Raphael C.-W. Phan
Orcid: 0000-0001-7448-4595Affiliations:
- Monash University, Malaysia
- Multimedia University, Malaysia (2012-2019)
- Loughborough University, UK (2008-2012)
- Swiss Federal Institute of Technology in Lausanne (EPFL), Switzerland (2007-2008)
- Swinburne University of Technology, Sarawak Campus, Malaysia (2001-2007)
According to our database1,
Raphael C.-W. Phan
authored at least 244 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Mach. Learn. Cybern., May, 2024
Graph Autoencoders for Embedding Learning in Brain Networks and Major Depressive Disorder Identification.
IEEE J. Biomed. Health Informatics, March, 2024
ASF-YOLO: A novel YOLO model with attentional scale sequence fusion for cell instance segmentation.
Image Vis. Comput., 2024
Variational Potential Flow: A Novel Probabilistic Framework for Energy-Based Generative Modelling.
CoRR, 2024
CoRR, 2024
A Multimodal Feature Distillation with CNN-Transformer Network for Brain Tumor Segmentation with Incomplete Modalities.
CoRR, 2024
ActNetFormer: Transformer-ResNet Hybrid Method for Semi-Supervised Action Recognition in Videos.
CoRR, 2024
Dynamic MRI reconstruction using low-rank plus sparse decomposition with smoothness regularization.
CoRR, 2024
CAFCT: Contextual and Attentional Feature Fusions of Convolutional Neural Networks and Transformer for Liver Tumor Segmentation.
CoRR, 2024
Proceedings of the 2nd International Workshop on Networked AI Systems, 2024
BGF-YOLO: Enhanced YOLOv8 with Multiscale Attentional Feature Fusion for Brain Tumor Detection.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024
fMRI Functional Connectivity Augmentation Using Convolutional Generative Adversarial Networks for Brain Disorder Classification.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024
Video Deception Detection through the Fusion of Multimodal Feature Extraction and Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2024
A Deep Probabilistic Spatiotemporal Framework for Dynamic Graph Representation Learning with Application to Brain Disorder Identification.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
BrainFC-CGAN: A Conditional Generative Adversarial Network for Brain Functional Connectivity Augmentation and Aging Synthesis.
Proceedings of the IEEE International Conference on Acoustics, 2024
2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128.
J. Cryptogr. Eng., September, 2023
IEEE Trans. Inf. Forensics Secur., 2023
CST-YOLO: A Novel Method for Blood Cell Detection Based on Improved YOLOv7 and CNN-Swin Transformer.
CoRR, 2023
RADIFUSION: A multi-radiomics deep learning based breast cancer risk prediction model using sequential mammographic images with image attention and bilateral asymmetry refinement.
CoRR, 2023
A Deep Probabilistic Spatiotemporal Framework for Dynamic Graph Representation Learning with Application to Brain Disorder Identification.
CoRR, 2023
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Cross-domain Transfer Learning and State Inference for Soft Robots via a Semi-supervised Sequential Variational Bayes Framework.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023
Proceedings of the 52nd International Conference on Parallel Processing, 2023
A Unified Framework for Static and Dynamic Functional Connectivity Augmentation for Multi-Domain Brain Disorder Classification.
Proceedings of the IEEE International Conference on Image Processing, 2023
USURP: Universal Single-Source Adversarial Perturbations on Multimodal Emotion Recognition.
Proceedings of the IEEE International Conference on Image Processing, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
$\mathrm{C}\eta\iota \text{DAE}$: Cryptographically Distinguishing Autoencoder for Cipher Cryptanalysis.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
ELEGANT: End-to-end Language Grounded Speech Denoiser for Efficient Generation of Talking Face.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
2022
WIREs Data Mining Knowl. Discov., 2022
Invisible emotion magnification algorithm (IEMA) for real-time micro-expression recognition with graph-based features.
Multim. Tools Appl., 2022
A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities.
Neurocomputing, 2022
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022
Graph-Regularized Manifold-Aware Conditional Wasserstein GAN for Brain Functional Connectivity Generation.
CoRR, 2022
Transferable Class-Modelling for Decentralized Source Attribution of GAN-Generated Images.
CoRR, 2022
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022
Guess-It-Generator: Generating in a Lewis Signaling Framework through Logical Reasoning.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Graph Autoencoder-Based Embedded Learning in Dynamic Brain Networks for Autism Spectrum Disorder Identification.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
AdverFacial: Privacy-Preserving Universal Adversarial Perturbation Against Facial Micro-Expression Leakages.
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the 30th European Signal Processing Conference, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Graph Autoencoders for Embedding Learning in Brain Networks and Major Depressive Disorder Identification.
CoRR, 2021
Synthesize-It-Classifier: Learning a Generative Classifier through RecurrentSelf-analysis.
CoRR, 2021
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD.
IEEE Access, 2021
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
Synthesize-It-Classifier: Learning a Generative Classifier Through Recurrent Self-Analysis.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
2020
Multim. Tools Appl., 2020
J. Imaging, 2020
J. Inf. Secur. Appl., 2020
IEEE Internet Things J., 2020
Seeing the Invisible: Survey of Video Motion Magnification and Small Motion Analysis.
ACM Comput. Surv., 2020
Appl. Soft Comput., 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU.
IEEE Internet Things J., 2019
Terabit encryption in a second: Performance evaluation of block ciphers in GPU with Kepler, Maxwell, and Pascal architectures.
Concurr. Comput. Pract. Exp., 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
2018
J. Signal Process. Syst., 2018
Signal Process. Image Commun., 2018
A Survey of Automatic Facial Micro-expression Analysis: Databases, Methods and Challenges.
CoRR, 2018
IEEE Access, 2018
Micro-Expression Motion Magnification: Global Lagrangian vs. Local Eulerian Approaches.
Proceedings of the 13th IEEE International Conference on Automatic Face & Gesture Recognition, 2018
Enriched Long-Term Recurrent Convolutional Network for Facial Micro-Expression Recognition.
Proceedings of the 13th IEEE International Conference on Automatic Face & Gesture Recognition, 2018
2017
IEEE Trans. Circuits Syst. Video Technol., 2017
IEEE Trans. Affect. Comput., 2017
Multim. Tools Appl., 2017
Higher order differentiation over finite fields with applications to generalising the cube attack.
Des. Codes Cryptogr., 2017
Commentary on "A block chaotic image encryption scheme based on self-adaptive modelling" [Applied Soft Computing 22 (2014) 351-357].
Appl. Soft Comput., 2017
Multimodal decomposition with magnification on micro-expressions and its impact on facial biometric recognition.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017
2016
Wirel. Pers. Commun., 2016
Signal Process. Image Commun., 2016
On the effective subkey space of some image encryption algorithms using external key.
J. Vis. Commun. Image Represent., 2016
J. Vis. Commun. Image Represent., 2016
CoRR, 2016
Clust. Comput., 2016
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme.
Cryptogr. Commun., 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016
Proceedings of the Computer Vision - ACCV 2016 Workshops, 2016
2015
Secur. Commun. Networks, 2015
Int. J. Comput. Math., 2015
IACR Cryptol. ePrint Arch., 2015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015
2014
Information Security and Cryptography, Springer, ISBN: 978-3-662-44757-4, 2014
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification.
IEEE J. Biomed. Health Informatics, 2014
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud.
IEEE Trans. Dependable Secur. Comput., 2014
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2014
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014
A new spontaneous expression database and a study of classification-based expression analysis methods.
Proceedings of the 22nd European Signal Processing Conference, 2014
A Privacy-Preserving and Cheat-Resilient electricity consumption reporting Scheme for smart grids.
Proceedings of the International Conference on Computer, 2014
LBP with Six Intersection Points: Reducing Redundant Information in LBP-TOP for Micro-expression Recognition.
