Ee-Chien Chang

Orcid: 0000-0003-4613-0866

According to our database1, Ee-Chien Chang authored at least 167 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DP<sup>2</sup>Dataset Protection by Data Poisoning.
IEEE Trans. Dependable Secur. Comput., 2024

Object Detectors in the Open Environment: Challenges, Solutions, and Outlook.
CoRR, 2024

Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning.
CoRR, 2024

On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers.
CoRR, 2024

Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs.
CoRR, 2024

VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models.
CoRR, 2024

Domain Bridge: Generative model-based domain forensic for black-box models.
CoRR, 2024

2023
Analysis of False Data Injection Attacks Against Automated Control for Parallel Generators in IEC 61850-Based Smart Grid Systems.
IEEE Syst. J., September, 2023

An open-source framework for publishing/subscribing IEC 61850 R-GOOSE and R-SV.
SoftwareX, July, 2023

De-END: Decoder-Driven Watermarking Network.
IEEE Trans. Multim., 2023

Secret-Shared Shuffle with Malicious Security.
IACR Cryptol. ePrint Arch., 2023

Improving Adversarial Transferability by Stable Diffusion.
CoRR, 2023

Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions.
CoRR, 2023

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks.
CoRR, 2023

Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation.
CoRR, 2023

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence.
CoRR, 2023

DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

End-to-End Performance Evaluation of R-SV / R-GOOSE Messages for Wide Area Protection and Control Applications.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Poisoning Online Learning Filters by Shifting on the Move.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication.
Proceedings of the Annual Computer Security Applications Conference, 2023

Purifier: Defending Data Inference Attacks via Transforming Confidence Scores.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX.
IEEE Trans. Inf. Forensics Secur., 2022

Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.
IEEE Trans. Dependable Secur. Comput., 2022

A cybersecurity assessment framework for virtual operational technology in power system automation.
Simul. Model. Pract. Theory, 2022

Predicting Non-Fungible Token (NFT) Collections: A Contextual Generative Approach.
CoRR, 2022

Mixed Fault Tolerance Protocols with Trusted Execution Environment.
CoRR, 2022

Hybrid Trust Multi-party Computation with Trusted Execution Environment.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Confusing and Detecting ML Adversarial Attacks with Injected Attractors.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Scalable Private Decision Tree Evaluation with Sublinear Communication.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications.
Proceedings of the ACE '22: Australasian Computing Education Conference, Virtual Event, Australia, February 14, 2022

2021
Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2021

Mitigating Adversarial Attacks by Distributing Different Copies to Different Users.
CoRR, 2021

Poisoning of Online Learning Filters: DDoS Attacks and Countermeasures.
CoRR, 2021

OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity Generation.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Common Component in Black-Boxes Is Prone to Attacks.
Proceedings of the Computer Security - ESORICS 2021, 2021

Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
SHADOWCAST: Controlling Network Properties to Explain Graph Generation.
CoRR, 2020

Defending Model Inversion and Membership Inference Attacks via Prediction Purification.
CoRR, 2020

Detection and Recovery of Adversarial Attacks with Injected Attractors.
CoRR, 2020

False Data Injection Cyber Range of Modernized Substation System.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Benefits and Pitfalls of Using Capture the Flag Games in University Courses.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier.
Proceedings of the 8th International Conference on Learning Representations, 2020

2019
Passive Attacks Against Searchable Encryption.
IEEE Trans. Inf. Forensics Secur., 2019

Self-Expiring Data Capsule using Trusted Execution Environment.
CoRR, 2019

Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking.
CoRR, 2019

Enhancing Transformation-based Defenses using a Distribution Classifier.
CoRR, 2019

Autonomous Membership Service for Enclave Applications.
CoRR, 2019

Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment.
CoRR, 2019

Towards Scaling Blockchain Systems via Sharding.
Proceedings of the 2019 International Conference on Management of Data, 2019

Towards a Marketplace for Secure Outsourced Computations.
Proceedings of the Computer Security - ESORICS 2019, 2019

Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Keeping Time-Release Secrets through Smart Contracts.
IACR Cryptol. ePrint Arch., 2018

