default search action
Chia-Mu Yu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Min-Yan Tsai, Hsin-Hung Cho, Chia-Mu Yu, Yao-Chung Chang, Han-Chieh Chao:
Effective Adversarial Examples Identification of Credit Card Transactions. IEEE Intell. Syst. 39(4): 50-59 (2024) - [c56]Wei-Jia Chen, Chia-Yi Hsu, Wei-Bin Lee, Chia-Mu Yu, Chun-Ying Huang:
Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns. DSN-S 2024: 133-140 - [c55]Cheng-Yi Lee, Cheng-Chang Tsai, Ching-Chia Kao, Chun-Shien Lu, Chia-Mu Yu:
Defending against Clean-Image Backdoor Attack in Multi-Label Classification. ICASSP 2024: 5500-5504 - [c54]Ming-Yu Chung, Sheng-Yen Chou, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo, Tsung-Yi Ho:
Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective. ICLR 2024 - [c53]Yu-Lin Tsai, Chia-Yi Hsu, Chulin Xie, Chih-Hsun Lin, Jia-You Chen, Bo Li, Pin-Yu Chen, Chia-Mu Yu, Chun-Ying Huang:
Ring-A-Bell! How Reliable are Concept Removal Methods For Diffusion Models? ICLR 2024 - [c52]Ching-Chia Kao, Cheng-Yi Lee, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen:
On the Higher Moment Disparity of Backdoor Attacks. ICME 2024: 1-6 - [c51]Zheng-Hong Huang, Yu-Sung Wu, Ying-Dar Lin, Chia-Mu Yu, Wei-Bin Lee:
Neural Network-based Functional Degradation for Cyber-Physical Systems. QRS 2024: 425-434 - [i33]Shyam Marjit, Harshit Singh, Nityanand Mathur, Sayak Paul, Chia-Mu Yu, Pin-Yu Chen:
DiffuseKronA: A Parameter Efficient Fine-tuning Method for Personalized Diffusion Models. CoRR abs/2402.17412 (2024) - [i32]Chia-Yi Hsu, Yu-Lin Tsai, Chih-Hsun Lin, Pin-Yu Chen, Chia-Mu Yu, Chun-Ying Huang:
Safe LoRA: the Silver Lining of Reducing Safety Risks when Fine-tuning Large Language Models. CoRR abs/2405.16833 (2024) - [i31]Yu-Lin Tsai, Yizhe Li, Zekai Chen, Po-Yu Chen, Chia-Mu Yu, Xuebin Ren, Francois Buet-Golfouse:
Differentially Private Fine-Tuning of Diffusion Models. CoRR abs/2406.01355 (2024) - [i30]Cheng-Yi Lee, Ching-Chia Kao, Cheng-Han Yeh, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen:
Defending Against Repetitive-based Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off. CoRR abs/2407.10180 (2024) - [i29]Cheng-Yi Lee, Cheng-Chang Tsai, Chia-Mu Yu, Chun-Shien Lu:
Exploring Robustness of Visual State Space model against Backdoor Attacks. CoRR abs/2408.11679 (2024) - [i28]Ching-Chia Kao, Chia-Mu Yu, Chun-Shien Lu, Chu-Song Chen:
Information-Theoretical Principled Trade-off between Jailbreakability and Stealthiness on Vision Language Models. CoRR abs/2410.01438 (2024) - 2023
- [j34]Chia-Mu Yu:
Counteracting Side Channels in Cross-User Client-Side Deduplicated Cloud Storage. IEEE Internet Things J. 10(17): 15604-15616 (2023) - [j33]Hsin-Hung Cho, Min-Yan Tsai, Jiang-Yi Zeng, Chia-Mu Yu, Han-Chieh Chao, Ilsun You:
LDoS Attacks Detection for ICPS NB-IoTs Environment via SE-Based CNN. IEEE Syst. J. 17(4): 5280-5291 (2023) - [j32]Fabrizio Lamberti, Alberto Cannavò, Zaixing He, Lucia Pepa, Chia-Mu Yu:
Guest Editorial of the Special Section on Consumer Electronics With Artificial Intelligence. IEEE Trans. Consumer Electron. 69(3): 237-239 (2023) - [j31]Yen-Ting Chen, Chia-Yi Hsu, Chia-Mu Yu, Mahmoud Barhamgi, Charith Perera:
On the Private Data Synthesis Through Deep Generative Models for Data Scarcity of Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(1): 551-560 (2023) - [c50]Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu:
Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy. AINA (2) 2023: 501-512 - [c49]Jhih-Cing Huang, Yu-Lin Tsai, Chao-Han Huck Yang, Cheng-Fang Su, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo:
Certified Robustness of Quantum Classifiers Against Adversarial Examples Through Quantum Noise. ICASSP 2023: 1-5 - [c48]Yizhe Li, Yu-Lin Tsai, Chia-Mu Yu, Pin-Yu Chen, Xuebin Ren:
Exploring the Benefits of Visual Prompting in Differential Privacy. ICCV 2023: 5135-5144 - [c47]Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu:
Local Differential Privacy Protocol for Making Key-Value Data Robust Against Poisoning Attacks. MDAI 2023: 241-252 - [i27]Yizhe Li, Yu-Lin Tsai, Xuebin Ren, Chia-Mu Yu, Pin-Yu Chen:
Exploring the Benefits of Visual Prompting in Differential Privacy. CoRR abs/2303.12247 (2023) - [i26]Chih-Hsun Lin, Chia-Yi Hsu, Chia-Mu Yu, Yang Cao, Chun-Ying Huang:
DPAF: Image Synthesis via Differentially Private Aggregation in Forward Phase. CoRR abs/2304.12185 (2023) - [i25]Xilong Wang, Chia-Mu Yu, Pin-Yu Chen:
Exploring the Benefits of Differentially Private Pre-training and Parameter-Efficient Fine-tuning for Table Transformers. CoRR abs/2309.06526 (2023) - [i24]Yu-Lin Tsai, Chia-Yi Hsu, Chulin Xie, Chih-Hsun Lin, Jia-You Chen, Bo Li, Pin-Yu Chen, Chia-Mu Yu, Chun-Ying Huang:
Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models? CoRR abs/2310.10012 (2023) - [i23]Ming-Yu Chung, Sheng-Yen Chou, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo, Tsung-Yi Ho:
Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective. CoRR abs/2311.16646 (2023) - 2022
- [j30]Olayinka Adeboye, Tooska Dargahi, Meisam Babaie, Mohamad Saraee, Chia-Mu Yu:
DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy. IEEE Access 10: 124534-124544 (2022) - [j29]Kazuto Fukuchi, Chia-Mu Yu, Jun Sakuma:
Locally Differentially Private Minimum Finding. IEICE Trans. Inf. Syst. 105-D(8): 1418-1430 (2022) - [j28]Fan-Hsun Tseng, Yu-Shan Liang, Yen-Wu Ti, Chia-Mu Yu:
Intelligent reflecting surface-aided network planning. IET Commun. 16(20): 2406-2413 (2022) - [j27]Chih-Hsun Lin, Chia-Mu Yu, Chun-Ying Huang:
DPView: Differentially Private Data Synthesis Through Domain Size Information. IEEE Internet Things J. 9(17): 15886-15900 (2022) - [j26]Tooska Dargahi, Hossein Ahmadvand, Mansour Naser Alraja, Chia-Mu Yu:
Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge. ACM J. Data Inf. Qual. 14(1): 5:1-5:10 (2022) - [j25]Chia-Mu Yu, Kang-Cheng Chen, Ching-Tang Chang, Yen-Wu Ti:
SegNet: a network for detecting deepfake facial videos. Multim. Syst. 28(3): 793-814 (2022) - [c46]Chia-Yi Hsu, Pin-Yu Chen, Songtao Lu, Sijia Liu, Chia-Mu Yu:
Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning. AAAI 2022: 6926-6934 - [c45]Jia-Wei Chen, Chia-Mu Yu, Ching-Chia Kao, Tzai-Wei Pang, Chun-Shien Lu:
DPGEN: Differentially Private Generative Energy-Guided Network for Natural Image Synthesis. CVPR 2022: 8377-8386 - [c44]Chang-Sheng Lin, Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:
Real-World Adversarial Examples Via Makeup. ICASSP 2022: 2854-2858 - [i22]Jhih-Cing Huang, Yu-Lin Tsai, Chao-Han Huck Yang, Cheng-Fang Su, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo:
Certified Robustness of Quantum Classifiers against Adversarial Examples through Quantum Noise. CoRR abs/2211.00887 (2022) - 2021
- [j24]Claudio A. Ardagna, Mauro Conti, Ernesto Damiani, Chia-Mu Yu:
