What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ee-Chien Chang
Google Scholar
46
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
AttacKG+: Boosting attack graph construction with Large Language Models.
Yongheng Zhang
Tingwen Du
Yunshan Ma
Xiang Wang
Yi Xie
Guozheng Yang
Yuliang Lu
Ee-Chien Chang
2025
journals/tifs
FOADA: Toward Robust Open-World Mobile App Fingerprinting.
Jiajun Gong
Guotao Meng
Wei Cai
Siyuan Liang
Tao Wang
Ee-Chien Chang
2024
conf/asiaccs
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers.
Zhiang Li
Daisuke Mashima
Wen Shei Ong
Ertem Esiner
Zbigniew Kalbarczyk
Ee-Chien Chang
2024
conf/asiaccs
DISCO: Dynamic Searchable Encryption with Constant State.
Xiangfu Song
Yu Zheng
Jianli Bai
Changyu Dong
Zheli Liu
Ee-Chien Chang
2024
conf/ndss
Secret-Shared Shuffle with Malicious Security.
Xiangfu Song
Dong Yin
Jianli Bai
Changyu Dong
Ee-Chien Chang
2024
conf/acsac
T-Edge: Trusted Heterogeneous Edge Computing.
Jiamin Shen
Yao Chen
Weng-Fai Wong
Ee-Chien Chang
2023
conf/asiaccs
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers.
Jiyi Zhang
Han Fang
Wesley Joon-Wie Tann
Ke Xu
Chengfang Fang
Ee-Chien Chang
2023
conf/dsn
Poisoning Online Learning Filters by Shifting on the Move.
Wesley Joon-Wie Tann
Ee-Chien Chang
2023
conf/dsn
Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training.
Daisuke Mashima
Muhammad M. Roomi
Bennet Ng
Zbigniew Kalberczyk
S. M. Suhail Hussain
Ee-Chien Chang
2023
conf/acsac
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication.
Jianli Bai
Xiangfu Song
Xiaowu Zhang
Qifan Wang
Shujie Cui
Ee-Chien Chang
Giovanni Russello
2022
journals/tifs
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX.
Qin Jiang
Ee-Chien Chang
Yong Qi
Saiyu Qi
Pengfei Wu
Jianfeng Wang
2022
conf/asiaccs
Confusing and Detecting ML Adversarial Attacks with Injected Attractors.
Jiyi Zhang
Ee-Chien Chang
Hwee Kuan Lee
2022
conf/asiaccs
Scalable Private Decision Tree Evaluation with Sublinear Communication.
Jianli Bai
Xiangfu Song
Shujie Cui
Ee-Chien Chang
Giovanni Russello
2022
conf/ndss
Hybrid Trust Multi-party Computation with Trusted Execution Environment.
Pengfei Wu
Jianting Ning
Jiamin Shen
Hongbing Wang
Ee-Chien Chang
2021
conf/esorics
Common Component in Black-Boxes Is Prone to Attacks.
Jiyi Zhang
Wesley Joon-Wie Tann
Ee-Chien Chang
Hwee Kuan Lee
2021
conf/asiaccs
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning.
Wesley Joon-Wie Tann
Jackie Tan Jin Wei
Joanna Purba
Ee-Chien Chang
2021
conf/acsac
TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment.
Mingyuan Gao
Hung Dang
Ee-Chien Chang
2019
journals/tifs
Passive Attacks Against Searchable Encryption.
Jianting Ning
Jia Xu
Kaitai Liang
Fan Zhang
Ee-Chien Chang
2019
conf/ccs
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules.
Jianting Ning
Geong Sen Poh
Jia-Ch'ng Loh
Jason Chia
Ee-Chien Chang
2019
conf/ccs
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment.
Ziqi Yang
Jiyi Zhang
Ee-Chien Chang
Zhenkai Liang
2019
conf/esorics
Towards a Marketplace for Secure Outsourced Computations.
Hung Dang
Dat Le Tien
Ee-Chien Chang
2018
conf/ccs
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System.
Anand Agrawal
Chuadhry Mujeeb Ahmed
Ee-Chien Chang
2018
conf/uss
BNV: Enabling Scalable Network Experimentation through Bare-metal Network Virtualization.
Pravein Govindan Kannan
Ahmad Soltani
Mun Choon Chan
Ee-Chien Chang
2017
journals/popets
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute.
Hung Dang
Tien Tuan Anh Dinh
Ee-Chien Chang
Beng Chin Ooi
2017
conf/ccs
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated.
Hung Dang
Erick Purwanto
Ee-Chien Chang
2017
conf/ccs
Evading Classifiers by Morphing in the Dark.
Hung Dang
Yue Huang
Ee-Chien Chang
2016
conf/ih
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation.
Hung Dang
Yun Long Chong
Francois Brun
Ee-Chien Chang
2015
conf/uss
M2R: Enabling Stronger Privacy in MapReduce Computation.
Tien Tuan Anh Dinh
Prateek Saxena
Ee-Chien Chang
Beng Chin Ooi
Chunwang Zhang
2014
conf/ccs
Differential privacy with δ-neighbourhood for spatial and dynamic datasets.
Chengfang Fang
Ee-Chien Chang
2013
conf/ccs
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage.
