default search action
Hsu-Chun Hsiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Arish Sateesan, Jo Vliegen, Simon Scherrer, Hsu-Chun Hsiao, Adrian Perrig, Nele Mentens:
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements. ACM Trans. Priv. Secur. 27(4): 29:1-29:34 (2024) - [c43]Shou-Ching Hsiao, Shih-Wei Li, Hsu-Chun Hsiao:
Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity Application Virtualization Platforms in Android. CODASPY 2024: 253-264 - [c42]Shu-Po Tung, Yu-Min Lin, Keng-Lun Chang, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim:
Detecting IP Prefix Mismatches on SDN Data Plane. ICCCN 2024: 1-9 - [i12]Cheng-Kang Chen, Wen-Yi Chu, Muoi Tran, Laurent Vanbever, Hsu-Chun Hsiao:
Proxion: Uncovering Hidden Proxy Smart Contracts for Finding Collision Vulnerabilities in Ethereum. CoRR abs/2409.13563 (2024) - 2023
- [c41]Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao:
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers. ACNS (1) 2023: 260-283 - [c40]Simon Scherrer, Jo Vliegen, Arish Sateesan, Hsu-Chun Hsiao, Nele Mentens, Adrian Perrig:
ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks. SRDS 2023: 162-172 - [i11]Simon Scherrer, Jo Vliegen, Arish Sateesan, Hsu-Chun Hsiao, Nele Mentens, Adrian Perrig:
ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks. CoRR abs/2306.14328 (2023) - 2022
- [j9]Darion Cassel, Su-Chin Lin, Alessio Buraggina, William Wang, Andrew Zhang, Lujo Bauer, Hsu-Chun Hsiao, Limin Jia, Timothy Libert:
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers. Proc. Priv. Enhancing Technol. 2022(1): 227-252 (2022) - [c39]Yun-Chi Chang, Li Fei Kung, Hsu-Chun Hsiao, Wei Jeng:
"Prove It!" A User Centered Design for the Blockchain-Based Research Lifecycle Transparency Framework. ASIST 2022: 636-638 - [c38]Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao:
LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. DSC 2022: 1-8 - [c37]Ping-Lun Wang, Tzu-Wei Chao, Chia-Chien Wu, Hsu-Chun Hsiao:
Tool: An Efficient and Flexible Simulator for Byzantine Fault-Tolerant Protocols. DSN 2022: 287-294 - [c36]Hsun Lee, Yuming Hsu, Jing-Jie Wang, Hao-Cheng Yang, Yu-Heng Chen, Yih-Chun Hu, Hsu-Chun Hsiao:
HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale. NDSS 2022 - [c35]Chun-Ming Chang, Hsu-Chun Hsiao, Timothy M. Lynar, Tatsuya Mori:
Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis. WWW (Companion Volume) 2022: 201-204 - [c34]Su-Chin Lin, Kai-Hsiang Chou, Yen Chen, Hsu-Chun Hsiao, Darion Cassel, Lujo Bauer, Limin Jia:
Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists. WWW 2022: 576-587 - 2021
- [c33]Shih-Hong Wang, Chia-Chien Wu, Yu-Chuan Liang, Li-Hsun Hsieh, Hsu-Chun Hsiao:
ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated Transactions. EuroS&P Workshops 2021: 380-385 - [c32]Arish Sateesan, Jo Vliegen, Simon Scherrer, Hsu-Chun Hsiao, Adrian Perrig, Nele Mentens:
Speed Records in Network Flow Measurement on FPGA. FPL 2021: 219-224 - [c31]Simon Scherrer, Che-Yu Wu, Yu-Hsi Chiang, Benjamin Rothenberger, Daniele Enrico Asoni, Arish Sateesan, Jo Vliegen, Nele Mentens, Hsu-Chun Hsiao, Adrian Perrig:
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows. SRDS 2021: 265-276 - [i10]Simon Scherrer, Che-Yu Wu, Yu-Hsi Chiang, Benjamin Rothenberger, Daniele Enrico Asoni, Arish Sateesan, Jo Vliegen, Nele Mentens, Hsu-Chun Hsiao, Adrian Perrig:
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows. CoRR abs/2102.01397 (2021) - 2020
- [c30]Hao-Cheng Yang, Hsun Lee, Hsu-Chun Hsiao:
Poster: Challenges in Stopping Ticket Scalping Bots. AsiaCCS 2020: 931-933 - [c29]Yu-Hsi Chiang, Hsu-Chun Hsiao, Chia-Mu Yu, Tiffany Hyun-Jin Kim:
On the Privacy Risks of Compromised Trigger-Action Platforms. ESORICS (2) 2020: 251-271 - [c28]Chih-Chun Liu, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim:
FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints. ICETE (2) 2020: 180-191 - [c27]Wen-Yi Chu, Ting-Guang Yu, Yu-Kai Lin, Shao-Chuan Lee, Hsu-Chun Hsiao:
