Kam-Pui Chow

Orcid: 0000-0003-4552-9744

According to our database1, Kam-Pui Chow authored at least 133 papers between 1996 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective.
ACM Comput. Surv., March, 2025

2023
Analyzing the peeling chain patterns on the Bitcoin blockchain.
Forensic Sci. Int. Digit. Investig., October, 2023

Process Mining with Programmable Logic Controller Memory States.
Proceedings of the Ubiquitous Security, 2023

A Dynamic Malicious Document Detection Method Based on Multi-Memory Features.
Proceedings of the Advances in Digital Forensics XIX, 2023

Traceable Transformer-Based Anomaly Detection for a Water Treatment System.
Proceedings of the Advances in Digital Forensics XIX, 2023

Noise Based Deepfake Detection via Multi-Head Relative-Interaction.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Deepfake noise investigation and detection.
Digit. Investig., 2022

Sensitivity analysis for a Bitcoin simulation model.
Digit. Investig., 2022

Deepfake Detection: A Comprehensive Study from the Reliability Perspective.
CoRR, 2022

Deep Convolutional Pooling Transformer for Deepfake Detection.
CoRR, 2022

Community Detection in a Web Discussion Forum During Social Unrest Events.
Proceedings of the Advances in Digital Forensics XVIII, 2022

Analyzing the Error Rates of Bitcoin Clustering Heuristics.
Proceedings of the Advances in Digital Forensics XVIII, 2022

2021
Predicting the Locations of Unrest Using Social Media.
Proceedings of the Advances in Digital Forensics XVII, 2021

Detecting Malicious PDF Documents Using Semi-Supervised Machine Learning.
Proceedings of the Advances in Digital Forensics XVII, 2021

Detecting Anomalous Programmable Logic Controller Events Using Process Mining.
Proceedings of the Critical Infrastructure Protection XV, 2021

Security Analysis of Software Updates for Industrial Robots.
Proceedings of the Critical Infrastructure Protection XV, 2021

Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach.
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021

2020
COVID-19 Sensing: Negative Sentiment Analysis on Social Media in China via BERT Model.
IEEE Access, 2020

Time and Location Topic Model for analyzing Lihkg forum data.
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020

Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines.
Proceedings of the Advances in Digital Forensics XVI, 2020

Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition.
Proceedings of the Advances in Digital Forensics XVI, 2020

Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning.
Proceedings of the Advances in Digital Forensics XVI, 2020

Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors.
Proceedings of the Advances in Digital Forensics XVI, 2020

Forensic Investigation of A Hacked Industrial Robot.
Proceedings of the Critical Infrastructure Protection XIV, 2020

2019
Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Detecting Anomalies in Programmable Logic Controllers Using Unsupervised Machine Learning.
Proceedings of the Advances in Digital Forensics XV, 2019

An Incident Response Model for Industrial Control System Forensics Based on Historical Events.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Defining Attack Patterns for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XIII, 2019

2018
The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security.
Secur. Priv., 2018

Fraud Track on Secure Electronic Check System.
Int. J. Digit. Crime Forensics, 2018

A Framework for Dark Web Threat Intelligence Analysis.
Int. J. Digit. Crime Forensics, 2018

Forensic-Aware Anti-DDoS Device.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

A Forensic Logging System for Siemens Programmable Logic Controllers.
Proceedings of the Advances in Digital Forensics XIV, 2018

Measuring Evidential Weight in Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics XIV, 2018

Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers.
Proceedings of the Advances in Digital Forensics XIV, 2018

2017
Extended abstract: Anti-DDoS technique using self-learning bloom filter.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Detecting Anomalous Programmable Logic Controller Events Using Machine Learning.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Threat Analysis of an Elevator Control System.
Proceedings of the Critical Infrastructure Protection XI, 2017

Detecting anomalous behavior of PLC using semi-supervised machine learning.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone.
Proceedings of the Mobile Security and Privacy, 2017

2016
Recovery of heavily fragmented JPEG files.
Digit. Investig., 2016

The Cloud Storage Ecosystem - A New Business Model for Internet Piracy?
Proceedings of the Advances in Digital Forensics XII, 2016

Profiling Flash Mob Organizers in Web Discussion Forums.
Proceedings of the Advances in Digital Forensics XII, 2016

Forensic Analysis of a Siemens Programmable Logic Controller.
Proceedings of the Critical Infrastructure Protection X, 2016

Interest Profiling for Security Monitoring and Forensic Investigation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
PLC Forensics Based on Control Program Logic Change Detection.
J. Digit. Forensics Secur. Law, 2015

Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis.
J. Digit. Forensics Secur. Law, 2015

LCCT: A Semi-supervised Model for Sentiment Classification.
Proceedings of the NAACL HLT 2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, USA, May 31, 2015

An Information Extraction Framework for Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics XI, 2015

A Privacy-Preserving Encryption Scheme for an Internet Realname Registration System.
Proceedings of the Advances in Digital Forensics XI, 2015

Fragmented JPEG File Recovery Using Pseudo Headers.
Proceedings of the Advances in Digital Forensics XI, 2015

Profiling and Tracking a Cyberlocker Link Sharer in a Public Web Forum.
Proceedings of the Advances in Digital Forensics XI, 2015

Cyber Attacks and Political Events: The Case of the Occupy Central Campaign.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
Modeling the initial stage of a file sharing process on a BitTorrent network.
Peer-to-Peer Netw. Appl., 2014

Understanding Computer Forensics Requirements in China Via The "Panda Burning Incense" Virus Case.
J. Digit. Forensics Secur. Law, 2014

Authorship Attribution for Forensic Investigation with Thousands of Authors.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Validation Rules for Enhanced Foxy P2P Network Investigations.
Proceedings of the Advances in Digital Forensics X, 2014

Web User Profiling Based on Browsing Behavior Analysis.
Proceedings of the Advances in Digital Forensics X, 2014

An Exploratory Profiling Study of Online Auction Fraudsters.
Proceedings of the Advances in Digital Forensics X, 2014

Learning Domain-specific Sentiment Lexicon with Supervised Sentiment-aware LDA.
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014

A bayesian belief network for data leakage investigation.
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

A Topic Model for Building Fine-grained Domain-specific Emotion Lexicon.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013

Unknown Chinese word extraction based on variety of overlapping strings.
Inf. Process. Manag., 2013

Photo Forensics on Shanzhai Mobile Phone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

The next generation for the forensic extraction of electronic evidence from mobile telephones.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

Quantification of digital forensic hypotheses using probability theory.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

A Three-Dimensional Evaluation Model for Network Management System.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Generic Bayesian Belief Model for Similar Cyber Crimes.
Proceedings of the Advances in Digital Forensics IX, 2013

An Empirical Study Profiling Internet Pirates.
Proceedings of the Advances in Digital Forensics IX, 2013

Towards a Better Similarity Measure for Keyword Profiling via Clustering.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Reasoning about Evidence using Bayesian Networks.
Proceedings of the Advances in Digital Forensics VIII, 2012

Validation of Rules Used in Foxy Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics VIII, 2012

Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.
Proceedings of the Advances in Digital Forensics VIII, 2012

2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
J. Zhejiang Univ. Sci. C, 2011

Protecting Digital Data Privacy in Computer Forensic Examination.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Sockpuppet Detection in Online Discussion Forums.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Development of Domestic and International Computer Forensics.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Automatic Online Monitoring and Data-Mining Internet Forums.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2010
Forensic Investigation of Peer-to-Peer Networks.
Proceedings of the Handbook of Research on Computational Forensics, 2010

New Differential Cryptanalytic Results for Reduced-Round CAST-128.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Forensic Analysis of Popular Chinese Internet Applications.
Proceedings of the Advances in Digital Forensics VI, 2010

An Analysis of the Green Dam Youth Escort Software.
Proceedings of the Advances in Digital Forensics VI, 2010

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics.
Proceedings of the Advances in Digital Forensics VI, 2010

Evaluation of Evidence in Internet Auction Fraud Investigations.
Proceedings of the Advances in Digital Forensics VI, 2010

Identifying First Seeders in Foxy Peer-to-Peer Networks.
Proceedings of the Advances in Digital Forensics VI, 2010

Security Issues and Challenges for Cyber Physical System.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

A Complexity Based Model for Quantifying Forensic Evidential Probabilities.
Proceedings of the ARES 2010, 2010

2009
A Cost-Effective Model for Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

Analysis of the Digital Evidence Presented in the Yahoo! Case.
Proceedings of the Advances in Digital Forensics V, 2009

A Model for Foxy Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Automatic 3D face texture mapping framework from single image.
Proceedings of the First International Conference on Internet Multimedia Computing and Service, 2009

Super-Resolution of Faces Using Texture Mapping on a Generic 3D Model.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

A Host-Based Approach to BotNet Investigation?
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

2008
Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Reasoning About Evidence Using Bayesian Networks.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme.
Int. J. Netw. Secur., 2007

Watershed segmentation with boundary curvature ratio based merging criterion.
Proceedings of the Signal and Image Processing (SIP 2007), 2007

The Rules of Time on NTFS File System.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

A Hybrid Approach for Authenticating MPEG-2 Streaming Data.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).
Proceedings of the Information Security Practice and Experience, 2007

Object-Based Surveillance Video Retrieval System with Real-Time Indexing Methodology.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007

Consistency Issue on Live Systems Forensics.
Proceedings of the Future Generation Communication and Networking, 2007

Improving Disk Sector Integrity Using 3-dimension Hashing Scheme.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE J. Sel. Areas Commun., 2006

Practical electronic lotteries with offline TTP.
Comput. Commun., 2006

Real-time Multiple Head Shape Detection and Tracking System with Decentralized Trackers.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
A generic anti-spyware solution by access control list at kernel level.
J. Syst. Softw., 2005

Forward-secure multisignature and blind signature schemes.
Appl. Math. Comput., 2005

An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Digital Evidence Search Kit.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Efficient Block-based Motion Segmentation Method using Motion Vector Consistency.
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2005), 2005

An e-Lottery Scheme Using Verifiable Random Function.
Proceedings of the Computational Science and Its Applications, 2005

Dynamic Integrity Verification for Software Self-defense.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
Separable and Anonymous Identity-Based Key Issuing.
IACR Cryptol. ePrint Arch., 2004

Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2004

IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Secure Hierarchical Identity Based Signature and Its Application.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Risk Management of Corporate Confidential Information in Digital Form.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Tuning the Collision Test for Power.
Proceedings of the Computer Science 2004, 2004

2003
A Secure Modified ID-Based Undeniable Signature Scheme.
IACR Cryptol. ePrint Arch., 2003

Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003

2001
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers.
Inf. Process. Lett., 2001

2000
Security of Tseng-Jan's group signature schemes.
Inf. Process. Lett., 2000

Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Proceedings of the Public Key Cryptography, 2000

1997
Airport Counter Allocation Using Constraint Logic Programming.
Proceedings of the Third International Conference on the Practical Application of Constraint Technology, 1997

1996
The Telephone Directory Enquiry System of Hong Kong.
Proceedings of the 3rd Asia-Pacific Software Engineering Conference (APSEC '96), 1996


  Loading...