Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption

    Traceability, being the ability to access information of an item throughout its lifecycle, plays an important part in current supply chain, facilitating prompt response in case of incidents. In recent years, b...

    Tsz Ho Pun, Yi Jun He, Siu Ming Yiu in Ubiquitous Security (2024)

  2. No Access

    Chapter and Conference Paper

    SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE

    In recent years, distributed machine learning has garnered significant attention. However, privacy continues to be an unresolved issue within this field. Multi-key homomorphic encryption over torus (MKTFHE) is...

    Hongxiao Wang, Zoe L. Jiang, Yanmin Zhao, Siu-Ming Yiu in Mobile Internet Security (2024)

  3. No Access

    Chapter and Conference Paper

    Detection on GPS Spoofing in Location Based Mobile Games

    The widely used Global Positioning System (GPS) provides a handy way for electronic devices to locate their positions. Almost every mobile device nowadays has GPS module equipped inside. Apart from traditional...

    Shing Ki Wong, Siu Ming Yiu in Information Security Applications (2020)

  4. No Access

    Chapter and Conference Paper

    A Secure and Self-tallying E-voting System Based on Blockchain

    E-voting has been studied for many years. Recently, researchers find that blockchain can provide an alternative secure platform for e-voting systems, because of its properties of tamper resistance and transpar...

    Gongxian Zeng, Meiqi He, Siu Ming Yiu in Information Security Applications (2020)

  5. No Access

    Chapter and Conference Paper

    Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines

    Critical infrastructure assets such as power grids and water treatment plants are monitored and managed by industrial control systems. Attacks that leverage industrial control systems to disrupt or damage infr...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XVI (2020)

  6. No Access

    Chapter and Conference Paper

    Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning

    Insider threat detection and investigation are major challenges in digital forensics. Unlike external attackers, insiders have privileges to access resources in their organizations and violations of normal beh...

    Yichen Wei, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XVI (2020)

  7. No Access

    Chapter

    A Game-Theoretic Framework for Incentive Mechanism Design in Federated Learning

    Federated learning (FL) has great potential for coalescing isolated data islands. It enables privacy-preserving collaborative model training and addresses security and privacy concerns. Besides booming technol...

    Mingshu Cong, Han Yu, ** Weng, Siu Ming Yiu in Federated Learning (2020)

  8. No Access

    Chapter and Conference Paper

    Strong Known Related-Key Attacks and the Security of ECDSA

    The classical related-key attack (RKA) model fails to capture some real world systems that introduce related secret keys by design. In some blockchain applications, public keys are generated in a way that th...

    Tsz Hon Yuen, Siu-Ming Yiu in Network and System Security (2019)

  9. No Access

    Book and Conference Proceedings

    Network and System Security

    12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings

    Man Ho Au, Siu Ming Yiu, Dr. ** Li, **apu Luo in Lecture Notes in Computer Science (2018)

  10. No Access

    Chapter and Conference Paper

    LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)

    Due to the advancement of side-channel attacks, leakage-resilient cryptography has attracted a lot of attention in recent years. Many fruitful results have been proposed by researchers. Most, if not all, of th...

    **aoqi Yu, Nairen Cao, Gongxian Zeng, Ruoqing Zhang in Information Security Applications (2017)