Hsu-Chun Hsiao
Orcid: 0000-0001-9592-6911
According to our database1,
Hsu-Chun Hsiao
authored at least 61 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements.
ACM Trans. Priv. Secur., November, 2024
CoRR, 2024
Proxion: Uncovering Hidden Proxy Smart Contracts for Finding Collision Vulnerabilities in Ethereum.
CoRR, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity Application Virtualization Platforms in Android.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers.
Proc. Priv. Enhancing Technol., 2022
Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
"Prove It!" A User Centered Design for the Blockchain-Based Research Lifecycle Transparency Framework.
Proceedings of the Crisis, Transition, Resilience: Re-imagining an information resilient society, 2022
2021
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
2020
CoRR, 2020
Proceedings of the Companion of The 2020 Web Conference 2020, 2020
Keeping Passwords In Your Pocket: Managing Password Locally With Mobile Fingerprint Sensors.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
SAFECHAIN: Securing Trigger-Action Programming from Attack Chains (Extended Technical Report).
CoRR, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
IEEE Internet Things J., 2018
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report).
CoRR, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
Proceedings of the 26th International Conference on World Wide Web, 2017
2016
IEEE Commun. Mag., 2016
IEEE Access, 2016
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
2014
Comput. Commun. Rev., 2014
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region.
Proceedings of the 2014 Internet Measurement Conference, 2014
YourPassword: applying feedback loops to improve security behavior of managing multiple passwords.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011
2010
IEEE Trans. Mob. Comput., 2010
2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009