Hsiao-Ying Lin
Cited by
Cited by
A secure erasure code-based cloud storage system with secure data forwarding
HY Lin, WG Tzeng
IEEE transactions on parallel and distributed systems 23 (6), 995-1003, 2012
An efficient solution to the millionaires’ problem based on homomorphic encryption
HY Lin, WG Tzeng
International Conference on Applied Cryptography and Network Security, 456-466, 2005
A secure decentralized erasure code for distributed networked storage
HY Lin, WG Tzeng
IEEE transactions on Parallel and Distributed Systems 21 (11), 1586-1594, 2010
Toward data confidentiality via integrating hybrid encryption schemes and Hadoop distributed file system
HY Lin, ST Shen, WG Tzeng, BSP Lin
2012 IEEE 26th International Conference on Advanced Information Networking …, 2012
A practical smart metering system supporting privacy preserving billing and load monitoring
HY Lin, WG Tzeng, ST Shen, BSP Lin
Applied Cryptography and Network Security: 10th International Conference …, 2012
An effective integrity check scheme for secure erasure code-based storage systems
ST Shen, HY Lin, WG Tzeng
IEEE Transactions on Reliability 64 (3), 840-851, 2015
A privacy preserving smart metering system supporting multiple time granularities
HY Lin, ST Shen, BSP Lin
2012 IEEE Sixth International Conference on Software Security and …, 2012
Adversarial Machine Learning: Attacks From Laboratories to the Real World
HY Lin, B Biggio
Computer 54 (5), 56-60, 2021
SWOON: A Testbed for Secure Wireless Overlay Networks.
YL Huang, JD Tygar, HY Lin, LY Yeh, HY Tsai, K Sklower, SP Shieh, ...
CSET 8, 1-6, 2008
Large-Scale Artificial Intelligence Models
HY Lin
Computer 55 (05), 76-80, 2022
Long-Term Privacy-Preserving Aggregation With User-Dynamics for Federated Learning
Z Liu, HY Lin, Y Liu
IEEE Transactions on Information Forensics and Security, 2023
Standing on the Shoulders of AI Giants
HY Lin
Computer 56 (01), 97-101, 2023
A secure fine-grained access control mechanism for networked storage systems
HY Lin, J Kubiatowicz, WG Tzeng
2012 IEEE Sixth International Conference on Software Security and …, 2012
Vehicle-mounted device upgrade method and related device
Y Yanjiang, Z Wei, HY Lin, LI Tieyan, J Shen
US Patent App. 16/856,897, 2020
Colors of Artificial Intelligence
HY Lin
Computer 54 (11), 95-99, 2021
Vehicle-mounted device upgrade method and related device
Y Yanjiang, Z Wei, HY Lin, H Wei, J Shen
US Patent App. 17/085,878, 2021
A decentralized repair mechanism for decentralized erasure code based storage systems
HY Lin, WG Tzeng, BS Lin
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
A Survey on Reinforcement Learning Security with Application to Autonomous Driving
A Demontis, M Pintor, L Demetrio, K Grosse, HY Lin, C Fang, B Biggio, ...
arXiv preprint arXiv:2212.06123, 2022
In-Vehicle Gateway Communication Method, In-Vehicle Gateway, and Intelligent Vehicle
HY Lin, M Zhang, CK CHU
US Patent App. 17/139,133, 2021
Towards Demystifying Adversarial Robustness of Binarized Neural Networks
Z Qin, HY Lin, J Shi
Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20