Siu-Ming Yiu

Affiliations:
  • University of Hong Kong


According to our database1, Siu-Ming Yiu authored at least 421 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards interpretable stock trend prediction through causal inference.
Expert Syst. Appl., March, 2024

Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice.
IACR Cryptol. ePrint Arch., 2024

zkMatrix: Batched Short Proof for Committed Matrix Multiplication.
IACR Cryptol. ePrint Arch., 2024

Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement.
CoRR, 2024

Extreme Two-View Geometry From Object Poses with Diffusion Models.
CoRR, 2024

Deep Efficient Private Neighbor Generation for Subgraph Federated Learning.
CoRR, 2024

2023
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation.
Pattern Recognit., November, 2023

Analyzing the peeling chain patterns on the Bitcoin blockchain.
Forensic Sci. Int. Digit. Investig., October, 2023

BitAnalysis: A Visualization System for Bitcoin Wallet Investigation.
IEEE Trans. Big Data, April, 2023

Practical fully leakage resilient signatures with auxiliary inputs.
Future Gener. Comput. Syst., April, 2023

Corrigendum to: A Self-Tallying Electronic Voting Based on Blockchain.
Comput. J., February, 2023

Chameleon Hash Based Efficiently Updatable Oblivious Key Management.
IEEE Trans. Serv. Comput., 2023

Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain.
IEEE Trans. Ind. Informatics, 2023

Online/Offline and History Indexing Identity-Based Fuzzy Message Detection.
IEEE Trans. Inf. Forensics Secur., 2023

FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2023

Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications.
IACR Cryptol. ePrint Arch., 2023

Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications.
IACR Cryptol. ePrint Arch., 2023

Asymmetric Group Message Franking: Definitions & Constructions.
IACR Cryptol. ePrint Arch., 2023

Improving Factual Error Correction by Learning to Inject Factual Errors.
CoRR, 2023

Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation.
CoRR, 2023

AnnoLLM: Making Large Language Models to Be Better Crowdsourced Annotators.
CoRR, 2023

State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.
CoRR, 2023

Automated Spatio-Temporal Graph Contrastive Learning.
Proceedings of the ACM Web Conference 2023, 2023

MTGL-ADMET: A Novel Multi-task Graph Learning Framework for ADMET Prediction Enhanced by Status-Theory and Maximum Flow.
Proceedings of the Research in Computational Molecular Biology, 2023

Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Spatial-Temporal Graph Learning with Adversarial Contrastive Adaptation.
Proceedings of the International Conference on Machine Learning, 2023

Online Anomalous Subtrajectory Detection on Road Networks with Deep Reinforcement Learning.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Asymmetric Group Message Franking: Definitions and Constructions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

PivotFEC: Enhancing Few-shot Factual Error Correction with a Pivot Task Approach using Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

CAPSTONE: Curriculum Sampling for Dense Retrieval with Document Expansion.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Meticulously Analyzing ESG Disclosure: A Data-Driven Approach.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks.
J. Internet Serv. Inf. Secur., 2022

Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability.
IACR Cryptol. ePrint Arch., 2022

Sensitivity analysis for a Bitcoin simulation model.
Digit. Investig., 2022

Generic server-aided secure multi-party computation in cloud computing.
Comput. Stand. Interfaces, 2022

Curriculum Sampling for Dense Retrieval with Document Expansion.
CoRR, 2022

Securer and Faster Privacy-Preserving Distributed Machine Learning.
CoRR, 2022

Online Anomalous Subtrajectory Detection on Road Networks with Deep Reinforcement Learning.
CoRR, 2022

Deep Multiple Instance Learning For Forecasting Stock Trends Using Financial News.
CoRR, 2022

Privacy-Preserving Distributed Machine Learning Made Faster.
CoRR, 2022

A Self-Tallying Electronic Voting Based on Blockchain.
Comput. J., 2022

MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle.
Proceedings of the IEEE International Conference on Trust, 2022

Hash Proof System with Auxiliary Inputs and Its Application.
Proceedings of the IEEE International Conference on Trust, 2022

A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

On Predicting and Generating a Good Break Shot in Billiards Sports.
Proceedings of the 2022 SIAM International Conference on Data Mining, 2022

Analyzing the Error Rates of Bitcoin Clustering Heuristics.
Proceedings of the Advances in Digital Forensics XVIII, 2022

Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Metric-guided Distillation: Distilling Knowledge from the Metric to Ranker and Retriever for Generative Commonsense Reasoning.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Controllable Dictionary Example Generation: Generating Example Sentences for Specific Targeted Audiences.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

