default search action
Hsiao-Ying Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Hsiao-Ying Lin:
Standing on the Shoulders of AI Giants. Computer 56(1): 97-101 (2023) - [j14]Hsiao-Ying Lin:
Team With the Strong, Work With the Wise. Computer 56(7): 116-120 (2023) - [j13]Hsiao-Ying Lin:
Embedded Artificial Intelligence: Intelligence on Devices. Computer 56(9): 90-93 (2023) - [j12]Hsiao-Ying Lin, Jeffrey M. Voas:
Lower Energy Large Language Models (LLMs). Computer 56(10): 14-16 (2023) - [j11]Ziyao Liu, Hsiao-Ying Lin, Yamin Liu:
Long-Term Privacy-Preserving Aggregation With User-Dynamics for Federated Learning. IEEE Trans. Inf. Forensics Secur. 18: 2398-2412 (2023) - [c14]Maura Pintor, Luca Demetrio, Angelo Sotgiu, Hsiao-Ying Lin, Chengfang Fang, Ambra Demontis, Battista Biggio:
Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving. ICMLC 2023: 57-62 - 2022
- [j10]Hsiao-Ying Lin:
Large-Scale Artificial Intelligence Models. Computer 55(5): 76-80 (2022) - [j9]Hsiao-Ying Lin:
Staying Stronger Together: Synergy From Multiple Sensors. Computer 55(9): 74-78 (2022) - [i4]Ambra Demontis, Maura Pintor, Luca Demetrio, Kathrin Grosse, Hsiao-Ying Lin, Chengfang Fang, Battista Biggio, Fabio Roli:
A Survey on Reinforcement Learning Security with Application to Autonomous Driving. CoRR abs/2212.06123 (2022) - 2021
- [j8]Hsiao-Ying Lin:
Will We Adopt AI Like We Adopted Electricity? Computer 54(3): 48-51 (2021) - [j7]Hsiao-Ying Lin, Battista Biggio:
Adversarial Machine Learning: Attacks From Laboratories to the Real World. Computer 54(5): 56-60 (2021) - [j6]Hsiao-Ying Lin:
Colors of Artificial Intelligence. Computer 54(11): 95-99 (2021) - [c13]Zihao Qin, Hsiao-Ying Lin, Jie Shi:
Towards Demystifying Adversarial Robustness of Binarized Neural Networks. ACNS Workshops 2021: 439-462 - [i3]Haowen Liu, Ping Yi, Hsiao-Ying Lin, Jie Shi, Weidong Qiu:
DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction. CoRR abs/2103.06487 (2021) - 2020
- [j5]Jeffrey M. Voas, Hsiao-Ying Lin:
Is Artificial Intelligence/Machine Learning the Anticipated Silver Bullet? Computer 53(12): 18-19 (2020) - [c12]Hsiao-Ying Lin, Chengfang Fang, Jie Shi:
Bident Structure for Neural Network Model Protection. ICISSP 2020: 377-384 - [i2]Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache:
Keyed Non-Parametric Hypothesis Tests. CoRR abs/2005.12227 (2020)
2010 – 2019
- 2019
- [c11]Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache:
Keyed Non-parametric Hypothesis Tests. NSS 2019: 632-645 - 2018
- [c10]Hsiao-Ying Lin, Zhuo Wei, Yanjiang Yang, Yadong Wei, Kang Tang, Qingdi Sha:
AnchorCAN: Anchor-Based Secure CAN Communications System. DSC 2018: 1-7 - 2015
- [j4]Shiuan-Tzuo Shen, Hsiao-Ying Lin, Wen-Guey Tzeng:
An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems. IEEE Trans. Reliab. 64(3): 840-851 (2015) - 2014
- [c9]Hsiao-Ying Lin, Li-Ping Tung, Bao-Shuh Paul Lin:
Reliable Repair Mechanisms with Low Connection Cost for Code Based Distributed Storage Systems. SERE 2014: 235-244 - 2013
- [c8]Hsiao-Ying Lin, Li-Ping Tung, Bao-Shuh Paul Lin:
An Empirical Study on Data Retrievability in Decentralized Erasure Code Based Distributed Storage Systems. SERE 2013: 30-39 - 2012
- [j3]Hsiao-Ying Lin, Wen-Guey Tzeng:
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding. IEEE Trans. Parallel Distributed Syst. 23(6): 995-1003 (2012) - [c7]Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin:
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring. ACNS 2012: 544-560 - [c6]Hsiao-Ying Lin, Shiuan-Tzuo Shen, Wen-Guey Tzeng, Bao-Shuh Paul Lin:
Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System. AINA 2012: 740-747 - [c5]Hsiao-Ying Lin, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin:
A Privacy Preserving Smart Metering System Supporting Multiple Time Granularities. SERE (Companion) 2012: 119-126 - [c4]Hsiao-Ying Lin, John Kubiatowicz, Wen-Guey Tzeng:
A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems. SERE 2012: 225-234 - 2011
- [c3]Hsiao-Ying Lin, Wen-Guey Tzeng, Bao-Shuh Paul Lin:
A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems. TrustCom 2011: 613-620 - 2010
- [j2]Hsiao-Ying Lin, Wen-Guey Tzeng:
A Secure Decentralized Erasure Code for Distributed Networked Storage. IEEE Trans. Parallel Distributed Syst. 21(11): 1586-1594 (2010)
2000 – 2009
- 2009
- [j1]Hsiao-Ying Lin, Wen-Guey Tzeng:
Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication. J. Inf. Sci. Eng. 25(3): 907-920 (2009) - 2008
- [c2]Yu-Lun Huang, J. Doug Tygar, Hsiao-Ying Lin, L. Y. Yeh, Hsin-Yi Tsai, Keith Sklower, Shiuh-Pyng Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, Chia-Wei Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong:
SWOON: A Testbed for Secure Wireless Overlay Networks. CSET 2008 - 2005
- [c1]Hsiao-Ying Lin, Wen-Guey Tzeng:
An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. ACNS 2005: 456-466 - [i1]Hsiao-Ying Lin, Wen-Guey Tzeng:
An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2005: 43 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint