20052021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2020

    On the privacy risks of compromised trigger-action platforms

    Chiang, Y. H., Hsiao, H. C., Yu, C. M. & Kim, T. H. J., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 251-271 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding

    Wu, C. F., Ti, Y. W., Kuo, S. Y. & Yu, C. M., Aug 2019, Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019. Institute of Electrical and Electronics Engineers Inc., p. 65-69 5 p. 8858302. (Proceedings - 2019 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee

    Ren, X., Wang, S., Yao, X., Yu, C. M., Yu, W. & Yang, X., 2019, Wireless Algorithms, Systems, and Applications - 14th International Conference, WASA 2019, Proceedings. Biagioni, E. S., Zheng, Y. & Cheng, S. (eds.). Springer Verlag, p. 272-284 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11604 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Empirical evaluation on synthetic data generation with generative adversarial network

    Lu, P. H., Wang, P. C. & Yu, C. M., 26 Jun 2019, Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, WIMS 2019. Association for Computing Machinery, (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Hierarchical abnormal-node detection using fuzzy logic for ECA rule-based wireless sensor networks

    Berjab, N., Le, H. H., Yu, C. M., Kuo, S. Y. & Yokota, H., 11 Feb 2019, Proceedings - 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing, PRDC 2018. IEEE Computer Society, p. 289-298 10 p. 8639677. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC; vol. 2018-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • On the utility of conditional generation based mutual information for characterizing adversarial subspaces

    Hsu, C. Y., Lu, P. H., Chen, P. Y. & Yu, C. M., 20 Feb 2019, 2018 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1149-1153 5 p. 8646527. (2018 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Poster: Characterizing adversarial subspaces by mutual information

    Hsu, C. Y., Chen, P. Y. & Yu, C. M., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 667-669 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    Abnormal-Node detection based on spatio-Temporal and Multivariate-Attribute correlation in wireless sensor networks

    Berjab, N., Le, H. H., Yu, C. M., Kuo, S. Y. & Yokota, H., 26 Oct 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 568-575 8 p. 8511949. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

    Huang, T. H. D., Yu, C. M. & Kao, H. Y., 9 May 2018, Proceedings - 2017 Conference on Technologies and Applications of Artificial Intelligence, TAAI 2017. Institute of Electrical and Electronics Engineers Inc., p. 166-171 6 p. (Proceedings - 2017 Conference on Technologies and Applications of Artificial Intelligence, TAAI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On the Limitation of MagNet Defense Against L1-Based Adversarial Examples

    Lu, P. H., Chen, P. Y., Chen, K. C. & Yu, C. M., 19 Jul 2018, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018. Institute of Electrical and Electronics Engineers Inc., p. 200-214 15 p. 8416250. (Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Privacy-Preserving Record Linkage via Bilinear Pairing Approach

    Lin, C. H. & Yu, C. M., 27 Aug 2018, 2018 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2018. Institute of Electrical and Electronics Engineers Inc., 8448454. (2018 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • RARE: Defeating side channels based on data-deduplication in cloud storage

    Pooranian, Z., Chen, K. C., Yu, C. M. & Conti, M., 6 Jul 2018, INFOCOM 2018 - IEEE Conference on Computer Communications Workshops. Institute of Electrical and Electronics Engineers Inc., p. 444-449 6 p. (INFOCOM 2018 - IEEE Conference on Computer Communications Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Scopus citations
  • VENUS: Verifiable range query in data streaming

    Tsai, I. C., Yu, C. M., Yokota, H. & Kuo, S. Y., 6 Jul 2018, INFOCOM 2018 - IEEE Conference on Computer Communications Workshops. Institute of Electrical and Electronics Engineers Inc., p. 160-165 6 p. (INFOCOM 2018 - IEEE Conference on Computer Communications Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2017

    Data-driven approach for evaluating risk of disclosure and utility in differentially private data release

    Chen, K. C., Yu, C. M., Tai, B. C., Li, S. C., Tsou, Y. T., Huang, Y. & Lin, C. M., 5 May 2017, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Enokido, T., Hsu, H-H., Lin, C-Y., Takizawa, M. & Barolli, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1130-1137 8 p. 7921033. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Evaluating the risk of data disclosure using noise estimation for differential privacy

    Chen, H. L., Chen, J. Y., Tsou, Y. T., Yu, C. M., Tai, B. C., Li, S. C., Huang, Y. & Lin, C. M., 5 May 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 339-347 9 p. 7920639. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • High-dimensional crowdsourced data distribution estimation with local privacy

    Ren, X., Yu, C. M., Yu, W., Yang, S., Yang, X. & McCann, J., 10 Mar 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 226-233 8 p. 7876342. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Key management in internet of things via kronecker product

    Tsai, I. C., Yu, C. M., Yokota, H. & Kuo, S. Y., 5 May 2017, Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. Kitakami, M., Kim, D. S. & Varadharajan, V. (eds.). IEEE Computer Society, p. 118-124 7 p. 7920605. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Poster: A unified framework of differentially private synthetic data release with generative adversarial network

    Lu, P. H. & Yu, C. M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2547-2549 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • POSTER: Enabling end-users to protect their privacy