2021
Interpretable prediction of drug-cell line response by triple matrix factorization.
Quant. Biol., December, 2021

Classifying encrypted traffic using adaptive fingerprints with multi-level attributes.
World Wide Web, 2021

Understanding deep face anti-spoofing: from the perspective of data.
Vis. Comput., 2021

A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Editorial: Security and Privacy in Computing and Communications.
Mob. Networks Appl., 2021

ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM.
Mob. Networks Appl., 2021

Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.
J. Comput. Syst. Sci., 2021

Fair hierarchical secret sharing scheme based on smart contract.
Inf. Sci., 2021

Privacy-preserving multikey computing framework for encrypted data in the cloud.
Inf. Sci., 2021

Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES.
IACR Cryptol. ePrint Arch., 2021

Making Private Function Evaluation Safer, Faster, and Simpler.
IACR Cryptol. ePrint Arch., 2021

Improved Zero-Knowledge Argument of Encrypted Extended Permutation.
IACR Cryptol. ePrint Arch., 2021

Blind Polynomial Evaluation and Data Trading.
IACR Cryptol. ePrint Arch., 2021

Subgraph Federated Learning with Missing Neighbor Generation.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Detecting Anomalous Programmable Logic Controller Events Using Process Mining.
Proceedings of the Critical Infrastructure Protection XV, 2021

Defending Against Model Inversion Attack by Adversarial Examples.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Forced Independent Optimized Implementation of 4-Bit S-Box.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
A Game-Theoretic Framework for Incentive Mechanism Design in Federated Learning.
Proceedings of the Federated Learning - Privacy and Incentive, 2020

ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment.
IEEE Trans. Serv. Comput., 2020

Location spoofing attack detection with pre-installed sensors in mobile devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Identification of device motion status via Bluetooth discovery.
J. Internet Serv. Inf. Secur., 2020

Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020

Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience.
IACR Cryptol. ePrint Arch., 2020

Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model.
IACR Cryptol. ePrint Arch., 2020

An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster.
IACR Cryptol. ePrint Arch., 2020

Incentive evolutionary game model for opportunistic social networks.
Future Gener. Comput. Syst., 2020

A VCG-based Fair Incentive Mechanism for Federated Learning.
CoRR, 2020

Optimal Procurement Auction for Cooperative Production of Virtual Products: Vickrey-Clarke-Groves Meet Cremer-McLean.
CoRR, 2020

Metamorphic Testing: A New Approach for Generating Next Test Cases.
CoRR, 2020

Coarse-to-fine two-stage semantic video carving approach in digital forensics.
Comput. Secur., 2020

Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

Detection on GPS Spoofing in Location Based Mobile Games.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

A Light-Weight Crowdsourcing Aggregation in Privacy-Preserving Federated Learning System.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Classification with Rejection: Scaling Generative Classifiers with Supervised Deep Infomax.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines.
Proceedings of the Advances in Digital Forensics XVI, 2020

Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning.
Proceedings of the Advances in Digital Forensics XVI, 2020

Decentralized Multi-Client Attribute Based Functional Encryption.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Anonymous Counting Problem in Trust Level Warning System for VANET.
IEEE Trans. Veh. Technol., 2019

Out-domain Chinese new word detection with statistics-based character embedding.
Nat. Lang. Eng., 2019

Detection on auto clickers in mobile games.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Detecting drug communities and predicting comprehensive drug-drug interactions via balance regularized semi-nonnegative matrix factorization.
J. Cheminformatics, 2019

HybridORAM: Practical oblivious cloud storage with constant bandwidth.
Inf. Sci., 2019

An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis.
IACR Cryptol. ePrint Arch., 2019

Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2019

Privacy-preserving edge-assisted image retrieval and classification in IoT.
Frontiers Comput. Sci., 2019

Predicting combinative drug pairs via multiple classifier system with positive samples only.
Comput. Methods Programs Biomed., 2019

Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties.
Clust. Comput., 2019

A Secure and Self-tallying E-voting System Based on Blockchain.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Strong Known Related-Key Attacks and the Security of ECDSA.
Proceedings of the Network and System Security - 13th International Conference, 2019

An Incident Response Model for Industrial Control System Forensics Based on Historical Events.
Proceedings of the Critical Infrastructure Protection XIII, 2019

OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

BitVis: An Interactive Visualization System for Bitcoin Accounts Analysis.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
A Dynamic Trust Framework for Opportunistic Mobile Social Networks.
IEEE Trans. Netw. Serv. Manag., 2018

Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating.
J. Netw. Comput. Appl., 2018

Privacy-preserving verifiable elastic net among multiple institutions in the cloud.
J. Comput. Secur., 2018

Reconstructing One-Articulated Networks with Distance Matrices.
J. Comput. Biol., 2018

Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties.
Int. J. High Perform. Comput. Netw., 2018

JPEG image width estimation for file carving.
IET Image Process., 2018

Decentralized Search on Decentralized Web.
CoRR, 2018

Predicting and understanding comprehensive drug-drug interactions via semi-nonnegative matrix factorization.
BMC Syst. Biol., 2018

BMCMDA: a novel model for predicting human microbe-disease associations via binary matrix completion.
BMC Bioinform., 2018

TMFUF: a triple matrix factorization-based unified framework for predicting comprehensive drug-drug interactions of new drugs.
BMC Bioinform., 2018

A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

A Forensic Logging System for Siemens Programmable Logic Controllers.
Proceedings of the Advances in Digital Forensics XIV, 2018

Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers.
Proceedings of the Advances in Digital Forensics XIV, 2018

A New Privacy-Preserving Searching Model on Blockchain.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Outsourced Privacy Preserving SVM with Multiple Keys.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

DCN: Detector-Corrector Network Against Evasion Attacks on Deep Neural Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
New Word Detection and Tagging on Chinese Twitter Stream.
Trans. Large Scale Data Knowl. Centered Syst., 2017

F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems.
Secur. Commun. Networks, 2017

A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities.
Pervasive Mob. Comput., 2017

Accurate annotation of metagenomic data without species-level references.
Int. J. Data Min. Bioinform., 2017

Multi-Dimensional Bloom Filter: Design and Evaluation.
IEICE Trans. Inf. Syst., 2017

Constant bandwidth ORAM with small block size using PIR operations.
IACR Cryptol. ePrint Arch., 2017

Multi-key privacy-preserving deep learning in cloud computing.
Future Gener. Comput. Syst., 2017

Offline/online attribute-based encryption with verifiable outsourced decryption.
Concurr. Comput. Pract. Exp., 2017

Predicting combinative drug pairs towards realistic screening via integrating heterogeneous features.
BMC Bioinform., 2017

rMFilter: acceleration of long read-based structure variation calling by chimeric read filtering.
Bioinform., 2017

A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Nonoutsourceable Puzzle Under GHOST Rule.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Relevant Fact Selection for QA via Sequence Labeling.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Predicting Comprehensive Drug-Drug Interactions for New Drugs via Triple Matrix Factorization.
Proceedings of the Bioinformatics and Biomedical Engineering, 2017

Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Proceedings of the Information Security Practice and Experience, 2017

Identifying malware with HTTP content type inconsistency via header-payload comparison.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Auto-identification of background traffic based on autonomous periodic interaction.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Semantic Video Carving Using Perceptual Hashing and Optical Flow.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Reconstruction of Task Lists from Android Applications.
Proceedings of the Information Science and Applications 2017, 2017

Privacy-Preserving Disease Risk Test Based on Bloom Filters.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Detecting anomalous behavior of PLC using semi-supervised machine learning.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

An iterative algorithm for de novo optical map assembly.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Mixed Membership Sparse Gaussian Conditional Random Fields.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone.
Proceedings of the Mobile Security and Privacy, 2017

2016
Efficient Methods for Multiple Sequence Alignment with Guaranteed Error Bounds.
Encyclopedia of Algorithms, 2016

Local Alignment (with Concave Gap Weights).
Encyclopedia of Algorithms, 2016

Efficient and secure multi-functional searchable symmetric encryption schemes.
Secur. Commun. Networks, 2016

Exposing frame deletion by detecting abrupt changes in video streams.
Neurocomputing, 2016

Recovery of heavily fragmented JPEG files.
Digit. Investig., 2016

A multi-task learning model for malware classification with useful file access pattern from API call sequence.
CoRR, 2016

Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016

A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms.
IEEE Commun. Surv. Tutorials, 2016

Faster Algorithms for Computing the R* Consensus Tree.
Algorithmica, 2016

LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation).
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Dynamic Attribute-Based Access Control in Cloud Storage Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Towards a More Accurate Error Model for BioNano Optical Maps.
Proceedings of the Bioinformatics Research and Applications - 12th International Symposium, 2016

Dynamic Proofs of Retrievability with improved worst case overhead.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A Revocable Outsourcing Attribute-Based Encryption Scheme.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

Generic Construction of Publicly Verifiable Predicate Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

LCM-DS: A novel approach of predicting drug-drug interactions for new drugs via Dempster-Shafer theory of evidence.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
GIW and InCoB are advancing bioinformatics in the Asia-Pacific.
BMC Bioinform., December, 2015

PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2015

GLProbs: Aligning Multiple Sequences Adaptively.
IEEE ACM Trans. Comput. Biol. Bioinform., 2015

SDB: A Secure Query Processing System with Data Interoperability.
Proc. VLDB Endow., 2015

IDBA-MTP: A Hybrid Metatranscriptomic Assembler Based on Protein Information.
J. Comput. Biol., 2015

Introduction to selected papers from GIW/InCoB 2015.
J. Bioinform. Comput. Biol., 2015

misFinder: identify mis-assemblies in an unbiased manner using reference and paired-end reads.
BMC Bioinform., 2015

Improving multiple sequence alignment by using better guide trees.
BMC Bioinform., 2015

WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Attribute-Based Encryption Resilient to Auxiliary Input.
Proceedings of the Provable Security, 2015

Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency.
Proceedings of the Information Security - 18th International Conference, 2015

Predicting RNA Secondary Structures: One-grammar-fits-all Solution.
Proceedings of the Bioinformatics Research and Applications - 11th International Symposium, 2015

Fragmented JPEG File Recovery Using Pseudo Headers.
Proceedings of the Advances in Digital Forensics XI, 2015

An ORAM Scheme with Improved Worst-Case Computational Overhead.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Data Framing Attacks against Nonlinear State Estimation in Smart Grid.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Related Randomness Attacks for Public Key Cryptosystems.
Proceedings of the 10th ACM Symposium on Information, 2015

SRP: A concise non-parametric similarity-rank-based model for predicting drug-target interactions.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

2014
VSPN: VANET-Based Secure and Privacy-Preserving Navigation.
IEEE Trans. Computers, 2014

UFLE: a user-friendly location-free encryption system for mobile users.
Secur. Commun. Networks, 2014

Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Inf. Process., 2014

Modeling the initial stage of a file sharing process on a BitTorrent network.
Peer-to-Peer Netw. Appl., 2014

Exponent-inversion Signatures and IBE under Static Assumptions.
IACR Cryptol. ePrint Arch., 2014

MetaCluster-TA: taxonomic annotation for metagenomic data based on assembly-assisted binning.
BMC Genom., 2014

Computational identification of protein binding sites on RNAs using high-throughput RNA structure-probing data.
Bioinform., 2014

Secure query processing with data interoperability in a cloud database environment.
Proceedings of the International Conference on Management of Data, 2014

Assessing cryptographic signature schemes from a legal perspective.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A practical real-time authentication system with Identity Tracking based on mouse dynamics.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Learning Sparse Gaussian Bayesian Network Structure by Variable Grouping.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

Predicting drug-target interaction for new drugs using enhanced similarity measures and super-target clustering<sup>1</sup>.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013

Heap Graph Based Software Theft Detection.
IEEE Trans. Inf. Forensics Secur., 2013

Non-adaptive complex group testing with multiple positive sets.
Theor. Comput. Sci., 2013

Lightweight Privacy-Preserving Peer-to-Peer Data Integration.
Proc. VLDB Endow., 2013

Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

IDBA-MT: <i>De Novo</i> Assembler for Metatranscriptomic Data Generated from Next-Generation Sequencing Technology.
J. Comput. Biol., 2013

Unknown Chinese word extraction based on variety of overlapping strings.
Inf. Process. Manag., 2013

Detection of Image Region Duplication Using Spin Image.
IEICE Trans. Inf. Syst., 2013

Encryption Schemes with Post-Challenge Auxiliary Inputs.
IACR Cryptol. ePrint Arch., 2013

SOAPfusion: a robust and effective computational fusion discovery tool for RNA-seq reads.
Bioinform., 2013

IDBA-tran: a more robust de novo de Bruijn graph assembler for transcriptomes with uneven expression levels.
Bioinform., 2013

VANET-based secure taxi service.
Ad Hoc Networks, 2013

Photo Forensics on Shanzhai Mobile Phone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

A Local Structural Prediction Algorithm for RNA Triple Helix Structure.
Proceedings of the Pattern Recognition in Bioinformatics, 2013

