Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

explorations

people

publications

Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT

Cheng-Yi Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng. (2022). "Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT." Journal of Systems Architecture. 130 (2022): 102642.

This paper is about the number 2. The number 3 is left for future work.

Defending Against Repetitive Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off

Cheng-Yi Lee, Ching-Chia Kao, Cheng-Han Yeh, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen. (2025). "Defending Against Repetitive Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off." WACV.

This paper is about the number 1. The number 2 is left for future work.

Defending against Clean-Image Backdoor Attack in Multi-Label Classification

Cheng-Yi Lee, Cheng-Chang Tsai, Ching-Chia Kao, Chun-Shien Lu, Chia-Mu Yu. (2024). "Defending against Clean-Image Backdoor Attack in Multi-Label Classification" ICASSP.

This paper is about the number 1. The number 2 is left for future work.

On The Higher Moment Disparity of Backdoor Attacks

Ching-Chia Kao, Cheng-Yi Lee, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen. (2024). "On The Higher Moment Disparity of Backdoor Attacks." ICME.

This paper is about the number 1. The number 2 is left for future work.

Exploring Robustness of Visual State Space model against Backdoor Attacks

Cheng-Yi Lee, Cheng-Chang Tsai, Chia-Mu Yu, Chun-Shien Lu. (2024). "Exploring Robustness of Visual State Space model against Backdoor Attacks"

This paper is about the number 1. The number 2 is left for future work.

Privacy-enhanced Data Sharing Systems from Hierarchical ID-based Puncturable Functional Encryption with Inner Product Predicates

Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin Tso. (2024). "Privacy-enhanced Data Sharing Systems from Hierarchical ID-based Puncturable Functional Encryption with Inner Product Predicates." IET Information Security.

This paper is about the number 1. The number 2 is left for future work.

research

teaching