Siu-Ming Yiu

According to our database1, Siu-Ming Yiu
  • authored at least 302 papers between 1994 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
A Dynamic Trust Framework for Opportunistic Mobile Social Networks.
IEEE Trans. Network and Service Management, 2018

Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating.
J. Network and Computer Applications, 2018

2017
New Word Detection and Tagging on Chinese Twitter Stream.
T. Large-Scale Data- and Knowledge-Centered Systems, 2017

F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems.
Security and Communication Networks, 2017

A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities.
Pervasive and Mobile Computing, 2017

Multi-Dimensional Bloom Filter: Design and Evaluation.
IEICE Transactions, 2017

Constant bandwidth ORAM with small block size using PIR operations.
IACR Cryptology ePrint Archive, 2017

Multi-key privacy-preserving deep learning in cloud computing.
Future Generation Comp. Syst., 2017

Offline/online attribute-based encryption with verifiable outsourced decryption.
Concurrency and Computation: Practice and Experience, 2017

Predicting combinative drug pairs towards realistic screening via integrating heterogeneous features.
BMC Bioinformatics, 2017

rMFilter: acceleration of long read-based structure variation calling by chimeric read filtering.
Bioinformatics, 2017

A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Relevant Fact Selection for QA via Sequence Labeling.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Predicting Comprehensive Drug-Drug Interactions for New Drugs via Triple Matrix Factorization.
Proceedings of the Bioinformatics and Biomedical Engineering, 2017

Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Proceedings of the Information Security Practice and Experience, 2017

Reconstructing One-Articulated Networks with Distance Matrices.
Proceedings of the Bioinformatics Research and Applications - 13th International Symposium, 2017

Identifying malware with HTTP content type inconsistency via header-payload comparison.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Auto-identification of background traffic based on autonomous periodic interaction.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Semantic Video Carving Using Perceptual Hashing and Optical Flow.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Privacy-Preserving Disease Risk Test Based on Bloom Filters.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Detecting anomalous behavior of PLC using semi-supervised machine learning.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

An iterative algorithm for de novo optical map assembly.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Mixed Membership Sparse Gaussian Conditional Random Fields.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Efficient Methods for Multiple Sequence Alignment with Guaranteed Error Bounds.
Encyclopedia of Algorithms, 2016

Local Alignment (with Concave Gap Weights).
Encyclopedia of Algorithms, 2016

Efficient and secure multi-functional searchable symmetric encryption schemes.
Security and Communication Networks, 2016

Exposing frame deletion by detecting abrupt changes in video streams.
Neurocomputing, 2016

A multi-task learning model for malware classification with useful file access pattern from API call sequence.
CoRR, 2016

Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016

A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms.
IEEE Communications Surveys and Tutorials, 2016

Faster Algorithms for Computing the R* Consensus Tree.
Algorithmica, 2016

LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation).
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Dynamic Attribute-Based Access Control in Cloud Storage Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Towards a More Accurate Error Model for BioNano Optical Maps.
Proceedings of the Bioinformatics Research and Applications - 12th International Symposium, 2016

Dynamic Proofs of Retrievability with improved worst case overhead.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Generic Construction of Publicly Verifiable Predicate Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Accurate annotation of metagenomic data without species-level references.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

LCM-DS: A novel approach of predicting drug-drug interactions for new drugs via Dempster-Shafer theory of evidence.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid.
IEEE Trans. Dependable Sec. Comput., 2015

GLProbs: Aligning Multiple Sequences Adaptively.
IEEE/ACM Trans. Comput. Biology Bioinform., 2015

SDB: A Secure Query Processing System with Data Interoperability.
PVLDB, 2015

IDBA-MTP: A Hybrid Metatranscriptomic Assembler Based on Protein Information.
Journal of Computational Biology, 2015

Introduction to selected papers from GIW/InCoB 2015.
J. Bioinformatics and Computational Biology, 2015

misFinder: identify mis-assemblies in an unbiased manner using reference and paired-end reads.
BMC Bioinformatics, 2015

Improving multiple sequence alignment by using better guide trees.
BMC Bioinformatics, 2015

WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Attribute-Based Encryption Resilient to Auxiliary Input.
Proceedings of the Provable Security, 2015

Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency.
Proceedings of the Information Security - 18th International Conference, 2015

Predicting RNA Secondary Structures: One-grammar-fits-all Solution.
Proceedings of the Bioinformatics Research and Applications - 11th International Symposium, 2015

Fragmented JPEG File Recovery Using Pseudo Headers.
Proceedings of the Advances in Digital Forensics XI, 2015

An ORAM Scheme with Improved Worst-Case Computational Overhead.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Data Framing Attacks against Nonlinear State Estimation in Smart Grid.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

New Word Detection and Tagging on Chinese Twitter Stream.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2015

Related Randomness Attacks for Public Key Cryptosystems.
Proceedings of the 10th ACM Symposium on Information, 2015

SRP: A concise non-parametric similarity-rank-based model for predicting drug-target interactions.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

2014
VSPN: VANET-Based Secure and Privacy-Preserving Navigation.
IEEE Trans. Computers, 2014

UFLE: a user-friendly location-free encryption system for mobile users.
Security and Communication Networks, 2014

Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Information Processing, 2014

Modeling the initial stage of a file sharing process on a BitTorrent network.
Peer-to-Peer Networking and Applications, 2014

Exponent-inversion Signatures and IBE under Static Assumptions.
IACR Cryptology ePrint Archive, 2014

MetaCluster-TA: taxonomic annotation for metagenomic data based on assembly-assisted binning.
BMC Genomics, 2014

Computational identification of protein binding sites on RNAs using high-throughput RNA structure-probing data.
Bioinformatics, 2014

Secure query processing with data interoperability in a cloud database environment.
Proceedings of the International Conference on Management of Data, 2014

IDBA-MTP: A Hybrid MetaTranscriptomic Assembler Based on Protein Information.
Proceedings of the Research in Computational Molecular Biology, 2014

Assessing cryptographic signature schemes from a legal perspective.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Faster Algorithms for Computing the R* Consensus Tree.
Proceedings of the Algorithms and Computation - 25th International Symposium, 2014

A practical real-time authentication system with Identity Tracking based on mouse dynamics.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Learning Sparse Gaussian Bayesian Network Structure by Variable Grouping.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

Predicting drug-target interaction for new drugs using enhanced similarity measures and super-target clustering1.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Information Forensics and Security, 2013

Heap Graph Based Software Theft Detection.
IEEE Trans. Information Forensics and Security, 2013

Non-adaptive complex group testing with multiple positive sets.
Theor. Comput. Sci., 2013

Lightweight Privacy-Preserving Peer-to-Peer Data Integration.
PVLDB, 2013

Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation.
JoWUA, 2013

IDBA-MT: De Novo Assembler for Metatranscriptomic Data Generated from Next-Generation Sequencing Technology.
Journal of Computational Biology, 2013

Unknown Chinese word extraction based on variety of overlapping strings.
Inf. Process. Manage., 2013

Detection of Image Region Duplication Using Spin Image.
IEICE Transactions, 2013

Encryption Schemes with Post-Challenge Auxiliary Inputs.
IACR Cryptology ePrint Archive, 2013

SOAPfusion: a robust and effective computational fusion discovery tool for RNA-seq reads.
Bioinformatics, 2013

IDBA-tran: a more robust de novo de Bruijn graph assembler for transcriptomes with uneven expression levels.
Bioinformatics, 2013

VANET-based secure taxi service.
Ad Hoc Networks, 2013

Photo Forensics on Shanzhai Mobile Phone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

A Local Structural Prediction Algorithm for RNA Triple Helix Structure.
Proceedings of the Pattern Recognition in Bioinformatics, 2013

Improved Composite Order Bilinear Pairing on Graphics Hardware.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Attribute Specified Identity-Based Encryption.
Proceedings of the Information Security Practice and Experience, 2013

Reconstructing k-Reticulated Phylogenetic Network from a Set of Gene Trees.
Proceedings of the Bioinformatics Research and Applications, 9th International Symposium, 2013

LCR_Finder: A de Novo Low Copy Repeat Finder for Human Genome.
Proceedings of the Bioinformatics Research and Applications, 9th International Symposium, 2013

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Towards a Better Similarity Measure for Keyword Profiling via Clustering.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Multi-key leakage-resilient threshold cryptography.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Leakage-resilient certificateless public key encryption.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Intra- and inter-sparse multiple output regression with application on environmental microbial community study.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

PERGA: A Paired-End Read Guided De Novo Assembler for Extending Contigs Using SVM Approach.
Proceedings of the ACM Conference on Bioinformatics, 2013

GLProbs: Aligning multiple sequences adaptively.
Proceedings of the ACM Conference on Bioinformatics, 2013

