Siu-Ming Yiu
Orcid: 0000-0002-3975-8500Affiliations:
- University of Hong Kong
According to our database1,
Siu-Ming Yiu
authored at least 444 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on csis.hku.hk
On csauthors.net:
Bibliography
2024
PPCT: Privacy-Preserving Contact Tracing Using Concise Private Set Intersection Cardinality.
J. Netw. Syst. Manag., October, 2024
Self-Adaptive Incremental PCA-Based DBSCAN of Acoustic Features for Anomalous Sound Detection.
SN Comput. Sci., June, 2024
Expert Syst. Appl., March, 2024
FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records.
IEEE Trans. Inf. Forensics Secur., 2024
Neurocomputing, 2024
FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion.
IACR Cryptol. ePrint Arch., 2024
Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Lattice-Based Succinct Mercurial Functional Commitment for Circuits: Definitions and Constructions.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
RABAEKS: Revocable Attribute-based Authenticated Encrypted Search over Lattice for Multi-receiver Cloud Storage.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.
Expert Syst. Appl., 2024
TUBench: Benchmarking Large Vision-Language Models on Trustworthiness with Unanswerable Questions.
CoRR, 2024
CoRR, 2024
GPFL: A Gradient Projection-Based Client Selection Framework for Efficient Federated Learning.
CoRR, 2024
Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement.
CoRR, 2024
IACR Commun. Cryptol., 2024
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Industry Track, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation.
Pattern Recognit., November, 2023
Forensic Sci. Int. Digit. Investig., October, 2023
IEEE Trans. Big Data, April, 2023
Future Gener. Comput. Syst., April, 2023
Comput. J., February, 2023
IEEE Trans. Serv. Comput., 2023
Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain.
IEEE Trans. Ind. Informatics, 2023
IEEE Trans. Inf. Forensics Secur., 2023
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2023
Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications.
IACR Cryptol. ePrint Arch., 2023
Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation.
CoRR, 2023
Proceedings of the ACM Web Conference 2023, 2023
Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Ubiquitous Security, 2023
Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop, 2023
MTGL-ADMET: A Novel Multi-task Graph Learning Framework for ADMET Prediction Enhanced by Status-Theory and Maximum Flow.
Proceedings of the Research in Computational Molecular Biology, 2023
Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Proceedings of the International Conference on Machine Learning, 2023
Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Online Anomalous Subtrajectory Detection on Road Networks with Deep Reinforcement Learning.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
PivotFEC: Enhancing Few-shot Factual Error Correction with a Pivot Task Approach using Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks.
J. Internet Serv. Inf. Secur., 2022
IACR Cryptol. ePrint Arch., 2022
Comput. Stand. Interfaces, 2022
CoRR, 2022
MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
Proceedings of the 2022 SIAM International Conference on Data Mining, 2022
Proceedings of the Advances in Digital Forensics XVIII, 2022
Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Metric-guided Distillation: Distilling Knowledge from the Metric to Ranker and Retriever for Generative Commonsense Reasoning.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Controllable Dictionary Example Generation: Generating Example Sentences for Specific Targeted Audiences.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022
2021
Quant. Biol., December, 2021
Classifying encrypted traffic using adaptive fingerprints with multi-level attributes.
World Wide Web, 2021
Vis. Comput., 2021
A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2021
Mob. Networks Appl., 2021
Mob. Networks Appl., 2021
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.
J. Comput. Syst. Sci., 2021
Inf. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the Critical Infrastructure Protection XV, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Proceedings of the Federated Learning - Privacy and Incentive, 2020
IEEE Trans. Serv. Comput., 2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
J. Internet Serv. Inf. Secur., 2020
Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020
Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience.
IACR Cryptol. ePrint Arch., 2020
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model.
IACR Cryptol. ePrint Arch., 2020
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster.
IACR Cryptol. ePrint Arch., 2020
Future Gener. Comput. Syst., 2020
Optimal Procurement Auction for Cooperative Production of Virtual Products: Vickrey-Clarke-Groves Meet Cremer-McLean.
CoRR, 2020
Comput. Secur., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020
A Light-Weight Crowdsourcing Aggregation in Privacy-Preserving Federated Learning System.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Classification with Rejection: Scaling Generative Classifiers with Supervised Deep Infomax.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines.
Proceedings of the Advances in Digital Forensics XVI, 2020
Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning.
Proceedings of the Advances in Digital Forensics XVI, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
IEEE Trans. Veh. Technol., 2019
Nat. Lang. Eng., 2019
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
Detecting drug communities and predicting comprehensive drug-drug interactions via balance regularized semi-nonnegative matrix factorization.
J. Cheminformatics, 2019
Inf. Sci., 2019
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis.
IACR Cryptol. ePrint Arch., 2019
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2019
Frontiers Comput. Sci., 2019
Predicting combinative drug pairs via multiple classifier system with positive samples only.
Comput. Methods Programs Biomed., 2019
Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties.
Clust. Comput., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
An Incident Response Model for Industrial Control System Forensics Based on Historical Events.
Proceedings of the Critical Infrastructure Protection XIII, 2019
OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019
From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions.
Proceedings of the Codes, Cryptology and Information Security, 2019
2018
IEEE Trans. Netw. Serv. Manag., 2018
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating.
J. Netw. Comput. Appl., 2018
J. Comput. Secur., 2018
J. Comput. Biol., 2018
Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties.
Int. J. High Perform. Comput. Netw., 2018
Predicting and understanding comprehensive drug-drug interactions via semi-nonnegative matrix factorization.
BMC Syst. Biol., 2018
BMCMDA: a novel model for predicting human microbe-disease associations via binary matrix completion.
BMC Bioinform., 2018
TMFUF: a triple matrix factorization-based unified framework for predicting comprehensive drug-drug interactions of new drugs.
BMC Bioinform., 2018
A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
2017
Trans. Large Scale Data Knowl. Centered Syst., 2017
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems.
Secur. Commun. Networks, 2017
A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities.
Pervasive Mob. Comput., 2017
Int. J. Data Min. Bioinform., 2017
IACR Cryptol. ePrint Arch., 2017
Future Gener. Comput. Syst., 2017
Concurr. Comput. Pract. Exp., 2017
Predicting combinative drug pairs towards realistic screening via integrating heterogeneous features.
BMC Bioinform., 2017
rMFilter: acceleration of long read-based structure variation calling by chimeric read filtering.
Bioinform., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Knowledge Science, Engineering and Management, 2017
Predicting Comprehensive Drug-Drug Interactions for New Drugs via Triple Matrix Factorization.
Proceedings of the Bioinformatics and Biomedical Engineering, 2017
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Proceedings of the Information Security Practice and Experience, 2017
Identifying malware with HTTP content type inconsistency via header-payload comparison.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
Proceedings of the Information Science and Applications 2017, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017
Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Mobile Security and Privacy, 2017
2016
Encyclopedia of Algorithms, 2016
Secur. Commun. Networks, 2016
Neurocomputing, 2016
A multi-task learning model for malware classification with useful file access pattern from API call sequence.
CoRR, 2016
Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016
A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms.
IEEE Commun. Surv. Tutorials, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Bioinformatics Research and Applications - 12th International Symposium, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
LCM-DS: A novel approach of predicting drug-drug interactions for new drugs via Dempster-Shafer theory of evidence.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
BMC Bioinform., December, 2015
PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2015
IEEE ACM Trans. Comput. Biol. Bioinform., 2015
Proc. VLDB Endow., 2015
J. Comput. Biol., 2015
J. Bioinform. Comput. Biol., 2015
misFinder: identify mis-assemblies in an unbiased manner using reference and paired-end reads.
BMC Bioinform., 2015
BMC Bioinform., 2015
WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the Provable Security, 2015
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Bioinformatics Research and Applications - 11th International Symposium, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
SRP: A concise non-parametric similarity-rank-based model for predicting drug-target interactions.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015
2014
IEEE Trans. Computers, 2014
Secur. Commun. Networks, 2014
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Inf. Process., 2014
Peer-to-Peer Netw. Appl., 2014
IACR Cryptol. ePrint Arch., 2014
MetaCluster-TA: taxonomic annotation for metagenomic data based on assembly-assisted binning.
BMC Genom., 2014
Computational identification of protein binding sites on RNAs using high-throughput RNA structure-probing data.
Bioinform., 2014
Proceedings of the International Conference on Management of Data, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
A practical real-time authentication system with Identity Tracking based on mouse dynamics.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014
Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014
Predicting drug-target interaction for new drugs using enhanced similarity measures and super-target clustering<sup>1</sup>.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013
Theor. Comput. Sci., 2013
Proc. VLDB Endow., 2013
Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
IDBA-MT: <i>De Novo</i> Assembler for Metatranscriptomic Data Generated from Next-Generation Sequencing Technology.
J. Comput. Biol., 2013
Inf. Process. Manag., 2013
IEICE Trans. Inf. Syst., 2013
IACR Cryptol. ePrint Arch., 2013
SOAPfusion: a robust and effective computational fusion discovery tool for RNA-seq reads.
Bioinform., 2013
IDBA-tran: a more robust de novo de Bruijn graph assembler for transcriptomes with uneven expression levels.
Bioinform., 2013
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
Proceedings of the Pattern Recognition in Bioinformatics, 2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Bioinformatics Research and Applications, 9th International Symposium, 2013
Proceedings of the Bioinformatics Research and Applications, 9th International Symposium, 2013
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the International Conference on Connected Vehicles and Expo, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
Intra- and inter-sparse multiple output regression with application on environmental microbial community study.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013
PERGA: A Paired-End Read Guided De Novo Assembler for Extending Contigs Using SVM Approach.
Proceedings of the ACM Conference on Bioinformatics, 2013
2012
IEEE ACM Trans. Comput. Biol. Bioinform., 2012
An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence.
IEEE ACM Trans. Comput. Biol. Bioinform., 2012
J. Information Security, 2012
J. Comput. Biol., 2012
MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample.
Bioinform., 2012
IDBA-UD: a <i>de novo</i> assembler for single-cell and metagenomic sequencing data with highly uneven depth.
Bioinform., 2012
COPE: an accurate <i>k</i>-mer-based pair-end reads connection tool to facilitate genome assembly.
Bioinform., 2012
Bioinform., 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the Bioinformatics Research and Applications - 8th International Symposium, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples.
Proceedings of the ACM International Conference on Bioinformatics, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
J. Zhejiang Univ. Sci. C, 2011
J. Comput. Biol., 2011
IACR Cryptol. ePrint Arch., 2011
A robust and accurate binning algorithm for metagenomic sequences with arbitrary species abundance ratio.
Bioinform., 2011
Ad Hoc Networks, 2011
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
T-IDBA: A de novo Iterative de Bruijn Graph Assembler for Transcriptome - (Extended Abstract).
Proceedings of the Research in Computational Molecular Biology, 2011
Proceedings of the Algorithms and Computation - 22nd International Symposium, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
DMPFinder - Finding Differentiating Pathways with Gaps from Two Groups of Metabolic Networks.
Proceedings of the ISCA 3rd International Conference on Bioinformatics and Computational Biology, 2011
Proceedings of the ACM International Conference on Bioinformatics, 2011
Proceedings of the ACM International Conference on Bioinformatics, 2011
Proceedings of the Handbook of Research on Computational and Systems Biology, 2011
2010
Improving the accuracy of signal transduction pathway construction using level-2 neighbours.
Int. J. Bioinform. Res. Appl., 2010
IACR Cryptol. ePrint Arch., 2010
Unsupervised binning of environmental genomic fragments based on an error robust selection of <i>l</i>-mers.
BMC Bioinform., 2010
Proceedings of the Research in Computational Molecular Biology, 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the Bioinformatics Research and Applications, 6th International Symposium, 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Proceedings of the Biomedical Engineering Systems and Technologies, 2010
Structure Prediction of Simple Non-standard Pseudoknot.
Proceedings of the BIOINFORMATICS 2010, 2010
Investigation of the Lineage and Tissue Specificity of Genes.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2010
Predicting metabolic pathways from metabolic networks with limited biological knowledge.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2010
MetaCluster: unsupervised binning of environmental genomic fragments and taxonomic annotation.
Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, 2010
Proceedings of the Algorithmic Aspects in Information and Management, 2010
2009
J. Softw. Eng. Appl., 2009
J. Comput. Biol., 2009
J. Bioinform. Comput. Biol., 2009
Int. J. Bioinform. Res. Appl., 2009
IACR Cryptol. ePrint Arch., 2009
BMC Bioinform., 2009
ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks.
Ad Hoc Networks, 2009
Proceedings of the Algorithms in Bioinformatics, 9th International Workshop, 2009
Proceedings of the String Processing and Information Retrieval, 2009
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability.
Proceedings of the 2009 International Conference on Security & Management, 2009
A New Practical Scheme for Protecting Web Content.
Proceedings of the 2009 International Conference on Security & Management, 2009
A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the 2009 International Conference on Complex, 2009
Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers.
Proceedings of the Proceeding of the 3rd International Workshop on Data and Text Mining in Bioinformatics, 2009
Proceedings of the Bioinformatics and Computational Biology, 2009
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008
Finding Alternative Splicing Patterns with Strong Support from expressed Sequences on Individual exons/introns.
J. Bioinform. Comput. Biol., 2008
BMC Bioinform., 2008
MotifVoter: a novel ensemble method for fine-grained integration of generic motif finders.
Bioinform., 2008
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Seventh International Network Conference (INC 2008), 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
A Memory Efficient Algorithm for Structural Alignment of RNAs with Embedded Simple Pseudoknots.
Proceedings of the 6th Asia-Pacific Bioinformatics Conference, 2008
Proceedings of the 6th Asia-Pacific Bioinformatics Conference, 2008
2007
Int. J. Netw. Secur., 2007
Providing distributed certificate authority service in cluster-based mobile ad hoc networks.
Comput. Commun., 2007
Algorithmica, 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
The Point Placement Problem on a Line - Improved Bounds for Pairwise Distance Queries.
Proceedings of the Algorithms in Bioinformatics, 7th International Workshop, 2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Algorithms and Computation, 18th International Symposium, 2007
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard.
Proceedings of the 2007 International Conference on Security & Management, 2007
Proceedings of the Combinatorial Optimization and Applications, 2007
Finding Alternative Splicing Patterns with Strong Support From Expressed Sequences.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2007
2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE J. Sel. Areas Commun., 2006
J. Bioinform. Comput. Biol., 2006
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience.
Int. J. Netw. Secur., 2006
Sharing and access right delegation for confidential documents: A practical solution.
Inf. Manag., 2006
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006
An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006
Proceedings of 4th Asia-Pacific Bioinformatics Conference. 13-16 February 2006, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
IEEE Trans. Knowl. Data Eng., 2005
J. Syst. Softw., 2005
J. Comput. Biol., 2005
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
Dynamic Integrity Verification for Software Self-defense.
Proceedings of The 2005 International Conference on Security and Management, 2005
A model to support fine-grained delegation of authorization.
Proceedings of The 2005 International Conference on Security and Management, 2005
Allowing mismatches in anchors for wholw genome alignment: Generation and effectiveness.
Proceedings of 3rd Asia-Pacific Bioinformatics Conference, 17-21 January 2005, Singapore, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs).
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
2004
IEEE Trans. Knowl. Data Eng., 2004
Inf. Process. Lett., 2004
Int. J. Found. Comput. Sci., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Bioinform., 2004
Proceedings of the Web Information Systems, 2004
Finding motifs for insufficient number of sequences with strong binding to transcription facto.
Proceedings of the Eighth Annual International Conference on Computational Molecular Biology, 2004
Applying Forward Security and Threshold Cryptography in Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
The Delegation Problem and Practical PKI-Based Solutions.
Proceedings of the ICEIS 2004, 2004
Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004
Proceedings of the 2004 Data Compression Conference (DCC 2004), 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
A Mutation-Sensitive Approach for Locating Conserved Gene Pairs between Related Species.
Proceedings of the 4th IEEE International Symposium on BioInformatics and BioEngineering (BIBE 2004), 2004
Practical aspects of Compressed Suffix Arrays and FM-Index in Searching DNA Sequences.
Proceedings of the Sixth Workshop on Algorithm Engineering and Experiments and the First Workshop on Analytic Algorithmics and Combinatorics, 2004
2003
J. Syst. Softw., 2003
Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs.
J. Comput. Biol., 2003
Int. J. Distance Educ. Technol., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Algorithms and Computation, 14th International Symposium, 2003
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Eighth International Conference on Database Systems for Advanced Applications (DASFAA '03), 2003
2002
IEEE Trans. Syst. Man Cybern. Part C, 2002
Improved Phylogeny Comparisons: Non-Shared Edges Nearest Neighbor Interchanges, and Subtree Transfers
CoRR, 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002
2001
Indexing Attributes and Reordering Profiles for XML Document Filtering and Information Delivery.
Proceedings of the Advances in Web-Age Information Management, 2001
2000
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000
Proceedings of the Knowledge Discovery and Data Mining, 2000
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
1998
A Survey On Online Education.
Proceedings of WebNet 98, 1998
1996
1995
Proceedings of the 7th Canadian Conference on Computational Geometry, 1995
1994
Edge Guards on a Fortress.
Proceedings of the 6th Canadian Conference on Computational Geometry, 1994