Yih-Chun Hu
University of Illinois at Urbana-Champaign
H-index: 44
North America-United States
Top articles of Yih-Chun Hu
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
vRetention: A User Viewing Dataset for Popular Video Streaming Services | Bo-Rong Chen Jiayu Zhu Yanxin Jiang Yih-Chun Hu | 2024/4/15 | |
LoMoS: Less-online/more-offline signatures for extremely time-critical systems | IEEE Transactions on Smart Grid | Ertem Esiner Utku Tefek Hasan SM Erol Daisuke Mashima Binbin Chen | 2022/3/7 |
FlowTele: Remotely shaping traffic on internet-scale networks | Bo-Rong Chen Zhuotao Liu Jinhui Song Fanhui Zeng Zhoushi Zhu | 2022/11/30 | |
Cyber-Physical Testbed: Case Study to Evaluate Anti-Reconnaissance Approaches on Power Grids’ Cyber-Physical Infrastructures | Hui Lin Bibek Shrestha Yih-Chun Hu | 2020/9 | |
Analysis of message authentication solutions for IEC 61850 in substation automation systems | Utku Tefek Ertem Esiner Daisuke Mashima Yih-Chun Hu | 2022/10/25 | |
HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale. | Hsun Lee Yuming Hsu Jing-Jie Wang Hao-Cheng Yang Yu-Heng Chen | 2022 | |
Secure and ultra-reliable provenance recovery in sparse networks: Strategies and performance bounds | Ad Hoc Networks | Suraj Sajeev Manish Bansal SV Sriraam Harshan Jagadeesh Huzur Saran | 2022/6/1 |
TASC: Transparent, Agnostic, Secure Channel for CBTC Under Failure or Cyberattack | Utku Tefek Ertem Esiner Lin Wei Yih-Chun Hu | 2022/5/20 | |
Caching-based multicast message authentication in time-critical industrial control systems | Utku Tefek Ertem Esiner Daisuke Mashima Binbin Chen Yih-Chun Hu | 2022/5/2 | |
Key Generation with Ambient Audio | Bo-Rong Chen Hsin-Tien Chiang Heng-Cheng Kuo Yu Tsao Yih-Chun Hu | 2022/12/4 | |
Hasa-net: A non-intrusive hearing-aid speech assessment network | Hsin-Tien Chiang Yi-Chiao Wu Cheng Yu Tomoki Toda Hsin-Min Wang | 2021/12/13 | |
Make web3. 0 connected | IEEE transactions on dependable and secure computing | Zhuotao Liu Yangxi Xiang Jian Shi Peng Gao Haoyu Wang | 2021/5/11 |
DefRec: Establishing Physical FunctionVirtualization to Disrupt Reconnaissance of PowerGrids’ Cyber-Physical Infrastructures | The Proceedings of 2020 Network and Distributed System Security Symposium (NDSS) | Hui Lin Jianing Zhuang Yih-Chun Hu Huayu Zhou | 2020/2 |
Mitigating denial-of-service attacks on digital contact tracing | Bo-Rong Chen Yih-Chun Hu | 2020/11/16 | |
Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning | Human-centric Computing and Information Sciences | Taehyoung Kim Im Y Jung Yih-Chun Hu | 2020/8/26 |
Blindsignedid: Mitigate denial-of-service attacks on digital contact tracing | B Chen Y Hu | 2020/8/21 | |
Double-edge embedding based provenance recovery for low-latency applications in wireless networks | IEEE Transactions on Dependable and Secure Computing | Harshan Jagadeesh Amogh Vithalkar Naman Jhunjhunwala Manthan Kabra Prafull Manav | 2020/6/9 |
Bloom filter based low-latency provenance embedding schemes in wireless networks | Jagadeesh Harshan Amogh Vithalkar Naman Jhunjhunwala Manthan Kabra Prafull Manav | 2020/5/25 |