The SCEAS System
Navigation Menu

Search the dblp DataBase


Ee-Chien Chang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam
    Effect of Malicious Synchronization. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:114-129 [Conf]
  2. Ee-Chien Chang, Ren Shen, Francis Weijian Teo
    Finding the original point set hidden among chaff. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:182-188 [Conf]
  3. Ee-Chien Chang, Chee-Keng Yap
    Competitive Online Scheduling with Level of Service. [Citation Graph (0, 0)][DBLP]
    COCOON, 2001, pp:453-462 [Conf]
  4. Ee-Chien Chang, Sung Woo Choi, DoYong Kwon, Hyungju Park, Chee-Keng Yap
    Shortest path amidst disc obstacles is computable. [Citation Graph (0, 0)][DBLP]
    Symposium on Computational Geometry, 2005, pp:116-125 [Conf]
  5. Ee-Chien Chang, Chee-Keng Yap
    A Wavelet Approach to Foveating Images. [Citation Graph (0, 0)][DBLP]
    Symposium on Computational Geometry, 1997, pp:397-399 [Conf]
  6. Ee-Chien Chang, Qiming Li
    Hiding Secret Points Amidst Chaff. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:59-72 [Conf]
  7. Ee-Chien Chang, Zhiyong Huang, Mohan S. Kankanhalli, Rong Xu
    A 3D shape matching framework. [Citation Graph (0, 0)][DBLP]
    GRAPHITE, 2003, pp:269-270 [Conf]
  8. Yinghui Wu, Ee-Chien Chang, Zhiyong Huang, Mohan S. Kankanhalli
    Feature extraction of volume data based on multi-scale representation. [Citation Graph (0, 0)][DBLP]
    GRAPHITE, 2003, pp:175-180 [Conf]
  9. Ee-Chien Chang, Michael T. Orchard
    Geometric Properties of Watermarking Schemes. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  10. Sujoy Roy, Ee-Chien Chang
    Watermarking color histograms. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2191-2194 [Conf]
  11. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Edge directed filter based error concealment for wavelet-based images. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:809-812 [Conf]
  12. Hang Yu, Vu-Thanh Nguyen, Ee-Chien Chang
    Rotation of foveated image in the wavelet domain. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2515-2518 [Conf]
  13. Vu-Thanh Nguyen, Ee-Chien Chang, Wei Tsang Ooi
    Layered coding with good allocation outperforms multiple description coding over multiple paths. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1067-1070 [Conf]
  14. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Error concealment for JPEG2000 images based on orthogonal edge directed filters. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1663-1666 [Conf]
  15. Hui Huang Lee, Ee-Chien Chang, Mun Choon Chan
    Pervasive Random Beacon in the Internet for Covert Coordination. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:53-61 [Conf]
  16. Qiming Li, Ee-Chien Chang
    Security of Public Watermarking Schemes for Binary Sequences. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:119-128 [Conf]
  17. Qiming Li, Ee-Chien Chang
    On the Possibility of Non-invertible Watermarking Schemes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:13-24 [Conf]
  18. Qiming Li, Ee-Chien Chang, Mun Choon Chan
    On the effectiveness of DDoS attacks on statistical filtering. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1373-1383 [Conf]
  19. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Error resilient content-based image authentication over wireless channel. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2005, pp:2707-2710 [Conf]
  20. Qiming Li, Ee-Chien Chang
    Public Watermark Detection Using Multiple Proxies and Secret Sharing. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:558-569 [Conf]
  21. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:461-472 [Conf]
  22. Hang Yu, Ee-Chien Chang
    Distributed multivariate regression based on influential observations. [Citation Graph (0, 0)][DBLP]
    KDD, 2003, pp:679-684 [Conf]
  23. Sujoy Roy, Ee-Chien Chang, K. Natarajan
    A unified framework for resolving ambiguity in copy detection. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2005, pp:648-655 [Conf]
  24. Xianfeng Yang, Qi Tian, Ee-Chien Chang
    A color fingerprint of video shot for content identification. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:276-279 [Conf]
  25. Pradeep K. Atrey, Wei-Qi Yan, Ee-Chien Chang, Mohan S. Kankanhalli
    A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing. [Citation Graph (0, 0)][DBLP]
    MMM, 2004, pp:330-337 [Conf]
  26. Hang Yu, Ee-Chien Chang, Zhiyong Huang, Zhijian Zheng
    Fast Rendering of Foveated Volume in the Wavelet Domain. [Citation Graph (0, 0)][DBLP]
    IEEE Visualization, 2004, pp:26- [Conf]
  27. Chen Chen, Zhiyong Huang, Hang Yu, Ee-Chien Chang
    Progressive transmission and rendering of foveated volume data. [Citation Graph (0, 0)][DBLP]
    GRAPP, 2006, pp:67-75 [Conf]
  28. Ee-Chien Chang, Chee-Keng Yap
    A Simultaneous Search Problem. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 2000, v:26, n:2, pp:255-262 [Journal]
  29. Ee-Chien Chang, Sung Woo Choi, DoYong Kwon, Hyungju Park, Chee-Keng Yap
    Shortest Path amidst Disc Obstacles Is Computable. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Geometry Appl., 2006, v:16, n:5-6, pp:567-590 [Journal]
  30. Ee-Chien Chang, Weiguo Wang, Mohan S. Kankanhalli
    Multidimensional On-Line Bin-Packing: An Algorithm and its Average-Case Analysis. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1993, v:48, n:3, pp:121-125 [Journal]
  31. Ee-Chien Chang, Chee-Keng Yap
    A Note on Improved Deterministic Time Simulation of Nondeterministic Space for Small Space. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:55, n:3, pp:155-157 [Journal]
  32. Ee-Chien Chang, Mohan S. Kankanhalli, Xin Guan, Zhiyong Huang, Yinghui Wu
    Robust image authentication using content based compression. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:2, pp:121-130 [Journal]
  33. Sujoy Roy, Ee-Chien Chang
    Watermarking with retrieval systems. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2004, v:9, n:5, pp:433-440 [Journal]
  34. Ee-Chien Chang, Chee Yap
    Competitive On-Line Scheduling with Level of Service. [Citation Graph (0, 0)][DBLP]
    J. Scheduling, 2003, v:6, n:3, pp:251-267 [Journal]
  35. Hang Yu, Ee-Chien Chang, Zhiyong Huang, Zhijian Zheng
    Fast rendering of foveated volumes in wavelet-based representation. [Citation Graph (0, 0)][DBLP]
    The Visual Computer, 2005, v:21, n:8-10, pp:735-744 [Journal]
  36. Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay
    Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:385-400 [Conf]
  37. Ee-Chien Chang, Sujoy Roy
    Robust Extraction of Secret Bits from Minutiae. [Citation Graph (0, 0)][DBLP]
    ICB, 2007, pp:750-759 [Conf]
  38. Qiming Li, Ee-Chien Chang
    Robust, short and sensitive authentication tags using secure sketch. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:56-61 [Conf]
  39. Qiming Li, Ee-Chien Chang
    Zero-knowledge watermark detection resistant to ambiguity attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:158-163 [Conf]
  40. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. [Citation Graph (0, 0)][DBLP]
    T. Data Hiding and Multimedia Security, 2007, v:2, n:, pp:48-67 [Journal]

  41. Secure Sketch for Multiple Secrets. [Citation Graph (, )][DBLP]

  42. A general model of probabilistic packet marking for IP traceback. [Citation Graph (, )][DBLP]

  43. Short Redactable Signatures Using Random Trees. [Citation Graph (, )][DBLP]

  44. Remote Integrity Check with Dishonest Storage Server. [Citation Graph (, )][DBLP]

  45. Website Fingerprinting and Identification Using Ordered Feature Sequences. [Citation Graph (, )][DBLP]

  46. Watermarking based Image Authentication using Feature Amplification. [Citation Graph (, )][DBLP]

  47. Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact. [Citation Graph (, )][DBLP]

  48. Information Leakage in Optimal Anonymized and Diversified Data. [Citation Graph (, )][DBLP]

  49. Residual Information of Redacted Images Hidden in the Compression Artifacts. [Citation Graph (, )][DBLP]

  50. ID Repetition in Kad. [Citation Graph (, )][DBLP]

  51. Securing Kiosk using Mobile Devices coupled with Visual Inspection [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002