Improved Composite Order Bilinear Pairing on Graphics Hardware.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Attribute Specified Identity-Based Encryption.
Proceedings of the Information Security Practice and Experience, 2013

Reconstructing <i>k</i>-Reticulated Phylogenetic Network from a Set of Gene Trees.
Proceedings of the Bioinformatics Research and Applications, 9th International Symposium, 2013

LCR_Finder: A de Novo Low Copy Repeat Finder for Human Genome.
Proceedings of the Bioinformatics Research and Applications, 9th International Symposium, 2013

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Secure, privacy-preserving, distributed motor vehicle event data recorder.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

Towards a Better Similarity Measure for Keyword Profiling via Clustering.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Multi-key leakage-resilient threshold cryptography.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Leakage-resilient certificateless public key encryption.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Intra- and inter-sparse multiple output regression with application on environmental microbial community study.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

PERGA: A Paired-End Read Guided De Novo Assembler for Extending Contigs Using SVM Approach.
Proceedings of the ACM Conference on Bioinformatics, 2013

2012
Memory Efficient Algorithms for Structural Alignment of RNAs with Pseudoknots.
IEEE ACM Trans. Comput. Biol. Bioinform., 2012

An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence.
IEEE ACM Trans. Comput. Biol. Bioinform., 2012

SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET.
J. Information Security, 2012

Structural Alignment of RNA with Triple Helix Structure.
J. Comput. Biol., 2012

MetaCluster 4.0: A Novel Binning Algorithm for NGS Reads and Huge Number of Species.
J. Comput. Biol., 2012

Efficient HMAC-based secure communication for VANETs.
Comput. Networks, 2012

Privacy-preserving advance power reservation.
IEEE Commun. Mag., 2012

MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample.
Bioinform., 2012

IDBA-UD: a <i>de novo</i> assembler for single-cell and metagenomic sequencing data with highly uneven depth.
Bioinform., 2012

COPE: an accurate <i>k</i>-mer-based pair-end reads connection tool to facilitate genome assembly.
Bioinform., 2012

SOAP3: ultra-fast GPU-based parallel alignment tool for short reads.
Bioinform., 2012

MLAS: Multiple level authentication scheme for VANETs.
Ad Hoc Networks, 2012

DroidChecker: analyzing android applications for capability leak.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Non-Transferable Proxy Re-Encryption Scheme.
Proceedings of the 5th International Conference on New Technologies, 2012

Phylogenetic Tree Reconstruction with Protein Linkage.
Proceedings of the Bioinformatics Research and Applications - 8th International Symposium, 2012

Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.
Proceedings of the Advances in Digital Forensics VIII, 2012

Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Proceedings of the Computer Security - ESORICS 2012, 2012

Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples.
Proceedings of the ACM International Conference on Bioinformatics, 2012

SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment.
Proceedings of the Applied Cryptography and Network Security, 2012

Fully Leakage-Resilient Signatures with Auxiliary Inputs.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
OPQ: OT-Based Private Querying in VANETs.
IEEE Trans. Intell. Transp. Syst., 2011

k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
J. Zhejiang Univ. Sci. C, 2011

Structural Alignment of RNA with Complex Pseudoknot Structure.
J. Comput. Biol., 2011

Exclusion-intersection encryption.
Int. J. Secur. Networks, 2011

Acceleration of Composite Order Bilinear Pairing on Graphics Hardware.
IACR Cryptol. ePrint Arch., 2011

RNASAlign: RNA Structural Alignment System.
Bioinform., 2011

Meta-IDBA: a <i>de Novo</i> assembler for metagenomic data.
Bioinform., 2011

A robust and accurate binning algorithm for metagenomic sequences with arbitrary species abundance ratio.
Bioinform., 2011

SPECS: Secure and privacy enhancing communications schemes for VANETs.
Ad Hoc Networks, 2011

PASS: Privacy-preserving authentication scheme for smart grid network.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

Protecting Digital Data Privacy in Computer Forensic Examination.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

T-IDBA: A de novo Iterative de Bruijn Graph Assembler for Transcriptome - (Extended Abstract).
Proceedings of the Research in Computational Molecular Biology, 2011

Adaptive Phenotype Testing for AND/OR Items.
Proceedings of the Algorithms and Computation - 22nd International Symposium, 2011

Sockpuppet Detection in Online Discussion Forums.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Automatic Online Monitoring and Data-Mining Internet Forums.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network.
Proceedings of the Global Communications Conference, 2011

JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Dynamic Software Birthmark for Java Based on Heap Memory Analysis.
Proceedings of the Communications and Multimedia Security, 2011

<i>MLAS</i>: multiple level authentication scheme for VANETs.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

DMPFinder - Finding Differentiating Pathways with Gaps from Two Groups of Metabolic Networks.
Proceedings of the ISCA 3rd International Conference on Bioinformatics and Computational Biology, 2011

Algorithms for pseudoknot classification.
Proceedings of the ACM International Conference on Bioinformatics, 2011

Detection of novel tandem duplication with next-generation sequencing.
Proceedings of the ACM International Conference on Bioinformatics, 2011

Structural Alignment of RNAs with Pseudoknots.
Proceedings of the Handbook of Research on Computational and Systems Biology, 2011

2010
Improving the accuracy of signal transduction pathway construction using level-2 neighbours.
Int. J. Bioinform. Res. Appl., 2010

Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control.
IACR Cryptol. ePrint Arch., 2010

A new key establishment scheme for wireless sensor networks
CoRR, 2010

Unsupervised binning of environmental genomic fragments based on an error robust selection of <i>l</i>-mers.
BMC Bioinform., 2010

IDBA - A Practical Iterative de Bruijn Graph De Novo Assembler.
Proceedings of the Research in Computational Molecular Biology, 2010

Oblivious Transfer with Access Control : Realizing Disjunction without Duplication.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Local Structural Alignment of RNA with Affine Gap Model.
Proceedings of the Bioinformatics Research and Applications, 6th International Symposium, 2010

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics.
Proceedings of the Advances in Digital Forensics VI, 2010

Security Issues and Challenges for Cyber Physical System.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Prediction of Minimum Free Energy Structure for Simple Non-standard Pseudoknot.
Proceedings of the Biomedical Engineering Systems and Technologies, 2010

Structure Prediction of Simple Non-standard Pseudoknot.
Proceedings of the BIOINFORMATICS 2010, 2010

Investigation of the Lineage and Tissue Specificity of Genes.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2010

Predicting metabolic pathways from metabolic networks with limited biological knowledge.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2010

MetaCluster: unsupervised binning of environmental genomic fragments and taxonomic annotation.
Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, 2010

Indexing Similar DNA Sequences.
Proceedings of the Algorithmic Aspects in Information and Management, 2010

2009
Secure Chained Threshold Proxy Signature without and with Supervision.
J. Softw. Eng. Appl., 2009

Predicting Protein Complexes from PPI Data: A Core-Attachment Approach.
J. Comput. Biol., 2009

Clustering-Based Approach for Predicting Motif Pairs from protein Interaction Data.
J. Bioinform. Comput. Biol., 2009

Correcting short reads with high error rates for improved sequencing result.
Int. J. Bioinform. Res. Appl., 2009

Anonymous Fuzzy Identity-based Encryption for Similarity Search.
IACR Cryptol. ePrint Arch., 2009

Finding optimal threshold for correction error reads in DNA assembling.
BMC Bioinform., 2009

SOAP2: an improved ultrafast tool for short read alignment.
Bioinform., 2009

ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks.
Ad Hoc Networks, 2009

Structural Alignment of RNA with Complex Pseudoknot Structure.
Proceedings of the Algorithms in Bioinformatics, 9th International Workshop, 2009

Succinct Text Indexing with Wildcards.
Proceedings of the String Processing and Information Retrieval, 2009

Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability.
Proceedings of the 2009 International Conference on Security & Management, 2009

A New Practical Scheme for Protecting Web Content.
Proceedings of the 2009 International Conference on Security & Management, 2009

A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking.
Proceedings of the 2009 International Conference on Security & Management, 2009

RFID Forward Secure Authentication Protocol: Flaw and Solution.
Proceedings of the 2009 International Conference on Complex, 2009

Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers.
Proceedings of the Proceeding of the 3rd International Workshop on Data and Text Mining in Bioinformatics, 2009

The 2-Interval Pattern Matching Problems and Its Application to ncRNA Scanning.
Proceedings of the Bioinformatics and Computational Biology, 2009

High Throughput Short Read Alignment via Bi-directional BWT.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Local Alignment (with Concave Gap Weights).
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

Efficient Methods for Multiple Sequence Alignment with Guaranteed Error Bounds.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

Non-overlapping Common Substrings Allowing Mutations.
Math. Comput. Sci., 2008

Finding Alternative Splicing Patterns with Strong Support from expressed Sequences on Individual exons/introns.
J. Bioinform. Comput. Biol., 2008

