按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
20052025

每年研究成果

篩選
Conference contribution

搜尋結果

  • 2024

    Deepfake Detection through Temporal Attention

    Wu, H. F., Hsu, C. Y., Lin, C. H., Yu, C. M. & Huang, C. Y., 2024, 2024 33rd Wireless and Optical Communications Conference, WOCC 2024. Institute of Electrical and Electronics Engineers Inc., p. 109-113 5 p. (2024 33rd Wireless and Optical Communications Conference, WOCC 2024).

    研究成果: Conference contribution同行評審

  • DEFENDING AGAINST CLEAN-IMAGE BACKDOOR ATTACK IN MULTI-LABEL CLASSIFICATION

    Lee, C. Y., Tsai, C. C., Kao, C. C., Lu, C. S. & Yu, C. M., 2024, 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 5500-5504 5 p. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    研究成果: Conference contribution同行評審

    1 引文 斯高帕斯(Scopus)
  • Neural Network-based Functional Degradation for Cyber-Physical Systems

    Huang, Z. H., Wu, Y. S., Lin, Y. D., Yu, C. M. & Lee, W. B., 2024, Proceedings - 2024 IEEE 24th International Conference on Software Quality, Reliability and Security, QRS 2024. Institute of Electrical and Electronics Engineers Inc., p. 425-434 10 p. (IEEE International Conference on Software Quality, Reliability and Security, QRS).

    研究成果: Conference contribution同行評審

  • On the Higher Moment Disparity of Backdoor Attacks

    Kao, C. C., Lee, C. Y., Lu, C. S., Yu, C. M. & Chen, C. S., 2024, 2024 IEEE International Conference on Multimedia and Expo, ICME 2024. IEEE Computer Society, (Proceedings - IEEE International Conference on Multimedia and Expo).

    研究成果: Conference contribution同行評審

  • Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns

    Chen, W. J., Hsu, C. Y., Lee, W. B., Yu, C. M. & Huang, C. Y., 2024, Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024. Institute of Electrical and Electronics Engineers Inc., p. 133-140 8 p. (Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024).

    研究成果: Conference contribution同行評審

  • 2023

    Certified Robustness of Quantum Classifiers Against Adversarial Examples Through Quantum Noise

    Huang, J. C., Tsai, Y. L., Yang, C. H. H., Su, C. F., Yu, C. M., Chen, P. Y. & Kuo, S. Y., 2023, ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing, Proceedings. Institute of Electrical and Electronics Engineers Inc., (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; 卷 2023-June).

    研究成果: Conference contribution同行評審

    開啟存取
    11 引文 斯高帕斯(Scopus)
  • Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy

    Horigome, H., Kikuchi, H. & Yu, C. M., 2023, Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications AINA-2023. Barolli, L. (編輯). Springer Science and Business Media Deutschland GmbH, p. 501-512 12 p. (Lecture Notes in Networks and Systems; 卷 654 LNNS).

    研究成果: Conference contribution同行評審

  • Exploring the Benefits of Visual Prompting in Differential Privacy

    Li, Y., Tsai, Y. L., Yu, C. M., Chen, P. Y. & Ren, X., 2023, Proceedings - 2023 IEEE/CVF International Conference on Computer Vision, ICCV 2023. Institute of Electrical and Electronics Engineers Inc., p. 5135-5144 10 p. (Proceedings of the IEEE International Conference on Computer Vision).

    研究成果: Conference contribution同行評審

    開啟存取
    7 引文 斯高帕斯(Scopus)
  • Genetic Algorithm-Based Fair Order Assignment Optimization of Food Delivery Platform

    Tsai, M. Y., Lin, G. Y., Zeng, J. Y., Yu, C. M., Chen, C. Y. & Cho, H. H., 2023, Bio-inspired Information and Communications Technologies - 14th EAI International Conference, BICT 2023, Proceedings. Chen, Y., Yao, D. & Nakano, T. (編輯). Springer Science and Business Media Deutschland GmbH, p. 122-132 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; 卷 512 LNICST).

    研究成果: Conference contribution同行評審

  • Local Differential Privacy Protocol for Making Key–Value Data Robust Against Poisoning Attacks

    Horigome, H., Kikuchi, H. & Yu, C. M., 2023, Modeling Decisions for Artificial Intelligence - 20th International Conference, MDAI 2023, Proceedings. Torra, V. & Narukawa, Y. (編輯). Springer Science and Business Media Deutschland GmbH, p. 241-252 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 13890 LNCS).

    研究成果: Conference contribution同行評審

    4 引文 斯高帕斯(Scopus)
  • 2022

    Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning

    Hsu, C. Y., Chen, P. Y., Lu, S., Liu, S. & Yu, C. M., 30 6月 2022, AAAI-22 Technical Tracks 6. Association for the Advancement of Artificial Intelligence, p. 6926-6934 9 p. (Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022; 卷 36).

    研究成果: Conference contribution同行評審

    開啟存取
    14 引文 斯高帕斯(Scopus)
  • DPGEN: Differentially Private Generative Energy-Guided Network for Natural Image Synthesis

    Chen, J. W., Yu, C. M., Kao, C. C., Pang, T. W. & Lu, C. S., 2022, Proceedings - 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022. IEEE Computer Society, p. 8377-8386 10 p. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition; 卷 2022-June).

    研究成果: Conference contribution同行評審

    16 引文 斯高帕斯(Scopus)
  • 2021

    CAFE: Catastrophic Data Leakage in Vertical Federated Learning

    Jin, X., Chen, P. Y., Hsu, C. Y., Yu, C. M. & Chen, T., 2021, Advances in Neural Information Processing Systems 34 - 35th Conference on Neural Information Processing Systems, NeurIPS 2021. Ranzato, M., Beygelzimer, A., Dauphin, Y., Liang, P. S. & Wortman Vaughan, J. (編輯). Neural information processing systems foundation, p. 994-1006 13 p. (Advances in Neural Information Processing Systems; 卷 2).

    研究成果: Conference contribution同行評審

    121 引文 斯高帕斯(Scopus)
  • Formalizing Generalization and Adversarial Robustness of Neural Networks to Weight Perturbations

    Tsai, Y. L., Hsu, C. Y., Yu, C. M. & Chen, P. Y., 2021, Advances in Neural Information Processing Systems 34 - 35th Conference on Neural Information Processing Systems, NeurIPS 2021. Ranzato, M., Beygelzimer, A., Dauphin, Y., Liang, P. S. & Wortman Vaughan, J. (編輯). Neural information processing systems foundation, p. 19692-19704 13 p. (Advances in Neural Information Processing Systems; 卷 24).

    研究成果: Conference contribution同行評審

    18 引文 斯高帕斯(Scopus)
  • 2020

    On the privacy risks of compromised trigger-action platforms

    Chiang, Y. H., Hsiao, H. C., Yu, C. M. & Kim, T. H. J., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (編輯). Springer Science and Business Media Deutschland GmbH, p. 251-271 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 12309 LNCS).

    研究成果: Conference contribution同行評審

    3 引文 斯高帕斯(Scopus)
  • 2019

    Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding

    Wu, C. F., Ti, Y. W., Kuo, S. Y. & Yu, C. M., 8月 2019, Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019. Institute of Electrical and Electronics Engineers Inc., p. 65-69 5 p. 8858302. (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019).

    研究成果: Conference contribution同行評審

    5 引文 斯高帕斯(Scopus)
  • Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee

    Ren, X., Wang, S., Yao, X., Yu, C. M., Yu, W. & Yang, X., 2019, Wireless Algorithms, Systems, and Applications - 14th International Conference, WASA 2019, Proceedings. Biagioni, E. S., Zheng, Y. & Cheng, S. (編輯). Springer Verlag, p. 272-284 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 11604 LNCS).

    研究成果: Conference contribution同行評審

    5 引文 斯高帕斯(Scopus)
  • Empirical evaluation on synthetic data generation with generative adversarial network

    Lu, P. H., Wang, P. C. & Yu, C. M., 26 6月 2019, Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, WIMS 2019. Association for Computing Machinery, (ACM International Conference Proceeding Series).

    研究成果: Conference contribution同行評審

    12 引文 斯高帕斯(Scopus)
  • Poster: Characterizing adversarial subspaces by mutual information

    Hsu, C. Y., Chen, P. Y. & Yu, C. M., 2 7月 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 667-669 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    研究成果: Conference contribution同行評審

  • 2018

    Abnormal-Node detection based on spatio-Temporal and Multivariate-Attribute correlation in wireless sensor networks

    Berjab, N., Le, H. H., Yu, C. M., Kuo, S. Y. & Yokota, H., 26 10月 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 568-575 8 p. 8511949. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

    研究成果: Conference contribution同行評審

    7 引文 斯高帕斯(Scopus)
  • Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

    Huang, T. H. D., Yu, C. M. & Kao, H. Y., 9 5月 2018, Proceedings - 2017 Conference on Technologies and Applications of Artificial Intelligence, TAAI 2017. Institute of Electrical and Electronics Engineers Inc., p. 166-171 6 p. (Proceedings - 2017 Conference on Technologies and Applications of Artificial Intelligence, TAAI 2017).

    研究成果: Conference contribution同行評審

    開啟存取
    9 引文 斯高帕斯(Scopus)
  • Hierarchical abnormal-node detection using fuzzy logic for ECA rule-based wireless sensor networks

    Berjab, N., Le, H. H., Yu, C. M., Kuo, S. Y. & Yokota, H., 2 7月 2018, Proceedings - 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing, PRDC 2018. IEEE Computer Society, p. 289-298 10 p. 8639677. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC; 卷 2018-December).

    研究成果: Conference contribution同行評審

    8 引文 斯高帕斯(Scopus)
  • On the Limitation of MagNet Defense Against L1-Based Adversarial Examples

    Lu, P. H., Chen, P. Y., Chen, K. C. & Yu, C. M., 19 7月 2018, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018. Institute of Electrical and Electronics Engineers Inc., p. 200-214 15 p. 8416250. (Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018).

    研究成果: Conference contribution同行評審

    6 引文 斯高帕斯(Scopus)
  • On the utility of conditional generation based mutual information for characterizing adversarial subspaces

    Hsu, C. Y., Lu, P. H., Chen, P. Y. & Yu, C. M., 2 7月 2018, 2018 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1149-1153 5 p. 8646527. (2018 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2018 - Proceedings).

    研究成果: Conference contribution同行評審

    開啟存取
    1 引文 斯高帕斯(Scopus)
  • Privacy-Preserving Record Linkage via Bilinear Pairing Approach

    Lin, C. H. & Yu, C. M., 27 8月 2018, 2018 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2018. Institute of Electrical and Electronics Engineers Inc., 8448454. (2018 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2018).

    研究成果: Conference contribution同行評審

  • RARE: Defeating side channels based on data-deduplication in cloud storage

    Pooranian, Z., Chen, K. C., Yu, C. M. & Conti, M., 6 7月 2018, INFOCOM 2018 - IEEE Conference on Computer Communications Workshops. Institute of Electrical and Electronics Engineers Inc., p. 444-449 6 p. (INFOCOM 2018 - IEEE Conference on Computer Communications Workshops).

    研究成果: Conference contribution同行評審

    61 引文 斯高帕斯(Scopus)
  • VENUS: Verifiable range query in data streaming

    Tsai, I. C., Yu, C. M., Yokota, H. & Kuo, S. Y., 6 7月 2018, INFOCOM 2018 - IEEE Conference on Computer Communications Workshops. Institute of Electrical and Electronics Engineers Inc., p. 160-165 6 p. (INFOCOM 2018 - IEEE Conference on Computer Communications Workshops).

