Skip to main content

and
  1. Chapter and Conference Paper

    Verifiable Computation on Outsourced Encrypted Data

    On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authe...

    Junzuo Lai, Robert H. Deng, Hweehwa Pang, Jian Weng in Computer Security - ESORICS 2014 (2014)

  2. No Access

    Chapter and Conference Paper

    Exploiting Intensity Inhomogeneity to Extract Textured Objects from Natural Scenes

    Extracting textured objects from natural scenes is a challenging task in computer vision. The main difficulties arise from the intrinsic randomness of natural textures and the high-semblance between the object...

    Jundi Ding, Jialie Shen, HweeHwa Pang, Songcan Chen in Computer Vision – ACCV 2009 (2010)

  3. No Access

    Chapter and Conference Paper

    Dual Phase Learning for Large Scale Video Gait Recognition

    Accurate gait recognition from video is a complex process involving heterogenous features, and is still being developed actively. This article introduces a novel framework, called GC2F, for effective and efficien...

    Jialie Shen, HweeHwa Pang, Dacheng Tao, Xuelong Li in Advances in Multimedia Modeling (2010)

  4. No Access

    Chapter and Conference Paper

    Visual Analytics for Supporting Entity Relationship Discovery on Text Data

    To conduct content analysis over text data, one may look out for important named objects and entities that refer to real world instances, synthesizing them into knowledge relevant to a given information seekin...

    Hanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw in Intelligence and Security Informatics (2008)

  5. Chapter and Conference Paper

    Authenticating Multi-dimensional Query Results in Data Publishing

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produce incorrect query results. Th...

    Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan in Data and Applications Security XX (2006)

  6. Chapter and Conference Paper

    Authenticating Query Results in Data Publishing

    We propose a communication-efficient authentication scheme to authenticate query results disseminated by untrusted data publishing servers. In our scheme, signatures of multiple tuples in the result set are ag...

    Di Ma, Robert H. Deng, Hweehwa Pang in Information and Communications Security (2005)