Skip to main content

and
Your search also matched 33 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model

Include preview-only content
  1. Chapter and Conference Paper

    An Incident Response Model for Industrial Control System Forensics Based on Historical Events

    Cyber attacks on industrial control systems are increasing. Malware such as Stuxnet, Havex and BlackEnergy have demonstrated that industrial control systems are attractive targets for attackers. However, indus...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Critical Infrastructure Protection XIII (2019)

  2. Chapter and Conference Paper

    A Forensic Logging System for Siemens Programmable Logic Controllers

    Critical infrastructure assets are monitored and managed by industrial control systems. In recent years, these systems have evolved to adopt common networking standards that expose them to cyber attacks. Since...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XIV (2018)

  3. Chapter and Conference Paper

    Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers

    Industrial control systems are used to monitor and operate critical infrastructures. For decades, the security of industrial control systems was preserved by their use of proprietary hardware and software, and...

    Chun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau in Advances in Digital Forensics XIV (2018)

  4. Chapter and Conference Paper

    Privacy-Preserving Disease Risk Test Based on Bloom Filters

    Decreasing costs in genome sequencing have been paving the way for personalised medicine. An increasing number of individuals choose to undergo disease risk tests provided by medical units. However, it poses s...

    Jun Zhang, Linru Zhang, Meiqi He, Siu-Ming Yiu in Information and Communications Security (2018)

  5. Chapter and Conference Paper

    Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery

    Elastic net is a popular linear regression tool and has many important applications, in particular, finding genomic biomarkers for cancers from gene expression profiles for personalized medicine (elastic net i...

    Jun Zhang, Meiqi He, Siu-Ming Yiu in Data and Applications Security and Privacy XXXI (2017)

  6. Chapter and Conference Paper

    Semantic Video Carving Using Perceptual Hashing and Optical Flow

    Video files are frequently encountered in digital forensic investigations. However, these files are usually fragmented and are not stored consecutively on physical media. Suspects may logically delete the file...

    Junbin Fang, Si** Li, Guikai **, Zoe Jiang in Advances in Digital Forensics XIII (2017)

  7. Chapter and Conference Paper

    FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS

    Many techniques have been proposed for file recovery, but recovering fragmented files is still a challenge in digital forensics, especially when the files are damaged. This chapter focuses on JPEG files, one o...

    Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XI (2015)

  8. Chapter and Conference Paper

    Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

    Identity-based encryption (IBE) is useful for providing end-to-end access control and data protection in many scenarios such as cloud applications and wireless sensor networks However, there are some practical...

    Tsz Hon Yuen, Ye Zhang, Siu Ming Yiu, Joseph K. Liu in Computer Security - ESORICS 2014 (2014)

  9. Chapter and Conference Paper

    Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner

    Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenu...

    Tat Wing Chim, Siu Ming Yiu, Lucas Chi Kwong Hui in Information and Communications Security (2012)

  10. Chapter and Conference Paper

    Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model

    Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted users. It may not hold in the real world due to the side-channel attacks. Leakage-resilient cryptography is propo...

    Hao **ong, Cong Zhang, Tsz Hon Yuen in Information and Communications Security (2012)

  11. Chapter and Conference Paper

    Acceleration of Composite Order Bilinear Pairing on Graphics Hardware

    Recently, composite-order bilinear pairing has been shown to be useful in many cryptographic constructions. However, it is time-costly to evaluate. This is because the composite order should be at least 1024bi...

    Ye Zhang, Chun Jason Xue, Duncan S. Wong in Information and Communications Security (2012)

  12. Chapter and Conference Paper

    Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones

    Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in...

    Junbin Fang, Zoe Jiang, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics VIII (2012)

  13. Chapter and Conference Paper

    SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment

    Identity security and privacy have been regarded as one of the top seven cloud security threats. There are a few identity management solutions proposed recently trying to tackle these problems. However, none o...

    Sherman S. M. Chow, Yi-Jun He, Lucas C. K. Hui in Applied Cryptography and Network Security (2012)

  14. Chapter and Conference Paper

    Identity-Based Encryption Resilient to Continual Auxiliary Leakage

    We devise the first identity-based encryption (IBE) that remains secure even when the adversary is equipped with auxiliary input (STOC ’09) – any computationally uninvertible function of the master secret key and...

    Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang in Advances in Cryptology – EUROCRYPT 2012 (2012)

  15. Chapter and Conference Paper

    PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation

    Anonymous authentication schemes allow users to act freely without being tracked. The users may not want to trust a third party in ensuring their privacy, yet a service provider (SP) should have the authority ...

    Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow in Computer Security – ESORICS 2012 (2012)