    研究成果: Conference contribution同行評審

    9 引文 斯高帕斯(Scopus)
  • 2017

    Data-driven approach for evaluating risk of disclosure and utility in differentially private data release

    Chen, K. C., Yu, C. M., Tai, B. C., Li, S. C., Tsou, Y. T., Huang, Y. & Lin, C. M., 5 5月 2017, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Enokido, T., Hsu, H.-H., Lin, C.-Y., Takizawa, M. & Barolli, L. (編輯). Institute of Electrical and Electronics Engineers Inc., p. 1130-1137 8 p. 7921033. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Conference contribution同行評審

    9 引文 斯高帕斯(Scopus)
  • Evaluating the risk of data disclosure using noise estimation for differential privacy

    Chen, H. L., Chen, J. Y., Tsou, Y. T., Yu, C. M., Tai, B. C., Li, S. C., Huang, Y. & Lin, C. M., 5 5月 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (編輯). IEEE Computer Society, p. 339-347 9 p. 7920639. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

    研究成果: Conference contribution同行評審

    9 引文 斯高帕斯(Scopus)
  • High-dimensional crowdsourced data distribution estimation with local privacy

    Ren, X., Yu, C. M., Yu, W., Yang, S., Yang, X. & McCann, J., 10 3月 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 226-233 8 p. 7876342. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

    研究成果: Conference contribution同行評審

    開啟存取
    12 引文 斯高帕斯(Scopus)
  • Key management in internet of things via kronecker product

    Tsai, I. C., Yu, C. M., Yokota, H. & Kuo, S. Y., 5 5月 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (編輯). IEEE Computer Society, p. 118-124 7 p. 7920605. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

    研究成果: Conference contribution同行評審

    20 引文 斯高帕斯(Scopus)
  • Poster: A unified framework of differentially private synthetic data release with generative adversarial network

    Lu, P. H. & Yu, C. M., 30 10月 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2547-2549 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    研究成果: Conference contribution同行評審

    13 引文 斯高帕斯(Scopus)
  • POSTER: Enabling end-users to protect their privacy

    Barhamgi, M., Yang, M., Yu, C. M., Yu, Y., Bandara, A. K., Benslimane, D. & Nuseibeh, B., 2 4月 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 905-907 3 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

    研究成果: Conference contribution同行評審

    開啟存取
    8 引文 斯高帕斯(Scopus)
  • 2016

    Counteracting UDP flooding attacks in SDN

    Wei, H. C., Tung, Y. H. & Yu, C. M., 30 6月 2016, IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services. Institute of Electrical and Electronics Engineers Inc., p. 367-371 5 p. 7502468. (IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services).

    研究成果: Conference contribution同行評審

    開啟存取
    18 引文 斯高帕斯(Scopus)
  • POSTER: Efficient cross-user chunk-level client-side data deduplication with symmetrically encrypted two-party interactions

    Yu, C. M., 24 10月 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1763-1765 3 p. (Proceedings of the ACM Conference on Computer and Communications Security; 卷 24-28-October-2016).

    研究成果: Conference contribution同行評審

    15 引文 斯高帕斯(Scopus)
  • 2015

    Deterministic detection of node replication attacks in sensor networks

    Ho, Y. S., Ma, R. L., Sung, C. E., Tsai, I. C., Kang, L. W. & Yu, C. M., 20 8月 2015, 2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015. Institute of Electrical and Electronics Engineers Inc., p. 468-469 2 p. 7217002. (2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015).

    研究成果: Conference contribution同行評審

    4 引文 斯高帕斯(Scopus)
  • Lightweight streaming authenticated data structures

    Yu, C. M., 12 10月 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1693-1695 3 p. (Proceedings of the ACM Conference on Computer and Communications Security; 卷 2015-October).

    研究成果: Conference contribution同行評審

    10 引文 斯高帕斯(Scopus)
  • 2014

    Sensor localization via robust principle component analysis

    Yu, C. M. & Kang, L. W., 18 9月 2014, Digest of Technical Papers - IEEE International Conference on Consumer Electronics. Institute of Electrical and Electronics Engineers Inc., p. 215-216 2 p. 6904065. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    研究成果: Conference contribution同行評審

  • 2013

    Top-k query result completeness verification in sensor networks

    Yu, C. M., Ni, G. K., Chen, I. Y., Gelenbe, E. & Kuo, S. Y., 2013, 2013 IEEE International Conference on Communications Workshops, ICC 2013. p. 1026-1030 5 p. 6649387. (2013 IEEE International Conference on Communications Workshops, ICC 2013).

    研究成果: Conference contribution同行評審

    11 引文 斯高帕斯(Scopus)
  • 2012

    CSI: Compressed sensing-based clone identification in sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 290-295 6 p. 6197497. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

    研究成果: Conference contribution同行評審

    32 引文 斯高帕斯(Scopus)
  • Resource block assignment for interference avoidance in femtocell networks

    Liang, Y. S., Chung, W. H., Yu, C. M., Zhang, H., Chung, C. H., Ho, C. H. & Kuo, S. Y., 2012, 2012 IEEE Vehicular Technology Conference, VTC Fall 2012 - Proceedings. 6399258. (IEEE Vehicular Technology Conference).

    研究成果: Conference contribution同行評審

    5 引文 斯高帕斯(Scopus)
  • 2011

    Secure transcoding for compressive multimedia sensing

    Kang, L. W., Lin, C. Y., Chen, H. W., Yu, C. M., Lu, C. S., Hsu, C. Y. & Pei, S. C., 2011, ICIP 2011: 2011 18th IEEE International Conference on Image Processing. p. 917-920 4 p. 6116709. (Proceedings - International Conference on Image Processing, ICIP).

    研究成果: Conference contribution同行評審

    6 引文 斯高帕斯(Scopus)
  • 2009

    A constrained function based message authentication scheme for sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009 - Proceedings. 4917492. (IEEE Wireless Communications and Networking Conference, WCNC).

    研究成果: Conference contribution同行評審

    3 引文 斯高帕斯(Scopus)
  • Efficient and distributed detection of node replication attacks in mobile sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, Proceedings of the 2009 IEEE 70th Vehicular Technology Conference Fall, VTC 2009 Fall. 5379092. (IEEE Vehicular Technology Conference).

    研究成果: Conference contribution同行評審

    開啟存取
    42 引文 斯高帕斯(Scopus)
  • Poster abstract: A dos-resilient en-route filtering scheme for sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, MobiHoc'09 - Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 343-344 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    研究成果: Conference contribution同行評審

    6 引文 斯高帕斯(Scopus)
  • Simple non-interactive pairwise key establishment scheme in sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009. 5168906. (2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009).

    研究成果: Conference contribution同行評審

    11 引文 斯高帕斯(Scopus)
  • 2008

    A Constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks

    Yu, C. M., Chi, T. Y., Lu, C. S. & Kuo, S. Y., 2008, Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing 2008, MobiHoc'08. p. 449-450 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    研究成果: Conference contribution同行評審

    6 引文 斯高帕斯(Scopus)
  • Mobile sensor network resilient against node replication attacks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 597-599 3 p. 4557805. (2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    研究成果: Conference contribution同行評審

    66 引文 斯高帕斯(Scopus)
  • 2007

    Attack probability based deterministic key predistribution mechanism for non-uniform sensor deployment

    Yu, C. M., Li, C. C., Lu, C. S., Lee, D. T. & Kuo, S. Y., 2007, 27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07. 4279012. (Proceedings - International Conference on Distributed Computing Systems).

    研究成果: Conference contribution同行評審

    6 引文 斯高帕斯(Scopus)
  • Habitual behavior-based opportunistic data forwarding in wildlife tracking

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2007, Proceedings of 4th IEEE Internatilonal Symposium on Wireless Communication Systems 2007, ISWCS. p. 807-808 2 p. 4392452. (Proceedings of 4th IEEE Internatilonal Symposium on Wireless Communication Systems 2007, ISWCS).

    研究成果: Conference contribution同行評審

    3 引文 斯高帕斯(Scopus)