Web application security assessment by fault injection and behavior monitoring YW Huang, SK Huang, TP Lin, CH Tsai Proceedings of the 12th international conference on World Wide Web, 148-159, 2003 | 591 | 2003 |
Cocktail watermarking for digital image protection CS Lu, SK Huang, CJ Sze, HYM Liao IEEE Transactions on Multimedia 2 (4), 209-224, 2000 | 319 | 2000 |
A testing framework for web application security assessment YW Huang, CH Tsai, TP Lin, SK Huang, DT Lee, SY Kuo Computer Networks 48 (5), 739-761, 2005 | 122 | 2005 |
Crax: Software crash analysis for automatic exploit generation by modeling attacks as symbolic continuations SK Huang, MH Huang, PY Huang, CW Lai, HL Lu, WM Leong 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 101 | 2012 |
Mining version histories to verify the learning process of legitimate peripheral participants SK Huang, K Liu Proceedings of the 2005 international workshop on Mining software …, 2005 | 68 | 2005 |
Software crash analysis for automatic exploit generation on binary programs SK Huang, MH Huang, PY Huang, HL Lu, CW Lai IEEE Transactions on Reliability 63 (1), 270-289, 2014 | 58 | 2014 |
Cocktail watermarking on images CS Lu, HYM Liao, SK Huang, CJ Sze Information Hiding: Third International Workshop, IH’99, Dresden, Germany …, 2000 | 57 | 2000 |
Instrim: Lightweight instrumentation for coverage-guided fuzzing CC Hsu, CY Wu, HC Hsiao, SK Huang Symposium on Network and Distributed System Security (NDSS), Workshop on …, 2018 | 55 | 2018 |
A new watermarking technique for multimedia protection CS Lu, SK Huang, CJ Sze, HY Liao Multimedia image and video processing, 507-530, 2001 | 44 | 2001 |
Craxweb: Automatic web application testing and attack generation SK Huang, HL Lu, WM Leong, H Liu 2013 IEEE 7th International Conference on Software Security and Reliability …, 2013 | 34 | 2013 |
Efficient proxy signcryption scheme with provable CCA and CMA security HY Lin, TS Wu, SK Huang, YS Yeh Computers & Mathematics with Applications 60 (7), 1850-1858, 2010 | 28 | 2010 |
An efficient strong designated verifier proxy signature scheme for electronic commerce HY Lin, TS Wu, SK Huang Journal of information science and engineering 28 (4), 2012 | 22 | 2012 |
LDDoS Attack Detection by Using Ant Colony Optimization Algorithms. HH Chen, SK Huang J. Inf. Sci. Eng. 32 (4), 995-1020, 2016 | 21 | 2016 |
Highly robust image watermarking using complementary modulations M Mambo, Y Zheng, CS Lu, HYM Liao, SK Huang, CJ Sze Information Security: Second InternationalWorkshop, ISW’99 Kuala Lumpur …, 1999 | 21 | 1999 |
Efficient algorithms for method dispatch in object-oriented programming systems SK Huang, DJ Chen Journal of Object-Oriented Programming 5 (5), 43-54, 1992 | 19 | 1992 |
Browser fuzzing by scheduled mutation and generation of document object models YD Lin, FZ Liao, SK Huang, YC Lai 2015 International Carnahan Conference on Security Technology (ICCST), 1-6, 2015 | 18 | 2015 |
Effective test generation for combinatorial decision coverage R Gao, L Hu, WE Wong, HL Lu, SK Huang 2016 IEEE International Conference on Software Quality, Reliability and …, 2016 | 13 | 2016 |
Covdroid: A black-box testing coverage system for android CC Yeh, SK Huang 2015 IEEE 39th annual computer software and applications conference 3, 447-452, 2015 | 13 | 2015 |
A black-box based android GUI testing system CC Yeh, SK Huang, SY Chang Proceeding of the 11th annual international conference on Mobile systems …, 2013 | 12 | 2013 |
Improved convertible authenticated encryption scheme with provable security HY Lin, CL Hsu, SK Huang Information Processing Letters 111 (13), 661-666, 2011 | 12 | 2011 |