Wun-She Yap
Orcid: 0000-0002-0007-6174
According to our database1,
Wun-She Yap
authored at least 76 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform.
Clust. Comput., November, 2024
IEEE Trans. Games, September, 2024
Multim. Tools Appl., March, 2024
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map.
J. Inf. Secur. Appl., 2024
ARK: Adaptive Rotation Key Management for Fully Homomorphic Encryption Targeting Memory Efficient Deep Learning Inference.
IACR Cryptol. ePrint Arch., 2024
IMAML-IDCG: Optimization-based meta-learning with ImageNet feature reusing for few-shot invasive ductal carcinoma grading.
Expert Syst. Appl., 2024
Histopathological Cancer Detection Using Intra-Domain Transfer Learning and Ensemble Learning.
IEEE Access, 2024
PointADAM: Unsupervised Adversarial Domain Adaptation on Point Clouds With Metric Learning via Compact Feature Representation.
IEEE Access, 2024
Privacy-Preserving Detection of Helmet and Mask Wearing with Fully Homomorphic Encryption: Towards a Secure Inference Approach.
Proceedings of the 8th IEEE Forum on Research and Technologies for Society and Industry Innovation, 2024
Proceedings of the Advanced Intelligent Computing in Bioinformatics, 2024
2023
KaratSaber: New Speed Records for Saber Polynomial Multiplication Using Efficient Karatsuba FPGA Architecture.
IEEE Trans. Computers, July, 2023
Digit. Commun. Networks, February, 2023
Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography.
IEEE Trans. Inf. Forensics Secur., 2023
A practical intrusion detection system based on denoising autoencoder and LightGBM classifier with improved detection performance.
J. Ambient Intell. Humaniz. Comput., 2023
Efficient Implementation of ACORN and AEGIS-128 Authenticated Encryption on GPU for Internet of Things.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023
2022
A contrast enhancement framework under uncontrolled environments based on just noticeable difference.
Signal Process. Image Commun., 2022
The development of skin lesion detection application in smart handheld devices using deep neural networks.
Multim. Tools Appl., 2022
J. Intell. Fuzzy Syst., 2022
J. Inf. Secur. Appl., 2022
A Study on the Effect of Video Resolution on the Quality of Sound Recovered using the Visual Microphone.
Proceedings of the IVSP 2022: 4th International Conference on Image, Video and Signal Processing, Singapore, March 18, 2022
Proceedings of the ICDSP 2022: 6th International Conference on Digital Signal Processing, Chengdu, China, February 25, 2022
Proceedings of the ICDSP 2022: 6th International Conference on Digital Signal Processing, Chengdu, China, February 25, 2022
Proceedings of the ICCAI '22: 8th International Conference on Computing and Artificial Intelligence, Tianjin, China, March 18, 2022
2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA.
J. Supercomput., 2021
Accelerating number theoretic transform in GPU platform for fully homomorphic encryption.
J. Supercomput., 2021
Towards Better Performance for Protected Iris Biometric System with Confidence Matrix.
Symmetry, 2021
Proceedings of the Soft Computing in Data Science - 6th International Conference, 2021
2020
IEEE Trans. Very Large Scale Integr. Syst., 2020
Multim. Tools Appl., 2020
IEEE Internet Things J., 2020
2019
Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification.
Neural Networks, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the 8th International Conference on Software and Computer Applications, 2019
Determination of Computationally Efficient Multi-pool Model Fitting Approach for Pulsed Chemical Exchange Saturation Transfer MRI.
Proceedings of the ICBBS 2019: 8th International Conference on Bioinformatics and Biomedical Science, 2019
2018
Cancellable speech template via random binary orthogonal matrices projection hashing.
Pattern Recognit., 2018
J. Netw. Comput. Appl., 2018
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis.
IET Inf. Secur., 2018
Security analysis of M-DES and key-based coded permutation ciphers in wireless channels.
IET Commun., 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Convolutional Neural Network-Based Collaborative Filtering for Recommendation Systems.
Proceedings of the Robot Intelligence Technology and Applications, 2018
Hierarchical Attention Networks for Different Types of Documents with Smaller Size of Datasets.
Proceedings of the Robot Intelligence Technology and Applications, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018
2017
Improved Path Loss Simulation Incorporating Three-Dimensional Terrain Model Using Parallel Coprocessors.
Wirel. Commun. Mob. Comput., 2017
Pattern Recognit., 2017
Commentary on "A block chaotic image encryption scheme based on self-adaptive modelling" [Applied Soft Computing 22 (2014) 351-357].
Appl. Soft Comput., 2017
Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
2016
Wirel. Pers. Commun., 2016
On the effective subkey space of some image encryption algorithms using external key.
J. Vis. Commun. Image Represent., 2016
Inf. Process. Lett., 2016
Int. J. Commun. Syst., 2016
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
Secur. Commun. Networks, 2015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015
2014
Inf. Process. Lett., 2014
2013
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions".
IEEE Commun. Lett., 2013
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
IET Inf. Secur., 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006