Chiu C. Tan

Orcid: 0000-0002-5758-6394

Affiliations:
  • Temple University, Department of Computer and Information Sciences, Philadelphia, PA, USA
  • College of William and Mary, Williamsburg, VA, USA (PhD 2010)


According to our database1, Chiu C. Tan authored at least 89 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Closer Look at Access Control in Multi-User Voice Systems.
IEEE Access, 2024

2023
ARCHIE++ : A Cloud-Enabled Framework for Conducting AR System Testing in the Wild.
IEEE Trans. Vis. Comput. Graph., April, 2023

Can Decentralized Stochastic Minimax Optimization Algorithms Converge Linearly for Finite-Sum Nonconvex-Nonconcave Problems?
CoRR, 2023

2022
Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications.
ACM Trans. Priv. Secur., 2022

Do smart speaker skills support diverse audiences?
Pervasive Mob. Comput., 2022

2021
Semantic-aware label placement for augmented reality in street view.
Vis. Comput., 2021

Rainy Night Scene Understanding With Near Scene Semantic Adaptation.
IEEE Trans. Intell. Transp. Syst., 2021

Deep Learning Approach Protecting Privacy in Camera-Based Critical Applications.
CoRR, 2021

Emerging mobile apps: challenges and open problems.
CCF Trans. Pervasive Comput. Interact., 2021

Understanding and Mitigating Privacy Leaks from Third-Party Smart Speaker Apps.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Block-VC: A Blockchain-Based Global Vaccination Certification.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Cross-Weather Image Alignment via Latent Generative Model With Intensity Consistency.
IEEE Trans. Image Process., 2020

Context aware access control for home voice assistant in multi-occupant homes.
Pervasive Mob. Comput., 2020

ARCHIE: A User-Focused Framework for Testing Augmented Reality Applications in the Wild.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2020

Supporting Home Quarantine with Smart Speakers.
Proceedings of the HealthDL@MobiSys 2020, 2020

Smart Contract Designs on Blockchain Applications.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Stealthy Privacy Attacks Against Mobile AR Apps.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Online Multi-Object Tracking With Instance-Aware Tracker and Dynamic Model Refreshment.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2019

ABACUS: audio based access control utility for smarthomes.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
EAD: elasticity aware deduplication manager for datacenters with multi-tier storage systems.
Clust. Comput., 2018

A Mobile Augmented Reality Game to Encourage Hydration in the Elderly.
Proceedings of the Human Interface and the Management of Information. Information in Applications and Services, 2018

2017
Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios.
IEEE Trans. Mob. Comput., 2017

Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters.
IEEE Trans. Cloud Comput., 2017

Wearable Computing Support for Objective Assessment of Function in Older Adults.
Proceedings of the Human Interface and the Management of Information: Supporting Learning, Decision-Making and Collaboration, 2017

PrivacyManager: An access control framework for mobile augmented reality applications.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
SmartSwim: An Infrastructure-Free Swimmer Localization System Based on Smartphone Sensors.
Proceedings of the Inclusive Smart Cities and Digital Health, 2016

Covert Video Classification by Codebook Growing Pattern.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016

Encryption-based privacy protection for police body-worn cameras.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
VProof: Lightweight Privacy-Preserving Vehicle Location Proofs.
IEEE Trans. Veh. Technol., 2015

WiGroup: A Lightweight Cellular-Assisted Device-to-Device Network Formation Framework.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Survey of Smartphone-Based Police Monitoring Apps.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

mQual: A Mobile Peer-to-Peer Network Framework Supporting Quality of Service.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Security and privacy for body cameras used in law enforcement.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

SmartArgos: Improving mobile surveillance systems with software defined networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet.
IEEE Trans. Veh. Technol., 2014

Towards Differential Query Services in Cost-Efficient Clouds.
IEEE Trans. Parallel Distributed Syst., 2014

Design, Realization, and Evaluation of DozyAP for Power-Efficient Wi-Fi Tethering.
IEEE/ACM Trans. Netw., 2014

Improving cooperative trajectory mapping applications with encounter-based error correction.
Int. J. Parallel Emergent Distributed Syst., 2014

WD2: an improved wifi-direct group formation protocol.
Proceedings of the 9th ACM MobiCom workshop on Challenged networks, 2014

Improving Virtual Machine Migration via Deduplication.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Bandwidth Prediction on a WiMAX Network.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Elastic data routing in cluster-based deduplication systems.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

An effective online scheme for detecting Android malware.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Auditing cloud service level agreement on VM CPU speed.
Proceedings of the IEEE International Conference on Communications, 2014

Using Elasticity to Improve Inline Data Deduplication Storage Systems.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput.
IEEE Trans. Parallel Distributed Syst., 2013

SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Securing Remote Obstetrics Monitoring Systems.
Int. J. E Health Medical Commun., 2013

Extracting secret key from wireless link dynamics in vehicular environments.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

CacheKeeper: a system-wide web caching service for smartphones.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Sybil defenses in mobile social networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Looking at the overheads of transmitting encrypted data to the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

User-Based CPU Verification Scheme for Public Cloud Computing.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Wormhole defense for cooperative trajectory mapping.
Int. J. Parallel Emergent Distributed Syst., 2012

Cooperative private searching in clouds.
J. Parallel Distributed Comput., 2012

Cooperative Trajectory-Based Map Construction.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Encounter-based noise cancelation for cooperative trajectory mapping.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

SybilDefender: Defend against sybil attacks in large social networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Efficient information retrieval for ranked queries in cost-effective cloud environments.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Security analysis of emerging remote obstetrics monitoring systems.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

A survey on PHR technology.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Body sensor networks in fetal monitoring with NFC enabled Android devices.
Proceedings of the 7th International Conference on Body Area Networks, 2012

2011
Public-key based access control in sensornet.
Wirel. Networks, 2011

A Timing-Based Scheme for Rogue AP Detection.
IEEE Trans. Parallel Distributed Syst., 2011

Friendship-based location privacy in Mobile Social Networks.
Int. J. Secur. Networks, 2011

IMDGuard: Securing implantable medical devices with the external wearable guardian.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Defending against vehicular rogue APs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Reliable Re-Encryption in Unreliable Clouds.
Proceedings of the Global Communications Conference, 2011

Enhancing Mobile Social Network Privacy.
Proceedings of the Global Communications Conference, 2011

Secure Locking for Untrusted Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Efficient techniques for monitoring missing RFID tags.
IEEE Trans. Wirel. Commun., 2010

Snoogle: A Search Engine for Pervasive Environments.
IEEE Trans. Parallel Distributed Syst., 2010

Microsearch: A search engine for embedded devices used in pervasive computing.
ACM Trans. Embed. Comput. Syst., 2010

Designing a Practical Access Point Association Protocol.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Efficient Tag Identification in Mobile RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Counting RFID Tags Efficiently and Anonymously.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2009

Experimental Study on Mobile RFID Performance.
Proceedings of the Wireless Algorithms, 2009

A Measurement Based Rogue AP Detection Scheme.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Secure and Serverless RFID Authentication and Search Protocols.
IEEE Trans. Wirel. Commun., 2008

Body sensor network security: an identity-based cryptography approach.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Microsearch: When Search Engines Meet Small Devices.
Proceedings of the Pervasive Computing, 2008

Finding popular categories for RFID tags.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Snoogle: A Search Engine for the Physical World.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

How to Monitor for Missing RFID tags.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
Severless Search and Authentication Protocols for RFID.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

2006
A Robust and Secure RFID-Based Pedigree System (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006


  Loading...