Follow
Ee-Chien Chang
Title
Cited by
Cited by
Year
A fast direct Fourier-based algorithm for subpixel registration of images
HS Stone, MT Orchard, EC Chang, SA Martucci
IEEE Transactions on geoscience and remote sensing 39 (10), 2235-2243, 2001
5162001
Towards scaling blockchain systems via sharding
H Dang, TTA Dinh, D Loghin, EC Chang, Q Lin, BC Ooi
Proceedings of the 2019 International Conference on Management of Data, 123-140, 2019
5122019
Detecting digital image forgeries by measuring inconsistencies of blocking artifact
S Ye, Q Sun, EC Chang
2007 IEEE International Conference on Multimedia and Expo, 12-15, 2007
3622007
Weak Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
J Xu, EC Chang, J Zhou
Proceedings of the 8th ACM Symposium on Information, Computer and …, 2013
318*2013
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment
Z Yang, J Zhang, EC Chang, Z Liang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
238*2019
Phase-unwrapping of SAR interferogram with multi-frequency or multi-baseline
W Xu, EC Chang, LK Kwoh, H Lim, W Cheng, A Heng
Geoscience and Remote Sensing Symposium, 1994. IGARSS'94. Surface and …, 1994
1751994
Live memory forensics of mobile phones
VLL Thing, KY Ng, EC Chang
digital investigation 7, S74-S82, 2010
1672010
Remote integrity check with dishonest storage server
EC Chang, J Xu
European Conference on Research in Computer Security, 223-237, 2008
1622008
Website fingerprinting and identification using ordered feature sequences
L Lu, EC Chang, MC Chan
ESORICS 2010, 199-214, 2010
1602010
M2R: Enabling stronger privacy in MapReduce computation
TTA Dinh, P Saxena, EC Chang, BC Ooi, C Zhang
24th {USENIX} Security Symposium ({USENIX} Security 15), 447-462, 2015
1512015
Finding the original point set hidden among chaff
EC Chang, R Shen, FW Teo
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
1432006
Evading classifiers by morphing in the dark
H Dang, Y Huang, EC Chang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1412017
Towards Efficient Proofs of Retrievability
J Xu, EC Chang
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
1382012
Towards efficient proofs of retrievability
J Xu, EC Chang
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
1292012
Blind separation of fetal ECG from single mixture using SVD and ICA
P Gao, EC Chang, L Wyse
Information, Communications and Signal Processing, 2003 and the Fourth …, 2003
1282003
Wavelet foveation
EC Chang, S Mallat, C Yap
Applied and Computational Harmonic Analysis 9 (3), 312-335, 2000
1182000
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
972018
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores
Z Yang, L Wang, D Yang, J Wan, Z Zhao, EC Chang, F Zhang, K Ren
Proceedings of the AAAI Conference on Artificial Intelligence 37 (9), 10871 …, 2023
84*2023
Short redactable signatures using random trees
EC Chang, C Lim, J Xu
CT-RSA, 133-147, 2009
842009
Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains
R Dutta, EC Chang, S Mukhopadhyay
Applied Cryptography and Network Security, 385-400, 2007
832007
The system can't perform the operation now. Try again later.
Articles 1–20