2008 |
16 | EE | Qiming Li,
Sujoy Roy:
On the security of non-forgeable robust hash functions.
ICIP 2008: 3124-3127 |
15 | EE | Yongdong Wu,
Qiming Li,
Feng Bao:
Optimizing the capacity of distortion-freewatermarking on palette images.
ICME 2008: 205-208 |
2007 |
14 | EE | Yagiz Sutcu,
Qiming Li,
Nasir D. Memon:
Secure Biometric Templates from Fingerprint-Face Features.
CVPR 2007 |
13 | EE | Qiming Li,
Nasir D. Memon:
Practical Security of Non-Invertiblewatermarking Schemes.
ICIP (4) 2007: 445-448 |
12 | EE | Qiming Li,
Nasir D. Memon:
Security Models of Digital Watermarking.
MCAM 2007: 60-64 |
11 | EE | Husrev T. Sencar,
Qiming Li,
Nasir D. Memon:
A new approach to countering ambiguity attacks.
MM&Sec 2007: 205-214 |
10 | EE | Yagiz Sutcu,
Qiming Li,
Nasir D. Memon:
Protecting Biometric Templates With Sketch: Theory and Practice.
IEEE Transactions on Information Forensics and Security 2(3-2): 503-512 (2007) |
2006 |
9 | EE | Qiming Li,
Yagiz Sutcu,
Nasir D. Memon:
Secure Sketch for Biometric Templates.
ASIACRYPT 2006: 99-113 |
8 | EE | Ee-Chien Chang,
Qiming Li:
Hiding Secret Points Amidst Chaff.
EUROCRYPT 2006: 59-72 |
7 | EE | Qiming Li,
Dah-Ming Chiu,
John C. S. Lui:
On the Practical and Security Issues of Batch Content Distribution Via Network Coding.
ICNP 2006: 158-167 |
6 | EE | Qiming Li,
Ee-Chien Chang:
Zero-knowledge watermark detection resistant to ambiguity attacks.
MM&Sec 2006: 158-163 |
5 | EE | Qiming Li,
Ee-Chien Chang:
Robust, short and sensitive authentication tags using secure sketch.
MM&Sec 2006: 56-61 |
2005 |
4 | EE | Qiming Li,
Ee-Chien Chang,
Mun Choon Chan:
On the effectiveness of DDoS attacks on statistical filtering.
INFOCOM 2005: 1373-1383 |
2004 |
3 | EE | Qiming Li,
Ee-Chien Chang:
On the Possibility of Non-invertible Watermarking Schemes.
Information Hiding 2004: 13-24 |
2003 |
2 | EE | Qiming Li,
Ee-Chien Chang:
Public Watermark Detection Using Multiple Proxies and Secret Sharing.
IWDW 2003: 558-569 |
2002 |
1 | EE | Qiming Li,
Ee-Chien Chang:
Security of Public Watermarking Schemes for Binary Sequences.
Information Hiding 2002: 119-128 |