Kwok-Yan Lam
Orcid: 0000-0001-7479-7970
According to our database1,
Kwok-Yan Lam
authored at least 276 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Secure and privacy-preserving sharing of personal health records with multi-party pre-authorization verification.
Wirel. Networks, August, 2024
Ad Hoc Networks, August, 2024
Dynamic Spectrum Optimization for Internet-of-Vehicles with Deep-Learning-Based Mobility Prediction.
Wirel. Pers. Commun., July, 2024
Wirel. Networks, July, 2024
Authentication and Key Agreement Based on Three Factors and PUF for UAV-Assisted Post-Disaster Emergency Communication.
IEEE Internet Things J., June, 2024
An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMT Data Protection With its Application to Pandemic Modeling.
IEEE Internet Things J., May, 2024
Device Scheduling and Assignment in Hierarchical Federated Learning for Internet of Things.
IEEE Internet Things J., May, 2024
ACM Comput. Surv., May, 2024
IEEE Internet Things J., April, 2024
Decentralized Multimedia Data Sharing in IoV: A Learning-Based Equilibrium of Supply and Demand.
IEEE Trans. Veh. Technol., March, 2024
ACM Comput. Surv., March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Phys. Commun., 2024
Comput. Stand. Interfaces, 2024
PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data.
CoRR, 2024
CoRR, 2024
Trustworthy, Responsible, and Safe AI: A Comprehensive Architectural Framework for AI Safety with Challenges and Mitigations.
CoRR, 2024
CoRR, 2024
Privacy-Aware Spectrum Pricing and Power Control Optimization for LEO Satellite Internet-of-Things.
CoRR, 2024
CoRR, 2024
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario.
CoRR, 2024
Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning.
CoRR, 2024
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Improving the Accuracy of Locally Differentially Private Community Detection by Order-consistent Data Perturbation.
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proactive Detection of Physical Inter-rule Vulnerabilities in IoT Services Using a Deep Learning Approach.
Proceedings of the IEEE International Conference on Web Services, 2024
Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-Based Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024
Mitigating Matthew Effect: Multi-Hypergraph Boosted Multi-Interest Self-Supervised Learning for Conversational Recommendation.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
UPDATE: Mining User-News Engagement Patterns for Dual-Target Cross-Domain Fake News Detection.
Proceedings of the 11th IEEE International Conference on Data Science and Advanced Analytics, 2024
2023
IEEE Trans. Commun., December, 2023
Enhancing Federated Learning With Spectrum Allocation Optimization and Device Selection.
IEEE/ACM Trans. Netw., October, 2023
Dynamic spectrum access for Internet-of-Things with hierarchical federated deep reinforcement learning.
Ad Hoc Networks, October, 2023
IEEE Internet Things J., July, 2023
Deep reinforcement learning based scheduling strategy for federated learning in sensor-cloud systems.
Future Gener. Comput. Syst., July, 2023
IEEE Trans. Big Data, April, 2023
Concurr. Comput. Pract. Exp., February, 2023
Wirel. Networks, 2023
Wirel. Networks, 2023
IEEE Trans. Multim., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Hybrid Framework of Reinforcement Learning and Convex Optimization for UAV-Based Autonomous Metaverse Data Collection.
IEEE Netw., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
FedPEAT: Convergence of Federated Learning, Parameter-Efficient Fine Tuning, and Emulator Assisted Tuning for Artificial Intelligence Foundation Models with Mobile Edge Computing.
CoRR, 2023
Efficient Dataset Distillation through Alignment with Smooth and High-Quality Expert Trajectories.
CoRR, 2023
User Assignment and Resource Allocation for Hierarchical Federated Learning over Wireless Networks.
CoRR, 2023
Spear or Shield: Leveraging Generative AI to Tackle Security Threats of Intelligent Network Services.
CoRR, 2023
CoRR, 2023
A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Proceedings of the Ubiquitous Security, 2023
Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email Attachments.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop, 2023
Privacy-Enhanced Knowledge Transfer with Collaborative Split Learning over Teacher Ensembles.
Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
SCME: A Self-contrastive Method for Data-Free and Query-Limited Model Extraction Attack.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the Third International Workshop on Artificial Intelligence and Intelligent Assistance for Legal Professionals in the Digital Workplace (LegalAIIA 2023) co-located with the 19th International Conference on Artificial Intelligence and Law (ICAIL 2023), 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
A Practical Intrusion Detection System Trained on Ambiguously Labeled Data for Enhancing IIoT Security.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
Separate-and-Aggregate: A Transformer-Based Patch Refinement Model for Knowledge Graph Completion.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
Dipping PLMs Sauce: Bridging Structure and Text for Effective Knowledge Graph Completion via Conditional Soft Prompting.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
2022
Distributed Deep Reinforcement Learning-Based Spectrum and Power Allocation for Heterogeneous Networks.
IEEE Trans. Wirel. Commun., 2022
Dynamic Spectrum Access for Internet-of-Things Based on Federated Deep Reinforcement Learning.
IEEE Trans. Veh. Technol., 2022
Secure Hot Path Crowdsourcing With Local Differential Privacy Under Fog Computing Architecture.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Cognitive Carrier Resource Optimization for Internet-of-Vehicles in 5G-Enhanced Smart Cities.
IEEE Netw., 2022
IEEE Internet Things J., 2022
Conditional Anonymous Authentication With Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles.
IEEE Internet Things J., 2022
ANT-Centric IoT Security Reference Architecture - Security-by-Design for Satellite-Enabled Smart Cities.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Secure Multi-Party Delegated Authorisation For Access and Sharing of Electronic Health Records.
CoRR, 2022
CoRR, 2022
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022
Edge-Cloud Cooperation for DNN Inference via Reinforcement Learning and Supervised Learning.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
A Multi-task Learning Approach for Predicting Intentions Using Smart Home IoT Services.
Proceedings of the Service-Oriented Computing - 20th International Conference, 2022
Resource Allocation and Resolution Control in the Metaverse with Mobile Augmented Reality.
Proceedings of the IEEE Global Communications Conference, 2022
Knowledge Is Flat: A Seq2Seq Generative Framework for Various Knowledge Graph Completion.
Proceedings of the 29th International Conference on Computational Linguistics, 2022
2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Serv. Comput., 2021
Reconfigurable Intelligent Surface Aided Power Control for Physical-Layer Broadcasting.
IEEE Trans. Commun., 2021
An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.
Sensors, 2021
Spectrum Sharing for 6G Integrated Satellite-Terrestrial Communication Networks Based on NOMA and CR.
IEEE Netw., 2021
IEEE Netw., 2021
Privacy-Preserving Federated Learning for UAV-Enabled Networks: Learning-Based Joint Scheduling and Resource Management.
IEEE J. Sel. Areas Commun., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Blockchain for the Internet of Vehicles Towards Intelligent Transportation Systems: A Survey.
IEEE Internet Things J., 2021
Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021
Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation.
CoRR, 2021
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021
Proceedings of the Security and Privacy in Social Networks and Big Data, 2021
UAV-Assisted 5G/6G Networks: Joint Scheduling and Resource Allocation Based on Asynchronous Reinforcement Learning.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Effective Anomaly Detection Model Training with only Unlabeled Data by Weakly Supervised Learning Techniques.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
2020
Spectral Efficiency Enhancement in Satellite Mobile Communications: A Game-Theoretical Approach.
IEEE Wirel. Commun., 2020
IEEE Trans. Knowl. Data Eng., 2020
IEEE Trans. Ind. Informatics, 2020
Spectrum Optimization for Satellite Communication Systems With Heterogeneous User Preferences.
IEEE Syst. J., 2020
Future Gener. Comput. Syst., 2020
Blockchain-Based Approach for Securing Spectrum Trading in Multibeam Satellite Systems.
CoRR, 2020
CoRR, 2020
Resource Allocation in Satellite-Based Internet of Things Using Pattern Search Method.
IEEE Access, 2020
An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020
Deep Reinforcement Learning Based Intelligent Reflecting Surface for Secure Wireless Communications.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
2019
Wirel. Networks, 2019
Improving Spectrum Management for Satellite Communication Systems With Hunger Marketing.
IEEE Wirel. Commun. Lett., 2019
Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019
Energy Efficiency Optimization for NOMA-Based Cognitive Radio With Energy Harvesting.
IEEE Access, 2019
Trading-Based Dynamic Spectrum Access and Allocation in Cognitive Internet of Things.
IEEE Access, 2019
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019
Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoT.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Beyond the Power of Mere Repetition: Forms of Social Communication on Twitter through the Lens of Information Flows and Its Effect on Topic Evolution.
Proceedings of the International Joint Conference on Neural Networks, 2019
Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 30th British Machine Vision Conference 2019, 2019
Proceedings of the Advanced Data Mining and Applications - 15th International Conference, 2019
Proceedings of the Advanced Data Mining and Applications - 15th International Conference, 2019
2018
Power allocation in cognitive radio networks over Rayleigh-fading channels with hybrid intelligent algorithms.
Wirel. Networks, 2018
Caching Efficiency Enhancement at Wireless Edges with Concerns on User's Quality of Experience.
Wirel. Commun. Mob. Comput., 2018
Joint Pricing and Power Allocation for Multibeam Satellite Systems With Dynamic Game Model.
IEEE Trans. Veh. Technol., 2018
Dynamic Spectrum Access Networks With Heterogeneous Users: How to Price the Spectrum?
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Commun., 2018
IEEE Trans. Circuits Syst. II Express Briefs, 2018
Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things.
Proc. IEEE, 2018
Mob. Networks Appl., 2018
IACR Cryptol. ePrint Arch., 2018
Complex., 2018
Spectrum Optimization for Cognitive Satellite Communications With Cournot Game Model.
IEEE Access, 2018
Spectrum Allocation With Asymmetric Monopoly Model for Multibeam-Based Cognitive Satellite Networks.
IEEE Access, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018
A Comparative Study of Transactional and Semantic Approaches for Predicting Cascades on Twitter.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018
2017
Proceedings of the 2017 International Conference on Embedded Computer Systems: Architectures, 2017
Proceedings of the 7th International Symposium on Embedded Computing and System Design, 2017
2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
2012
2011
Energy-Efficient Key Distribution Using Electrocardiograph Biometric Set for Secure Communications in Wireless Body Healthcare Networks.
J. Medical Syst., 2011
2010
BodySec: synchronized key distribution using biometric slots for wireless body sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010
IET Inf. Secur., 2010
IEICE Trans. Inf. Syst., 2010
Selection Policy of Rescue Servers Based on Workload Characterization of Flash Crowd.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010
2009
Int. J. Commun. Syst., 2009
MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem.
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions.
Proceedings of the First International Conference on Emerging Security Information, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams.
Proceedings of the 22nd International Conference on Data Engineering, 2006
2005
An ID-based multisignature scheme without reblocking and predetermined signing order.
Comput. Stand. Interfaces, 2005
Proceedings of the Internet and Network Economics, First International Workshop, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Enhancing the Scalability of the Community Authorization Service for Virtual Organizations.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Comput. Secur., 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files.
Proceedings of the Advances in Web-Based Learning, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.
Proceedings of the Applied Cryptography and Network Security, 2003
2002
Proceedings of the 10th International Workshop on Modeling, 2002
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002
2001
J. Cryptol., 2001
The Weight Distribution of C5(1, n).
Des. Codes Cryptogr., 2001
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
2000
IEEE Trans. Inf. Theory, 2000
A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q).
IEEE Trans. Inf. Theory, 2000
Proceedings of the Design and Applications of Intelligent Agents, 2000
Proceedings of the Electronic Commerce and Web Technologies, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields.
IEEE Trans. Inf. Theory, 1999
IEEE Trans. Inf. Theory, 1999
Fundam. Informaticae, 1999
Appl. Algebra Eng. Commun. Comput., 1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
Proceedings of the Public Key Cryptography, 1999
Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework.
Proceedings of the Mobile Data Access, First International Conference, 1999
Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Cooperative Information Agents III, Third International Workshop, 1999
Proceedings of the Advances in Cryptology, 1999
1998
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998
Proceedings of the Multi-Agent Systems: Theories, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996
Proceedings of the CCS '96, 1996
1995
J. Syst. Softw., 1995
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995
1993
Context-Dependent Access Control in Distributed Systems.
Proceedings of the Computer Security, 1993
1992
Proceedings of the Computer Security, 1992
Proceedings of the Computer Security, 1992
1991
ACM SIGOPS Oper. Syst. Rev., 1991