2012
Memory Efficient Algorithms for Structural Alignment of RNAs with Pseudoknots.
IEEE/ACM Trans. Comput. Biology Bioinform., 2012

An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence.
IEEE/ACM Trans. Comput. Biology Bioinform., 2012

SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET.
J. Information Security, 2012

Structural Alignment of RNA with Triple Helix Structure.
Journal of Computational Biology, 2012

MetaCluster 4.0: A Novel Binning Algorithm for NGS Reads and Huge Number of Species.
Journal of Computational Biology, 2012

Efficient HMAC-based secure communication for VANETs.
Computer Networks, 2012

Privacy-preserving advance power reservation.
IEEE Communications Magazine, 2012

MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample.
Bioinformatics, 2012

IDBA-UD: a de novo assembler for single-cell and metagenomic sequencing data with highly uneven depth.
Bioinformatics, 2012

COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly.
Bioinformatics, 2012

SOAP3: ultra-fast GPU-based parallel alignment tool for short reads.
Bioinformatics, 2012

MLAS: Multiple level authentication scheme for VANETs.
Ad Hoc Networks, 2012

DroidChecker: analyzing android applications for capability leak.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Non-Transferable Proxy Re-Encryption Scheme.
Proceedings of the 5th International Conference on New Technologies, 2012

Phylogenetic Tree Reconstruction with Protein Linkage.
Proceedings of the Bioinformatics Research and Applications - 8th International Symposium, 2012

Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.
Proceedings of the Advances in Digital Forensics VIII, 2012

Acceleration of Composite Order Bilinear Pairing on Graphics Hardware.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Proceedings of the Computer Security - ESORICS 2012, 2012

Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples.
Proceedings of the ACM International Conference on Bioinformatics, 2012

SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment.
Proceedings of the Applied Cryptography and Network Security, 2012

Fully Leakage-Resilient Signatures with Auxiliary Inputs.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
OPQ: OT-Based Private Querying in VANETs.
IEEE Trans. Intelligent Transportation Systems, 2011

k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
Journal of Zhejiang University - Science C, 2011

Structural Alignment of RNA with Complex Pseudoknot Structure.
Journal of Computational Biology, 2011

Exclusion-intersection encryption.
IJSN, 2011

Acceleration of Composite Order Bilinear Pairing on Graphics Hardware.
IACR Cryptology ePrint Archive, 2011

RNASAlign: RNA Structural Alignment System.
Bioinformatics, 2011

Meta-IDBA: a de Novo assembler for metagenomic data.
Bioinformatics [ISMB/ECCB], 2011

A robust and accurate binning algorithm for metagenomic sequences with arbitrary species abundance ratio.
Bioinformatics, 2011

SPECS: Secure and privacy enhancing communications schemes for VANETs.
Ad Hoc Networks, 2011

Non-adaptive Complex Group Testing with Multiple Positive Sets.
Proceedings of the Theory and Applications of Models of Computation, 2011

PASS: Privacy-preserving authentication scheme for smart grid network.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

Protecting Digital Data Privacy in Computer Forensic Examination.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

T-IDBA: A de novo Iterative de Bruijn Graph Assembler for Transcriptome - (Extended Abstract).
Proceedings of the Research in Computational Molecular Biology, 2011

Adaptive Phenotype Testing for AND/OR Items.
Proceedings of the Algorithms and Computation - 22nd International Symposium, 2011

Sockpuppet Detection in Online Discussion Forums.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Automatic Online Monitoring and Data-Mining Internet Forums.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network.
Proceedings of the Global Communications Conference, 2011

JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Dynamic Software Birthmark for Java Based on Heap Memory Analysis.
Proceedings of the Communications and Multimedia Security, 2011

MLAS: multiple level authentication scheme for VANETs.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

DMPFinder - Finding Differentiating Pathways with Gaps from Two Groups of Metabolic Networks.
Proceedings of the ISCA 3rd International Conference on Bioinformatics and Computational Biology, 2011

Algorithms for pseudoknot classification.
Proceedings of the ACM International Conference on Bioinformatics, 2011

Detection of novel tandem duplication with next-generation sequencing.
Proceedings of the ACM International Conference on Bioinformatics, 2011

Structural Alignment of RNAs with Pseudoknots.
Proceedings of the Handbook of Research on Computational and Systems Biology, 2011

2010
Improving the accuracy of signal transduction pathway construction using level-2 neighbours.
IJBRA, 2010

Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control.
IACR Cryptology ePrint Archive, 2010

A new key establishment scheme for wireless sensor networks
CoRR, 2010

Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers.
BMC Bioinformatics, 2010

IDBA - A Practical Iterative de Bruijn Graph De Novo Assembler.
Proceedings of the Research in Computational Molecular Biology, 2010

Oblivious Transfer with Access Control : Realizing Disjunction without Duplication.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Local Structural Alignment of RNA with Affine Gap Model.
Proceedings of the Bioinformatics Research and Applications, 6th International Symposium, 2010

Anonymous Fuzzy Identity-Based Encryption for Similarity Search.
Proceedings of the Algorithms and Computation - 21st International Symposium, 2010

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics.
Proceedings of the Advances in Digital Forensics VI, 2010

Security Issues and Challenges for Cyber Physical System.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Structure Prediction of Simple Non-standard Pseudoknot.
Proceedings of the BIOINFORMATICS 2010, 2010

Investigation of the Lineage and Tissue Specificity of Genes.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2010

MetaCluster: unsupervised binning of environmental genomic fragments and taxonomic annotation.
Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, 2010

Indexing Similar DNA Sequences.
Proceedings of the Algorithmic Aspects in Information and Management, 2010

2009
Secure Chained Threshold Proxy Signature without and with Supervision.
JSEA, 2009

Predicting Protein Complexes from PPI Data: A Core-Attachment Approach.
Journal of Computational Biology, 2009

Clustering-Based Approach for Predicting Motif Pairs from protein Interaction Data.
J. Bioinformatics and Computational Biology, 2009

Correcting short reads with high error rates for improved sequencing result.
IJBRA, 2009

Anonymous Fuzzy Identity-based Encryption for Similarity Search.
IACR Cryptology ePrint Archive, 2009

Finding optimal threshold for correction error reads in DNA assembling.
BMC Bioinformatics, 2009

SOAP2: an improved ultrafast tool for short read alignment.
Bioinformatics, 2009

ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks.
Ad Hoc Networks, 2009

Structural Alignment of RNA with Complex Pseudoknot Structure.
Proceedings of the Algorithms in Bioinformatics, 9th International Workshop, 2009

Succinct Text Indexing with Wildcards.
Proceedings of the String Processing and Information Retrieval, 2009

Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability.
Proceedings of the 2009 International Conference on Security & Management, 2009

A New Practical Scheme for Protecting Web Content.
Proceedings of the 2009 International Conference on Security & Management, 2009

A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking.
Proceedings of the 2009 International Conference on Security & Management, 2009

RFID Forward Secure Authentication Protocol: Flaw and Solution.
Proceedings of the 2009 International Conference on Complex, 2009

Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers.
Proceedings of the Proceeding of the 3rd International Workshop on Data and Text Mining in Bioinformatics, 2009

The 2-Interval Pattern Matching Problems and Its Application to ncRNA Scanning.
Proceedings of the Bioinformatics and Computational Biology, 2009

High Throughput Short Read Alignment via Bi-directional BWT.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Local Alignment (with Concave Gap Weights).
Proceedings of the Encyclopedia of Algorithms, 2008

Efficient Methods for Multiple Sequence Alignment with Guaranteed Error Bounds.
Proceedings of the Encyclopedia of Algorithms, 2008

Non-overlapping Common Substrings Allowing Mutations.
Mathematics in Computer Science, 2008

Finding Alternative Splicing Patterns with Strong Support from expressed Sequences on Individual exons/introns.
J. Bioinformatics and Computational Biology, 2008

Multiplicative Forward-Secure Threshold Signature Scheme.
I. J. Network Security, 2008

Filtering of false positive microRNA candidates by a clustering-based approach.
BMC Bioinformatics, 2008

MotifVoter: a novel ensemble method for fine-grained integration of generic motif finders.
Bioinformatics, 2008

Compressed indexing and local alignment of DNA.
Bioinformatics, 2008

Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Timed-Release Encryption Revisited.
Proceedings of the Provable Security, Second International Conference, 2008

Strongly Anonymous Communications in Mobile Ad Hoc Networks.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

Improving Disk Sector Integrity Using K-Dimension Hashing.
Proceedings of the Advances in Digital Forensics IV, 2008

Chained Threshold Proxy Signature without and with Supervision.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Authenticated Directed Diffusion.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

A Memory Efficient Algorithm for Structural Alignment of RNAs with Embedded Simple Pseudoknots.
Proceedings of the 6th Asia-Pacific Bioinformatics Conference, 2008

