: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy X Ren, CM Yu, W Yu, S Yang, X Yang, JA McCann, SY Philip IEEE Transactions on Information Forensics and Security 13 (9), 2151-2166, 2018 | 264 | 2018 |
Cafe: Catastrophic data leakage in vertical federated learning X Jin, PY Chen, CY Hsu, CM Yu, T Chen Advances in Neural Information Processing Systems 34, 994-1006, 2021 | 162 | 2021 |
Compressed sensing detector design for space shift keying in MIMO systems CM Yu, SH Hsieh, HW Liang, CS Lu, WH Chung, SY Kuo, SC Pei IEEE Communications Letters 16 (10), 1556-1559, 2012 | 110 | 2012 |
Mobile sensor network resilient against node replication attacks CM Yu, CS Lu, SY Kuo 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2008 | 105 | 2008 |
Efficient and distributed detection of node replication attacks in mobile sensor networks CM Yu, CS Lu, SY Kuo 2009 IEEE 70th Vehicular Technology Conference Fall, 1-5, 2009 | 86 | 2009 |
RARE: Defeating side channels based on data-deduplication in cloud storage Z Pooranian, KC Chen, CM Yu, M Conti IEEE INFOCOM 2018-IEEE conference on computer communications workshops …, 2018 | 68 | 2018 |
Compressed sensing-based clone identification in sensor networks CM Yu, CS Lu, SY Kuo IEEE Transactions on wireless communications 15 (4), 3071-3084, 2016 | 64 | 2016 |
Localized algorithms for detection of node replication attacks in mobile sensor networks CM Yu, YT Tsou, CS Lu, SY Kuo IEEE transactions on information forensics and security 8 (5), 754-768, 2013 | 64 | 2013 |
Top- Query Result Completeness Verification in Tiered Sensor Networks CM Yu, GK Ni, Y Chen, E Gelenbe, SY Kuo IEEE Transactions on Information Forensics and Security 9 (1), 109-124, 2013 | 53 | 2013 |
Noninteractive pairwise key establishment for sensor networks CM Yu, CS Lu, SY Kuo IEEE Transactions on Information Forensics and Security 5 (3), 556-569, 2010 | 49 | 2010 |
Empirical evaluation on synthetic data generation with generative adversarial network PH Lu, PC Wang, CM Yu Proceedings of the 9th International Conference on Web Intelligence, Mining …, 2019 | 47 | 2019 |
Privacy aware data deduplication for side channel in cloud storage CM Yu, SP Gochhayat, M Conti, CS Lu IEEE Transactions on Cloud Computing 8 (2), 597-609, 2018 | 45 | 2018 |
Privacy-preserving power request in smart grid networks CM Yu, CY Chen, SY Kuo, HC Chao IEEE Systems Journal 8 (2), 441-449, 2013 | 44 | 2013 |
Practical and secure multidimensional query framework in tiered sensor networks CM Yu, YT Tsou, CS Lu, SY Kuo IEEE Transactions on Information Forensics and Security 6 (2), 241-255, 2011 | 42 | 2011 |
Proof of ownership in deduplicated cloud storage with mobile device efficiency CM Yu, CY Chen, HC Chao IEEE network 29 (2), 51-55, 2015 | 34 | 2015 |
Perceptual indistinguishability-net (pi-net): Facial image obfuscation with manipulable semantics JW Chen, LJ Chen, CM Yu, CS Lu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 32 | 2021 |
On the limitation of local intrinsic dimensionality for characterizing the subspaces of adversarial examples PH Lu, PY Chen, CM Yu arXiv preprint arXiv:1803.09638, 2018 | 29 | 2018 |
Constrained function-based message authentication for sensor networks CM Yu, YT Tsou, CS Lu, SY Kuo IEEE Transactions on Information Forensics and Security 6 (2), 407-425, 2011 | 29 | 2011 |
Key management in Internet of Things via Kronecker product IC Tsai, CM Yu, H Yokota, SY Kuo 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing …, 2017 | 26 | 2017 |
Privacy-preserving multikeyword similarity search over outsourced cloud data CM Yu, CY Chen, HC Chao IEEE systems journal 11 (2), 385-394, 2015 | 26 | 2015 |