Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps

    Mobile apps are embracing facial recognition technology to streamline the identity verification procedure for security-critical activities such as opening online bank accounts. To ensure the security of the sy...

    **anbo Wang, Kaixuan Luo, Wing Cheong Lau in Applied Cryptography and Network Security (2024)

  2. No Access

    Chapter and Conference Paper

    PROS-C: Accelerating Random Orthogonal Search for Global Optimization Using Crossover

    Pure Random Orthogonal Search (PROS) is a parameterless evolutionary algorithm (EA) that has shown superior performance when compared to many existing EAs on well-known benchmark functions with limited search ...

    Bruce Kwong-Bun Tong, Wing Cheong Lau in Machine Learning, Optimization, and Data S… (2024)

  3. No Access

    Chapter and Conference Paper

    GTEA: Inductive Representation Learning on Temporal Interaction Graphs via Temporal Edge Aggregation

    In this paper, we propose the Graph Temporal Edge Aggregation (GTEA) framework for inductive learning on Temporal Interaction Graphs (TIGs). Different from previous works, GTEA models the temporal dynamics of ...

    Siyue **e, Yiming Li, Da Sun Handason Tam in Advances in Knowledge Discovery and Data M… (2023)

  4. No Access

    Chapter and Conference Paper

    An Empirical Study on Mobile Payment Credential Leaks and Their Exploits

    Recently, mobile apps increasingly integrate with payment services, enabling the user to pay orders with a third-party payment service provider, namely Cashier. During the payment process, both the app and Cas...

    Shangcheng Shi, **anbo Wang, Kyle Zeng in Security and Privacy in Communication Netw… (2021)

  5. No Access

    Chapter and Conference Paper

    Breaking and Fixing Third-Party Payment Service for Mobile Apps

    Riding on the widespread user adoption of mobile payment, a growing number of mobile apps have integrated the service from third-party payment service providers or so-called Cashiers. Despite its prevalence an...

    Shangcheng Shi, **anbo Wang, Wing Cheong Lau in Applied Cryptography and Network Security (2021)

  6. No Access

    Chapter and Conference Paper

    Revisiting SRPT for Job Scheduling in Computing Clusters

    As the scheduling principle of Shortest Remaining...

    Huanle Xu, Huangting Wu, Wing Cheong Lau in Queueing Theory and Network Applications (2019)

  7. Chapter and Conference Paper

    Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols

    Although the OAuth2.0 protocol was originally designed to serve the authorization need for websites, mainstream identity providers like Google and Facebook have made significant changes on this protocol to sup...

    Ronghai Yang, Wing Cheong Lau, Shangcheng Shi in Applied Cryptography and Network Security (2017)

  8. No Access

    Chapter and Conference Paper

    Predicting Retweet Behavior in Online Social Networks Based on Locally Available Information

    Behavior prediction in online social networks (OSNs) has attracted lots of attention due to its vast applications. However, most previous work needs global network information to train classifiers. Due to the ...

    Guanchen Li, Wing Cheong Lau in Social Informatics (2016)

  9. No Access

    Chapter and Conference Paper

    Solving Large Graph Problems in MapReduce-Like Frameworks via Optimized Parameter Configuration

    In this paper, we propose a scheme to solve large dense graph problems under the MapReduce framework. The graph data is organized in terms of blocks and all blocks are assigned to different map workers for par...

    Huanle Xu, Ronghai Yang, Zhibo Yang in Algorithms and Architectures for Parallel … (2015)

  10. Article

    Open Access

    Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon ...

    Ka-Hung Hui, Wing Cheong Lau, Onching Yue in EURASIP Journal on Wireless Communications… (2010)

  11. No Access

    Article

    Efficient Packet Scheduling Using Channel Adaptive Fair Queueing in Distributed Mobile Computing Systems

    In a distributed mobile computing system, an efficient packet scheduling policy is a crucial component to achieve a high utilization of the precious bandwidth resources while satisfying users' QoS (quality of ...

    Li Wang, Yu-Kwong Kwok, Wing-Cheong Lau in Mobile Networks and Applications (2004)

  12. No Access

    Chapter and Conference Paper

    An object-oriented class library for scalable parallel heuristic search

    In this report, we describe the design and implementation of a Parallel Heuristic Search Class Library, with emphasis on the use of object-oriented programming techniques for distributed applications. Another ...

    Wing-cheong Lau, Vineet Singh in ECOOP ’92 European Conference on Object-Or… (1992)