
Votnet: Hybrid simulation of Virtual Operational Technology Network for Cybersecurity Assessment. WSC 2018: 1168-1179 - [i18]Jiyi Zhang, Hung Dang, Hwee Kuan Lee, Ee-Chien Chang:
Learning Inverse Mappings with Adversarial Criterion. CoRR abs/1802.04504 (2018) - [i17]Hung Dang, Anh Dinh, Ee-Chien Chang, Beng Chin Ooi:
Chain of Trust: Can Trusted Hardware Help Scaling Blockchains? CoRR abs/1804.00399 (2018) - [i16]Hung Dang, Dat Le Tien, Ee-Chien Chang:
Fair Marketplace for Secure Outsourced Computations. CoRR abs/1808.09682 (2018) - [i15]Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang:
Keeping Time-Release Secrets through Smart Contracts. IACR Cryptol. ePrint Arch. 2018: 1166 (2018) - 2017
- [j16]Hung Dang, Tien Tuan Anh Dinh, Ee-Chien Chang, Beng Chin Ooi:
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute. Proc. Priv. Enhancing Technol. 2017(3): 21 (2017) - [c76]Hung Dang, Ee-Chien Chang
:
Privacy-Preserving Data Deduplication on Trusted Processors. CLOUD 2017: 66-73 - [c75]Hung Dang, Yue Huang, Ee-Chien Chang
:
Evading Classifiers by Morphing in the Dark. CCS 2017: 119-133 - [c74]Hung Dang, Erick Purwanto, Ee-Chien Chang
:
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated. AsiaCCS 2017: 408-422 - [c73]Jia Xu, Ee-Chien Chang
, Jianying Zhou
:
A New Functional Encryption for Multidimensional Range Query (Short Paper). ISPEC 2017: 361-372 - [c72]Pravein Govindan Kannan
, Mun Choon Chan, Richard T. B. Ma
, Ee-Chien Chang
:
Raptor: Scalable rule placement over multiple path in software defined networks. Networking 2017: 1-9 - [c71]Lavanya Ramapantulu, Yong Meng Teo
, Ee-Chien Chang
:
A conceptural framework to federate testbeds for cybersecurity. WSC 2017: 457-468 - [c70]Teodora Baluta, Lavanya Ramapantulu, Yong Meng Teo
, Ee-Chien Chang
:
Modeling the effects of insider threats on cybersecurity of complex systems. WSC 2017: 4360-4371 - [i14]Hung Dang, Yue Huang, Ee-Chien Chang:
Evading Classifier in the Dark: Guiding Unpredictable Morphing Using Binary-Output Blackboxes. CoRR abs/1705.07535 (2017) - [i13]Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang:
PermuteRam: Optimizing Oblivious Computation for Efficiency. IACR Cryptol. ePrint Arch. 2017: 885 (2017) - [i12]Jia Xu, Ee-Chien Chang, Jianying Zhou:
A New Functional Encryption for Multidimensional Range Query. IACR Cryptol. ePrint Arch. 2017: 970 (2017) - 2016
- [c69]Paramasiven Appavoo, Mun Choon Chan, Bhojan Anand, Ee-Chien Chang
:
Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services. COMSNETS 2016: 1-8 - [c68]Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang
:
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation. IH&MMSec 2016: 69-80 - [c67]Minoru Kuribayashi
, Ee-Chien Chang
, Nobuo Funabiki:
Watermarking with Fixed Decoder for Aesthetic 2D Barcode. IWDW 2016: 379-392 - [c66]Jia Xu, Ee-Chien Chang
, Jianying Zhou
:
Directed Transitive Signature on Directed Tree. SG-CRC 2016: 91-98 - 2015
- [c65]Hung Dang, Ee-Chien Chang
:
PrAd: Enabling Privacy-Aware Location based Advertising. GeoPrivacy@SIGSPATIAL 2015: 1:1-1:8 - [c64]Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, Chunwang Zhang:
M2R: Enabling Stronger Privacy in MapReduce Computation. USENIX Security Symposium 2015: 447-462 - 2014
- [j15]Chengfang Fang, Ee-Chien Chang
:
Optimal strategy of coupon subset collection when each package contains half of the coupons. Inf. Process. Lett. 114(12): 703-705 (2014) - [c63]Chunwang Zhang, Ee-Chien Chang
:
Processing of Mixed-Sensitivity Video Surveillance Streams on Hybrid Clouds. IEEE CLOUD 2014: 9-16 - [c62]Chunwang Zhang, Ee-Chien Chang
, Roland H. C. Yap:
Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds. CCGRID 2014: 31-40 - [c61]Chengfang Fang, Ee-Chien Chang
:
Differential privacy with δ-neighbourhood for spatial and dynamic datasets. AsiaCCS 2014: 159-170 - [c60]Chengfang Fang, Chunwang Zhang, Ee-Chien Chang
:
An Optimization Model for Aesthetic Two-Dimensional Barcodes. MMM (1) 2014: 278-290 - [i11]Hoon Wei Lim, Shruti Tople, Prateek Saxena, Ee-Chien Chang:
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2014: 539 (2014) - 2013
- [c59]Jia Xu, Ee-Chien Chang
, Jianying Zhou
:
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. AsiaCCS 2013: 195-206 - [c58]Chunwang Zhang, Ee-Chien Chang
, Roland H. C. Yap:
Towards a general framework for secure MapReduce computation on hybrid clouds. SoCC 2013: 36:1-36:2 - 2012
- [c57]Mamadou H. Diallo, Bijit Hore, Ee-Chien Chang
, Sharad Mehrotra, Nalini Venkatasubramanian:
CloudProtect: Managing Data Privacy in Cloud Applications. IEEE CLOUD 2012: 303-310 - [c56]Jia Xu, Ee-Chien Chang
:
Towards efficient proofs of retrievability. AsiaCCS 2012: 79-80 - [c55]Bhojan Anand, Lee Kee Chong, Ee-Chien Chang
, Mun Choon Chan, Akkihebbal L. Ananda, Wei Tsang Ooi
:
El-pincel: a painter cloud service for greener web pages. ACM Multimedia 2012: 399-408 - [c54]Chengfang Fang, Ee-Chien Chang
:
Adaptive Differentially Private Histogram of Low-Dimensional Data. Privacy Enhancing Technologies 2012: 160-179 - [c53]Bijit Hore, Ee-Chien Chang
, Mamadou H. Diallo, Sharad Mehrotra:
Indexing Encrypted Documents for Supporting Efficient Keyword Search. Secure Data Management 2012: 93-110 - [c52]Chunwang Zhang, Junjie Jin, Ee-Chien Chang
, Sharad Mehrotra:
Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services. Secure Data Management 2012: 111-129 - 2011
- [j14]Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu, Ee-Chien Chang
:
ID Repetition in Structured P2P Networks. Comput. J. 54(6): 962-975 (2011) - [j13]Ee-Chien Chang
, Liming Lu
, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing host security using external environment sensors. Int. J. Inf. Sec. 10(5): 285-299 (2011) - [c51]Chengfang Fang, Qiming Li, Ee-Chien Chang
:
Identity leakage mitigation on asymmetric secure sketch. IJCB 2011: 1-6 - [c50]Qiming Li, Bilgehan Sahin, Ee-Chien Chang
, Vrizlynn L. L. Thing:
Content based JPEG fragmentation point detection. ICME 2011: 1-6 - [i10]Chengfang Fang, Ee-Chien Chang:
Publishing Location Dataset Differential Privately with Isotonic Regression. CoRR abs/1111.6677 (2011) - [i9]Jia Xu, Ee-Chien Chang:
Practically Efficient Proof of Retrievability in Cloud Storage. IACR Cryptol. ePrint Arch. 2011: 362 (2011) - [i8]Jia Xu, Ee-Chien Chang:
Towards Efficient Provable Data Possession. IACR Cryptol. ePrint Arch. 2011: 574 (2011) - 2010
- [j12]Vrizlynn L. L. Thing, Kian-Yong Ng, Ee-Chien Chang
:
Live memory forensics of mobile phones. Digit. Investig. 7(Supplement): S74-S82 (2010) - [c49]Chengfang Fang, Qiming Li, Ee-Chien Chang
:
Secure Sketch for Multiple Secrets. ACNS 2010: 367-383 - [c48]Chengfang Fang, Ee-Chien Chang
:
Securing interactive sessions using mobile device through visual channel and visual inspection. ACSAC 2010: 69-78 - [c47]Fai Cheong Choo, Mun Choon Chan, Ee-Chien Chang
:
Robustness of DTN against routing attacks. COMSNETS 2010: 1-10 - [c46]Ee-Chien Chang
, Chengfang Fang, Jia Xu:
A chameleon encryption scheme resistant to known-plaintext attack. Digital Rights Management Workshop 2010: 25-34 - [c45]Liming Lu, Ee-Chien Chang
, Mun Choon Chan:
Website Fingerprinting and Identification Using Ordered Feature Sequences. ESORICS 2010: 199-214 - [c44]Ee-Chien Chang
, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing Host Security Using External Environment Sensors. SecureComm 2010: 362-379 - [i7]Chengfang Fang, Ee-Chien Chang:
Securing Kiosk using Mobile Devices coupled with Visual Inspection. CoRR abs/1003.0723 (2010) - [i6]Jia Xu, Ee-Chien Chang:
Authenticating Aggregate Range Queries over Multidimensional Dataset. IACR Cryptol. ePrint Arch. 2010: 50 (2010)
2000 – 2009
- 2009
- [j11]Hang Yu, Ee-Chien Chang
, Wei Tsang Ooi
, Mun Choon Chan, Wei Cheng:
Integrated Optimization of Video Server Resource and Streaming Quality Over Best-Effort Network. IEEE Trans. Circuits Syst. Video Technol. 19(3): 374-385 (2009) - [c43]Ee-Chien Chang
