Collaborative detection of DDoS attacks over multiple network domains Y Chen, K Hwang, WS Ku IEEE Transactions on parallel and distributed systems 18 (12), 1649-1662, 2007 | 369 | 2007 |
Strike (with) a pose: Neural networks are easily fooled by strange poses of familiar objects MA Alcorn, Q Li, Z Gong, C Wang, L Mai, WS Ku, A Nguyen Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019 | 336 | 2019 |
Adversarial and Clean Data Are Not Twins Z Gong, W Wang, WS Ku arXiv preprint arXiv:1704.04960, 2017 | 332* | 2017 |
Malicious node detection in wireless sensor networks using weighted trust evaluation IM Atakli, H Hu, Y Chen, WS Ku, Z Su Proceedings of the 2008 Spring simulation multiconference, 836-843, 2008 | 211 | 2008 |
Leveraging spatio-temporal redundancy for RFID data cleansing H Chen, WS Ku, H Wang, MT Sun Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010 | 129 | 2010 |
The multi-rule partial sequenced route query H Chen, WS Ku, MT Sun, R Zimmermann Proceedings of the 16th ACM SIGSPATIAL international conference on Advances …, 2008 | 117 | 2008 |
Spatial query integrity with voronoi neighbors L Hu, W Ku, S Bakiras, C Shahabi IEEE Transactions on Knowledge and Data Engineering 25 (4), 863-876, 2013 | 112 | 2013 |
Malicious Node Detection in Wireless Sensor Networks Y Chen, H Chen, WS Ku Security in RFID and Sensor Networks, 361, 2010 | 104* | 2010 |
Adversarial texts with gradient methods Z Gong, W Wang, B Li, D Song, WS Ku arXiv preprint arXiv:1801.07175, 2018 | 84 | 2018 |
Efficient evaluation of k-range nearest neighbor queries in road networks J Bao, CY Chow, MF Mokbel, WS Ku 2010 Eleventh international conference on mobile data Management, 115-124, 2010 | 83 | 2010 |
Location-based spatial query processing with data sharing in wireless broadcast environments WS Ku, R Zimmermann, H Wang IEEE Transactions on mobile computing 7 (6), 778-791, 2008 | 79 | 2008 |
Distributed continuous range query processing on moving objects H Wang, R Zimmermann, WS Ku International Conference on Database and Expert Systems Applications, 655-665, 2006 | 73 | 2006 |
Query integrity assurance of location-based services accessing outsourced spatial databases WS Ku, L Hu, C Shahabi, H Wang Advances in Spatial and Temporal Databases: 11th International Symposium …, 2009 | 68 | 2009 |
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms J Feng, Y Chen, WS Ku, P Liu 2010 39th International Conference on Parallel Processing Workshops, 251-258, 2010 | 67 | 2010 |
Privacy protected query processing on spatial networks WS Ku, R Zimmermann, WC Peng, S Shroff 2007 IEEE 23rd International Conference on Data Engineering Workshop, 215-220, 2007 | 62 | 2007 |
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol J Feng, Y Chen, D Summerville, WS Ku, Z Su 2011 IEEE Consumer Communications and Networking Conference (CCNC), 521-522, 2011 | 58 | 2011 |
Privacy protected spatial query processing for advanced location based services WS Ku, Y Chen, R Zimmermann Wireless personal communications 51, 53-65, 2009 | 54 | 2009 |
A cloaking algorithm based on spatial networks for location privacy PY Li, WC Peng, TW Wang, WS Ku, J Xu, JA Hamilton Jr 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2008 | 54 | 2008 |
Efficient parallel skyline evaluation using MapReduce J Zhang, X Jiang, WS Ku, X Qin IEEE Transactions on Parallel and Distributed Systems 27 (7), 1996-2009, 2015 | 51 | 2015 |
The partial sequenced route query with traveling rules in road networks H Chen, WS Ku, MT Sun, R Zimmermann GeoInformatica 15, 541-569, 2011 | 51 | 2011 |