SafeChain: Securing Trigger-Action Programming from Attack Chains KH Hsu, YH Chiang, HC Hsiao IEEE Transactions on Information Forensics and Security 14 (10), 2607-2622, 2019 | 46 | 2019 |
Low-rate overuse flow tracer (loft): An efficient and scalable algorithm for detecting overuse flows S Scherrer, CY Wu, YH Chiang, B Rothenberger, DE Asoni, A Sateesan, ... 2021 40th International Symposium on Reliable Distributed Systems (SRDS …, 2021 | 10 | 2021 |
On the privacy risks of compromised trigger-action platforms YH Chiang, HC Hsiao, CM Yu, THJ Kim Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 10 | 2020 |
Formal derivation of greedy algorithms from relational specifications: a tutorial YH Chiang, SC Mu Journal of Logical and Algebraic Methods in Programming 85 (5), 879-905, 2016 | 5 | 2016 |
Queueing and glueing for optimal partitioning (functional pearl) SC Mu, YH Chiang, YH Lyu Proceedings of the 21st ACM SIGPLAN International Conference on Functional …, 2016 | | 2016 |