Editorial: Special issue on trusted Cloud-Edges computations. Future Gener. Comput. Syst. 114: 661-664 (2021) - [j23]Xuebin Ren, Chia-Mu Yu, Wei Yu, Xinyu Yang, Jun Zhao, Shusen Yang:
DPCrowd: Privacy-Preserving and Communication-Efficient Decentralized Statistical Estimation for Real-Time Crowdsourced Data. IEEE Internet Things J. 8(4): 2775-2791 (2021) - [j22]Yao-Tung Tsou, Mansour Naser Alraja, Li-Sheng Chen, Yu-Hsiang Chang, Yung-Li Hu, Yennun Huang, Chia-Mu Yu, Pei-Yuan Tsai:
(k, ε , δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy. Serv. Oriented Comput. Appl. 15(3): 175-185 (2021) - [j21]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Chia-Mu Yu:
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems. ACM Trans. Cyber Phys. Syst. 5(1): 1:1-1:2 (2021) - [c43]Jia-Wei Chen, Li-Ju Chen, Chia-Mu Yu, Chun-Shien Lu:
Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation With Manipulable Semantics. CVPR 2021: 6478-6487 - [c42]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Non-Singular Adversarial Robustness of Neural Networks. ICASSP 2021: 3840-3844 - [c41]Xiao Jin, Pin-Yu Chen, Chia-Yi Hsu, Chia-Mu Yu, Tianyi Chen:
Catastrophic Data Leakage in Vertical Federated Learning. NeurIPS 2021: 994-1006 - [c40]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Formalizing Generalization and Adversarial Robustness of Neural Networks to Weight Perturbations. NeurIPS 2021: 19692-19704 - [i21]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Non-Singular Adversarial Robustness of Neural Networks. CoRR abs/2102.11935 (2021) - [i20]Chia-Yi Hsu, Pin-Yu Chen, Songtao Lu, Sijia Lu, Chia-Mu Yu:
Adversarial Examples for Unsupervised Machine Learning Models. CoRR abs/2103.01895 (2021) - [i19]Yu-Lin Tsai, Chia-Yi Hsu, Chia-Mu Yu, Pin-Yu Chen:
Formalizing Generalization and Robustness of Neural Networks to Weight Perturbations. CoRR abs/2103.02200 (2021) - [i18]Jia-Wei Chen, Li-Ju Chen, Chia-Mu Yu, Chun-Shien Lu:
Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics. CoRR abs/2104.01753 (2021) - [i17]Chang-Sheng Lin, Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:
Real-World Adversarial Examples involving Makeup Application. CoRR abs/2109.03329 (2021) - [i16]Xiao Jin, Pin-Yu Chen, Chia-Yi Hsu, Chia-Mu Yu, Tianyi Chen:
CAFE: Catastrophic Data Leakage in Vertical Federated Learning. CoRR abs/2110.15122 (2021) - [i15]Chia-Hung Yuan, Pin-Yu Chen, Chia-Mu Yu:
Meta Adversarial Perturbations. CoRR abs/2111.10291 (2021) - 2020
- [j20]Yen-Wu Ti, Chia-Feng Wu, Chia-Mu Yu, Sy-Yen Kuo:
Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications. IEEE Access 8: 1715-1732 (2020) - [j19]Claudio Agostino Ardagna, Mauro Conti, Chia-Mu Yu:
Special issue on Trusted Cloud-Edges Computations. Future Gener. Comput. Syst. 112: 1180-1183 (2020) - [j18]Chia-Mu Yu, Sarada Prasad Gochhayat, Mauro Conti, Chun-Shien Lu:
Privacy Aware Data Deduplication for Side Channel in Cloud Storage. IEEE Trans. Cloud Comput. 8(2): 597-609 (2020) - [j17]Mahmoud Barhamgi, Charith Perera, Chia-Mu Yu, Djamal Benslimane, David Camacho, Christine Bonnet:
Privacy in Data Service Composition. IEEE Trans. Serv. Comput. 13(4): 639-652 (2020) - [c39]Yu-Hsi Chiang, Hsu-Chun Hsiao, Chia-Mu Yu, Tiffany Hyun-Jin Kim:
On the Privacy Risks of Compromised Trigger-Action Platforms. ESORICS (2) 2020: 251-271 - [i14]Mahmoud Barhamgi, Charith Perera, Chia-Mu Yu, Djamal Benslimane, David Camacho, Christine Bonnet:
Privacy in Data Service Composition. CoRR abs/2001.00975 (2020) - [i13]Xuebin Ren, Chia-Mu Yu, Wei Yu, Xinyu Yang, Jun Zhao, Shusen Yang:
DPCrowd: Privacy-preserving and Communication-efficient Decentralized Statistical Estimation for Real-time Crowd-sourced Data. CoRR abs/2009.14125 (2020)
2010 – 2019
- 2019
- [c38]Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:
Characterizing Adversarial Subspaces by Mutual Information. AsiaCCS 2019: 667-669 - [c37]Xuebin Ren, Shuyang Wang, Xianghua Yao, Chia-Mu Yu, Wei Yu, Xinyu Yang:
Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee. WASA 2019: 272-284 - [c36]Pei-Hsuan Lu, Pang-Chieh Wang, Chia-Mu Yu:
Empirical Evaluation on Synthetic Data Generation with Generative Adversarial Network. WIMS 2019: 16:1-16:6 - [i12]Kazuto Fukuchi, Chia-Mu Yu, Arashi Haishima, Jun Sakuma:
Locally Differentially Private Minimum Finding. CoRR abs/1905.11067 (2019) - [i11]Chia-Mu Yu, Ching-Tang Chang, Yen-Wu Ti:
Detecting Deepfake-Forged Contents with Separable Convolutional Neural Network and Image Segmentation. CoRR abs/1912.12184 (2019) - 2018
- [j16]Po-Yen Lee, Chia-Mu Yu, Tooska Dargahi, Mauro Conti, Giuseppe Bianchi:
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things. IEEE Trans. Inf. Forensics Secur. 13(8): 2031-2046 (2018) - [j15]Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann, Philip S. Yu:
LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 13(9): 2151-2166 (2018) - [c35]Nesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota:
Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks. DASC/PiCom/DataCom/CyberSciTech 2018: 568-575 - [c34]Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu:
On the Limitation of MagNet Defense Against L1-Based Adversarial Examples. DSN Workshops 2018: 200-214 - [c33]Chia-Yi Hsu, Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On the Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces. GlobalSIP 2018: 1149-1153 - [c32]Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples. ICLR (Workshop) 2018 - [c31]I-Chen Tsai, Chia-Mu Yu, Haruo Yokota, Sy-Yen Kuo:
VENUS: Verifiable range query in data streaming. INFOCOM Workshops 2018: 160-165 - [c30]Zahra Pooranian, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti:
RARE: Defeating side channels based on data-deduplication in cloud storage. INFOCOM Workshops 2018: 444-449 - [c29]Nesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota:
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks. PRDC 2018: 289-298 - [i10]Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples. CoRR abs/1803.09638 (2018) - [i9]Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu:
On the Limitation of MagNet Defense against L1-based Adversarial Examples. CoRR abs/1805.00310 (2018) - [i8]Chia-Yi Hsu, Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu:
On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces. CoRR abs/1809.08986 (2018) - 2017
- [j14]Chi-Yuan Chen, Hsin-Min Wu, Lei Wang, Chia-Mu Yu:
Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems. Comput. Networks 129: 472-480 (2017) - [j13]Chia-Mu Yu, Chi-Yuan Chen, Han-Chieh Chao:
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data. IEEE Syst. J. 11(2): 385-394 (2017) - [c28]Kang-Cheng Chen, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yao-Tung Tsou, Yennun Huang, Chia-Ming Lin:
Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release. AINA 2017: 1130-1137 - [c27]Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu, Arosha K. Bandara, Djamal Benslimane, Bashar Nuseibeh:
Enabling End-Users to Protect their Privacy. AsiaCCS 2017: 905-907 - [c26]Pei-Hsuan Lu, Chia-Mu Yu:
POSTER: A Unified Framework of Differentially Private Synthetic Data Release with Generative Adversarial Network. CCS 2017: 2547-2549 - [c25]I-Chen Tsai, Chia-Mu Yu, Haruo Yokota, Sy-Yen Kuo:
Key Management in Internet of Things via Kronecker Product. PRDC 2017: 118-124 - [c24]Hung-Li Chen, Jia-Yang Chen, Yao-Tung Tsou, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Chia-Ming Lin:
Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy. PRDC 2017: 339-347 - [c23]TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao:
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection. TAAI 2017: 166-171 - [i7]Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao:
R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections. CoRR abs/1705.04448 (2017) - [i6]TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao:
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection. CoRR abs/1710.05305 (2017) - 2016
- [j12]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Compressed Sensing-Based Clone Identification in Sensor Networks. IEEE Trans. Wirel. Commun. 15(4): 3071-3084 (2016) - [c22]Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann:
High-Dimensional Crowdsourced Data Distribution Estimation with Local Privacy. CIT 2016: 226-233 - [c21]Chia-Mu Yu:
POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions. CCS 2016: 1763-1765 - [c20]Hung-Chuan Wei, Yung-Hao Tung, Chia-Mu Yu:
Counteracting UDP flooding attacks in SDN. NetSoft 2016: 367-371 - [i5]Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann, Philip S. Yu:
LoPub: High-Dimensional Crowdsourced Data Publication with Local Differential Privacy. CoRR abs/1612.04350 (2016) - [i4]Chia-Mu Yu:
XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data. IACR Cryptol. ePrint Arch. 2016: 1041 (2016) - 2015
- [j11]Chia-Mu Yu, Chi-Yuan Chen, Han-Chieh Chao:
Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks. IEEE Commun. Mag. 53(8): 48-53 (2015) - [j10]Chia-Mu Yu, Chi-Yuan Chen, Han-Chieh Chao:
Proof of ownership in deduplicated cloud storage with mobile device efficiency. IEEE Netw. 29(2): 51-55 (2015) - [c19]Chia-Mu Yu:
POSTER: Lightweight Streaming Authenticated Data Structures. CCS 2015: 1693-1695 - [c18]Yu-Shen Ho, Ruay-Lien Ma, Cheng-En Sung, I-Chen Tsai, Li-Wei Kang, Chia-Mu Yu:
Deterministic detection of node replication attacks in sensor networks. ICCE-TW 2015: 468-469 - 2014
- [j9]Chia-Mu Yu, Chi-Yuan Chen, Sy-Yen Kuo, Han-Chieh Chao:
Privacy-Preserving Power Request in Smart Grid Networks. IEEE Syst. J. 8(2): 441-449 (2014) - [j8]Chia-Mu Yu, Guo-Kai Ni, Ing-Yi Chen, Erol Gelenbe, Sy-Yen Kuo:
Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks. IEEE Trans. Inf. Forensics Secur. 9(1): 109-124 (2014) - [c17]Chia-Mu Yu, Li-Wei Kang:
Sensor localization via robust principle component analysis. ICCE-TW 2014: 215-216 - 2013
- [j7]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks. IEEE Trans. Inf. Forensics Secur. 8(5): 754-768 (2013) - [c16]Chia-Mu Yu, Guo-Kai Ni, Ing-Yi Chen, Erol Gelenbe, Sy-Yen Kuo:
Top-k query result completeness verification in sensor networks. ICC Workshops 2013: 1026-1030 - 2012
- [j6]Chia-Mu Yu, Sung-Hsien Hsieh, Han-Wen Liang, Chun-Shien Lu, Wei-Ho Chung, Sy-Yen Kuo, Soo-Chang Pei:
Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems. IEEE Commun. Lett. 16(10): 1556-1559 (2012) - [c15]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
CSI: Compressed sensing-based clone identification in sensor networks. PerCom Workshops 2012: 290-295 - [c14]Yu-Shan Liang, Wei-Ho Chung, Chia-Mu Yu, Hongke Zhang, Chung-Hsiu Chung, Chih-Hsiang Ho, Sy-Yen Kuo:
Resource Block Assignment for Interference Avoidance in Femtocell Networks. VTC Fall 2012: 1-5 - [i3]H. T. Kung, Chia-Mu Yu:
Reducing Reconciliation Communication Cost with Compressed Sensing. CoRR abs/1212.2894 (2012) - 2011
- [j5]Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Sy-Yen Kuo:
An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks. Int. J. Sens. Networks 9(2): 89-106 (2011) - [j4]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(2): 241-255 (2011) - [j3]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Constrained Function-Based Message Authentication for Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(2): 407-425 (2011) - [c13]Li-Wei Kang, Chih-Yang Lin, Hung-Wei Chen, Chia-Mu Yu, Chun-Shien Lu, Chao-Yung Hsu, Soo-Chang Pei:
Secure transcoding for compressive multimedia sensing. ICIP 2011: 917-920 - 2010
- [j2]Chia-Mu Yu, Chi-Yuan Chen, Chun-Shien Lu, Sy-Yen Kuo, Han-Chieh Chao:
Acquiring Authentic Data in Unattended Wireless Sensor Networks. Sensors 10(4): 2770-2792 (2010) - [j1]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Noninteractive pairwise key establishment for sensor networks. IEEE Trans. Inf. Forensics Secur. 5(3): 556-569 (2010)
2000 – 2009
- 2009
- [c12]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
A DoS-resilient en-route filtering scheme for sensor networks. MobiHoc 2009: 343-344 - [c11]Chi-Yuan Chen, Yu-Shan Liang, Chia-Mu Yu, Chih-Hsiang Ho, Sy-Yen Kuo:
Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning. PRDC 2009: 282- - [c10]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks. SECON 2009: 1-9 - [c9]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks. VTC Fall 2009 - [c8]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
A constrained function based message authentication scheme for sensor networks. WCNC 2009: 2180-2185 - [i2]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Secure Multidimensional Queries in Tiered Sensor Networks. CoRR abs/0911.4238 (2009) - [i1]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Constrained Function Based En-Route Filtering for Sensor Networks. CoRR abs/0911.4239 (2009) - 2008
- [c7]Chia-Mu Yu, Ting-Yun Chi, Chun-Shien Lu, Sy-Yen Kuo:
A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. MobiHoc 2008: 449-450 - [c6]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Mobile Sensor Network Resilient Against Node Replication Attacks. SECON 2008: 597-599 - 2007
- [c5]Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Der-Tsai Lee, Sy-Yen Kuo:
Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment. ICDCS Workshops 2007: 18 - [c4]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking. ISWCS 2007: 807-808 - 2005
- [c3]Chun-Shien Lu, Chia-Mu Yu:
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks. ICME 2005: 169-172 - [c2]Chia-Mu Yu, Chun-Shien Lu:
Robust non-interactive zero-knowledge watermarking scheme against cheating prover. MM&Sec 2005: 103-110 - [c1]I-Ming Tsai, Chia-Mu Yu, Wei-Ting Tu, Sy-Yen Kuo:
A Secure Quantum Communication Protocol Using Insecure Public Channels. SEC 2005: 113-126
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint