Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Pei Ni
Benjamin Taubmann
M. Kleider
Hao Mao
Peter Malec
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
YU-LUN HUANG
Author Info
Open Visualization
Name
Affiliation
Papers
YU-LUN HUANG
Department of Electrical and Control Engineering, National Chiao-Tung University, Taiwan
27
Collaborators
Citations
PageRank
45
382
26.06
Referers
Referees
References
1025
586
239
Search Limit
100
1000
Publications (27 rows)
Collaborators (45 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Bringing Desktop Applications to the Web
1
0.39
2016
S-CBAC: A secure access control model supporting group access for Internet of Things.
0
0.34
2015
An Adjustable Risk Assessment Method for a Cloud System
0
0.34
2015
Locating Anchors In Wsn Using A Wearable Imu-Camera
0
0.34
2014
An Anomaly Detection Module for Firefox OS
0
0.34
2014
A Performance Mapping Model for Physical-to-Virtual Migration
0
0.34
2013
Security Impacts of Virtualization on a Network Testbed
3
0.40
2012
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
15
0.87
2012
A framework for quantitative evaluation of parallel control-flow obfuscation
2
0.41
2012
Threat as a Service?: Virtualization's Impact on Cloud Security
30
1.26
2012
S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks
14
0.59
2011
Attacks against process control systems: risk assessment, detection, and response
181
8.90
2011
An Analytic Hierarchy Process-Based Risk Assessment Method for Wireless Networks.
11
0.58
2011
OSNP: Secure wireless authentication protocol using one-time key
5
0.48
2009
Hands-on oriented curriculum and laboratory development for embedded system design
1
0.38
2009
Understanding the physical and economic consequences of attacks on control systems.
41
2.70
2009
A Graph Approach to Quantitative Analysis of Control-Flow Obfuscating Transformations
10
0.56
2009
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS
1
0.37
2009
Design methodology and hands-on practices for Embedded Operating Systems
0
0.34
2007
A control flow obfuscation method to discourage malicious tampering of software codes
1
0.36
2006
Kannon: Ubiquitous Sensor/Actuator Technologies for Elderly Living and Care: A Multidisciplinary Effort in National Chiao Tung University, Taiwan
1
0.36
2006
Efficient key distribution schemes for secure media delivery in pay-TV systems
32
1.84
2004
Optimal information-dispersal for fault-tolerant communication over a burst-error channel
0
0.34
2003
Network address translators: effects on security protocols and applications in the TCP/IP stack
7
1.09
2000
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions
4
0.52
2000
Practical key distribution schemes for channel protection
2
0.42
2000
An Efficient Authentication Protocol for Mobile Networks
20
1.25
1999
1