Localized algorithms for detection of node replication attacks in mobile sensor networks CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE transactions on information forensics and security 8 (5), 754-768, 2013
64 2013 Practical and secure multidimensional query framework in tiered sensor networks CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE Transactions on Information Forensics and Security 6 (2), 241-255, 2011
43 2011 Constrained function-based message authentication for sensor networks CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE Transactions on Information Forensics and Security 6 (2), 407-425, 2011
29 2011 MoteSec-aware: a practical secure mechanism for wireless sensor networks YT Tsou, CS Lu, SY Kuo
IEEE Transactions on Wireless Communications 12 (6), 2817-2829, 2013
28 2013 RoD: Evaluating the risk of data disclosure using noise estimation for differential privacy YT Tsou, HL Chen, JY Chen
IEEE Transactions on Big Data 7 (1), 214-226, 2019
20 2019 SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks YT Tsou, CS Lu, SY Kuo
Computer Communications 108, 1-16, 2017
17 2017 Data-driven approach for evaluating risk of disclosure and utility in differentially private data release KC Chen, CM Yu, BC Tai, SC Li, YT Tsou, Y Huang, CM Lin
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
14 2017 Evaluating the risk of data disclosure using noise estimation for differential privacy HL Chen, JY Chen, YT Tsou, CM Yu, BC Tai, SC Li, Y Huang, CM Lin
2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing …, 2017
12 2017 Privacy-and integrity-preserving range query in wireless sensor networks YT Tsou, CS Lu, SY Kuo
2012 IEEE Global Communications Conference (GLOBECOM), 328-334, 2012
12 2012 Counteracting UDP flooding attacks in SDN YH Tung, HC Wei, YW Ti, YT Tsou, N Saxena, CM Yu
Electronics 9 (8), 1239, 2020
11 2020 Compressive sensing-based adaptive top-k query over compression domain in wireless sensor networks YS Chen, YT Tsou
2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017
10 2017 STT-DPSA: Digital PUF-based secure authentication using STT-MRAM for the Internet of things WC Chien, YC Chang, YT Tsou, SY Kuo, CR Chang
Micromachines 11 (5), 502, 2020
9 2020 PPDCA: privacy-preserving crowdsourcing data collection and analysis with randomized response YT Tsou, BC Lin
IEEE Access 6, 76970-76983, 2018
9 2018 PPDCA: privacy-preserving crowdsensing data collection and analysis with randomized response BC Lin, SH Wu, YT Tsou, Y Huang
2018 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2018
9 2018 Malware detection apparatus, malware detection method and computer program product thereof DAI Shih-Yao, T Yao-Tung, TY Lee, YEN Castle, SY Kuo, JS Wu
US Patent App. 13/115,848, 2012
7 2012 DPARM: Differentially private association rules mining YT Tsou, H Zhen, X Jiang, Y Huang, SY Kuo
IEEE Access 8, 142131-142147, 2020
6 2020 SFTopk: Secure Functional Top- Query via Untrusted Data Storage YT Tsou, YL Hu, Y Huang, SY Kuo
IEEE Access 3, 2875-2890, 2015
6 2015 Pctopk: Privacy-and correctness-preserving functional top-k query on un-trusted data storage in two-tiered sensor networks YT Tsou, YL Hu, Y Huang, SY Kuo
2014 IEEE 33rd International Symposium on Reliable Distributed Systems, 191-200, 2014
6 2014 ( )-Anonymization: privacy-preserving data release based on k -anonymity and differential privacy YT Tsou, MN Alraja, LS Chen, YH Chang, YL Hu, Y Huang, CM Yu, ...
Service Oriented Computing and Applications 15 (3), 175-185, 2021
4 2021 SPARR: Spintronics-based private aggregatable randomized response for crowdsourced data collection and analysis YT Tsou, H Zhen, SY Kuo, CR Chang, A Fukushima, BD Rong
Computer Communications 152, 8-18, 2020
3 2020