Skip to main content

previous disabled Page of 5
and
  1. No Access

    Article

    Hessian unsupervised extreme learning machine

    Extreme learning machines (ELMs) are shown to be efficient and effective learning algorithms for regression and classification tasks. ELMs, however, are typically utilized to solve supervised learning problems...

    Sharana Dharshikgan Suresh Dass in International Journal of Machine Learning … (2024)

  2. Article

    Open Access

    Emotion-specific AUs for micro-expression recognition

    The Facial Action Coding System (FACS) comprehensively describes facial expressions with facial action units (AUs). It is a well-used technique by researchers in emotions research to understand human emotions ...

    Shu-Min Leong, Raphaël C.-W. Phan in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128

    We investigate a technique that needs to apply multiple random faults to the same target location and compare the impact of these faults on the fault-free and faulty output to recover specific secret variable....

    Iftekhar Salam, Wei-Chuen Yau, Raphaël C.-W. Phan in Journal of Cryptographic Engineering (2023)

  4. No Access

    Chapter and Conference Paper

    RCS-YOLO: A Fast and High-Accuracy Object Detector for Brain Tumor Detection

    With an excellent balance between speed and accuracy, cutting-edge YOLO frameworks have become one of the most efficient algorithms for object detection. However, the performance of using YOLO networks is scar...

    Ming Kang, Chee-Ming Ting, Fung Fung Ting in Medical Image Computing and Computer Assis… (2023)

  5. Article

    Open Access

    Cube attacks on round-reduced TinyJAMBU

    Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run effic...

    Wil Liam Teng, Iftekhar Salam, Wei-Chuen Yau, Josef Pieprzyk in Scientific Reports (2022)

  6. No Access

    Chapter and Conference Paper

    Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain

    Verifiable Random Functions (VRFs) play a key role in Proof-of-Stake blockchains such as Algorand to achieve highly scalable consensus, but currently deployed VRFs lack post-quantum security, which is crucial ...

    Maxime Buser, Rafael Dowsley, Muhammed F. Esgin in Computer Security – ESORICS 2022 (2022)

  7. No Access

    Article

    Faceless identification based on temporal strips

    This paper first presents a novel approach for modelling facial features, Local Directional Texture (LDT), which exploits the unique directional information in image textures for the problem of face recognitio...

    Shu-Min Leong, Raphaël C.-W. Phan in Multimedia Tools and Applications (2021)

  8. No Access

    Article

    Cryptanalysis of genetic algorithm-based encryption scheme

    Genetic algorithm, a technique inspired by evolutionary biology to mimic the process of natural selection, has been applied in the image encryption due to the confusion and diffusion properties of mutation and...

    Kuan-Wai Wong, Wun-She Yap, Denis C.-K. Wong in Multimedia Tools and Applications (2020)

  9. No Access

    Article

    Separable authentication in encrypted HEVC video

    A joint encryption and authentication scheme for HEVC compressed video is proposed in this work. It produces a HEVC format compliant video stream that permits the authentication process to be carried out irreg...

    Yiqi Tew, KokSheik Wong, Raphael C.-W. Phan in Multimedia Tools and Applications (2018)

  10. No Access

    Article

    SearchaStore: fast and secure searchable cloud services

    The emergence of Cloud Computing is revolutionizing the way we store, query, analyze and consume data, which also bring forward other development that fundamentally changed our life style. For example, Industr...

    Wai-Kong Lee, Raphael C.-W. Phan, Geong-Sen Poh, Bok-Min Goi in Cluster Computing (2018)

  11. No Access

    Article

    Hybrid Facial Regions Extraction for Micro-expression Recognition System

    Micro-expressions can occur when a person attempts to conceal and suppress his true feelings and emotions, both deliberately or unconsciously.In recent years, facial micro-expression analysis has received trem...

    Sze-Teng Liong, John See, Raphael C.-W. Phan in Journal of Signal Processing Systems (2018)

  12. No Access

    Article

    SPRING: a novel parallel chaos-based image encryption scheme

    Due to the increasing demand on secure image transmission, image encryption has emerged as an active research field in recent years. Many of the proposed image encryption schemes are designed based on chaotic ...

    Wai-Kong Lee, Raphael C.-W. Phan, Wun-She Yap, Bok-Min Goi in Nonlinear Dynamics (2018)

  13. No Access

    Chapter and Conference Paper

    Speeding up the Montgomery Exponentiation with CMM-SDR Over GPU with Maxwell and Pascal Architecture

    RSA is an algorithm widely used in protecting the key exchange between two parties for secure mobile and wireless communication. Modular exponentiation is the main operation involved in RSA, which is very time...

    **an-Fu Wong, Bok-Min Goi, Wai-Kong Lee in Mobile and Wireless Technologies 2017 (2018)

  14. No Access

    Article

    Effective recognition of facial micro-expressions with video motion magnification

    Facial expression recognition has been intensively studied for decades, notably by the psychology community and more recently the pattern recognition community. What is more challenging, and the subject of mor...

    Yandan Wang, John See, Yee-Hui Oh, Raphael C.-W. Phan in Multimedia Tools and Applications (2017)

  15. Article

    Open Access

    Higher order differentiation over finite fields with applications to generalising the cube attack

    Higher order differentiation was introduced in a cryptographic context by Lai. Several attacks can be viewed in the context of higher order differentiations, amongst them the cube attack of Dinur and Shamir an...

    Ana Sălăgean, R. Winter, Matei Mandache-Sălăgean in Designs, Codes and Cryptography (2017)

  16. No Access

    Book and Conference Proceedings

    Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology

    Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

    Raphaël C.-W. Phan, Moti Yung in Lecture Notes in Computer Science (2017)

  17. No Access

    Chapter and Conference Paper

    Tuple Cryptanalysis: Slicing and Fusing Multisets

    In this paper, we revisit the notions of Square, saturation, integrals, multisets, bit patterns and tuples, and propose a new Slice & Fuse paradigm to better exploit multiset type properties of block ciphers, as ...

    Marine Minier, Raphaël C.-W. Phan in Paradigms in Cryptology – Mycrypt 2016. Ma… (2017)

  18. No Access

    Article

    Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme

    In 2004, Bellare et al. formalized the notion for identity-based identification (IBI) schemes and proposed many schemes based on their transformation from standard identification schemes. However the authors l...

    Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng in Cryptography and Communications (2016)

  19. No Access

    Article

    Cryptanalysis of a High-Definition Image Encryption Based on AES Modification

    Wadi and Zainal recently proposed a high definition image encryption algorithm based on a modified AES-128 block cipher in (Wirel Pers Commun 79(2):811–829, 2014). In this paper, we show that the core component ...

    Wun-She Yap, Raphael C.-W. Phan, Bok-Min Goi in Wireless Personal Communications (2016)

  20. No Access

    Article

    Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture

    GPU is widely used in various applications that require huge computational power. In this paper, we contribute to the cryptography and high performance computing research community by presenting techniques to ...

    Wai-Kong Lee, Hon-Sang Cheong, Raphael C.-W. Phan, Bok-Min Goi in Cluster Computing (2016)

previous disabled Page of 5