Results 1-40 of 40 (Search time: 0.018 seconds).

Issue DateTitleAuthor(s)SourcescopusWOSFulltext/Archive link
12021Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse FlowsScherrer S; Wu C.-Y; Chiang Y.-H; Rothenberger B; Asoni D.E; Sateesan A; Vliegen J; Mentens N; Perrig A.; HSU-CHUN HSIAO Proceedings of the IEEE Symposium on Reliable Distributed Systems50
22021ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated TransactionsWang S.-H; Wu C.-C; Liang Y.-C; Hsieh L.-H; HSU-CHUN HSIAO Proceedings - 2021 IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 202140
32020On using camera-based visible light communication for security protocolsChu W.-Y; Yu T.-G; Lin Y.-K; Lee S.-C; HSU-CHUN HSIAO Proceedings - 2020 IEEE Symposium on Security and Privacy Workshops, SPW 202010
42020SBC'20 Workshop Welcome MessageHsiao H.-C; Tang Q.; HSU-CHUN HSIAO SBC 2020 - Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, Co-located with AsiaCCS 20200
52020On the privacy risks of compromised trigger-action platformsChiang, Y.-H.; Hsiao, H.-C.; Yu, C.-M.; Kim, T.H.-J.; HSU-CHUN HSIAO Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)10
62020Poster: Challenges in Stopping Ticket Scalping BotsYang, H.-C.; Lee, H.; Hsiao, H.-C.; HSU-CHUN HSIAO Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 202000
72020Hybrid-Voting: A Hybrid Structured Electronic Voting SystemWang, P.-L.; Yang, S.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO The Web Conference 2020 - Companion of the World Wide Web Conference, WWW 202000
82020Keeping Passwords in Your Pocket: Managing Password Locally with Mobile Fingerprint SensorsLin, P.-Y.; Zhou, Z.-Y.; Chang, C.-M.; Chen, H.-W.; Tung, S.-P.; Hsiao, H.-C.; HSU-CHUN HSIAO The Web Conference 2020 - Companion of the World Wide Web Conference, WWW 202000
92019SafeChain: Securing Trigger-Action Programming from Attack ChainsHsu, K.-H.; Chiang, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO IEEE Transactions on Information Forensics and Security2313
102019On the Feasibility of Rerouting-Based DDoS DefensesTran, M.; Kang, M.S.; Hsiao, H.-C.; Chiang, W.-H.; Tung, S.-P.; HSU-CHUN HSIAO ; HSU-CHUN HSIAO Proceedings - IEEE Symposium on Security and Privacy160
112019Dynamic Path Pruning in Symbolic ExecutionChen, Y.-S.; Chen, W.-N.; Wu, C.-Y.; Hsiao, H.-C.; HSU-CHUN HSIAO ; HSU-CHUN HSIAO DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing00
122018GroupIt: Lightweight Group Key Management for Dynamic IoT EnvironmentsKung, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO IEEE Internet of Things Journal3221
132018A generic web application testing and attack data generation methodShih, H.-Y.; Lu, H.-L.; Yeh, C.-C.; Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO Advances in Intelligent Systems and Computing20
142018SDNProbe: Lightweight fault localization in the error-prone environmentKe, Y.-M.; Hsiao, H.-C.; HSU-CHUN HSIAO ; HSU-CHUN HSIAO Proceedings - International Conference on Distributed Computing Systems120
152018DAMUP: Practical and privacy-aware cloud-based DDoS mitigationLin, S.-C.; Huang, P.-W.; Wang, H.-Y.; HSU-CHUN HSIAO ; HSU-CHUN HSIAO IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 201810
162018台灣資安菁英人才培育蕭旭君(Hsu-Chun Hsiao); 黃俊穎(Chun-Ying Huang); 鄭欣明(Shin-Ming Cheng); 黃世昆(Shih-Kun Huang); 劉彥君(Yen-Chun Liu); 吳宗成(Tsung-Cheng Wu); HSU-CHUN HSIAO 資訊安全通訊
172018CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.Wu, Hao; Hsiao, Hsu-Chun; Asoni, Daniele Enrico; Scherrer, Simon; Perrig, Adrian; Hu, Yih-Chun; HSU-CHUN HSIAO Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings00
182017Security implications of redirection trail in popular websites worldwideChang, Li; HSU-CHUN HSIAO ; Jeng, Wei ; Kim, Tiffany Hyun Jin; HSU-CHUN HSIAO 26th International World Wide Web Conference100
192017Traffic-aware patching for cyber security in mobile IoTCheng, S.-M.; Chen, P.-Y.; Lin, C.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO IEEE Communications Magazine4231
202017SandUSB: An installation-free sandbox for USB peripheralsLoe, E.L.; Hsiao, H.-C.; Kim, T.H.-J.; Lee, S.-C.; HSU-CHUN HSIAO ; HSU-CHUN HSIAO 2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016110
212016Decapitation via digital epidemics: A bio-inspired transmissive attackChen, P.-Y.; Lin, C.-C.; Cheng, S.-M.; Hsiao, H.-C.; Huang, C.-Y.; HSU-CHUN HSIAO IEEE Communications Magazine96
222016CICADAS: Congesting the internet with coordinated and decentralized pulsating attacksKe, Y.-M.; Chen, C.-W.; Hsiao, H.-C.; Perrig, A.; HSU-CHUN HSIAO ; HSU-CHUN HSIAO ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security130
232016A secure authorization system in PHR based on CP-ABEChung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C.; FEI-PEI LAI ; HSU-CHUN HSIAO 2015 E-Health and Bioengineering Conference, EHB 201510
242016Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining SystemsWang, P.S.; Lai, F.; Hsiao, H.-C.; FEI-PEI LAI ; HSU-CHUN HSIAO ; JA-LING WU IEEE Access114
252016Securing data planes in software-defined networksChao, T.-W.; Ke, Y.-M.; Chen, B.-H.; Chen, J.-L.; Hsieh, C.J.; Lee, S.-C.; HSU-CHUN HSIAO ; HSU-CHUN HSIAO IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services300
262016SIBRA: Scalable Internet Bandwidth Reservation Architecture.Basescu, Cristina; Reischuk, Raphael M.; Szalachowski, Pawel; Perrig, Adrian; Zhang, Yao; Hsiao, Hsu-Chun; Kubota, Ayumu; Urakawa, Jumpei; HSU-CHUN HSIAO 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016
272016Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration SchemesYeh J.-R.; Hsiao H.-C.; AI-CHUN PANG ; HSU-CHUN HSIAO 11th Asia Joint Conference on Information Security80
282014XIA: architecting a more trustworthy and evolvable internet.Naylor, David; Mukerjee, Matthew K.; Agyapong, Patrick; Grandl, Robert; Kang, Ruogu; Machado, Michel; Brown, Stephanie; Doucette, Cody; Hsiao, Hsu-Chun; Han, Dongsu; Kim, Tiffany Hyun-Jin; Lim, Hyeontaek; Ovon, Carol; Zhou, Dong; Lee, Soo Bum; Lin, Yue-Hsun; Stuart, H. Colleen; Barrett, Daniel Paul; Akella, Aditya; Andersen, David G.; Byers, John W.; Dabbish, Laura; Kaminsky, Michael; Kiesler, Sara B.; Peha, Jon M.; Perrig, Adrian; Seshan, Srinivasan; Sirbu, Marvin A.; Steenkiste, Peter; HSU-CHUN HSIAO Computer Communication Review3523
292014Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region.Wu, Hao; Hsiao, Hsu-Chun; HSU-CHUN HSIAO ; HSU-CHUN HSIAO Proceedings of the 2014 Internet Measurement Conference, IMC 2014, Vancouver, BC, Canada, November 5-7, 2014120
302014YourPassword: applying feedback loops to improve security behavior of managing multiple passwords.Kim, Tiffany Hyun-Jin; Stuart, H. Colleen; Hsiao, Hsu-Chun; Lin, Yue-Hsun; Zhang, Leon; Dabbish, Laura; Kiesler, Sara B.; HSU-CHUN HSIAO 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 201420
312013Policy-based secure deletion.Cachin, Christian; Haralambiev, Kristiyan; Hsiao, Hsu-Chun; HSU-CHUN HSIAO ; HSU-CHUN HSIAO 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013460
322013STRIDE: sanctuary trail - refuge from internet DDoS entrapment.HSU-CHUN HSIAO ; Kim, Tiffany Hyun-Jin; Yoo, Sangjae; Zhang, Xin; Lee, Soo Bum; Gligor, Virgil D.8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013120
332012LAP: Lightweight Anonymity and Privacy.Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Perrig, Adrian; Yamada, Akira; Nelson, Samuel C.; Gruteser, Marco; HSU-CHUN HSIAO ; HSU-CHUN HSIAO IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA460
342011Efficient and secure threshold-based event validation for VANETs.Hsiao, Hsu-Chun; Studer, Ahren; Dubey, Rituik; Shi, Elaine; HSU-CHUN HSIAO ; HSU-CHUN HSIAO Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011300
352011SCION: Scalability, Control, and Isolation on Next-Generation Networks.Zhang, Xin; Hsiao, Hsu-Chun; Hasker, Geoffrey; Chan, Haowen; Perrig, Adrian; HSU-CHUN HSIAO ; HSU-CHUN HSIAO 32nd IEEE Symposium on Security and Privacy, S&P 2011, 22-25 May 2011, Berkeley, California, USA1070
362010SPATE: Small-group PKI-less authenticated trust establishmentLin, Y.-H.; HSU-CHUN HSIAO et al. IEEE Transactions on Mobile Computing 2620
372010Secure distributed data aggregationChan, H.; Hsiao, H.-C.; Perrig, A.; Song, D.; HSU-CHUN HSIAO Foundations and Trends in Databases 70
382009SPATE: small-group PKI-less authenticated trust establishment.Lin, Yue-Hsun; Studer, Ahren; Hsiao, Hsu-Chun; McCune, Jonathan M.; Wang, King-Hang; Krohn, Maxwell N.; Lin, Phen-Lan; Perrig, Adrian; Sun, Hung-Min; HSU-CHUN HSIAO ; HSU-CHUN HSIAO Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Krak?w, Poland, June 22-25, 2009410
392009A study of user-friendly hash comparison schemesHsiao, H.-C.; Lin, Y.-H.; Studer, A.; Studer, C.; Wang, K.-H.; Kikuchi, H.; Perrig, A.; Sun, H.-M.; HSU-CHUN HSIAO ; HSU-CHUN HSIAO Annual Computer Security Applications Conference320
402007感測網路的安全資料彙集機制之概觀陳煜弦; 蕭旭君 ; 雷欽隆 資訊安全通訊