Multiplicative Forward-Secure Threshold Signature Scheme.
Int. J. Netw. Secur., 2008

Filtering of false positive microRNA candidates by a clustering-based approach.
BMC Bioinform., 2008

MotifVoter: a novel ensemble method for fine-grained integration of generic motif finders.
Bioinform., 2008

Compressed indexing and local alignment of DNA.
Bioinform., 2008

Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Timed-Release Encryption Revisited.
Proceedings of the Provable Security, Second International Conference, 2008

Strongly Anonymous Communications in Mobile Ad Hoc Networks.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

Improving Disk Sector Integrity Using K-Dimension Hashing.
Proceedings of the Advances in Digital Forensics IV, 2008

Chained Threshold Proxy Signature without and with Supervision.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Authenticated Directed Diffusion.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

A Memory Efficient Algorithm for Structural Alignment of RNAs with Embedded Simple Pseudoknots.
Proceedings of the 6th Asia-Pacific Bioinformatics Conference, 2008

Optimal Algorithm for Finding DNA Motifs with Nucleotide Adjacent Dependency.
Proceedings of the 6th Asia-Pacific Bioinformatics Conference, 2008

2007
Delegation with supervision.
Inf. Sci., 2007

An Attack on Libert et al.' s ID-based Undeniable Signature Scheme.
Int. J. Netw. Secur., 2007

Accountability in organisations.
Int. J. Inf. Comput. Secur., 2007

Structural Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2007

Providing distributed certificate authority service in cluster-based mobile ad hoc networks.
Comput. Commun., 2007

Detection of generic spaced motifs using submotif pattern mining.
Bioinform., 2007

A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays.
Algorithmica, 2007

Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

The Point Placement Problem on a Line - Improved Bounds for Pairwise Distance Queries.
Proceedings of the Algorithms in Bioinformatics, 7th International Workshop, 2007

Maintenance of maximal frequent itemsets in large databases.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

A Hybrid Approach for Authenticating MPEG-2 Streaming Data.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).
Proceedings of the Information Security Practice and Experience, 2007

Space Efficient Indexes for String Matching with Don't Cares.
Proceedings of the Algorithms and Computation, 18th International Symposium, 2007

An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Improving Disk Sector Integrity Using 3-dimension Hashing Scheme.
Proceedings of the Future Generation Communication and Networking, 2007

Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard.
Proceedings of the 2007 International Conference on Security & Management, 2007

An Experimental Study of Compressed Indexing and Local Alignments of DNA.
Proceedings of the Combinatorial Optimization and Applications, 2007

Finding Alternative Splicing Patterns with Strong Support From Expressed Sequences.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2007

2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE J. Sel. Areas Commun., 2006

Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix.
J. Bioinform. Comput. Biol., 2006

Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience.
Int. J. Netw. Secur., 2006

Sharing and access right delegation for confidential documents: A practical solution.
Inf. Manag., 2006

Practical electronic lotteries with offline TTP.
Comput. Commun., 2006

A Key-Recovery System for Long-term Encrypted Documents.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006

A More Accurate and Efficient Whole Genome Phylogeny.
Proceedings of 4th Asia-Pacific Bioinformatics Conference. 13-16 February 2006, 2006

Event-Oriented <i>k</i>-Times Revocable-iff-Linked Group Signatures.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Indexing Useful Structural Patterns for XML Query Processing.
IEEE Trans. Knowl. Data Eng., 2005

A generic anti-spyware solution by access control list at kernel level.
J. Syst. Softw., 2005

Finding Motifs with Insufficient Number of Strong Binding Sites.
J. Comput. Biol., 2005

Filtering of Ineffective siRNAs and Improved siRNA Design Tool.
Bioinform., 2005

The mutated subsequence problem and locating conserved genes.
Bioinform., 2005

Forward-secure multisignature and blind signature schemes.
Appl. Math. Comput., 2005

An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Identity Based Delegation Network.
Proceedings of the Progress in Cryptology, 2005

Efficient Authorization in Delegation Chains with Strong Non-Repudiation.
Proceedings of the Applied Public Key Infrastructure, 2005

Supporting Efficient Authorization in Delegation with Supervision.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An e-Lottery Scheme Using Verifiable Random Function.
Proceedings of the Computational Science and Its Applications, 2005

Secure Role Activation and Authorization in the Enterprise Environment.
Proceedings of the Public Key Infrastructure, 2005

Identity Based Ring Signature: Why, How and What Next.
Proceedings of the Public Key Infrastructure, 2005

