


Остановите войну!
for scientists:


default search action
Chia-Mu Yu
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j30]Yen-Ting Chen, Chia-Yi Hsu, Chia-Mu Yu
, Mahmoud Barhamgi
, Charith Perera:
On the Private Data Synthesis Through Deep Generative Models for Data Scarcity of Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(1): 551-560 (2023) - [c48]Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu:
Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy. AINA (2) 2023: 501-512 - [c47]Hikaru Horigome, Hiroaki Kikuchi
, Chia-Mu Yu:
Local Differential Privacy Protocol for Making Key-Value Data Robust Against Poisoning Attacks. MDAI 2023: 241-252 - [i24]Yizhe Li, Yu-Lin Tsai, Xuebin Ren, Chia-Mu Yu, Pin-Yu Chen:
Exploring the Benefits of Visual Prompting in Differential Privacy. CoRR abs/2303.12247 (2023) - [i23]Chih-Hsun Lin, Chia-Yi Hsu, Chia-Mu Yu, Yang Cao, Chun-Ying Huang:
DPAF: Image Synthesis via Differentially Private Aggregation in Forward Phase. CoRR abs/2304.12185 (2023) - 2022
- [j29]Olayinka Adeboye
, Tooska Dargahi
, Meisam Babaie
, Mohamad Saraee
, Chia-Mu Yu
:
DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy. IEEE Access 10: 124534-124544 (2022) - [j28]Kazuto Fukuchi, Chia-Mu Yu, Jun Sakuma:
Locally Differentially Private Minimum Finding. IEICE Trans. Inf. Syst. 105-D(8): 1418-1430 (2022) - [j27]Chih-Hsun Lin
, Chia-Mu Yu
, Chun-Ying Huang
:
DPView: Differentially Private Data Synthesis Through Domain Size Information. IEEE Internet Things J. 9(17): 15886-15900 (2022) - [j26]Tooska Dargahi, Hossein Ahmadvand, Mansour Naser Alraja
, Chia-Mu Yu:
Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge. ACM J. Data Inf. Qual. 14(1): 5:1-5:10 (2022) - [j25]Chia-Mu Yu
, Kang-Cheng Chen, Ching-Tang Chang, Yen-Wu Ti:
SegNet: a network for detecting deepfake facial videos. Multim. Syst. 28(3): 793-814 (2022) - [c46]Chia-Yi Hsu, Pin-Yu Chen, Songtao Lu, Sijia Liu, Chia-Mu Yu:
Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning. AAAI 2022: 6926-6934 - [c45]Jia-Wei Chen, Chia-Mu Yu, Ching-Chia Kao, Tzai-Wei Pang, Chun-Shien Lu:
DPGEN: Differentially Private Generative Energy-Guided Network for Natural Image Synthesis. CVPR 2022: 8377-8386 - [c44]Chang-Sheng Lin, Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:
Real-World Adversarial Examples Via Makeup. ICASSP 2022: 2854-2858 - [i22]Jhih-Cing Huang, Yu-Lin Tsai, Chao-Han Huck Yang, Cheng-Fang Su, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo:
Certified Robustness of Quantum Classifiers against Adversarial Examples through Quantum Noise. CoRR abs/2211.00887 (2022) - 2021
- [j24]Claudio A. Ardagna
, Mauro Conti, Ernesto Damiani, Chia-Mu Yu:
Editorial: Special issue on trusted Cloud-Edges computations. Future Gener. Comput. Syst. 114: 661-664 (2021) - [j23]Xuebin Ren
, Chia-Mu Yu
, Wei Yu
, Xinyu Yang
, Jun Zhao
, Shusen Yang
:
DPCrowd: Privacy-Preserving and Communication-Efficient Decentralized Statistical Estimation for Real-Time Crowdsourced Data. IEEE Internet Things J. 8(4): 2775-2791 (2021) - [j22]Yao-Tung Tsou, Mansour Naser Alraja
, Li-Sheng Chen, Yu-Hsiang Chang, Yung-Li Hu, Yennun Huang, Chia-Mu Yu, Pei-Yuan Tsai:
(k, ε , δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy. Serv. Oriented Comput. Appl. 15(3): 175-185 (2021) - [j21]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Chia-Mu Yu:
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems. ACM Trans. Cyber Phys. Syst. 5(1): 1:1-1:2 (2021) - [c43]Jia-Wei Chen, Li-Ju Chen, Chia-Mu Yu, Chun-Shien Lu:
Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation With Manipulable Semantics. CVPR 2021: 6478-6487 - [c42]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Non-Singular Adversarial Robustness of Neural Networks. ICASSP 2021: 3840-3844 - [c41]Xiao Jin, Pin-Yu Chen, Chia-Yi Hsu, Chia-Mu Yu, Tianyi Chen:
Catastrophic Data Leakage in Vertical Federated Learning. NeurIPS 2021: 994-1006 - [c40]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Formalizing Generalization and Adversarial Robustness of Neural Networks to Weight Perturbations. NeurIPS 2021: 19692-19704 - [i21]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Non-Singular Adversarial Robustness of Neural Networks. CoRR abs/2102.11935 (2021) - [i20]Chia-Yi Hsu, Pin-Yu Chen, Songtao Lu, Sijia Lu, Chia-Mu Yu:
