Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
20052024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    DEFENDING AGAINST CLEAN-IMAGE BACKDOOR ATTACK IN MULTI-LABEL CLASSIFICATION

    Lee, C. Y., Tsai, C. C., Kao, C. C., Lu, C. S. & Yu, C. M., 2024, 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 5500-5504 5 p. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2023

    Certified Robustness of Quantum Classifiers Against Adversarial Examples Through Quantum Noise

    Huang, J. C., Tsai, Y. L., Yang, C. H. H., Su, C. F., Yu, C. M., Chen, P. Y. & Kuo, S. Y., 2023, ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing, Proceedings. Institute of Electrical and Electronics Engineers Inc., (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; vol. 2023-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy

    Horigome, H., Kikuchi, H. & Yu, C. M., 2023, Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications AINA-2023. Barolli, L. (ed.). Springer Science and Business Media Deutschland GmbH, p. 501-512 12 p. (Lecture Notes in Networks and Systems; vol. 654 LNNS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Exploring the Benefits of Visual Prompting in Differential Privacy

    Li, Y., Tsai, Y. L., Yu, C. M., Chen, P. Y. & Ren, X., 2023, Proceedings - 2023 IEEE/CVF International Conference on Computer Vision, ICCV 2023. Institute of Electrical and Electronics Engineers Inc., p. 5135-5144 10 p. (Proceedings of the IEEE International Conference on Computer Vision).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Genetic Algorithm-Based Fair Order Assignment Optimization of Food Delivery Platform

    Tsai, M. Y., Lin, G. Y., Zeng, J. Y., Yu, C. M., Chen, C. Y. & Cho, H. H., 2023, Bio-inspired Information and Communications Technologies - 14th EAI International Conference, BICT 2023, Proceedings. Chen, Y., Yao, D. & Nakano, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 122-132 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 512 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Local Differential Privacy Protocol for Making Key–Value Data Robust Against Poisoning Attacks

    Horigome, H., Kikuchi, H. & Yu, C. M., 2023, Modeling Decisions for Artificial Intelligence - 20th International Conference, MDAI 2023, Proceedings. Torra, V. & Narukawa, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 241-252 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13890 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2022

    Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning

    Hsu, C. Y., Chen, P. Y., Lu, S., Liu, S. & Yu, C. M., 30 Jun 2022, AAAI-22 Technical Tracks 6. Association for the Advancement of Artificial Intelligence, p. 6926-6934 9 p. (Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022; vol. 36).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • DPGEN: Differentially Private Generative Energy-Guided Network for Natural Image Synthesis

    Chen, J. W., Yu, C. M., Kao, C. C., Pang, T. W. & Lu, C. S., 2022, Proceedings - 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022. IEEE Computer Society, p. 8377-8386 10 p. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition; vol. 2022-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • 2021

    CAFE: Catastrophic Data Leakage in Vertical Federated Learning

    Jin, X., Chen, P. Y., Hsu, C. Y., Yu, C. M. & Chen, T., 2021, Advances in Neural Information Processing Systems 34 - 35th Conference on Neural Information Processing Systems, NeurIPS 2021. Ranzato, M., Beygelzimer, A., Dauphin, Y., Liang, P. S. & Wortman Vaughan, J. (eds.). Neural information processing systems foundation, p. 994-1006 13 p. (Advances in Neural Information Processing Systems; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    91 Scopus citations
  • Formalizing Generalization and Adversarial Robustness of Neural Networks to Weight Perturbations

    Tsai, Y. L., Hsu, C. Y., Yu, C. M. & Chen, P. Y., 2021, Advances in Neural Information Processing Systems 34 - 35th Conference on Neural Information Processing Systems, NeurIPS 2021. Ranzato, M., Beygelzimer, A., Dauphin, Y., Liang, P. S. & Wortman Vaughan, J. (eds.). Neural information processing systems foundation, p. 19692-19704 13 p. (Advances in Neural Information Processing Systems; vol. 24).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2020

    On the privacy risks of compromised trigger-action platforms

    Chiang, Y. H., Hsiao, H. C., Yu, C. M. & Kim, T. H. J., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 251-271 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2019

    Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding

    Wu, C. F., Ti, Y. W., Kuo, S. Y. & Yu, C. M., Aug 2019, Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019. Institute of Electrical and Electronics Engineers Inc., p. 65-69 5 p. 8858302. (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee

    Ren, X., Wang, S., Yao, X., Yu, C. M., Yu, W. & Yang, X., 2019, Wireless Algorithms, Systems, and Applications - 14th International Conference, WASA 2019, Proceedings. Biagioni, E. S., Zheng, Y. & Cheng, S. (eds.). Springer Verlag, p. 272-284 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11604 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Empirical evaluation on synthetic data generation with generative adversarial network

