Chengfang Fang
Chengfang Fang
Research Assistant, National University of Singapore
Verified email at huawei.com
Title
Cited by
Cited by
Year
Mitigating application layer distributed denial of service attacks via effective trust management
J Yu, C Fang, L Lu, Z Li
IET communications 4 (16), 1952-1962, 2010
452010
ID repetition in Kad
J Yu, C Fang, J Xu, EC Chang, Z Li
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 111-120, 2009
382009
A lightweight mechanism to mitigate application layer DDoS attacks
J Yu, C Fang, L Lu, Z Li
International Conference on Scalable Information Systems, 175-191, 2009
362009
An optimization model for aesthetic two-dimensional barcodes
C Fang, C Zhang, EC Chang
International Conference on Multimedia Modeling, 278-290, 2014
182014
Secure sketch for multiple secrets
C Fang, Q Li, EC Chang
International Conference on Applied Cryptography and Network Security, 367-383, 2010
92010
Information leakage in optimal anonymized and diversified data
C Fang, EC Chang
International workshop on information hiding, 30-44, 2008
92008
Differential privacy with δ-neighbourhood for spatial and dynamic datasets
C Fang, EC Chang
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
82014
Securing interactive sessions using mobile device through visual channel and visual inspection
C Fang, EC Chang
Proceedings of the 26th Annual Computer Security Applications Conference, 69-78, 2010
82010
A goal-oriented approach for modeling and analyzing attack graph
X Liu, C Fang, D Xiao, H Xu
2010 International Conference on Information Science and Applications, 1-8, 2010
82010
BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
European Symposium on Research in Computer Security, 66-83, 2019
62019
Adaptive differentially private histogram of low-dimensional data
C Fang, EC Chang
International Symposium on Privacy Enhancing Technologies Symposium, 160-179, 2012
62012
Intrusion diagnosis and prediction with expert system
X Liu, C Fang, D Xiao
Security and Communication Networks 4 (12), 1483-1494, 2011
62011
Zhoujun Li. Id repetition in kad
J Yu, C Fang, J Xu, EC Chang
Peer-to-Peer Computing, 111-120, 2009
52009
Id repetition in structured p2p networks
J Yu, Z Li, P Xiao, C Fang, J Xu, EC Chang
The Computer Journal 54 (6), 962-975, 2011
42011
System and method for configuring a wireless device for wireless network access
J Shi, F Chengfang, G Wang
US Patent App. 16/403,110, 2019
12019
Optimal strategy of coupon subset collection when each package contains half of the coupons
C Fang, EC Chang
Information Processing Letters 114 (12), 703-705, 2014
12014
Securing kiosk using mobile devices coupled with visual inspection
C Fang, EC Chang
12010
System and method for controlling access to encrypted vehicular data
CK Chu, Z Wei, F Chengfang
US Patent App. 16/399,351, 2019
2019
System and method for verifying integrity of an electronic device
WU Yongzheng, X Wen, F Chengfang, LI Tieyan
US Patent App. 15/718,712, 2018
2018
Publishing Location Dataset Differential Privately with Isotonic Regression
C Fang, EC Chang
arXiv preprint arXiv:1111.6677, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–20