Albert B. Jeng
According to our database1,
Albert B. Jeng
authored at least 29 papers
between 1981 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Soft Comput., 2019
2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
2015
DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
2013
DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2013
Proceedings of the Recent Trends in Applied Artificial Intelligence, 2013
Larbac: enforcement of location constraints for location-aware RBAC system in mobile environment.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3<sup>rd</sup> Party Human Attack.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012
2011
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011
2010
The Radio Frequency Identification tag with the function of anti-collision and anti-counterfeiting.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
Exploring better parameter set for singular value decomposition (SVD) hashing function used in image authentication.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010
2008
A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol.
IEICE Trans. Inf. Syst., 2008
2005
Appl. Math. Comput., 2005
1997
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults.
Proceedings of the Security Protocols, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1987
Network security: Protocol reference model and the trusted computer system evaluation criteria.
IEEE Netw., 1987
1983
An All-In-One C3I Local Area Network.
Proceedings of the Proceedings IEEE INFOCOM 83, San Diego, CA, USA, April 18-21, 1983, 1983
1981
IEEE Trans. Computers, 1981