, Chee Liang Lim, Jia Xu:
Short Redactable Signatures Using Random Trees. CT-RSA 2009: 133-147 - [c42]Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang
, Zhoujun Li:
ID Repetition in Kad. Peer-to-Peer Computing 2009: 111-120 - [i5]Ee-Chien Chang, Chee Liang Lim, Jia Xu:
Short Redactable Signatures Using Random Trees. IACR Cryptol. ePrint Arch. 2009: 25 (2009) - 2008
- [c41]Liming Lu
, Mun Choon Chan, Ee-Chien Chang
:
A general model of probabilistic packet marking for IP traceback. AsiaCCS 2008: 179-188 - [c40]Qiming Li, Muchuan Guo, Ee-Chien Chang
:
Fuzzy extractors for asymmetric biometric representations. CVPR Workshops 2008: 1-6 - [c39]Ee-Chien Chang, Jia Xu:
Remote Integrity Check with Dishonest Storage Server. ESORICS 2008: 223-237 - [c38]Chengfang Fang, Ee-Chien Chang:
Information Leakage in Optimal Anonymized and Diversified Data. Information Hiding 2008: 30-44 - [c37]Nicholas Zhong-Yang Ho, Ee-Chien Chang:
Residual Information of Redacted Images Hidden in the Compression Artifacts. Information Hiding 2008: 87-101 - [i4]Ee-Chien Chang, Jia Xu:
Remote Integrity Check with Dishonest Storage Server. IACR Cryptol. ePrint Arch. 2008: 346 (2008) - [i3]Chengfang Fang, Ee-Chien Chang:
Information Leakage in Optimal Anonymized and Diversified Data. IACR Cryptol. ePrint Arch. 2008: 347 (2008) - 2007
- [j10]Shuiming Ye, Qibin Sun, Ee-Chien Chang:
Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. Trans. Data Hiding Multim. Secur. 2: 48-67 (2007) - [c36]Ratna Dutta, Ee-Chien Chang
, Sourav Mukhopadhyay:
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. ACNS 2007: 385-400 - [c35]Ee-Chien Chang, Sujoy Roy:
Robust Extraction of Secret Bits from Minutiae. ICB 2007: 750-759 - [c34]Shuiming Ye, Qibin Sun, Ee-Chien Chang:
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact. ICME 2007: 12-15 - 2006
- [j9]Ee-Chien Chang
, Sung Woo Choi, DoYong Kwon, Hyungju Park, Chee-Keng Yap:
Shortest Path amidst Disc Obstacles Is Computable. Int. J. Comput. Geom. Appl. 16(5-6): 567-590 (2006) - [c33]Mun Choon Chan, Ee-Chien Chang
, Liming Lu, Peng Song Ngiam:
Effect of Malicious Synchronization. ACNS 2006: 114-129 - [c32]Ee-Chien Chang
, Ren Shen, Francis Weijian Teo:
Finding the original point set hidden among chaff. AsiaCCS 2006: 182-188 - [c31]Ee-Chien Chang
, Qiming Li:
Hiding Secret Points Amidst Chaff. EUROCRYPT 2006: 59-72 - [c30]Chen Chen, Zhiyong Huang, Hang Yu, Ee-Chien Chang:
Progressive transmission and rendering of foveated volume data. GRAPP 2006: 67-75 - [c29]Shuiming Ye, Qibin Sun, Ee-Chien Chang
:
Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. IWDW 2006: 461-472 - [c28]Qiming Li, Ee-Chien Chang
:
Robust, short and sensitive authentication tags using secure sketch. MM&Sec 2006: 56-61 - [c27]Qiming Li, Ee-Chien Chang:
Zero-knowledge watermark detection resistant to ambiguity attacks. MM&Sec 2006: 158-163 - [i2]Ee-Chien Chang, Vadym Fedyukovych, Qiming Li:
Secure Sketch for Multi-Sets. IACR Cryptol. ePrint Arch. 2006: 90 (2006) - 2005
- [j8]Hang Yu, Ee-Chien Chang
, Zhiyong Huang, Zhijian Zheng:
Fast rendering of foveated volumes in wavelet-based representation. Vis. Comput. 21(8-10): 735-744 (2005) - [c26]Ee-Chien Chang
, Sung Woo Choi, DoYong Kwon, Hyungju Park, Chee-Keng Yap:
Shortest path amidst disc obstacles is computable. SCG 2005: 116-125 - [c25]Shuiming Ye, Ee-Chien Chang
, Qibin Sun:
Watermarking based Image Authentication using Feature Amplification. ICME 2005: 610-613 - [c24]Hui Huang Lee, Ee-Chien Chang, Mun Choon Chan:
Pervasive Random Beacon in the Internet for Covert Coordination. Information Hiding 2005: 53-61 - [c23]Qiming Li, Ee-Chien Chang, Mun Choon Chan:
On the effectiveness of DDoS attacks on statistical filtering. INFOCOM 2005: 1373-1383 - [c22]Shuiming Ye, Qibin Sun, Ee-Chien Chang
:
Error resilient content-based image authentication over wireless channel. ISCAS (3) 2005: 2707-2710 - [c21]