Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
portfolio
publications
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT
Published in Journal of Systems Architecture, 2022
This paper is about the number 2. The number 3 is left for future work.
Recommended citation: Cheng-Yi Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng. (2022). "Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT." Journal of Systems Architecture. 130 (2022): 102642.
Download Paper
Defending Against Repetitive Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off
Published in IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2024
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: Cheng-Yi Lee, Ching-Chia Kao, Cheng-Han Yeh, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen. (2025). "Defending Against Repetitive Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off." WACV.
Defending against Clean-Image Backdoor Attack in Multi-Label Classification
Published in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2024
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: Cheng-Yi Lee, Cheng-Chang Tsai, Ching-Chia Kao, Chun-Shien Lu, Chia-Mu Yu. (2024). "Defending against Clean-Image Backdoor Attack in Multi-Label Classification" ICASSP.
Download Paper
On The Higher Moment Disparity of Backdoor Attacks
Published in IEEE International Conference on Multimedia and Expo (ICME), 2024
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: Ching-Chia Kao, Cheng-Yi Lee, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen. (2024). "On The Higher Moment Disparity of Backdoor Attacks." ICME.
Exploring Robustness of Visual State Space model against Backdoor Attacks
Published in Under review, 2024
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: Cheng-Yi Lee, Cheng-Chang Tsai, Chia-Mu Yu, Chun-Shien Lu. (2024). "Exploring Robustness of Visual State Space model against Backdoor Attacks"
Download Paper
Privacy-enhanced Data Sharing Systems from Hierarchical ID-based Puncturable Functional Encryption with Inner Product Predicates
Published in IET Information Security, 2024
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin Tso. (2024). "Privacy-enhanced Data Sharing Systems from Hierarchical ID-based Puncturable Functional Encryption with Inner Product Predicates." IET Information Security.
talks
Talk 1 on Relevant Topic in Your Field
Published:
This is a description of your talk, which is a markdown file that can be all markdown-ified like any other post. Yay markdown!
Conference Proceeding talk 3 on Relevant Topic in Your Field
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.