Trustworthy Browsing - A Secure Web Accessing Model.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Dynamic Integrity Verification for Software Self-defense.
Proceedings of The 2005 International Conference on Security and Management, 2005

A model to support fine-grained delegation of authorization.
Proceedings of The 2005 International Conference on Security and Management, 2005

Allowing mismatches in anchors for wholw genome alignment: Generation and effectiveness.
Proceedings of 3rd Asia-Pacific Bioinformatics Conference, 17-21 January 2005, Singapore, 2005

Role Activation Management in Role Based Access Control.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs).
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
An Efficient and Scalable Algorithm for Clustering XML Documents by Structure.
IEEE Trans. Knowl. Data Eng., 2004

Non-shared edges and nearest neighbor interchanges revisited.
Inf. Process. Lett., 2004

Subtree Transfer Distance For Degree-D Phylogenies.
Int. J. Found. Comput. Sci., 2004

Separable and Anonymous Identity-Based Key Issuing.
IACR Cryptol. ePrint Arch., 2004

Signcryption in Hierarchical Identity Based Cryptosystem.
IACR Cryptol. ePrint Arch., 2004

Efficient Identity Based Ring Signature.
IACR Cryptol. ePrint Arch., 2004

Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2004

Identity Based Threshold Ring Signature.
IACR Cryptol. ePrint Arch., 2004

An efficient algorithm for optimizing whole genome alignment with noise.
Bioinform., 2004

Discovering Minimal Infrequent Structures from XML Documents.
Proceedings of the Web Information Systems, 2004

Finding motifs for insufficient number of sequences with strong binding to transcription facto.
Proceedings of the Eighth Annual International Conference on Computational Molecular Biology, 2004

Applying Forward Security and Threshold Cryptography in Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004

Secure Hierarchical Identity Based Signature and Its Application.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

The Delegation Problem and Practical PKI-Based Solutions.
Proceedings of the ICEIS 2004, 2004

Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Compressed Index for Dynamic Text.
Proceedings of the 2004 Data Compression Conference (DCC 2004), 2004

Risk Management of Corporate Confidential Information in Digital Form.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Adaptive Random Testing with CG Constraint.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

A Mutation-Sensitive Approach for Locating Conserved Gene Pairs between Related Species.
Proceedings of the 4th IEEE International Symposium on BioInformatics and BioEngineering (BIBE 2004), 2004

Practical aspects of Compressed Suffix Arrays and FM-Index in Searching DNA Sequences.
Proceedings of the Sixth Workshop on Algorithm Engineering and Experiments and the First Workshop on Analytic Algorithmics and Combinatorics, 2004

2003
SmartTutor: An intelligent tutoring system in web-based adult education.
J. Syst. Softw., 2003

Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs.
J. Comput. Biol., 2003

eCX: a secure infrastructure for e-course delivery.
Internet Res., 2003

Content Engineering Agent: A TBL-Based E-Course Development Tool with TQM.
Int. J. Distance Educ. Technol., 2003

A Secure Modified ID-Based Undeniable Signature Scheme.
IACR Cryptol. ePrint Arch., 2003

Efficient Algorithms for Optimizing Whole Genome Alignment with Noise.
Proceedings of the Algorithms and Computation, 14th International Symposium, 2003

Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003

Approximate String Matching in DNA Sequences.
Proceedings of the Eighth International Conference on Database Systems for Advanced Applications (DASFAA '03), 2003

2002
Automatic construction of online catalog topologies.
IEEE Trans. Syst. Man Cybern. Part C, 2002

Improved Phylogeny Comparisons: Non-Shared Edges Nearest Neighbor Interchanges, and Subtree Transfers
CoRR, 2002

A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

2001
Indexing Attributes and Reordering Profiles for XML Document Filtering and Information Delivery.
Proceedings of the Advances in Web-Age Information Management, 2001

2000
Construction of Online Catalog Topologies Using Decision Trees.
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000

Density-Based Mining of Quantitative Association Rules.
Proceedings of the Knowledge Discovery and Data Mining, 2000

Modeling Web Navigation by Statechart.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1998
A Survey On Online Education.
Proceedings of WebNet 98, 1998

1996
Tight bound edge guard results on art gallery problems
PhD thesis, 1996

1995
A generalized fortress problem using k-consecutive vertex guards.
Proceedings of the 7th Canadian Conference on Computational Geometry, 1995

1994
Edge Guards on a Fortress.
Proceedings of the 6th Canadian Conference on Computational Geometry, 1994


  Loading...