Ee-Chien Chang
TitleCited byYear
A fast direct Fourier-based algorithm for subpixel registration of images
HS Stone, MT Orchard, EC Chang, SA Martucci
IEEE Transactions on geoscience and remote sensing 39 (10), 2235-2243, 2001
4422001
Detecting digital image forgeries by measuring inconsistencies of blocking artifact
S Ye, Q Sun, EC Chang
2007 IEEE International Conference on Multimedia and Expo, 12-15, 2007
2462007
Weak Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
J Xu, EC Chang, J Zhou
Proceedings of the 8th ACM Symposium on Information, Computer and …, 2013
2132013
Remote integrity check with dishonest storage server
EC Chang, J Xu
European Conference on Research in Computer Security, 223-237, 2008
1342008
Finding the original point set hidden among chaff
EC Chang, R Shen, FW Teo
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
1322006
Live memory forensics of mobile phones
VLL Thing, KY Ng, EC Chang
digital investigation 7, S74-S82, 2010
1292010
Phase-unwrapping of SAR interferogram with multi-frequency or multi-baseline
W Xu, EC Chang, LK Kwoh, H Lim, W Cheng, A Heng
Geoscience and Remote Sensing Symposium, 1994. IGARSS'94. Surface and …, 1994
1291994
Blind separation of fetal ECG from single mixture using SVD and ICA
P Gao, EC Chang, L Wyse
Information, Communications and Signal Processing, 2003 and the Fourth …, 2003
1062003
Wavelet foveation
EC Chang, S Mallat, C Yap
Applied and Computational Harmonic Analysis 9 (3), 312-335, 2000
1052000
Towards efficient proofs of retrievability
J Xu, EC Chang
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
972012
Website fingerprinting and identification using ordered feature sequences
L Lu, EC Chang, MC Chan
ESORICS 2010, 199-214, 2010
922010
Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains
R Dutta, EC Chang, S Mukhopadhyay
Applied Cryptography and Network Security, 385-400, 2007
792007
M2R: Enabling stronger privacy in MapReduce computation
TTA Dinh, P Saxena, EC Chang, BC Ooi, C Zhang
24th {USENIX} Security Symposium ({USENIX} Security 15), 447-462, 2015
762015
A wavelet approach to foveating images
EC Chang, CK Yap
Symposium on Computational Geometry, 397-399, 1997
721997
Robust extraction of secret bits from minutiae
EC Chang, S Roy
Proceedings of the International Conference on Advances in Biometrics, 750-759, 2007
702007
Short redactable signatures using random trees
EC Chang, C Lim, J Xu
CT-RSA, 133-147, 2009
692009
Hiding secret points amidst chaff
EC Chang, Q Li
EUROCRYPT, 59-72, 2006
692006
On the effectiveness of DDoS attacks on statistical filtering
Q Li, EC Chang, MC Chan
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
672005
Fuzzy extractors for asymmetric biometric representations
Q Li, M Guo, EC Chang
2008 IEEE Computer Society Conference on Computer Vision and Pattern …, 2008
622008
Robust, short and sensitive authentication tags using secure sketch
Q Li, EC Chang
Proceedings of the 8th workshop on Multimedia and security, 56-61, 2006
552006
The system can't perform the operation now. Try again later.
Articles 1–20