Chia-Mu Yu
Orcid: 0000-0002-1677-2131
According to our database1,
Chia-Mu Yu
authored at least 114 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Intell. Syst., 2024
Information-Theoretical Principled Trade-off between Jailbreakability and Stealthiness on Vision Language Models.
CoRR, 2024
CoRR, 2024
Defending Against Repetitive-based Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off.
CoRR, 2024
Safe LoRA: the Silver Lining of Reducing Safety Risks when Fine-tuning Large Language Models.
CoRR, 2024
DiffuseKronA: A Parameter Efficient Fine-tuning Method for Personalized Diffusion Models.
CoRR, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
IEEE Syst. J., December, 2023
IEEE Internet Things J., September, 2023
Guest Editorial of the Special Section on Consumer Electronics With Artificial Intelligence.
IEEE Trans. Consumer Electron., August, 2023
On the Private Data Synthesis Through Deep Generative Models for Data Scarcity of Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023
CoRR, 2023
Exploring the Benefits of Differentially Private Pre-training and Parameter-Efficient Fine-tuning for Table Transformers.
CoRR, 2023
CoRR, 2023
Local Differential Privacy Protocol for Making Key-Value Data Robust Against Poisoning Attacks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Certified Robustness of Quantum Classifiers Against Adversarial Examples Through Quantum Noise.
Proceedings of the IEEE International Conference on Acoustics, 2023
Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy.
Proceedings of the Advanced Information Networking and Applications, 2023
2022
IEICE Trans. Inf. Syst., August, 2022
Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge.
ACM J. Data Inf. Qual., 2022
IEEE Internet Things J., 2022
DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy.
IEEE Access, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
DPGEN: Differentially Private Generative Energy-Guided Network for Natural Image Synthesis.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems.
ACM Trans. Cyber Phys. Syst., 2021
(k, ε , δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy.
Serv. Oriented Comput. Appl., 2021
DPCrowd: Privacy-Preserving and Communication-Efficient Decentralized Statistical Estimation for Real-Time Crowdsourced Data.
IEEE Internet Things J., 2021
Future Gener. Comput. Syst., 2021
Formalizing Generalization and Robustness of Neural Networks to Weight Perturbations.
CoRR, 2021
Formalizing Generalization and Adversarial Robustness of Neural Networks to Weight Perturbations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation With Manipulable Semantics.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
2020
IEEE Trans. Cloud Comput., 2020
DPCrowd: Privacy-preserving and Communication-efficient Decentralized Statistical Estimation for Real-time Crowd-sourced Data.
CoRR, 2020
Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications.
IEEE Access, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Detecting Deepfake-Forged Contents with Separable Convolutional Neural Network and Image Segmentation.
CoRR, 2019
Empirical Evaluation on Synthetic Data Generation with Generative Adversarial Network.
Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, 2019
Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
On the Limitation of MagNet Defense against L<sub>1</sub>-based Adversarial Examples.
CoRR, 2018
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples.
Proceedings of the 6th International Conference on Learning Representations, 2018
On the Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
2017
IEEE Syst. J., 2017
R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections.
CoRR, 2017
Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems.
Comput. Networks, 2017
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2017
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
POSTER: A Unified Framework of Differentially Private Synthetic Data Release with Generative Adversarial Network.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
IEEE Trans. Wirel. Commun., 2016
XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
IEEE Netw., 2015
Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks.
IEEE Commun. Mag., 2015
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2014
2013
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the IEEE International Conference on Communications, 2013
2012
IEEE Commun. Lett., 2012
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
IEEE Trans. Inf. Forensics Secur., 2011
An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks.
Int. J. Sens. Networks, 2011
Proceedings of the 18th IEEE International Conference on Image Processing, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009
Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009
2008
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008
2007
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007
Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007
2005
A Secure Quantum Communication Protocol Using Insecure Public Channels.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the 7th workshop on Multimedia & Security, 2005
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005