Kwok-Yan Lam

According to our database1, Kwok-Yan Lam authored at least 152 papers between 1991 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Spectral Efficiency Enhancement in Satellite Mobile Communications: A Game-Theoretical Approach.
IEEE Wirel. Commun., 2020

Privacy-Preserving User Profile Matching in Social Networks.
IEEE Trans. Knowl. Data Eng., 2020

Advances and Emerging Challenges in Cognitive Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020

Spectrum Optimization for Satellite Communication Systems With Heterogeneous User Preferences.
IEEE Systems Journal, 2020

Blockchain-based mechanism for fine-grained authorization in data crowdsourcing.
Future Gener. Comput. Syst., 2020

MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack.
CoRR, 2020

Blockchain for the Internet of Vehicles towards Intelligent Transportation Systems: A Survey.
CoRR, 2020

Local Differential Privacy based Federated Learning for Internet of Things.
CoRR, 2020

Resource Allocation in Satellite-Based Internet of Things Using Pattern Search Method.
IEEE Access, 2020

Unseen Face Presentation Attack Detection with Hypersphere Loss.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Resource Optimization in Satellite-Based Internet of Things.
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020

2019
Spectrum pricing for cognitive radio networks with user's stochastic distribution.
Wirel. Networks, 2019

Improving Spectrum Management for Satellite Communication Systems With Hunger Marketing.
IEEE Wirel. Commun. Lett., 2019

Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019

Reviewing and Improving the Gaussian Mechanism for Differential Privacy.
CoRR, 2019

Blockchain for Future Smart Grid: A Comprehensive Survey.
CoRR, 2019

Energy Efficiency Optimization for NOMA-Based Cognitive Radio With Energy Harvesting.
IEEE Access, 2019

Trading-Based Dynamic Spectrum Access and Allocation in Cognitive Internet of Things.
IEEE Access, 2019

Attacking Object Detectors Without Changing the Target Object.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoT.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Beyond the Power of Mere Repetition: Forms of Social Communication on Twitter through the Lens of Information Flows and Its Effect on Topic Evolution.
Proceedings of the International Joint Conference on Neural Networks, 2019

Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation.
Proceedings of the Computer Security - ESORICS 2019, 2019

BitVis: An Interactive Visualization System for Bitcoin Accounts Analysis.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

Group Signatures with Decentralized Tracing.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Adversarial Signboard against Object Detector.
Proceedings of the 30th British Machine Vision Conference 2019, 2019

TOM: A Threat Operating Model for Early Warning of Cyber Security Threats.
Proceedings of the Advanced Data Mining and Applications - 15th International Conference, 2019

Top-N Hashtag Prediction via Coupling Social Influence and Homophily.
Proceedings of the Advanced Data Mining and Applications - 15th International Conference, 2019

2018
Power allocation in cognitive radio networks over Rayleigh-fading channels with hybrid intelligent algorithms.
Wirel. Networks, 2018

Caching Efficiency Enhancement at Wireless Edges with Concerns on User's Quality of Experience.
Wirel. Commun. Mob. Comput., 2018

Joint Pricing and Power Allocation for Multibeam Satellite Systems With Dynamic Game Model.
IEEE Trans. Veh. Technol., 2018

Dynamic Spectrum Access Networks With Heterogeneous Users: How to Price the Spectrum?
IEEE Trans. Veh. Technol., 2018

Spectrum Trading for Satellite Communication Systems With Dynamic Bargaining.
IEEE Trans. Communications, 2018

Secure and Lightweight Compressive Sensing Using Stream Cipher.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things.
Proceedings of the IEEE, 2018

Q-Learning-Based Dynamic Spectrum Access in Cognitive Industrial Internet of Things.
MONET, 2018

A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
IACR Cryptol. ePrint Arch., 2018

Autonomous Vehicle: Security by Design.
CoRR, 2018

Behavior-Interior-Aware User Preference Analysis Based on Social Networks.
Complexity, 2018

Spectrum Optimization for Cognitive Satellite Communications With Cournot Game Model.
IEEE Access, 2018

Spectrum Allocation With Asymmetric Monopoly Model for Multibeam-Based Cognitive Satellite Networks.
IEEE Access, 2018

Privacy Preserving User Based Web Service Recommendations.
IEEE Access, 2018

A Blockchain Framework for Insurance Processes.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Efficient and Lightweight Quantized Compressive Sensing using μ-Law.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

A Comparative Study of Transactional and Semantic Approaches for Predicting Cascades on Twitter.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Using Blockchain to Control Access to Cloud Data.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

From the Perspective of CNN to Adversarial Iris Images.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

CoLPUF : A Novel Configurable LFSR-based PUF.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Survey of secure processors.
Proceedings of the 2017 International Conference on Embedded Computer Systems: Architectures, 2017

Security of autonomous vehicle as a cyber-physical system.
Proceedings of the 7th International Symposium on Embedded Computing and System Design, 2017

2016
Identity in the Internet-of-Things (IoT): New Challenges and Opportunities.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2012
Obtaining more Karatsuba-like formulae over the binary field.
IET Information Security, 2012

2011
Energy-Efficient Key Distribution Using Electrocardiograph Biometric Set for Secure Communications in Wireless Body Healthcare Networks.
J. Medical Syst., 2011

2010
BodySec: synchronized key distribution using biometric slots for wireless body sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Trust Based Routing for Misbehavior Detection in Ad Hoc Networks.
J. Networks, 2010

Overlap-free Karatsuba-Ofman polynomial multiplication algorithms.
IET Information Security, 2010

Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network.
IEICE Trans. Inf. Syst., 2010

Selection Policy of Rescue Servers Based on Workload Characterization of Flash Crowd.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010

2009
A robust certification service for highly dynamic MANET in emergency tasks.
Int. J. Commun. Syst., 2009

MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem.
Proceedings of the Advances in Information Security and Assurance, 2009

Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network.
Proceedings of the Advances in Information Security and Assurance, 2009

Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Efficient Fingercode Classification.
IEICE Trans. Inf. Syst., 2008

Robust Remote Authentication for Scalable Web-Based Services.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions.
Proceedings of the First International Conference on Emerging Security Information, 2007

Dynamically Constructing Mixed Pyramid for Fast VQ Encoding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
An Efficient Algorithm for Fingercode-Based Biometric Identification.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Minimal Threshold Closure.
Proceedings of the Computer Security, 2006

2005
Efficient vector quantization using genetic algorithm.
Neural Computing and Applications, 2005

An ID-based multisignature scheme without reblocking and predetermined signing order.
Comput. Stand. Interfaces, 2005

Secure Construction of Virtual Organizations in Grid Computing Systems.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

The Impact of Mobility Modeling in Mobile IP Multicast Research.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A practical system of keyphrase extraction for web pages.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

2004
Application of Content Computing in Honeyfarm.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Anomaly Detection in Grid Computing Based on Vector Quantization.
Proceedings of the Grid and Cooperative Computing, 2004

Enhancing the Scalability of the Community Authorization Service for Virtual Organizations.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Real-Time Emulation of Intrusion Victim in HoneyFarm.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
On identification secret sharing schemes.
Inf. Comput., 2003

Security middleware for enhancing interoperability of Public Key Infrastructure.
Comput. Secur., 2003

Lightweight security for mobile commerce transactions.
Comput. Commun., 2003

Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files.
Proceedings of the Advances in Web-Based Learning, 2003

A Novel Two-Level Trust Model for Grid.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003

Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Understanding the Object Retrieval Dependence of Web Page Access.
Proceedings of the 10th International Workshop on Modeling, 2002

Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Agent Warehouse: A New Paradigm for Mobile Agent Deployment.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

Study for Fusion of Different Sources to Determine Relevance.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

Context Query in Information Retrieval.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

Detecting anomalous agents in mobile agent system: a preliminary approach.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

An optimal location update and searching algorithm for tracking mobile agent.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions.
J. Cryptology, 2001

The Weight Distribution of C5(1, n).
Des. Codes Cryptogr., 2001

A Secure Group Solution for Multi-Agent EC System.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

2000
Constructions of authentication codes from algebraic curves over finite fields.
IEEE Trans. Inf. Theory, 2000

A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q).
IEEE Trans. Inf. Theory, 2000

Duadic sequences of prime lengths.
Discret. Math., 2000

A Secure Route Structure for Information Gathering Agent.
Proceedings of the Design and Applications of Intelligent Agents, 2000

Loyalty Program Scheme for Anonymous Payment System.
Proceedings of the Electronic Commerce and Web Technologies, 2000

On Multiplicative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
A generalization of algebraic-geometry codes.
IEEE Trans. Inf. Theory, 1999

Constructions of Algebraic-Geometry Codes.
IEEE Trans. Inf. Theory, 1999

Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields.
IEEE Trans. Inf. Theory, 1999

Several classes of binary sequences with three-level autocorrelation.
IEEE Trans. Inf. Theory, 1999

Scalable Threshold Closure.
Theor. Comput. Sci., 1999

Construction and Enumeration of All Binary Duadic Codes of Length p<sup>m</sup>.
Fundam. Inform., 1999

Securing digital signatures for non-repudiation.
Comput. Commun., 1999

A New Construction of Algebraic Geometry Codes.
Appl. Algebra Eng. Commun. Comput., 1999

Agent-based copyright protection architecture for online electronic publishing.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

A Secure Pay-per View Scheme for Web-Based Video Service.
Proceedings of the Public Key Cryptography, 1999

Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework.
Proceedings of the Mobile Data Access, First International Conference, 1999

Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999

A New Approach to Robust Threshold RSA Signature Schemes.
Proceedings of the Information Security and Cryptology, 1999

Cryptanalysis of "2 R" Schemes.
Proceedings of the Advances in Cryptology, 1999

Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce.
Proceedings of the Cooperative Information Agents III, Third International Workshop, 1999

A Class of Explicit Perfect Multi-sequences.
Proceedings of the Advances in Cryptology, 1999

1998
An optimized protocol for mobile network authentication and security.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1998

On the efficient implementation of fair non-repudiation.
Computer Communication Review, 1998

A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Secure Agent-Mediated Mobile Payment.
Proceedings of the Multiagent Platforms, 1998

Undeniable Billing in Mobile Communication.
Proceedings of the MOBICOM '98, 1998

A Secure Intelligent Trade Agent System.
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998

Secure Information Gathering Agent for Internet Trading.
Proceedings of the Multi-Agent Systems: Theories, 1998

RSA Signature Algorithm for Microcontroller Implementation.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC.
Proceedings of the Advances in Cryptology, 1998

Differential Cryptanalysis of a Block Cipher.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Global Optimisation in Neural Network Training.
Neural Computing and Applications, 1997

A New Byte-Oriented Block Cipher.
Proceedings of the Information Security, First International Workshop, 1997

A New Hash Function Based on Block Cipher.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
A data reduction method for intrusion detection.
J. Syst. Softw., 1996

Efficient nearer-ancestor algorithm for network routing.
Comput. Commun., 1996

Designing a system infrastructure for distributed programs.
Comput. Commun., 1996

Efficient Generation of Elliptic Curve Cryptosystems.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

The Failure of Anti-Hacking Legislation: A Hong Kong Perspective.
Proceedings of the CCS '96, 1996

1995
Multivariate data analysis software for enhancing system security.
J. Syst. Softw., 1995

Replay tolerance of authentication protocols.
Comput. Commun., 1995

Analysis and Experimentation on List Update Algorithms.
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995

1993
Context-Dependent Access Control in Distributed Systems.
Proceedings of the Computer Security, 1993

1992
Freshness Assurance of Authentication Protocols.
Proceedings of the Computer Security, 1992

Timely Authentication in Distributed Systems.
Proceedings of the Computer Security, 1992

1991
A new approach for improving system availability.
PhD thesis, 1991

An Implementation for Small Databases with High Availability.
ACM SIGOPS Oper. Syst. Rev., 1991


  Loading...