Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Process Mining with Programmable Logic Controller Memory States

    This paper presents novel contributions to the field of process mining in Programmable Logic Controllers (PLCs). One significant contribution is the proposal of a new event source for process mining, which can...

    Chun Fai Chan, Kam Pui Chow in Ubiquitous Security (2024)

  2. No Access

    Chapter and Conference Paper

    A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models

    Ensuring the security of large language models (LLMs) is an ongoing challenge despite their widespread popularity. Developers work to enhance LLMs security, but vulnerabilities persist, even in advanced versio...

    Aysan Esmradi, Daniel Wankit Yip, Chun Fai Chan in Ubiquitous Security (2024)

  3. Article

    Open Access

    Unimon qubit

    Superconducting qubits seem promising for useful quantum computers, but the currently wide-spread qubit designs and techniques do not yet provide high enough performance. Here, we introduce a superconducting-q...

    Eric Hyyppä, Suman Kundu, Chun Fai Chan, András Gunyhó in Nature Communications (2022)

  4. No Access

    Chapter and Conference Paper

    Security Analysis of Software Updates for Industrial Robots

    Robots are widely deployed in industrial manufacturing environments. Cyber compromises of industrial robots pose threats to products and services, to the robots as well as to human workers. Previous security s...

    Chun-Fai Chan, Kam-Pui Chow, Tim Tang in Critical Infrastructure Protection XV (2022)

  5. No Access

    Article

    Competing magnetic orders in a bilayer Hubbard model with ultracold atoms

    Fermionic atoms in optical lattices have served as a useful model system in which to study and emulate the physics of strongly correlated matter. Driven by the advances of high-resolution microscopy, the curre...

    Marcell Gall, Nicola Wurz, Jens Samland, Chun Fai Chan, Michael Köhl in Nature (2021)

  6. No Access

    Chapter and Conference Paper

    Forensic Investigation of A Hacked Industrial Robot

    Industrial robots are playing a key role in the Fourth Industrial Revolution (Industry 4.0). This latest generation of robots incorporates smart technologies and networking to support machine-to-machine and ma...

    Yanan Gong, Kam-Pui Chow, Yonghao Mai, Jun Zhang in Critical Infrastructure Protection XIV (2020)

  7. Chapter and Conference Paper

    Detecting Anomalies in Programmable Logic Controllers Using Unsupervised Machine Learning

    Supervisory control and data acquisition systems have been employed for decades to communicate with and coordinate industrial processes. These systems incorporate numerous programmable logic controllers that m...

    Chun-Fai Chan, Kam-Pui Chow, Cesar Mak, Raymond Chan in Advances in Digital Forensics XV (2019)

  8. Chapter and Conference Paper

    Defining Attack Patterns for Industrial Control Systems

    Attack patterns have been used to specify security test cases for traditional information technology systems in order to mitigate cyber attacks. However, the attack patterns for traditional information technol...

    Raymond Chan, Kam-Pui Chow, Chun-Fai Chan in Critical Infrastructure Protection XIII (2019)

  9. No Access

    Article

    Majorana fermions in semiconducting nanowire and Fulde–Ferrell superconductor hybrid structures

    The novel idea that spin-orbit coupling (SOC) and an s-wave pairing system can lead to induced pwave pairing with a strong magnetic limit, has stimulated widespread interest in searching for Majorana fermions ...

    Jia Liu, Chun Fai Chan, Ming Gong in Frontiers of Physics (2018)

  10. Chapter and Conference Paper

    Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers

    Industrial control systems are used to monitor and operate critical infrastructures. For decades, the security of industrial control systems was preserved by their use of proprietary hardware and software, and...

    Chun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau in Advances in Digital Forensics XIV (2018)