    Lu, P. H., Wang, P. C. & Yu, C. M., 26 Jun 2019, Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, WIMS 2019. Association for Computing Machinery, (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Hierarchical abnormal-node detection using fuzzy logic for ECA rule-based wireless sensor networks

    Berjab, N., Le, H. H., Yu, C. M., Kuo, S. Y. & Yokota, H., 11 Feb 2019, Proceedings - 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing, PRDC 2018. IEEE Computer Society, p. 289-298 10 p. 8639677. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC; vol. 2018-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Poster: Characterizing adversarial subspaces by mutual information

    Hsu, C. Y., Chen, P. Y. & Yu, C. M., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 667-669 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    Abnormal-Node detection based on spatio-Temporal and Multivariate-Attribute correlation in wireless sensor networks

    Berjab, N., Le, H. H., Yu, C. M., Kuo, S. Y. & Yokota, H., 26 Oct 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 568-575 8 p. 8511949. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

    Huang, T. H. D., Yu, C. M. & Kao, H. Y., 9 May 2018, Proceedings - 2017 Conference on Technologies and Applications of Artificial Intelligence, TAAI 2017. Institute of Electrical and Electronics Engineers Inc., p. 166-171 6 p. (Proceedings - 2017 Conference on Technologies and Applications of Artificial Intelligence, TAAI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • On the Limitation of MagNet Defense Against L1-Based Adversarial Examples

    Lu, P. H., Chen, P. Y., Chen, K. C. & Yu, C. M., 19 Jul 2018, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018. Institute of Electrical and Electronics Engineers Inc., p. 200-214 15 p. 8416250. (Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • On the utility of conditional generation based mutual information for characterizing adversarial subspaces

    Hsu, C. Y., Lu, P. H., Chen, P. Y. & Yu, C. M., 2 Jul 2018, 2018 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1149-1153 5 p. 8646527. (2018 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • Privacy-Preserving Record Linkage via Bilinear Pairing Approach

    Lin, C. H. & Yu, C. M., 27 Aug 2018, 2018 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2018. Institute of Electrical and Electronics Engineers Inc., 8448454. (2018 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • RARE: Defeating side channels based on data-deduplication in cloud storage

    Pooranian, Z., Chen, K. C., Yu, C. M. & Conti, M., 6 Jul 2018, INFOCOM 2018 - IEEE Conference on Computer Communications Workshops. Institute of Electrical and Electronics Engineers Inc., p. 444-449 6 p. (INFOCOM 2018 - IEEE Conference on Computer Communications Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    58 Scopus citations
  • VENUS: Verifiable range query in data streaming

    Tsai, I. C., Yu, C. M., Yokota, H. & Kuo, S. Y., 6 Jul 2018, INFOCOM 2018 - IEEE Conference on Computer Communications Workshops. Institute of Electrical and Electronics Engineers Inc., p. 160-165 6 p. (INFOCOM 2018 - IEEE Conference on Computer Communications Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • 2017

    Data-driven approach for evaluating risk of disclosure and utility in differentially private data release

    Chen, K. C., Yu, C. M., Tai, B. C., Li, S. C., Tsou, Y. T., Huang, Y. & Lin, C. M., 5 May 2017, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Enokido, T., Hsu, H.-H., Lin, C.-Y., Takizawa, M. & Barolli, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1130-1137 8 p. 7921033. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Evaluating the risk of data disclosure using noise estimation for differential privacy

    Chen, H. L., Chen, J. Y., Tsou, Y. T., Yu, C. M., Tai, B. C., Li, S. C., Huang, Y. & Lin, C. M., 5 May 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 339-347 9 p. 7920639. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • High-dimensional crowdsourced data distribution estimation with local privacy

    Ren, X., Yu, C. M., Yu, W., Yang, S., Yang, X. & McCann, J., 10 Mar 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 226-233 8 p. 7876342. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    12 Scopus citations
  • Key management in internet of things via kronecker product

    Tsai, I. C., Yu, C. M., Yokota, H. & Kuo, S. Y., 5 May 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 118-124 7 p. 7920605. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • Poster: A unified framework of differentially private synthetic data release with generative adversarial network

    Lu, P. H. & Yu, C. M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2547-2549 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • POSTER: Enabling end-users to protect their privacy

    Barhamgi, M., Yang, M., Yu, C. M., Yu, Y., Bandara, A. K., Benslimane, D. & Nuseibeh, B., 2 Apr 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 905-907 3 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • 2016

