Yang-Wai Chow

Orcid: 0000-0003-3348-7014

According to our database1, Yang-Wai Chow authored at least 67 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes.
Inf., February, 2024

Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review.
Comput., 2024

SBGMN: A Multi-view Sign Prediction Network for Bipartite Graphs.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
A Comprehensive Overview of IoT-Based Federated Learning: Focusing on Client Selection Methods.
Sensors, August, 2023

Visualization and Cybersecurity in the Metaverse: A Survey.
J. Imaging, January, 2023

PCSF: Privacy-Preserving Content-Based Spam Filter.
IEEE Trans. Inf. Forensics Secur., 2023

HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference.
Future Internet, 2023

TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Sarcasm Relation to Time: Sarcasm Detection with Temporal Features and Deep Learning.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023

2022
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns.
J. Imaging, December, 2022

Privacy-preserving file sharing on cloud storage with certificateless signcryption.
Theor. Comput. Sci., 2022

Functional Encryption for Pattern Matching with a Hidden String.
Cryptogr., 2022

Context-Driven Satire Detection With Deep Learning.
IEEE Access, 2022

TLS Goes Low Cost: When TLS Meets Edge.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Using Machine Learning for Detecting Timing Side-Channel Attacks in SDN.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

High Quality Audio Adversarial Examples Without Using Psychoacoustics.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Exploiting QR Code Error Correction for Digital Image Watermarking.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021

Pattern Matching over Encrypted Data with a Short Ciphertext.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

Trojan Attacks and Defense for Speech Recognition.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Targeted Universal Adversarial Perturbations for Automatic Speech Recognition.
Proceedings of the Information Security - 24th International Conference, 2021

Black-Box Audio Adversarial Example Generation Using Variational Autoencoder.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Proceedings of the Computer Security - ESORICS 2021, 2021

Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Interactive three-dimensional visualization of network intrusion detection data for machine learning.
Future Gener. Comput. Syst., 2020

2019
Subversion in Practice: How to Efficiently Undermine Signatures.
IEEE Access, 2019

Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof.
Proceedings of the Information Security Applications - 20th International Conference, 2019

QR Code Watermarking for Digital Images.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Dimensionality Reduction and Visualization of Network Intrusion Detection Data.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

CAPTCHA Design and Security Issues.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Cooperative Secret Sharing Using QR Codes and Symmetric Keys.
Symmetry, 2018

A Two-Stage Classifier Approach for Network Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2018

Metamorphic Testing of Navigation Software: A Pilot Study with Google Maps.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

A 3D Approach for the Visualization of Network Intrusion Detection Data.
Proceedings of the 2018 International Conference on Cyberworlds, 2018

2017
Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Covert QR Codes: How to Hide in the Crowd.
Proceedings of the Information Security Practice and Experience, 2017

Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2017

Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems.
Proceedings of the Applications and Techniques in Information Security, 2017

A QR Code Watermarking Approach Based on the DWT-DCT Technique.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Authentication and Transaction Verification Using QR Codes with a Mobile Device.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Protecting peer-to-peer-based massively multiplayer online games.
Int. J. Comput. Sci. Eng., 2015

Creating Simplified 3D Models with High Quality Textures.
Proceedings of the 2015 International Conference on Digital Image Computing: Techniques and Applications, 2015

2014
On the security of text-based 3D CAPTCHAs.
Comput. Secur., 2014

Self-Reported Gambling Problems and Digital Traces.
Cyberpsychology Behav. Soc. Netw., 2014

A CAPTCHA Scheme Based on the Identification of Character Locations.
Proceedings of the Information Security Practice and Experience, 2014

A Visual One-Time Password Authentication Scheme Using Mobile Devices.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2012
Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games.
Proceedings of the Network and System Security - 6th International Conference, 2012

Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family.
Proceedings of the Information Security Practice and Experience, 2012

Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Attacking Animated CAPTCHAs via Character Extraction.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Breaking an Animated CAPTCHA Scheme.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Breaking a 3D-Based CAPTCHA Scheme.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs.
Proceedings of the 2010 International Conference on CyberWorlds, 2010

STE3D-CAP: Stereoscopic 3D CAPTCHA.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2007
The Effects of HMD Attributes, Different Display and Scene Characteristics on Human Visual Perception of Region Warping Distortions.
Int. J. Virtual Real., 2007

2006
The region methodology for an address recalculation pipeline virtual reality system with priority rendering.
PhD thesis, 2006

Human visual perception of region warping distortions with different display and scene characteristics.
Proceedings of the 4th International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2006, Kuala Lumpur, Malaysia, November 29, 2006

Human visual perception of region warping distortions.
Proceedings of the Computer Science 2006, 2006

2005
Design issues in human visual perception experiments on region warping.
Proceedings of the AC 2005, 2005

A networked virtual environment communications model using priority updating.
Proceedings of the AC 2005, 2005

Region warping in a virtual reality system with priority rendering.
Proceedings of the AC 2005, 2005

Large Object Segmentation with Region Priority Rendering.
Proceedings of the Computer Science 2005, 2005


  Loading...