Shiuh-Pyng Shieh

Orcid: 0000-0003-4077-2358

According to our database1, Shiuh-Pyng Shieh authored at least 102 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Strategy for Implementing of Zero Trust Architecture.
IEEE Trans. Reliab., March, 2024

Reliability Engineering in a Time of Rapidly Converging Technologies.
IEEE Trans. Reliab., March, 2024

Guest Editorial Celebrating 75 Years of Excellence: The Enduring Legacy and Future Outlook of the IEEE Reliability Society.
IEEE Trans. Reliab., March, 2024

The Game of Spear and Shield in Next Era of Cybersecurity.
IEEE Trans. Reliab., March, 2024

2023
CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
Adaptive Entry Point Discovery for Web Vulnerability Scanning.
J. Inf. Sci. Eng., 2022

Strategy and Tactics Against Ransomware.
Computer, 2022

2021
EC-Model: An Evolvable Malware Classification Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
IEEE Access Special Section Editorial: Artificial Intelligence in Cybersecurity.
IEEE Access, 2020

2019
DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Penetration Testing in the IoT Age.
Computer, 2018

Finder: Automatic ICC Data Reconstruction for Long-Term Runtime Semantics.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

DeepMemIntrospect: Recognizing Data Structures in Memory with Neural Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Mitigating Over-Permissible Transfer for Control Flow Integrity.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Security Semantics Modeling with Progressive Distillation.
IEEE Trans. Mob. Comput., 2017

Adaptive Virtual Gestures for GUI Testing on Smartphones.
IEEE Softw., 2017

DROIT+: Taint Tracking for Storage Access on Android.
J. Inf. Sci. Eng., 2017

Web Application Security: Threats, Countermeasures, and Pitfalls.
Computer, 2017

VMCloak: Toward a stealthy in-VM agent execution.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Shellcode detector for malicious document hunting.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction.
IEEE Trans. Dependable Secur. Comput., 2016

2015
SWIFT: Decoupled System-Wide Information Flow Tracking and its Optimizations.
J. Inf. Sci. Eng., 2015

DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis.
J. Inf. Sci. Eng., 2015

MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern.
J. Inf. Sci. Eng., 2015

Identifying and Authenticating IoT Objects in a Natural Context.
Computer, 2015

Combating Software Piracy in Public Clouds.
Computer, 2015

Emerging Security Threats and Countermeasures in IoT.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability.
J. Inf. Sci. Eng., 2014

Can Malware Be Exterminated by Better Understanding Its Roots?
IT Prof., 2014

Cloudebug: A Programmable Online Malware Testbed.
Computer, 2014

Dmail: A Globally Authenticated Email Service.
Computer, 2014

Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

IoT Security: Ongoing Challenges and Research Opportunities.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

2013
Light-Weight CSRF Protection by Labeling User-Created Contents.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness Malware.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

2012
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Veh. Technol., 2012

Accelerating Taint-Based Concolic Testing by Pruning Pointer Overtaint.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks.
IEEE Trans. Veh. Technol., 2011

RELEASE: Generating Exploits Using Loop-Aware Concolic Execution.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

On the security of password-based pairing protocol in Bluetooth.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

2010
Secure encrypted-data aggregation for wireless sensor networks.
Wirel. Networks, 2010

IEEE Reliability Society Technical Operations Annual Technical Report for 2010.
IEEE Trans. Reliab., 2010

Tracing Anonymous Mobile Attackers in Wireless Network.
J. Digit. Content Technol. its Appl., 2010

Authentication and secret search mechanisms for RFID-aware wireless sensor networks.
Int. J. Secur. Networks, 2010

2009
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

2008
SWOON: A Testbed for Secure Wireless Overlay Networks.
Proceedings of the Workshop on Cyber Security and Test, 2008

Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks.
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008

A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss.
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008

Tracing Mobile Attackers in Wireless Ad-Hoc Network.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

2007
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Keystroke statistical learning model for web authentication.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Secure Authentication Protocols Resistant to Guessing Attacks.
J. Inf. Sci. Eng., 2006

Packet classification using diagonal-based tuple space search.
Comput. Networks, 2006

A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Network.
Proceedings of the IEEE International Conference on Systems, 2006

Lightweight, pollution-attack resistant multicast authentication scheme.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

An efficient broadcast authentication scheme in wireless sensor networks.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Designing Authentication Protocols for Third Generation Mobile Communication Systems.
J. Inf. Sci. Eng., 2005

Guest Editors' Introduction: Ad Hoc and P2P Security.
IEEE Internet Comput., 2005

Defending against spoofed DDoS attacks with path fingerprint.
Comput. Secur., 2005

2004
Efficient key distribution schemes for secure media delivery in pay-TV systems.
IEEE Trans. Multim., 2004

Protecting network users in mobile code systems.
J. Parallel Distributed Comput., 2004

Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem.
J. Inf. Sci. Eng., 2004

Efficient Key-Evolving Protocol for the GQ Signature.
J. Inf. Sci. Eng., 2004

Scalable and lightweight key distribution for secure group communications.
Int. J. Netw. Manag., 2004

Accelerating network security services with fast packet classification.
Comput. Commun., 2004

2003
Optimal information-dispersal for fault-tolerant communication over a burst-error channel.
IEEE Trans. Reliab., 2003

2002
Secure Key-Evolving Protocols for Discrete Logarithm Schemes.
Proceedings of the Topics in Cryptology, 2002

2001
Secure key agreement for group communications.
Int. J. Netw. Manag., 2001

A secure multicast protocol for the internet's multicast backbone.
Int. J. Netw. Manag., 2001

The multi-layer RSIP framework.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

2000
Digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Veh. Technol., 2000

Chain authentication in mobile communication systems.
Telecommun. Syst., 2000

Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack.
IEEE Internet Comput., 2000

A Generic Electronic Payment Model Supporting Multiple Merchant Transactions.
Comput. Secur., 2000

Practical Key Distribution Schemes for Channel Protection.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
Playback Dispatch and Fault Recovery for a Clustered Video System with Multiple Servers.
Multim. Tools Appl., 1999

A Distributed Fault-Tolerant Design for Multiple-Server VOD Systems.
Multim. Tools Appl., 1999

Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures.
J. Inf. Sci. Eng., 1999

An Efficient Authentication Protocol for Mobile Networks.
J. Inf. Sci. Eng., 1999

Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems.
J. Inf. Sci. Eng., 1999

Auditing User Queries in Dynamic Statistical Databases.
Inf. Sci., 1999

Password authentication schemes with smart cards.
Comput. Secur., 1999

A Note on Breaking and Repairing a Secure Broadcasting in Large Networks.
Comput. Commun., 1999

Optimal Assignment of Mobile Agents for Software Authorization and Protection.
Comput. Commun., 1999

1998
Balancing workload and recovery load on distributed fault-tolerant VOD systems.
IEEE Commun. Lett., 1998

Secure broadcasting in large networks.
Comput. Commun., 1998

Specification, validation, and verification of time-critical systems.
Comput. Commun., 1998

On Private-Key Cryptosystems Based on Product Codes.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
A Comment on "A Total Ordering Multicast Protocol Using Propagation Trees".
IEEE Trans. Parallel Distributed Syst., 1997

On a Pattern-Oriented Model for Intrusion Detection.
IEEE Trans. Knowl. Data Eng., 1997

An authentication protocol without trusted third party.
IEEE Commun. Lett., 1997

Secret Sharing in Graph-Based Prohibited Structures.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
An Authentication and Key Distribution System for Open Network Systems.
ACM SIGOPS Oper. Syst. Rev., 1996

Detecting Illicit Leakage of Information in Operating Systems.
J. Comput. Secur., 1996

Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes.
Proceedings of the CCS '96, 1996

1995
Virtual Address Translation for Wide-Address Architectures.
ACM SIGOPS Oper. Syst. Rev., 1995

1994
On Dynamic Threshold Schemes.
Inf. Process. Lett., 1994

On Constructing Secret Sharing Schemes.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

Optimal Information Dispersal for Reliable Communication in Computer Networks.
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994

Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism.
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994

1991
A Pattern-Oriented Intrusion-Detection Model and Its Applications.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

1990
Auditing the Use of Covert Storage Channels in Secure Systems.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990


  Loading...