Follow
Shih-Kun Huang 黃世昆
Shih-Kun Huang 黃世昆
Information Technology Service Center, National Chiao Tung University 交通大學資訊技術服務中心
Verified email at nycu.edu.tw - Homepage
Title
Cited by
Cited by
Year
Web application security assessment by fault injection and behavior monitoring
YW Huang, SK Huang, TP Lin, CH Tsai
Proceedings of the 12th international conference on World Wide Web, 148-159, 2003
5852003
Cocktail watermarking for digital image protection
CS Lu, SK Huang, CJ Sze, HYM Liao
IEEE Transactions on Multimedia 2 (4), 209-224, 2000
3192000
A testing framework for web application security assessment
YW Huang, CH Tsai, TP Lin, SK Huang, DT Lee, SY Kuo
Computer Networks 48 (5), 739-761, 2005
1192005
Crax: Software crash analysis for automatic exploit generation by modeling attacks as symbolic continuations
SK Huang, MH Huang, PY Huang, CW Lai, HL Lu, WM Leong
2012 IEEE Sixth International Conference on Software Security and …, 2012
1002012
Mining version histories to verify the learning process of legitimate peripheral participants
SK Huang, K Liu
Proceedings of the 2005 international workshop on Mining software …, 2005
682005
Cocktail watermarking on images
CS Lu, HYM Liao, SK Huang, CJ Sze
Information Hiding: Third International Workshop, IH’99, Dresden, Germany …, 2000
572000
Software crash analysis for automatic exploit generation on binary programs
SK Huang, MH Huang, PY Huang, HL Lu, CW Lai
IEEE Transactions on Reliability 63 (1), 270-289, 2014
562014
Instrim: Lightweight instrumentation for coverage-guided fuzzing
CC Hsu, CY Wu, HC Hsiao, SK Huang
Symposium on Network and Distributed System Security (NDSS), Workshop on …, 2018
522018
A new watermarking technique for multimedia protection
CS Lu, SK Huang, CJ Sze, HY Liao
Multimedia image and video processing, 507-530, 2001
452001
Craxweb: Automatic web application testing and attack generation
SK Huang, HL Lu, WM Leong, H Liu
2013 IEEE 7th International Conference on Software Security and Reliability …, 2013
332013
Efficient proxy signcryption scheme with provable CCA and CMA security
HY Lin, TS Wu, SK Huang, YS Yeh
Computers & Mathematics with Applications 60 (7), 1850-1858, 2010
282010
An efficient strong designated verifier proxy signature scheme for electronic commerce
HY Lin, TS Wu, SK Huang
Journal of information science and engineering 28 (4), 771-785, 2012
222012
LDDoS Attack Detection by Using Ant Colony Optimization Algorithms.
HH Chen, SK Huang
J. Inf. Sci. Eng. 32 (4), 995-1020, 2016
212016
Highly robust image watermarking using complementary modulations
M Mambo, Y Zheng, CS Lu, HYM Liao, SK Huang, CJ Sze
Information Security: Second InternationalWorkshop, ISW’99 Kuala Lumpur …, 1999
211999
Efficient algorithms for method dispatch in object-oriented programming systems.
SK Huang, DJ Chen
Journal of Object-Oriented Programming 5 (5), 43-54, 1992
191992
Browser fuzzing by scheduled mutation and generation of document object models
YD Lin, FZ Liao, SK Huang, YC Lai
2015 International Carnahan Conference on Security Technology (ICCST), 1-6, 2015
182015
Effective test generation for combinatorial decision coverage
R Gao, L Hu, WE Wong, HL Lu, SK Huang
2016 IEEE International Conference on Software Quality, Reliability and …, 2016
132016
Covdroid: A black-box testing coverage system for android
CC Yeh, SK Huang
2015 IEEE 39th annual computer software and applications conference 3, 447-452, 2015
132015
A black-box based android GUI testing system
CC Yeh, SK Huang, SY Chang
Proceeding of the 11th annual international conference on Mobile systems …, 2013
122013
Improved convertible authenticated encryption scheme with provable security
HY Lin, CL Hsu, SK Huang
Information Processing Letters 111 (13), 661-666, 2011
122011
The system can't perform the operation now. Try again later.
Articles 1–20