Jia Xu
Ee-Chien Chang
Jianying Zhou
2012
conf/ccs
Towards efficient proofs of retrievability.
Jia Xu
Ee-Chien Chang
2010
conf/acns
Secure Sketch for Multiple Secrets.
Chengfang Fang
Qiming Li
Ee-Chien Chang
2010
conf/esorics
Website Fingerprinting and Identification Using Ordered Feature Sequences.
Liming Lu
Ee-Chien Chang
Mun Choon Chan
2010
conf/acsac
Securing interactive sessions using mobile device through visual channel and visual inspection.
Chengfang Fang
Ee-Chien Chang
2009
conf/ctrsa
Short Redactable Signatures Using Random Trees.
Ee-Chien Chang
Chee Liang Lim
Jia Xu
2008
conf/ccs
A general model of probabilistic packet marking for IP traceback.
Liming Lu
Mun Choon Chan
Ee-Chien Chang
2008
conf/ih
Residual Information of Redacted Images Hidden in the Compression Artifacts.
Nicholas Zhong-Yang Ho
Ee-Chien Chang
2008
conf/ih
Information Leakage in Optimal Anonymized and Diversified Data.
Chengfang Fang
Ee-Chien Chang
2008
conf/esorics
Remote Integrity Check with Dishonest Storage Server.
Ee-Chien Chang
Jia Xu
2007
conf/acns
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.
Ratna Dutta
Ee-Chien Chang
Sourav Mukhopadhyay
2006
conf/ccs
Finding the original point set hidden among chaff.
Ee-Chien Chang
Ren Shen
Francis Weijian Teo
2006
conf/acns
Effect of Malicious Synchronization.
Mun Choon Chan
Ee-Chien Chang
Liming Lu
Peng Song Ngiam
2006
conf/eurocrypt
Hiding Secret Points Amidst Chaff.
Ee-Chien Chang
Qiming Li
2005
conf/ih
Pervasive Random Beacon in the Internet for Covert Coordination.
Hui Huang Lee
Ee-Chien Chang
Mun Choon Chan
2004
conf/ih
On the Possibility of Non-invertible Watermarking Schemes.
Qiming Li
Ee-Chien Chang
2002
conf/ih
Security of Public Watermarking Schemes for Binary Sequences.
Qiming Li
Ee-Chien Chang
Coauthors
Ahmad Soltani
(1)
Anand Agrawal
(1)
Beng Chin Ooi
(2)
Bennet Ng
(1)
Changyu Dong
(2)
Chee Liang Lim
(1)
Chengfang Fang
(5)
Chuadhry Mujeeb Ahmed
(1)
Chunwang Zhang
(1)
Daisuke Mashima
(2)
Dat Le Tien
(1)
Dong Yin
(1)
Ee-Chien Chang
(46)
Erick Purwanto
(1)
Ertem Esiner
(1)
Fan Zhang
(1)
Francis Weijian Teo
(1)
Francois Brun
(1)
Geong Sen Poh
(1)
Giovanni Russello
(2)
Guotao Meng
(1)
Guozheng Yang
(1)
Han Fang
(1)
Hongbing Wang
(1)
Hui Huang Lee
(1)
Hung Dang
(6)
Hwee Kuan Lee
(2)
Jackie Tan Jin Wei
(1)
Jason Chia
(1)
Jia Xu
(5)
Jia-Ch'ng Loh
(1)
Jiajun Gong
(1)
Jiamin Shen
(2)
Jianfeng Wang
(1)
Jianli Bai
(4)
Jianting Ning
(3)
Jianying Zhou
(1)
Jiyi Zhang
(4)
Joanna Purba
(1)
Kaitai Liang
(1)
Ke Xu
(1)
Liming Lu
(3)
Mingyuan Gao
(1)
Muhammad M. Roomi
(1)
Mun Choon Chan
(5)
Nicholas Zhong-Yang Ho
(1)
Peng Song Ngiam
(1)
Pengfei Wu
(2)
Prateek Saxena
(1)
Pravein Govindan Kannan
(1)
Qifan Wang
(1)
Qiming Li
(4)
Qin Jiang
(1)
Ratna Dutta
(1)
Ren Shen
(1)
S. M. Suhail Hussain
(1)
Saiyu Qi
(1)
Shujie Cui
(2)
Siyuan Liang
(1)
Sourav Mukhopadhyay
(1)
Tao Wang
(1)
Tien Tuan Anh Dinh
(2)
Tingwen Du
(1)
Wei Cai
(1)
Wen Shei Ong
(1)
Weng-Fai Wong
(1)
Wesley Joon-Wie Tann
(4)
Xiang Wang
(1)
Xiangfu Song
(4)
Xiaowu Zhang
(1)
Yao Chen
(1)
Yi Xie
(1)
Yong Qi
(1)
Yongheng Zhang
(1)
Yu Zheng
(1)
Yue Huang
(1)
Yuliang Lu
(1)
Yun Long Chong
(1)
Yunshan Ma
(1)
Zbigniew Kalbarczyk
(1)
Zbigniew Kalberczyk
(1)
Zheli Liu
(1)
Zhenkai Liang
(1)
Zhiang Li
(1)
Ziqi Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to