English  |  正體中文  |  简体中文  |  2823024  
???header.visitor??? :  30211221    ???header.onlineuser??? :  949
???header.sponsordeclaration???
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
???ui.leftmenu.abouttair???

???ui.leftmenu.bartitle???

???index.news???

???ui.leftmenu.copyrighttitle???

???ui.leftmenu.link???

"hsu chun hsiao"???jsp.browse.items-by-author.description???

???jsp.browse.items-by-author.back???
???jsp.browse.items-by-author.order1??? ???jsp.browse.items-by-author.order2???

Showing items 1-50 of 57  (2 Page(s) Totally)
1 2 > >>
View [10|25|50] records per page

Institution Date Title Author
臺大學術典藏 2022-06-14T23:24:34Z Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists Lin, Su Chin; Chou, Kai Hsiang; Chen, Yen; HSU-CHUN HSIAO; Cassel, Darion; Bauer, Lujo; Jia, Limin
臺大學術典藏 2021-12-14T23:12:44Z ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated Transactions Wang, Shih Hung; Wu, Chia Chien; Liang, Yu Chuan; Hsieh, Li Hsun; HSU-CHUN HSIAO
臺大學術典藏 2021-08-15T00:08:43Z FALCO: Detecting superfluous javascript injection attacks using website fingerprints Liu, Chih Chun; HSU-CHUN HSIAO; Kim, Tiffany Hyun Jin
臺大學術典藏 2021-03-02T14:00:44Z On using camera-based visible light communication for security protocols WEN-YI CHU; Yu, Ting Guang; Lin, Yu Kai; Lee, Shao Chuan; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:35Z Flooding-resilient broadcast authentication for VANETs. HSU-CHUN HSIAO; Hsiao, Hsu-Chun;Studer, Ahren;Chen, Chen;Perrig, Adrian;Bai, Fan;Bellur, Bhargav;Iyer, Aravind; Hsiao, Hsu-Chun; Studer, Ahren; Chen, Chen; Perrig, Adrian; Bai, Fan; Bellur, Bhargav; Iyer, Aravind
臺大學術典藏 2020-05-04T07:56:35Z Efficient and secure threshold-based event validation for VANETs. Shi, Elaine; Perrig, Adrian; HSU-CHUN HSIAO; Hsiao, Hsu-Chun; Studer, Ahren; Dubey, Rituik; Hsiao, Hsu-Chun;Studer, Ahren;Dubey, Rituik;Shi, Elaine;Perrig, Adrian
臺大學術典藏 2020-05-04T07:56:35Z A Study of User-Friendly Hash Comparison Schemes. Hsiao, Hsu-Chun; Lin, Yue-Hsun; Studer, Ahren; Studer, Cassandra; Wang, King-Hang; Kikuchi, Hiroaki; Perrig, Adrian; Sun, Hung-Min; Yang, Bo-Yin; HSU-CHUN HSIAO; Hsiao, Hsu-Chun;Lin, Yue-Hsun;Studer, Ahren;Studer, Cassandra;Wang, King-Hang;Kikuchi, Hiroaki;Perrig, Adrian;Sun, Hung-Min;Yang, Bo-Yin
臺大學術典藏 2020-05-04T07:56:35Z SPATE: small-group PKI-less authenticated trust establishment. Lin, Yue-Hsun; Studer, Ahren; Hsiao, Hsu-Chun; McCune, Jonathan M.; Wang, King-Hang; Krohn, Maxwell N.; Lin, Phen-Lan; Perrig, Adrian; Sun, Hung-Min; Yang, Bo-Yin; HSU-CHUN HSIAO; Lin, Yue-Hsun;Studer, Ahren;Hsiao, Hsu-Chun;McCune, Jonathan M.;Wang, King-Hang;Krohn, Maxwell N.;Lin, Phen-Lan;Perrig, Adrian;Sun, Hung-Min;Yang, Bo-Yin
臺大學術典藏 2020-05-04T07:56:34Z YourPassword: applying feedback loops to improve security behavior of managing multiple passwords. Kim, Tiffany Hyun-Jin;Stuart, H. Colleen;Hsiao, Hsu-Chun;Lin, Yue-Hsun;Zhang, Leon;Dabbish, Laura;Kiesler, Sara B.; Kim, Tiffany Hyun-Jin; Stuart, H. Colleen; Hsiao, Hsu-Chun; Lin, Yue-Hsun; Zhang, Leon; Dabbish, Laura; Kiesler, Sara B.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:34Z Policy-based secure deletion. HSU-CHUN HSIAO; Sorniotti, Alessandro; Cachin, Christian;Haralambiev, Kristiyan;Hsiao, Hsu-Chun;Sorniotti, Alessandro; Cachin, Christian; Haralambiev, Kristiyan; Hsiao, Hsu-Chun
