如果您對這些純文本內容做了任何改變,很快就會看到。
篩選
Conference contribution

搜尋結果

  • 2021

    A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space

    Li, L., Rezapour, A. & Tzeng, W. G., 30 一月 2021, 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021. Institute of Electrical and Electronics Engineers Inc., 9346264. (2021 IEEE Conference on Dependable and Secure Computing, DSC 2021).

    研究成果: Conference contribution同行評審

  • 2018

    A Robust intrusion detection network using thresholdless trust management system with incentive design

    Rezapour, A. & Tzeng, W-G., 1 一月 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Chang, B., Li, Y., Beyah, R. & Zhu, S. (編輯). Springer Verlag, p. 139-154 16 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; 卷 255).

    研究成果: Conference contribution同行評審

    2 引文 斯高帕斯(Scopus)
  • Effective Botnet Detection Through Neural Networks on Convolutional Features

    Chen, S. C., Chen, Y. R. & Tzeng, W-G., 5 九月 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 372-378 7 p. 8455930. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    研究成果: Conference contribution同行評審

    19 引文 斯高帕斯(Scopus)
  • Monsieur poirot: Detecting botnets using re-identification algorithm and nontrivial feature selection technique

    Lee, W. M., Rezapour, A. & Tzeng, W-G., 27 七月 2018, 2018 IEEE International Conference on Communications, ICC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8422081. (IEEE International Conference on Communications; 卷 2018-May).

    研究成果: Conference contribution同行評審

    2 引文 斯高帕斯(Scopus)
  • 2017

    An online subject-based spam filter using natural language features

    Lee, C. N., Chen, Y. R. & Tzeng, W-G., 18 十月 2017, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 479-484 6 p. 8073830. (2017 IEEE Conference on Dependable and Secure Computing).

    研究成果: Conference contribution同行評審

    2 引文 斯高帕斯(Scopus)
  • Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security

    Chen, Y. R. & Tzeng, W-G., 1 一月 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (編輯). Springer Verlag, p. 165-183 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10355 LNCS).

    研究成果: Conference contribution同行評審

    6 引文 斯高帕斯(Scopus)
  • The forward-backward string: A new robust feature for botnet detection

    Su, Y. H., Rezapour, A. & Tzeng, W-G., 18 十月 2017, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 485-492 8 p. 8073831. (2017 IEEE Conference on Dependable and Secure Computing).

    研究成果: Conference contribution同行評審

    5 引文 斯高帕斯(Scopus)
  • 2014

    Game-theoretic strategy analysis for data reliability management in cloud storage systems

    Lin, C. Y. & Tzeng, W-G., 1 一月 2014, Proceedings - 8th International Conference on Software Security and Reliability, SERE 2014. Institute of Electrical and Electronics Engineers Inc., p. 187-195 9 p. 6895429. (Proceedings - 8th International Conference on Software Security and Reliability, SERE 2014).

    研究成果: Conference contribution同行評審

    8 引文 斯高帕斯(Scopus)
  • 2013

    CloudHKA: A cryptographic approach for hierarchical access control in cloud computing

    Chen, Y. R., Chu, C. K., Tzeng, W-G. & Zhou, J., 12 七月 2013, Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Proceedings. p. 37-52 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 7954 LNCS).

    研究成果: Conference contribution同行評審

    24 引文 斯高帕斯(Scopus)
  • 2012

    A practical smart metering system supporting privacy preserving billing and load monitoring

    Lin, H. Y., Tzeng, W-G., Shen, S. T. & Lin , B-S., 9 七月 2012, Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Proceedings. p. 544-560 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 7341 LNCS).

    研究成果: Conference contribution同行評審

    36 引文 斯高帕斯(Scopus)
  • A secure fine-grained access control mechanism for networked storage systems

    Lin, H. Y., Kubiatowicz, J. & Tzeng, W-G., 1 十月 2012, Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012. p. 225-234 10 p. 6258312. (Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012).

    研究成果: Conference contribution同行評審

    1 引文 斯高帕斯(Scopus)
  • Efficient and provably-secure group key management scheme using key derivation

    Chen, Y. R. & Tzeng, W-G., 5 十一月 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 295-302 8 p. 6295988. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

    研究成果: Conference contribution同行評審

    21 引文 斯高帕斯(Scopus)
  • Toward data confidentiality via integrating hybrid encryption schemes and hadoop distributed file system

    Lin, H-Y., Shen, S. T., Tzeng, W-G. & Lin , B-S., 14 五月 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012. p. 740-747 8 p. 6184943. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Conference contribution同行評審

    19 引文 斯高帕斯(Scopus)
  • 2011

    A decentralized repair mechanism for decentralized erasure code based storage systems

    Lin, H-Y., Tzeng, W-G. & Lin , B-S., 1 十二月 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 613-620 8 p. 6120872. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    研究成果: Conference contribution同行評審

    4 引文 斯高帕斯(Scopus)
  • An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems

    Chou, K. Y., Chen, Y. R. & Tzeng, W-G., 15 十二月 2011, APNOMS 2011 - 13th Asia-Pacific Network Operations and Management Symposium: Managing Clouds, Smart Networks and Services, Final Program. 6077025. (APNOMS 2011 - 13th Asia-Pacific Network Operations and Management Symposium: Managing Clouds, Smart Networks and Services, Final Program).

    研究成果: Conference contribution同行評審

    11 引文 斯高帕斯(Scopus)
  • Delegable provable data possession for remote data in the clouds

    Shen, S. T. & Tzeng, W-G., 17 十一月 2011, Information and Communications Security - 13th International Conference, ICICS 2011, Proceedings. p. 93-111 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 7043 LNCS).

    研究成果: Conference contribution同行評審

    28 引文 斯高帕斯(Scopus)
  • Secure group key management using uni-directional proxy re-encryption schemes

    Chen, Y. R., Tygar, J. D. & Tzeng, W-G., 2 八月 2011, 2011 Proceedings IEEE INFOCOM. p. 1952-1960 9 p. 5934999. (Proceedings - IEEE INFOCOM).

    研究成果: Conference contribution同行評審

    49 引文 斯高帕斯(Scopus)
  • 2009

    A public-key traitor tracing scheme with an optimal transmission rate

    Chen, Y. R. & Tzeng, W-G., 1 十二月 2009, Information and Communications Security - 11th International Conference, ICICS 2009, Proceedings. p. 121-134 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 5927 LNCS).

    研究成果: Conference contribution同行評審

    4 引文 斯高帕斯(Scopus)
  • 2008

    Efficient encoding and decoding with permutation arrays

    Lin, T. T., Tsai, S-C. & Tzeng, W-G., 29 九月 2008, Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008. p. 211-214 4 p. 4594978. (IEEE International Symposium on Information Theory - Proceedings).

    研究成果: Conference contribution同行評審

    15 引文 斯高帕斯(Scopus)
  • Public key broadcast encryption with low number of keys and constant decryption time

    Liu, Y. R. & Tzeng, W-G., 10 三月 2008, Public Key Cryptography - PKC 2008 - 11th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings. p. 380-396 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 4939 LNCS).

    研究成果: Conference contribution同行評審

    開啟存取
    13 引文 斯高帕斯(Scopus)
  • 2007

    Identity-based proxy re-encryption without random oracles

    Chu, C. K. & Tzeng, W-G., 1 十二月 2007, Information Security - 10th International Conference, ISC 2007, Proceedings. p. 189-202 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 4779 LNCS).

    研究成果: Conference contribution同行評審

    181 引文 斯高帕斯(Scopus)
  • Identity-commit table signatures and their extension to group-oriented ring signatures

    Chu, C. K. & Tzeng, W-G., 1 十二月 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 323-337 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 4586 LNCS).

    研究成果: Conference contribution同行評審

    3 引文 斯高帕斯(Scopus)
  • 2006

    A secure system for data access based on anonymous authentication and time-dependent hierarchical keys

    Tzeng, W-G., 1 十二月 2006, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06. p. 223-230 8 p. (Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06; 卷 2006).

    研究成果: Conference contribution同行評審

    29 引文 斯高帕斯(Scopus)
  • Conditional oblivious cast

    Chu, C. K. & Tzeng, W-G., 17 七月 2006, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings. p. 443-457 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 3958 LNCS).

    研究成果: Conference contribution同行評審

    1 引文 斯高帕斯(Scopus)
  • 2005

    Compatible ideal contrast visual cryptography schemes with reversing

    Hu, C. M. & Tzeng, W-G., 1 十二月 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 300-313 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 3650 LNCS).

    研究成果: Conference contribution同行評審

    10 引文 斯高帕斯(Scopus)
  • 2002

    Distributed key generation as a component of an integrated protocol

    Chu, C. K. & Tzeng, W-G., 1 一月 2002, Information and Communications Security - 4th International Conference, ICICS 2002, Proceedings. Qing, S., Deng, R., Bao, F. & Zhou, J. (編輯). Springer Verlag, p. 411-421 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 2513).

    研究成果: Conference contribution同行評審

    1 引文 斯高帕斯(Scopus)
  • Efficient 1-out-n oblivious transfer schemes

    Tzeng, W-G., 1 一月 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naccache, D. & Paillier, P. (編輯). Springer Verlag, p. 159-171 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 2274).

    研究成果: Conference contribution同行評審

    開啟存取
    61 引文 斯高帕斯(Scopus)
  • Robust key-evolving public key encryption schemes

    Tzeng, W-G. & Tzeng, Z. J., 1 一月 2002, Information and Communications Security - 4th International Conference, ICICS 2002, Proceedings. Qing, S., Deng, R., Bao, F. & Zhou, J. (編輯). Springer Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 2513).

    研究成果: Conference contribution同行評審

    7 引文 斯高帕斯(Scopus)
  • 2001

    A public-key traitor tracing scheme with revocation using dynamic shares

    Tzeng, W-G. & Tzeng, Z. J., 13 二月 2001, Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings. Kim, K. (編輯). Springer Verlag, p. 207-224 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 1992).

    研究成果: Conference contribution同行評審

    60 引文 斯高帕斯(Scopus)
  • Robust forward-secure signature schemes with proactive security

    Tzeng, W-G. & Tzeng, Z. J., 1 一月 2001, Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings. Kim, K. (編輯). Springer Verlag, p. 264-276 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 1992).

    研究成果: Conference contribution同行評審

    33 引文 斯高帕斯(Scopus)
  • 2000

    A practical and secure fault-tolerant conference-key agreement protocol

    Tzeng, W-G., 18 一月 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (編輯). Springer Verlag, p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 1751).

    研究成果: Conference contribution同行評審

    19 引文 斯高帕斯(Scopus)
  • Round-efficient conference key agreement protocols with provable security

    Tzeng, W-G. & Tzeng, Z. J., 3 十二月 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (編輯). Springer Verlag, p. 614-627 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 1976).

    研究成果: Conference contribution同行評審

    49 引文 斯高帕斯(Scopus)
  • 1989

    Equivalence and learning of probabilistic automata

    Tzeng, W-G., 1 十一月 1989, Annual Symposium on Foundations of Computer Science (Proceedings). Publ by IEEE, p. 268-273 6 p. (Annual Symposium on Foundations of Computer Science (Proceedings)).

    研究成果: Conference contribution同行評審

    13 引文 斯高帕斯(Scopus)