Yu-Hsi Chiang

According to our database1, Yu-Hsi Chiang authored at least 6 papers between 2016 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

2020
On the Privacy Risks of Compromised Trigger-Action Platforms.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
SafeChain: Securing Trigger-Action Programming From Attack Chains.
IEEE Trans. Inf. Forensics Secur., 2019

SAFECHAIN: Securing Trigger-Action Programming from Attack Chains (Extended Technical Report).
CoRR, 2019

2016
Formal derivation of Greedy algorithms from relational specifications: A tutorial.
J. Log. Algebraic Methods Program., 2016

Queueing and glueing for optimal partitioning (functional pearl).
Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, 2016


  Loading...