Hsiao-Ying Lin

Orcid: 0000-0002-7559-9340

According to our database1, Hsiao-Ying Lin authored at least 31 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Lower Energy Large Language Models (LLMs).
Computer, October, 2023

Embedded Artificial Intelligence: Intelligence on Devices.
Computer, September, 2023

Long-Term Privacy-Preserving Aggregation With User-Dynamics for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Team With the Strong, Work With the Wise.
Computer, 2023

Standing on the Shoulders of AI Giants.
Computer, 2023

Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023

2022
A Survey on Reinforcement Learning Security with Application to Autonomous Driving.
CoRR, 2022

Staying Stronger Together: Synergy From Multiple Sensors.
Computer, 2022

Large-Scale Artificial Intelligence Models.
Computer, 2022

2021
DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction.
CoRR, 2021

Adversarial Machine Learning: Attacks From Laboratories to the Real World.
Computer, 2021

Colors of Artificial Intelligence.
Computer, 2021

Will We Adopt AI Like We Adopted Electricity?
Computer, 2021

Towards Demystifying Adversarial Robustness of Binarized Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Is Artificial Intelligence/Machine Learning the Anticipated Silver Bullet?
Computer, 2020

Bident Structure for Neural Network Model Protection.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Keyed Non-parametric Hypothesis Tests.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
AnchorCAN: Anchor-Based Secure CAN Communications System.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2015
An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems.
IEEE Trans. Reliab., 2015

2014
Reliable Repair Mechanisms with Low Connection Cost for Code Based Distributed Storage Systems.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

2013
An Empirical Study on Data Retrievability in Decentralized Erasure Code Based Distributed Storage Systems.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

2012
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding.
IEEE Trans. Parallel Distributed Syst., 2012

A Privacy Preserving Smart Metering System Supporting Multiple Time Granularities.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
A Secure Decentralized Erasure Code for Distributed Networked Storage.
IEEE Trans. Parallel Distributed Syst., 2010

2009
Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication.
J. Inf. Sci. Eng., 2009

2008
SWOON: A Testbed for Secure Wireless Overlay Networks.
Proceedings of the Workshop on Cyber Security and Test, 2008

2005
An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2005


  Loading...