default search action
Ee-Chien Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Han Fang, Yupeng Qiu, Guorui Qin, Jiyi Zhang, Kejiang Chen, Weiming Zhang, Ee-Chien Chang:
DP2Dataset Protection by Data Poisoning. IEEE Trans. Dependable Secur. Comput. 21(2): 636-649 (2024) - [c110]Zhiang Li, Daisuke Mashima, Wen Shei Ong, Ertem Esiner, Zbigniew Kalbarczyk, Ee-Chien Chang:
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers. AsiaCCS 2024 - [c109]Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang:
DISCO: Dynamic Searchable Encryption with Constant State. AsiaCCS 2024 - [c108]Siyuan Liang, Mingli Zhu, Aishan Liu, Baoyuan Wu, Xiaochun Cao, Ee-Chien Chang:
BadCLIP: Dual-Embedding Guided Backdoor Attack on Multimodal Contrastive Learning. CVPR 2024: 24645-24654 - [c107]Han Fang, Kejiang Chen, Yupeng Qiu, Zehua Ma, Weiming Zhang, Ee-Chien Chang:
DERO: Diffusion-Model-Erasure Robust Watermarking. ACM Multimedia 2024: 2973-2981 - [c106]Jiyi Zhang, Han Fang, Ee-Chien Chang:
Finding Input Data Domains of Image Classification Models with Hard-Label Black-Box Access. ACM Multimedia 2024: 11166-11174 - [c105]Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang:
Secret-Shared Shuffle with Malicious Security. NDSS 2024 - [i53]Jiyi Zhang, Han Fang, Ee-Chien Chang:
Domain Bridge: Generative model-based domain forensic for black-box models. CoRR abs/2402.04640 (2024) - [i52]Jiawei Liang, Siyuan Liang, Man Luo, Aishan Liu, Dongchen Han, Ee-Chien Chang, Xiaochun Cao:
VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models. CoRR abs/2402.13851 (2024) - [i51]Xiaoxia Li, Siyuan Liang, Jiyi Zhang, Han Fang, Aishan Liu, Ee-Chien Chang:
Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs. CoRR abs/2402.14872 (2024) - [i50]Zhiang Li, Daisuke Mashima, Wen Shei Ong, Ertem Esiner, Zbigniew Kalbarczyk, Ee-Chien Chang:
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers. CoRR abs/2403.05448 (2024) - [i49]Siyuan Liang, Kuanrong Liu, Jiajun Gong, Jiawei Liang, Yuan Xun, Ee-Chien Chang, Xiaochun Cao:
Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning. CoRR abs/2403.16257 (2024) - [i48]Siyuan Liang, Wei Wang, Ruoyu Chen, Aishan Liu, Boxi Wu, Ee-Chien Chang, Xiaochun Cao, Dacheng Tao:
Object Detectors in the Open Environment: Challenges, Solutions, and Outlook. CoRR abs/2403.16271 (2024) - [i47]Daisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalbarczyk, S. M. Suhail Hussain, Ee-Chien Chang:
Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training. CoRR abs/2404.00869 (2024) - [i46]Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang:
AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models. CoRR abs/2405.04753 (2024) - [i45]Siyuan Liang, Jiawei Liang, Tianyu Pang, Chao Du, Aishan Liu, Ee-Chien Chang, Xiaochun Cao:
Revisiting Backdoor Attacks against Large Vision-Language Models. CoRR abs/2406.18844 (2024) - [i44]Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang:
DISCO: Dynamic Searchable Encryption with Constant State. IACR Cryptol. ePrint Arch. 2024: 950 (2024) - 2023
- [j23]Muhammad M. Roomi, S. M. Suhail Hussain, Daisuke Mashima, Ee-Chien Chang, Taha Selim Ustun:
Analysis of False Data Injection Attacks Against Automated Control for Parallel Generators in IEC 61850-Based Smart Grid Systems. IEEE Syst. J. 17(3): 4603-4614 (2023) - [j22]S. M. Suhail Hussain, Chen Yaohao, Muhammad M. Roomi, Daisuke Mashima, Ee-Chien Chang:
An open-source framework for publishing/subscribing IEC 61850 R-GOOSE and R-SV. SoftwareX 23: 101415 (2023) - [j21]Han Fang, Zhaoyang Jia, Yupeng Qiu, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
De-END: Decoder-Driven Watermarking Network. IEEE Trans. Multim. 25: 7571-7581 (2023) - [c104]Han Fang, Yupeng Qiu, Kejiang Chen, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions. AAAI 2023: 5054-5061 - [c103]Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren:
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. AAAI 2023: 10871-10879 - [c102]Jianli Bai, Xiangfu Song, Xiaowu Zhang, Qifan Wang, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication. ACSAC 2023: 799-813 - [c101]Jiyi Zhang, Han Fang, Wesley Joon-Wie Tann, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers. AsiaCCS 2023: 704-715 - [c100]Daisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalberczyk, S. M. Suhail Hussain, Ee-Chien Chang:
Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training. DSN-S 2023: 49-55 - [c99]Wesley Joon-Wie Tann, Ee-Chien Chang:
Poisoning Online Learning Filters by Shifting on the Move. DSN 2023: 239-251 - [c98]Han Fang, Jiyi Zhang, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. ICCV 2023: 4312-4321 - [c97]S. M. Suhail Hussain, Muhammad M. Roomi, Daisuke Mashima, Ee-Chien Chang:
End-to-End Performance Evaluation of R-SV / R-GOOSE Messages for Wide Area Protection and Control Applications. ISGT 2023: 1-5 - [c96]Han Fang, Kejiang Chen, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Weiming Zhang, Ee-Chien Chang:
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness. ACM Multimedia 2023: 7345-7353 - [i43]Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. CoRR abs/2301.01218 (2023) - [i42]Jiyi Zhang, Han Fang, Hwee Kuan Lee, Ee-Chien Chang:
Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation. CoRR abs/2305.05869 (2023) - [i41]Jiyi Zhang, Han Fang, Ee-Chien Chang:
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks. CoRR abs/2306.01400 (2023) - [i40]Wesley Joon-Wie Tann, Yuancheng Liu, Jun Heng Sim, Choon Meng Seah, Ee-Chien Chang:
Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions. CoRR abs/2308.10443 (2023) - [i39]Jianli Bai, Xiangfu Song, Xiaowu Zhang, Qifan Wang, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Mostree : Malicious Secure Private Decision Tree Evaluation with Sublinear Communication. CoRR abs/2309.17124 (2023) - [i38]Jiayang Liu, Siyu Zhu, Siyuan Liang, Jie Zhang, Han Fang, Weiming Zhang, Ee-Chien Chang:
Improving Adversarial Transferability by Stable Diffusion. CoRR abs/2311.11017 (2023) - [i37]Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang:
Secret-Shared Shuffle with Malicious Security. IACR Cryptol. ePrint Arch. 2023: 1794 (2023) - 2022
- [j20]Sajal Sarkar, Yong Meng Teo, Ee-Chien Chang:
A cybersecurity assessment framework for virtual operational technology in power system automation. Simul. Model. Pract. Theory 117: 102453 (2022) - [j19]Jianting Ning, Geong Sen Poh, Xinyi Huang, Robert H. Deng, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. IEEE Trans. Dependable Secur. Comput. 19(2): 1164-1180 (2022) - [j18]Qin Jiang, Ee-Chien Chang, Yong Qi, Saiyu Qi, Pengfei Wu, Jianfeng Wang:
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX. IEEE Trans. Inf. Forensics Secur. 17: 1053-1068 (2022) - [c95]Sufatrio, Jan Vykopal, Ee-Chien Chang:
Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications. ACE 2022: 114-122 - [c94]Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee:
Confusing and Detecting ML Adversarial Attacks with Injected Attractors. AsiaCCS 2022: 322-336 - [c93]Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Scalable Private Decision Tree Evaluation with Sublinear Communication. AsiaCCS 2022: 843-857 - [c92]Han Fang, Zhaoyang Jia, Zehua Ma, Ee-Chien Chang, Weiming Zhang:
PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. ACM Multimedia 2022: 2267-2275 - [c91]Pengfei Wu, Jianting Ning, Jiamin Shen, Hongbing Wang, Ee-Chien Chang:
Hybrid Trust Multi-party Computation with Trusted Execution Environment. NDSS 2022 - [i36]Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Scalable Private Decision Tree Evaluation with Sublinear Communication. CoRR abs/2205.01284 (2022) - [i35]Han Fang, Zhaoyang Jia, Yupeng Qiu, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
De-END: Decoder-driven Watermarking Network. CoRR abs/2206.13032 (2022) - [i34]Mingyuan Gao, Hung Dang, Ee-Chien Chang, Jialin Li:
Mixed Fault Tolerance Protocols with Trusted Execution Environment. CoRR abs/2208.01946 (2022) - [i33]Wesley Joon-Wie Tann, Akhil Vuputuri, Ee-Chien Chang:
Predicting Non-Fungible Token (NFT) Collections: A Contextual Generative Approach. CoRR abs/2210.15493 (2022) - [i32]Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren:
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. CoRR abs/2212.00612 (2022) - 2021
- [c90]Mingyuan Gao, Hung Dang, Ee-Chien Chang:
TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment. ACSAC 2021: 235-247 - [c89]Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang:
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning. AsiaCCS 2021: 432-446 - [c88]Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang, Hwee Kuan Lee:
Common Component in Black-Boxes Is Prone to Attacks. ESORICS (1) 2021: 584-604 - [c87]Aris Cahyadi Risdianto, Ee-Chien Chang:
OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity Generation. INFOCOM Workshops 2021: 1-3 - [i31]Wesley Joon-Wie Tann, Ee-Chien Chang:
Poisoning of Online Learning Filters: DDoS Attacks and Countermeasures. CoRR abs/2107.12612 (2021) - [i30]Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Users. CoRR abs/2111.15160 (2021) - [i29]Jia Xu, Yiwen Gao, Hoon Wei Lim, Hongbing Wang, Ee-Chien Chang:
Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2021: 989 (2021) - 2020
- [c86]Connie Kou, Hwee Kuan Lee, Ee-Chien Chang, Teck Khim Ng:
Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier. ICLR 2020 - [c85]Jan Vykopal, Valdemar Svábenský, Ee-Chien Chang:
Benefits and Pitfalls of Using Capture the Flag Games in University Courses. SIGCSE 2020: 752-758 - [c84]Muhammad M. Roomi, Partha P. Biswas, Daisuke Mashima, Yuting Fan, Ee-Chien Chang:
False Data Injection Cyber Range of Modernized Substation System. SmartGridComm 2020: 1-7 - [i28]Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee:
Detection and Recovery of Adversarial Attacks with Injected Attractors. CoRR abs/2003.02732 (2020) - [i27]Jan Vykopal, Valdemar Svábenský, Ee-Chien Chang:
Benefits and Pitfalls of Using Capture the Flag Games in University Courses. CoRR abs/2004.11556 (2020) - [i26]Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, Fan Zhang:
Defending Model Inversion and Membership Inference Attacks via Prediction Purification. CoRR abs/2005.03915 (2020) - [i25]Wesley Joon-Wie Tann, Ee-Chien Chang, Bryan Hooi:
SHADOWCAST: Controlling Network Properties to Explain Graph Generation. CoRR abs/2006.03774 (2020) - [i24]Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang:
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning. CoRR abs/2012.06805 (2020)
2010 – 2019
- 2019
- [j17]Jianting Ning, Jia Xu, Kaitai Liang, Fan Zhang, Ee-Chien Chang:
Passive Attacks Against Searchable Encryption. IEEE Trans. Inf. Forensics Secur. 14(3): 789-802 (2019) - [c83]Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, Zhenkai Liang:
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment. CCS 2019: 225-240 - [c82]Jianting Ning, Geong Sen Poh, Jia-Ch'ng Loh, Jason Chia, Ee-Chien Chang:
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules. CCS 2019: 1657-1670 - [c81]Hung Dang, Dat Le Tien, Ee-Chien Chang:
Towards a Marketplace for Secure Outsourced Computations. ESORICS (1) 2019: 790-808 - [c80]Hung Dang, Tien Tuan Anh Dinh, Dumitrel Loghin, Ee-Chien Chang, Qian Lin, Beng Chin Ooi:
Towards Scaling Blockchain Systems via Sharding. SIGMOD Conference 2019: 123-140 - [i23]Ziqi Yang, Ee-Chien Chang, Zhenkai Liang:
Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment. CoRR abs/1902.08552 (2019) - [i22]Hung Dang, Ee-Chien Chang:
Autonomous Membership Service for Enclave Applications. CoRR abs/1905.06460 (2019) - [i21]Connie Kou, Hwee Kuan Lee, Teck Khim Ng, Ee-Chien Chang:
Enhancing Transformation-based Defenses using a Distribution Classifier. CoRR abs/1906.00258 (2019) - [i20]Ziqi Yang, Hung Dang, Ee-Chien Chang:
Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking. CoRR abs/1906.06046 (2019) - [i19]Hung Dang, Ee-Chien Chang:
Self-Expiring Data Capsule using Trusted Execution Environment. CoRR abs/1911.09305 (2019) - 2018
- [c79]Anand Agrawal, Chuadhry Mujeeb Ahmed, Ee-Chien Chang:
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System. AsiaCCS 2018: 821-823 - [c78]Pravein Govindan Kannan, Ahmad Soltani, Mun Choon Chan, Ee-Chien Chang:
BNV: Enabling Scalable Network Experimentation through Bare-metal Network Virtualization. CSET @ USENIX Security Symposium 2018 - [c77]Sajal Sarkar, Anand Agrawal, Yong Meng Teo, Ee-Chien Chang:
Votnet: Hybrid simulation of Virtual Operational Technology Network for Cybersecurity Assessment. WSC 2018: 1168-1179 - [i18]Jiyi Zhang, Hung Dang, Hwee Kuan Lee, Ee-Chien Chang:
Learning Inverse Mappings with Adversarial Criterion. CoRR abs/1802.04504 (2018) - [i17]Hung Dang, Anh Dinh, Ee-Chien Chang, Beng Chin Ooi:
Chain of Trust: Can Trusted Hardware Help Scaling Blockchains? CoRR abs/1804.00399 (2018) - [i16]Hung Dang, Dat Le Tien, Ee-Chien Chang:
Fair Marketplace for Secure Outsourced Computations. CoRR abs/1808.09682 (2018) - [i15]Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang:
Keeping Time-Release Secrets through Smart Contracts. IACR Cryptol. ePrint Arch. 2018: 1166 (2018) - 2017
- [j16]Hung Dang, Tien Tuan Anh Dinh, Ee-Chien Chang, Beng Chin Ooi:
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute. Proc. Priv. Enhancing Technol. 2017(3): 21 (2017) - [c76]Hung Dang, Ee-Chien Chang:
Privacy-Preserving Data Deduplication on Trusted Processors. CLOUD 2017: 66-73 - [c75]Hung Dang, Yue Huang, Ee-Chien Chang:
Evading Classifiers by Morphing in the Dark. CCS 2017: 119-133 - [c74]Hung Dang, Erick Purwanto, Ee-Chien Chang:
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated. AsiaCCS 2017: 408-422 - [c73]Jia Xu, Ee-Chien Chang, Jianying Zhou:
A New Functional Encryption for Multidimensional Range Query (Short Paper). ISPEC 2017: 361-372 - [c72]Pravein Govindan Kannan, Mun Choon Chan, Richard T. B. Ma, Ee-Chien Chang:
Raptor: Scalable rule placement over multiple path in software defined networks. Networking 2017: 1-9 - [c71]Lavanya Ramapantulu, Yong Meng Teo, Ee-Chien Chang:
A conceptural framework to federate testbeds for cybersecurity. WSC 2017: 457-468 - [c70]Teodora Baluta, Lavanya Ramapantulu, Yong Meng Teo, Ee-Chien Chang:
Modeling the effects of insider threats on cybersecurity of complex systems. WSC 2017: 4360-4371 - [i14]Hung Dang, Yue Huang, Ee-Chien Chang:
Evading Classifier in the Dark: Guiding Unpredictable Morphing Using Binary-Output Blackboxes. CoRR abs/1705.07535 (2017) - [i13]Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang:
PermuteRam: Optimizing Oblivious Computation for Efficiency. IACR Cryptol. ePrint Arch. 2017: 885 (2017) - [i12]Jia Xu, Ee-Chien Chang, Jianying Zhou:
A New Functional Encryption for Multidimensional Range Query. IACR Cryptol. ePrint Arch. 2017: 970 (2017) - 2016
- [c69]Paramasiven Appavoo, Mun Choon Chan, Bhojan Anand, Ee-Chien Chang:
Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services. COMSNETS 2016: 1-8 - [c68]Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang:
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation. IH&MMSec 2016: 69-80 - [c67]Minoru Kuribayashi, Ee-Chien Chang, Nobuo Funabiki:
Watermarking with Fixed Decoder for Aesthetic 2D Barcode. IWDW 2016: 379-392 - [c66]Jia Xu, Ee-Chien Chang, Jianying Zhou:
Directed Transitive Signature on Directed Tree. SG-CRC 2016: 91-98 - 2015
- [c65]Hung Dang, Ee-Chien Chang:
PrAd: Enabling Privacy-Aware Location based Advertising. GeoPrivacy@SIGSPATIAL 2015: 1:1-1:8 - [c64]Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, Chunwang Zhang:
M2R: Enabling Stronger Privacy in MapReduce Computation. USENIX Security Symposium 2015: 447-462 - 2014
- [j15]Chengfang Fang, Ee-Chien Chang:
Optimal strategy of coupon subset collection when each package contains half of the coupons. Inf. Process. Lett. 114(12): 703-705 (2014) - [c63]Chunwang Zhang, Ee-Chien Chang:
Processing of Mixed-Sensitivity Video Surveillance Streams on Hybrid Clouds. IEEE CLOUD 2014: 9-16 - [c62]Chunwang Zhang, Ee-Chien Chang, Roland H. C. Yap:
Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds. CCGRID 2014: 31-40 - [c61]Chengfang Fang, Ee-Chien Chang:
Differential privacy with δ-neighbourhood for spatial and dynamic datasets. AsiaCCS 2014: 159-170 - [c60]Chengfang Fang, Chunwang Zhang, Ee-Chien Chang:
An Optimization Model for Aesthetic Two-Dimensional Barcodes. MMM (1) 2014: 278-290 - [i11]Hoon Wei Lim, Shruti Tople, Prateek Saxena, Ee-Chien Chang:
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2014: 539 (2014) - 2013
- [c59]Jia Xu, Ee-Chien Chang, Jianying Zhou:
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. AsiaCCS 2013: 195-206 - [c58]Chunwang Zhang, Ee-Chien Chang, Roland H. C. Yap:
Towards a general framework for secure MapReduce computation on hybrid clouds. SoCC 2013: 36:1-36:2 - 2012
- [c57]Mamadou H. Diallo, Bijit Hore, Ee-Chien Chang, Sharad Mehrotra, Nalini Venkatasubramanian:
CloudProtect: Managing Data Privacy in Cloud Applications. IEEE CLOUD 2012: 303-310 - [c56]Jia Xu, Ee-Chien Chang:
Towards efficient proofs of retrievability. AsiaCCS 2012: 79-80 - [c55]Bhojan Anand, Lee Kee Chong, Ee-Chien Chang, Mun Choon Chan, Akkihebbal L. Ananda, Wei Tsang Ooi:
El-pincel: a painter cloud service for greener web pages. ACM Multimedia 2012: 399-408 - [c54]Chengfang Fang, Ee-Chien Chang:
Adaptive Differentially Private Histogram of Low-Dimensional Data. Privacy Enhancing Technologies 2012: 160-179 - [c53]Bijit Hore, Ee-Chien Chang, Mamadou H. Diallo, Sharad Mehrotra:
Indexing Encrypted Documents for Supporting Efficient Keyword Search. Secure Data Management 2012: 93-110 - [c52]Chunwang Zhang, Junjie Jin, Ee-Chien Chang, Sharad Mehrotra:
Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services. Secure Data Management 2012: 111-129 - 2011
- [j14]Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu, Ee-Chien Chang:
ID Repetition in Structured P2P Networks. Comput. J. 54(6): 962-975 (2011) - [j13]Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing host security using external environment sensors. Int. J. Inf. Sec. 10(5): 285-299 (2011) - [c51]Chengfang Fang, Qiming Li, Ee-Chien Chang:
Identity leakage mitigation on asymmetric secure sketch. IJCB 2011: 1-6 - [c50]Qiming Li, Bilgehan Sahin, Ee-Chien Chang, Vrizlynn L. L. Thing:
Content based JPEG fragmentation point detection. ICME 2011: 1-6 - [i10]Chengfang Fang, Ee-Chien Chang:
Publishing Location Dataset Differential Privately with Isotonic Regression. CoRR abs/1111.6677 (2011) - [i9]Jia Xu, Ee-Chien Chang:
Practically Efficient Proof of Retrievability in Cloud Storage. IACR Cryptol. ePrint Arch. 2011: 362 (2011) - [i8]Jia Xu, Ee-Chien Chang:
Towards Efficient Provable Data Possession. IACR Cryptol. ePrint Arch. 2011: 574 (2011) - 2010
- [j12]Vrizlynn L. L. Thing, Kian-Yong Ng, Ee-Chien Chang:
Live memory forensics of mobile phones. Digit. Investig. 7(Supplement): S74-S82 (2010) - [c49]Chengfang Fang, Qiming Li, Ee-Chien Chang:
Secure Sketch for Multiple Secrets. ACNS 2010: 367-383 - [c48]Chengfang Fang, Ee-Chien Chang:
Securing interactive sessions using mobile device through visual channel and visual inspection. ACSAC 2010: 69-78 - [c47]Fai Cheong Choo, Mun Choon Chan, Ee-Chien Chang:
Robustness of DTN against routing attacks. COMSNETS 2010: 1-10 - [c46]Ee-Chien Chang, Chengfang Fang, Jia Xu:
A chameleon encryption scheme resistant to known-plaintext attack. Digital Rights Management Workshop 2010: 25-34 - [c45]Liming Lu, Ee-Chien Chang, Mun Choon Chan:
Website Fingerprinting and Identification Using Ordered Feature Sequences. ESORICS 2010: 199-214 - [c44]Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing Host Security Using External Environment Sensors. SecureComm 2010: 362-379 - [i7]Chengfang Fang, Ee-Chien Chang:
Securing Kiosk using Mobile Devices coupled with Visual Inspection. CoRR abs/1003.0723 (2010) - [i6]Jia Xu, Ee-Chien Chang:
Authenticating Aggregate Range Queries over Multidimensional Dataset. IACR Cryptol. ePrint Arch. 2010: 50 (2010)
2000 – 2009
- 2009
- [j11]Hang Yu, Ee-Chien Chang, Wei Tsang Ooi, Mun Choon Chan, Wei Cheng:
Integrated Optimization of Video Server Resource and Streaming Quality Over Best-Effort Network. IEEE Trans. Circuits Syst. Video Technol. 19(3): 374-385 (2009) - [c43]Ee-Chien Chang, Chee Liang Lim, Jia Xu:
Short Redactable Signatures Using Random Trees. CT-RSA 2009: 133-147 - [c42]Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, Zhoujun Li:
ID Repetition in Kad. Peer-to-Peer Computing 2009: 111-120 - [i5]Ee-Chien Chang, Chee Liang Lim, Jia Xu:
Short Redactable Signatures Using Random Trees. IACR Cryptol. ePrint Arch. 2009: 25 (2009) - 2008
- [c41]Liming Lu, Mun Choon Chan, Ee-Chien Chang:
A general model of probabilistic packet marking for IP traceback. AsiaCCS 2008: 179-188 - [c40]Qiming Li, Muchuan Guo, Ee-Chien Chang:
Fuzzy extractors for asymmetric biometric representations. CVPR Workshops 2008: 1-6 - [c39]Ee-Chien Chang, Jia Xu:
Remote Integrity Check with Dishonest Storage Server. ESORICS 2008: 223-237 - [c38]Chengfang Fang, Ee-Chien Chang:
Information Leakage in Optimal Anonymized and Diversified Data. Information Hiding 2008: 30-44 - [c37]Nicholas Zhong-Yang Ho, Ee-Chien Chang:
Residual Information of Redacted Images Hidden in the Compression Artifacts. Information Hiding 2008: 87-101 - [i4]Ee-Chien Chang, Jia Xu:
Remote Integrity Check with Dishonest Storage Server. IACR Cryptol. ePrint Arch. 2008: 346 (2008) - [i3]Chengfang Fang, Ee-Chien Chang:
Information Leakage in Optimal Anonymized and Diversified Data. IACR Cryptol. ePrint Arch. 2008: 347 (2008) - 2007
- [j10]Shuiming Ye, Qibin Sun, Ee-Chien Chang:
Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. Trans. Data Hiding Multim. Secur. 2: 48-67 (2007) - [c36]Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay:
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. ACNS 2007: 385-400 - [c35]Ee-Chien Chang, Sujoy Roy:
Robust Extraction of Secret Bits from Minutiae. ICB 2007: 750-759 - [c34]Shuiming Ye, Qibin Sun, Ee-Chien Chang:
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact. ICME 2007: 12-15 - 2006
- [j9]Ee-Chien Chang, Sung Woo Choi, DoYong Kwon, Hyungju Park, Chee-Keng Yap:
Shortest Path amidst Disc Obstacles Is Computable. Int. J. Comput. Geom. Appl. 16(5-6): 567-590 (2006) - [c33]Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam:
Effect of Malicious Synchronization. ACNS 2006: 114-129 - [c32]Ee-Chien Chang, Ren Shen, Francis Weijian Teo:
Finding the original point set hidden among chaff. AsiaCCS 2006: 182-188 - [c31]Ee-Chien Chang, Qiming Li:
Hiding Secret Points Amidst Chaff. EUROCRYPT 2006: 59-72 - [c30]Chen Chen, Zhiyong Huang, Hang Yu, Ee-Chien Chang:
Progressive transmission and rendering of foveated volume data. GRAPP 2006: 67-75 - [c29]Shuiming Ye, Qibin Sun, Ee-Chien Chang:
Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. IWDW 2006: 461-472 - [c28]Qiming Li, Ee-Chien Chang:
Robust, short and sensitive authentication tags using secure sketch. MM&Sec 2006: 56-61 - [c27]Qiming Li, Ee-Chien Chang:
Zero-knowledge watermark detection resistant to ambiguity attacks. MM&Sec 2006: 158-163 - [i2]Ee-Chien Chang, Vadym Fedyukovych, Qiming Li:
Secure Sketch for Multi-Sets. IACR Cryptol. ePrint Arch. 2006: 90 (2006) - 2005
- [j8]Hang Yu, Ee-Chien Chang, Zhiyong Huang, Zhijian Zheng:
Fast rendering of foveated volumes in wavelet-based representation. Vis. Comput. 21(8-10): 735-744 (2005) - [c26]Ee-Chien Chang, Sung Woo Choi, DoYong Kwon, Hyungju Park, Chee-Keng Yap:
Shortest path amidst disc obstacles is computable. SCG 2005: 116-125 - [c25]Shuiming Ye, Ee-Chien Chang, Qibin Sun:
Watermarking based Image Authentication using Feature Amplification. ICME 2005: 610-613 - [c24]Hui Huang Lee, Ee-Chien Chang, Mun Choon Chan:
Pervasive Random Beacon in the Internet for Covert Coordination. Information Hiding 2005: 53-61 - [c23]Qiming Li, Ee-Chien Chang, Mun Choon Chan:
On the effectiveness of DDoS attacks on statistical filtering. INFOCOM 2005: 1373-1383 - [c22]Shuiming Ye, Qibin Sun, Ee-Chien Chang:
Error resilient content-based image authentication over wireless channel. ISCAS (3) 2005: 2707-2710 - [c21]Sujoy Roy, Ee-Chien Chang, K. Natarajan:
A unified framework for resolving ambiguity in copy detection. ACM Multimedia 2005: 648-655 - [c20]Zhicheng Zhou, Dajun He, Qibin Sun, Ee-Chien Chang:
A New Watermarking Scheme Robust to Print-and-Scan. MMSP 2005: 1-4 - [i1]Ee-Chien Chang, Qiming Li:
Small Secure Sketch for Point-Set Difference. IACR Cryptol. ePrint Arch. 2005: 145 (2005) - 2004
- [j7]Sujoy Roy, Ee-Chien Chang:
Watermarking with retrieval systems. Multim. Syst. 9(5): 433-440 (2004) - [c19]Shuiming Ye, Qibin Sun, Ee-Chien Chang:
Edge directed filter based error concealment for wavelet-based images. ICIP 2004: 809-812 - [c18]Sujoy Roy, Ee-Chien Chang:
Watermarking color histograms. ICIP 2004: 2191-2194 - [c17]Hang Yu, Vu-Thanh Nguyen, Ee-Chien Chang:
Rotation of foveated image in the wavelet domain. ICIP 2004: 2515-2518 - [c16]Vu-Thanh Nguyen, Ee-Chien Chang, Wei Tsang Ooi:
Layered coding with good allocation outperforms multiple description coding over multiple paths. ICME 2004: 1067-1070 - [c15]Shuiming Ye, Qibin Sun, Ee-Chien Chang:
Error concealment for JPEG2000 images based on orthogonal edge directed filters. ICME 2004: 1663-1666 - [c14]Qiming Li, Ee-Chien Chang:
On the Possibility of Non-invertible Watermarking Schemes. Information Hiding 2004: 13-24 - [c13]Xianfeng Yang, Qi Tian, Ee-Chien Chang:
A color fingerprint of video shot for content identification. ACM Multimedia 2004: 276-279 - [c12]Pradeep K. Atrey, Wei-Qi Yan, Ee-Chien Chang, Mohan S. Kankanhalli:
A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing. MMM 2004: 330-337 - [c11]Hang Yu, Ee-Chien Chang, Zhiyong Huang, Zhijian Zheng:
Fast Rendering of Foveated Volume in the Wavelet Domain. IEEE Visualization 2004: 26 - 2003
- [j6]Ee-Chien Chang, Mohan S. Kankanhalli, Xin Guan, Zhiyong Huang, Yinghui Wu:
Robust image authentication using content based compression. Multim. Syst. 9(2): 121-130 (2003) - [j5]Ee-Chien Chang, Chee-Keng Yap:
Competitive On-Line Scheduling with Level of Service. J. Sched. 6(3): 251-267 (2003) - [c10]Yinghui Wu, Ee-Chien Chang, Zhiyong Huang, Mohan S. Kankanhalli:
Feature extraction of volume data based on multi-scale representation. GRAPHITE 2003: 175-180 - [c9]Ee-Chien Chang, Zhiyong Huang, Mohan S. Kankanhalli, Rong Xu:
A 3D shape matching framework. GRAPHITE 2003: 269-270 - [c8]Sujoy Roy, Ee-Chien Chang:
Watermarking with knowledge of image database. ICIP (2) 2003: 471-474 - [c7]Qiming Li, Ee-Chien Chang:
Public Watermark Detection Using Multiple Proxies and Secret Sharing. IWDW 2003: 558-569 - [c6]Hang Yu, Ee-Chien Chang:
Distributed multivariate regression based on influential observations. KDD 2003: 679-684 - 2002
- [c5]Qiming Li, Ee-Chien Chang:
Security of Public Watermarking Schemes for Binary Sequences. Information Hiding 2002: 119-128 - 2001
- [j4]Harold S. Stone, Michael T. Orchard, Ee-Chien Chang, Stephen A. Martucci:
A fast direct Fourier-based algorithm for subpixel registration of images. IEEE Trans. Geosci. Remote. Sens. 39(10): 2235-2243 (2001) - [c4]Ee-Chien Chang, Chee-Keng Yap:
Competitive Online Scheduling with Level of Service. COCOON 2001: 453-462 - [c3]Mohan S. Kankanhalli, Ee-Chien Chang, Xin Guan, Zhiyong Huang, Yinghui Wu:
Authentication of Volume Data Using Wavelet-Based Foveation. Eurographics Multimedia Workshop 2001: 119-130 - 2000
- [j3]Ee-Chien Chang, Chee-Keng Yap:
A Simultaneous Search Problem. Algorithmica 26(2): 255-262 (2000) - [c2]Ee-Chien Chang, Michael T. Orchard:
Geometric Properties of Watermarking Schemes. ICIP 2000: 714-717
1990 – 1999
- 1998
- [b1]Ee-Chien Chang:
Foveation Techniques and Scheduling Issues in Thinwire Visualization. New York University, USA, 1998 - 1997
- [c1]Ee-Chien Chang, Chee-Keng Yap:
A Wavelet Approach to Foveating Images. SCG 1997: 397-399 - 1995
- [j2]Ee-Chien Chang, Chee-Keng Yap:
A Note on Improved Deterministic Time Simulation of Nondeterministic Space for Small Space. Inf. Process. Lett. 55(3): 155-157 (1995) - 1993
- [j1]Ee-Chien Chang, Weiguo Wang, Mohan S. Kankanhalli:
Multidimensional On-Line Bin-Packing: An Algorithm and its Average-Case Analysis. Inf. Process. Lett. 48(3): 121-125 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint