Подписаться
Yao-Tung Tsou (鄒耀東)
Yao-Tung Tsou (鄒耀東)
DeCloak Intelligences Co. (帝濶智慧科技)
Подтвержден адрес электронной почты в домене de-cloak.com
Название
Процитировано
Процитировано
Год
Localized algorithms for detection of node replication attacks in mobile sensor networks
CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE transactions on information forensics and security 8 (5), 754-768, 2013
642013
Practical and secure multidimensional query framework in tiered sensor networks
CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE Transactions on Information Forensics and Security 6 (2), 241-255, 2011
432011
Constrained function-based message authentication for sensor networks
CM Yu, YT Tsou, CS Lu, SY Kuo
IEEE Transactions on Information Forensics and Security 6 (2), 407-425, 2011
292011
MoteSec-aware: a practical secure mechanism for wireless sensor networks
YT Tsou, CS Lu, SY Kuo
IEEE Transactions on Wireless Communications 12 (6), 2817-2829, 2013
282013
RoD: Evaluating the risk of data disclosure using noise estimation for differential privacy
YT Tsou, HL Chen, JY Chen
IEEE Transactions on Big Data 7 (1), 214-226, 2019
202019
SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks
YT Tsou, CS Lu, SY Kuo
Computer Communications 108, 1-16, 2017
172017
Data-driven approach for evaluating risk of disclosure and utility in differentially private data release
KC Chen, CM Yu, BC Tai, SC Li, YT Tsou, Y Huang, CM Lin
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
142017
Evaluating the risk of data disclosure using noise estimation for differential privacy
HL Chen, JY Chen, YT Tsou, CM Yu, BC Tai, SC Li, Y Huang, CM Lin
2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing …, 2017
122017
Privacy-and integrity-preserving range query in wireless sensor networks
YT Tsou, CS Lu, SY Kuo
2012 IEEE Global Communications Conference (GLOBECOM), 328-334, 2012
122012
Counteracting UDP flooding attacks in SDN
YH Tung, HC Wei, YW Ti, YT Tsou, N Saxena, CM Yu
Electronics 9 (8), 1239, 2020
112020
Compressive sensing-based adaptive top-k query over compression domain in wireless sensor networks
YS Chen, YT Tsou
2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017
102017
STT-DPSA: Digital PUF-based secure authentication using STT-MRAM for the Internet of things
WC Chien, YC Chang, YT Tsou, SY Kuo, CR Chang
Micromachines 11 (5), 502, 2020
92020
PPDCA: privacy-preserving crowdsourcing data collection and analysis with randomized response
YT Tsou, BC Lin
IEEE Access 6, 76970-76983, 2018
92018
PPDCA: privacy-preserving crowdsensing data collection and analysis with randomized response
BC Lin, SH Wu, YT Tsou, Y Huang
2018 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2018
92018
Malware detection apparatus, malware detection method and computer program product thereof
DAI Shih-Yao, T Yao-Tung, TY Lee, YEN Castle, SY Kuo, JS Wu
US Patent App. 13/115,848, 2012
72012
DPARM: Differentially private association rules mining
YT Tsou, H Zhen, X Jiang, Y Huang, SY Kuo
IEEE Access 8, 142131-142147, 2020
62020
SFTopk: Secure Functional Top-Query via Untrusted Data Storage
YT Tsou, YL Hu, Y Huang, SY Kuo
IEEE Access 3, 2875-2890, 2015
62015
Pctopk: Privacy-and correctness-preserving functional top-k query on un-trusted data storage in two-tiered sensor networks
YT Tsou, YL Hu, Y Huang, SY Kuo
2014 IEEE 33rd International Symposium on Reliable Distributed Systems, 191-200, 2014
62014
()-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
YT Tsou, MN Alraja, LS Chen, YH Chang, YL Hu, Y Huang, CM Yu, ...
Service Oriented Computing and Applications 15 (3), 175-185, 2021
42021
SPARR: Spintronics-based private aggregatable randomized response for crowdsourced data collection and analysis
YT Tsou, H Zhen, SY Kuo, CR Chang, A Fukushima, BD Rong
Computer Communications 152, 8-18, 2020
32020
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20