Wei-Han Lee

According to our database1, Wei-Han Lee authored at least 27 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Model Pruning Enables Efficient Federated Learning on Edge Devices.
IEEE Trans. Neural Networks Learn. Syst., December, 2023

Federated Learning for Semantic Parsing: Task Formulation, Evaluation Setup, New Algorithms.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2022

Enhancing Robustness in Federated Learning by Supervised Anomaly Detection.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

2021
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers.
Proceedings of the 30th USENIX Security Symposium, 2021

Rim: Offloading Inference to the Edge.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

2020
NeuralFP: Out-of-distribution Detection using Fingerprints of Neural Networks.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Understanding the Security Risks of Docker Hub.
Proceedings of the Computer Security - ESORICS 2020, 2020

Neuraltran: Optimal Data Transformation for Privacy-Preserving Machine Learning by Leveraging Neural Networks.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

2019
User Authentication and Security Vulnerabilities Using Smartphone Sensors and Machine Learning
PhD thesis, 2019

Model Pruning Enables Efficient Federated Learning on Edge Devices.
CoRR, 2019

MOPT: Optimized Mutation Scheduling for Fuzzers.
Proceedings of the 28th USENIX Security Symposium, 2019

Acoustic anomaly detection system: demo abstract.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

Exact Incremental and Decremental Learning for LS-SVM.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

2018
Time Series Segmentation through Automatic Feature Learning.
CoRR, 2018

Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Blind De-anonymization Attacks using Social Networks.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Secure Pick Up: Implicit Authentication When You Start Using the Smartphone.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

How to Quantify Graph De-anonymization Risks.
Proceedings of the Information Systems Security and Privacy, 2017

Quantification of De-anonymization Risks in Social Networks.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Sensor-Based Implicit Authentication of Smartphone Users.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch.
Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, 2016

2015
Implicit Authentication for Smartphone Security.
Proceedings of the Information Systems Security and Privacy, 2015

Multi-sensor Authentication to Improve Smartphone Security.
Proceedings of the ICISSP 2015, 2015

Using GIDL mechanism for low-power consumption and data retention time improvement in a double-gate nanowire TFT 1T-DRAM with Fin-Gate and Pillar-Body structure.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

PARS: A Uniform and Open-source Password Analysis and Research System.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015


  Loading...