Search the dblp DataBase
Ee-Chien Chang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mun Choon Chan , Ee-Chien Chang , Liming Lu , Peng Song Ngiam Effect of Malicious Synchronization. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:114-129 [Conf ] Ee-Chien Chang , Ren Shen , Francis Weijian Teo Finding the original point set hidden among chaff. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:182-188 [Conf ] Ee-Chien Chang , Chee-Keng Yap Competitive Online Scheduling with Level of Service. [Citation Graph (0, 0)][DBLP ] COCOON, 2001, pp:453-462 [Conf ] Ee-Chien Chang , Sung Woo Choi , DoYong Kwon , Hyungju Park , Chee-Keng Yap Shortest path amidst disc obstacles is computable. [Citation Graph (0, 0)][DBLP ] Symposium on Computational Geometry, 2005, pp:116-125 [Conf ] Ee-Chien Chang , Chee-Keng Yap A Wavelet Approach to Foveating Images. [Citation Graph (0, 0)][DBLP ] Symposium on Computational Geometry, 1997, pp:397-399 [Conf ] Ee-Chien Chang , Qiming Li Hiding Secret Points Amidst Chaff. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:59-72 [Conf ] Ee-Chien Chang , Zhiyong Huang , Mohan S. Kankanhalli , Rong Xu A 3D shape matching framework. [Citation Graph (0, 0)][DBLP ] GRAPHITE, 2003, pp:269-270 [Conf ] Yinghui Wu , Ee-Chien Chang , Zhiyong Huang , Mohan S. Kankanhalli Feature extraction of volume data based on multi-scale representation. [Citation Graph (0, 0)][DBLP ] GRAPHITE, 2003, pp:175-180 [Conf ] Ee-Chien Chang , Michael T. Orchard Geometric Properties of Watermarking Schemes. [Citation Graph (0, 0)][DBLP ] ICIP, 2000, pp:- [Conf ] Sujoy Roy , Ee-Chien Chang Watermarking color histograms. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:2191-2194 [Conf ] Shuiming Ye , Qibin Sun , Ee-Chien Chang Edge directed filter based error concealment for wavelet-based images. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:809-812 [Conf ] Hang Yu , Vu-Thanh Nguyen , Ee-Chien Chang Rotation of foveated image in the wavelet domain. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:2515-2518 [Conf ] Vu-Thanh Nguyen , Ee-Chien Chang , Wei Tsang Ooi Layered coding with good allocation outperforms multiple description coding over multiple paths. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:1067-1070 [Conf ] Shuiming Ye , Qibin Sun , Ee-Chien Chang Error concealment for JPEG2000 images based on orthogonal edge directed filters. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:1663-1666 [Conf ] Hui Huang Lee , Ee-Chien Chang , Mun Choon Chan Pervasive Random Beacon in the Internet for Covert Coordination. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:53-61 [Conf ] Qiming Li , Ee-Chien Chang Security of Public Watermarking Schemes for Binary Sequences. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:119-128 [Conf ] Qiming Li , Ee-Chien Chang On the Possibility of Non-invertible Watermarking Schemes. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:13-24 [Conf ] Qiming Li , Ee-Chien Chang , Mun Choon Chan On the effectiveness of DDoS attacks on statistical filtering. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:1373-1383 [Conf ] Shuiming Ye , Qibin Sun , Ee-Chien Chang Error resilient content-based image authentication over wireless channel. [Citation Graph (0, 0)][DBLP ] ISCAS (3), 2005, pp:2707-2710 [Conf ] Qiming Li , Ee-Chien Chang Public Watermark Detection Using Multiple Proxies and Secret Sharing. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:558-569 [Conf ] Shuiming Ye , Qibin Sun , Ee-Chien Chang Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:461-472 [Conf ] Hang Yu , Ee-Chien Chang Distributed multivariate regression based on influential observations. [Citation Graph (0, 0)][DBLP ] KDD, 2003, pp:679-684 [Conf ] Sujoy Roy , Ee-Chien Chang , K. Natarajan A unified framework for resolving ambiguity in copy detection. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2005, pp:648-655 [Conf ] Xianfeng Yang , Qi Tian , Ee-Chien Chang A color fingerprint of video shot for content identification. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2004, pp:276-279 [Conf ] Pradeep K. Atrey , Wei-Qi Yan , Ee-Chien Chang , Mohan S. Kankanhalli A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing. [Citation Graph (0, 0)][DBLP ] MMM, 2004, pp:330-337 [Conf ] Hang Yu , Ee-Chien Chang , Zhiyong Huang , Zhijian Zheng Fast Rendering of Foveated Volume in the Wavelet Domain. [Citation Graph (0, 0)][DBLP ] IEEE Visualization, 2004, pp:26- [Conf ] Chen Chen , Zhiyong Huang , Hang Yu , Ee-Chien Chang Progressive transmission and rendering of foveated volume data. [Citation Graph (0, 0)][DBLP ] GRAPP, 2006, pp:67-75 [Conf ] Ee-Chien Chang , Chee-Keng Yap A Simultaneous Search Problem. [Citation Graph (0, 0)][DBLP ] Algorithmica, 2000, v:26, n:2, pp:255-262 [Journal ] Ee-Chien Chang , Sung Woo Choi , DoYong Kwon , Hyungju Park , Chee-Keng Yap Shortest Path amidst Disc Obstacles Is Computable. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Geometry Appl., 2006, v:16, n:5-6, pp:567-590 [Journal ] Ee-Chien Chang , Weiguo Wang , Mohan S. Kankanhalli Multidimensional On-Line Bin-Packing: An Algorithm and its Average-Case Analysis. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1993, v:48, n:3, pp:121-125 [Journal ] Ee-Chien Chang , Chee-Keng Yap A Note on Improved Deterministic Time Simulation of Nondeterministic Space for Small Space. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1995, v:55, n:3, pp:155-157 [Journal ] Ee-Chien Chang , Mohan S. Kankanhalli , Xin Guan , Zhiyong Huang , Yinghui Wu Robust image authentication using content based compression. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2003, v:9, n:2, pp:121-130 [Journal ] Sujoy Roy , Ee-Chien Chang Watermarking with retrieval systems. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2004, v:9, n:5, pp:433-440 [Journal ] Ee-Chien Chang , Chee Yap Competitive On-Line Scheduling with Level of Service. [Citation Graph (0, 0)][DBLP ] J. Scheduling, 2003, v:6, n:3, pp:251-267 [Journal ] Hang Yu , Ee-Chien Chang , Zhiyong Huang , Zhijian Zheng Fast rendering of foveated volumes in wavelet-based representation. [Citation Graph (0, 0)][DBLP ] The Visual Computer, 2005, v:21, n:8-10, pp:735-744 [Journal ] Ratna Dutta , Ee-Chien Chang , Sourav Mukhopadhyay Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:385-400 [Conf ] Ee-Chien Chang , Sujoy Roy Robust Extraction of Secret Bits from Minutiae. [Citation Graph (0, 0)][DBLP ] ICB, 2007, pp:750-759 [Conf ] Qiming Li , Ee-Chien Chang Robust, short and sensitive authentication tags using secure sketch. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2006, pp:56-61 [Conf ] Qiming Li , Ee-Chien Chang Zero-knowledge watermark detection resistant to ambiguity attacks. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2006, pp:158-163 [Conf ] Shuiming Ye , Qibin Sun , Ee-Chien Chang Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. [Citation Graph (0, 0)][DBLP ] T. Data Hiding and Multimedia Security, 2007, v:2, n:, pp:48-67 [Journal ] Secure Sketch for Multiple Secrets. [Citation Graph (, )][DBLP ] A general model of probabilistic packet marking for IP traceback. [Citation Graph (, )][DBLP ] Short Redactable Signatures Using Random Trees. [Citation Graph (, )][DBLP ] Remote Integrity Check with Dishonest Storage Server. [Citation Graph (, )][DBLP ] Website Fingerprinting and Identification Using Ordered Feature Sequences. [Citation Graph (, )][DBLP ] Watermarking based Image Authentication using Feature Amplification. [Citation Graph (, )][DBLP ] Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact. [Citation Graph (, )][DBLP ] Information Leakage in Optimal Anonymized and Diversified Data. [Citation Graph (, )][DBLP ] Residual Information of Redacted Images Hidden in the Compression Artifacts. [Citation Graph (, )][DBLP ] ID Repetition in Kad. [Citation Graph (, )][DBLP ] Securing Kiosk using Mobile Devices coupled with Visual Inspection [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.155secs