Proceedings of the Computer Vision - ACCV 2014, 2014
Proceedings of the Computer Vision - ACCV 2014, 2014
Proceedings of the Computer Vision - ACCV 2014 Workshops, 2014
2013
Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis.
IEEE Trans. Affect. Comput., 2013
Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2013
Inf. Process. Lett., 2013
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester.
Int. J. Comput. Math., 2013
Cryptogr. Commun., 2013
Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
Wirel. Pers. Commun., 2012
Secur. Commun. Networks, 2012
J. Internet Serv. Appl., 2012
A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR.
EURASIP J. Wirel. Commun. Netw., 2012
Proceedings of the 2012 Wireless Telecommunications Symposium, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Sequences and Their Applications - SETA 2012, 2012
Maximise unsafe path routing protocol for forest fire monitoring system using Wireless Sensor Networks.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Wirel. Pers. Commun., 2011
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents.
Wirel. Pers. Commun., 2011
Wirel. Networks, 2011
IEEE Trans. Very Large Scale Integr. Syst., 2011
On the security of ownership watermarking of digital images based on singular value decomposition.
J. Electronic Imaging, 2011
On the cryptanalysis of the hash function Fugue: Partitioning and inside-out distinguishers.
Inf. Process. Lett., 2011
Des. Codes Cryptogr., 2011
DDoS attacks traffic and Flash Crowds traffic simulation with a hardware test center platform.
Proceedings of the 2011 World Congress on Internet Security, 2011
Proceedings of the Advances in Image and Video Technology - 5th Pacific Rim Symposium, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
Proceedings of the Advances in Computer Science and Information Technology, 2010
Security Models for Heterogeneous Networking.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Open Research Problems in Network Security, 2010
Proceedings of the Open Research Problems in Network Security, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010
Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the Guide to Wireless Sensor Networks, 2009
IEEE Trans. Dependable Secur. Comput., 2009
Comput. Stand. Interfaces, 2009
Review of Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson.
Cryptologia, 2009
Cryptologia, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols.
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Security of Two Recent Constant-Round Password Authenticated Group Key Exchange Schemes.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Proceedings of the Progress in Cryptology, 2009
2008
Pattern Recognit., 2008
Comput. Stand. Interfaces, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008
Proceedings of the Progress in Cryptology, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Comput. Stand. Interfaces, 2007
Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks.
Comput. Stand. Interfaces, 2007
On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.
Proceedings of the Information Security Applications, 8th International Workshop, 2007
On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Proceedings of the Provable Security, 2007
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.
Proceedings of the Provable Security, 2007
(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Proceedings of the Information Security and Cryptology, 2007
Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection.
Proceedings of the Computational Science and Its Applications, 2007
2006
Comput. Secur., 2006
Comput. Secur., 2006
Comput. Commun., 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IEEE Commun. Lett., 2005
Security limitations of an authorized anonymous ID-based scheme for mobile communication.
IEEE Commun. Mag., 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Information Security, 8th International Conference, 2005
On the Security Bounds of CMC, EME, EME<sup>+</sup> and EME<sup>*</sup> Modes of Operation.
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Computational Science and Its Applications, 2005
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.
Proceedings of the Computational Science and Its Applications, 2005
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
On the Insecurity of the Microsoft Research Conference Management Tool (MSRCMT) System.
Proceedings of the 4th International Conference on IT in Asia, 2005
On the Security of a Pay-TV Scheme of ICON 2001.
Proceedings of the 4th International Conference on IT in Asia, 2005
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme.
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Further attacks and comments on 'security of two remote user authentication schemes using smart cards'.
IEEE Trans. Consumer Electron., 2004
Inf. Process. Lett., 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Topics in Cryptology, 2004
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Attacks on ATM Authentication Protocols Proposed at WEC2002.
Proceedings of the 3th International Conference on IT in Asia, 2003
2002
Cryptologia, 2002
Cryptologia, 2002
Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks.
Proceedings of the Information Security and Cryptology, 2002