    Barhamgi, M., Yang, M., Yu, C. M., Yu, Y., Bandara, A. K., Benslimane, D. & Nuseibeh, B., 2 Apr 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 905-907 3 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2016

    Counteracting UDP flooding attacks in SDN

    Wei, H. C., Tung, Y. H. & Yu, C. M., 30 Jun 2016, IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services. Institute of Electrical and Electronics Engineers Inc., p. 367-371 5 p. 7502468. (IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • POSTER: Efficient cross-user chunk-level client-side data deduplication with symmetrically encrypted two-party interactions

    Yu, C. M., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1763-1765 3 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2015

    Deterministic detection of node replication attacks in sensor networks

    Ho, Y. S., Ma, R. L., Sung, C. E., Tsai, I. C., Kang, L. W. & Yu, C. M., 20 Aug 2015, 2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015. Institute of Electrical and Electronics Engineers Inc., p. 468-469 2 p. 7217002. (2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Lightweight streaming authenticated data structures

    Yu, C. M., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1693-1695 3 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2014

    Sensor localization via robust principle component analysis

    Yu, C. M. & Kang, L. W., 18 Sep 2014, Digest of Technical Papers - IEEE International Conference on Consumer Electronics. Institute of Electrical and Electronics Engineers Inc., p. 215-216 2 p. 6904065. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Top-k query result completeness verification in sensor networks

    Yu, C. M., Ni, G. K., Chen, I. Y., Gelenbe, E. & Kuo, S. Y., 2013, 2013 IEEE International Conference on Communications Workshops, ICC 2013. p. 1026-1030 5 p. 6649387. (2013 IEEE International Conference on Communications Workshops, ICC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • 2012

    CSI: Compressed sensing-based clone identification in sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 290-295 6 p. 6197497. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • Resource block assignment for interference avoidance in femtocell networks

    Liang, Y. S., Chung, W. H., Yu, C. M., Zhang, H., Chung, C. H., Ho, C. H. & Kuo, S. Y., 2012, 2012 IEEE Vehicular Technology Conference, VTC Fall 2012 - Proceedings. 6399258. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2011

    Secure transcoding for compressive multimedia sensing

    Kang, L. W., Lin, C. Y., Chen, H. W., Yu, C. M., Lu, C. S., Hsu, C. Y. & Pei, S. C., 2011, ICIP 2011: 2011 18th IEEE International Conference on Image Processing. p. 917-920 4 p. 6116709. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2009

    A constrained function based message authentication scheme for sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009 - Proceedings. 4917492. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Efficient and distributed detection of node replication attacks in mobile sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, Proceedings of the 2009 IEEE 70th Vehicular Technology Conference Fall, VTC 2009 Fall. 5379092. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    41 Scopus citations
  • Poster abstract: A dos-resilient en-route filtering scheme for sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, MobiHoc'09 - Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 343-344 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Simple non-interactive pairwise key establishment scheme in sensor networks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009. 5168906. (2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2008

    A Constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks

    Yu, C. M., Chi, T. Y., Lu, C. S. & Kuo, S. Y., 2008, Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing 2008, MobiHoc'08. p. 449-450 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Mobile sensor network resilient against node replication attacks

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 597-599 3 p. 4557805. (2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    63 Scopus citations
  • 2007

    Attack probability based deterministic key predistribution mechanism for non-uniform sensor deployment

    Yu, C. M., Li, C. C., Lu, C. S., Lee, D. T. & Kuo, S. Y., 2007, 27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07. 4279012. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Habitual behavior-based opportunistic data forwarding in wildlife tracking

    Yu, C. M., Lu, C. S. & Kuo, S. Y., 2007, Proceedings of 4th IEEE Internatilonal Symposium on Wireless Communication Systems 2007, ISWCS. p. 807-808 2 p. 4392452. (Proceedings of 4th IEEE Internatilonal Symposium on Wireless Communication Systems 2007, ISWCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Improving the network flow problem using quantum search

    Yu, C. M., Tsai, I. M., Chou, Y. H. & Kuo, S. Y., 2007, 2007 7th IEEE International Conference on Nanotechnology - IEEE-NANO 2007, Proceedings. p. 1126-1129 4 p. 4601381. (2007 7th IEEE International Conference on Nanotechnology - IEEE-NANO 2007, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2006

    Robust non-interactive zero-knowledge watermarking scheme against cheating prover

    Yu, C. M. & Lu, C. S., 2006, Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05. p. 103-110 8 p. (Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2005

    A secure quantum communication protocol using insecure public channels

    Tsai, I. M., Yu, C. M., Tu, W. T. & Kuo, S. Y., 2005, Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference. Qing, S., Okamoto, E., Yoshiura, H. & Sasaki, R. (eds.). Springer New York LLC, p. 113-126 14 p. (IFIP Advances in Information and Communication Technology; vol. 181).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • On the security of mesh-based media hash-dependent watermarking against protocol attacks

    Lu, C. S. & Yu, C. M., 2005, IEEE International Conference on Multimedia and Expo, ICME 2005. p. 169-172 4 p. 1521387. (IEEE International Conference on Multimedia and Expo, ICME 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations