Chia-Mu Yu
Title
Cited by
Cited by
Year
: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy
X Ren, CM Yu, W Yu, S Yang, X Yang, JA McCann, SY Philip
IEEE Transactions on Information Forensics and Security 13 (9), 2151-2166, 2018
932018
Mobile sensor network resilient against node replication attacks
CM Yu, CS Lu, SY Kuo
2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2008
932008
Compressed sensing detector design for space shift keying in MIMO systems
CM Yu, SH Hsieh, HW Liang, CS Lu, WH Chung, SY Kuo, SC Pei
IEEE Communications Letters 16 (10), 1556-1559, 2012
842012
Efficient and distributed detection of node replication attacks in mobile sensor networks
CM Yu, CS Lu, SY Kuo
2009 IEEE 70th Vehicular Technology Conference Fall, 1-5, 2009
732009
Localized algorithms for detection of node replication attacks in mobile sensor networks
CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE transactions on information forensics and security 8 (5), 754-768, 2013
462013
Noninteractive pairwise key establishment for sensor networks
CM Yu, CS Lu, SY Kuo
IEEE Transactions on Information Forensics and Security 5 (3), 556-569, 2010
462010
R2-D2: color-inspired convolutional neural network (CNN)-based android malware detections
TT Hsien-De Huang, HY Kao
2018 IEEE International Conference on Big Data (Big Data), 2633-2642, 2018
452018
CSI: compressed sensing-based clone identification in sensor networks
CM Yu, CS Lu, SY Kuo
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
452012
Top- Query Result Completeness Verification in Tiered Sensor Networks
CM Yu, GK Ni, Y Chen, E Gelenbe, SY Kuo
IEEE Transactions on Information Forensics and Security 9 (1), 109-124, 2013
422013
Practical and secure multidimensional query framework in tiered sensor networks
CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE Transactions on Information Forensics and Security 6 (2), 241-255, 2011
332011
RARE: Defeating side channels based on data-deduplication in cloud storage
Z Pooranian, KC Chen, CM Yu, M Conti
IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops …, 2018
312018
Privacy-preserving power request in smart grid networks
CM Yu, CY Chen, SY Kuo, HC Chao
IEEE Systems Journal 8 (2), 441-449, 2013
312013
Constrained function-based message authentication for sensor networks
CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE Transactions on Information Forensics and Security 6 (2), 407-425, 2011
272011
A simple non-interactive pairwise key establishment scheme in sensor networks
CM Yu, CS Lu, SY Kuo
2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2009
252009
Proof of ownership in deduplicated cloud storage with mobile device efficiency
CM Yu, CY Chen, HC Chao
IEEE network 29 (2), 51-55, 2015
232015
Acquiring authentic data in unattended wireless sensor networks
CM Yu, CY Chen, CS Lu, SY Kuo, HC Chao
Sensors 10 (4), 2770-2792, 2010
202010
Privacy-preserving multikeyword similarity search over outsourced cloud data
CM Yu, CY Chen, HC Chao
IEEE systems journal 11 (2), 385-394, 2015
172015
On the limitation of local intrinsic dimensionality for characterizing the subspaces of adversarial examples
PH Lu, PY Chen, CM Yu
arXiv preprint arXiv:1803.09638, 2018
162018
Compressed sensing-based clone identification in sensor networks
CM Yu, CS Lu, SY Kuo
IEEE Transactions on Wireless Communications 15 (4), 3071-3084, 2016
152016
On the limitation of magnet defense against L1-based adversarial examples
PH Lu, PY Chen, KC Chen, CM Yu
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
132018
The system can't perform the operation now. Try again later.
Articles 1–20