Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
---|---|---|---|---|---|---|
2016 | Compressed Sensing-Based Clone Identification in Sensor Network | Chia-Mu Yu; Chun-Shien Lu; Sy-Yen Kuo | IEEE Trans. on Wireless Communications 15(4), 3071-3084 | |||
2024 | DEFENDING AGAINST CLEAN-IMAGE BACKDOOR ATTACK IN MULTI-LABEL CLASSIFICATION | Cheng-Yi Lee; Cheng-Chang Tsai; Ching-Chia Kao; Chun-Shien Lu ; Chia-Mu Yu | ||||
2022 | DPGEN: Differentially Private Generative Energy-Guided Network for Natural Image Synthesis | Jia-Wei Chen; Chia-Mu Yu; Ching-Chia Kao; Tzai-Wei Pang; Chun-Shien Lu | ||||
2021 | (k,ε,δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy | Yao-Tung Tsou; Mansour Naser Alraja; Li-Sheng Chen; Yu-Hsiang Chang; Yung-Li Hu; Yennun Huang ; Chia-Mu Yu; Pei-Yuan Tsai | Service-Oriented Computing and Applications 15(3), 175-185 | |||
2015 | New Techniques for Streaming Authenticated Data Structures | Chia-Mu Yu; Shin-Ying Huang; Yennun Huang | ||||
2024 | On the Higher Moment Disparity of Backdoor Attacks | Ching-Chia Kao; Cheng-Yi Lee; Chun-Shien Lu ; Chu-Song Chen ; Chia-Mu Yu | ||||
2021 | Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics | Jia-Wei Chen; Li-Ju Chen; Chia-Mu Yu; Chun-Shien Lu | ||||
2008 | Practical Pairwise Key Establishment Schemes for Wireless Sensor Networks via Constrained Random Perturbation | Chia-Mu Yu; Chun-Shien Lu; Sy-Yen Kuo | TR-IIS-08-013 | |||
- | Privacy Aware Data Deduplication for Side Channel in Cloud Storage | Chia-Mu Yu; Sarada Gochhayat; Mauro Conti; Chun-Shien Lu | IEEE Transactions on Cloud Computing 8(2), 597-609 |