公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
2018 | A generic web application testing and attack data generation method | Shih, H.-Y.; Lu, H.-L.; Yeh, C.-C.; Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO | Advances in Intelligent Systems and Computing | | | |
2018 | GroupIt: Lightweight Group Key Management for Dynamic IoT Environments | Kung, Y.-H.; HSU-CHUN HSIAO | IEEE Internet of Things Journal | | | |
2020 | Hybrid-Voting: A Hybrid Structured Electronic Voting System | Wang, P.-L.; Yang, S.-H.; HSU-CHUN HSIAO | The Web Conference 2020 - Companion of the World Wide Web Conference, WWW 2020 | | | |
2016 | Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems | Wang, P.S.; Lai, F.; Hsiao, H.-C.; FEI-PEI LAI ; HSU-CHUN HSIAO ; JA-LING WU | IEEE Access | 11 | 4 | |
2022 | Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists | Lin S.-C; Chou K.-H; Chen Y; HSU-CHUN HSIAO ; Cassel D; Bauer L; Jia L. | WWW 2022 - Proceedings of the ACM Web Conference 2022 | 1 | 0 | |
2020 | Keeping Passwords in Your Pocket: Managing Password Locally with Mobile Fingerprint Sensors | Lin, P.-Y.; Zhou, Z.-Y.; Chang, C.-M.; Chen, H.-W.; Tung, S.-P.; HSU-CHUN HSIAO | The Web Conference 2020 - Companion of the World Wide Web Conference, WWW 2020 | | | |
2022 | Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis | Chang, Chun Ming; HSU-CHUN HSIAO ; Lynar, Timothy; Mori, Tatsuya | WWW 2022 - Companion Proceedings of the Web Conference 2022 | 0 | 0 | |
2022 | LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR | Mow, Wei Loon; Huang, Shih Kun; HSU-CHUN HSIAO | 5th IEEE Conference on Dependable and Secure Computing, DSC 2022 and SECSOC 2022 Workshop, PASS4IoT 2022 Workshop SICSA International Paper/Poster Competition in Cybersecurity | 0 | 0 | |
2012 | LAP: Lightweight Anonymity and Privacy. | Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Perrig, Adrian; Yamada, Akira; Nelson, Samuel C.; Gruteser, Marco; HSU-CHUN HSIAO | IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA | 48 | 0 | |
2021 | Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows | Scherrer S; Wu C.-Y; Chiang Y.-H; Rothenberger B; Asoni D.E; Sateesan A; Vliegen J; Mentens N; Perrig A.; HSU-CHUN HSIAO | Proceedings of the IEEE Symposium on Reliable Distributed Systems | 5 | 0 | |
2016 | Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes | Yeh J.-R.; Hsiao H.-C.; AI-CHUN PANG ; HSU-CHUN HSIAO | 11th Asia Joint Conference on Information Security | 8 | 0 | |
2019 | On the Feasibility of Rerouting-Based DDoS Defenses | Tran, M.; Kang, M.S.; Hsiao, H.-C.; Chiang, W.-H.; Tung, S.-P.; HSU-CHUN HSIAO | Proceedings - IEEE Symposium on Security and Privacy | 18 | 0 | |
2020 | On the privacy risks of compromised trigger-action platforms | Chiang, Y.-H.; Hsiao, H.-C.; Yu, C.-M.; Kim, T.H.-J.; HSU-CHUN HSIAO | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | | | |
2020 | On using camera-based visible light communication for security protocols | Chu W.-Y; Yu T.-G; Lin Y.-K; Lee S.-C; HSU-CHUN HSIAO | Proceedings - 2020 IEEE Symposium on Security and Privacy Workshops, SPW 2020 | 1 | 0 | |
2013 | Policy-based secure deletion. | Cachin, Christian; Haralambiev, Kristiyan; Hsiao, Hsu-Chun; HSU-CHUN HSIAO | 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 | 46 | 0 | |
2020 | Poster: Challenges in Stopping Ticket Scalping Bots | Yang, H.-C.; Lee, H.; HSU-CHUN HSIAO | Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020 | | | |
2016 | A practical system for guaranteed access in the presence of DDoS attacks and flash crowds | Kung, Yi Hsuan; Lee, Taeho; Tseng, Po Ning; HSU-CHUN HSIAO ; Kim, Tiffany Hyun Jin; Lee, Soo Bum; Lin, Yue Hsun; Perrig, Adrian | Proceedings - International Conference on Network Protocols, ICNP | 2 | 0 | |
2021 | ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated Transactions | Wang S.-H; Wu C.-C; Liang Y.-C; Hsieh L.-H; HSU-CHUN HSIAO | Proceedings - 2021 IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2021 | 5 | 0 | |
2019 | SafeChain: Securing Trigger-Action Programming from Attack Chains | Hsu, K.-H.; Chiang, Y.-H.; HSU-CHUN HSIAO | IEEE Transactions on Information Forensics and Security | | | |
2017 | SandUSB: An installation-free sandbox for USB peripherals | Loe, E.L.; Hsiao, H.-C.; Kim, T.H.-J.; Lee, S.-C.; HSU-CHUN HSIAO | 2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016 | 12 | 0 | |