On Using Camera-based Visible Light Communication for Security Protocols. SP (Workshops) 2020: 110-117 - [c26]Ping-Lun Wang, Shao-Hong Yang, Hsu-Chun Hsiao:
Hybrid-Voting: A Hybrid Structured Electronic Voting System. WWW (Companion Volume) 2020: 83-84 - [c25]Pin-Yen Lin, Zhong-Yi Zhou, Chun-Ming Chang, Hung-Wei Chen, Shu-Po Tung, Hsu-Chun Hsiao:
Keeping Passwords In Your Pocket: Managing Password Locally With Mobile Fingerprint Sensors. WWW (Companion Volume) 2020: 124-125 - [i9]Hsun Lee, Hsu-Chun Hsiao:
Practical and Verifiable Electronic Sortition. CoRR abs/2006.13920 (2020) - [i8]Hsu-Chun Hsiao, Chun-Ying Huang, Bing-Kai Hong, Shin-Ming Cheng, Hsin-Yuan Hu, Chia-Chien Wu, Jian-Sin Lee, Shih-Hong Wang, Wei Jeng:
An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds. CoRR abs/2011.04322 (2020)
2010 – 2019
- 2019
- [j8]Kai-Hsiang Hsu, Yu-Hsi Chiang, Hsu-Chun Hsiao:
SafeChain: Securing Trigger-Action Programming From Attack Chains. IEEE Trans. Inf. Forensics Secur. 14(10): 2607-2622 (2019) - [c24]Muoi Tran, Min Suk Kang, Hsu-Chun Hsiao, Wei-Hsuan Chiang, Shu-Po Tung, Yu-Su Wang:
On the Feasibility of Rerouting-Based DDoS Defenses. IEEE Symposium on Security and Privacy 2019: 1169-1184 - [c23]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Yu-Ming Ku, Chun-Ming Chang, Hung-Fang Chen, Yu-Jen Chen, Chun-Wen Wang, Wei Jeng:
An Investigation of Cyber Autonomy on Government Websites. WWW 2019: 2814-2821 - [i7]Kai-Hsiang Hsu, Yu-Hsi Chiang, Hsu-Chun Hsiao:
SAFECHAIN: Securing Trigger-Action Programming from Attack Chains (Extended Technical Report). CoRR abs/1903.03760 (2019) - 2018
- [j7]Yi-Hsuan Kung, Hsu-Chun Hsiao:
GroupIt: Lightweight Group Key Management for Dynamic IoT Environments. IEEE Internet Things J. 5(6): 5155-5165 (2018) - [c22]Hao Wu, Hsu-Chun Hsiao, Daniele Enrico Asoni, Simon Scherrer, Adrian Perrig, Yih-Chun Hu:
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. CANS 2018: 89-108 - [c21]Ying-Shen Chen, Wei-Ning Chen, Che-Yu Wu, Hsu-Chun Hsiao, Shih-Kun Huang:
Dynamic Path Pruning in Symbolic Execution. DSC 2018: 1-8 - [c20]Yu-Ming Ke, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim:
SDNProbe: Lightweight Fault Localization in the Error-Prone Environment. ICDCS 2018: 489-499 - [c19]Su-Chin Lin, Po-Wei Huang, Hsin-Yi Wang, Hsu-Chun Hsiao:
DAMUP: Practical and privacy-aware cloud-based DDoS mitigation. NOMS 2018: 1-6 - [i6]Hao Wu, Hsu-Chun Hsiao, Daniele Enrico Asoni, Simon Scherrer, Adrian Perrig, Yih-Chun Hu:
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report). CoRR abs/1807.05652 (2018) - 2017
- [j6]Shin-Ming Cheng, Pin-Yu Chen, Ching-Chao Lin, Hsu-Chun Hsiao:
Traffic-Aware Patching for Cyber Security in Mobile IoT. IEEE Commun. Mag. 55(7): 29-35 (2017) - [c18]Li Chang, Hsu-Chun Hsiao, Wei Jeng, Tiffany Hyun-Jin Kim, Wei-Hsi Lin:
Security Implications of Redirection Trail in Popular Websites Worldwide. WWW 2017: 1491-1500 - [i5]Shin-Ming Cheng, Pin-Yu Chen, Ching-Chao Lin, Hsu-Chun Hsiao:
Traffic-aware Patching for Cyber Security in Mobile IoT. CoRR abs/1703.05400 (2017) - 2016
- [j5]Peter Shaojui Wang, Feipei Lai, Hsu-Chun Hsiao, Ja-Ling Wu:
Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems. IEEE Access 4: 2244-2255 (2016) - [j4]Pin-Yu Chen, Ching-Chao Lin, Shin-Ming Cheng, Hsu-Chun Hsiao, Chun-Ying Huang:
Decapitation via digital epidemics: a bio-inspired transmissive attack. IEEE Commun. Mag. 54(6): 75-81 (2016) - [c17]Jia-Rung Yeh, Hsu-Chun Hsiao, Ai-Chun Pang:
Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes. AsiaJCIS 2016: 92-99 - [c16]Yu-Ming Ke, Chih-Wei Chen, Hsu-Chun Hsiao, Adrian Perrig, Vyas Sekar:
CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks. AsiaCCS 2016: 699-710 - [c15]Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa:
SIBRA: Scalable Internet Bandwidth Reservation Architecture. NDSS 2016 - [c14]Tzu-Wei Chao, Yu-Ming Ke, Bo-Han Chen, Jhu-Lin Chen, Chen Jung Hsieh, Shao-Chuan Lee, Hsu-Chun Hsiao:
Securing data planes in software-defined networks. NetSoft 2016: 465-470 - [c13]Edwin Lupito Loe, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Shao-Chuan Lee, Shin-Ming Cheng:
