Abstract is missing.
- n/2-1}Siang-Min Siao, Ming-Hwa Sheu, Shao-Yu Wang. 1-2 [doi]
- The calibration of gain error for time amplifier embedded in time-to-digital converterJung-Chin Lai, Frank Hsiao. 1-4 [doi]
- Keynote talk #1: Attribute-based access control: Insights and challengesRavi Sandhu. 34 [doi]
- Keynote Talk #2: Increase your security effectiveness by automating and machine learningMichael Montoya. 35 [doi]
- Fair deposits against double-spending for Bitcoin transactionsXingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng. 44-51 [doi]
- Design and analysis of high performance crypt-NoSQLMing-Hung Shih, J. Morris Chang. 52-59 [doi]
- Secure minimum weighted bipartite matchingBalamurugan Anandan, Chris Clifton. 60-67 [doi]
- Detecting invalid digital signatures in batchesD. J. Guan, E. S. Zhuang, Yu Shen Lin, I. C. Chung. 68-72 [doi]
- Design of applying FlexRay-bus to federated archiectecture for triple redundant reliable UAV flight control systemChang-Han Wu, Ti-Jui Chen, Terng-Yin Hsu, Shang-Ho Tsai, Hsung-Pin Chang. 73-78 [doi]
- A configurable H.265-compatible motion estimation accelerator architecture for realtime 4K video encoding in 65 nm CMOSMichael Braly, Aaron Stillmaker, Bevan M. Baas. 79-85 [doi]
- SVM point-based real-time emotion detectionWout Swinkels, Luc Claesen, Feng Xiao, Haibin Shen. 86-92 [doi]
- NIR-based gaze tracking with fast pupil ellipse fitting for real-time wearable eye trackersJia Hao Wu, Wei-Liang Ou, Chih-Peng Fan. 93-97 [doi]
- MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentationZhenghao Hu, Yuanyuan Zhang, Hui Wang, Juanru Li, Wenbo Yang, Dawu Gu. 98-106 [doi]
- K-binID: Kernel binary code identification for Virtual Machine IntrospectionYacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud. 107-114 [doi]
- VMCloak: Toward a stealthy in-VM agent executionChia-Wei Wang, Shiuhpyng Shieh. 115-122 [doi]
- The dose makes the poison - Leveraging uncertainty for effective malware detectionRuimin Sun, Xiaoyong Yuan, Andrew Lee, Matt Bishop, Donald E. Porter, Xiaolin Li, André Grégio, Daniela Oliveira. 123-130 [doi]
- Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attackSeokhwan Choi, Doo-Hee Hwang, Yoon Ho Choi. 131-137 [doi]
- Hidden process detection using kernel functions instrumentationYacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud. 138-145 [doi]
- Computing with obfuscated data in arbitrary logic circuits via noise insertion and cancellationYu-Wei Lee, Nur A. Touba. 146-152 [doi]
- Single-clock-cycle, multilayer encryption algorithm for single-channel IoT communicationsShahzad Muzaffar, Owais Talaat Waheed, Zeyar Aung, Ibrahim Abe M. Elfadel. 153-158 [doi]
- Workload-aware lifetime Trojan based on statistical aging manipulationTien-Hung Tseng, Shu-Sheng Wang, Jian-You Chen, Kai-Chiang Wu. 159-165 [doi]
- Security analysis of computing systems from circuit-architectural perspectiveShayan Taheri, Jiann-shiun Yuan. 166-173 [doi]
- An experimental study of the state-of-the-art PUFs implemented on FPGAsMohammed Saeed Alkatheiri, Yu Zhuang, Mikhail Korobkov, Abdur Rashid Sangi. 174-180 [doi]
- Towards fast and accurate machine learning attacks of feed-forward arbiter PUFsMohammed Saeed Alkatheiri, Yu Zhuang. 181-187 [doi]
- Implementing NFV system with OpenStackJinlin Chen, Yi Ren Chen, Shi-Chun Tsai, Yi-Bing Lin. 188-194 [doi]
- Detecting amplification attacks with Software Defined NetworkingChih-Chieh Chen, Yi Ren Chen, Wei-Chih Lu, Shi-Chun Tsai, Ming-Chuan Yang. 195-201 [doi]
- SDN On-The-Go (OTG) physical testbedJoshua A. Alcorn, Scott Melton, C. Edward Chow. 202-208 [doi]
- SDN data path confidence analysisJoshua A. Alcorn, Scott Melton, C. Edward Chow. 209-216 [doi]
- Detection and prevention of DoS attacks in Software-Defined Cloud networksPerumalraja Rengaraju, V. Raja Ramanan, Chung-Horng Lung. 217-223 [doi]
- FUSION: A unified application model for virtual mobile infrastructureChieh-Min Wang, Yu-Sung Wu, Hsing-Hsuan Chung. 224-231 [doi]
- Landslide prediction with model switchingShi Feng Chen, Pao-Ann Hsiung. 232-236 [doi]
- Combining low-cost Inertial Measurement Unit (IMU) and deep learning algorithm for predicting vehicle attitudeJunying Huang, Zhengyu Huang, KuanHung Chen. 237-239 [doi]
- High performance CAN/FlexRay gateway design for in-vehicle networkTrong-Yen Lee, Chia-Wei Kuo, I-An Lin. 240-242 [doi]
- Location privacy-protection based on p-destination in mobile social networks: A game theory analysisBidi Ying, Amiya Nayak. 243-250 [doi]
- PACS: Pemission abuse checking system for android applictions based on review miningJingZheng Wu, Mutian Yang, Tianyue Luo. 251-258 [doi]
- SCANNER: Sequence clustering of android resource accessesNeil Wong Hon Chan, Shanchieh Jay Yang. 259-266 [doi]
- Secure location tracking of femtocells in heterogeneous cellular networksShin-Ming Cheng, Yu-Jyun Wang, Ying-Cheng Chen. 267-272 [doi]
- R2D2: Right place, right path data deliveryEhab Ashary, C. Edward Chow, Ashish Korpe, Donovan Thorpe. 273-279 [doi]
- Privacy-preserving PCA on horizontally-partitioned dataMohammad Al-Rubaie, Pei Yuan Wu, J. Morris Chang, Sun-Yuan Kung. 280-287 [doi]
- LowLEAC: Low Leakage Energy Architecture for CachesRashmi Girmal, Arun K. Somani. 288-295 [doi]
- Design and implementation of a low-cost guided image filter for underwater image enhancementCheng-Hao Chang, I-Chang Huang, Mu-Fan Lin, Shiann-Rong Kuang. 296-299 [doi]
- Radix-4 adder design with refined carryChun-Hsiang Lai, Yu-Cheng Cheng, Tung-Chi Wu, Yen-Jen Chang. 300-304 [doi]
- Source code transformation for software-based on-line error detectionTsung-Yen Tsai, Jiun-Lang Huang. 305-309 [doi]
- Physically secure mutual authentication for IoTMuhammad Naveed Aman, Kee Chaing Chua, Biplab Sikdar. 310-317 [doi]
- Probabilistic treatment of service assurance in distributed information systemsKaliappa Ravindran, Chin-Tser Huang. 318-325 [doi]
- Federated identity hybrid cloud security considerations supporting first respondersRandy Garcia. 326-333 [doi]
- A write-operation-adaptable replication system for multiplayer cloud gamingWan-Chi Chang, Pi-Chung Wang. 334-339 [doi]
- An analytical model for reliability evaluation of cloud service provisioning systemsFatimah M. Alturkistani, Saad S. AlAboodi, Sarfraz Nawaz Brohi. 340-347 [doi]
- Hosting distributed databases on internet of things-scale devicesDaniel P. Richardson, Alan C. Lin, John M. Pecarina. 352-357 [doi]
- Cyber anonymity based on software-defined networking and Onion Routing (SOR)Abdelhamid Elgzil, C. Edward Chow, Amer Aljaedi, Naif Alamri. 358-365 [doi]
- AES S-box construction using different irreducible polynomial and constant 8-bit vectorAlamsyah, Agus Bejo, Teguh Bharata Adji. 366-369 [doi]
- Deterministic microcode machine generationAbir M'zah, Bruno Monsuez, Hycham Aboutaleb. 370-376 [doi]
- Generating and exploring S-box multivariate quadratic equation systems with SageMathAnastasia-Maria Leventi-Peetz, J.-V. Peetz. 377-383 [doi]
- Secure group key distribution in constrained environments with IKEv2Nils gentschen Felde, Tobias Guggemos, Tobias Heider, Dieter Kranzlmüller. 384-391 [doi]
- A practical and effective approach to implementing High Availability Seamless Redundancy (HSR)James T. Yu. 392-399 [doi]
- Multiparty computations in varying contextsPaul Laird, Sarah Jane Delany, Pierpaolo Dondio. 400-407 [doi]
- CRAXTriage: A coverage based triage systemChao-Chun Yeh, Han-Lin Lu, Yi-Hsuan Lee, Wei-Sheng Chou, Shih-Kun Huang. 408-415 [doi]
- Development of a network intrusion detection system using Apache Hadoop and SparkKeisuke Kato, Vitaly Klyuev. 416-423 [doi]
- A novel public key encryption model based on transformed biometricsBin Yan, Lin You. 424-428 [doi]
