Chu, Cheng-Kang
13349  results:
Search for persons X
?
1

How to Securely Delegate and Revoke Partial Authorization C..:

Sun, Meng ; Lai, Junzuo ; Wu, Wei...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
3

Abnormal Traffic Detection: Traffic Feature Extraction and ..:

Li, Zecheng ; Chen, Shengyuan ; Dai, Hongshu...
IEEE Transactions on Reliability.  72 (2023)  2 - p. 498-510 , 2023
 
?
7

Towards Secure and Trustworthy Flash Loans: A Blockchain-Ba..:

, In: Network and System Security; Lecture Notes in Computer Science,
Xie, Yining ; Kang, Xin ; Li, Tieyan.. - p. 499-513 , 2022
 
?
10

Keyed Non-parametric Hypothesis Tests: Protecting Machine L..:

, In: Network and System Security; Lecture Notes in Computer Science,
Cheng, Yao ; Chu, Cheng-Kang ; Lin, Hsiao-Ying.. - p. 632-645 , 2019
 
?
11

PreCrime to the rescue : defeating mobile malware one-st..:

, In: Proceedings of 5th Asia-Pacific Workshop on Systems,
Tan, Cheng ; Li, Haibo ; Xia, Yubin... - p. 1-7 , 2014
 
?
12

Building trusted path on untrusted device drivers for mobil..:

, In: Proceedings of 5th Asia-Pacific Workshop on Systems,
Li, Wenhao ; Ma, Mingyang ; Han, Jinchen... - p. 1-7 , 2014
 
?
13

Chosen-ciphertext secure multi-hop identity-based condition..:

Liang, Kaitai ; Chu, Cheng-Kang ; Tan, Xiao...
Theoretical Computer Science.  539 (2014)  - p. 87-105 , 2014
 
?
14

Security Concerns in Popular Cloud Storage Services:

Chu, Cheng-Kang ; Zhu, Wen-Tao ; Han, Jin...
IEEE Pervasive Computing.  12 (2013)  4 - p. 50-57 , 2013
 
?
15

Privacy-preserving smart metering with regional statistics ..:

, In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security,
Chu, Cheng-Kang ; Liu, Joseph K. ; Wong, Jun Wen.. - p. 369-380 , 2013
 
1-15