Adversarial Examples for Unsupervised Machine Learning Models. CoRR abs/2103.01895 (2021) - [i19]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Formalizing Generalization and Robustness of Neural Networks to Weight Perturbations. CoRR abs/2103.02200 (2021) - [i18]Jia-Wei Chen, Li-Ju Chen, Chia-Mu Yu, Chun-Shien Lu:
Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics. CoRR abs/2104.01753 (2021) - [i17]Chang-Sheng Lin, Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:
Real-World Adversarial Examples involving Makeup Application. CoRR abs/2109.03329 (2021) - [i16]Xiao Jin, Pin-Yu Chen, Chia-Yi Hsu, Chia-Mu Yu, Tianyi Chen:
CAFE: Catastrophic Data Leakage in Vertical Federated Learning. CoRR abs/2110.15122 (2021) - [i15]Chia-Hung Yuan, Pin-Yu Chen, Chia-Mu Yu:
Meta Adversarial Perturbations. CoRR abs/2111.10291 (2021) - 2020
- [j20]Yen-Wu Ti
, Chia-Feng Wu
, Chia-Mu Yu
, Sy-Yen Kuo
:
Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications. IEEE Access 8: 1715-1732 (2020) - [j19]Claudio Agostino Ardagna, Mauro Conti, Chia-Mu Yu:
Special issue on Trusted Cloud-Edges Computations. Future Gener. Comput. Syst. 112: 1180-1183 (2020) - [j18]Chia-Mu Yu
, Sarada Prasad Gochhayat
, Mauro Conti
, Chun-Shien Lu
:
Privacy Aware Data Deduplication for Side Channel in Cloud Storage. IEEE Trans. Cloud Comput. 8(2): 597-609 (2020) - [j17]Mahmoud Barhamgi
, Charith Perera
, Chia-Mu Yu
, Djamal Benslimane
, David Camacho
, Christine Bonnet:
Privacy in Data Service Composition. IEEE Trans. Serv. Comput. 13(4): 639-652 (2020) - [c39]Yu-Hsi Chiang, Hsu-Chun Hsiao
, Chia-Mu Yu
, Tiffany Hyun-Jin Kim:
On the Privacy Risks of Compromised Trigger-Action Platforms. ESORICS (2) 2020: 251-271 - [i14]Mahmoud Barhamgi, Charith Perera, Chia-Mu Yu, Djamal Benslimane, David Camacho, Christine Bonnet:
Privacy in Data Service Composition. CoRR abs/2001.00975 (2020) - [i13]Xuebin Ren, Chia-Mu Yu, Wei Yu, Xinyu Yang, Jun Zhao, Shusen Yang:
DPCrowd: Privacy-preserving and Communication-efficient Decentralized Statistical Estimation for Real-time Crowd-sourced Data. CoRR abs/2009.14125 (2020)
2010 – 2019
- 2019
- [c38]Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:
Characterizing Adversarial Subspaces by Mutual Information. AsiaCCS 2019: 667-669 - [c37]Xuebin Ren, Shuyang Wang, Xianghua Yao, Chia-Mu Yu, Wei Yu
, Xinyu Yang:
Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee. WASA 2019: 272-284 - [c36]Pei-Hsuan Lu, Pang-Chieh Wang, Chia-Mu Yu:
Empirical Evaluation on Synthetic Data Generation with Generative Adversarial Network. WIMS 2019: 16:1-16:6 - [i12]Kazuto Fukuchi, Chia-Mu Yu, Arashi Haishima, Jun Sakuma:
Locally Differentially Private Minimum Finding. CoRR abs/1905.11067 (2019) - [i11]Chia-Mu Yu, Ching-Tang Chang, Yen-Wu Ti:
Detecting Deepfake-Forged Contents with Separable Convolutional Neural Network and Image Segmentation. CoRR abs/1912.12184 (2019) - 2018
- [j16]Po-Yen Lee, Chia-Mu Yu
, Tooska Dargahi
, Mauro Conti
, Giuseppe Bianchi:
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things. IEEE Trans. Inf. Forensics Secur. 13(8): 2031-2046 (2018) - [j15]Xuebin Ren
, Chia-Mu Yu
, Weiren Yu, Shusen Yang, Xinyu Yang
, Julie A. McCann, Philip S. Yu:
LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 13(9): 2151-2166 (2018) - [c35]Nesrine Berjab
, Hieu Hanh Le
, Chia-Mu Yu, Sy-Yen Kuo
, Haruo Yokota
:
Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks. DASC/PiCom/DataCom/CyberSciTech 2018: 568-575 - [c34]Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu:
On the Limitation of MagNet Defense Against L1-Based Adversarial Examples. DSN Workshops 2018: 200-214 - [c33]Chia-Yi Hsu, Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On the Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces. GlobalSIP 2018: 1149-1153 - [c32]Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples. ICLR (Workshop) 2018 - [c31]I-Chen Tsai, Chia-Mu Yu, Haruo Yokota
, Sy-Yen Kuo
:
VENUS: Verifiable range query in data streaming. INFOCOM Workshops 2018: 160-165 - [c30]Zahra Pooranian
, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti:
