SCION: Scalability, control, and isolation on next-generation networks X Zhang, HC Hsiao, G Hasker, H Chan, A Perrig, DG Andersen 2011 IEEE Symposium on Security and Privacy, 212-227, 2011 | 264 | 2011 |
Flooding-resilient broadcast authentication for vanets HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer Proceedings of the 17th annual international conference on Mobile computing …, 2011 | 128 | 2011 |
Spate: small-group pki-less authenticated trust establishment YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 126 | 2009 |
LAP: Lightweight anonymity and privacy HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng 2012 IEEE Symposium on Security and Privacy, 506-520, 2012 | 109 | 2012 |
SIBRA: Scalable internet bandwidth reservation architecture C Basescu, RM Reischuk, P Szalachowski, A Perrig, Y Zhang, HC Hsiao, ... arXiv preprint arXiv:1510.02696, 2015 | 88 | 2015 |
Policy-based secure deletion C Cachin, K Haralambiev, HC Hsiao, A Sorniotti Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 86 | 2013 |
XIA: architecting a more trustworthy and evolvable internet D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ... ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014 | 77 | 2014 |
A study of user-friendly hash comparison schemes HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ... 2009 annual computer security applications conference, 105-114, 2009 | 75 | 2009 |
Traffic-aware patching for cyber security in mobile IoT SM Cheng, PY Chen, CC Lin, HC Hsiao IEEE Communications Magazine 55 (7), 29-35, 2017 | 65 | 2017 |
Safechain: Securing trigger-action programming from attack chains KH Hsu, YH Chiang, HC Hsiao IEEE Transactions on Information Forensics and Security 14 (10), 2607-2622, 2019 | 62 | 2019 |
GroupIt: Lightweight group key management for dynamic IoT environments YH Kung, HC Hsiao IEEE Internet of Things Journal 5 (6), 5155-5165, 2018 | 62 | 2018 |
Instrim: Lightweight instrumentation for coverage-guided fuzzing CC Hsu, CY Wu, HC Hsiao, SK Huang Symposium on Network and Distributed System Security (NDSS), Workshop on …, 2018 | 62 | 2018 |
Computing device to detect malware H Hsiao, D Shuo, B Salamat, R Gupta, SM Das US Patent 9,832,211, 2017 | 61 | 2017 |
Securing data planes in software-defined networks TW Chao, YM Ke, BH Chen, JL Chen, CJ Hsieh, SC Lee, HC Hsiao 2016 IEEE NetSoft Conference and Workshops (NetSoft), 465-470, 2016 | 47 | 2016 |
On the feasibility of rerouting-based DDoS defenses M Tran, MS Kang, HC Hsiao, WH Chiang, SP Tung, YS Wang 2019 IEEE Symposium on Security and Privacy (SP), 1169-1184, 2019 | 45 | 2019 |
Efficient and secure threshold-based event validation for VANETs HC Hsiao, A Studer, R Dubey, E Shi, A Perrig Proceedings of the fourth ACM conference on Wireless network security, 163-174, 2011 | 43 | 2011 |
Shortmac: efficient data-plane fault localization. X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague NDSS, 2012 | 37 | 2012 |
Omnicrawl: Comprehensive measurement of web tracking with real desktop and mobile browsers D Cassel, SC Lin, A Buraggina, W Wang, A Zhang, L Bauer, HC Hsiao, ... Proceedings on Privacy Enhancing Technologies, 2022 | 36 | 2022 |
Cicadas: Congesting the internet with coordinated and decentralized pulsating attacks YM Ke, CW Chen, HC Hsiao, A Perrig, V Sekar Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 31 | 2016 |
STRIDE: sanctuary trail--refuge from internet DDoS entrapment HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee, V Gligor, A Perrig Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 31 | 2013 |