Search

Your search keyword '"Chiu, C."' showing total 285 results

Search Constraints

Start Over You searched for: Author "Chiu, C." Remove constraint Author: "Chiu, C." Publisher ieee Remove constraint Publisher: ieee
285 results on '"Chiu, C."'

Search Results

1. A Closer Look at Access Control in Multi-User Voice Systems

4. Assistive IoT-centric Robotics for Senior Living

9. Magnetic Properties of Ce₈₅Al₁₅ Doped NdFeB Sintered Magnet by Grain Boundary Diffusion of Tb₇₀Cu₃₀ Powders.

10. Stealthy Privacy Attacks Against Mobile AR Apps

17. A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples

21. Rainy Night Scene Understanding With Near Scene Semantic Adaptation.

22. PrivacyManager: An access control framework for mobile augmented reality applications

23. Cross-Weather Image Alignment via Latent Generative Model With Intensity Consistency.

24. Ge nanowire FETs with HfZrOx ferroelectric gate stack exhibiting SS of sub-60 mV/dec and biasing effects on ferroelectric reliability

25. Encryption-based privacy protection for police body-worn cameras

26. Covert Video Classification by Codebook Growing Pattern

27. A study on the privacy and security of police body cameras deployments

31. Survey of Smartphone-Based Police Monitoring Apps

32. Security and privacy for body cameras used in law enforcement

33. SmartArgos: Improving mobile surveillance systems with software defined networks

34. WiGroup: A Lightweight Cellular-Assisted Device-to-Device Network Formation Framework

35. mQual: A Mobile Peer-to-Peer Network Framework Supporting Quality of Service

36. Improving Virtual Machine Migration via Deduplication

37. Bandwidth Prediction on a WiMAX Network

38. An effective online scheme for detecting Android malware

39. Using Elasticity to Improve Inline Data Deduplication Storage Systems

41. Sybil defenses in mobile social networks

47. Looking at the overheads of transmitting encrypted data to the cloud

48. User-Based CPU Verification Scheme for Public Cloud Computing

49. Extracting secret key from wireless link dynamics in vehicular environments

50. A survey on PHR technology

Catalog

Books, media, physical & digital resources