Kwok-Yan Lam

Orcid: 0000-0001-7479-7970

According to our database1, Kwok-Yan Lam authored at least 254 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Authentication and Key Agreement Based on Three Factors and PUF for UAV-Assisted Post-Disaster Emergency Communication.
IEEE Internet Things J., June, 2024

An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMT Data Protection With its Application to Pandemic Modeling.
IEEE Internet Things J., May, 2024

Device Scheduling and Assignment in Hierarchical Federated Learning for Internet of Things.
IEEE Internet Things J., May, 2024

A Survey on Conflict Detection in IoT-based Smart Homes.
ACM Comput. Surv., May, 2024

Blockchain-Based Privacy-Preserving Federated Learning for Mobile Crowdsourcing.
IEEE Internet Things J., April, 2024

Decentralized Multimedia Data Sharing in IoV: A Learning-Based Equilibrium of Supply and Demand.
IEEE Trans. Veh. Technol., March, 2024

Survey on Digital Sovereignty and Identity: From Digitization to Digitalization.
ACM Comput. Surv., March, 2024

Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models.
IEEE Trans. Inf. Forensics Secur., 2024

Proactive Detection of Physical Inter-rule Vulnerabilities in IoT Services Using a Deep Learning Approach.
CoRR, 2024

Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation.
CoRR, 2024

Privacy-Preserving Federated Unlearning with Certified Client Removal.
CoRR, 2024

STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario.
CoRR, 2024

Threats, Attacks, and Defenses in Machine Unlearning: A Survey.
CoRR, 2024

Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning.
CoRR, 2024

Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning.
CoRR, 2024

Object-level Copy-Move Forgery Image Detection based on Inconsistency Mining.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

CAAW'24: The 3rd International Cryptoasset Analytics Workshop.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Improving the Accuracy of Locally Differentially Private Community Detection by Order-consistent Data Perturbation.
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024

2023
An Advanced Integrated Visible Light Communication and Localization System.
IEEE Trans. Commun., December, 2023

Enhancing Federated Learning With Spectrum Allocation Optimization and Device Selection.
IEEE/ACM Trans. Netw., October, 2023

Dynamic spectrum access for Internet-of-Things with hierarchical federated deep reinforcement learning.
Ad Hoc Networks, October, 2023

Understanding Security in Smart City Domains From the ANT-Centric Perspective.
IEEE Internet Things J., July, 2023

Deep reinforcement learning based scheduling strategy for federated learning in sensor-cloud systems.
Future Gener. Comput. Syst., July, 2023

BitAnalysis: A Visualization System for Bitcoin Wallet Investigation.
IEEE Trans. Big Data, April, 2023

SPoFC: A framework for stream data aggregation with local differential privacy.
Concurr. Comput. Pract. Exp., February, 2023

Reputation-based power allocation for NOMA cognitive radio networks.
Wirel. Networks, 2023

Dynamic spectrum optimization for Internet-of-Things with social distance model.
Wirel. Networks, 2023

Asymmetric Modality Translation for Face Presentation Attack Detection.
IEEE Trans. Multim., 2023

Efficient Dropout-Resilient Aggregation for Privacy-Preserving Machine Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Differentially Private Distributed Frequency Estimation.
IEEE Trans. Dependable Secur. Comput., 2023

A Hybrid Framework of Reinforcement Learning and Convex Optimization for UAV-Based Autonomous Metaverse Data Collection.
IEEE Netw., 2023

Non-Interactive Zero-Knowledge Functional Proofs.
IACR Cryptol. ePrint Arch., 2023

Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service.
IACR Cryptol. ePrint Arch., 2023

SSTA: Salient Spatially Transformed Attack.
CoRR, 2023

A Survey on Federated Unlearning: Challenges, Methods, and Future Directions.
CoRR, 2023

FedPEAT: Convergence of Federated Learning, Parameter-Efficient Fine Tuning, and Emulator Assisted Tuning for Artificial Intelligence Foundation Models with Mobile Edge Computing.
CoRR, 2023

Efficient Dataset Distillation through Alignment with Smooth and High-Quality Expert Trajectories.
CoRR, 2023

User Assignment and Resource Allocation for Hierarchical Federated Learning over Wireless Networks.
CoRR, 2023

Spear or Shield: Leveraging Generative AI to Tackle Security Threats of Intelligent Network Services.
CoRR, 2023

UAV aided Metaverse over Wireless Communications: A Reinforcement Learning Approach.
CoRR, 2023

A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Honey-Gauge: Enabling User-Centric Honeypot Classification.
Proceedings of the Ubiquitous Security, 2023

Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email Attachments.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

ThreatLand: Extracting Intelligence from Audit Logs via NLP methods.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

SCME: A Self-contrastive Method for Data-Free and Query-Limited Model Extraction Attack.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Automatic Detection and Analysis towards Malicious Behavior in IoT Malware.
Proceedings of the IEEE International Conference on Data Mining, 2023

Differentiated Security in the Age of Cognitive Internet of Things (CIoT).
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Applying Large Language Models for Enhancing Contract Drafting.
Proceedings of the Third International Workshop on Artificial Intelligence and Intelligent Assistance for Legal Professionals in the Digital Workplace (LegalAIIA 2023) co-located with the 19th International Conference on Artificial Intelligence and Law (ICAIL 2023), 2023

UAV-Assisted Semantic Communication with Hybrid Action Reinforcement Learning.
Proceedings of the IEEE Global Communications Conference, 2023

APTer: Towards the Investigation of APT Attribution.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

FOCUS: Fatigue-Reducing IOCs Through Prioritization and Scoring.
Proceedings of the IEEE Intl Conf on Dependable, 2023

A Practical Intrusion Detection System Trained on Ambiguously Labeled Data for Enhancing IIoT Security.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

Separate-and-Aggregate: A Transformer-Based Patch Refinement Model for Knowledge Graph Completion.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

Dipping PLMs Sauce: Bridging Structure and Text for Effective Knowledge Graph Completion via Conditional Soft Prompting.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Distributed Deep Reinforcement Learning-Based Spectrum and Power Allocation for Heterogeneous Networks.
IEEE Trans. Wirel. Commun., 2022

Dynamic Spectrum Access for Internet-of-Things Based on Federated Deep Reinforcement Learning.
IEEE Trans. Veh. Technol., 2022

Secure Hot Path Crowdsourcing With Local Differential Privacy Under Fog Computing Architecture.
IEEE Trans. Serv. Comput., 2022

K-Means Clustering With Local dᵪ-Privacy for Privacy-Preserving Data Analysis.
IEEE Trans. Inf. Forensics Secur., 2022

One-Class Knowledge Distillation for Face Presentation Attack Detection.
IEEE Trans. Inf. Forensics Secur., 2022

Cognitive Carrier Resource Optimization for Internet-of-Vehicles in 5G-Enhanced Smart Cities.
IEEE Netw., 2022

Database Watermarking Algorithm Based on Decision Tree Shift Correction.
IEEE Internet Things J., 2022

Conditional Anonymous Authentication With Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles.
IEEE Internet Things J., 2022

ANT-Centric IoT Security Reference Architecture - Security-by-Design for Satellite-Enabled Smart Cities.
IEEE Internet Things J., 2022

ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System.
IEEE Internet Things J., 2022

Traceable and Authenticable Image Tagging for Fake News Detection.
CoRR, 2022

One-Class Knowledge Distillation for Face Presentation Attack Detection.
CoRR, 2022

Privacy-Preserving Aggregation in Federated Learning: A Survey.
CoRR, 2022

Secure Multi-Party Delegated Authorisation For Access and Sharing of Electronic Health Records.
CoRR, 2022

Analysis of Digital Sovereignty and Identity: From Digitization to Digitalization.
CoRR, 2022

Cybersecurity Challenges Of IoT-enabled Smart Cities: A Survey.
CoRR, 2022

Facial Landmark Predictions with Applications to Metaverse.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022

Edge-Cloud Cooperation for DNN Inference via Reinforcement Learning and Supervised Learning.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Multi-task Learning Approach for Predicting Intentions Using Smart Home IoT Services.
Proceedings of the Service-Oriented Computing - 20th International Conference, 2022

Resource Allocation and Resolution Control in the Metaverse with Mobile Augmented Reality.
Proceedings of the IEEE Global Communications Conference, 2022

Knowledge Is Flat: A Seq2Seq Generative Framework for Various Knowledge Graph Completion.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
Agent-Based Spectrum Management Scheme in Satellite Communication Systems.
IEEE Trans. Veh. Technol., 2021

Privacy Preserving Location-Aware Personalized Web Service Recommendations.
IEEE Trans. Serv. Comput., 2021

Autonomous Vehicle: Security by Design.
IEEE Trans. Intell. Transp. Syst., 2021

Reconfigurable Intelligent Surface Aided Power Control for Physical-Layer Broadcasting.
IEEE Trans. Commun., 2021

An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.
Sensors, 2021

Spectrum Sharing for 6G Integrated Satellite-Terrestrial Communication Networks Based on NOMA and CR.
IEEE Netw., 2021

Federated-Learning-Empowered Collaborative Data Sharing for Vehicular Edge Networks.
IEEE Netw., 2021

Privacy-Preserving Federated Learning for UAV-Enabled Networks: Learning-Based Joint Scheduling and Resource Management.
IEEE J. Sel. Areas Commun., 2021

Local Differential Privacy-Based Federated Learning for Internet of Things.
IEEE Internet Things J., 2021

A Blockchain-Based Approach for Saving and Tracking Differential-Privacy Cost.
IEEE Internet Things J., 2021

Blockchain for Future Smart Grid: A Comprehensive Survey.
IEEE Internet Things J., 2021

Blockchain for the Internet of Vehicles Towards Intelligent Transportation Systems: A Survey.
IEEE Internet Things J., 2021

Local Differential Privacy for data collection and analysis.
Neurocomputing, 2021

Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021

Fair and Differentially Private Distributed Frequency Estimation.
CoRR, 2021

Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation.
CoRR, 2021

Deep Reinforcement Learning Based Resource Allocation for Heterogeneous Networks.
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021

Privacy-Enhanced Federated Learning with Weighted Aggregation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2021

UAV-Assisted 5G/6G Networks: Joint Scheduling and Resource Allocation Based on Asynchronous Reinforcement Learning.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Effective Anomaly Detection Model Training with only Unlabeled Data by Weakly Supervised Learning Techniques.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
Spectral Efficiency Enhancement in Satellite Mobile Communications: A Game-Theoretical Approach.
IEEE Wirel. Commun., 2020

Privacy-Preserving User Profile Matching in Social Networks.
IEEE Trans. Knowl. Data Eng., 2020

Advances and Emerging Challenges in Cognitive Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020

Spectrum Optimization for Satellite Communication Systems With Heterogeneous User Preferences.
IEEE Syst. J., 2020

Blockchain-based mechanism for fine-grained authorization in data crowdsourcing.
Future Gener. Comput. Syst., 2020

Blockchain-Based Approach for Securing Spectrum Trading in Multibeam Satellite Systems.
CoRR, 2020

Secure Weighted Aggregation in Federated Learning.
CoRR, 2020

Local Differential Privacy and Its Applications: A Comprehensive Survey.
CoRR, 2020

MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack.
CoRR, 2020

Resource Allocation in Satellite-Based Internet of Things Using Pattern Search Method.
IEEE Access, 2020

An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Unseen Face Presentation Attack Detection with Hypersphere Loss.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Resource Optimization in Satellite-Based Internet of Things.
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020

Deep Reinforcement Learning Based Intelligent Reflecting Surface for Secure Wireless Communications.
Proceedings of the IEEE Global Communications Conference, 2020

New Threats Against Object Detector with Non-local Block.
Proceedings of the Computer Vision - ECCV 2020, 2020

Feasibility of PUF-Based Authentication on ATtiny Devices with Off-the-Shelf SRAM.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
Spectrum pricing for cognitive radio networks with user's stochastic distribution.
Wirel. Networks, 2019

Improving Spectrum Management for Satellite Communication Systems With Hunger Marketing.
IEEE Wirel. Commun. Lett., 2019

Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019

Reviewing and Improving the Gaussian Mechanism for Differential Privacy.
CoRR, 2019

Energy Efficiency Optimization for NOMA-Based Cognitive Radio With Energy Harvesting.
IEEE Access, 2019

Trading-Based Dynamic Spectrum Access and Allocation in Cognitive Internet of Things.
IEEE Access, 2019

Attacking Object Detectors Without Changing the Target Object.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoT.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Beyond the Power of Mere Repetition: Forms of Social Communication on Twitter through the Lens of Information Flows and Its Effect on Topic Evolution.
Proceedings of the International Joint Conference on Neural Networks, 2019

Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation.
Proceedings of the Computer Security - ESORICS 2019, 2019

BitVis: An Interactive Visualization System for Bitcoin Accounts Analysis.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

Group Signatures with Decentralized Tracing.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Adversarial Signboard against Object Detector.
Proceedings of the 30th British Machine Vision Conference 2019, 2019

TOM: A Threat Operating Model for Early Warning of Cyber Security Threats.
Proceedings of the Advanced Data Mining and Applications - 15th International Conference, 2019

Top-N Hashtag Prediction via Coupling Social Influence and Homophily.
Proceedings of the Advanced Data Mining and Applications - 15th International Conference, 2019

2018
Power allocation in cognitive radio networks over Rayleigh-fading channels with hybrid intelligent algorithms.
Wirel. Networks, 2018

Caching Efficiency Enhancement at Wireless Edges with Concerns on User's Quality of Experience.
Wirel. Commun. Mob. Comput., 2018

Joint Pricing and Power Allocation for Multibeam Satellite Systems With Dynamic Game Model.
IEEE Trans. Veh. Technol., 2018

Dynamic Spectrum Access Networks With Heterogeneous Users: How to Price the Spectrum?
IEEE Trans. Veh. Technol., 2018

Spectrum Trading for Satellite Communication Systems With Dynamic Bargaining.
IEEE Trans. Commun., 2018

Secure and Lightweight Compressive Sensing Using Stream Cipher.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things.
Proc. IEEE, 2018

Q-Learning-Based Dynamic Spectrum Access in Cognitive Industrial Internet of Things.
Mob. Networks Appl., 2018

A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
IACR Cryptol. ePrint Arch., 2018

Autonomous Vehicle: Security by Design.
CoRR, 2018

Behavior-Interior-Aware User Preference Analysis Based on Social Networks.
Complex., 2018

Spectrum Optimization for Cognitive Satellite Communications With Cournot Game Model.
IEEE Access, 2018

Spectrum Allocation With Asymmetric Monopoly Model for Multibeam-Based Cognitive Satellite Networks.
IEEE Access, 2018

Privacy Preserving User Based Web Service Recommendations.
IEEE Access, 2018

A Blockchain Framework for Insurance Processes.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Efficient and Lightweight Quantized Compressive Sensing using μ-Law.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

A Comparative Study of Transactional and Semantic Approaches for Predicting Cascades on Twitter.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Using Blockchain to Control Access to Cloud Data.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

From the Perspective of CNN to Adversarial Iris Images.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

CoLPUF : A Novel Configurable LFSR-based PUF.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Survey of secure processors.
Proceedings of the 2017 International Conference on Embedded Computer Systems: Architectures, 2017

Security of autonomous vehicle as a cyber-physical system.
Proceedings of the 7th International Symposium on Embedded Computing and System Design, 2017

2016
Identity in the Internet-of-Things (IoT): New Challenges and Opportunities.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2012
Obtaining more Karatsuba-like formulae over the binary field.
IET Inf. Secur., 2012

2011
Energy-Efficient Key Distribution Using Electrocardiograph Biometric Set for Secure Communications in Wireless Body Healthcare Networks.
J. Medical Syst., 2011

2010
BodySec: synchronized key distribution using biometric slots for wireless body sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Trust Based Routing for Misbehavior Detection in Ad Hoc Networks.
J. Networks, 2010

Overlap-free Karatsuba-Ofman polynomial multiplication algorithms.
IET Inf. Secur., 2010

Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network.
IEICE Trans. Inf. Syst., 2010

Selection Policy of Rescue Servers Based on Workload Characterization of Flash Crowd.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010

2009
A robust certification service for highly dynamic MANET in emergency tasks.
Int. J. Commun. Syst., 2009

MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem.
Proceedings of the Advances in Information Security and Assurance, 2009

Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network.
Proceedings of the Advances in Information Security and Assurance, 2009

Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Efficient Fingercode Classification.
IEICE Trans. Inf. Syst., 2008

Robust Remote Authentication for Scalable Web-Based Services.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions.
Proceedings of the First International Conference on Emerging Security Information, 2007

Dynamically Constructing Mixed Pyramid for Fast VQ Encoding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
An Efficient Algorithm for Fingercode-Based Biometric Identification.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Minimal Threshold Closure.
Proceedings of the Computer Security, 2006

2005
Efficient vector quantization using genetic algorithm.
Neural Comput. Appl., 2005

An ID-based multisignature scheme without reblocking and predetermined signing order.
Comput. Stand. Interfaces, 2005

Secure Construction of Virtual Organizations in Grid Computing Systems.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

The Impact of Mobility Modeling in Mobile IP Multicast Research.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A practical system of keyphrase extraction for web pages.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

2004
Application of Content Computing in Honeyfarm.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Anomaly Detection in Grid Computing Based on Vector Quantization.
Proceedings of the Grid and Cooperative Computing, 2004

Enhancing the Scalability of the Community Authorization Service for Virtual Organizations.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Real-Time Emulation of Intrusion Victim in HoneyFarm.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
On identification secret sharing schemes.
Inf. Comput., 2003

Security middleware for enhancing interoperability of Public Key Infrastructure.
Comput. Secur., 2003

Lightweight security for mobile commerce transactions.
Comput. Commun., 2003

Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files.
Proceedings of the Advances in Web-Based Learning, 2003

A Novel Two-Level Trust Model for Grid.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003

Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Understanding the Object Retrieval Dependence of Web Page Access.
Proceedings of the 10th International Workshop on Modeling, 2002

Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Agent Warehouse: A New Paradigm for Mobile Agent Deployment.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

Study for Fusion of Different Sources to Determine Relevance.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

Context Query in Information Retrieval.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

Detecting anomalous agents in mobile agent system: a preliminary approach.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

An optimal location update and searching algorithm for tracking mobile agent.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions.
J. Cryptol., 2001

The Weight Distribution of C5(1, n).
Des. Codes Cryptogr., 2001

A Secure Group Solution for Multi-Agent EC System.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

2000
Constructions of authentication codes from algebraic curves over finite fields.
IEEE Trans. Inf. Theory, 2000

A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q).
IEEE Trans. Inf. Theory, 2000

Duadic sequences of prime lengths.
Discret. Math., 2000

A Secure Route Structure for Information Gathering Agent.
Proceedings of the Design and Applications of Intelligent Agents, 2000

Loyalty Program Scheme for Anonymous Payment System.
Proceedings of the Electronic Commerce and Web Technologies, 2000

On Multiplicative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
A generalization of algebraic-geometry codes.
IEEE Trans. Inf. Theory, 1999

Constructions of Algebraic-Geometry Codes.
IEEE Trans. Inf. Theory, 1999

Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields.
IEEE Trans. Inf. Theory, 1999

Several classes of binary sequences with three-level autocorrelation.
IEEE Trans. Inf. Theory, 1999

Scalable Threshold Closure.
Theor. Comput. Sci., 1999

Construction and Enumeration of All Binary Duadic Codes of Length p<sup>m</sup>.
Fundam. Informaticae, 1999

Securing digital signatures for non-repudiation.
Comput. Commun., 1999

A New Construction of Algebraic Geometry Codes.
Appl. Algebra Eng. Commun. Comput., 1999

Agent-based copyright protection architecture for online electronic publishing.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

A Secure Pay-per View Scheme for Web-Based Video Service.
Proceedings of the Public Key Cryptography, 1999

Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework.
Proceedings of the Mobile Data Access, First International Conference, 1999

Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999

A New Approach to Robust Threshold RSA Signature Schemes.
Proceedings of the Information Security and Cryptology, 1999

Cryptanalysis of "2 R" Schemes.
Proceedings of the Advances in Cryptology, 1999

Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce.
Proceedings of the Cooperative Information Agents III, Third International Workshop, 1999

A Class of Explicit Perfect Multi-sequences.
Proceedings of the Advances in Cryptology, 1999

1998
An optimized protocol for mobile network authentication and security.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1998

On the efficient implementation of fair non-repudiation.
Comput. Commun. Rev., 1998

A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Secure Agent-Mediated Mobile Payment.
Proceedings of the Multiagent Platforms, 1998

Undeniable Billing in Mobile Communication.
Proceedings of the MOBICOM '98, 1998

A Secure Intelligent Trade Agent System.
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998

Secure Information Gathering Agent for Internet Trading.
Proceedings of the Multi-Agent Systems: Theories, 1998

RSA Signature Algorithm for Microcontroller Implementation.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC.
Proceedings of the Advances in Cryptology, 1998

Differential Cryptanalysis of a Block Cipher.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Global Optimisation in Neural Network Training.
Neural Comput. Appl., 1997

A New Byte-Oriented Block Cipher.
Proceedings of the Information Security, First International Workshop, 1997

A New Hash Function Based on Block Cipher.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
A data reduction method for intrusion detection.
J. Syst. Softw., 1996

Efficient nearer-ancestor algorithm for network routing.
Comput. Commun., 1996

Designing a system infrastructure for distributed programs.
Comput. Commun., 1996

Efficient Generation of Elliptic Curve Cryptosystems.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

The Failure of Anti-Hacking Legislation: A Hong Kong Perspective.
Proceedings of the CCS '96, 1996

1995
Multivariate data analysis software for enhancing system security.
J. Syst. Softw., 1995

Replay tolerance of authentication protocols.
Comput. Commun., 1995

Analysis and Experimentation on List Update Algorithms.
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995

1993
Context-Dependent Access Control in Distributed Systems.
Proceedings of the Computer Security, 1993

1992
Freshness Assurance of Authentication Protocols.
Proceedings of the Computer Security, 1992

Timely Authentication in Distributed Systems.
Proceedings of the Computer Security, 1992

1991
A new approach for improving system availability.
PhD thesis, 1991

An Implementation for Small Databases with High Availability.
ACM SIGOPS Oper. Syst. Rev., 1991


  Loading...