Follow
Yu-Hsi Chiang
Yu-Hsi Chiang
Verified email at csie.ntu.edu.tw
Title
Cited by
Cited by
Year
SafeChain: Securing Trigger-Action Programming from Attack Chains
KH Hsu, YH Chiang, HC Hsiao
IEEE Transactions on Information Forensics and Security 14 (10), 2607-2622, 2019
462019
Low-rate overuse flow tracer (loft): An efficient and scalable algorithm for detecting overuse flows
S Scherrer, CY Wu, YH Chiang, B Rothenberger, DE Asoni, A Sateesan, ...
2021 40th International Symposium on Reliable Distributed Systems (SRDS …, 2021
102021
On the privacy risks of compromised trigger-action platforms
YH Chiang, HC Hsiao, CM Yu, THJ Kim
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
102020
Formal derivation of greedy algorithms from relational specifications: a tutorial
YH Chiang, SC Mu
Journal of Logical and Algebraic Methods in Programming 85 (5), 879-905, 2016
52016
Queueing and glueing for optimal partitioning (functional pearl)
SC Mu, YH Chiang, YH Lyu
Proceedings of the 21st ACM SIGPLAN International Conference on Functional …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–5