Edward Jung
Orcid: 0000-0002-3237-3894
According to our database1,
Edward Jung
authored at least 19 papers
between 1995 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome.
Proceedings of the 30th USENIX Security Symposium, 2021
2016
Microprocess. Microsystems, 2016
2015
Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks.
Secur. Commun. Networks, 2015
Identification of embedded control units by state encoding and power consumption analysis.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI, 2015
2014
Proceedings of the 27th IEEE International System-on-Chip Conference, 2014
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014
2013
A Quantum-Modeled Fuzzy C-Means clustering algorithm for remotely sensed multi-band image segmentation.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013
A Quantum-Modeled Artificial Bee Colony clustering algorithm for remotely sensed multi-band image segmentation.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013
2012
Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization.
Int. J. Inf. Secur. Priv., 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the Research in Applied Computation Symposium, 2012
Proceedings of the Research in Applied Computation Symposium, 2012
2011
Measuring Levels of Abstraction in Software Development.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011
An empirical study on the effectiveness of hyperspectral image classification algorithms with dimensionality reduction.
Proceedings of the Research in Applied Computation Symposium, 2011
A unified design method utilizing decomposability and composability for secure systems.
Proceedings of the Research in Applied Computation Symposium, 2011
The investigation of the structural properties of machines for the design of secure and trustworthy systems.
Proceedings of the Research in Applied Computation Symposium, 2011
2009
J. Commun. Networks, 2009
1995
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995