Chia-Mu Yu

Orcid: 0000-0002-1677-2131

According to our database1, Chia-Mu Yu authored at least 103 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DiffuseKronA: A Parameter Efficient Fine-tuning Method for Personalized Diffusion Models.
CoRR, 2024

2023
LDoS Attacks Detection for ICPS NB-IoTs Environment via SE-Based CNN.
IEEE Syst. J., December, 2023

Counteracting Side Channels in Cross-User Client-Side Deduplicated Cloud Storage.
IEEE Internet Things J., September, 2023

Guest Editorial of the Special Section on Consumer Electronics With Artificial Intelligence.
IEEE Trans. Consumer Electron., August, 2023

On the Private Data Synthesis Through Deep Generative Models for Data Scarcity of Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023

Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective.
CoRR, 2023

Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?
CoRR, 2023

Exploring the Benefits of Differentially Private Pre-training and Parameter-Efficient Fine-tuning for Table Transformers.
CoRR, 2023

DPAF: Image Synthesis via Differentially Private Aggregation in Forward Phase.
CoRR, 2023

Local Differential Privacy Protocol for Making Key-Value Data Robust Against Poisoning Attacks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2023

Exploring the Benefits of Visual Prompting in Differential Privacy.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Certified Robustness of Quantum Classifiers Against Adversarial Examples Through Quantum Noise.
Proceedings of the IEEE International Conference on Acoustics, 2023

Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Locally Differentially Private Minimum Finding.
IEICE Trans. Inf. Syst., August, 2022

SegNet: a network for detecting deepfake facial videos.
Multim. Syst., 2022

Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge.
ACM J. Data Inf. Qual., 2022

DPView: Differentially Private Data Synthesis Through Domain Size Information.
IEEE Internet Things J., 2022

Intelligent reflecting surface-aided network planning.
IET Commun., 2022

DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy.
IEEE Access, 2022

Real-World Adversarial Examples Via Makeup.
Proceedings of the IEEE International Conference on Acoustics, 2022

DPGEN: Differentially Private Generative Energy-Guided Network for Natural Image Synthesis.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems.
ACM Trans. Cyber Phys. Syst., 2021

(k, ε , δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy.
Serv. Oriented Comput. Appl., 2021

DPCrowd: Privacy-Preserving and Communication-Efficient Decentralized Statistical Estimation for Real-Time Crowdsourced Data.
IEEE Internet Things J., 2021

Editorial: Special issue on trusted Cloud-Edges computations.
Future Gener. Comput. Syst., 2021

Meta Adversarial Perturbations.
CoRR, 2021

CAFE: Catastrophic Data Leakage in Vertical Federated Learning.
CoRR, 2021

Real-World Adversarial Examples involving Makeup Application.
CoRR, 2021

Formalizing Generalization and Robustness of Neural Networks to Weight Perturbations.
CoRR, 2021

Adversarial Examples for Unsupervised Machine Learning Models.
CoRR, 2021

Formalizing Generalization and Adversarial Robustness of Neural Networks to Weight Perturbations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Catastrophic Data Leakage in Vertical Federated Learning.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Non-Singular Adversarial Robustness of Neural Networks.
Proceedings of the IEEE International Conference on Acoustics, 2021

Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation With Manipulable Semantics.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Privacy in Data Service Composition.
IEEE Trans. Serv. Comput., 2020

Privacy Aware Data Deduplication for Side Channel in Cloud Storage.
IEEE Trans. Cloud Comput., 2020

Special issue on Trusted Cloud-Edges Computations.
Future Gener. Comput. Syst., 2020

DPCrowd: Privacy-preserving and Communication-efficient Decentralized Statistical Estimation for Real-time Crowd-sourced Data.
CoRR, 2020

Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications.
IEEE Access, 2020

On the Privacy Risks of Compromised Trigger-Action Platforms.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Detecting Deepfake-Forged Contents with Separable Convolutional Neural Network and Image Segmentation.
CoRR, 2019

Locally Differentially Private Minimum Finding.
CoRR, 2019

Empirical Evaluation on Synthetic Data Generation with Generative Adversarial Network.
Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, 2019

Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Characterizing Adversarial Subspaces by Mutual Information.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2018

MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2018

On the Limitation of MagNet Defense against L<sub>1</sub>-based Adversarial Examples.
CoRR, 2018

Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

VENUS: Verifiable range query in data streaming.
Proceedings of the IEEE INFOCOM 2018, 2018

RARE: Defeating side channels based on data-deduplication in cloud storage.
Proceedings of the IEEE INFOCOM 2018, 2018

On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples.
Proceedings of the 6th International Conference on Learning Representations, 2018

On the Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

On the Limitation of MagNet Defense Against L1-Based Adversarial Examples.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data.
IEEE Syst. J., 2017

R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections.
CoRR, 2017

Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems.
Comput. Networks, 2017

Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2017

Key Management in Internet of Things via Kronecker Product.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

POSTER: A Unified Framework of Differentially Private Synthetic Data Release with Generative Adversarial Network.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Enabling End-Users to Protect their Privacy.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Compressed Sensing-Based Clone Identification in Sensor Networks.
IEEE Trans. Wirel. Commun., 2016

XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data.
IACR Cryptol. ePrint Arch., 2016

Counteracting UDP flooding attacks in SDN.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

High-Dimensional Crowdsourced Data Distribution Estimation with Local Privacy.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Proof of ownership in deduplicated cloud storage with mobile device efficiency.
IEEE Netw., 2015

Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks.
IEEE Commun. Mag., 2015

Deterministic detection of node replication attacks in sensor networks.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

POSTER: Lightweight Streaming Authenticated Data Structures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2014

Privacy-Preserving Power Request in Smart Grid Networks.
IEEE Syst. J., 2014

Sensor localization via robust principle component analysis.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2014

2013
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2013

Top-k query result completeness verification in sensor networks.
Proceedings of the IEEE International Conference on Communications, 2013

2012
Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems.
IEEE Commun. Lett., 2012

Reducing Reconciliation Communication Cost with Compressed Sensing
CoRR, 2012

Resource Block Assignment for Interference Avoidance in Femtocell Networks.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

CSI: Compressed sensing-based clone identification in sensor networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

2011
Constrained Function-Based Message Authentication for Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2011

Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2011

An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks.
Int. J. Sens. Networks, 2011

Secure transcoding for compressive multimedia sensing.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
Noninteractive pairwise key establishment for sensor networks.
IEEE Trans. Inf. Forensics Secur., 2010

Acquiring Authentic Data in Unattended Wireless Sensor Networks.
Sensors, 2010

2009
Constrained Function Based En-Route Filtering for Sensor Networks
CoRR, 2009

Secure Multidimensional Queries in Tiered Sensor Networks
CoRR, 2009

A constrained function based message authentication scheme for sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

A DoS-resilient en-route filtering scheme for sensor networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

2008
Mobile Sensor Network Resilient Against Node Replication Attacks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

2007
Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

2005
A Secure Quantum Communication Protocol Using Insecure Public Channels.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Robust non-interactive zero-knowledge watermarking scheme against cheating prover.
Proceedings of the 7th workshop on Multimedia & Security, 2005

On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005


  Loading...