臺大學術典藏 2020-05-04T07:56:34Z Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region. Wu, Hao;Hsiao, Hsu-Chun;Hu, Yih-Chun; Wu, Hao; Hsiao, Hsu-Chun; Hu, Yih-Chun; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:34Z STRIDE: sanctuary trail - refuge from internet DDoS entrapment. Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Yoo, Sangjae;Zhang, Xin;Lee, Soo Bum;Gligor, Virgil D.;Perrig, Adrian; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Yoo, Sangjae; Zhang, Xin; Lee, Soo Bum; Gligor, Virgil D.; Perrig, Adrian; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:34Z LAP: Lightweight Anonymity and Privacy. Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Perrig, Adrian; Yamada, Akira; Nelson, Samuel C.; Gruteser, Marco; Meng, Wei; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:33Z SandUSB: An installation-free sandbox for USB peripherals. Cheng, Shin-Ming; HSU-CHUN HSIAO; Loe, Edwin Lupito;Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Lee, Shao-Chuan;Cheng, Shin-Ming; Loe, Edwin Lupito; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Lee, Shao-Chuan
臺大學術典藏 2020-05-04T07:56:33Z A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds. Kung, Yi-Hsuan;Lee, Taeho;Tseng, Po-Ning;Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Lee, Soo Bum;Lin, Yue-Hsun;Perrig, Adrian; Kung, Yi-Hsuan; Lee, Taeho; Tseng, Po-Ning; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Lee, Soo Bum; Lin, Yue-Hsun; Perrig, Adrian; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:33Z Securing data planes in software-defined networks. Lee, Shao-Chuan; Hsiao, Hsu-Chun; HSU-CHUN HSIAO; Hsieh, Chen Jung; Chen, Jhu-Lin; Chao, Tzu-Wei; Ke, Yu-Ming; Chen, Bo-Han
臺大學術典藏 2020-05-04T07:56:33Z XIA: architecting a more trustworthy and evolvable internet. Naylor, David;Mukerjee, Matthew K.;Agyapong, Patrick;Grandl, Robert;Kang, Ruogu;Machado, Michel;Brown, Stephanie;Doucette, Cody;Hsiao, Hsu-Chun;Han, Dongsu;Kim, Tiffany Hyun-Jin;Lim, Hyeontaek;Ovon, Carol;Zhou, Dong;Lee, Soo Bum;Lin, Yue-Hsun;Stuart, H. Colleen;Barrett, Daniel Paul;Akella, Aditya;Andersen, David G.;Byers, John W.;Dabbish, Laura;Kaminsky, Michael;Kiesler, Sara B.;Peha, Jon M.;Perrig, Adrian;Seshan, Srinivasan;Sirbu, Marvin A.;Steenkiste, Peter; Naylor, David; Mukerjee, Matthew K.; Agyapong, Patrick; Grandl, Robert; Kang, Ruogu; Machado, Michel; Brown, Stephanie; Doucette, Cody; Hsiao, Hsu-Chun; Han, Dongsu; Kim, Tiffany Hyun-Jin; Lim, Hyeontaek; Ovon, Carol; Zhou, Dong; Lee, Soo Bum; Lin, Yue-Hsun; Stuart, H. Colleen; Barrett, Daniel Paul; Akella, Aditya; Andersen, David G.; Byers, John W.; Dabbish, Laura; Kaminsky, Michael; Kiesler, Sara B.; Peha, Jon M.; Perrig, Adrian; Seshan, Srinivasan; Sirbu, Marvin A.; Steenkiste, Peter; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:32Z CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks. Ke, Yu-Ming;Chen, Chih-Wei;Hsiao, Hsu-Chun;Perrig, Adrian;Sekar, Vyas; Ke, Yu-Ming; Chen, Chih-Wei; Hsiao, Hsu-Chun; Perrig, Adrian; Sekar, Vyas; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:32Z Security Implications of Redirection Trail in Popular Websites Worldwide. HSU-CHUN HSIAO; Lin, Wei-Hsi; Kim, Tiffany Hyun-Jin; Jeng, Wei; Hsiao, Hsu-Chun; Chang, Li; Chang, Li;Hsiao, Hsu-Chun;Jeng, Wei;Kim, Tiffany Hyun-Jin;Lin, Wei-Hsi
臺大學術典藏 2020-05-04T07:56:32Z Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes. Yeh, Jia-Rung; Hsiao, Hsu-Chun; Pang, Ai-Chun; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:32Z SIBRA: Scalable Internet Bandwidth Reservation Architecture. Basescu, Cristina;Reischuk, Raphael M.;Szalachowski, Pawel;Perrig, Adrian;Zhang, Yao;Hsiao, Hsu-Chun;Kubota, Ayumu;Urakawa, Jumpei; Basescu, Cristina; Reischuk, Raphael M.; Szalachowski, Pawel; Perrig, Adrian; Zhang, Yao; Hsiao, Hsu-Chun; Kubota, Ayumu; Urakawa, Jumpei; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:31Z DAMUP: Practical and privacy-aware cloud-based DDoS mitigation. Hsiao, Hsu-Chun; Wang, Hsin-Yi; Lin, Su-Chin;Huang, Po-Wei;Wang, Hsin-Yi;Hsiao, Hsu-Chun; Lin, Su-Chin; Huang, Po-Wei; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:31Z Dynamic Path Pruning in Symbolic Execution. Chen, Ying-Shen; Chen, Wei-Ning; Wu, Che-Yu; Hsiao, Hsu-Chun; Huang, Shih-Kun; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:31Z SDNProbe: Lightweight Fault Localization in the Error-Prone Environment. Ke, Yu-Ming;Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin; Ke, Yu-Ming; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:30Z On the Feasibility of Rerouting-Based DDoS Defenses. HSU-CHUN HSIAO; Wang, Yu-Su; Tung, Shu-Po; Chiang, Wei-Hsuan; Hsiao, Hsu-Chun; Tran, Muoi;Kang, Min Suk;Hsiao, Hsu-Chun;Chiang, Wei-Hsuan;Tung, Shu-Po;Wang, Yu-Su; Tran, Muoi; Kang, Min Suk
臺大學術典藏 2020-05-04T07:56:30Z An Investigation of Cyber Autonomy on Government Websites. HSU-CHUN HSIAO; Jeng, Wei; Kim, Tiffany Hyun-Jin; Ku, Yu-Ming; Chang, Chun-Ming; Chen, Hung-Fang; Chen, Yu-Jen; Wang, Chun-Wen; Hsiao, Hsu-Chun; Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Ku, Yu-Ming;Chang, Chun-Ming;Chen, Hung-Fang;Chen, Yu-Jen;Wang, Chun-Wen;Jeng, Wei
臺大學術典藏 2020-05-04T07:56:30Z Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems Wang, P.S.;Lai, F.;Hsiao, H.-C.;Wu, J.-L.; Wang, P.S.; Lai, F.; Hsiao, H.-C.; Wu, J.-L.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:30Z CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. Wu, Hao; Hsiao, Hsu-Chun; Asoni, Daniele Enrico; Scherrer, Simon; Perrig, Adrian; Hu, Yih-Chun; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z Securing data planes in software-defined networks Chao, T.-W.;Ke, Y.-M.;Chen, B.-H.;Chen, J.-L.;Hsieh, C.J.;Lee, S.-C.;Hsiao, H.-C.; Chao, T.-W.; Ke, Y.-M.; Chen, B.-H.; Chen, J.-L.; Hsieh, C.J.; Lee, S.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z Decapitation via digital epidemics: A bio-inspired transmissive attack Chen, P.-Y.; Lin, C.-C.; Cheng, S.-M.; Hsiao, H.-C.; Huang, C.-Y.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks Ke, Y.-M.;Chen, C.-W.;Hsiao, H.-C.;Perrig, A.;Sekar, V.; Ke, Y.-M.; Chen, C.-W.; Hsiao, H.-C.; Perrig, A.; Sekar, V.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z A secure authorization system in PHR based on CP-ABE Chung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C.; Lai, F.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z CLEF: Limiting the damage caused by large flows in the internet core Wu, H.; Hsiao, H.-C.; Asoni, D.E.; Scherrer, S.; Perrig, A.; Hu, Y.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z Traffic-aware patching for cyber security in mobile IoT Cheng, S.-M.; Chen, P.-Y.; Lin, C.