Brian King

Orcid: 0000-0002-5300-5564

According to our database1, Brian King authored at least 57 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Risk Analysis in Vehicle and Electric Scooter Interaction.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2024

Hot-Fixing Wake Word Recognition for End-to-End ASR Via Neural Model Reprogramming.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Data-driven Deep Reinforcement Learning for Automated Driving.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

2022
Responsible artificial intelligence in agriculture requires systemic understanding of risks and externalities.
Nat. Mach. Intell., 2022

Toward Fairness in Speech Recognition: Discovery and mitigation of performance disparities.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

2021
Investigation of Training Label Error Impact on RNN-T.
CoRR, 2021

2020
The Ontologies Community of Practice: A CGIAR Initiative for Big Data in Agrifood Systems.
Patterns, 2020

Training Algorithms to Read Complex Collections: Handwriting Classification for Improved HTR Models.
Proceedings of the 15th Annual International Conference of the Alliance of Digital Humanities Organizations, 2020

2019
A Method for Crash Prediction and Avoidance Using Hidden Markov Models.
Proceedings of the 2019 IEEE International Conference on Service Operations and Logistics, 2019

2018
A Hybrid Blockchain Ledger for Supply Chain Visibility.
Proceedings of the 17th International Symposium on Parallel and Distributed Computing, 2018

2017
A Distributed Ledger for Supply Chain Physical Distribution Visibility.
Inf., 2017

A Public-Key Approach of Selective Encryption for Images.
Int. J. Netw. Secur., 2017

A novel quality assessment for visual secret sharing schemes.
EURASIP J. Inf. Secur., 2017

On the Integration of Event-Based and Transaction-Based Architectures for Supply Chains.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Entrepreneurship in the Contemporary Tourism Ecosystem: The Case of Incoming Tour Operators in Taiwan.
Proceedings of the Information and Communication Technologies in Tourism 2017, 2017

2016
In-destination tour products and the disrupted tourism industry: progress and prospects.
J. Inf. Technol. Tour., 2016

2015
A Dynamic Threshold Decryption Scheme Using Bilinear Pairings.
Int. J. Netw. Secur., 2015

2013
Smart card fault attacks on elliptic curve cryptography.
Proceedings of the IEEE 56th International Midwest Symposium on Circuits and Systems, 2013

On Adversarial Policy Switching with Experiments in Real-Time Strategy Games.
Proceedings of the Twenty-Third International Conference on Automated Planning and Scheduling, 2013

2012
Embedded system for sensor communication and security.
IET Inf. Secur., 2012

Secure countermeasures to data aggregation attacks on sensor networks.
Proceedings of the 55th IEEE International Midwest Symposium on Circuits and Systems, 2012

Optimal cost function and magnitude power for NMF-based speech separation and music interpolation.
Proceedings of the IEEE International Workshop on Machine Learning for Signal Processing, 2012

Noise-robust dynamic time warping using PLCA features.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Quality assessment tests to be used in a wireless image sensor network.
Proceedings of the 2012 IEEE International Conference on Electro/Information Technology, 2012

2011
Single-Channel Source Separation Using Complex Matrix Factorization.
IEEE ACM Trans. Audio Speech Lang. Process., 2011

A pairing based cryptographic anonymous authentication scheme.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

2010
An Attack on Wavelet Tree Shuffling Encryption Schemes.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Single-channel source separation using simplified-training complex matrix factorization.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n).
Int. J. Netw. Secur., 2009

A Simple Encryption Scheme for Binary Elliptic Curves.
Proceedings of the Security Technology, 2009

An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
Security Requirements for RFID Computing Systems.
Int. J. Netw. Secur., 2008

Revisiting the Karnin, Greene and Hellman Bounds.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Hardware Organization to Achieve High-Speed Elliptic Curve Cryptography for Mobile Devices.
Mob. Networks Appl., 2007

An Anti-Counterfeiting RFID Privacy Protection Protocol.
J. Comput. Sci. Technol., 2007

Securing the Pharmaceutical Supply Chain using RFID.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

2006
Selective encryption for H.264/AVC video coding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Elliptic curves cryptosystem implementation based on a look-up table sharing scheme.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

A CRT-RSA Algorithm Secure against Hardware Fault Attacks.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2005
Efficient secure image transmission: compression integrated with encryption.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting.
Proceedings of the Information Security, 8th International Conference, 2005

Securing Abstention in an Electronic Legislature.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Anonymous Simple Secure M-Commerce Protocol.
Proceedings of the 2005 International Conference on Pervasive Systems and Computing, 2005

Modeling RFID Security.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

An Efficient Implementation of a Threshold RSA Signature Scheme.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
A Point Compression Method for Elliptic Curves Defined over GF(2 n).
Proceedings of the Public Key Cryptography, 2004

Improvements to the Point Halving Algorithm.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A Comment on Group Independent Threshold Sharing.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

2002
Verifiable Democracy a Protocol to Secure an Electronic Legislature.
Proceedings of the Electronic Government, First International Conference, 2002

Requirements for Group Independent Linear Threshold Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Improved Methods to Perform Threshold RSA.
Proceedings of the Advances in Cryptology, 2000

Algorithms to Speed Up Computations in Threshold RSA.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Verifiable Democracy.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

1998
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...