    Counteracting UDP flooding attacks in SDN

    Wei, H. C., Tung, Y. H. & Yu, C. M., 30 Jun 2016, IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services. Institute of Electrical and Electronics Engineers Inc., p. 367-371 5 p. 7502468. (IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • POSTER: Efficient cross-user chunk-level client-side data deduplication with symmetrically encrypted two-party interactions

    Yu, C. M., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1763-1765 3 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2015

    Deterministic detection of node replication attacks in sensor networks

    Ho, Y. S., Ma, R. L., Sung, C. E., Tsai, I. C., Kang, L. W. & Yu, C. M., 20 Aug 2015, 2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015. Institute of Electrical and Electronics Engineers Inc., p. 468-469 2 p. 7217002. (2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Lightweight streaming authenticated data structures

    Yu, C. M., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1693-1695 3 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2014

    Sensor localization via robust principle component analysis

    Yu, C. M. & Kang, L. W., 18 Sep 2014, Digest of Technical Papers - IEEE International Conference on Consumer Electronics. Institute of Electrical and Electronics Engineers Inc., p. 215-216 2 p. 6904065. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Top-k query result completeness verification in sensor networks

    Yu, C. M., Ni, G. K., Chen, I. Y., Gelenbe, E. & Kuo, S. Y., 2013, 2013 IEEE International Conference on Communications Workshops, ICC 2013. p. 1026-1030 5 p. 6649387. (2013 IEEE International Conference on Communications Workshops, ICC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2012

    CSI: Compressed sensing-based clone identification in sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 290-295 6 p. 6197497. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • Resource block assignment for interference avoidance in femtocell networks

    Liang, Y. S., Chung, W. H., Yu, C. M., Zhang, H., Chung, C. H., Ho, C. H. & Kuo, S. Y., 2012, 2012 IEEE Vehicular Technology Conference, VTC Fall 2012 - Proceedings. 6399258. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2011

    Secure transcoding for compressive multimedia sensing

    Kang, L. W., Lin, C. Y., Chen, H. W., Yu, C. M., Lu, C. S., Hsu, C. Y. & Pei, S. C., 2011, ICIP 2011: 2011 18th IEEE International Conference on Image Processing. p. 917-920 4 p. 6116709. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2009

    A constrained function based message authentication scheme for sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009 - Proceedings. 4917492. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Efficient and distributed detection of node replication attacks in mobile sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, Proceedings of the 2009 IEEE 70th Vehicular Technology Conference Fall, VTC 2009 Fall. 5379092. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    42 Scopus citations
  • Poster abstract: A dos-resilient en-route filtering scheme for sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, MobiHoc'09 - Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 343-344 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Simple non-interactive pairwise key establishment scheme in sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009. 5168906. (2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2008

    A Constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks

    Yu, C. M., Chi, T. Y., Lu, C. S. & Kuo, S. Y., 2008, Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing 2008, MobiHoc'08. p. 449-450 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Mobile sensor network resilient against node replication attacks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 597-599 3 p. 4557805. (2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    66 Scopus citations
  • 2007

    Attack probability based deterministic key predistribution mechanism for non-uniform sensor deployment

    Yu, C. M., Li, C. C., Lu, C. S., Lee, D. T. & Kuo, S. Y., 2007, 27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07. 4279012. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Habitual behavior-based opportunistic data forwarding in wildlife tracking

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2007, Proceedings of 4th IEEE Internatilonal Symposium on Wireless Communication Systems 2007, ISWCS. p. 807-808 2 p. 4392452. (Proceedings of 4th IEEE Internatilonal Symposium on Wireless Communication Systems 2007, ISWCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Improving the network flow problem using quantum search

    Yu, C. M., Tsai, I. M., Chou, Y. H. & Kuo, S. Y., 2007, 2007 7th IEEE International Conference on Nanotechnology - IEEE-NANO 2007, Proceedings. p. 1126-1129 4 p. 4601381. (2007 7th IEEE International Conference on Nanotechnology - IEEE-NANO 2007, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2006

    Robust non-interactive zero-knowledge watermarking scheme against cheating prover

    Yu, C. M. & Lu, C. S., 2006, Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05. p. 103-110 8 p. (Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2005

    A secure quantum communication protocol using insecure public channels

    Tsai, I. M., Yu, C. M., Tu, W. T. & Kuo, S. Y., 2005, Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference. Qing, S., Okamoto, E., Yoshiura, H. & Sasaki, R. (eds.). Springer New York LLC, p. 113-126 14 p. (IFIP Advances in Information and Communication Technology; vol. 181).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • On the security of mesh-based media hash-dependent watermarking against protocol attacks

    Lu, C. S. & Yu, C. M., 2005, IEEE International Conference on Multimedia and Expo, ICME 2005. p. 169-172 4 p. 1521387. (IEEE International Conference on Multimedia and Expo, ICME 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations