SNR-Progressive Model With Harmonic Compensation for Low-SNR Speech Enhancement.
IEEE Signal Process. Lett., 2025
SNR-Progressive Model with Harmonic Compensation for Low-SNR Speech Enhancement.
CoRR, 2024
General Speech Restoration Using Two-Stage Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Acoustics, 2024
Local spectral attention for full-band speech enhancement.
CoRR, 2023
Attention does not guarantee best performance in speech enhancement.
CoRR, 2023
Convolutional Recurrent MetriCGAN With Spectral Dimension Compression For Full-Band Speech Enhancement.
Proceedings of the IEEE International Conference on Acoustics, 2023
TIM: Secure and usable authentication for smartphones.
J. Inf. Secur. Appl., 2022
A light-weight full-band speech enhancement model.
CoRR, 2022
A two-stage full-band speech enhancement model with effective spectral compression mapping.
CoRR, 2022
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations.
J. Comput. Secur., 2021
Blockchain-based public ecosystem for auditing security of software applications.
Computing, 2021
A Vehicle Message Scheduling Scheme For Vehicle Trust Management.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
Analysing performance issues of open-source intrusion detection systems in high-speed networks.
J. Inf. Secur. Appl., 2020
A Vehicle Transmission Scheduling Scheme for Supporting Vehicle Trust Management.
CoRR, 2020
BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Checking certificate revocation efficiently using certificate revocation guard.
J. Inf. Secur. Appl., 2019
Cybersecurity in industrial control systems: Issues, technologies, and challenges.
Comput. Networks, 2019
Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Evaluating network intrusion detection systems for high-speed networks.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017
Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
How Interface ID Allocation Mechanisms are Performed in IPv6.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014
Feature-matching and extended Kalman filter for stereo ego-motion estimation.
Proceedings of the 28th International Conference on Image and Vision Computing New Zealand, 2013
Survey of Proposed Use Cases for the IPv6 Flow Label.
RFC, June, 2011