151 Publications (Page 4 of 7)
2013
A Bayesian Inference-Based Framework for RFID Data CleansingKu, Wei Shinn⋅Chen, Haiquan⋅Wang, Haixun and Sun, Min-TeIEEE Transactions on Knowledge and Data Engineering, vol. 25, (no. 10), pp. 2191, 2013-Oct..
| Journal Article
An RFID and particle filter-based indoor spatial query evaluation systemYu, J.⋅Ku, W. S.⋅Sun, M.-T. and Lu, H.(pp. 263-274)
A query integrity assurance scheme for accessing outsourced spatial databasesKu, Wei Shinn⋅Hu, Ling⋅Shahabi, Cyrus and Wang, HaixunGeoInformatica, vol. 17, (no. 1), pp. 97-124, 2013.
| Journal Article
ARMORY: An automatic security testing tool for buffer overflow defect detectionChen, Li-Han⋅Hsu, Fu-Hau⋅Hwang, Yanling⋅Su, Mu-Chun⋅Ku, Wei Shinn and Chang, Chi-HsuanComputers and Electrical Engineering, vol. 39, (no. 7), pp. 2242, October 2013.
| Journal Article
A spatial keyword evaluation framework for network-based spatial queriesZhang, J.⋅Ku, W. S.⋅Jiang, X. and Qin, X.(pp. 498-501)
Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward ChannelSakai, K⋅Ku, Wei Shinn⋅Zimmermann, R and Sun, Min-TeIEEE Transactions on Computers, vol. 62, (no. 1), pp. 123, 2013-Jan..
| Journal Article
Evaluation of spatial keyword queries with partial result support on spatial networksZhang, J.⋅Ku, W. S.⋅Jiang, X.⋅Qin, X. and Hsueh, Y.-L.(pp. 279-282)
Geo-Store: A Framework for Supporting Semantics-Enabled Location-Based ServicesKu, Wei Shinn⋅Chen, Haiquan⋅Wang, Chih-Jye and Liu, Chuan-MingIEEE Internet Computing, vol. 17, (no. 2), pp. 35-43, 2013.
| Journal Article
LAVI: A location aware virtual infrastructure for VANETsGolatkar, R.B.⋅Chen, Y. and Ku, W. S.(pp. 1-6)
LinkProbe: Probabilistic inference on large-scale social networksChen, H.⋅Ku, W. S.⋅Wang, H.⋅Tang, L. and Sun, M.-T.(pp. 290-301)
Privacy preserving continuous multimedia streaming in MANETsSakai, Kazuya⋅Ku, Wei Shinn⋅Sun, Min-Te and Zimmermann, RogerACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), vol. 9, (no. 4), pp. 22, 08-01-2013.
| Journal Article
Randomized Skip Lists-based private authentication for large-scale RFID systemsSakai, K.⋅Sun, M.-T.⋅Ku, W. S. and Lai, T.H.(pp. 277-280)
Spatial Query Integrity with Voronoi NeighborsHu, Ling⋅Ku, Wei Shinn⋅Bakiras, S and Shahabi, CIEEE Transactions on Knowledge and Data Engineering, vol. 25, (no. 4), pp. 876, 2013-April.
| Journal Article
2012
Anonymous sensory data collection approach for mobile participatory sensingWang, C.-J. and Ku, W. S.(pp. 220-227)
Caching support for skyline query processing with partially-ordered domainsHsueh, Y.-L.⋅Zimmermann, R. and Ku, W. S.(pp. 386-389)
Efficient evaluation of skyline queries in wireless data broadcast environmentsWang, C.-J. and Ku, W. S.(pp. 442-445)
Enforcing k nearest neighbor query integrity on road networksHu, L.⋅Jing, Y.⋅Ku, W. S. and Shahabi, C.(pp. 422-425)
Geo-Store: A spatially-augmented SPARQL query evaluation systemWang, C.-J.⋅Ku, W. S. and Chen, H.(pp. 562-565)
2011
A location aware virtual infrastructure for VANETsChen, Y.⋅Wang, C.-J.⋅Ku, W. S. and Su, Z.(pp. 820-821)
BMF: Bitmapped Mass Fingerprinting for fast protein identificationYu, Weikuan⋅Yu, W.⋅Yu, W.⋅Wu, K.J.⋅Wu, K.J.⋅Wu, K. John⋅Ku, W.-S.⋅Ku, W. S.⋅Ku, Wei-Shinn⋅Xu, C.⋅Xu, C.⋅Xu, Cong⋅Gao, Juan⋅Gao, J. and Gao, J.(pp. 17-25)
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocolFeng, J.⋅Chen, Y.⋅Summerville, D.⋅Ku, W. S. and Su, Z.(pp. 521-522)
Mitigating DDoS attacks using protection nodes in mobile ad hoc networksXiang, M.⋅Chen, Y.⋅Ku, W. S. and Su, Z.
Querying uncertain data with aggregate constraintsYang, M.⋅Wang, H.⋅Chen, H. and Ku, W. S.(pp. 817-828)
Secure Distributed Data Storage in Cloud ComputingChen, Y.⋅Ku, W. S.⋅Feng, J.⋅Liu, P. and Su, Z.(pp. 221-248)
SkyEngine: Efficient skyline search engine for continuous skyline computationsHsueh, Y.-L.⋅Zimmermann, R.⋅Ku, W. S. and Jin, Y.(pp. 1316-1319)