Optimal Algorithm for Finding DNA Motifs with Nucleotide Adjacent Dependency.
Proceedings of the 6th Asia-Pacific Bioinformatics Conference, 2008

2007
Delegation with supervision.
Inf. Sci., 2007

An Attack on Libert et al.' s ID-based Undeniable Signature Scheme.
I. J. Network Security, 2007

Accountability in organisations.
IJICS, 2007

Structural Identity-Based Encryption.
IACR Cryptology ePrint Archive, 2007

Providing distributed certificate authority service in cluster-based mobile ad hoc networks.
Computer Communications, 2007

Detection of generic spaced motifs using submotif pattern mining.
Bioinformatics, 2007

A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays.
Algorithmica, 2007

Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

The Point Placement Problem on a Line - Improved Bounds for Pairwise Distance Queries.
Proceedings of the Algorithms in Bioinformatics, 7th International Workshop, 2007

Maintenance of maximal frequent itemsets in large databases.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

A Hybrid Approach for Authenticating MPEG-2 Streaming Data.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).
Proceedings of the Information Security Practice and Experience, 2007

Space Efficient Indexes for String Matching with Don't Cares.
Proceedings of the Algorithms and Computation, 18th International Symposium, 2007

An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Improving Disk Sector Integrity Using 3-dimension Hashing Scheme.
Proceedings of the Future Generation Communication and Networking, 2007

Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard.
Proceedings of the 2007 International Conference on Security & Management, 2007

An Experimental Study of Compressed Indexing and Local Alignments of DNA.
Proceedings of the Combinatorial Optimization and Applications, 2007

Finding Alternative Splicing Patterns with Strong Support From Expressed Sequences.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2007

2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE Journal on Selected Areas in Communications, 2006

Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix.
J. Bioinformatics and Computational Biology, 2006

Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience.
I. J. Network Security, 2006

Sharing and access right delegation for confidential documents: A practical solution.
Information & Management, 2006

Practical electronic lotteries with offline TTP.
Computer Communications, 2006

A Key-Recovery System for Long-term Encrypted Documents.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006

A More Accurate and Efficient Whole Genome Phylogeny.
Proceedings of 4th Asia-Pacific Bioinformatics Conference. 13-16 February 2006, 2006

Event-Oriented k-Times Revocable-iff-Linked Group Signatures.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Indexing Useful Structural Patterns for XML Query Processing.
IEEE Trans. Knowl. Data Eng., 2005

A generic anti-spyware solution by access control list at kernel level.
Journal of Systems and Software, 2005

Finding Motifs with Insufficient Number of Strong Binding Sites.
Journal of Computational Biology, 2005

Exclusion-Intersection Encryption.
IACR Cryptology ePrint Archive, 2005

Filtering of Ineffective siRNAs and Improved siRNA Design Tool.
Bioinformatics, 2005

The mutated subsequence problem and locating conserved genes.
Bioinformatics, 2005

Forward-secure multisignature and blind signature schemes.
Applied Mathematics and Computation, 2005

An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Signcryption in Hierarchical Identity Based Cryptosystem.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Identity Based Delegation Network.
Proceedings of the Progress in Cryptology, 2005

Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix.
Proceedings of the Mathematical Foundations of Computer Science 2005, 2005

Efficient Authorization in Delegation Chains with Strong Non-Repudiation.
Proceedings of the Applied Public Key Infrastructure, 2005

Separable and Anonymous Identity-Based Key Issuing.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Supporting Efficient Authorization in Delegation with Supervision.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An e-Lottery Scheme Using Verifiable Random Function.
Proceedings of the Computational Science and Its Applications, 2005

Secure Role Activation and Authorization in the Enterprise Environment.
Proceedings of the Public Key Infrastructure, 2005

Identity Based Ring Signature: Why, How and What Next.
Proceedings of the Public Key Infrastructure, 2005

Trustworthy Browsing - A Secure Web Accessing Model.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Dynamic Integrity Verification for Software Self-defense.
Proceedings of The 2005 International Conference on Security and Management, 2005

A model to support fine-grained delegation of authorization.
Proceedings of The 2005 International Conference on Security and Management, 2005

Allowing mismatches in anchors for wholw genome alignment: Generation and effectiveness.
Proceedings of 3rd Asia-Pacific Bioinformatics Conference, 17-21 January 2005, Singapore, 2005

Efficient Identity Based Ring Signature.
Proceedings of the Applied Cryptography and Network Security, 2005

Role Activation Management in Role Based Access Control.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs).
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
An Efficient and Scalable Algorithm for Clustering XML Documents by Structure.
IEEE Trans. Knowl. Data Eng., 2004

Non-shared edges and nearest neighbor interchanges revisited.
Inf. Process. Lett., 2004

Subtree Transfer Distance For Degree-D Phylogenies.
Int. J. Found. Comput. Sci., 2004

Separable and Anonymous Identity-Based Key Issuing.
IACR Cryptology ePrint Archive, 2004

Signcryption in Hierarchical Identity Based Cryptosystem.
IACR Cryptology ePrint Archive, 2004

Efficient Identity Based Ring Signature.
IACR Cryptology ePrint Archive, 2004

Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2004

Identity Based Threshold Ring Signature.
IACR Cryptology ePrint Archive, 2004

An efficient algorithm for optimizing whole genome alignment with noise.
Bioinformatics, 2004

Discovering Minimal Infrequent Structures from XML Documents.
Proceedings of the Web Information Systems, 2004

Finding motifs for insufficient number of sequences with strong binding to transcription facto.
Proceedings of the Eighth Annual International Conference on Computational Molecular Biology, 2004

Applying Forward Security and Threshold Cryptography in Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004

Identity Based Threshold Ring Signature.
Proceedings of the Information Security and Cryptology, 2004

Secure Hierarchical Identity Based Signature and Its Application.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

The Delegation Problem and Practical PKI-Based Solutions.
Proceedings of the ICEIS 2004, 2004

Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Compressed Index for Dynamic Text.
Proceedings of the 2004 Data Compression Conference (DCC 2004), 2004

Risk Management of Corporate Confidential Information in Digital Form.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Adaptive Random Testing with CG Constraint.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

A Mutation-Sensitive Approach for Locating Conserved Gene Pairs between Related Species.
Proceedings of the 4th IEEE International Symposium on BioInformatics and BioEngineering (BIBE 2004), 2004

Filtering of Ineffective siRNAs and Improved siRNA Design Tool.
Proceedings of the Second Asia-Pacific Bioinformatics Conference (APBC 2004), 2004

Practical aspects of Compressed Suffix Arrays and FM-Index in Searching DNA Sequences.
Proceedings of the Sixth Workshop on Algorithm Engineering and Experiments and the First Workshop on Analytic Algorithmics and Combinatorics, 2004

2003
SmartTutor: An intelligent tutoring system in web-based adult education.
Journal of Systems and Software, 2003

Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs.
Journal of Computational Biology, 2003

eCX: a secure infrastructure for e-course delivery.
Internet Research, 2003

Content Engineering Agent: A TBL-Based E-Course Development Tool with TQM.
IJDET, 2003

A Secure Modified ID-Based Undeniable Signature Scheme.
IACR Cryptology ePrint Archive, 2003

Efficient Algorithms for Optimizing Whole Genome Alignment with Noise.
Proceedings of the Algorithms and Computation, 14th International Symposium, 2003

Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003

Approximate String Matching in DNA Sequences.
Proceedings of the Eighth International Conference on Database Systems for Advanced Applications (DASFAA '03), 2003

2002
Automatic construction of online catalog topologies.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2002

Improved Phylogeny Comparisons: Non-Shared Edges Nearest Neighbor Interchanges, and Subtree Transfers
CoRR, 2002

A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

2001
Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs
CoRR, 2001

Indexing Attributes and Reordering Profiles for XML Document Filtering and Information Delivery.
Proceedings of the Advances in Web-Age Information Management, 2001

Automatic Construction of Online Catalog Topologies.
Proceedings of the Electronic Commerce and Web Technologies, 2001

Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs.
Proceedings of the 2nd IEEE International Symposium on Bioinformatics and Bioengineering, 2001

2000
Construction of Online Catalog Topologies Using Decision Trees.
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000

Density-Based Mining of Quantitative Association Rules.
Proceedings of the Knowledge Discovery and Data Mining, 2000

Modeling Web Navigation by Statechart.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1998
A Survey On Online Education.
Proceedings of WebNet 98, 1998

1995
A generalized fortress problem using k-consecutive vertex guards.
Proceedings of the 7th Canadian Conference on Computational Geometry, 1995

1994
Edge Guards on a Fortress.
Proceedings of the 6th Canadian Conference on Computational Geometry, 1994


  Loading...