Chun-Ying Huang
Orcid: 0000-0001-5503-9541
According to our database1,
Chun-Ying Huang
authored at least 94 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
5
10
1
1
1
3
3
3
2
1
5
5
4
1
1
2
2
1
9
1
1
1
1
1
2
3
3
6
5
3
2
2
1
1
2
9
5
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
2024
Safe LoRA: the Silver Lining of Reducing Safety Risks when Fine-tuning Large Language Models.
CoRR, 2024
Proceedings of the 33rd Wireless and Optical Communications Conference, 2024
Safe LoRA: The Silver Lining of Reducing Safety Risks when Finetuning Large Language Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Mitigating Privacy Threats Without Degrading Visual Quality of VR Applications: Using Re-Identification Attack as a Case Study.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024
Will Neural 3D Object Representations be the Silver Bullet for Improving VR Experience in HMDs?
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Multi-frame Bitrate Allocation of Dynamic 3D Gaussian Splatting Streaming Over Dynamic Networks.
Proceedings of the 2024 SIGCOMM Workshop on Emerging Multimedia Systems, 2024
CmdCaliper: A Semantic-Aware Command-Line Embedding Model and Dataset for Security Research.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the Hypervisor.
Proceedings of the 2024 on Cloud Computing Security Workshop, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
CoRR, 2023
CoRR, 2023
Proceedings of the 14th Conference on ACM Multimedia Systems, 2023
2022
IEEE Internet Things J., 2022
Int. J. Semantic Comput., 2022
Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
On the Performance Comparisons of Native and Clientless Real-Time Screen-Sharing Technologies.
ACM Trans. Multim. Comput. Commun. Appl., 2021
IEEE Trans. Netw. Serv. Manag., 2021
On the Optimal Encoding Ladder of Tiled 360° Videos for Head-Mounted Virtual Reality.
IEEE Trans. Circuits Syst. Video Technol., 2021
Proceedings of the Seventh IEEE International Conference on Multimedia Big Data, 2021
2020
Optimizing Fixation Prediction Using Recurrent Neural Networks for 360$^{\circ }$ Video Streaming in Head-Mounted Virtual Reality.
IEEE Trans. Multim., 2020
CoRR, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
Best Papers of the ACM Multimedia Systems (MMSys) Conference 2017 and the ACM Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) 2017.
ACM Trans. Multim. Comput. Commun. Appl., 2018
Proceedings of the 15th IEEE International Conference on e-Business Engineering, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
Proceedings of the 27th Workshop on Network and Operating Systems Support for Digital Audio and Video, 2017
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017
Is Foveated Rendering Perceivable in Virtual Reality?: Exploring the Efficiency and Consistency of Quality Assessment Methods.
Proceedings of the 2017 ACM on Multimedia Conference, 2017
2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
High performance traffic classification based on message size sequence and distribution.
J. Netw. Comput. Appl., 2016
IEEE Commun. Mag., 2016
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016
2015
IEEE Trans. Circuits Syst. Video Technol., 2015
IEEE Trans. Cloud Comput., 2015
Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled.
J. Inf. Sci. Eng., 2015
Low power algorithm-architecture co-design of fast Independent Component Analysis (FICA) for multi-gas sensor applications.
Proceedings of the VLSI Design, Automation and Test, 2015
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Proceedings of the 2nd Workshop on Mobile Gaming, MobiGames@MobiSys 2015, Florence, Italy, 2015
Proceedings of the 6th ACM Multimedia Systems Conference, 2015
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015
2014
ACM Trans. Multim. Comput. Commun. Appl., 2014
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014
Proceedings of the 6th ACM Mobile Video Workshop, MoVid 2014, Singapore, 2014
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014
2013
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013
Proceedings of the Multimedia Systems Conference 2013, 2013
Proceedings of the ACM Multimedia Conference, 2013
2012
Comput. Networks, 2012
2011
J. Netw. Comput. Appl., 2011
Comput. Networks, 2011
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Optimal service selection for composition based on weighted service flow and Genetic Algorithm.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
2009
An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009
2008
Heuristic algorithms to solve the capacity allocation problem in photolithography area (CAPPA).
OR Spectr., 2008
A MIP model for IC final testing order selection problem.
Proceedings of the 2008 International Conference on Modeling, 2008
2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2006
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
A distributed key assignment protocol for secure multicast based on proxy cryptography.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2006
2005
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the High Performance Computing, 2005