Full Name
Ee Chien Chang
Variants
chang, e.-c.
chang, e.c.
chang, ee chien
 
 
 
Email
dcscec@nus.edu.sg
 

Publications

Results 21-40 of 80 (Search time: 0.006 seconds).

Issue DateTitleAuthor(s)
212006Effect of malicious synchronizationChan, M.C. ; Chang, E.-C. ; Lu, L.; Ngiam, P.S.
222007Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chainsDutta, R.; Chang, E.-C. ; Mukhopadhyay, S. 
232012El-pincel - A painter cloud service for greener web pagesAnand, B. ; Chong, L.K.; Chang, E.-C. ; Chan, M.C. ; Ananda, A.L. ; Ooi, W.T. 
242011Enhancing host security using external environment sensorsChang, E.-C. ; Lu, L.; Wu, Y. ; Yap, R.H.C. ; Yu, J.
2529-Apr-2020Enhancing Transformation-based Defenses Against Adversarial Attacks with a Distribution ClassifierKou, CKL; Lee, HK ; Chang, EC ; Ng, TK 
262004Error concealment for JPEG2000 images based on orthogonal edge directed filtersYe, S.; Sun, Q.; Chang, E.-C. 
272005Error resilient content-based image authentication over wireless channelYe, S.; Sun, Q.; Chang, E.-C. 
282006Error resilient image authentication using feature statistical and spatial propertiesYe, S.; Sun, Q.; Chang, E.-C. 
292005Fast rendering of foveated volumes in wavelet-based representationYu, H. ; Chang, E.-C. ; HUANG ZHIYONG ; Zheng, Z.
302003Feature extraction of volume data based on multi-scale representationWu, Y.; Chang, E.C. ; HUANG ZHIYONG ; Kankanhalli, M.S. 
3124-May-2021Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep LearningTann, WJW ; Tan, JJW; Purba, J; Chang, EC 
322006Finding the original point set hidden among chaffChang, E.-C. ; Shen, R.; Teo, F.W.
332008Fuzzy extractors for asymmetric biometric representationsLi, Q.; Guo, M.; Chang, K.-C. 
342006Hiding secret points amidst chaffChang, E.-C. ; Li, Q. 
352009ID repetition in kadYu, J.; Fang, C.; Xu, J.; Chang, E.-C. ; Li, Z.
362011ID repetition in structured P2P networksYu, J.; Li, Z.; Xiao, P.; Fang, C.; Xu, J.; Chang, E.-C. 
372011Identity leakage mitigation on asymmetric secure sketchFang, C.; Li, Q.; Chang, E.-C. 
382012Indexing encrypted documents for supporting efficient keyword searchHore, B.; Chang, E.-C. ; Diallo, M.H.; Mehrotra, S.
392008Information leakage in optimal anonymized and diversified dataFang, C.; Chang, E.-C. 
402009Integrated optimization of video server resource and streaming quality over best-effort networkYu, H. ; Chang, E.-C. ; Ooi, W.T. ; Chan, M.C. ; Cheng, W.