Hsu-Chun Hsiao
Hsu-Chun Hsiao
Verified email at csie.ntu.edu.tw - Homepage
Title
Cited by
Cited by
Year
SCION: Scalability, control, and isolation on next-generation networks
X Zhang, HC Hsiao, G Hasker, H Chan, A Perrig, DG Andersen
2011 IEEE Symposium on Security and Privacy, 212-227, 2011
2002011
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, YH Chen, HC Hsiao, LH Kuo, JM McCune, KH Wang, ...
IEEE Transactions on Mobile Computing 9 (12), 1666-1681, 2010
1182010
Flooding-resilient broadcast authentication for vanets
HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the 17th annual international conference on Mobile computing …, 2011
1122011
LAP: Lightweight anonymity and privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
2012 IEEE Symposium on Security and Privacy, 506-520, 2012
852012
Policy-based secure deletion
C Cachin, K Haralambiev, HC Hsiao, A Sorniotti
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
752013
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 Annual Computer Security Applications Conference, 105-114, 2009
652009
Computing device to detect malware
H Hsiao, D Shuo, B Salamat, R Gupta, SM Das
US Patent 9,832,211, 2017
582017
XIA: Architecting a more trustworthy and evolvable Internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
582014
SIBRA: Scalable internet bandwidth reservation architecture
C Basescu, RM Reischuk, P Szalachowski, A Perrig, Y Zhang, HC Hsiao, ...
arXiv preprint arXiv:1510.02696, 2015
572015
Efficient and secure threshold-based event validation for VANETs
HC Hsiao, A Studer, R Dubey, E Shi, A Perrig
Proceedings of the fourth ACM conference on Wireless network security, 163-174, 2011
432011
Traffic-aware patching for cyber security in mobile IoT
SM Cheng, PY Chen, CC Lin, HC Hsiao
IEEE Communications Magazine 55 (7), 29-35, 2017
402017
Securing data planes in software-defined networks
TW Chao, YM Ke, BH Chen, JL Chen, CJ Hsieh, SC Lee, HC Hsiao
2016 IEEE NetSoft Conference and Workshops (NetSoft), 465-470, 2016
362016
ShortMAC: Efficient Data-Plane Fault Localization.
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
NDSS, 2012
312012
STRIDE: sanctuary trail--refuge from internet DDoS entrapment
HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee, V Gligor, A Perrig
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
262013
Instrim: Lightweight instrumentation for coverage-guided fuzzing
CC Hsu, CY Wu, HC Hsiao, SK Huang
Symposium on Network and Distributed System Security (NDSS), Workshop on …, 2018
252018
Computing device to detect malware
H Hsiao, D Shuo, B Salamat, R Gupta, SM Das
US Patent 9,973,517, 2018
222018
Cicadas: Congesting the internet with coordinated and decentralized pulsating attacks
YM Ke, CW Chen, HC Hsiao, A Perrig, V Sekar
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
192016
On the feasibility of rerouting-based DDoS defenses
M Tran, MS Kang, HC Hsiao, WH Chiang, SP Tung, YS Wang
2019 IEEE Symposium on Security and Privacy (SP), 1169-1184, 2019
182019
Safechain: Securing trigger-action programming from attack chains
KH Hsu, YH Chiang, HC Hsiao
IEEE Transactions on Information Forensics and Security 14 (10), 2607-2622, 2019
162019
Security implications of redirection trail in popular websites worldwide
L Chang, HC Hsiao, W Jeng, THJ Kim, WH Lin
Proceedings of the 26th International Conference on World Wide Web, 1491-1500, 2017
162017
The system can't perform the operation now. Try again later.
Articles 1–20