- Adaptive image encryption for high capacity reversible data hidingKa-Cheng Choi, Chi-Man Pun. 429-432 [doi]
- Novel designated ownership transfer with grouping proofWei Tim Liew, Kuo-Yu Tsai, Jia-Ning Luo, Ming-Hour Yang. 433-440 [doi]
- FRiPAL: Face recognition in privacy abstraction layerDi Zhuang, Sen Wang, J. Morris Chang. 441-448 [doi]
- A study on multiple wearable sensors for activity recognitionYu-Chuan Huang, Chih-Wei Yi, Wen-Chih Peng, Hsing-Chen Lin, Ching-Yu Huang. 449-452 [doi]
- Visual analysis of corrupted video data in video event data recordersYoungbin Pyo, Choong In Lee, Heejo Lee. 453-458 [doi]
- IoT-equipped UAV communications with seamless vertical handoverAmit Singh Gaur, Jyoti Budakoti, Chung-Horng Lung, Alan Redmond. 459-465 [doi]
- FPGA implementation of OFDM baseband processorKuohua Sung, Terng-Yin Hsu. 466-467 [doi]
- Lower power data transport protection for Internet of Things (IoT)Chih-Ta Lin, Cheng-Yu Tsai, Chuan-Kai Kao. 468-470 [doi]
- A novel UL power control scheme for a digital cellular repeaterYung-Ting Lee, Chunn-Yenn Lin, Ming-Jhou Wang. 471-472 [doi]
- On exploiting SDN to facilitate IPv4/IPv6 coexistence and transitionJia-Jhun Lin, Kai-Ching Wang, Shin-Ming Cheng, Yen-Chun Liu. 473-474 [doi]
- Implementation of digital self-interference cancellation in LTE-based CCFD transmissionJian-Ya Chu, Yuan-Te Liao, Chun-Yi Hung, Terng-Yin Hsu. 475-476 [doi]
- SDR measurement platform design for FMCW RADAR performance verificationJuinn-Horng Deng, Pin-Nien Chen, Chia-Fang Lee, Yuan-Feng Chan, Yen-Chung Lin. 477-478 [doi]
- An online subject-based spam filter using natural language featuresChih-Ning Lee, Yi-Ruei Chen, Wen-Guey Tzeng. 479-487 [doi]
- The forward-backward string: A new robust feature for botnet detectionYuan-Hsiang Su, Amir Rezapour, Wen-Guey Tzeng. 485-492 [doi]
- PeerHunter: Detecting peer-to-peer botnets through community behavior analysisDi Zhuang, J. Morris Chang. 493-500 [doi]
- Assessment of QoS adaptation and cyber-defense mechanisms in networked systemsKaliappa Ravindran, Yassine Wardei, A. Kodia, Michael Iannelli, Arun Adiththan, Steven Drager. 501-508 [doi]
- Ziffersystem: A novel malware distribution detection systemTzu-Hsien Chuang, Shin-Ying Huang, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee. 509-515 [doi]
- Enabling practical experimentation in cyber-security trainingJian Mao, Zheng-Leong Chua, Zhenkai Liang. 516-517 [doi]
- Memory forensics using virtual machine introspection for Malware analysisChin-Wei Tien, Jian-Wei Liao, Shun-Chieh Chang, Sy-Yen Kuo. 518-519 [doi]
- Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'Jun Gu, Tzonelih Hwang. 520-521 [doi]
- Resisting attacks from rogue HeNBCheng-Yu Tsai, Chuan-Kai Kao, Chuan-Yuan Huang, Zhi-Wei Lin. 522-523 [doi]
- Cyber attack and defense on industry control systemsChih-Ta Lin, Sung-Lin Wu, Mei-Lin Lee. 524-526 [doi]
- Shellcode detector for malicious document huntingChong Kuan Chen, Shen-Chieh Lan, Shiuhpyng Winston Shieh. 527-528 [doi]
- An SDN-based defensive solution against DHCP attacks in the virtualization environmentJhen-Li Wang, Yen-Chung Chen. 529-530 [doi]
- An autoblocking mechanism for firewall serviceShan-Jung Fu, Huai-Wen Hsu, Yi-Chih Kao, Shi-Chun Tsai, Chien-Chao Tseng. 531-532 [doi]
- Multi-object splicing forgery detection using noise level differenceBo Liu, Chi-Man Pun. 533-534 [doi]
- Droidrevealer: Automatically detecting Mysterious Codes in Android applicationsXinyin Zhang, Yuanye Cao, Mutian Yang, JingZheng Wu, Tianyue Luo, Yueqin Liu. 535-536 [doi]
- Interactive simulation platform using processing-based visualization for safe collision-free autonomous driving developmentDongkyu Lee, Jeonghun Cho, Daejin Park. 537-538 [doi]
- Development of a high throughput image compression system for optical remote sensingYu-Wei Cheng, Yin-Tsung Hwang. 539-540 [doi]