Skip to main content

previous disabled Page of 6
and
  1. Article

    Open Access

    Self-Adaptive Incremental PCA-Based DBSCAN of Acoustic Features for Anomalous Sound Detection

    In modern industry, maintaining continuous machine operations is important for improving production efficiency and reducing costs. Therefore, the smart technology of acoustic monitoring to detect anomalous mac...

    **ao Tan, Siu Ming Yiu in SN Computer Science (2024)

  2. No Access

    Chapter and Conference Paper

    Automatic EPS Calculation Guided Genetic Algorithm and Incremental PCA Based DBSCAN of Extracted Acoustic Features for Anomalous Sound Detection

    This paper focuses on automatic detection of anomalies in audio files. We introduce an automated unsupervised algorithm which integrates AEC-guided Genetic Algorithm and Incremental PCA and DBSCAN to detect th...

    **ao Tan, Siu Ming Yiu in Advanced Research in Technologies, Informa… (2024)

  3. No Access

    Chapter and Conference Paper

    Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model

    The exponential growth and widespread of fake news in online media have been causing unprecedented threats to the election result, public hygiene and justice. With ever-growing contents in online media, scruti...

    Cheuk Yu Ip, Fu Kay Frankie Li, Yi Anson Lam in Digital Forensics and Cyber Crime (2024)

  4. No Access

    Chapter and Conference Paper

    Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption

    Traceability, being the ability to access information of an item throughout its lifecycle, plays an important part in current supply chain, facilitating prompt response in case of incidents. In recent years, b...

    Tsz Ho Pun, Yi Jun He, Siu Ming Yiu in Ubiquitous Security (2024)

  5. No Access

    Chapter and Conference Paper

    SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE

    In recent years, distributed machine learning has garnered significant attention. However, privacy continues to be an unresolved issue within this field. Multi-key homomorphic encryption over torus (MKTFHE) is...

    Hongxiao Wang, Zoe L. Jiang, Yanmin Zhao, Siu-Ming Yiu in Mobile Internet Security (2024)

  6. No Access

    Chapter and Conference Paper

    Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

    Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessin...

    Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao in Information Security and Cryptology (2024)

  7. No Access

    Chapter and Conference Paper

    Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice

    Vector commitments (VC) and their variants attract a lot of attention due to their wide range of usage in applications such as blockchain and accumulator. Mercurial vector commitment (MVC), as one of the impor...

    Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao in Public-Key Cryptography – PKC 2024 (2024)

  8. No Access

    Chapter and Conference Paper

    Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation

    Lane detection is one of the fundamental technologies for autonomous driving, but it faces many security threats from adversarial attacks. Existing adversarial attacks against lane detection often simplify it ...

    Junbin Fang, Zewei Yang, Siyuan Dai, You Jiang in Pattern Recognition and Computer Vision (2024)

  9. No Access

    Chapter and Conference Paper

    MTGL-ADMET: A Novel Multi-task Graph Learning Framework for ADMET Prediction Enhanced by Status-Theory and Maximum Flow

    It is a vital step to evaluate drug-like compounds in terms of absorption, distribution, metabolism, excretion, and toxicity (ADMET) in drug design. Classical single-task learning based on abundant labels has ...

    Bing-Xue Du, Yi Xu, Siu-Ming Yiu, Hui Yu in Research in Computational Molecular Biology (2023)

  10. No Access

    Chapter and Conference Paper

    Asymmetric Group Message Franking: Definitions and Constructions

    As online group communication scenarios become more and more common these years, malicious or unpleasant messages are much easier to spread on the internet. Message franking is a crucial cryptographic mechanis...

    Junzuo Lai, Gongxian Zeng, Zhengan Huang in Advances in Cryptology – EUROCRYPT 2023 (2023)

  11. No Access

    Chapter and Conference Paper

    A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions

    A software watermarking scheme is to embed a “mark” or a message into a program in a cryptographic way. It is useful in proving ownership (e.g., in applications to digital rights management) and in authenticat...

    Yanmin Zhao, Yang Wang, Siu Ming Yiu, Yu Liu, Meiqin Wang in Security and Trust Management (2023)

  12. No Access

    Chapter and Conference Paper

    Detecting Anomalous Programmable Logic Controller Events Using Process Mining

    Programmable logic controllers that monitor and control industrial processes are attractive targets for cyber attackers. Although techniques and tools have been developed for detecting anomalous programmable l...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Critical Infrastructure Protection XV (2022)

  13. No Access

    Chapter and Conference Paper

    Analyzing the Error Rates of Bitcoin Clustering Heuristics

    Bitcoin is a decentralized peer-to-peer cryptocurrency. Bitcoin’s strong cryptography ensures anonymity that makes it possible to profit from crimes such as ransomware attacks and money laundering. Unfortunate...

    Yanan Gong, Kam-Pui Chow, Hing-Fung Ting in Advances in Digital Forensics XVIII (2022)

  14. No Access

    Chapter and Conference Paper

    Making Private Function Evaluation Safer, Faster, and Simpler

    In the problem of two-party private function evaluation (PFE), one party \(\mathsf {P}_{\mathsf {A}}\) ...

    Yi Liu, Qi Wang, Siu-Ming Yiu in Public-Key Cryptography – PKC 2022 (2022)

  15. No Access

    Chapter and Conference Paper

    Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES

    We consider the related-tweak impossible differential cryptanalysis of TweAES. It is one of the underlying primitives of Authenticated Encryption with Associated Data (AEAD) scheme ESTATE which was accepted as on...

    Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang in Selected Areas in Cryptography (2022)

  16. No Access

    Chapter and Conference Paper

    Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability

    Time-lock puzzle schemes allow one to encrypt messages for the future. More concretely, one can efficiently generate a time-lock puzzle for a secret/solution s, such that s remains hidden until a specified time T

    Yi Liu, Qi Wang, Siu-Ming Yiu in Computer Security – ESORICS 2022 (2022)

  17. No Access

    Article

    Classifying encrypted traffic using adaptive fingerprints with multi-level attributes

    With the rapid development of Internet, network management and monitoring face a number of challenges, one of which is traffic classification. Meanwhile, SSL/TLS protocols are extensively used to encrypt the c...

    Chang Liu, Gang **ong, Gaopeng Gou, Siu-Ming Yiu, Zhen Li, Zhihong Tian in World Wide Web (2021)

  18. Article

    Editorial: Security and Privacy in Computing and Communications

    Zheli Liu, ** Li, Ilsun You, Siu-Ming Yiu in Mobile Networks and Applications (2021)

  19. No Access

    Article

    ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM

    Most of users hesitate to use third-party web applications because of security and privacy concerns. An ideal solution would be to allow apps to work with encrypted data, so that users might be more willing to...

    **aojie Guo, Yanyu Huang, **hui Ye, Sijie Yin, Min Li in Mobile Networks and Applications (2021)

  20. No Access

    Article

    Understanding deep face anti-spoofing: from the perspective of data

    Face biometrics systems are increasingly used by many business applications, which can be vulnerable to malicious attacks, leading to serious consequences. How to effectively detect spoofing faces is a critica...

    Yu**g Sun, Hao **ong, Siu Ming Yiu in The Visual Computer (2021)

previous disabled Page of 6