Chengfang Fang
Chengfang Fang
Research Assistant, National University of Singapore
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Mitigating application layer distributed denial of service attacks via effective trust management
J Yu, C Fang, L Lu, Z Li
IET communications 4 (16), 1952-1962, 2010
ID repetition in Kad
J Yu, C Fang, J Xu, EC Chang, Z Li
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 111-120, 2009
A lightweight mechanism to mitigate application layer DDoS attacks
J Yu, C Fang, L Lu, Z Li
International Conference on Scalable Information Systems, 175-191, 2009
BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
European Symposium on Research in Computer Security, 66-83, 2019
An optimization model for aesthetic two-dimensional barcodes
C Fang, C Zhang, EC Chang
International Conference on Multimedia Modeling, 278-290, 2014
Differential privacy with δ-neighbourhood for spatial and dynamic datasets
C Fang, EC Chang
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Securing interactive sessions using mobile device through visual channel and visual inspection
C Fang, EC Chang
Proceedings of the 26th Annual Computer Security Applications Conference, 69-78, 2010
Secure sketch for multiple secrets
C Fang, Q Li, EC Chang
International Conference on Applied Cryptography and Network Security, 367-383, 2010
Information leakage in optimal anonymized and diversified data
C Fang, EC Chang
International workshop on information hiding, 30-44, 2008
A goal-oriented approach for modeling and analyzing attack graph
X Liu, C Fang, D Xiao, H Xu
2010 International Conference on Information Science and Applications, 1-8, 2010
Adaptive differentially private histogram of low-dimensional data
C Fang, EC Chang
International Symposium on Privacy Enhancing Technologies Symposium, 160-179, 2012
Intrusion diagnosis and prediction with expert system
X Liu, C Fang, D Xiao
Security and Communication Networks 4 (12), 1483-1494, 2011
Zhoujun Li. Id repetition in kad
J Yu, C Fang, J Xu, EC Chang
Peer-to-Peer Computing, 111-120, 2009
Id repetition in structured p2p networks
J Yu, Z Li, P Xiao, C Fang, J Xu, EC Chang
The Computer Journal 54 (6), 962-975, 2011
Optimal strategy of coupon subset collection when each package contains half of the coupons
C Fang, EC Chang
Information Processing Letters 114 (12), 703-705, 2014
System and method for configuring a wireless device for wireless network access
J Shi, F Chengfang, G Wang
US Patent App. 16/403,110, 2019
Publishing Location Dataset Differential Privately with Isotonic Regression
C Fang, EC Chang
arXiv preprint arXiv:1111.6677, 2011
Securing kiosk using mobile devices coupled with visual inspection
C Fang, EC Chang
System and method for controlling access to encrypted vehicular data
CK Chu, Z Wei, F Chengfang
US Patent App. 16/399,351, 2019
System and method for verifying integrity of an electronic device
WU Yongzheng, X Wen, F Chengfang, LI Tieyan
US Patent App. 15/718,712, 2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20