Posts by Collection

explorations

people

publications

Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT

Cheng-Yi Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng. (2022). "Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT." Journal of Systems Architecture. 130 (2022): 102642.

This paper is about the number 2. The number 3 is left for future work.

Defending Against Repetitive Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off

Cheng-Yi Lee, Ching-Chia Kao, Cheng-Han Yeh, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen. (2025). "Defending Against Repetitive Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off." WACV.

This paper is about the number 1. The number 2 is left for future work.

Defending against Clean-Image Backdoor Attack in Multi-Label Classification

Cheng-Yi Lee, Cheng-Chang Tsai, Ching-Chia Kao, Chun-Shien Lu, Chia-Mu Yu. (2024). "Defending against Clean-Image Backdoor Attack in Multi-Label Classification" ICASSP.

This paper is about the number 1. The number 2 is left for future work.

On The Higher Moment Disparity of Backdoor Attacks

Ching-Chia Kao, Cheng-Yi Lee, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen. (2024). "On The Higher Moment Disparity of Backdoor Attacks." ICME.

This paper is about the number 1. The number 2 is left for future work.

Exploring Robustness of Visual State Space model against Backdoor Attacks

Cheng-Yi Lee, Cheng-Chang Tsai, Chia-Mu Yu, Chun-Shien Lu. (2024). "Exploring Robustness of Visual State Space model against Backdoor Attacks"

This paper is about the number 1. The number 2 is left for future work.

Privacy-enhanced Data Sharing Systems from Hierarchical ID-based Puncturable Functional Encryption with Inner Product Predicates

Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin Tso. (2024). "Privacy-enhanced Data Sharing Systems from Hierarchical ID-based Puncturable Functional Encryption with Inner Product Predicates." IET Information Security.

This paper is about the number 1. The number 2 is left for future work.

research

teaching