Остановите войну!
for scientists:
default search action
Chengfang Fang
- > Home > Persons > Chengfang Fang
Publications
- 2023
- [c23]Jiyi Zhang, Han Fang, Wesley Joon-Wie Tann, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers. AsiaCCS 2023: 704-715 - [c21]Han Fang, Jiyi Zhang, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. ICCV 2023: 4312-4321 - [c18]Han Fang, Kejiang Chen, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Weiming Zhang, Ee-Chien Chang:
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness. ACM Multimedia 2023: 7345-7353 - [i11]Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. CoRR abs/2301.01218 (2023) - 2014
- [j3]Chengfang Fang, Ee-Chien Chang:
Optimal strategy of coupon subset collection when each package contains half of the coupons. Inf. Process. Lett. 114(12): 703-705 (2014) - [c10]Chengfang Fang, Ee-Chien Chang:
Differential privacy with δ-neighbourhood for spatial and dynamic datasets. AsiaCCS 2014: 159-170 - [c9]Chengfang Fang, Chunwang Zhang, Ee-Chien Chang:
An Optimization Model for Aesthetic Two-Dimensional Barcodes. MMM (1) 2014: 278-290 - 2012
- [c8]Chengfang Fang, Ee-Chien Chang:
Adaptive Differentially Private Histogram of Low-Dimensional Data. Privacy Enhancing Technologies 2012: 160-179 - 2011
- [j2]Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu, Ee-Chien Chang:
ID Repetition in Structured P2P Networks. Comput. J. 54(6): 962-975 (2011) - [c7]Chengfang Fang, Qiming Li, Ee-Chien Chang:
Identity leakage mitigation on asymmetric secure sketch. IJCB 2011: 1-6 - [i3]Chengfang Fang, Ee-Chien Chang:
Publishing Location Dataset Differential Privately with Isotonic Regression. CoRR abs/1111.6677 (2011) - 2010
- [c6]Chengfang Fang, Qiming Li, Ee-Chien Chang:
Secure Sketch for Multiple Secrets. ACNS 2010: 367-383 - [c5]Chengfang Fang, Ee-Chien Chang:
Securing interactive sessions using mobile device through visual channel and visual inspection. ACSAC 2010: 69-78 - [c4]Ee-Chien Chang, Chengfang Fang, Jia Xu:
A chameleon encryption scheme resistant to known-plaintext attack. Digital Rights Management Workshop 2010: 25-34 - [i2]Chengfang Fang, Ee-Chien Chang:
Securing Kiosk using Mobile Devices coupled with Visual Inspection. CoRR abs/1003.0723 (2010) - 2009
- [c2]Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, Zhoujun Li:
ID Repetition in Kad. Peer-to-Peer Computing 2009: 111-120 - 2008
- [c1]Chengfang Fang, Ee-Chien Chang:
Information Leakage in Optimal Anonymized and Diversified Data. Information Hiding 2008: 30-44 - [i1]Chengfang Fang, Ee-Chien Chang:
Information Leakage in Optimal Anonymized and Diversified Data. IACR Cryptol. ePrint Arch. 2008: 347 (2008)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-01-23 23:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint