2025
Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues.
CoRR, January, 2025
From Scientific Texts to Verifiable Code: Automating the Process with Transformers.
CoRR, January, 2025
Deriving Coding-Specific Sub-Models from LLMs using Resource-Efficient Pruning.
CoRR, January, 2025
2024
NetConfEval: Can LLMs Facilitate Network Configuration?
Proc. ACM Netw., 2024
Design of polyphase sequence sets with good correlation properties under spectral distortion via majorization-minimization framework.
Digit. Signal Process., 2024
2023
Making Network Configuration Human Friendly.
CoRR, 2023
2021
Multimodal adaptive identity-recognition algorithm fused with gait perception.
Big Data Min. Anal., 2021
2011
An interoperable security framework for connected healthcare.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
DRM system for multiple cascaded business operators.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010
2006
Anonymity and Security Support for Persistent Enterprise Conversation.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006
2005
Use of cryptographic technologies for privacy protection of watermarks in internet retails of digital contents.
Int. J. High Perform. Comput. Netw., 2005
Anonymity and Security in Public Internet Forums.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005
<i>t</i>-Out-of-<i>n</i> String/Bit Oblivious Transfers Revisited.
Proceedings of the Information Security Practice and Experience, 2005
Mobile Agents for Secure Electronic Commerce Transactions with Privacy Protection of the Customers.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
A Private and Efficient Mobile Payment Protocol.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
A secure voter-resolved approval voting protocol over internet.
Proceedings of the 7th International Conference on Electronic Commerce, 2005
Supporting the legal identities of contracting agents with an agent authorization platform.
Proceedings of the 7th International Conference on Electronic Commerce, 2005
2004
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
Proceedings of the Information Security, 7th International Conference, 2004
Anonymity and Security in Continuous Double Auctions for Internet Retails Market.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
A Commutative Encrypted Protocol for the Privacy Protection of Watermarks in Digital Contents.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Publicly Verifiable Auctions with Minimal Leakage.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
A Secure and Fully Private Borda Voting Protocol with Universal Verifiability.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
A secure and private clarke tax voting protocol without trusted authorities.
Proceedings of the 6th International Conference on Electronic Commerce, 2004
2003
Secure Web Transaction with Anonymous Mobile Agent over Internet.
J. Comput. Sci. Technol., 2003
Secure Double Auction Protocols with Full Privacy Protection.
Proceedings of the Information Security and Cryptology, 2003
An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
2002
Fair Electronic Cash Based on Double Signatur.
J. Comput. Sci. Technol., 2002
An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet.
Informatica (Slovenia), 2002
SAWT: A New System for Secure and Anonymous Web Transactions over the Internet.
J. Res. Pract. Inf. Technol., 2002