default search action
Chia-Mu Yu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j35]Min-Yan Tsai, Hsin-Hung Cho, Chia-Mu Yu, Yao-Chung Chang, Han-Chieh Chao:
Effective Adversarial Examples Identification of Credit Card Transactions. IEEE Intell. Syst. 39(4): 50-59 (2024) - [c57]Wei-Jia Chen, Chia-Yi Hsu, Wei-Bin Lee, Chia-Mu Yu, Chun-Ying Huang:
Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns. DSN-S 2024: 133-140 - [c56]Cheng-Yi Lee, Cheng-Chang Tsai, Ching-Chia Kao, Chun-Shien Lu, Chia-Mu Yu:
Defending against Clean-Image Backdoor Attack in Multi-Label Classification. ICASSP 2024: 5500-5504 - [c55]Ming-Yu Chung, Sheng-Yen Chou, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo, Tsung-Yi Ho:
Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective. ICLR 2024 - [c54]Yu-Lin Tsai, Chia-Yi Hsu, Chulin Xie, Chih-Hsun Lin, Jia-You Chen, Bo Li, Pin-Yu Chen, Chia-Mu Yu, Chun-Ying Huang:
Ring-A-Bell! How Reliable are Concept Removal Methods For Diffusion Models? ICLR 2024 - [c53]Ching-Chia Kao, Cheng-Yi Lee, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen:
On the Higher Moment Disparity of Backdoor Attacks. ICME 2024: 1-6 - [c52]Zheng-Hong Huang, Yu-Sung Wu, Ying-Dar Lin, Chia-Mu Yu, Wei-Bin Lee:
Neural Network-based Functional Degradation for Cyber-Physical Systems. QRS 2024: 425-434 - [c51]Hsiu-Fu Wu, Chia-Yi Hsu, Chih-Hsun Lin, Chia-Mu Yu, Chun-Ying Huang:
Deepfake Detection through Temporal Attention. WOCC 2024: 109-113 - [i34]Shyam Marjit, Harshit Singh, Nityanand Mathur, Sayak Paul, Chia-Mu Yu, Pin-Yu Chen:
DiffuseKronA: A Parameter Efficient Fine-tuning Method for Personalized Diffusion Models. CoRR abs/2402.17412 (2024) - [i33]Chia-Yi Hsu, Yu-Lin Tsai, Chih-Hsun Lin, Pin-Yu Chen, Chia-Mu Yu, Chun-Ying Huang:
Safe LoRA: the Silver Lining of Reducing Safety Risks when Fine-tuning Large Language Models. CoRR abs/2405.16833 (2024) - [i32]Yu-Lin Tsai, Yizhe Li, Zekai Chen, Po-Yu Chen, Chia-Mu Yu, Xuebin Ren, Francois Buet-Golfouse:
Differentially Private Fine-Tuning of Diffusion Models. CoRR abs/2406.01355 (2024) - [i31]Cheng-Yi Lee, Ching-Chia Kao, Cheng-Han Yeh, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen:
Defending Against Repetitive-based Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off. CoRR abs/2407.10180 (2024) - [i30]Cheng-Yi Lee, Cheng-Chang Tsai, Chia-Mu Yu, Chun-Shien Lu:
Exploring Robustness of Visual State Space model against Backdoor Attacks. CoRR abs/2408.11679 (2024) - [i29]Ching-Chia Kao, Chia-Mu Yu, Chun-Shien Lu, Chu-Song Chen:
Information-Theoretical Principled Trade-off between Jailbreakability and Stealthiness on Vision Language Models. CoRR abs/2410.01438 (2024) - [i28]Zi-Xuan Huang, Jia-Wei Chen, Zhi-Peng Zhang, Chia-Mu Yu:
Prompting the Unseen: Detecting Hidden Backdoors in Black-Box Models. CoRR abs/2411.09540 (2024) - 2023
- [j34]Chia-Mu Yu:
Counteracting Side Channels in Cross-User Client-Side Deduplicated Cloud Storage. IEEE Internet Things J. 10(17): 15604-15616 (2023) - [j33]Hsin-Hung Cho, Min-Yan Tsai, Jiang-Yi Zeng, Chia-Mu Yu, Han-Chieh Chao, Ilsun You:
LDoS Attacks Detection for ICPS NB-IoTs Environment via SE-Based CNN. IEEE Syst. J. 17(4): 5280-5291 (2023) - [j32]Fabrizio Lamberti, Alberto Cannavò, Zaixing He, Lucia Pepa, Chia-Mu Yu:
Guest Editorial of the Special Section on Consumer Electronics With Artificial Intelligence. IEEE Trans. Consumer Electron. 69(3): 237-239 (2023) - [j31]Yen-Ting Chen, Chia-Yi Hsu, Chia-Mu Yu, Mahmoud Barhamgi, Charith Perera:
On the Private Data Synthesis Through Deep Generative Models for Data Scarcity of Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(1): 551-560 (2023) - [c50]Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu:
Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy. AINA (2) 2023: 501-512 - [c49]Jhih-Cing Huang, Yu-Lin Tsai, Chao-Han Huck Yang, Cheng-Fang Su, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo:
Certified Robustness of Quantum Classifiers Against Adversarial Examples Through Quantum Noise. ICASSP 2023: 1-5 - [c48]Yizhe Li, Yu-Lin Tsai, Chia-Mu Yu, Pin-Yu Chen, Xuebin Ren:
Exploring the Benefits of Visual Prompting in Differential Privacy. ICCV 2023: 5135-5144 - [c47]Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu:
Local Differential Privacy Protocol for Making Key-Value Data Robust Against Poisoning Attacks. MDAI 2023: 241-252 - [i27]Yizhe Li, Yu-Lin Tsai, Xuebin Ren, Chia-Mu Yu, Pin-Yu Chen:
Exploring the Benefits of Visual Prompting in Differential Privacy. CoRR abs/2303.12247 (2023) - [i26]Chih-Hsun Lin, Chia-Yi Hsu, Chia-Mu Yu, Yang Cao, Chun-Ying Huang:
DPAF: Image Synthesis via Differentially Private Aggregation in Forward Phase. CoRR abs/2304.12185 (2023) - [i25]Xilong Wang, Chia-Mu Yu, Pin-Yu Chen:
Exploring the Benefits of Differentially Private Pre-training and Parameter-Efficient Fine-tuning for Table Transformers. CoRR abs/2309.06526 (2023) - [i24]Yu-Lin Tsai, Chia-Yi Hsu, Chulin Xie, Chih-Hsun Lin, Jia-You Chen, Bo Li, Pin-Yu Chen, Chia-Mu Yu, Chun-Ying Huang:
Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models? CoRR abs/2310.10012 (2023) - [i23]Ming-Yu Chung, Sheng-Yen Chou, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo, Tsung-Yi Ho:
Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective. CoRR abs/2311.16646 (2023) - 2022
- [j30]Olayinka Adeboye, Tooska Dargahi, Meisam Babaie, Mohamad Saraee, Chia-Mu Yu:
DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy. IEEE Access 10: 124534-124544 (2022) - [j29]Kazuto Fukuchi, Chia-Mu Yu, Jun Sakuma:
Locally Differentially Private Minimum Finding. IEICE Trans. Inf. Syst. 105-D(8): 1418-1430 (2022) - [j28]Fan-Hsun Tseng, Yu-Shan Liang, Yen-Wu Ti, Chia-Mu Yu:
Intelligent reflecting surface-aided network planning. IET Commun. 16(20): 2406-2413 (2022) - [j27]Chih-Hsun Lin, Chia-Mu Yu, Chun-Ying Huang:
DPView: Differentially Private Data Synthesis Through Domain Size Information. IEEE Internet Things J. 9(17): 15886-15900 (2022) - [j26]Tooska Dargahi, Hossein Ahmadvand, Mansour Naser Alraja, Chia-Mu Yu:
Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge. ACM J. Data Inf. Qual. 14(1): 5:1-5:10 (2022) - [j25]Chia-Mu Yu, Kang-Cheng Chen, Ching-Tang Chang, Yen-Wu Ti:
SegNet: a network for detecting deepfake facial videos. Multim. Syst. 28(3): 793-814 (2022) - [c46]Chia-Yi Hsu, Pin-Yu Chen, Songtao Lu, Sijia Liu, Chia-Mu Yu:
Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning. AAAI 2022: 6926-6934 - [c45]Jia-Wei Chen, Chia-Mu Yu, Ching-Chia Kao, Tzai-Wei Pang, Chun-Shien Lu:
DPGEN: Differentially Private Generative Energy-Guided Network for Natural Image Synthesis. CVPR 2022: 8377-8386 - [c44]Chang-Sheng Lin, Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:
Real-World Adversarial Examples Via Makeup. ICASSP 2022: 2854-2858 - [i22]Jhih-Cing Huang, Yu-Lin Tsai, Chao-Han Huck Yang, Cheng-Fang Su, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo:
Certified Robustness of Quantum Classifiers against Adversarial Examples through Quantum Noise. CoRR abs/2211.00887 (2022) - 2021
- [j24]Claudio A. Ardagna, Mauro Conti, Ernesto Damiani, Chia-Mu Yu:
Editorial: Special issue on trusted Cloud-Edges computations. Future Gener. Comput. Syst. 114: 661-664 (2021) - [j23]Xuebin Ren, Chia-Mu Yu, Wei Yu, Xinyu Yang, Jun Zhao, Shusen Yang:
DPCrowd: Privacy-Preserving and Communication-Efficient Decentralized Statistical Estimation for Real-Time Crowdsourced Data. IEEE Internet Things J. 8(4): 2775-2791 (2021) - [j22]Yao-Tung Tsou, Mansour Naser Alraja, Li-Sheng Chen, Yu-Hsiang Chang, Yung-Li Hu, Yennun Huang, Chia-Mu Yu, Pei-Yuan Tsai:
(k, ε , δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy. Serv. Oriented Comput. Appl. 15(3): 175-185 (2021) - [j21]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Chia-Mu Yu:
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems. ACM Trans. Cyber Phys. Syst. 5(1): 1:1-1:2 (2021) - [c43]Jia-Wei Chen, Li-Ju Chen, Chia-Mu Yu, Chun-Shien Lu:
Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation With Manipulable Semantics. CVPR 2021: 6478-6487 - [c42]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Non-Singular Adversarial Robustness of Neural Networks. ICASSP 2021: 3840-3844 - [c41]Xiao Jin, Pin-Yu Chen, Chia-Yi Hsu, Chia-Mu Yu, Tianyi Chen:
Catastrophic Data Leakage in Vertical Federated Learning. NeurIPS 2021: 994-1006 - [c40]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Formalizing Generalization and Adversarial Robustness of Neural Networks to Weight Perturbations. NeurIPS 2021: 19692-19704 - [i21]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Non-Singular Adversarial Robustness of Neural Networks. CoRR abs/2102.11935 (2021) - [i20]Chia-Yi Hsu, Pin-Yu Chen, Songtao Lu, Sijia Lu, Chia-Mu Yu:
Adversarial Examples for Unsupervised Machine Learning Models. CoRR abs/2103.01895 (2021) - [i19]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Formalizing Generalization and Robustness of Neural Networks to Weight Perturbations. CoRR abs/2103.02200 (2021) - [i18]Jia-Wei Chen, Li-Ju Chen, Chia-Mu Yu, Chun-Shien Lu:
Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics. CoRR abs/2104.01753 (2021) - [i17]Chang-Sheng Lin, Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:
Real-World Adversarial Examples involving Makeup Application. CoRR abs/2109.03329 (2021) - [i16]Xiao Jin, Pin-Yu Chen, Chia-Yi Hsu, Chia-Mu Yu, Tianyi Chen:
CAFE: Catastrophic Data Leakage in Vertical Federated Learning. CoRR abs/2110.15122 (2021) - [i15]Chia-Hung Yuan, Pin-Yu Chen, Chia-Mu Yu:
Meta Adversarial Perturbations. CoRR abs/2111.10291 (2021) - 2020
- [j20]Yen-Wu Ti, Chia-Feng Wu, Chia-Mu Yu, Sy-Yen Kuo:
Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications. IEEE Access 8: 1715-1732 (2020) - [j19]Claudio Agostino Ardagna, Mauro Conti, Chia-Mu Yu:
Special issue on Trusted Cloud-Edges Computations. Future Gener. Comput. Syst. 112: 1180-1183 (2020) - [j18]Chia-Mu Yu, Sarada Prasad Gochhayat, Mauro Conti, Chun-Shien Lu:
Privacy Aware Data Deduplication for Side Channel in Cloud Storage. IEEE Trans. Cloud Comput. 8(2): 597-609 (2020) - [j17]Mahmoud Barhamgi, Charith Perera, Chia-Mu Yu, Djamal Benslimane, David Camacho, Christine Bonnet:
Privacy in Data Service Composition. IEEE Trans. Serv. Comput. 13(4): 639-652 (2020) - [c39]Yu-Hsi Chiang, Hsu-Chun Hsiao, Chia-Mu Yu, Tiffany Hyun-Jin Kim:
On the Privacy Risks of Compromised Trigger-Action Platforms. ESORICS (2) 2020: 251-271 - [i14]Mahmoud Barhamgi, Charith Perera, Chia-Mu Yu, Djamal Benslimane, David Camacho, Christine Bonnet:
Privacy in Data Service Composition. CoRR abs/2001.00975 (2020) - [i13]Xuebin Ren, Chia-Mu Yu, Wei Yu, Xinyu Yang, Jun Zhao, Shusen Yang:
DPCrowd: Privacy-preserving and Communication-efficient Decentralized Statistical Estimation for Real-time Crowd-sourced Data. CoRR abs/2009.14125 (2020)
2010 – 2019
- 2019
- [c38]Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:
Characterizing Adversarial Subspaces by Mutual Information. AsiaCCS 2019: 667-669 - [c37]Xuebin Ren, Shuyang Wang, Xianghua Yao, Chia-Mu Yu, Wei Yu, Xinyu Yang:
Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee. WASA 2019: 272-284 - [c36]Pei-Hsuan Lu, Pang-Chieh Wang, Chia-Mu Yu:
Empirical Evaluation on Synthetic Data Generation with Generative Adversarial Network. WIMS 2019: 16:1-16:6 - [i12]Kazuto Fukuchi, Chia-Mu Yu, Arashi Haishima, Jun Sakuma:
Locally Differentially Private Minimum Finding. CoRR abs/1905.11067 (2019) - [i11]Chia-Mu Yu, Ching-Tang Chang, Yen-Wu Ti:
Detecting Deepfake-Forged Contents with Separable Convolutional Neural Network and Image Segmentation. CoRR abs/1912.12184 (2019) - 2018
- [j16]Po-Yen Lee, Chia-Mu Yu, Tooska Dargahi, Mauro Conti, Giuseppe Bianchi:
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things. IEEE Trans. Inf. Forensics Secur. 13(8): 2031-2046 (2018) - [j15]Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann, Philip S. Yu:
LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 13(9): 2151-2166 (2018) - [c35]Nesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota:
Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks. DASC/PiCom/DataCom/CyberSciTech 2018: 568-575 - [c34]Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu:
On the Limitation of MagNet Defense Against L1-Based Adversarial Examples. DSN Workshops 2018: 200-214 - [c33]Chia-Yi Hsu, Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On the Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces. GlobalSIP 2018: 1149-1153 - [c32]Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples. ICLR (Workshop) 2018 - [c31]I-Chen Tsai, Chia-Mu Yu, Haruo Yokota, Sy-Yen Kuo:
VENUS: Verifiable range query in data streaming. INFOCOM Workshops 2018: 160-165 - [c30]Zahra Pooranian, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti:
RARE: Defeating side channels based on data-deduplication in cloud storage. INFOCOM Workshops 2018: 444-449 - [c29]Nesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota:
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks. PRDC 2018: 289-298 - [i10]Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples. CoRR abs/1803.09638 (2018) - [i9]Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu:
On the Limitation of MagNet Defense against L1-based Adversarial Examples. CoRR abs/1805.00310 (2018) - [i8]Chia-Yi Hsu, Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces. CoRR abs/1809.08986 (2018) - 2017
- [j14]Chi-Yuan Chen, Hsin-Min Wu, Lei Wang, Chia-Mu Yu:
Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems. Comput. Networks 129: 472-480 (2017) - [j13]Chia-Mu Yu, Chi-Yuan Chen, Han-Chieh Chao:
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data. IEEE Syst. J. 11(2): 385-394 (2017) - [c28]Kang-Cheng Chen, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yao-Tung Tsou, Yennun Huang, Chia-Ming Lin:
Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release. AINA 2017: 1130-1137 - [c27]Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu, Arosha K. Bandara, Djamal Benslimane, Bashar Nuseibeh:
Enabling End-Users to Protect their Privacy. AsiaCCS 2017: 905-907 - [c26]Pei-Hsuan Lu, Chia-Mu Yu:
POSTER: A Unified Framework of Differentially Private Synthetic Data Release with Generative Adversarial Network. CCS 2017: 2547-2549 - [c25]I-Chen Tsai, Chia-Mu Yu, Haruo Yokota, Sy-Yen Kuo:
Key Management in Internet of Things via Kronecker Product. PRDC 2017: 118-124 - [c24]Hung-Li Chen, Jia-Yang Chen, Yao-Tung Tsou, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Chia-Ming Lin:
Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy. PRDC 2017: 339-347 - [c23]TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao:
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection. TAAI 2017: 166-171 - [i7]Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao:
R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections. CoRR abs/1705.04448 (2017) - [i6]TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao:
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection. CoRR abs/1710.05305 (2017) - 2016
- [j12]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Compressed Sensing-Based Clone Identification in Sensor Networks. IEEE Trans. Wirel. Commun. 15(4): 3071-3084 (2016) - [c22]Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann:
High-Dimensional Crowdsourced Data Distribution Estimation with Local Privacy. CIT 2016: 226-233 - [c21]Chia-Mu Yu:
POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions. CCS 2016: 1763-1765 - [c20]Hung-Chuan Wei, Yung-Hao Tung, Chia-Mu Yu:
Counteracting UDP flooding attacks in SDN. NetSoft 2016: 367-371 - [i5]Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann, Philip S. Yu:
LoPub: High-Dimensional Crowdsourced Data Publication with Local Differential Privacy. CoRR abs/1612.04350 (2016) - [i4]Chia-Mu Yu:
XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data. IACR Cryptol. ePrint Arch. 2016: 1041 (2016) - 2015
- [j11]Chia-Mu Yu, Chi-Yuan Chen, Han-Chieh Chao:
Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks. IEEE Commun. Mag. 53(8): 48-53 (2015) - [j10]Chia-Mu Yu, Chi-Yuan Chen, Han-Chieh Chao:
Proof of ownership in deduplicated cloud storage with mobile device efficiency. IEEE Netw. 29(2): 51-55 (2015) - [c19]Chia-Mu Yu:
POSTER: Lightweight Streaming Authenticated Data Structures. CCS 2015: 1693-1695 - [c18]Yu-Shen Ho, Ruay-Lien Ma, Cheng-En Sung, I-Chen Tsai, Li-Wei Kang, Chia-Mu Yu:
Deterministic detection of node replication attacks in sensor networks. ICCE-TW 2015: 468-469 - 2014
- [j9]Chia-Mu Yu, Chi-Yuan Chen, Sy-Yen Kuo, Han-Chieh Chao:
Privacy-Preserving Power Request in Smart Grid Networks. IEEE Syst. J. 8(2): 441-449 (2014) - [j8]Chia-Mu Yu, Guo-Kai Ni, Ing-Yi Chen, Erol Gelenbe, Sy-Yen Kuo:
Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks. IEEE Trans. Inf. Forensics Secur. 9(1): 109-124 (2014) - [c17]Chia-Mu Yu, Li-Wei Kang:
Sensor localization via robust principle component analysis. ICCE-TW 2014: 215-216 - 2013
- [j7]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks. IEEE Trans. Inf. Forensics Secur. 8(5): 754-768 (2013) - [c16]Chia-Mu Yu, Guo-Kai Ni, Ing-Yi Chen, Erol Gelenbe, Sy-Yen Kuo:
Top-k query result completeness verification in sensor networks. ICC Workshops 2013: 1026-1030 - 2012
- [j6]Chia-Mu Yu, Sung-Hsien Hsieh, Han-Wen Liang, Chun-Shien Lu, Wei-Ho Chung, Sy-Yen Kuo, Soo-Chang Pei:
Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems. IEEE Commun. Lett. 16(10): 1556-1559 (2012) - [c15]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
CSI: Compressed sensing-based clone identification in sensor networks. PerCom Workshops 2012: 290-295 - [c14]Yu-Shan Liang, Wei-Ho Chung, Chia-Mu Yu, Hongke Zhang, Chung-Hsiu Chung, Chih-Hsiang Ho, Sy-Yen Kuo:
Resource Block Assignment for Interference Avoidance in Femtocell Networks. VTC Fall 2012: 1-5 - [i3]H. T. Kung, Chia-Mu Yu:
Reducing Reconciliation Communication Cost with Compressed Sensing. CoRR abs/1212.2894 (2012) - 2011
- [j5]Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Sy-Yen Kuo:
An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks. Int. J. Sens. Networks 9(2): 89-106 (2011) - [j4]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(2): 241-255 (2011) - [j3]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Constrained Function-Based Message Authentication for Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(2): 407-425 (2011) - [c13]Li-Wei Kang, Chih-Yang Lin, Hung-Wei Chen, Chia-Mu Yu, Chun-Shien Lu, Chao-Yung Hsu, Soo-Chang Pei:
Secure transcoding for compressive multimedia sensing. ICIP 2011: 917-920 - 2010
- [j2]Chia-Mu Yu, Chi-Yuan Chen, Chun-Shien Lu, Sy-Yen Kuo, Han-Chieh Chao:
Acquiring Authentic Data in Unattended Wireless Sensor Networks. Sensors 10(4): 2770-2792 (2010) - [j1]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Noninteractive pairwise key establishment for sensor networks. IEEE Trans. Inf. Forensics Secur. 5(3): 556-569 (2010)
2000 – 2009
- 2009
- [c12]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
A DoS-resilient en-route filtering scheme for sensor networks. MobiHoc 2009: 343-344 - [c11]Chi-Yuan Chen, Yu-Shan Liang, Chia-Mu Yu, Chih-Hsiang Ho, Sy-Yen Kuo:
Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning. PRDC 2009: 282- - [c10]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks. SECON 2009: 1-9 - [c9]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks. VTC Fall 2009 - [c8]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
A constrained function based message authentication scheme for sensor networks. WCNC 2009: 2180-2185 - [i2]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Secure Multidimensional Queries in Tiered Sensor Networks.