Chun-Ying Huang

Orcid: 0000-0001-5503-9541

According to our database1, Chun-Ying Huang authored at least 94 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2005
2010
2015
2020
2025
0
5
10
1
1
1
3
3
3
2
1
5
5
4
1
1
2
2
1
9
1
1
1
1
1
2
3
3
6
5
3
2
2
1
1
2
9
5

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
BADTV: Unveiling Backdoor Threats in Third-Party Task Vectors.
CoRR, January, 2025

2024
Safe LoRA: the Silver Lining of Reducing Safety Risks when Fine-tuning Large Language Models.
CoRR, 2024

Deepfake Detection through Temporal Attention.
Proceedings of the 33rd Wireless and Optical Communications Conference, 2024

Safe LoRA: The Silver Lining of Reducing Safety Risks when Finetuning Large Language Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Mitigating Privacy Threats Without Degrading Visual Quality of VR Applications: Using Re-Identification Attack as a Case Study.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024

Will Neural 3D Object Representations be the Silver Bullet for Improving VR Experience in HMDs?
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024

Ring-A-Bell! How Reliable are Concept Removal Methods For Diffusion Models?
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Multi-frame Bitrate Allocation of Dynamic 3D Gaussian Splatting Streaming Over Dynamic Networks.
Proceedings of the 2024 SIGCOMM Workshop on Emerging Multimedia Systems, 2024

CmdCaliper: A Semantic-Aware Command-Line Embedding Model and Dataset for Security Research.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the Hypervisor.
Proceedings of the 2024 on Cloud Computing Security Workshop, 2024

2023
Guided Malware Sample Analysis Based on Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?
CoRR, 2023

DPAF: Image Synthesis via Differentially Private Aggregation in Forward Phase.
CoRR, 2023

A Dynamic 3D Point Cloud Dataset for Immersive Applications.
Proceedings of the 14th Conference on ACM Multimedia Systems, 2023

2022
DPView: Differentially Private Data Synthesis Through Domain Size Information.
IEEE Internet Things J., 2022

Measuring Objective Visual Quality of Real-Time Communication Systems in the Wild.
Int. J. Semantic Comput., 2022

Building Machine Learning-based Threat Hunting System from Scratch.
DTRAP, 2022

Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
On the Performance Comparisons of Native and Clientless Real-Time Screen-Sharing Technologies.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Privacy Leakage and Protection of InputConnection Interface in Android.
IEEE Trans. Netw. Serv. Manag., 2021

On the Optimal Encoding Ladder of Tiled 360° Videos for Head-Mounted Virtual Reality.
IEEE Trans. Circuits Syst. Video Technol., 2021

Measuring Objective Visual Quality of Real-time Communication Systems in the Wild.
Proceedings of the Seventh IEEE International Conference on Multimedia Big Data, 2021

2020
Optimizing Fixation Prediction Using Recurrent Neural Networks for 360$^{\circ }$ Video Streaming in Head-Mounted Virtual Reality.
IEEE Trans. Multim., 2020

An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds.
CoRR, 2020

POSTER: Construct macOS Cyber Range for Red/Blue Teams.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Boosting Fuzzing Performance with Differential Seed Scheduling.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Best Papers of the ACM Multimedia Systems (MMSys) Conference 2017 and the ACM Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) 2017.
ACM Trans. Multim. Comput. Commun. Appl., 2018

Scenario-Based Microservice Retrieval Using Word2Vec.
Proceedings of the 15th IEEE International Conference on e-Business Engineering, 2018

Design and Implement Binary Fuzzing Based on Libfuzzer.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Cloud gaming.
Proceedings of the Frontiers of Multimedia Research, 2018

2017
Fixation Prediction for 360° Video Streaming in Head-Mounted Virtual Reality.
Proceedings of the 27th Workshop on Network and Operating Systems Support for Digital Audio and Video, 2017

360° Video Viewing Dataset in Head-Mounted Virtual Reality.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017

Is Foveated Rendering Perceivable in Virtual Reality?: Exploring the Efficiency and Consistency of Quality Assessment Methods.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

2016
Toward an Adaptive Screencast Platform: Measurement and Optimization.
ACM Trans. Multim. Comput. Commun. Appl., 2016

The Future of Cloud Gaming [Point of View].
Proc. IEEE, 2016

High performance traffic classification based on message size sequence and distribution.
J. Netw. Comput. Appl., 2016

Decapitation via digital epidemics: a bio-inspired transmissive attack.
IEEE Commun. Mag., 2016

A Survey on Cloud Gaming: Future of Computer Games.
IEEE Access, 2016

Towards Ultra-Low-Bitrate Video Conferencing Using Facial Landmarks.
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016

Smart Beholder: An Extensible Smart Lens Platform.
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016

Effects of Online Peer Feedback on Dancers at Different Levels.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

2015
Enabling Adaptive Cloud Gaming in an Open-Source Cloud Gaming Platform.
IEEE Trans. Circuits Syst. Video Technol., 2015

Placing Virtual Machines to Optimize Cloud Gaming Experience.
IEEE Trans. Cloud Comput., 2015

Stateful traffic replay for web application proxies.
Secur. Commun. Networks, 2015

An integrated DEA-MODM methodology for portfolio optimization.
Oper. Res., 2015

Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled.
J. Inf. Sci. Eng., 2015

Low power algorithm-architecture co-design of fast Independent Component Analysis (FICA) for multi-gas sensor applications.
Proceedings of the VLSI Design, Automation and Test, 2015

Energy-efficient gas recognition system with event-driven power control.
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015

Code Coverage Measurement for Android Dynamic Analysis Tools.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

To Cloud or Not to Cloud: Measuring the Performance of Mobile Gaming.
Proceedings of the 2nd Workshop on Mobile Gaming, MobiGames@MobiSys 2015, Florence, Italy, 2015

Screencast dissected: performance measurements and design considerations.
Proceedings of the 6th ACM Multimedia Systems Conference, 2015

Smart Beholder: An Open-Source Smart Lens for Mobile Photography.
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015

2014
GamingAnywhere: The first open source cloud gaming system.
ACM Trans. Multim. Comput. Commun. Appl., 2014

On the Quality of Service of Cloud Gaming Systems.
IEEE Trans. Multim., 2014

Behavior-based botnet detection in parallel.
Secur. Commun. Networks, 2014

Mobile Application Security.
Computer, 2014

Measuring the client performance and energy consumption in mobile cloud gaming.
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014

GPU consolidation for cloud games: Are we there yet?
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014

Quantifying User Satisfaction in Mobile Cloud Games.
Proceedings of the 6th ACM Mobile Video Workshop, MoVid 2014, Singapore, 2014

Screencast in the Wild: Performance and Limitations.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Cloud gaming onward: research opportunities and outlook.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014

2013
Effective bot host detection based on network failure models.
Comput. Networks, 2013

QoE-Aware Virtual Machine Placement for Cloud Games.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

GamingAnywhere: an open cloud gaming system.
Proceedings of the Multimedia Systems Conference 2013, 2013

GamingAnywhere: an open-source cloud gaming testbed.
Proceedings of the ACM Multimedia Conference, 2013

2012
Session level flow classification by packet size distribution and session grouping.
Comput. Networks, 2012

2011
Using one-time passwords to prevent password phishing attacks.
J. Netw. Comput. Appl., 2011

A fuzzy pattern-based filtering algorithm for botnet detection.
Comput. Networks, 2011

Measuring the latency of cloud gaming systems.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Semantic web service discovery based on business rule annotation.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

2010
Fast-Flux Bot Detection in Real Time.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Optimal service selection for composition based on weighted service flow and Genetic Algorithm.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009

2008
Heuristic algorithms to solve the capacity allocation problem in photolithography area (CAPPA).
OR Spectr., 2008

Capacity pricing mechanism for wafer fabrication.
Comput. Ind. Eng., 2008

A MIP model for IC final testing order selection problem.
Proceedings of the 2008 International Conference on Modeling, 2008

2007
Secure multicast in dynamic environments.
Comput. Networks, 2007

Design and Implementation of Secure Communication Channels over UPnP Networks.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Bounding Peer-to-Peer Upload Traffic in Client Networks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Quantifying Skype user satisfaction.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

On the Sensitivity of Online Game Playing Time to Network QoS.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

The Impact of Network Variabilities on TCP Clocking Schemes.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Confessible Threshold Ring Signatures.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area.
Proceedings of the Computational Science and Its Applications, 2006

Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

A distributed key assignment protocol for secure multicast based on proxy cryptography.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

An empirical evaluation of TCP performance in online games.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2006

2005
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Game traffic analysis: an MMORPG perspective.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005

Secure Content Delivery using Key Composition.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Secure Multicast Using Proxy Encryption.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs.
Proceedings of the High Performance Computing, 2005


  Loading...