Wun-She Yap

Orcid: 0000-0002-0007-6174

According to our database1, Wun-She Yap authored at least 67 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A modified single image dehazing method for autonomous driving vision system.
Multim. Tools Appl., March, 2024

Histopathological Cancer Detection Using Intra-Domain Transfer Learning and Ensemble Learning.
IEEE Access, 2024

2023
KaratSaber: New Speed Records for Saber Polynomial Multiplication Using Efficient Karatsuba FPGA Architecture.
IEEE Trans. Computers, July, 2023

Visually meaningful image encryption algorithm based on digital signature.
Digit. Commun. Networks, February, 2023

Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography.
IEEE Trans. Inf. Forensics Secur., 2023

A practical intrusion detection system based on denoising autoencoder and LightGBM classifier with improved detection performance.
J. Ambient Intell. Humaniz. Comput., 2023

Efficient Implementation of ACORN and AEGIS-128 Authenticated Encryption on GPU for Internet of Things.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

2022
A contrast enhancement framework under uncontrolled environments based on just noticeable difference.
Signal Process. Image Commun., 2022

Special issue on neural computing and applications 2021.
Neural Comput. Appl., 2022

The development of skin lesion detection application in smart handheld devices using deep neural networks.
Multim. Tools Appl., 2022

Medical equipment recognition using deep transfer learning.
J. Intell. Fuzzy Syst., 2022

New differential cryptanalysis results for the lightweight block cipher BORON.
J. Inf. Secur. Appl., 2022

A New Image Encryption Scheme Based on Hyperchaotic System and SHA-2.
Proceedings of the ICDSP 2022: 6th International Conference on Digital Signal Processing, Chengdu, China, February 25, 2022

Key Exchange Protocol Based on Permuted Goppa Syndrome Decoding Problem.
Proceedings of the ICDSP 2022: 6th International Conference on Digital Signal Processing, Chengdu, China, February 25, 2022

Deep Machine Learning Histopathological Image Analysis for Renal Cancer Detection.
Proceedings of the ICCAI '22: 8th International Conference on Computing and Artificial Intelligence, Tianjin, China, March 18, 2022

2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA.
J. Supercomput., 2021

Accelerating number theoretic transform in GPU platform for fully homomorphic encryption.
J. Supercomput., 2021

Towards Better Performance for Protected Iris Biometric System with Confidence Matrix.
Symmetry, 2021

Construction of Optimal Stock Market Portfolios Using Outlier Detection Algorithm.
Proceedings of the Soft Computing in Data Science - 6th International Conference, 2021

2020
Area-Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA.
IEEE Trans. Very Large Scale Integr. Syst., 2020

Cryptanalysis of genetic algorithm-based encryption scheme.
Multim. Tools Appl., 2020

Optimized IoT Cryptoprocessor Based on QC-MPDC Key Encapsulation Mechanism.
IEEE Internet Things J., 2020

2019
Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification.
Neural Networks, 2019

Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme.
Proceedings of the Information Security Practice and Experience, 2019

Performance Analysis of an Fuzzy Logic Based LEACH Protocol.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Determination of Computationally Efficient Multi-pool Model Fitting Approach for Pulsed Chemical Exchange Saturation Transfer MRI.
Proceedings of the ICBBS 2019: 8th International Conference on Bioinformatics and Biomedical Science, 2019

2018
Cancellable speech template via random binary orthogonal matrices projection hashing.
Pattern Recognit., 2018

An alignment-free cancelable fingerprint template for bio-cryptosystems.
J. Netw. Comput. Appl., 2018

Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis.
IET Inf. Secur., 2018

Security analysis of M-DES and key-based coded permutation ciphers in wireless channels.
IET Commun., 2018

Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era.
Proceedings of the 2018 IEEE SmartWorld, 2018

Convolutional Neural Network-Based Collaborative Filtering for Recommendation Systems.
Proceedings of the Robot Intelligence Technology and Applications, 2018

Hierarchical Attention Networks for Different Types of Documents with Smaller Size of Datasets.
Proceedings of the Robot Intelligence Technology and Applications, 2018

Document level polarity classification with attention gated recurrent unit.
Proceedings of the 2018 International Conference on Information Networking, 2018

Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018

2017
Improved Path Loss Simulation Incorporating Three-Dimensional Terrain Model Using Parallel Coprocessors.
Wirel. Commun. Mob. Comput., 2017

Cancellable iris template generation based on Indexing-First-One hashing.
Pattern Recognit., 2017

Data privacy preserving scheme using generalised linear models.
Comput. Secur., 2017

Commentary on "A block chaotic image encryption scheme based on self-adaptive modelling" [Applied Soft Computing 22 (2014) 351-357].
Appl. Soft Comput., 2017

Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
Cryptanalysis of a High-Definition Image Encryption Based on AES Modification.
Wirel. Pers. Commun., 2016

On the effective subkey space of some image encryption algorithms using external key.
J. Vis. Commun. Image Represent., 2016

Cryptanalysis of a CP-ABE scheme with policy in normal forms.
Inf. Process. Lett., 2016

Forgery attacks of an identity-based multi-proxy signature scheme.
Int. J. Commun. Syst., 2016

Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016

Iris Cancellable Template Generation Based on Indexing-First-One Hashing.
Proceedings of the Network and System Security - 10th International Conference, 2016

Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
Secur. Commun. Networks, 2015

An improved preimage attack against HAVAL-3.
Inf. Process. Lett., 2015

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015

2014
Parallelizable MAC revisited.
Secur. Commun. Networks, 2014

Security analysis of GCM for communication.
Secur. Commun. Networks, 2014

Differential attack on nine rounds of the SEED block cipher.
Inf. Process. Lett., 2014

2013
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions".
IEEE Commun. Lett., 2013

Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

2012
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis.
IACR Cryptol. ePrint Arch., 2012

2011
MASHA - Low Cost Authentication with a New Stream Cipher.
Proceedings of the Information Security, 14th International Conference, 2011

Cryptanalysis of the full CHAIN cipher.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Side-Channel Analysis of the K2 Stream Cipher.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Partial decryption attacks in security-mediated certificateless encryption.
IET Inf. Secur., 2009

Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
On the Security of an Identity-Based Aggregate Signature Scheme.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Certificateless Ring Signatures.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of Some Proxy Signature Schemes Without Certificates.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Linkability of Some Blind Signature Schemes.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Security Mediated Certificateless Signatures.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
An Efficient Certificateless Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006


  Loading...