RARE: Defeating side channels based on data-deduplication in cloud storage. INFOCOM Workshops 2018: 444-449 - [c29]Nesrine Berjab
, Hieu Hanh Le
, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota
:
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks. PRDC 2018: 289-298 - [i10]Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples. CoRR abs/1803.09638 (2018) - [i9]Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu:
On the Limitation of MagNet Defense against L1-based Adversarial Examples. CoRR abs/1805.00310 (2018) - [i8]Chia-Yi Hsu, Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces. CoRR abs/1809.08986 (2018) - 2017
- [j14]Chi-Yuan Chen, Hsin-Min Wu, Lei Wang, Chia-Mu Yu:
Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems. Comput. Networks 129: 472-480 (2017) - [j13]Chia-Mu Yu, Chi-Yuan Chen, Han-Chieh Chao:
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data. IEEE Syst. J. 11(2): 385-394 (2017) - [c28]Kang-Cheng Chen, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yao-Tung Tsou, Yennun Huang
, Chia-Ming Lin:
Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release. AINA 2017: 1130-1137 - [c27]Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu
, Arosha K. Bandara
, Djamal Benslimane, Bashar Nuseibeh
:
Enabling End-Users to Protect their Privacy. AsiaCCS 2017: 905-907 - [c26]Pei-Hsuan Lu, Chia-Mu Yu:
POSTER: A Unified Framework of Differentially Private Synthetic Data Release with Generative Adversarial Network. CCS 2017: 2547-2549 - [c25]I-Chen Tsai, Chia-Mu Yu, Haruo Yokota
, Sy-Yen Kuo
:
Key Management in Internet of Things via Kronecker Product. PRDC 2017: 118-124 - [c24]Hung-Li Chen, Jia-Yang Chen, Yao-Tung Tsou, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yennun Huang
, Chia-Ming Lin:
Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy. PRDC 2017: 339-347 - [c23]TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao:
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection. TAAI 2017: 166-171 - [i7]Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao:
R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections. CoRR abs/1705.04448 (2017) - [i6]TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao:
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection. CoRR abs/1710.05305 (2017) - 2016
- [j12]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
:
Compressed Sensing-Based Clone Identification in Sensor Networks. IEEE Trans. Wirel. Commun. 15(4): 3071-3084 (2016) - [c22]Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann:
High-Dimensional Crowdsourced Data Distribution Estimation with Local Privacy. CIT 2016: 226-233 - [c21]Chia-Mu Yu:
POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions. CCS 2016: 1763-1765 - [c20]Hung-Chuan Wei, Yung-Hao Tung, Chia-Mu Yu:
Counteracting UDP flooding attacks in SDN. NetSoft 2016: 367-371 - [i5]Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann, Philip S. Yu:
LoPub: High-Dimensional Crowdsourced Data Publication with Local Differential Privacy. CoRR abs/1612.04350 (2016) - [i4]Chia-Mu Yu:
XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data. IACR Cryptol. ePrint Arch. 2016: 1041 (2016) - 2015
- [j11]Chia-Mu Yu, Chi-Yuan Chen, Han-Chieh Chao:
Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks. IEEE Commun. Mag. 53(8): 48-53 (2015) - [j10]Chia-Mu Yu, Chi-Yuan Chen, Han-Chieh Chao:
Proof of ownership in deduplicated cloud storage with mobile device efficiency. IEEE Netw. 29(2): 51-55 (2015) - [c19]Chia-Mu Yu:
POSTER: Lightweight Streaming Authenticated Data Structures. CCS 2015: 1693-1695 - [c18]Yu-Shen Ho, Ruay-Lien Ma, Cheng-En Sung, I-Chen Tsai, Li-Wei Kang, Chia-Mu Yu:
Deterministic detection of node replication attacks in sensor networks. ICCE-TW 2015: 468-469 - 2014
- [j9]Chia-Mu Yu, Chi-Yuan Chen, Sy-Yen Kuo
, Han-Chieh Chao:
Privacy-Preserving Power Request in Smart Grid Networks. IEEE Syst. J. 8(2): 441-449 (2014) - [j8]Chia-Mu Yu, Guo-Kai Ni, Ing-Yi Chen, Erol Gelenbe
, Sy-Yen Kuo
:
Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks. IEEE Trans. Inf. Forensics Secur. 9(1): 109-124 (2014) - [c17]Chia-Mu Yu, Li-Wei Kang:
Sensor localization via robust principle component analysis. ICCE-TW 2014: 215-216 - 2013
- [j7]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo
:
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks. IEEE Trans. Inf. Forensics Secur. 8(5): 754-768 (2013) - [c16]Chia-Mu Yu, Guo-Kai Ni, Ing-Yi Chen, Erol Gelenbe, Sy-Yen Kuo
:
Top-k query result completeness verification in sensor networks. ICC Workshops 2013: 1026-1030 - 2012
- [j6]Chia-Mu Yu, Sung-Hsien Hsieh, Han-Wen Liang, Chun-Shien Lu, Wei-Ho Chung, Sy-Yen Kuo
, Soo-Chang Pei:
Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems. IEEE Commun. Lett. 16(10): 1556-1559 (2012) - [c15]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
:
CSI: Compressed sensing-based clone identification in sensor networks. PerCom Workshops 2012: 290-295 - [c14]Yu-Shan Liang, Wei-Ho Chung, Chia-Mu Yu, Hongke Zhang, Chung-Hsiu Chung, Chih-Hsiang Ho, Sy-Yen Kuo
:
Resource Block Assignment for Interference Avoidance in Femtocell Networks. VTC Fall 2012: 1-5 - [i3]H. T. Kung, Chia-Mu Yu:
Reducing Reconciliation Communication Cost with Compressed Sensing. CoRR abs/1212.2894 (2012) - 2011
- [j5]Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Sy-Yen Kuo
:
An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks. Int. J. Sens. Networks 9(2): 89-106 (2011) - [j4]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo
:
Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(2): 241-255 (2011) - [j3]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo
:
Constrained Function-Based Message Authentication for Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(2): 407-425 (2011) - [c13]Li-Wei Kang, Chih-Yang Lin, Hung-Wei Chen, Chia-Mu Yu, Chun-Shien Lu, Chao-Yung Hsu, Soo-Chang Pei:
Secure transcoding for compressive multimedia sensing. ICIP 2011: 917-920 - 2010
- [j2]Chia-Mu Yu, Chi-Yuan Chen, Chun-Shien Lu, Sy-Yen Kuo
, Han-Chieh Chao:
Acquiring Authentic Data in Unattended Wireless Sensor Networks. Sensors 10(4): 2770-2792 (2010) - [j1]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
:
Noninteractive pairwise key establishment for sensor networks. IEEE Trans. Inf. Forensics Secur. 5(3): 556-569 (2010)
2000 – 2009
- 2009
- [c12]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
:
A DoS-resilient en-route filtering scheme for sensor networks. MobiHoc 2009: 343-344 - [c11]Chi-Yuan Chen, Yu-Shan Liang, Chia-Mu Yu, Chih-Hsiang Ho, Sy-Yen Kuo:
Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning. PRDC 2009: 282- - [c10]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
:
A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks. SECON 2009: 1-9 - [c9]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
:
Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks. VTC Fall 2009 - [c8]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
:
A constrained function based message authentication scheme for sensor networks. WCNC 2009: 2180-2185 - [i2]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Secure Multidimensional Queries in Tiered Sensor Networks. CoRR abs/0911.4238 (2009) - [i1]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Constrained Function Based En-Route Filtering for Sensor Networks. CoRR abs/0911.4239 (2009) - 2008
- [c7]Chia-Mu Yu, Ting-Yun Chi, Chun-Shien Lu, Sy-Yen Kuo
:
A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. MobiHoc 2008: 449-450 - [c6]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
:
Mobile Sensor Network Resilient Against Node Replication Attacks. SECON 2008: 597-599 - 2007
- [c5]Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Der-Tsai Lee, Sy-Yen Kuo
:
Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment. ICDCS Workshops 2007: 18 - [c4]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
:
Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking. ISWCS 2007: 807-808 - 2005
- [c3]Chun-Shien Lu, Chia-Mu Yu:
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks. ICME 2005: 169-172 - [c2]Chia-Mu Yu, Chun-Shien Lu:
Robust non-interactive zero-knowledge watermarking scheme against cheating prover. MM&Sec 2005: 103-110 - [c1]I-Ming Tsai, Chia-Mu Yu, Wei-Ting Tu, Sy-Yen Kuo:
A Secure Quantum Communication Protocol Using Insecure Public Channels. SEC 2005: 113-126
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-06-05 01:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint