Pau-Chen Cheng

Orcid: 0009-0001-8234-2260

According to our database1, Pau-Chen Cheng authored at least 28 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Intel TDX Demystified: A Top-Down Approach.
ACM Comput. Surv., September, 2024

DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy Aggregation.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

2021
Separation of Powers in Federated Learning.
CoRR, 2021

Separation of Powers in Federated Learning (Poster Paper).
Proceedings of the ResilientFL '21: Proceedings of the First Workshop on Systems Challenges in Reliable and Secure Federated Learning, 2021

2019
Counting Devices: Revisiting Existing Approaches in Today's Settings.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016

2012
Learning Stochastic Models of Information Flow.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Risk-based security decisions under uncertainty.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
An experimental study on the measurement of data sensitivity.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Learning based access control in online social networks.
Proceedings of the 19th International Conference on World Wide Web, 2010

Risk based Access Control with Uncertain and Time-dependent Sensitivity.
Proceedings of the SECRYPT 2010, 2010

User Centric Policy Management in Online Social Networks.
Proceedings of the POLICY 2010, 2010

Modelling Uncertain and Time-Dependent Security Labels in MLS Systems.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

2009
Risk profiles and distributed risk assessment.
Comput. Secur., 2009

2008
Policy Evolution with Grammatical Evolution.
Proceedings of the Simulated Evolution and Learning, 7th International Conference, 2008

Trading in risk: using markets to improve access control.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

MLS security policy evolution with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Policy evolution with Genetic Programming: A comparison of three approaches.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

2007
Improving the resilience of content distribution networks to large scale distributed denial of service attacks.
Comput. Networks, 2007

Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2005
Protecting content distribution networks from denial of service attacks.
Proceedings of IEEE International Conference on Communications, 2005

2003
BlueBoX: A policy-driven, host-based intrusion detection system.
ACM Trans. Inf. Syst. Secur., 2003

2001
An architecture for the Internet Key Exchange Protocol.
IBM Syst. J., 2001

2000
An IPSec-based Host Architecture for Secure Internet Multicast.
Proceedings of the Network and Distributed System Security Symposium, 2000

1998
A Security Architecture for the Internet Protocol.
IBM Syst. J., 1998

1995
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Proceedings of the 5th USENIX Security Symposium, 1995

Securing the Internet (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

1990
On the Formal Specification and Verification of a Multiparty Session Protocol.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990


  Loading...