Yang-Wai Chow
Orcid: 0000-0003-3348-7014
According to our database1,
Yang-Wai Chow
authored at least 67 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes.
Inf., February, 2024
Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review.
Comput., 2024
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
A Comprehensive Overview of IoT-Based Federated Learning: Focusing on Client Selection Methods.
Sensors, August, 2023
J. Imaging, January, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Future Internet, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Sarcasm Relation to Time: Sarcasm Detection with Temporal Features and Deep Learning.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023
2022
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns.
J. Imaging, December, 2022
Theor. Comput. Sci., 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Proceedings of the Computer Security - ESORICS 2021, 2021
Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Interactive three-dimensional visualization of network intrusion detection data for machine learning.
Future Gener. Comput. Syst., 2020
2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Proceedings of the 2018 International Conference on Cyberworlds, 2018
2017
Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
Proceedings of the Information Security Practice and Experience, 2017
Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Int. J. Comput. Sci. Eng., 2015
Proceedings of the 2015 International Conference on Digital Image Computing: Techniques and Applications, 2015
2014
Cyberpsychology Behav. Soc. Netw., 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
2012
Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games.
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Information Security Practice and Experience, 2012
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
Proceedings of the 2010 International Conference on CyberWorlds, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2007
The Effects of HMD Attributes, Different Display and Scene Characteristics on Human Visual Perception of Region Warping Distortions.
Int. J. Virtual Real., 2007
2006
The region methodology for an address recalculation pipeline virtual reality system with priority rendering.
PhD thesis, 2006
Human visual perception of region warping distortions with different display and scene characteristics.
Proceedings of the 4th International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2006, Kuala Lumpur, Malaysia, November 29, 2006
Proceedings of the Computer Science 2006, 2006
2005
Design issues in human visual perception experiments on region warping.
Proceedings of the AC 2005, 2005
A networked virtual environment communications model using priority updating.
Proceedings of the AC 2005, 2005
Region warping in a virtual reality system with priority rendering.
Proceedings of the AC 2005, 2005
Proceedings of the Computer Science 2005, 2005