SandUSB: An installation-free sandbox for USB peripherals. WF-IoT 2016: 621-626 - [i4]Pin-Yu Chen, Ching-Chao Lin, Shin-Ming Cheng, Hsu-Chun Hsiao, Chun-Ying Huang:
Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack. CoRR abs/1603.00588 (2016) - 2015
- [c12]Yi-Hsuan Kung, Taeho Lee, Po-Ning Tseng, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Yue-Hsun Lin, Adrian Perrig:
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds. ICNP 2015: 212-223 - [i3]Yi-Hsuan Kung, Taeho Lee, Po-Ning Tseng, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Yue-Hsun Lin, Adrian Perrig:
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds. CoRR abs/1509.02268 (2015) - [i2]Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa:
SIBRA: Scalable Internet Bandwidth Reservation Architecture. CoRR abs/1510.02696 (2015) - 2014
- [b1]Hsu-Chun Hsiao:
Toward A Highly Available Future Internet. Carnegie Mellon University, USA, 2014 - [j3]David Naylor, Matthew K. Mukerjee, Patrick Agyapong, Robert Grandl, Ruogu Kang, Michel Machado, Stephanie Brown, Cody Doucette, Hsu-Chun Hsiao, Dongsu Han, Tiffany Hyun-Jin Kim, Hyeontaek Lim, Carol Ovon, Dong Zhou, Soo Bum Lee, Yue-Hsun Lin, H. Colleen Stuart, Daniel Paul Barrett, Aditya Akella, David G. Andersen, John W. Byers, Laura Dabbish, Michael Kaminsky, Sara B. Kiesler, Jon M. Peha, Adrian Perrig, Srinivasan Seshan, Marvin A. Sirbu, Peter Steenkiste:
XIA: architecting a more trustworthy and evolvable internet. Comput. Commun. Rev. 44(3): 50-57 (2014) - [c11]Tiffany Hyun-Jin Kim, H. Colleen Stuart, Hsu-Chun Hsiao, Yue-Hsun Lin, Leon Zhang, Laura Dabbish, Sara B. Kiesler:
YourPassword: applying feedback loops to improve security behavior of managing multiple passwords. AsiaCCS 2014: 513-518 - [c10]Hao Wu, Hsu-Chun Hsiao, Yih-Chun Hu:
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region. Internet Measurement Conference 2014: 209-222 - 2013
- [c9]Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti:
Policy-based secure deletion. CCS 2013: 259-270 - [c8]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
STRIDE: sanctuary trail - refuge from internet DDoS entrapment. AsiaCCS 2013: 415-426 - [i1]Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti:
Policy-based Secure Deletion. IACR Cryptol. ePrint Arch. 2013: 152 (2013) - 2012
- [c7]Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Patrick Tague:
ShortMAC: Efficient Data-Plane Fault Localization. NDSS 2012 - [c6]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng:
LAP: Lightweight Anonymity and Privacy. IEEE Symposium on Security and Privacy 2012: 506-520 - 2011
- [j2]Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn Song:
Secure Distributed Data Aggregation. Found. Trends Databases 3(3): 149-201 (2011) - [c5]Hsu-Chun Hsiao, Ahren Studer, Chen Chen, Adrian Perrig, Fan Bai, Bhargav Bellur, Aravind Iyer:
Flooding-resilient broadcast authentication for VANETs. MobiCom 2011: 193-204 - [c4]Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, David G. Andersen:
SCION: Scalability, Control, and Isolation on Next-Generation Networks. IEEE Symposium on Security and Privacy 2011: 212-227 - [c3]Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig:
Efficient and secure threshold-based event validation for VANETs. WISEC 2011: 163-174 - 2010
- [j1]Yue-Hsun Lin, Ahren Studer, Yao-Hsin Chen, Hsu-Chun Hsiao, Eric Li-Hsiang Kuo, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Adrian Perrig, Bo-Yin Yang, Hung-Min Sun, Phen-Lan Lin, Jason Lee:
SPATE: Small-Group PKI-Less Authenticated Trust Establishment. IEEE Trans. Mob. Comput. 9(12): 1666-1681 (2010)
2000 – 2009
- 2009
- [c2]Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
A Study of User-Friendly Hash Comparison Schemes. ACSAC 2009: 105-114 - [c1]Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
SPATE: small-group PKI-less authenticated trust establishment. MobiSys 2009: 1-14
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint