Kam-Pui Chow
Orcid: 0000-0003-4552-9744
According to our database1,
Kam-Pui Chow
authored at least 133 papers
between 1996 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.hku.hk
-
on orcid.org
-
on i.cs.hku.hk
On csauthors.net:
Bibliography
2025
ACM Comput. Surv., March, 2025
2023
Forensic Sci. Int. Digit. Investig., October, 2023
Proceedings of the Ubiquitous Security, 2023
Proceedings of the Advances in Digital Forensics XIX, 2023
Proceedings of the Advances in Digital Forensics XIX, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
CoRR, 2022
Proceedings of the Advances in Digital Forensics XVIII, 2022
Proceedings of the Advances in Digital Forensics XVIII, 2022
2021
Proceedings of the Advances in Digital Forensics XVII, 2021
Proceedings of the Advances in Digital Forensics XVII, 2021
Proceedings of the Critical Infrastructure Protection XV, 2021
Proceedings of the Critical Infrastructure Protection XV, 2021
Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach.
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021
2020
COVID-19 Sensing: Negative Sentiment Analysis on Social Media in China via BERT Model.
IEEE Access, 2020
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines.
Proceedings of the Advances in Digital Forensics XVI, 2020
Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition.
Proceedings of the Advances in Digital Forensics XVI, 2020
Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning.
Proceedings of the Advances in Digital Forensics XVI, 2020
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors.
Proceedings of the Advances in Digital Forensics XVI, 2020
Proceedings of the Critical Infrastructure Protection XIV, 2020
2019
Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Detecting Anomalies in Programmable Logic Controllers Using Unsupervised Machine Learning.
Proceedings of the Advances in Digital Forensics XV, 2019
An Incident Response Model for Industrial Control System Forensics Based on Historical Events.
Proceedings of the Critical Infrastructure Protection XIII, 2019
Proceedings of the Critical Infrastructure Protection XIII, 2019
2018
The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security.
Secur. Priv., 2018
Int. J. Digit. Crime Forensics, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
Proceedings of the Critical Infrastructure Protection XI, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the Mobile Security and Privacy, 2017
2016
Proceedings of the Advances in Digital Forensics XII, 2016
Proceedings of the Advances in Digital Forensics XII, 2016
Proceedings of the Critical Infrastructure Protection X, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
J. Digit. Forensics Secur. Law, 2015
J. Digit. Forensics Secur. Law, 2015
Proceedings of the NAACL HLT 2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, USA, May 31, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the Critical Infrastructure Protection IX, 2015
2014
Peer-to-Peer Netw. Appl., 2014
Understanding Computer Forensics Requirements in China Via The "Panda Burning Incense" Virus Case.
J. Digit. Forensics Secur. Law, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014
2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013
Inf. Process. Manag., 2013
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
The next generation for the forensic extraction of electronic evidence from mobile telephones.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
J. Zhejiang Univ. Sci. C, 2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
2010
Proceedings of the Handbook of Research on Computational Forensics, 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the Advances in Digital Forensics V, 2009
Proceedings of the Advances in Digital Forensics V, 2009
Proceedings of the Advances in Digital Forensics V, 2009
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
Proceedings of the First International Conference on Internet Multimedia Computing and Service, 2009
Proceedings of the Fifth International Conference on Image and Graphics, 2009
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009
2008
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
2007
Int. J. Netw. Secur., 2007
Watershed segmentation with boundary curvature ratio based merging criterion.
Proceedings of the Signal and Image Processing (SIP 2007), 2007
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).
Proceedings of the Information Security Practice and Experience, 2007
Object-Based Surveillance Video Retrieval System with Real-Time Indexing Methodology.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007
2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE J. Sel. Areas Commun., 2006
Real-time Multiple Head Shape Detection and Tracking System with Decentralized Trackers.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006
An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006
2005
J. Syst. Softw., 2005
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2005), 2005
Proceedings of the Computational Science and Its Applications, 2005
Dynamic Integrity Verification for Software Self-defense.
Proceedings of The 2005 International Conference on Security and Management, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
2003
IACR Cryptol. ePrint Arch., 2003
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003
2001
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers.
Inf. Process. Lett., 2001
2000
Proceedings of the Public Key Cryptography, 2000
1997
Airport Counter Allocation Using Constraint Logic Programming.
Proceedings of the Third International Conference on the Practical Application of Constraint Technology, 1997
1996
Proceedings of the 3rd Asia-Pacific Software Engineering Conference (APSEC '96), 1996