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z SandUSB: An installation-free sandbox for USB peripherals Loe, E.L.; Hsiao, H.-C.; Kim, T.H.-J.; Lee, S.-C.; Cheng, S.-M.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes Yeh, J.-R.;Hsiao, H.-C.;Pang, A.-C.; Yeh, J.-R.; Hsiao, H.-C.; Pang, A.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z GroupIt: Lightweight Group Key Management for Dynamic IoT Environments Kung, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z SDNProbe: Lightweight fault localization in the error-prone environment Ke, Y.-M.; Hsiao, H.-C.; Kim, T.H.-J.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z DAMUP: Practical and privacy-aware cloud-based DDoS mitigation Lin, S.-C.; Huang, P.-W.; Wang, H.-Y.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z A generic web application testing and attack data generation method Shih, H.-Y.; Lu, H.-L.; Yeh, C.-C.; Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z SafeChain: Securing Trigger-Action Programming from Attack Chains Hsu, K.-H.;Chiang, Y.-H.;Hsiao, H.-C.; Hsu, K.-H.; Chiang, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z An investigation of cyber autonomy on government websites Ku, Y.-M.; Chen, Y.-J.; Wang, C.-W.; Jeng, W.; HSU-CHUN HSIAO; Hsiao, H.-C.;Chang, C.-M.;Kim, T.H.-J.;Chen, H.-F.;Ku, Y.-M.;Chen, Y.-J.;Wang, C.-W.;Jeng, W.; Hsiao, H.-C.; Chang, C.-M.; Kim, T.H.-J.; Chen, H.-F.
臺大學術典藏 2020-05-04T07:56:26Z On the Feasibility of Rerouting-Based DDoS Defenses Tran, M.;Kang, M.S.;Hsiao, H.-C.;Chiang, W.-H.;Tung, S.-P.;Wang, Y.-S.; Tran, M.; Kang, M.S.; Hsiao, H.-C.; Chiang, W.-H.; Tung, S.-P.; Wang, Y.-S.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z Dynamic Path Pruning in Symbolic Execution Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO; Wu, C.-Y.; Chen, W.-N.; Chen, Y.-S.; Chen, Y.-S.;Chen, W.-N.;Wu, C.-Y.;Hsiao, H.-C.;Huang, S.-K.
臺大學術典藏 2018-09-10T14:53:25Z Efficient large flow detection over arbitrary windows: An algorithm exact outside an ambiguity region Wu, H.;Hsiao, H.-C.;Hu, Y.-C.; Wu, H.; Hsiao, H.-C.; Hu, Y.-C.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:43:21Z STRIDE: Sanctuary trail - Refuge from internet DDoS entrapment Hsiao, H.-C.;Kim, T.H.-J.;Yoo, S.;Zhang, X.;Lee, S.B.;Gligor, V.;Perrig, A.; Hsiao, H.-C.; Kim, T.H.-J.; Yoo, S.; Zhang, X.; Lee, S.B.; Gligor, V.; Perrig, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:43:21Z Policy-based secure deletion Cachin, C.;Haralambiev, K.;Hsiao, H.-C.;Sorniotti, A.; Cachin, C.; Haralambiev, K.; Hsiao, H.-C.; Sorniotti, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:17:17Z LAP: Lightweight anonymity and privacy Hsiao, H.-C.; Kim, T.H.-J.; Perrig, A.; Yamada, A.; Nelson, S.C.; Gruteser, M.; Meng, W.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:51Z Efficient and secure threshold-based event validation for VANETs Hsiao, H.-C.;Studer, A.;Dubey, R.;Shi, E.;Perrig, A.; Hsiao, H.-C.; Studer, A.; Dubey, R.; Shi, E.; Perrig, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:50Z SCION: Scalability, control, and isolation on next-generation networks Zhang, X.;Hsiao, H.-C.;Hasker, G.;Chan, H.;Perrig, A.;ersen, D.G.; Zhang, X.; Hsiao, H.-C.; Hasker, G.; Chan, H.; Perrig, A.; ersen, D.G.; HSU-CHUN HSIAO

Showing items 1-50 of 57  (2 Page(s) Totally)
1 2 > >>
View [10|25|50] records per page