Skip to main content

and
  1. Article

    Open Access

    Self-Adaptive Incremental PCA-Based DBSCAN of Acoustic Features for Anomalous Sound Detection

    In modern industry, maintaining continuous machine operations is important for improving production efficiency and reducing costs. Therefore, the smart technology of acoustic monitoring to detect anomalous mac...

    **ao Tan, Siu Ming Yiu in SN Computer Science (2024)

  2. No Access

    Chapter and Conference Paper

    Automatic EPS Calculation Guided Genetic Algorithm and Incremental PCA Based DBSCAN of Extracted Acoustic Features for Anomalous Sound Detection

    This paper focuses on automatic detection of anomalies in audio files. We introduce an automated unsupervised algorithm which integrates AEC-guided Genetic Algorithm and Incremental PCA and DBSCAN to detect th...

    **ao Tan, Siu Ming Yiu in Advanced Research in Technologies, Informa… (2024)

  3. No Access

    Chapter and Conference Paper

    Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption

    Traceability, being the ability to access information of an item throughout its lifecycle, plays an important part in current supply chain, facilitating prompt response in case of incidents. In recent years, b...

    Tsz Ho Pun, Yi Jun He, Siu Ming Yiu in Ubiquitous Security (2024)

  4. No Access

    Chapter and Conference Paper

    Analyzing the Error Rates of Bitcoin Clustering Heuristics

    Bitcoin is a decentralized peer-to-peer cryptocurrency. Bitcoin’s strong cryptography ensures anonymity that makes it possible to profit from crimes such as ransomware attacks and money laundering. Unfortunate...

    Yanan Gong, Kam-Pui Chow, Hing-Fung Ting in Advances in Digital Forensics XVIII (2022)

  5. No Access

    Chapter and Conference Paper

    Making Private Function Evaluation Safer, Faster, and Simpler

    In the problem of two-party private function evaluation (PFE), one party \(\mathsf {P}_{\mathsf {A}}\) ...

    Yi Liu, Qi Wang, Siu-Ming Yiu in Public-Key Cryptography – PKC 2022 (2022)

  6. No Access

    Chapter and Conference Paper

    Blind Polynomial Evaluation and Data Trading

    Data trading is an emerging business, in which data sellers provide buyers with, for example, their private datasets and get paid from buyers. In many scenarios, sellers prefer to sell pieces of data, such as ...

    Yi Liu, Qi Wang, Siu-Ming Yiu in Applied Cryptography and Network Security (2021)

  7. No Access

    Chapter and Conference Paper

    Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions

    Executing data mining algorithms locally is usually computationally intensive. A promising solution is to outsource the heavy data mining tasks and datasets. On the other hand, combining data from multiple ins...

    Jun Zhang, Siu Ming Yiu, Zoe L. Jiang in Algorithms and Architectures for Parallel … (2020)

  8. No Access

    Chapter and Conference Paper

    Strong Known Related-Key Attacks and the Security of ECDSA

    The classical related-key attack (RKA) model fails to capture some real world systems that introduce related secret keys by design. In some blockchain applications, public keys are generated in a way that th...

    Tsz Hon Yuen, Siu-Ming Yiu in Network and System Security (2019)

  9. No Access

    Book and Conference Proceedings

    Network and System Security

    12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings

    Man Ho Au, Siu Ming Yiu, Dr. ** Li, **apu Luo in Lecture Notes in Computer Science (2018)

  10. No Access

    Chapter and Conference Paper

    Predicting Comprehensive Drug-Drug Interactions for New Drugs via Triple Matrix Factorization

    There is an urgent need to discover or deduce drug-drug interactions (DDIs), which would cause serious adverse drug reactions. However, preclinical detection of DDIs bears a high cost. Machine learning-based c...

    Jian-Yu Shi, Hua Huang, Jia-**n Li, Peng Lei in Bioinformatics and Biomedical Engineering (2017)

  11. No Access

    Article

    Faster Algorithms for Computing the R* Consensus Tree

    The fastest known algorithms for computing the R* consensus tree of k rooted phylogenetic trees with n leaves each and identical leaf label sets run in ...

    Jesper Jansson, Wing-Kin Sung, Hoa Vu, Siu-Ming Yiu in Algorithmica (2016)

  12. No Access

    Article

    A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays

    With the first human DNA being decoded into a sequence of about 2.8 billion characters, much biological research has been centered on analyzing this sequence. Theoretically speaking, it is now feasible to acco...

    Wing-Kai Hon, Tak-Wah Lam, Kunihiko Sadakane, Wing-Kin Sung, Siu-Ming Yiu in Algorithmica (2007)