Follow
Ee-Chien Chang
Title
Cited by
Cited by
Year
A fast direct Fourier-based algorithm for subpixel registration of images
HS Stone, MT Orchard, EC Chang, SA Martucci
IEEE Transactions on geoscience and remote sensing 39 (10), 2235-2243, 2001
5082001
Detecting digital image forgeries by measuring inconsistencies of blocking artifact
S Ye, Q Sun, EC Chang
2007 IEEE International Conference on Multimedia and Expo, 12-15, 2007
3372007
Towards scaling blockchain systems via sharding
H Dang, TTA Dinh, D Loghin, EC Chang, Q Lin, BC Ooi
Proceedings of the 2019 International Conference on Management of Data, 123-140, 2019
3322019
Weak Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
J Xu, EC Chang, J Zhou
Proceedings of the 8th ACM Symposium on Information, Computer and …, 2013
296*2013
Phase-unwrapping of SAR interferogram with multi-frequency or multi-baseline
W Xu, EC Chang, LK Kwoh, H Lim, W Cheng, A Heng
Geoscience and Remote Sensing Symposium, 1994. IGARSS'94. Surface and …, 1994
1601994
Live memory forensics of mobile phones
VLL Thing, KY Ng, EC Chang
digital investigation 7, S74-S82, 2010
1592010
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment
Z Yang, J Zhang, EC Chang, Z Liang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
154*2019
Remote integrity check with dishonest storage server
EC Chang, J Xu
European Conference on Research in Computer Security, 223-237, 2008
1532008
Website fingerprinting and identification using ordered feature sequences
L Lu, EC Chang, MC Chan
ESORICS 2010, 199-214, 2010
1492010
Finding the original point set hidden among chaff
EC Chang, R Shen, FW Teo
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
1422006
M2R: Enabling stronger privacy in MapReduce computation
TTA Dinh, P Saxena, EC Chang, BC Ooi, C Zhang
24th {USENIX} Security Symposium ({USENIX} Security 15), 447-462, 2015
1382015
Towards Efficient Proofs of Retrievability
J Xu, EC Chang
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
1302012
Towards efficient proofs of retrievability
J Xu, EC Chang
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
1212012
Blind separation of fetal ECG from single mixture using SVD and ICA
P Gao, EC Chang, L Wyse
Information, Communications and Signal Processing, 2003 and the Fourth …, 2003
1212003
Evading classifiers by morphing in the dark
H Dang, Y Huang, EC Chang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1192017
Wavelet foveation
EC Chang, S Mallat, C Yap
Applied and Computational Harmonic Analysis 9 (3), 312-335, 2000
1182000
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
842018
Short redactable signatures using random trees
EC Chang, C Lim, J Xu
CT-RSA, 133-147, 2009
832009
Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains
R Dutta, EC Chang, S Mukhopadhyay
Applied Cryptography and Network Security, 385-400, 2007
802007
A wavelet approach to foveating images
EC Chang, CK Yap
Proceedings of the thirteenth annual symposium on Computational geometry …, 1997
801997
The system can't perform the operation now. Try again later.
Articles 1–20