Login / Signup
Yu-Hsi Chiang
Publication Activity (10 Years)
Years Active: 2016-2021
Publications (10 Years): 7
Top Topics
Messaging Service
Technical Report
Greedy Algorithms
Relational Databases
Top Venues
CoRR
SRDS
J. Log. Algebraic Methods Program.
IEEE Trans. Inf. Forensics Secur.
</>
Publications
</>
Simon Scherrer
,
Che-Yu Wu
,
Yu-Hsi Chiang
,
Benjamin Rothenberger
,
Daniele Enrico Asoni
,
Arish Sateesan
,
Jo Vliegen
,
Nele Mentens
,
Hsu-Chun Hsiao
,
Adrian Perrig
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows.
SRDS
(2021)
Simon Scherrer
,
Che-Yu Wu
,
Yu-Hsi Chiang
,
Benjamin Rothenberger
,
Daniele Enrico Asoni
,
Arish Sateesan
,
Jo Vliegen
,
Nele Mentens
,
Hsu-Chun Hsiao
,
Adrian Perrig
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows.
CoRR
(2021)
Yu-Hsi Chiang
,
Hsu-Chun Hsiao
,
Chia-Mu Yu
,
Tiffany Hyun-Jin Kim
On the Privacy Risks of Compromised Trigger-Action Platforms.
ESORICS (2)
(2020)
Kai-Hsiang Hsu
,
Yu-Hsi Chiang
,
Hsu-Chun Hsiao
SafeChain: Securing Trigger-Action Programming From Attack Chains.
IEEE Trans. Inf. Forensics Secur.
14 (10) (2019)
Kai-Hsiang Hsu
,
Yu-Hsi Chiang
,
Hsu-Chun Hsiao
SAFECHAIN: Securing Trigger-Action Programming from Attack Chains (Extended Technical Report).
CoRR
(2019)
Shin-Cheng Mu
,
Yu-Hsi Chiang
,
Yu-Han Lyu
Queueing and glueing for optimal partitioning (functional pearl).
ICFP
(2016)
Yu-Hsi Chiang
,
Shin-Cheng Mu
Formal derivation of Greedy algorithms from relational specifications: A tutorial.
J. Log. Algebraic Methods Program.
85 (5) (2016)