A secure erasure code-based cloud storage system with secure data forwarding HY Lin, WG Tzeng IEEE transactions on parallel and distributed systems 23 (6), 995-1003, 2012 | 330 | 2012 |
An efficient solution to the millionaires’ problem based on homomorphic encryption HY Lin, WG Tzeng International Conference on Applied Cryptography and Network Security, 456-466, 2005 | 311 | 2005 |
A secure decentralized erasure code for distributed networked storage HY Lin, WG Tzeng IEEE transactions on Parallel and Distributed Systems 21 (11), 1586-1594, 2010 | 139 | 2010 |
Toward data confidentiality via integrating hybrid encryption schemes and Hadoop distributed file system HY Lin, ST Shen, WG Tzeng, BSP Lin 2012 IEEE 26th International Conference on Advanced Information Networking …, 2012 | 62 | 2012 |
A practical smart metering system supporting privacy preserving billing and load monitoring HY Lin, WG Tzeng, ST Shen, BSP Lin Applied Cryptography and Network Security: 10th International Conference …, 2012 | 60 | 2012 |
An effective integrity check scheme for secure erasure code-based storage systems ST Shen, HY Lin, WG Tzeng IEEE Transactions on Reliability 64 (3), 840-851, 2015 | 39 | 2015 |
Adversarial Machine Learning: Attacks From Laboratories to the Real World HY Lin, B Biggio Computer 54 (5), 56-60, 2021 | 21 | 2021 |
A privacy preserving smart metering system supporting multiple time granularities HY Lin, ST Shen, BSP Lin 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 17 | 2012 |
Long-Term Privacy-Preserving Aggregation With User-Dynamics for Federated Learning Z Liu, HY Lin, Y Liu IEEE Transactions on Information Forensics and Security, 2023 | 16 | 2023 |
SWOON: A Testbed for Secure Wireless Overlay Networks. YL Huang, JD Tygar, HY Lin, LY Yeh, HY Tsai, K Sklower, SP Shieh, ... CSET 8, 1-6, 2008 | 16 | 2008 |
Large-Scale Artificial Intelligence Models HY Lin Computer 55 (05), 76-80, 2022 | 15 | 2022 |
Standing on the Shoulders of AI Giants HY Lin Computer 56 (01), 97-101, 2023 | 11 | 2023 |
A secure fine-grained access control mechanism for networked storage systems HY Lin, J Kubiatowicz, WG Tzeng 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 9 | 2012 |
Vehicle-mounted device upgrade method and related device Y Yanjiang, Z Wei, HY Lin, LI Tieyan, J Shen US Patent App. 16/856,897, 2020 | 7 | 2020 |
Colors of Artificial Intelligence HY Lin Computer 54 (11), 95-99, 2021 | 5 | 2021 |
A decentralized repair mechanism for decentralized erasure code based storage systems HY Lin, WG Tzeng, BS Lin 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 5 | 2011 |
Embedded Artificial Intelligence: Intelligence on Devices HY Lin Computer 56 (9), 90-93, 2023 | 3 | 2023 |
A Survey on Reinforcement Learning Security with Application to Autonomous Driving A Demontis, M Pintor, L Demetrio, K Grosse, HY Lin, C Fang, B Biggio, ... arXiv preprint arXiv:2212.06123, 2022 | 3 | 2022 |
System and method for managing secure communications between modules in a controller area network Y Yanjiang, Z Wei, HY Lin, Q Sha US Patent 11,252,134, 2022 | 3 | 2022 |
In-Vehicle Gateway Communication Method, In-Vehicle Gateway, and Intelligent Vehicle HY Lin, M Zhang, CK CHU US Patent App. 17/139,133, 2021 | 3 | 2021 |