Fair Marketplace for Secure Outsourced Computations.
CoRR, 2018

Chain of Trust: Can Trusted Hardware Help Scaling Blockchains?
CoRR, 2018

Learning Inverse Mappings with Adversarial Criterion.
CoRR, 2018

Votnet: Hybrid simulation of Virtual Operational Technology Network for Cybersecurity Assessment.
Proceedings of the 2018 Winter Simulation Conference, 2018

BNV: Enabling Scalable Network Experimentation through Bare-metal Network Virtualization.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute.
Proc. Priv. Enhancing Technol., 2017

A New Functional Encryption for Multidimensional Range Query.
IACR Cryptol. ePrint Arch., 2017

PermuteRam: Optimizing Oblivious Computation for Efficiency.
IACR Cryptol. ePrint Arch., 2017

Evading Classifier in the Dark: Guiding Unpredictable Morphing Using Binary-Output Blackboxes.
CoRR, 2017

A conceptural framework to federate testbeds for cybersecurity.
Proceedings of the 2017 Winter Simulation Conference, 2017

Modeling the effects of insider threats on cybersecurity of complex systems.
Proceedings of the 2017 Winter Simulation Conference, 2017

Raptor: Scalable rule placement over multiple path in software defined networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

A New Functional Encryption for Multidimensional Range Query (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Evading Classifiers by Morphing in the Dark.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Privacy-Preserving Data Deduplication on Trusted Processors.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Directed Transitive Signature on Directed Tree.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Watermarking with Fixed Decoder for Aesthetic 2D Barcode.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

2015
M2R: Enabling Stronger Privacy in MapReduce Computation.
Proceedings of the 24th USENIX Security Symposium, 2015

PrAd: Enabling Privacy-Aware Location based Advertising.
Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis, 2015

2014
Optimal strategy of coupon subset collection when each package contains half of the coupons.
Inf. Process. Lett., 2014

Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2014

An Optimization Model for Aesthetic Two-Dimensional Barcodes.
Proceedings of the MultiMedia Modeling - 20th Anniversary International Conference, 2014

Differential privacy with δ-neighbourhood for spatial and dynamic datasets.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

Processing of Mixed-Sensitivity Video Surveillance Streams on Hybrid Clouds.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Towards a general framework for secure MapReduce computation on hybrid clouds.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '13, 2013

Weak leakage-resilient client-side deduplication of encrypted data in cloud storage.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

Indexing Encrypted Documents for Supporting Efficient Keyword Search.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

Adaptive Differentially Private Histogram of Low-Dimensional Data.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

El-pincel: a painter cloud service for greener web pages.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Towards efficient proofs of retrievability.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

CloudProtect: Managing Data Privacy in Cloud Applications.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Enhancing host security using external environment sensors.
Int. J. Inf. Sec., 2011

Towards Efficient Provable Data Possession.
IACR Cryptol. ePrint Arch., 2011

Practically Efficient Proof of Retrievability in Cloud Storage.
IACR Cryptol. ePrint Arch., 2011

Publishing Location Dataset Differential Privately with Isotonic Regression
CoRR, 2011

ID Repetition in Structured P2P Networks.
Comput. J., 2011

Content based JPEG fragmentation point detection.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Identity leakage mitigation on asymmetric secure sketch.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

2010
Authenticating Aggregate Range Queries over Multidimensional Dataset.
IACR Cryptol. ePrint Arch., 2010

Live memory forensics of mobile phones.
Digit. Investig., 2010

Securing Kiosk using Mobile Devices coupled with Visual Inspection
CoRR, 2010

Website Fingerprinting and Identification Using Ordered Feature Sequences.
Proceedings of the Computer Security, 2010

A chameleon encryption scheme resistant to known-plaintext attack.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010

Robustness of DTN against routing attacks.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

Securing interactive sessions using mobile device through visual channel and visual inspection.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Secure Sketch for Multiple Secrets.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Integrated Optimization of Video Server Resource and Streaming Quality Over Best-Effort Network.
IEEE Trans. Circuits Syst. Video Technol., 2009

Short Redactable Signatures Using Random Trees.
IACR Cryptol. ePrint Arch., 2009

ID Repetition in Kad.
Proceedings of the Proceedings P2P 2009, 2009

2008
Information Leakage in Optimal Anonymized and Diversified Data.
IACR Cryptol. ePrint Arch., 2008

Remote Integrity Check with Dishonest Storage Server.
IACR Cryptol. ePrint Arch., 2008

Residual Information of Redacted Images Hidden in the Compression Artifacts.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Fuzzy extractors for asymmetric biometric representations.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008

A general model of probabilistic packet marking for IP traceback.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication.
Trans. Data Hiding Multim. Secur., 2007

Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Robust Extraction of Secret Bits from Minutiae.
Proceedings of the Advances in Biometrics, International Conference, 2007

Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Shortest Path amidst Disc Obstacles Is Computable.
Int. J. Comput. Geom. Appl., 2006

Secure Sketch for Multi-Sets.
IACR Cryptol. ePrint Arch., 2006

Zero-knowledge watermark detection resistant to ambiguity attacks.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Robust, short and sensitive authentication tags using secure sketch.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Error Resilient Image Authentication Using Feature Statistical and Spatial Properties.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Progressive transmission and rendering of foveated volume data.
Proceedings of the GRAPP 2006: Proceedings of the First International Conference on Computer Graphics Theory and Applications, 2006

Hiding Secret Points Amidst Chaff.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Finding the original point set hidden among chaff.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Effect of Malicious Synchronization.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Fast rendering of foveated volumes in wavelet-based representation.
Vis. Comput., 2005

Small Secure Sketch for Point-Set Difference.
IACR Cryptol. ePrint Arch., 2005

A New Watermarking Scheme Robust to Print-and-Scan.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

A unified framework for resolving ambiguity in copy detection.
Proceedings of the 13th ACM International Conference on Multimedia, 2005

Error resilient content-based image authentication over wireless channel.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

On the effectiveness of DDoS attacks on statistical filtering.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Pervasive Random Beacon in the Internet for Covert Coordination.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Watermarking based Image Authentication using Feature Amplification.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

2004
Watermarking with retrieval systems.
Multim. Syst., 2004

Fast Rendering of Foveated Volume in the Wavelet Domain.
Proceedings of the 15th IEEE Visualization Conference, 2004

A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing.
Proceedings of the 10th International Multimedia Modeling Conference (MMM 2004), 2004

A color fingerprint of video shot for content identification.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

On the Possibility of Non-invertible Watermarking Schemes.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Error concealment for JPEG2000 images based on orthogonal edge directed filters.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Layered coding with good allocation outperforms multiple description coding over multiple paths.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Rotation of foveated image in the wavelet domain.
Proceedings of the 2004 International Conference on Image Processing, 2004

Edge directed filter based error concealment for wavelet-based images.
Proceedings of the 2004 International Conference on Image Processing, 2004

Watermarking color histograms.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Competitive On-Line Scheduling with Level of Service.
J. Sched., 2003

Robust image authentication using content based compression.
Multim. Syst., 2003

Distributed multivariate regression based on influential observations.
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003

Public Watermark Detection Using Multiple Proxies and Secret Sharing.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Watermarking with knowledge of image database.
Proceedings of the 2003 International Conference on Image Processing, 2003

Feature extraction of volume data based on multi-scale representation.
Proceedings of the 1st International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2003, 2003

A 3D shape matching framework.
Proceedings of the 1st International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2003, 2003

2002
Security of Public Watermarking Schemes for Binary Sequences.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2001
A fast direct Fourier-based algorithm for subpixel registration of images.
IEEE Trans. Geosci. Remote. Sens., 2001

Authentication of Volume Data Using Wavelet-Based Foveation.
Proceedings of the Eurographics Multimedia Workshop 2001, 2001

Competitive Online Scheduling with Level of Service.
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001

2000
A Simultaneous Search Problem.
Algorithmica, 2000

Geometric Properties of Watermarking Schemes.
Proceedings of the 2000 International Conference on Image Processing, 2000

1998
Foveation Techniques and Scheduling Issues in Thinwire Visualization.
PhD thesis, 1998

1997
A Wavelet Approach to Foveating Images.
Proceedings of the Thirteenth Annual Symposium on Computational Geometry, 1997

1995
A Note on Improved Deterministic Time Simulation of Nondeterministic Space for Small Space.
Inf. Process. Lett., 1995

1993
Multidimensional On-Line Bin-Packing: An Algorithm and its Average-Case Analysis.
Inf. Process. Lett., 1993


  Loading...