追蹤
Yu-Hsi Chiang
Yu-Hsi Chiang
在 csie.ntu.edu.tw 的電子郵件地址已通過驗證
標題
引用次數
引用次數
年份
SafeChain: Securing Trigger-Action Programming from Attack Chains
KH Hsu, YH Chiang, HC Hsiao
IEEE Transactions on Information Forensics and Security 14 (10), 2607-2622, 2019
462019
Low-rate overuse flow tracer (loft): An efficient and scalable algorithm for detecting overuse flows
S Scherrer, CY Wu, YH Chiang, B Rothenberger, DE Asoni, A Sateesan, ...
2021 40th International Symposium on Reliable Distributed Systems (SRDS …, 2021
102021
On the privacy risks of compromised trigger-action platforms
YH Chiang, HC Hsiao, CM Yu, THJ Kim
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
102020
Formal derivation of greedy algorithms from relational specifications: a tutorial
YH Chiang, SC Mu
Journal of Logical and Algebraic Methods in Programming 85 (5), 879-905, 2016
52016
Queueing and glueing for optimal partitioning (functional pearl)
SC Mu, YH Chiang, YH Lyu
Proceedings of the 21st ACM SIGPLAN International Conference on Functional …, 2016
2016
系統目前無法執行作業,請稍後再試。
文章 1–5