Παρακολούθηση
Chia-Mu Yu
Chia-Mu Yu
National Yang Ming Chiao Tung University
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα nycu.edu.tw - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy
X Ren, CM Yu, W Yu, S Yang, X Yang, JA McCann, SY Philip
IEEE Transactions on Information Forensics and Security 13 (9), 2151-2166, 2018
3092018
Cafe: Catastrophic data leakage in vertical federated learning
X Jin, PY Chen, CY Hsu, CM Yu, T Chen
Advances in Neural Information Processing Systems 34, 994-1006, 2021
2082021
Compressed sensing detector design for space shift keying in MIMO systems
CM Yu, SH Hsieh, HW Liang, CS Lu, WH Chung, SY Kuo, SC Pei
IEEE Communications Letters 16 (10), 1556-1559, 2012
1132012
Mobile sensor network resilient against node replication attacks
CM Yu, CS Lu, SY Kuo
2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2008
1082008
Efficient and distributed detection of node replication attacks in mobile sensor networks
CM Yu, CS Lu, SY Kuo
2009 IEEE 70th Vehicular Technology Conference Fall, 1-5, 2009
882009
RARE: Defeating side channels based on data-deduplication in cloud storage
Z Pooranian, KC Chen, CM Yu, M Conti
IEEE INFOCOM 2018-IEEE conference on computer communications workshops …, 2018
742018
Compressed sensing-based clone identification in sensor networks
CM Yu, CS Lu, SY Kuo
IEEE Transactions on wireless communications 15 (4), 3071-3084, 2016
672016
Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?
YL Tsai, CY Hsu, C Xie, CH Lin, JY Chen, B Li, PY Chen, CM Yu, ...
arXiv preprint arXiv:2310.10012, 2023
642023
Localized algorithms for detection of node replication attacks in mobile sensor networks
CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE transactions on information forensics and security 8 (5), 754-768, 2013
642013
Empirical evaluation on synthetic data generation with generative adversarial network
PH Lu, PC Wang, CM Yu
Proceedings of the 9th International Conference on Web Intelligence, Mining …, 2019
602019
Top- Query Result Completeness Verification in Tiered Sensor Networks
CM Yu, GK Ni, Y Chen, E Gelenbe, SY Kuo
IEEE Transactions on Information Forensics and Security 9 (1), 109-124, 2013
552013
Privacy aware data deduplication for side channel in cloud storage
CM Yu, SP Gochhayat, M Conti, CS Lu
IEEE Transactions on Cloud Computing 8 (2), 597-609, 2018
532018
Noninteractive pairwise key establishment for sensor networks
CM Yu, CS Lu, SY Kuo
IEEE Transactions on Information Forensics and Security 5 (3), 556-569, 2010
492010
Perceptual indistinguishability-net (pi-net): Facial image obfuscation with manipulable semantics
JW Chen, LJ Chen, CM Yu, CS Lu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
462021
Privacy-preserving power request in smart grid networks
CM Yu, CY Chen, SY Kuo, HC Chao
IEEE Systems Journal 8 (2), 441-449, 2013
462013
Practical and secure multidimensional query framework in tiered sensor networks
CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE Transactions on Information Forensics and Security 6 (2), 241-255, 2011
432011
Proof of ownership in deduplicated cloud storage with mobile device efficiency
CM Yu, CY Chen, HC Chao
IEEE network 29 (2), 51-55, 2015
342015
On the limitation of local intrinsic dimensionality for characterizing the subspaces of adversarial examples
PH Lu, PY Chen, CM Yu
arXiv preprint arXiv:1803.09638, 2018
302018
Detecting deepfake-forged contents with separable convolutional neural network and image segmentation
CM Yu, CT Chang, YW Ti
arXiv preprint arXiv:1912.12184, 2019
292019
Constrained function-based message authentication for sensor networks
CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE Transactions on Information Forensics and Security 6 (2), 407-425, 2011
292011
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20