Ee-Chien Chang
Orcid: 0000-0003-4613-0866
According to our database1,
Ee-Chien Chang
authored at least 174 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training.
CoRR, 2024
CoRR, 2024
Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning.
CoRR, 2024
Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs.
CoRR, 2024
VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models.
CoRR, 2024
CoRR, 2024
Finding Input Data Domains of Image Classification Models with Hard-Label Black-Box Access.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Analysis of False Data Injection Attacks Against Automated Control for Parallel Generators in IEC 61850-Based Smart Grid Systems.
IEEE Syst. J., September, 2023
SoftwareX, July, 2023
Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions.
CoRR, 2023
CoRR, 2023
CoRR, 2023
CoRR, 2023
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
End-to-End Performance Evaluation of R-SV / R-GOOSE Messages for Wide Area Protection and Control Applications.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication.
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX.
IEEE Trans. Inf. Forensics Secur., 2022
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.
IEEE Trans. Dependable Secur. Comput., 2022
A cybersecurity assessment framework for virtual operational technology in power system automation.
Simul. Model. Pract. Theory, 2022
CoRR, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications.
Proceedings of the ACE '22: Australasian Computing Education Conference, Virtual Event, Australia, February 14, 2022
2021
IACR Cryptol. ePrint Arch., 2021
CoRR, 2021
OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity Generation.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Defending Model Inversion and Membership Inference Attacks via Prediction Purification.
CoRR, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier.
Proceedings of the 8th International Conference on Learning Representations, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking.
CoRR, 2019
Proceedings of the 2019 International Conference on Management of Data, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Votnet: Hybrid simulation of Virtual Operational Technology Network for Cybersecurity Assessment.
Proceedings of the 2018 Winter Simulation Conference, 2018
BNV: Enabling Scalable Network Experimentation through Bare-metal Network Virtualization.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proc. Priv. Enhancing Technol., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Evading Classifier in the Dark: Guiding Unpredictable Morphing Using Binary-Output Blackboxes.
CoRR, 2017
Proceedings of the 2017 Winter Simulation Conference, 2017
Proceedings of the 2017 Winter Simulation Conference, 2017
Proceedings of the 2017 IFIP Networking Conference, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis, 2015
2014
Optimal strategy of coupon subset collection when each package contains half of the coupons.
Inf. Process. Lett., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the MultiMedia Modeling - 20th Anniversary International Conference, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
2013
Proceedings of the ACM Symposium on Cloud Computing, SOCC '13, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
IACR Cryptol. ePrint Arch., 2011
CoRR, 2011
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Computer Security, 2010
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010
Proceedings of the Second International Conference on Communication Systems and Networks, 2010
Securing interactive sessions using mobile device through visual channel and visual inspection.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Integrated Optimization of Video Server Resource and Streaming Quality Over Best-Effort Network.
IEEE Trans. Circuits Syst. Video Technol., 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication.
Trans. Data Hiding Multim. Secur., 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the Advances in Biometrics, International Conference, 2007
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Error Resilient Image Authentication Using Feature Statistical and Spatial Properties.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
Progressive transmission and rendering of foveated volume data.
Proceedings of the GRAPP 2006: Proceedings of the First International Conference on Computer Graphics Theory and Applications, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Vis. Comput., 2005
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
Proceedings of the 13th ACM International Conference on Multimedia, 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
2004
Proceedings of the 15th IEEE Visualization Conference, 2004
A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing.
Proceedings of the 10th International Multimedia Modeling Conference (MMM 2004), 2004
Proceedings of the 12th ACM International Conference on Multimedia, 2004
Proceedings of the Information Hiding, 6th International Workshop, 2004
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004
Layered coding with good allocation outperforms multiple description coding over multiple paths.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
2003
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the 2003 International Conference on Image Processing, 2003
Proceedings of the 1st International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2003, 2003
Proceedings of the 1st International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2003, 2003
2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
2001
IEEE Trans. Geosci. Remote. Sens., 2001
Proceedings of the Eurographics Multimedia Workshop 2001, 2001
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001
2000
Proceedings of the 2000 International Conference on Image Processing, 2000
1998
PhD thesis, 1998
1997
Proceedings of the Thirteenth Annual Symposium on Computational Geometry, 1997
1995
A Note on Improved Deterministic Time Simulation of Nondeterministic Space for Small Space.
Inf. Process. Lett., 1995
1993
Inf. Process. Lett., 1993