Ee-Chien Chang
Cited by
Cited by
A fast direct Fourier-based algorithm for subpixel registration of images
HS Stone, MT Orchard, EC Chang, SA Martucci
IEEE Transactions on geoscience and remote sensing 39 (10), 2235-2243, 2001
Detecting digital image forgeries by measuring inconsistencies of blocking artifact
S Ye, Q Sun, EC Chang
2007 IEEE International Conference on Multimedia and Expo, 12-15, 2007
Weak Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
J Xu, EC Chang, J Zhou
Proceedings of the 8th ACM Symposium on Information, Computer and …, 2013
Remote integrity check with dishonest storage server
EC Chang, J Xu
European Conference on Research in Computer Security, 223-237, 2008
Phase-unwrapping of SAR interferogram with multi-frequency or multi-baseline
W Xu, EC Chang, LK Kwoh, H Lim, W Cheng, A Heng
Geoscience and Remote Sensing Symposium, 1994. IGARSS'94. Surface and …, 1994
Live memory forensics of mobile phones
VLL Thing, KY Ng, EC Chang
digital investigation 7, S74-S82, 2010
Finding the original point set hidden among chaff
EC Chang, R Shen, FW Teo
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
Wavelet foveation
EC Chang, S Mallat, C Yap
Applied and Computational Harmonic Analysis 9 (3), 312-335, 2000
Blind separation of fetal ECG from single mixture using SVD and ICA
P Gao, EC Chang, L Wyse
Information, Communications and Signal Processing, 2003 and the Fourth …, 2003
Website fingerprinting and identification using ordered feature sequences
L Lu, EC Chang, MC Chan
ESORICS 2010, 199-214, 2010
Towards efficient proofs of retrievability
J Xu, EC Chang
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
M2R: Enabling stronger privacy in MapReduce computation
TTA Dinh, P Saxena, EC Chang, BC Ooi, C Zhang
24th {USENIX} Security Symposium ({USENIX} Security 15), 447-462, 2015
Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains
R Dutta, EC Chang, S Mukhopadhyay
Applied Cryptography and Network Security, 385-400, 2007
Short redactable signatures using random trees
EC Chang, C Lim, J Xu
CT-RSA, 133-147, 2009
A wavelet approach to foveating images
EC Chang, CK Yap
Proceedings of the thirteenth annual symposium on Computational geometry …, 1997
Robust extraction of secret bits from minutiae
EC Chang, S Roy
Proceedings of the International Conference on Advances in Biometrics, 750-759, 2007
Hiding secret points amidst chaff
EC Chang, Q Li
EUROCRYPT, 59-72, 2006
Fuzzy extractors for asymmetric biometric representations
Q Li, M Guo, EC Chang
2008 IEEE Computer Society Conference on Computer Vision and Pattern …, 2008
On the effectiveness of DDoS attacks on statistical filtering
Q Li, EC Chang, MC Chan
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
Towards scaling blockchain systems via sharding
H Dang, TTA Dinh, D Loghin, EC Chang, Q Lin, BC Ooi
Proceedings of the 2019 International Conference on Management of Data, 123-140, 2019
The system can't perform the operation now. Try again later.
Articles 1–20