BibTeX records: Siu-Ming Yiu

download as .bib file

@article{DBLP:journals/eswa/DengLY24,
  author       = {Yiqi Deng and
                  Yuzhi Liang and
                  Siu{-}Ming Yiu},
  title        = {Towards interpretable stock trend prediction through causal inference},
  journal      = {Expert Syst. Appl.},
  volume       = {238},
  number       = {Part {B}},
  pages        = {121654},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.121654},
  doi          = {10.1016/J.ESWA.2023.121654},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/DengLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/0003ZJMYY24,
  author       = {Xingwei He and
                  Qianru Zhang and
                  A{-}Long Jin and
                  Jun Ma and
                  Yuan Yuan and
                  Siu Ming Yiu},
  editor       = {Michael J. Wooldridge and
                  Jennifer G. Dy and
                  Sriraam Natarajan},
  title        = {Improving Factual Error Correction by Learning to Inject Factual Errors},
  booktitle    = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2024, Thirty-Sixth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver,
                  Canada},
  pages        = {18197--18205},
  publisher    = {{AAAI} Press},
  year         = {2024},
  url          = {https://doi.org/10.1609/aaai.v38i16.29778},
  doi          = {10.1609/AAAI.V38I16.29778},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/0003ZJMYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangYZJ24,
  author       = {Hongxiao Wang and
                  Siu{-}Ming Yiu and
                  Yanmin Zhao and
                  Zoe Lin Jiang},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Updatable, Aggregatable, Succinct Mercurial Vector Commitment from
                  Lattice},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {3--35},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_1},
  doi          = {10.1007/978-3-031-57722-2\_1},
  timestamp    = {Wed, 24 Apr 2024 16:58:28 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WangYZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-04336,
  author       = {Ke Zhang and
                  Lichao Sun and
                  Bolin Ding and
                  Siu Ming Yiu and
                  Carl Yang},
  title        = {Deep Efficient Private Neighbor Generation for Subgraph Federated
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2401.04336},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.04336},
  doi          = {10.48550/ARXIV.2401.04336},
  eprinttype    = {arXiv},
  eprint       = {2401.04336},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-04336.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-02800,
  author       = {Yujing Sun and
                  Caiyi Sun and
                  Yuan Liu and
                  Yuexin Ma and
                  Siu Ming Yiu},
  title        = {Extreme Two-View Geometry From Object Poses with Diffusion Models},
  journal      = {CoRR},
  volume       = {abs/2402.02800},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.02800},
  doi          = {10.48550/ARXIV.2402.02800},
  eprinttype    = {arXiv},
  eprint       = {2402.02800},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-02800.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-11224,
  author       = {Chi Zhang and
                  Man Ho Au and
                  Siu Ming Yiu},
  title        = {Neural Networks with (Low-Precision) Polynomial Approximations: New
                  Insights and Techniques for Accuracy Improvement},
  journal      = {CoRR},
  volume       = {abs/2402.11224},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.11224},
  doi          = {10.48550/ARXIV.2402.11224},
  eprinttype    = {arXiv},
  eprint       = {2402.11224},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-11224.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-16656,
  author       = {Qianru Zhang and
                  Lianghao Xia and
                  Xuheng Cai and
                  Siu{-}Ming Yiu and
                  Chao Huang and
                  Christian S. Jensen},
  title        = {Graph Augmentation for Recommendation},
  journal      = {CoRR},
  volume       = {abs/2403.16656},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.16656},
  doi          = {10.48550/ARXIV.2403.16656},
  eprinttype    = {arXiv},
  eprint       = {2403.16656},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-16656.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-17833,
  author       = {Shijie Na and
                  Yuzhi Liang and
                  Siu{-}Ming Yiu},
  title        = {{GPFL:} {A} Gradient Projection-Based Client Selection Framework for
                  Efficient Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2403.17833},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.17833},
  doi          = {10.48550/ARXIV.2403.17833},
  eprinttype    = {arXiv},
  eprint       = {2403.17833},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-17833.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangYZJ24,
  author       = {Hongxiao Wang and
                  Siu{-}Ming Yiu and
                  Yanmin Zhao and
                  Zoe Lin Jiang},
  title        = {Updatable, Aggregatable, Succinct Mercurial Vector Commitment from
                  Lattice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/027},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangYZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CongYY24,
  author       = {Mingshu Cong and
                  Tsz Hon Yuen and
                  Siu Ming Yiu},
  title        = {zkMatrix: Batched Short Proof for Committed Matrix Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/161},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CongYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZengHYH23,
  author       = {Gongxian Zeng and
                  Meiqi He and
                  Siu{-}Ming Yiu and
                  Zhengan Huang},
  title        = {Corrigendum to: {A} Self-Tallying Electronic Voting Based on Blockchain},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {2},
  pages        = {523},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxab175},
  doi          = {10.1093/COMJNL/BXAB175},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZengHYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GongCYT23,
  author       = {Yanan Gong and
                  Kam{-}Pui Chow and
                  Siu Ming Yiu and
                  Hing{-}Fung Ting},
  title        = {Analyzing the peeling chain patterns on the Bitcoin blockchain},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301614},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301614},
  doi          = {10.1016/J.FSIDI.2023.301614},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GongCYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/CaiPYY23,
  author       = {Cailing Cai and
                  Shimin Pan and
                  Tsz Hon Yuen and
                  Siu{-}Ming Yiu},
  title        = {Practical fully leakage resilient signatures with auxiliary inputs},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {141},
  pages        = {448--461},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2022.11.027},
  doi          = {10.1016/J.FUTURE.2022.11.027},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/CaiPYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/WangCDFHCDYW23,
  author       = {Eric Ke Wang and
                  Zicong Chen and
                  Xilin Dang and
                  Xuan Fan and
                  Xuming Han and
                  Chien{-}Ming Chen and
                  Weiping Ding and
                  Siu{-}Ming Yiu and
                  Jian Weng},
  title        = {Uncovering Hidden Vulnerabilities in Convolutional Neural Networks
                  through Graph-based Adversarial Robustness Evaluation},
  journal      = {Pattern Recognit.},
  volume       = {143},
  pages        = {109745},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.patcog.2023.109745},
  doi          = {10.1016/J.PATCOG.2023.109745},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/WangCDFHCDYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/SunXYL23,
  author       = {Yujing Sun and
                  Hao Xiong and
                  Siu Ming Yiu and
                  Kwok{-}Yan Lam},
  title        = {BitAnalysis: {A} Visualization System for Bitcoin Wallet Investigation},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {9},
  number       = {2},
  pages        = {621--636},
  year         = {2023},
  url          = {https://doi.org/10.1109/TBDATA.2022.3188660},
  doi          = {10.1109/TBDATA.2022.3188660},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/SunXYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLYL23,
  author       = {Zhiwei Wang and
                  Feng Liu and
                  Siu{-}Ming Yiu and
                  Longwen Lan},
  title        = {Online/Offline and History Indexing Identity-Based Fuzzy Message Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5553--5566},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3309477},
  doi          = {10.1109/TIFS.2023.3309477},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/WangCZYCHIF23,
  author       = {Eric Ke Wang and
                  Zicong Chen and
                  Mingjia Zhu and
                  Siu{-}Ming Yiu and
                  Chien{-}Ming Chen and
                  Mohammad Mehedi Hassan and
                  Stefano Izzo and
                  Giancarlo Fortino},
  title        = {Statistics-Physics-Based Interpretation of the Classification Reliability
                  of Convolutional Neural Networks in Industrial Automation Domain},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {2},
  pages        = {2165--2172},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2022.3202950},
  doi          = {10.1109/TII.2022.3202950},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/WangCZYCHIF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangLY23,
  author       = {Zhiwei Wang and
                  Longwen Lan and
                  Siu{-}Ming Yiu},
  title        = {Chameleon Hash Based Efficiently Updatable Oblivious Key Management},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {4503--4513},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3323630},
  doi          = {10.1109/TSC.2023.3323630},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/WangLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/YimZTLY23,
  author       = {Tik Yu Yim and
                  Yuxuan Zhang and
                  Wenting Tan and
                  Tak Wah Lam and
                  Siu Ming Yiu},
  editor       = {Jingrui He and
                  Themis Palpanas and
                  Xiaohua Hu and
                  Alfredo Cuzzocrea and
                  Dejing Dou and
                  Dominik Slezak and
                  Wei Wang and
                  Aleksandra Gruca and
                  Jerry Chun{-}Wei Lin and
                  Rakesh Agrawal},
  title        = {Meticulously Analyzing {ESG} Disclosure: {A} Data-Driven Approach},
  booktitle    = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento,
                  Italy, December 15-18, 2023},
  pages        = {2884--2889},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigData59044.2023.10386467},
  doi          = {10.1109/BIGDATA59044.2023.10386467},
  timestamp    = {Fri, 02 Feb 2024 12:00:39 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/YimZTLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/XuCCZY23,
  author       = {Shiyuan Xu and
                  Yibo Cao and
                  Xue Chen and
                  Yanmin Zhao and
                  Siu{-}Ming Yiu},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Post-Quantum Public-Key Authenticated Searchable Encryption with Forward
                  Security: General Construction, and Applications},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  pages        = {274--298},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0942-7\_14},
  doi          = {10.1007/978-981-97-0942-7\_14},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/XuCCZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/0003JMYY23,
  author       = {Xingwei He and
                  A{-}Long Jin and
                  Jun Ma and
                  Yuan Yuan and
                  Siu Ming Yiu},
  editor       = {Houda Bouamor and
                  Juan Pino and
                  Kalika Bali},
  title        = {PivotFEC: Enhancing Few-shot Factual Error Correction with a Pivot
                  Task Approach using Large Language Models},
  booktitle    = {Findings of the Association for Computational Linguistics: {EMNLP}
                  2023, Singapore, December 6-10, 2023},
  pages        = {9960--9976},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.findings-emnlp.667},
  doi          = {10.18653/V1/2023.FINDINGS-EMNLP.667},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/0003JMYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/0003GJ0D0YD23,
  author       = {Xingwei He and
                  Yeyun Gong and
                  A{-}Long Jin and
                  Hang Zhang and
                  Anlei Dong and
                  Jian Jiao and
                  Siu{-}Ming Yiu and
                  Nan Duan},
  editor       = {Houda Bouamor and
                  Juan Pino and
                  Kalika Bali},
  title        = {{CAPSTONE:} Curriculum Sampling for Dense Retrieval with Document
                  Expansion},
  booktitle    = {Proceedings of the 2023 Conference on Empirical Methods in Natural
                  Language Processing, {EMNLP} 2023, Singapore, December 6-10, 2023},
  pages        = {10531--10541},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.emnlp-main.651},
  doi          = {10.18653/V1/2023.EMNLP-MAIN.651},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/0003GJ0D0YD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiZHYMW23,
  author       = {Junzuo Lai and
                  Gongxian Zeng and
                  Zhengan Huang and
                  Siu Ming Yiu and
                  Xin Mu and
                  Jian Weng},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Asymmetric Group Message Franking: Definitions and Constructions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14008},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30589-4\_3},
  doi          = {10.1007/978-3-031-30589-4\_3},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiZHYMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/Zhang0LHYLCS23,
  author       = {Qianru Zhang and
                  Zheng Wang and
                  Cheng Long and
                  Chao Huang and
                  Siu{-}Ming Yiu and
                  Yiding Liu and
                  Gao Cong and
                  Jieming Shi},
  title        = {Online Anomalous Subtrajectory Detection on Road Networks with Deep
                  Reinforcement Learning},
  booktitle    = {39th {IEEE} International Conference on Data Engineering, {ICDE} 2023,
                  Anaheim, CA, USA, April 3-7, 2023},
  pages        = {246--258},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDE55515.2023.00026},
  doi          = {10.1109/ICDE55515.2023.00026},
  timestamp    = {Thu, 27 Jul 2023 14:59:05 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/Zhang0LHYLCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/IpLLY23,
  author       = {Cheuk Yu Ip and
                  Fu Kay Frankie Li and
                  Yi Anson Lam and
                  Siu Ming Yiu},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Removing Noise (Opinion Messages) for Fake News Detection in Discussion
                  Forum Using {BERT} Model},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {78--95},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_5},
  doi          = {10.1007/978-3-031-56580-9\_5},
  timestamp    = {Fri, 19 Apr 2024 14:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/IpLLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/ZhangHXWYH23,
  author       = {Qianru Zhang and
                  Chao Huang and
                  Lianghao Xia and
                  Zheng Wang and
                  Siu Ming Yiu and
                  Ruihua Han},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Spatial-Temporal Graph Learning with Adversarial Contrastive Adaptation},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {41151--41163},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/zhang23p.html},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/ZhangHXWYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prcv/FangYDJJJLY23,
  author       = {Junbin Fang and
                  Zewei Yang and
                  Siyuan Dai and
                  You Jiang and
                  Canjian Jiang and
                  Zoe Lin Jiang and
                  Chuanyi Liu and
                  Siu{-}Ming Yiu},
  editor       = {Qingshan Liu and
                  Hanzi Wang and
                  Zhanyu Ma and
                  Weishi Zheng and
                  Hongbin Zha and
                  Xilin Chen and
                  Liang Wang and
                  Rongrong Ji},
  title        = {Cross-Task Physical Adversarial Attack Against Lane Detection System
                  Based on {LED} Illumination Modulation},
  booktitle    = {Pattern Recognition and Computer Vision - 6th Chinese Conference,
                  {PRCV} 2023, Xiamen, China, October 13-15, 2023, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14427},
  pages        = {478--491},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8435-0\_38},
  doi          = {10.1007/978-981-99-8435-0\_38},
  timestamp    = {Thu, 11 Jan 2024 22:28:04 +0100},
  biburl       = {https://dblp.org/rec/conf/prcv/FangYDJJJLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recomb/DuXYYS23,
  author       = {Bing{-}Xue Du and
                  Yi Xu and
                  Siu{-}Ming Yiu and
                  Hui Yu and
                  Jian{-}Yu Shi},
  editor       = {Haixu Tang},
  title        = {{MTGL-ADMET:} {A} Novel Multi-task Graph Learning Framework for {ADMET}
                  Prediction Enhanced by Status-Theory and Maximum Flow},
  booktitle    = {Research in Computational Molecular Biology - 27th Annual International
                  Conference, {RECOMB} 2023, Istanbul, Turkey, April 16-19, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13976},
  pages        = {85--103},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-29119-7\_6},
  doi          = {10.1007/978-3-031-29119-7\_6},
  timestamp    = {Sat, 13 May 2023 01:07:17 +0200},
  biburl       = {https://dblp.org/rec/conf/recomb/DuXYYS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ubisec/PunHY23,
  author       = {Tsz Ho Pun and
                  Yi Jun He and
                  Siu Ming Yiu},
  editor       = {Guojun Wang and
                  Haozhe Wang and
                  Geyong Min and
                  Nektarios Georgalas and
                  Weizhi Meng},
  title        = {Privacy-Preserving Blockchain-Based Traceability System with Decentralized
                  Ciphertext-Policy Attribute-Based Encryption},
  booktitle    = {Ubiquitous Security - Third International Conference, UbiSec 2023,
                  Exeter, UK, November 1-3, 2023, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {2034},
  pages        = {274--288},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1274-8\_18},
  doi          = {10.1007/978-981-97-1274-8\_18},
  timestamp    = {Thu, 25 Apr 2024 17:03:28 +0200},
  biburl       = {https://dblp.org/rec/conf/ubisec/PunHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ZhangHXWLY23,
  author       = {Qianru Zhang and
                  Chao Huang and
                  Lianghao Xia and
                  Zheng Wang and
                  Zhonghang Li and
                  Siu{-}Ming Yiu},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Automated Spatio-Temporal Graph Contrastive Learning},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {295--305},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583304},
  doi          = {10.1145/3543507.3583304},
  timestamp    = {Mon, 28 Aug 2023 21:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/www/ZhangHXWLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-12249,
  author       = {Junbin Fang and
                  You Jiang and
                  Canjian Jiang and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu and
                  Chuanyi Liu},
  title        = {State-of-the-art optical-based physical adversarial attacks for deep
                  learning computer vision systems},
  journal      = {CoRR},
  volume       = {abs/2303.12249},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.12249},
  doi          = {10.48550/ARXIV.2303.12249},
  eprinttype    = {arXiv},
  eprint       = {2303.12249},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-12249.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-16854,
  author       = {Xingwei He and
                  Zhenghao Lin and
                  Yeyun Gong and
                  A{-}Long Jin and
                  Hang Zhang and
                  Chen Lin and
                  Jian Jiao and
                  Siu Ming Yiu and
                  Nan Duan and
                  Weizhu Chen},
  title        = {AnnoLLM: Making Large Language Models to Be Better Crowdsourced Annotators},
  journal      = {CoRR},
  volume       = {abs/2303.16854},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.16854},
  doi          = {10.48550/ARXIV.2303.16854},
  eprinttype    = {arXiv},
  eprint       = {2303.16854},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-16854.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-03920,
  author       = {Qianru Zhang and
                  Chao Huang and
                  Lianghao Xia and
                  Zheng Wang and
                  Zhonghang Li and
                  Siu{-}Ming Yiu},
  title        = {Automated Spatio-Temporal Graph Contrastive Learning},
  journal      = {CoRR},
  volume       = {abs/2305.03920},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.03920},
  doi          = {10.48550/ARXIV.2305.03920},
  eprinttype    = {arXiv},
  eprint       = {2305.03920},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-03920.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-10683,
  author       = {Qianru Zhang and
                  Chao Huang and
                  Lianghao Xia and
                  Zheng Wang and
                  Siu{-}Ming Yiu and
                  Ruihua Han},
  title        = {Spatial-Temporal Graph Learning with Adversarial Contrastive Adaptation},
  journal      = {CoRR},
  volume       = {abs/2306.10683},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.10683},
  doi          = {10.48550/ARXIV.2306.10683},
  eprinttype    = {arXiv},
  eprint       = {2306.10683},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-10683.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-13294,
  author       = {Junbin Fang and
                  Canjian Jiang and
                  You Jiang and
                  Puxi Lin and
                  Zhaojie Chen and
                  Yujing Sun and
                  Siu{-}Ming Yiu and
                  Zoe Lin Jiang},
  title        = {Imperceptible Physical Attack against Face Recognition Systems via
                  {LED} Illumination Modulation},
  journal      = {CoRR},
  volume       = {abs/2307.13294},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.13294},
  doi          = {10.48550/ARXIV.2307.13294},
  eprinttype    = {arXiv},
  eprint       = {2307.13294},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-13294.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-07049,
  author       = {Xingwei He and
                  Qianru Zhang and
                  A{-}Long Jin and
                  Jun Ma and
                  Yuan Yuan and
                  Siu Ming Yiu},
  title        = {Improving Factual Error Correction by Learning to Inject Factual Errors},
  journal      = {CoRR},
  volume       = {abs/2312.07049},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.07049},
  doi          = {10.48550/ARXIV.2312.07049},
  eprinttype    = {arXiv},
  eprint       = {2312.07049},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-07049.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangJGZWFYW23,
  author       = {Peng Yang and
                  Zoe Lin Jiang and
                  Shiqi Gao and
                  Jiehang Zhuang and
                  Hongxiao Wang and
                  Junbin Fang and
                  Siu{-}Ming Yiu and
                  Yulin Wu},
  title        = {FssNN: Communication-Efficient Secure Neural Network Training via
                  Function Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/073},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YangJGZWFYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiZHYMW23,
  author       = {Junzuo Lai and
                  Gongxian Zeng and
                  Zhengan Huang and
                  Siu Ming Yiu and
                  Xin Mu and
                  Jian Weng},
  title        = {Asymmetric Group Message Franking: Definitions {\&} Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/332},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiZHYMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuCCYZ23,
  author       = {Shiyuan Xu and
                  Yibo Cao and
                  Xue Chen and
                  Siu{-}Ming Yiu and
                  Yanmin Zhao},
  title        = {Post-Quantum Public-key Authenticated Searchable Encryption with Forward
                  Security: General Construction, Implementation, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/591},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuCCYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuCCYY23,
  author       = {Shiyuan Xu and
                  Yibo Cao and
                  Xue Chen and
                  Yuer Yang and
                  Siu{-}Ming Yiu},
  title        = {Lattice-based Public Key Encryption with Authorized Keyword Search:
                  Construction, Implementation, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1715},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1715},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/XuCCYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZengHYH22,
  author       = {Gongxian Zeng and
                  Meiqi He and
                  Siu{-}Ming Yiu and
                  Zhengan Huang},
  title        = {A Self-Tallying Electronic Voting Based on Blockchain},
  journal      = {Comput. J.},
  volume       = {65},
  number       = {12},
  pages        = {3020--3034},
  year         = {2022},
  url          = {https://doi.org/10.1093/comjnl/bxab123},
  doi          = {10.1093/COMJNL/BXAB123},
  timestamp    = {Sat, 14 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZengHYH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/WuWSYJYW22,
  author       = {Yulin Wu and
                  Xuan Wang and
                  Willy Susilo and
                  Guomin Yang and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu and
                  Hao Wang},
  title        = {Generic server-aided secure multi-party computation in cloud computing},
  journal      = {Comput. Stand. Interfaces},
  volume       = {79},
  pages        = {103552},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2021.103552},
  doi          = {10.1016/J.CSI.2021.103552},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/WuWSYJYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GongCYT22,
  author       = {Yanan Gong and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Hing{-}Fung Ting},
  title        = {Sensitivity analysis for a Bitcoin simulation model},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301449},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301449},
  doi          = {10.1016/J.FSIDI.2022.301449},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GongCYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LaiKCYKWWMH22,
  author       = {Anthony Cheuk Tung Lai and
                  Ping Fan Ke and
                  Kelvin Chan and
                  Siu Ming Yiu and
                  Dongsun Kim and
                  Wai Kin Wong and
                  Shuai Wang and
                  Joseph Muppala and
                  Alan Ho},
  title        = {RansomSOC: {A} More Effective Security Operations Center to Detect
                  and Respond to Ransomware Attacks},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {63--75},
  year         = {2022},
  url          = {https://doi.org/10.22667/JISIS.2022.08.31.063},
  doi          = {10.22667/JISIS.2022.08.31.063},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/LaiKCYKWWMH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/HeY22,
  author       = {Xingwei He and
                  Siu{-}Ming Yiu},
  editor       = {Smaranda Muresan and
                  Preslav Nakov and
                  Aline Villavicencio},
  title        = {Controllable Dictionary Example Generation: Generating Example Sentences
                  for Specific Targeted Audiences},
  booktitle    = {Proceedings of the 60th Annual Meeting of the Association for Computational
                  Linguistics (Volume 1: Long Papers), {ACL} 2022, Dublin, Ireland,
                  May 22-27, 2022},
  pages        = {610--627},
  publisher    = {Association for Computational Linguistics},
  year         = {2022},
  url          = {https://doi.org/10.18653/v1/2022.acl-long.46},
  doi          = {10.18653/V1/2022.ACL-LONG.46},
  timestamp    = {Mon, 01 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/HeY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/CaiQYY22,
  author       = {Cailing Cai and
                  Xianrui Qin and
                  Tsz Hon Yuen and
                  Siu{-}Ming Yiu},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Tight Leakage-Resilient Identity-based Encryption under Multi-challenge
                  Setting},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {42--53},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517422},
  doi          = {10.1145/3488932.3517422},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/CaiQYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/0003GJQ00ZCYD22,
  author       = {Xingwei He and
                  Yeyun Gong and
                  A{-}Long Jin and
                  Weizhen Qi and
                  Hang Zhang and
                  Jian Jiao and
                  Bartuer Zhou and
                  Biao Cheng and
                  Siu{-}Ming Yiu and
                  Nan Duan},
  editor       = {Yoav Goldberg and
                  Zornitsa Kozareva and
                  Yue Zhang},
  title        = {Metric-guided Distillation: Distilling Knowledge from the Metric to
                  Ranker and Retriever for Generative Commonsense Reasoning},
  booktitle    = {Proceedings of the 2022 Conference on Empirical Methods in Natural
                  Language Processing, {EMNLP} 2022, Abu Dhabi, United Arab Emirates,
                  December 7-11, 2022},
  pages        = {839--852},
  publisher    = {Association for Computational Linguistics},
  year         = {2022},
  url          = {https://doi.org/10.18653/v1/2022.emnlp-main.53},
  doi          = {10.18653/V1/2022.EMNLP-MAIN.53},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/emnlp/0003GJQ00ZCYD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuWY22,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Towards Practical Homomorphic Time-Lock Puzzles: Applicability and
                  Verifiability},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  pages        = {424--443},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_21},
  doi          = {10.1007/978-3-031-17140-6\_21},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdis/JiangPFYLWYWF22,
  author       = {Zoe Lin Jiang and
                  Yijian Pan and
                  Maoshun Fan and
                  Lin Yao and
                  Yang Liu and
                  Yulin Wu and
                  Siu{-}Ming Yiu and
                  Xuan Wang and
                  Junbin Fang},
  title        = {Local Energy Trading Platform Based on Privacy-Preserving Blockchain
                  with Linkable Ring Signature},
  booktitle    = {4th International Conference on Data Intelligence and Security, {ICDIS}
                  2022, Shenzhen, China, August 24-26, 2022},
  pages        = {134--141},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDIS55630.2022.00028},
  doi          = {10.1109/ICDIS55630.2022.00028},
  timestamp    = {Wed, 04 Jan 2023 16:48:27 +0100},
  biburl       = {https://dblp.org/rec/conf/icdis/JiangPFYLWYWF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/GongCTY22,
  author       = {Yanan Gong and
                  Kam{-}Pui Chow and
                  Hing{-}Fung Ting and
                  Siu{-}Ming Yiu},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Analyzing the Error Rates of Bitcoin Clustering Heuristics},
  booktitle    = {Advances in Digital Forensics {XVIII} - 18th {IFIP} {WG} 11.9 International
                  Conference, Virtual Event, January 3-4, 2022, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {653},
  pages        = {187--205},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10078-9\_11},
  doi          = {10.1007/978-3-031-10078-9\_11},
  timestamp    = {Thu, 14 Jul 2022 17:45:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/GongCTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuWY22,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Making Private Function Evaluation Safer, Faster, and Simpler},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {349--378},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_13},
  doi          = {10.1007/978-3-030-97121-2\_13},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/ZhangWLY22,
  author       = {Qianru Zhang and
                  Zheng Wang and
                  Cheng Long and
                  Siu{-}Ming Yiu},
  editor       = {Arindam Banerjee and
                  Zhi{-}Hua Zhou and
                  Evangelos E. Papalexakis and
                  Matteo Riondato},
  title        = {On Predicting and Generating a Good Break Shot in Billiards Sports},
  booktitle    = {Proceedings of the 2022 {SIAM} International Conference on Data Mining,
                  {SDM} 2022, Alexandria, VA, USA, April 28-30, 2022},
  pages        = {109--117},
  publisher    = {{SIAM}},
  year         = {2022},
  url          = {https://doi.org/10.1137/1.9781611977172.13},
  doi          = {10.1137/1.9781611977172.13},
  timestamp    = {Sat, 30 Sep 2023 09:55:58 +0200},
  biburl       = {https://dblp.org/rec/conf/sdm/ZhangWLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ZhaoWYLW22,
  author       = {Yanmin Zhao and
                  Yang Wang and
                  Siu Ming Yiu and
                  Yu Liu and
                  Meiqin Wang},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {A Hierarchical Watermarking Scheme for PRFs from Standard Lattice
                  Assumptions},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {24--51},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_2},
  doi          = {10.1007/978-3-031-29504-1\_2},
  timestamp    = {Tue, 02 May 2023 15:31:34 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ZhaoWYLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaiYY22,
  author       = {Cailing Cai and
                  Tsz Hon Yuen and
                  Siu{-}Ming Yiu},
  title        = {Hash Proof System with Auxiliary Inputs and Its Application},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {52--59},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00018},
  doi          = {10.1109/TRUSTCOM56396.2022.00018},
  timestamp    = {Mon, 27 Mar 2023 16:44:39 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaiYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShenCLLJLDJFJY22,
  author       = {Yixuan Shen and
                  Yu Cheng and
                  Yini Lin and
                  Sicheng Long and
                  Canjian Jiang and
                  Danjie Li and
                  Siyuan Dai and
                  You Jiang and
                  Junbin Fang and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu},
  title        = {{MLIA:} modulated {LED} illumination-based adversarial attack on traffic
                  sign recognition system for autonomous vehicle},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {1020--1027},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00139},
  doi          = {10.1109/TRUSTCOM56396.2022.00139},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShenCLLJLDJFJY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-05825,
  author       = {Zoe Lin Jiang and
                  Jiajing Gu and
                  Hongxiao Wang and
                  Yulin Wu and
                  Junbin Fang and
                  Siu{-}Ming Yiu and
                  Wenjian Luo and
                  Xuan Wang},
  title        = {Privacy-Preserving Distributed Machine Learning Made Faster},
  journal      = {CoRR},
  volume       = {abs/2205.05825},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.05825},
  doi          = {10.48550/ARXIV.2205.05825},
  eprinttype    = {arXiv},
  eprint       = {2205.05825},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-05825.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-14452,
  author       = {Yiqi Deng and
                  Siu Ming Yiu},
  title        = {Deep Multiple Instance Learning For Forecasting Stock Trends Using
                  Financial News},
  journal      = {CoRR},
  volume       = {abs/2206.14452},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.14452},
  doi          = {10.48550/ARXIV.2206.14452},
  eprinttype    = {arXiv},
  eprint       = {2206.14452},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-14452.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-11708,
  author       = {Xingwei He and
                  Yeyun Gong and
                  A{-}Long Jin and
                  Weizhen Qi and
                  Hang Zhang and
                  Jian Jiao and
                  Bartuer Zhou and
                  Biao Cheng and
                  Siu{-}Ming Yiu and
                  Nan Duan},
  title        = {Metric-guided Distillation: Distilling Knowledge from the Metric to
                  Ranker and Retriever for Generative Commonsense Reasoning},
  journal      = {CoRR},
  volume       = {abs/2210.11708},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.11708},
  doi          = {10.48550/ARXIV.2210.11708},
  eprinttype    = {arXiv},
  eprint       = {2210.11708},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-11708.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-08415,
  author       = {Qianru Zhang and
                  Zheng Wang and
                  Cheng Long and
                  Chao Huang and
                  Siu{-}Ming Yiu and
                  Yiding Liu and
                  Gao Cong and
                  Jieming Shi},
  title        = {Online Anomalous Subtrajectory Detection on Road Networks with Deep
                  Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/2211.08415},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.08415},
  doi          = {10.48550/ARXIV.2211.08415},
  eprinttype    = {arXiv},
  eprint       = {2211.08415},
  timestamp    = {Sun, 07 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-08415.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-09353,
  author       = {Hongxiao Wang and
                  Zoe Lin Jiang and
                  Yanmin Zhao and
                  Siu{-}Ming Yiu and
                  Peng Yang and
                  Zejiu Tan and
                  Bohan Jin and
                  Shiyuan Xu and
                  Shimin Pan},
  title        = {Securer and Faster Privacy-Preserving Distributed Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2211.09353},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.09353},
  doi          = {10.48550/ARXIV.2211.09353},
  eprinttype    = {arXiv},
  eprint       = {2211.09353},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-09353.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-09114,
  author       = {Xingwei He and
                  Yeyun Gong and
                  A{-}Long Jin and
                  Hang Zhang and
                  Anlei Dong and
                  Jian Jiao and
                  Siu{-}Ming Yiu and
                  Nan Duan},
  title        = {Curriculum Sampling for Dense Retrieval with Document Expansion},
  journal      = {CoRR},
  volume       = {abs/2212.09114},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.09114},
  doi          = {10.48550/ARXIV.2212.09114},
  eprinttype    = {arXiv},
  eprint       = {2212.09114},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-09114.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWY22,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  title        = {Towards Practical Homomorphic Time-Lock Puzzles: Applicability and
                  Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/585},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangLYDZJ21,
  author       = {En Zhang and
                  Ming Li and
                  Siu{-}Ming Yiu and
                  Jiao Du and
                  Jun{-}Zhe Zhu and
                  Ganggang Jin},
  title        = {Fair hierarchical secret sharing scheme based on smart contract},
  journal      = {Inf. Sci.},
  volume       = {546},
  pages        = {166--176},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2020.07.032},
  doi          = {10.1016/J.INS.2020.07.032},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangLYDZJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangJLY21,
  author       = {Jun Zhang and
                  Zoe Lin Jiang and
                  Ping Li and
                  Siu{-}Ming Yiu},
  title        = {Privacy-preserving multikey computing framework for encrypted data
                  in the cloud},
  journal      = {Inf. Sci.},
  volume       = {575},
  pages        = {217--230},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2021.06.017},
  doi          = {10.1016/J.INS.2021.06.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangJLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ChenLHGYJ21,
  author       = {Wenbin Chen and
                  Jin Li and
                  Zhengan Huang and
                  Chongzhi Gao and
                  Siu{-}Ming Yiu and
                  Zoe Lin Jiang},
  title        = {Lattice-based unidirectional infinite-use proxy re-signatures with
                  private re-signature key},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {120},
  pages        = {137--148},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jcss.2021.03.008},
  doi          = {10.1016/J.JCSS.2021.03.008},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/ChenLHGYJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/LiuLYY21,
  author       = {Zheli Liu and
                  Jin Li and
                  Ilsun You and
                  Siu{-}Ming Yiu},
  title        = {Editorial: Security and Privacy in Computing and Communications},
  journal      = {Mob. Networks Appl.},
  volume       = {26},
  number       = {4},
  pages        = {1407--1411},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11036-020-01683-4},
  doi          = {10.1007/S11036-020-01683-4},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/LiuLYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/GuoHYYLLYC21,
  author       = {Xiaojie Guo and
                  Yanyu Huang and
                  Jinhui Ye and
                  Sijie Yin and
                  Min Li and
                  Zhaohui Li and
                  Siu{-}Ming Yiu and
                  Xiaochun Cheng},
  title        = {ShadowFPE: New Encrypted Web Application Solution Based on Shadow
                  {DOM}},
  journal      = {Mob. Networks Appl.},
  volume       = {26},
  number       = {4},
  pages        = {1733--1746},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11036-019-01509-y},
  doi          = {10.1007/S11036-019-01509-Y},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/GuoHYYLLYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/quanbio/YanZYS21,
  author       = {Xiao{-}Ying Yan and
                  Shaowu Zhang and
                  Siu{-}Ming Yiu and
                  Jian{-}Yu Shi},
  title        = {Interpretable prediction of drug-cell line response by triple matrix
                  factorization},
  journal      = {Quant. Biol.},
  volume       = {9},
  number       = {4},
  pages        = {426--439},
  year         = {2021},
  url          = {https://doi.org/10.15302/j-qb-021-0259},
  doi          = {10.15302/J-QB-021-0259},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/quanbio/YanZYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/DingZ0LWYG21,
  author       = {Yaoling Ding and
                  Liehuang Zhu and
                  An Wang and
                  Yuan Li and
                  Yongjuan Wang and
                  Siu Ming Yiu and
                  Keke Gai},
  title        = {A Multiple Sieve Approach Based on Artificial Intelligent Techniques
                  and Correlation Power Analysis},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {17},
  number       = {2s},
  pages        = {71:1--71:21},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433165},
  doi          = {10.1145/3433165},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/DingZ0LWYG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vc/SunXY21,
  author       = {Yujing Sun and
                  Hao Xiong and
                  Siu{-}Ming Yiu},
  title        = {Understanding deep face anti-spoofing: from the perspective of data},
  journal      = {Vis. Comput.},
  volume       = {37},
  number       = {5},
  pages        = {1015--1028},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00371-020-01849-x},
  doi          = {10.1007/S00371-020-01849-X},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vc/SunXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/LiuXGYLT21,
  author       = {Chang Liu and
                  Gang Xiong and
                  Gaopeng Gou and
                  Siu{-}Ming Yiu and
                  Zhen Li and
                  Zhihong Tian},
  title        = {Classifying encrypted traffic using adaptive fingerprints with multi-level
                  attributes},
  journal      = {World Wide Web},
  volume       = {24},
  number       = {6},
  pages        = {2071--2097},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11280-021-00940-0},
  doi          = {10.1007/S11280-021-00940-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/www/LiuXGYLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FanWLLYW21,
  author       = {Yanhong Fan and
                  Weijia Wang and
                  Zhihu Li and
                  Zhenyu Lu and
                  Siu{-}Ming Yiu and
                  Meiqin Wang},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Forced Independent Optimized Implementation of 4-Bit S-Box},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {151--170},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_8},
  doi          = {10.1007/978-3-030-90567-5\_8},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FanWLLYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiuWY21,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  editor       = {Kazue Sako and
                  Nils Ole Tippenhauer},
  title        = {Blind Polynomial Evaluation and Data Trading},
  booktitle    = {Applied Cryptography and Network Security - 19th International Conference,
                  {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12726},
  pages        = {100--129},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78372-3\_5},
  doi          = {10.1007/978-3-030-78372-3\_5},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiuWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuWY21,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  editor       = {Yu Yu and
                  Moti Yung},
  title        = {Improved Zero-Knowledge Argument of Encrypted Extended Permutation},
  booktitle    = {Information Security and Cryptology - 17th International Conference,
                  Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13007},
  pages        = {281--298},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88323-2\_15},
  doi          = {10.1007/978-3-030-88323-2\_15},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/WenYH21,
  author       = {Jing Wen and
                  Siu{-}Ming Yiu and
                  Lucas C. K. Hui},
  title        = {Defending Against Model Inversion Attack by Adversarial Examples},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2021, Rhodes, Greece, July 26-28, 2021},
  pages        = {551--556},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSR51186.2021.9527945},
  doi          = {10.1109/CSR51186.2021.9527945},
  timestamp    = {Thu, 23 Sep 2021 14:18:07 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/WenYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/YauCY21,
  author       = {Ken Yau and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu},
  editor       = {Jason Staggs and
                  Sujeet Shenoi},
  title        = {Detecting Anomalous Programmable Logic Controller Events Using Process
                  Mining},
  booktitle    = {Critical Infrastructure Protection {XV} - 15th {IFIP} {WG} 11.10 International
                  Conference, {ICCIP} 2021, Virtual Event, March 15-16, 2021, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {636},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93511-5\_6},
  doi          = {10.1007/978-3-030-93511-5\_6},
  timestamp    = {Wed, 09 Mar 2022 16:41:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/YauCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ZhangYLSY21,
  author       = {Ke Zhang and
                  Carl Yang and
                  Xiaoxiao Li and
                  Lichao Sun and
                  Siu{-}Ming Yiu},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Subgraph Federated Learning with Missing Neighbor Generation},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {6671--6682},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/34adeb8e3242824038aa65460a47c29e-Abstract.html},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/ZhangYLSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/NiuLWWY21,
  author       = {Chao Niu and
                  Muzhou Li and
                  Meiqin Wang and
                  Qingju Wang and
                  Siu{-}Ming Yiu},
  editor       = {Riham AlTawy and
                  Andreas H{\"{u}}lsing},
  title        = {Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round
                  TweAES},
  booktitle    = {Selected Areas in Cryptography - 28th International Conference, {SAC}
                  2021, Virtual Event, September 29 - October 1, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13203},
  pages        = {223--245},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-99277-4\_11},
  doi          = {10.1007/978-3-030-99277-4\_11},
  timestamp    = {Fri, 01 Apr 2022 15:49:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/NiuLWWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-13430,
  author       = {Ke Zhang and
                  Carl Yang and
                  Xiaoxiao Li and
                  Lichao Sun and
                  Siu{-}Ming Yiu},
  title        = {Subgraph Federated Learning with Missing Neighbor Generation},
  journal      = {CoRR},
  volume       = {abs/2106.13430},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.13430},
  eprinttype    = {arXiv},
  eprint       = {2106.13430},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-13430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWY21,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  title        = {Blind Polynomial Evaluation and Data Trading},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/413},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NiuLWWY21,
  author       = {Chao Niu and
                  Muzhou Li and
                  Meiqin Wang and
                  Qingju Wang and
                  Siu{-}Ming Yiu},
  title        = {Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round
                  TweAES},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1310},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1310},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NiuLWWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWY21a,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  title        = {Improved Zero-Knowledge Argument of Encrypted Extended Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1430},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1430},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWY21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWY21b,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  title        = {Making Private Function Evaluation Safer, Faster, and Simpler},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1682},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1682},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWY21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20,
  author       = {Raphael C.{-}W. Phan and
                  Masayuki Abe and
                  Lynn Batten and
                  Jung Hee Cheon and
                  Ed Dawson and
                  Steven D. Galbraith and
                  Jian Guo and
                  Lucas C. K. Hui and
                  Kwangjo Kim and
                  Xuejia Lai and
                  Dong Hoon Lee and
                  Mitsuru Matsui and
                  Tsutomu Matsumoto and
                  Shiho Moriai and
                  Phong Q. Nguyen and
                  Dingyi Pei and
                  Duong Hieu Phan and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Hank Wolfe and
                  Duncan S. Wong and
                  Tzong{-}Chen Wu and
                  Bo{-}Yin Yang and
                  Siu{-}Ming Yiu and
                  Yu Yu and
                  Jianying Zhou},
  title        = {Advances in security research in the Asiacrypt region},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {4},
  pages        = {76--81},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378428},
  doi          = {10.1145/3378428},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FangXLCLLJY20,
  author       = {Junbin Fang and
                  Guikai Xi and
                  Rong Li and
                  Qian Chen and
                  Puxi Lin and
                  Sijin Li and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu},
  title        = {Coarse-to-fine two-stage semantic video carving approach in digital
                  forensics},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101942},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101942},
  doi          = {10.1016/J.COSE.2020.101942},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FangXLCLLJY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangCYHAF20,
  author       = {Eric Ke Wang and
                  Chien{-}Ming Chen and
                  Siu{-}Ming Yiu and
                  Mohammad Mehedi Hassan and
                  Majed A. AlRubaian and
                  Giancarlo Fortino},
  title        = {Incentive evolutionary game model for opportunistic social networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {102},
  pages        = {14--29},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.07.034},
  doi          = {10.1016/J.FUTURE.2019.07.034},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangCYHAF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JiangGJLWLFYW20,
  author       = {Zoe Lin Jiang and
                  Ning Guo and
                  Yabin Jin and
                  Jiazhuo Lv and
                  Yulin Wu and
                  Zechao Liu and
                  Junbin Fang and
                  Siu{-}Ming Yiu and
                  Xuan Wang},
  title        = {Efficient two-party privacy-preserving collaborative \emph{k}-means
                  clustering protocol supporting both storage and computation outsourcing},
  journal      = {Inf. Sci.},
  volume       = {518},
  pages        = {168--180},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.12.051},
  doi          = {10.1016/J.INS.2019.12.051},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/JiangGJLWLFYW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/WongY20,
  author       = {Shing Ki Wong and
                  Siu{-}Ming Yiu},
  title        = {Identification of device motion status via Bluetooth discovery},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {59--69},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.11.30.059},
  doi          = {10.22667/JISIS.2020.11.30.059},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/WongY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WongY20,
  author       = {Shing Ki Wong and
                  Siu{-}Ming Yiu},
  title        = {Location spoofing attack detection with pre-installed sensors in mobile
                  devices},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {4},
  pages        = {16--30},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.12.31.016},
  doi          = {10.22667/JOWUA.2020.12.31.016},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/WongY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/HuangLLLYBG20,
  author       = {Yanyu Huang and
                  Bo Li and
                  Zheli Liu and
                  Jin Li and
                  Siu{-}Ming Yiu and
                  Thar Baker and
                  Brij B. Gupta},
  title        = {ThinORAM: Towards Practical Oblivious Data Access in Fog Computing
                  Environment},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {13},
  number       = {4},
  pages        = {602--612},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSC.2019.2962110},
  doi          = {10.1109/TSC.2019.2962110},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/HuangLLLYBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CaiYCWY20,
  author       = {Cailing Cai and
                  Tsz Hon Yuen and
                  Handong Cui and
                  Mingli Wu and
                  Siu{-}Ming Yiu},
  editor       = {Yongdong Wu and
                  Moti Yung},
  title        = {{LPPRS:} New Location Privacy Preserving Schemes Based on Ring Signature
                  over Mobile Social Networks},
  booktitle    = {Information Security and Cryptology - 16th International Conference,
                  Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12612},
  pages        = {288--303},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-71852-7\_19},
  doi          = {10.1007/978-3-030-71852-7\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CaiYCWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuWY20,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  editor       = {Yongdong Wu and
                  Moti Yung},
  title        = {An Improvement of Multi-exponentiation with Encrypted Bases Argument:
                  Smaller and Faster},
  booktitle    = {Information Security and Cryptology - 16th International Conference,
                  Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12612},
  pages        = {397--414},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-71852-7\_27},
  doi          = {10.1007/978-3-030-71852-7\_27},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ZhangYJ20,
  author       = {Jun Zhang and
                  Siu{-}Ming Yiu and
                  Zoe Lin Jiang},
  editor       = {Meikang Qiu},
  title        = {Outsourced Privacy-Preserving Reduced {SVM} Among Multiple Institutions},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 20th International
                  Conference, {ICA3PP} 2020, New York City, NY, USA, October 2-4, 2020,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12453},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60239-0\_9},
  doi          = {10.1007/978-3-030-60239-0\_9},
  timestamp    = {Tue, 12 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ZhangYJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/ChenZY20,
  author       = {Yuechen Chen and
                  Linru Zhang and
                  Siu{-}Ming Yiu},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {Decentralized Multi-Client Attribute Based Functional Encryption},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {118--129},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009824701180129},
  doi          = {10.5220/0009824701180129},
  timestamp    = {Wed, 29 Jul 2020 16:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/ChenZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangWCY20,
  author       = {Linru Zhang and
                  Xiangning Wang and
                  Yuechen Chen and
                  Siu{-}Ming Yiu},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval
                  Model},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {565--587},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_32},
  doi          = {10.1007/978-3-030-61078-4\_32},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangWCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/YauCY20,
  author       = {Ken Yau and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Detecting Attacks on a Water Treatment System Using Oneclass Support
                  Vector Machines},
  booktitle    = {Advances in Digital Forensics {XVI} - 16th {IFIP} {WG} 11.9 International
                  Conference, New Delhi, India, January 6-8, 2020, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {589},
  pages        = {95--108},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56223-6\_6},
  doi          = {10.1007/978-3-030-56223-6\_6},
  timestamp    = {Thu, 17 Sep 2020 14:12:05 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/YauCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/WeiCY20,
  author       = {Yichen Wei and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised
                  Learning},
  booktitle    = {Advances in Digital Forensics {XVI} - 16th {IFIP} {WG} 11.9 International
                  Conference, New Delhi, India, January 6-8, 2020, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {589},
  pages        = {273--290},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56223-6\_15},
  doi          = {10.1007/978-3-030-56223-6\_15},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/WeiCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/WangY20a,
  author       = {Xin Wang and
                  Siu{-}Ming Yiu},
  editor       = {Christian Bessiere},
  title        = {Classification with Rejection: Scaling Generative Classifiers with
                  Supervised Deep Infomax},
  booktitle    = {Proceedings of the Twenty-Ninth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2020},
  pages        = {2980--2986},
  publisher    = {ijcai.org},
  year         = {2020},
  url          = {https://doi.org/10.24963/ijcai.2020/412},
  doi          = {10.24963/IJCAI.2020/412},
  timestamp    = {Mon, 20 Jul 2020 12:38:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/WangY20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/ZhangYH20,
  author       = {Ke Zhang and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  title        = {A Light-Weight Crowdsourcing Aggregation in Privacy-Preserving Federated
                  Learning System},
  booktitle    = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020,
                  Glasgow, United Kingdom, July 19-24, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IJCNN48605.2020.9206841},
  doi          = {10.1109/IJCNN48605.2020.9206841},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/ZhangYH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ZhangWCY20,
  author       = {Linru Zhang and
                  Xiangning Wang and
                  Yuechen Chen and
                  Siu{-}Ming Yiu},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Adaptive-Secure Identity-Based Inner-Product Functional Encryption
                  and Its Leakage-Resilience},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {666--690},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_30},
  doi          = {10.1007/978-3-030-65277-7\_30},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ZhangWCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcom/ZhangJLY20,
  author       = {Jun Zhang and
                  Zoe Lin Jiang and
                  Ping Li and
                  Siu{-}Ming Yiu},
  editor       = {Meikang Qiu},
  title        = {Privacy-Preserving Computing Framework for Encrypted Data Under Multiple
                  Keys},
  booktitle    = {Smart Computing and Communication - 5th International Conference,
                  SmartCom 2020, Paris, France, December 29-31, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12608},
  pages        = {215--225},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-74717-6\_23},
  doi          = {10.1007/978-3-030-74717-6\_23},
  timestamp    = {Tue, 12 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcom/ZhangJLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WongY20,
  author       = {Shing Ki Wong and
                  Siu{-}Ming Yiu},
  editor       = {Ilsun You},
  title        = {Detection on {GPS} Spoofing in Location Based Mobile Games},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {215--226},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_17},
  doi          = {10.1007/978-3-030-65299-9\_17},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/WongY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/CongYWY20,
  author       = {Mingshu Cong and
                  Han Yu and
                  Xi Weng and
                  Siu{-}Ming Yiu},
  editor       = {Qiang Yang and
                  Lixin Fan and
                  Han Yu},
  title        = {A Game-Theoretic Framework for Incentive Mechanism Design in Federated
                  Learning},
  booktitle    = {Federated Learning - Privacy and Incentive},
  series       = {Lecture Notes in Computer Science},
  volume       = {12500},
  pages        = {205--222},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63076-8\_15},
  doi          = {10.1007/978-3-030-63076-8\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/CongYWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-12543,
  author       = {Tsong Yueh Chen and
                  S. C. Cheung and
                  Siu{-}Ming Yiu},
  title        = {Metamorphic Testing: {A} New Approach for Generating Next Test Cases},
  journal      = {CoRR},
  volume       = {abs/2002.12543},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.12543},
  eprinttype    = {arXiv},
  eprint       = {2002.12543},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-12543.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-14780,
  author       = {Mingshu Cong and
                  Xi Weng and
                  Han Yu and
                  Jiabao Qu and
                  Siu{-}Ming Yiu},
  title        = {Optimal Procurement Auction for Cooperative Production of Virtual
                  Products: Vickrey-Clarke-Groves Meet Cremer-McLean},
  journal      = {CoRR},
  volume       = {abs/2007.14780},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.14780},
  eprinttype    = {arXiv},
  eprint       = {2007.14780},
  timestamp    = {Mon, 03 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-14780.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-06680,
  author       = {Mingshu Cong and
                  Han Yu and
                  Xi Weng and
                  Jiabao Qu and
                  Yang Liu and
                  Siu{-}Ming Yiu},
  title        = {A VCG-based Fair Incentive Mechanism for Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2008.06680},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.06680},
  eprinttype    = {arXiv},
  eprint       = {2008.06680},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-06680.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWY20,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  title        = {An Improvement of Multi-Exponentiation with Encrypted Bases Argument:
                  Smaller and Faster},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/567},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangWCY20,
  author       = {Linru Zhang and
                  Xiangning Wang and
                  Yuechen Chen and
                  Siu{-}Ming Yiu},
  title        = {Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {884},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/884},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangWCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangWCY20a,
  author       = {Linru Zhang and
                  Xiangning Wang and
                  Yuechen Chen and
                  Siu{-}Ming Yiu},
  title        = {Adaptive-secure identity-based inner-product functional encryption
                  and its leakage-resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1353},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1353},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangWCY20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/LiJYWYH19,
  author       = {Ye Li and
                  Zoe Lin Jiang and
                  Lin Yao and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Zhengan Huang},
  title        = {Outsourced privacy-preserving {C4.5} decision tree algorithm over
                  horizontally and vertically partitioned dataset among multiple parties},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Suppl 1},
  pages        = {1581--1593},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-017-1019-9},
  doi          = {10.1007/S10586-017-1019-9},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/LiJYWYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmpb/ShiLMCLLY19,
  author       = {Jian{-}Yu Shi and
                  Jia{-}Xin Li and
                  Kui{-}Tao Mao and
                  Jiang{-}Bo Cao and
                  Peng Lei and
                  Hui{-}Meng Lu and
                  Siu{-}Ming Yiu},
  title        = {Predicting combinative drug pairs via multiple classifier system with
                  positive samples only},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {168},
  pages        = {1--10},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cmpb.2018.11.002},
  doi          = {10.1016/J.CMPB.2018.11.002},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cmpb/ShiLMCLLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiLYGX19,
  author       = {Xuan Li and
                  Jin Li and
                  Siu{-}Ming Yiu and
                  Chongzhi Gao and
                  Jinbo Xiong},
  title        = {Privacy-preserving edge-assisted image retrieval and classification
                  in IoT},
  journal      = {Frontiers Comput. Sci.},
  volume       = {13},
  number       = {5},
  pages        = {1136--1147},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11704-018-8067-z},
  doi          = {10.1007/S11704-018-8067-Z},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiLYGX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiHLLTY19,
  author       = {Bo Li and
                  Yanyu Huang and
                  Zheli Liu and
                  Jin Li and
                  Zhihong Tian and
                  Siu{-}Ming Yiu},
  title        = {HybridORAM: Practical oblivious cloud storage with constant bandwidth},
  journal      = {Inf. Sci.},
  volume       = {479},
  pages        = {651--663},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.02.019},
  doi          = {10.1016/J.INS.2018.02.019},
  timestamp    = {Thu, 01 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiHLLTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcheminf/ShiMYY19,
  author       = {Jian{-}Yu Shi and
                  Kui{-}Tao Mao and
                  Hui Yu and
                  Siu{-}Ming Yiu},
  title        = {Detecting drug communities and predicting comprehensive drug-drug
                  interactions via balance regularized semi-nonnegative matrix factorization},
  journal      = {J. Cheminformatics},
  volume       = {11},
  number       = {1},
  pages        = {28:1--28:16},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13321-019-0352-9},
  doi          = {10.1186/S13321-019-0352-9},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcheminf/ShiMYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WongY19,
  author       = {Shing Ki Wong and
                  Siu{-}Ming Yiu},
  title        = {Detection on auto clickers in mobile games},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {3},
  pages        = {65--80},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.09.30.065},
  doi          = {10.22667/JOWUA.2019.09.30.065},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WongY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nle/LiangYZY19,
  author       = {Yuzhi Liang and
                  Min Yang and
                  Jia Zhu and
                  Siu{-}Ming Yiu},
  title        = {Out-domain Chinese new word detection with statistics-based character
                  embedding},
  journal      = {Nat. Lang. Eng.},
  volume       = {25},
  number       = {2},
  pages        = {239--255},
  year         = {2019},
  url          = {https://doi.org/10.1017/S1351324918000463},
  doi          = {10.1017/S1351324918000463},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nle/LiangYZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/YeungHCYZC19,
  author       = {Cheuk Yu Yeung and
                  Lucas Chi Kwong Hui and
                  Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Gongxian Zeng and
                  Jingyue Chen},
  title        = {Anonymous Counting Problem in Trust Level Warning System for {VANET}},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {68},
  number       = {1},
  pages        = {34--48},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVT.2018.2884899},
  doi          = {10.1109/TVT.2018.2884899},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/YeungHCYZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/ZhangCZHY19,
  author       = {Linru Zhang and
                  Yuechen Chen and
                  Jun Zhang and
                  Meiqi He and
                  Siu{-}Ming Yiu},
  editor       = {Claude Carlet and
                  Sylvain Guilley and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {From Quadratic Functions to Polynomials: Generic Functional Encryption
                  from Standard Assumptions},
  booktitle    = {Codes, Cryptology and Information Security - Third International Conference,
                  {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor
                  of Said El Hajji},
  series       = {Lecture Notes in Computer Science},
  volume       = {11445},
  pages        = {142--167},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16458-4\_10},
  doi          = {10.1007/978-3-030-16458-4\_10},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/ZhangCZHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvcbt/SunXYL19,
  author       = {Yujing Sun and
                  Hao Xiong and
                  Siu{-}Ming Yiu and
                  Kwok{-}Yan Lam},
  title        = {BitVis: An Interactive Visualization System for Bitcoin Accounts Analysis},
  booktitle    = {Crypto Valley Conference on Blockchain Technology, {CVCBT} 2019, Rotkreuz,
                  Switzerland, June 24-26, 2019},
  pages        = {21--25},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CVCBT.2019.000-3},
  doi          = {10.1109/CVCBT.2019.000-3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvcbt/SunXYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/ZhangZCCYL19,
  author       = {Linru Zhang and
                  Gongxian Zeng and
                  Yuechen Chen and
                  Nairen Cao and
                  Siu{-}Ming Yiu and
                  Zheli Liu},
  editor       = {Mohammad S. Obaidat and
                  Pierangela Samarati},
  title        = {{OC-ORAM:} Constant Bandwidth {ORAM} with Smaller Block Size using
                  Oblivious Clear Algorithm},
  booktitle    = {Proceedings of the 16th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
                  Czech Republic, July 26-28, 2019},
  pages        = {149--160},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007924701490160},
  doi          = {10.5220/0007924701490160},
  timestamp    = {Tue, 06 Jun 2023 14:58:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/ZhangZCCYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/YauCY19,
  author       = {Ken Yau and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu},
  editor       = {Jason Staggs and
                  Sujeet Shenoi},
  title        = {An Incident Response Model for Industrial Control System Forensics
                  Based on Historical Events},
  booktitle    = {Critical Infrastructure Protection {XIII} - 13th {IFIP} {WG} 11.10
                  International Conference, {ICCIP} 2019, Arlington, VA, USA, March
                  11-12, 2019, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {570},
  pages        = {311--328},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34647-8\_16},
  doi          = {10.1007/978-3-030-34647-8\_16},
  timestamp    = {Tue, 19 Nov 2019 10:46:31 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/YauCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/YuenY19,
  author       = {Tsz Hon Yuen and
                  Siu{-}Ming Yiu},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {Strong Known Related-Key Attacks and the Security of {ECDSA}},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_8},
  doi          = {10.1007/978-3-030-36938-5\_8},
  timestamp    = {Wed, 17 Aug 2022 14:30:35 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/YuenY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZengHY19,
  author       = {Gongxian Zeng and
                  Meiqi He and
                  Siu{-}Ming Yiu},
  editor       = {Ilsun You},
  title        = {A Secure and Self-tallying E-voting System Based on Blockchain},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {67--76},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_6},
  doi          = {10.1007/978-3-030-39303-8\_6},
  timestamp    = {Tue, 28 Jan 2020 10:04:20 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ZengHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingWY19,
  author       = {Yaoling Ding and
                  An Wang and
                  Siu{-}Ming Yiu},
  title        = {An Intelligent Multiple Sieve Method Based on Genetic Algorithm and
                  Correlation Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/189},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DingWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZY19,
  author       = {Yuechen Chen and
                  Linru Zhang and
                  Siu{-}Ming Yiu},
  title        = {Practical Attribute Based Inner Product Functional Encryption from
                  Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {846},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/846},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/ShiHZCY18,
  author       = {Jianyu Shi and
                  Hua Huang and
                  Yan{-}Ning Zhang and
                  Jiang{-}Bo Cao and
                  Siu{-}Ming Yiu},
  title        = {{BMCMDA:} a novel model for predicting human microbe-disease associations
                  via binary matrix completion},
  journal      = {{BMC} Bioinform.},
  volume       = {19-S},
  number       = {9},
  pages        = {169--176},
  year         = {2018},
  url          = {https://doi.org/10.1186/s12859-018-2274-3},
  doi          = {10.1186/S12859-018-2274-3},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/ShiHZCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/ShiHLLZDY18,
  author       = {Jian{-}Yu Shi and
                  Hua Huang and
                  Jia{-}Xin Li and
                  Peng Lei and
                  Yan{-}Ning Zhang and
                  Kai Dong and
                  Siu{-}Ming Yiu},
  title        = {{TMFUF:} a triple matrix factorization-based unified framework for
                  predicting comprehensive drug-drug interactions of new drugs},
  journal      = {{BMC} Bioinform.},
  volume       = {19-S},
  number       = {14},
  pages        = {27--37},
  year         = {2018},
  url          = {https://doi.org/10.1186/s12859-018-2379-8},
  doi          = {10.1186/S12859-018-2379-8},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/ShiHLLZDY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcsb/YuMSHCDY18,
  author       = {Hui Yu and
                  Kui{-}Tao Mao and
                  Jian{-}Yu Shi and
                  Hua Huang and
                  Zhi Chen and
                  Kai Dong and
                  Siu{-}Ming Yiu},
  title        = {Predicting and understanding comprehensive drug-drug interactions
                  via semi-nonnegative matrix factorization},
  journal      = {{BMC} Syst. Biol.},
  volume       = {12},
  number       = {1},
  pages        = {101--110},
  year         = {2018},
  url          = {https://doi.org/10.1186/s12918-018-0532-7},
  doi          = {10.1186/S12918-018-0532-7},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bmcsb/YuMSHCDY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/WuHNZYF18,
  author       = {Xianyan Wu and
                  Qi Han and
                  Xiamu Niu and
                  Hongli Zhang and
                  Siu{-}Ming Yiu and
                  Jun{-}bin Fang},
  title        = {{JPEG} image width estimation for file carving},
  journal      = {{IET} Image Process.},
  volume       = {12},
  number       = {7},
  pages        = {1245--1252},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ipr.2016.0531},
  doi          = {10.1049/IET-IPR.2016.0531},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/WuHNZYF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/LiWJY18,
  author       = {Ye Li and
                  Xuan Wang and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu},
  title        = {Outsourcing privacy-preserving {ID3} decision tree over horizontally
                  partitioned data for multiple parties},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {12},
  number       = {2},
  pages        = {207--215},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJHPCN.2016.10004531},
  doi          = {10.1504/IJHPCN.2016.10004531},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/LiWJY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/ChangCYH18,
  author       = {Kuang{-}Yu Chang and
                  Yun Cui and
                  Siu{-}Ming Yiu and
                  Wing{-}Kai Hon},
  title        = {Reconstructing One-Articulated Networks with Distance Matrices},
  journal      = {J. Comput. Biol.},
  volume       = {25},
  number       = {3},
  pages        = {253--269},
  year         = {2018},
  url          = {https://doi.org/10.1089/cmb.2017.0148},
  doi          = {10.1089/CMB.2017.0148},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcb/ChangCYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhangHZY18,
  author       = {Jun Zhang and
                  Meiqi He and
                  Gongxian Zeng and
                  Siu{-}Ming Yiu},
  title        = {Privacy-preserving verifiable elastic net among multiple institutions
                  in the cloud},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {6},
  pages        = {791--815},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-171107},
  doi          = {10.3233/JCS-171107},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhangHZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuJWY18,
  author       = {Zechao Liu and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu},
  title        = {Practical attribute-based encryption: Outsourcing decryption, attribute
                  revocation and policy updating},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {108},
  pages        = {112--123},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.01.016},
  doi          = {10.1016/J.JNCA.2018.01.016},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiuJWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/WangLYYH18,
  author       = {Eric Ke Wang and
                  Yueping Li and
                  Yunming Ye and
                  Siu{-}Ming Yiu and
                  Lucas C. K. Hui},
  title        = {A Dynamic Trust Framework for Opportunistic Mobile Social Networks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {15},
  number       = {1},
  pages        = {319--329},
  year         = {2018},
  url          = {https://doi.org/10.1109/TNSM.2017.2776350},
  doi          = {10.1109/TNSM.2017.2776350},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/WangLYYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WenHYZ18,
  author       = {Jing Wen and
                  Lucas C. K. Hui and
                  Siu{-}Ming Yiu and
                  Ruoqing Zhang},
  title        = {{DCN:} Detector-Corrector Network Against Evasion Attacks on Deep
                  Neural Networks},
  booktitle    = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks Workshops, {DSN} Workshops 2018, Luxembourg, June 25-28,
                  2018},
  pages        = {215--221},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.ieeecomputersociety.org/10.1109/DSN-W.2018.00066},
  doi          = {10.1109/DSN-W.2018.00066},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WenHYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/WuWJLLYLZZ18,
  author       = {Yulin Wu and
                  Xuan Wang and
                  Zoe Lin Jiang and
                  Xuan Li and
                  Jin Li and
                  Siu{-}Ming Yiu and
                  Zechao Liu and
                  Hainan Zhao and
                  Chunkai Zhang},
  editor       = {Jaideep Vaidya and
                  Jin Li},
  title        = {Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving
                  Near-Duplicate Image Data Detection},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 18th International
                  Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
                  Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11337},
  pages        = {374--388},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05063-4\_29},
  doi          = {10.1007/978-3-030-05063-4\_29},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/WuWJLLYLZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/SunJZYWZWZ18,
  author       = {Wenli Sun and
                  Zoe Lin Jiang and
                  Jun Zhang and
                  Siu{-}Ming Yiu and
                  Yulin Wu and
                  Hainan Zhao and
                  Xuan Wang and
                  Peng Zhang},
  editor       = {Jaideep Vaidya and
                  Jin Li},
  title        = {Outsourced Privacy Preserving {SVM} with Multiple Keys},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 18th International
                  Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
                  Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11337},
  pages        = {415--430},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05063-4\_32},
  doi          = {10.1007/978-3-030-05063-4\_32},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/SunJZYWZWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/JiangGJLWYWYF18,
  author       = {Zoe Lin Jiang and
                  Ning Guo and
                  Yabin Jin and
                  Jiazhuo Lv and
                  Yulin Wu and
                  Yating Yu and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Junbin Fang},
  editor       = {Jaideep Vaidya and
                  Jin Li},
  title        = {Efficient Two-Party Privacy Preserving Collaborative k-means Clustering
                  Protocol Supporting both Storage and Computation Outsourcing},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 18th International
                  Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
                  Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11337},
  pages        = {447--460},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05063-4\_34},
  doi          = {10.1007/978-3-030-05063-4\_34},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/JiangGJLWYWYF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HeZZZCY18,
  author       = {Meiqi He and
                  Gongxian Zeng and
                  Jun Zhang and
                  Linru Zhang and
                  Yuechen Chen and
                  Siu{-}Ming Yiu},
  editor       = {Kwangsu Lee},
  title        = {A New Privacy-Preserving Searching Model on Blockchain},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {248--266},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_16},
  doi          = {10.1007/978-3-030-12146-4\_16},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HeZZZCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/YauCY18,
  author       = {Ken Yau and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {A Forensic Logging System for Siemens Programmable Logic Controllers},
  booktitle    = {Advances in Digital Forensics {XIV} - 14th {IFIP} {WG} 11.9 International
                  Conference, New Delhi, India, January 3-5, 2018, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {532},
  pages        = {331--349},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99277-8\_18},
  doi          = {10.1007/978-3-319-99277-8\_18},
  timestamp    = {Thu, 30 Aug 2018 16:22:35 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/YauCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/ChanCYY18,
  author       = {Chun{-}Fai Chan and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Ken Yau},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Enhancing the Security and Forensic Capabilities of Programmable Logic
                  Controllers},
  booktitle    = {Advances in Digital Forensics {XIV} - 14th {IFIP} {WG} 11.9 International
                  Conference, New Delhi, India, January 3-5, 2018, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {532},
  pages        = {351--367},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99277-8\_19},
  doi          = {10.1007/978-3-319-99277-8\_19},
  timestamp    = {Thu, 30 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/ChanCYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/LiuJWWY18,
  author       = {Zechao Liu and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Yulin Wu and
                  Siu{-}Ming Yiu},
  editor       = {Jinjun Chen and
                  Laurence T. Yang},
  title        = {Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme
                  on Ideal Lattices},
  booktitle    = {{IEEE} International Conference on Parallel {\&} Distributed Processing
                  with Applications, Ubiquitous Computing {\&} Communications, Big
                  Data {\&} Cloud Computing, Social Computing {\&} Networking,
                  Sustainable Computing {\&} Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom
                  2018, Melbourne, Australia, December 11-13, 2018},
  pages        = {1003--1008},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/BDCloud.2018.00146},
  doi          = {10.1109/BDCLOUD.2018.00146},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/LiuJWWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/LiuCXGYH18,
  author       = {Chang Liu and
                  Zigang Cao and
                  Gang Xiong and
                  Gaopeng Gou and
                  Siu{-}Ming Yiu and
                  Longtao He},
  title        = {MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov
                  Probability Fingerprints},
  booktitle    = {26th {IEEE/ACM} International Symposium on Quality of Service, IWQoS
                  2018, Banff, AB, Canada, June 4-6, 2018},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IWQoS.2018.8624124},
  doi          = {10.1109/IWQOS.2018.8624124},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/LiuCXGYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ZengHZZCY18,
  author       = {Gongxian Zeng and
                  Meiqi He and
                  Linru Zhang and
                  Jun Zhang and
                  Yuechen Chen and
                  Siu{-}Ming Yiu},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514159},
  doi          = {10.1109/PST.2018.8514159},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ZengHZZCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenLJFYXLYWHLZ18,
  author       = {Qian Chen and
                  Qing Liao and
                  Zoe Lin Jiang and
                  Junbin Fang and
                  Siu{-}Ming Yiu and
                  Guikai Xi and
                  Rong Li and
                  Zhengzhong Yi and
                  Xuan Wang and
                  Lucas C. K. Hui and
                  Dong Liu and
                  En Zhang},
  title        = {File Fragment Classification Using Grayscale Image Conversion and
                  Deep Learning in Digital Forensics},
  booktitle    = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San
                  Francisco, CA, USA, May 24, 2018},
  pages        = {140--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SPW.2018.00029},
  doi          = {10.1109/SPW.2018.00029},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChenLJFYXLYWHLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuJWYZW18,
  author       = {Zechao Liu and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Ruoqing Zhang and
                  Yulin Wu},
  title        = {A Temporal and Spatial Constrained Attribute-Based Access Control
                  Scheme for Cloud Storage},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {614--623},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00092},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00092},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuJWYZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2018,
  editor       = {Man Ho Au and
                  Siu{-}Ming Yiu and
                  Jin Li and
                  Xiapu Luo and
                  Cong Wang and
                  Aniello Castiglione and
                  Kamil Kluczniak},
  title        = {Network and System Security - 12th International Conference, {NSS}
                  2018, Hong Kong, China, August 27-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11058},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02744-5},
  doi          = {10.1007/978-3-030-02744-5},
  isbn         = {978-3-030-02743-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-00939,
  author       = {Ziliang Lai and
                  Chris Liu and
                  Eric Lo and
                  Ben Kao and
                  Siu{-}Ming Yiu},
  title        = {Decentralized Search on Decentralized Web},
  journal      = {CoRR},
  volume       = {abs/1809.00939},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.00939},
  eprinttype    = {arXiv},
  eprint       = {1809.00939},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-00939.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/LiuJYLW17,
  author       = {Bo Liu and
                  Tao Jiang and
                  Siu{-}Ming Yiu and
                  Junyi Li and
                  Yadong Wang},
  title        = {rMFilter: acceleration of long read-based structure variation calling
                  by chimeric read filtering},
  journal      = {Bioinform.},
  volume       = {33},
  number       = {17},
  pages        = {2750--2752},
  year         = {2017},
  url          = {https://doi.org/10.1093/bioinformatics/btx279},
  doi          = {10.1093/BIOINFORMATICS/BTX279},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/LiuJYLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/ShiLGLY17,
  author       = {Jian{-}Yu Shi and
                  Jia{-}Xin Li and
                  Ke Gao and
                  Peng Lei and
                  Siu{-}Ming Yiu},
  title        = {Predicting combinative drug pairs towards realistic screening via
                  integrating heterogeneous features},
  journal      = {{BMC} Bioinform.},
  volume       = {18},
  number       = {{S-12}},
  pages        = {409:1--409:9},
  year         = {2017},
  url          = {https://doi.org/10.1186/s12859-017-1818-2},
  doi          = {10.1186/S12859-017-1818-2},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/ShiLGLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiuJWHYS17,
  author       = {Zechao Liu and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Xinyi Huang and
                  Siu{-}Ming Yiu and
                  Kunihiko Sadakane},
  title        = {Offline/online attribute-based encryption with verifiable outsourced
                  decryption},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {7},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3915},
  doi          = {10.1002/CPE.3915},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiuJWHYS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiLHLGYC17,
  author       = {Ping Li and
                  Jin Li and
                  Zhengan Huang and
                  Tong Li and
                  Chong{-}Zhi Gao and
                  Siu{-}Ming Yiu and
                  Kai Chen},
  title        = {Multi-key privacy-preserving deep learning in cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {74},
  pages        = {76--85},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2017.02.006},
  doi          = {10.1016/J.FUTURE.2017.02.006},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiLHLGYC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/XuLXYY17,
  author       = {Fei Xu and
                  Pinxin Liu and
                  Jing Xu and
                  Jianfeng Yang and
                  Siu{-}Ming Yiu},
  title        = {Multi-Dimensional Bloom Filter: Design and Evaluation},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {10},
  pages        = {2368--2372},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016INP0022},
  doi          = {10.1587/TRANSINF.2016INP0022},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/XuLXYY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdmb/YaoLTYWL17,
  author       = {Haobin Yao and
                  Tak Wah Lam and
                  H. F. Ting and
                  Siu{-}Ming Yiu and
                  Yadong Wang and
                  Bo Liu},
  title        = {Accurate annotation of metagenomic data without species-level references},
  journal      = {Int. J. Data Min. Bioinform.},
  volume       = {19},
  number       = {4},
  pages        = {283--297},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJDMB.2017.10012545},
  doi          = {10.1504/IJDMB.2017.10012545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdmb/YaoLTYWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/WangHYWF17,
  author       = {Jingxuan Wang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Eric Ke Wang and
                  Jun{-}bin Fang},
  title        = {A survey on cyber attacks against nonlinear state estimation in power
                  systems of ubiquitous cities},
  journal      = {Pervasive Mob. Comput.},
  volume       = {39},
  pages        = {52--64},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.pmcj.2017.04.005},
  doi          = {10.1016/J.PMCJ.2017.04.005},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/WangHYWF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangHYZZ17,
  author       = {Jingxuan Wang and
                  Lucas C. K. Hui and
                  Siu{-}Ming Yiu and
                  Gang Zhou and
                  Ruoqing Zhang},
  title        = {{F-DDIA:} {A} Framework for Detecting Data Injection Attacks in Nonlinear
                  Cyber-Physical Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {9602357:1--9602357:12},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/9602357},
  doi          = {10.1155/2017/9602357},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangHYZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tlsdkcs/LiangYY17,
  author       = {Yuzhi Liang and
                  Pengcheng Yin and
                  Siu{-}Ming Yiu},
  title        = {New Word Detection and Tagging on Chinese Twitter Stream},
  journal      = {Trans. Large Scale Data Knowl. Centered Syst.},
  volume       = {32},
  pages        = {69--90},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-55608-5\_4},
  doi          = {10.1007/978-3-662-55608-5\_4},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tlsdkcs/LiangYY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeiWZY17,
  author       = {Puwen Wei and
                  Wei Wang and
                  Bingxin Zhu and
                  Siu{-}Ming Yiu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting
                  with Improved Efficiency},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_1},
  doi          = {10.1007/978-3-319-60055-0\_1},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WeiWZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adma/YangLYC17,
  author       = {Jie Yang and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  editor       = {Gao Cong and
                  Wen{-}Chih Peng and
                  Wei Emma Zhang and
                  Chengliang Li and
                  Aixin Sun},
  title        = {Mixed Membership Sparse Gaussian Conditional Random Fields},
  booktitle    = {Advanced Data Mining and Applications - 13th International Conference,
                  {ADMA} 2017, Singapore, November 5-6, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10604},
  pages        = {287--302},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69179-4\_20},
  doi          = {10.1007/978-3-319-69179-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/adma/YangLYC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/LiYCL17,
  author       = {Menglu Li and
                  Siu{-}Ming Yiu and
                  Ting{-}Fung Chan and
                  Ernest T. Lam},
  editor       = {Xiaohua Hu and
                  Chi{-}Ren Shyu and
                  Yana Bromberg and
                  Jean Gao and
                  Yang Gong and
                  Dmitry Korkin and
                  Illhoi Yoo and
                  Huiru Jane Zheng},
  title        = {An iterative algorithm for de novo optical map assembly},
  booktitle    = {2017 {IEEE} International Conference on Bioinformatics and Biomedicine,
                  {BIBM} 2017, Kansas City, MO, USA, November 13-16, 2017},
  pages        = {1952--1958},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/BIBM.2017.8217958},
  doi          = {10.1109/BIBM.2017.8217958},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bibm/LiYCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangWYJL17,
  author       = {Jun Zhang and
                  Xin Wang and
                  Siu{-}Ming Yiu and
                  Zoe Lin Jiang and
                  Jin Li},
  editor       = {Cong Wang and
                  Murat Kantarcioglu},
  title        = {Secure Dot Product of Outsourced Encrypted Vectors and its Application
                  to {SVM}},
  booktitle    = {Proceedings of the Fifth {ACM} International Workshop on Security
                  in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {75--82},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055259.3055270},
  doi          = {10.1145/3055259.3055270},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangWYJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YauCYC17,
  author       = {Ken Yau and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Chun{-}Fai Chan},
  title        = {Detecting anomalous behavior of {PLC} using semi-supervised machine
                  learning},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {580--585},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228713},
  doi          = {10.1109/CNS.2017.8228713},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YauCYC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/LiJWY17,
  author       = {Ye Li and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu},
  title        = {Privacy-Preserving {ID3} Data Mining over Encrypted Data in Outsourced
                  Environments with Multiple Keys},
  booktitle    = {2017 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24,
                  2017, Volume 1},
  pages        = {548--555},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSE-EUC.2017.102},
  doi          = {10.1109/CSE-EUC.2017.102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/LiJWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/WuJWYZ17,
  author       = {Yulin Wu and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Peng Zhang},
  title        = {Dynamic Data Operations with Deduplication in Privacy-Preserving Public
                  Auditing for Secure Cloud Storage},
  booktitle    = {2017 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24,
                  2017, Volume 1},
  pages        = {562--567},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSE-EUC.2017.104},
  doi          = {10.1109/CSE-EUC.2017.104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/WuJWYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhangHY17,
  author       = {Jun Zhang and
                  Meiqi He and
                  Siu{-}Ming Yiu},
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {Privacy-Preserving Elastic Net for Data Encrypted by Different Keys
                  - With an Application on Biomarker Discovery},
  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  pages        = {185--204},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1\_10},
  doi          = {10.1007/978-3-319-61176-1\_10},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZhangHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LiJWYL17,
  author       = {Ye Li and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Qing Liao},
  title        = {Outsourced Privacy-Preserving {C4.5} Algorithm over Arbitrarily Partitioned
                  Databases},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {124--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.80},
  doi          = {10.1109/DSC.2017.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/LiJWYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WangTHYW17,
  author       = {Jingxuan Wang and
                  Wenting Tu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Eric Ke Wang},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {Detecting Time Synchronization Attacks in Cyber-Physical Systems with
                  Machine Learning Techniques},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {2246--2251},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.25},
  doi          = {10.1109/ICDCS.2017.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WangTHYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangZHY17,
  author       = {Jun Zhang and
                  Linru Zhang and
                  Meiqi He and
                  Siu{-}Ming Yiu},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Privacy-Preserving Disease Risk Test Based on Bloom Filters},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {472--486},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_41},
  doi          = {10.1007/978-3-319-89500-0\_41},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangZHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisa/CuiHHYZW17,
  author       = {Xingmin Cui and
                  Ruiyi He and
                  Lucas C. K. Hui and
                  Siu{-}Ming Yiu and
                  Gang Zhou and
                  Eric Ke Wang},
  editor       = {Kuinam Kim and
                  Nikolai Joukov},
  title        = {Reconstruction of Task Lists from Android Applications},
  booktitle    = {Information Science and Applications 2017 - {ICISA} 2017, Macau, China,
                  20-23 March 2017},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {424},
  pages        = {396--403},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-4154-9\_46},
  doi          = {10.1007/978-981-10-4154-9\_46},
  timestamp    = {Wed, 05 Jun 2019 13:59:26 +0200},
  biburl       = {https://dblp.org/rec/conf/icisa/CuiHHYZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/FangLXJYYWHL17,
  author       = {Junbin Fang and
                  Sijin Li and
                  Guikai Xi and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu and
                  Liyang Yu and
                  Xuan Wang and
                  Qi Han and
                  Qiong Li},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Semantic Video Carving Using Perceptual Hashing and Optical Flow},
  booktitle    = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International
                  Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {511},
  pages        = {223--244},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67208-3\_13},
  doi          = {10.1007/978-3-319-67208-3\_13},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/FangLXJYYWHL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/LiuZSXXY17,
  author       = {Chang Liu and
                  Lingwu Zeng and
                  Junzheng Shi and
                  Fei Xu and
                  Gang Xiong and
                  Siu{-}Ming Yiu},
  title        = {Auto-identification of background traffic based on autonomous periodic
                  interaction},
  booktitle    = {36th {IEEE} International Performance Computing and Communications
                  Conference, {IPCCC} 2017, San Diego, CA, USA, December 10-12, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PCCC.2017.8280479},
  doi          = {10.1109/PCCC.2017.8280479},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/LiuZSXXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/XuPCLXGY17,
  author       = {Fei Xu and
                  Haiqing Pan and
                  Zigang Cao and
                  Zhen Li and
                  Gang Xiong and
                  Yangyang Guan and
                  Siu{-}Ming Yiu},
  title        = {Identifying malware with {HTTP} content type inconsistency via header-payload
                  comparison},
  booktitle    = {36th {IEEE} International Performance Computing and Communications
                  Conference, {IPCCC} 2017, San Diego, CA, USA, December 10-12, 2017},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PCCC.2017.8280450},
  doi          = {10.1109/PCCC.2017.8280450},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/XuPCLXGY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbra/ChangCYH17,
  author       = {Kuang{-}Yu Chang and
                  Yun Cui and
                  Siu{-}Ming Yiu and
                  Wing{-}Kai Hon},
  editor       = {Zhipeng Cai and
                  Ovidiu Daescu and
                  Min Li},
  title        = {Reconstructing One-Articulated Networks with Distance Matrices},
  booktitle    = {Bioinformatics Research and Applications - 13th International Symposium,
                  {ISBRA} 2017, Honolulu, HI, USA, May 29 - June 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10330},
  pages        = {34--45},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59575-7\_4},
  doi          = {10.1007/978-3-319-59575-7\_4},
  timestamp    = {Thu, 20 Aug 2020 15:58:55 +0200},
  biburl       = {https://dblp.org/rec/conf/isbra/ChangCYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiJWYF17,
  author       = {Ye Li and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Jun{-}bin Fang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Outsourced Privacy-Preserving Random Decision Tree Algorithm Under
                  Multiple Parties for Sensor-Cloud Integration},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {525--538},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_31},
  doi          = {10.1007/978-3-319-72359-4\_31},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiJWYF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwbbio/ShiHLLZY17,
  author       = {Jianyu Shi and
                  Hua Huang and
                  Jia{-}Xin Li and
                  Peng Lei and
                  Yan{-}Ning Zhang and
                  Siu{-}Ming Yiu},
  editor       = {Ignacio Rojas and
                  Francisco M. Ortu{\~{n}}o Guzman},
  title        = {Predicting Comprehensive Drug-Drug Interactions for New Drugs via
                  Triple Matrix Factorization},
  booktitle    = {Bioinformatics and Biomedical Engineering - 5th International Work-Conference,
                  {IWBBIO} 2017, Granada, Spain, April 26-28, 2017, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10208},
  pages        = {108--117},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56148-6\_9},
  doi          = {10.1007/978-3-319-56148-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iwbbio/ShiHLLZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ksem/LiangZLYY17,
  author       = {Yuzhi Liang and
                  Jia Zhu and
                  Yupeng Li and
                  Min Yang and
                  Siu{-}Ming Yiu},
  editor       = {Gang Li and
                  Yong Ge and
                  Zili Zhang and
                  Zhi Jin and
                  Michael Blumenstein},
  title        = {Relevant Fact Selection for {QA} via Sequence Labeling},
  booktitle    = {Knowledge Science, Engineering and Management - 10th International
                  Conference, {KSEM} 2017, Melbourne, VIC, Australia, August 19-20,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10412},
  pages        = {399--409},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63558-3\_34},
  doi          = {10.1007/978-3-319-63558-3\_34},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ksem/LiangZLYY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ZengYZKA17,
  author       = {Gongxian Zeng and
                  Siu{-}Ming Yiu and
                  Jun Zhang and
                  Hiroki Kuzuno and
                  Man Ho Au},
  title        = {A Nonoutsourceable Puzzle Under {GHOST} Rule},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {35--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00015},
  doi          = {10.1109/PST.2017.00015},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ZengYZKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HeZZY17,
  author       = {Meiqi He and
                  Jun Zhang and
                  Gongxian Zeng and
                  Siu{-}Ming Yiu},
  title        = {A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings
                  in Cloud Database},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {293--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00042},
  doi          = {10.1109/PST.2017.00042},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/HeZZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangHYYLJ17,
  author       = {Ruoqing Zhang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Xiaoqi Yu and
                  Zechao Liu and
                  Zoe Lin Jiang},
  title        = {A Traceable Outsourcing {CP-ABE} Scheme with Attribute Revocation},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {363--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.259},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.259},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangHYYLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiJWYZ17,
  author       = {Ye Li and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Peng Zhang},
  title        = {Outsourcing Privacy Preserving {ID3} Decision Tree Algorithm over
                  Encrypted Data-sets for Two-Parties},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1070--1075},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.354},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.354},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiJWYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/17/FangJLYHC17,
  author       = {Junbin Fang and
                  Zoe Lin Jiang and
                  Sijin Li and
                  Siu{-}Ming Yiu and
                  Lucas C. K. Hui and
                  Kam{-}Pui Chow},
  editor       = {Man Ho Allen Au and
                  Kim{-}Kwang Raymond Choo},
  title        = {Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile
                  Phone},
  booktitle    = {Mobile Security and Privacy - Advances, Challenges and Future Research
                  Directions},
  pages        = {205--216},
  publisher    = {Elsevier},
  year         = {2017},
  url          = {https://doi.org/10.1016/b978-0-12-804629-6.00009-2},
  doi          = {10.1016/B978-0-12-804629-6.00009-2},
  timestamp    = {Tue, 15 Dec 2020 17:00:09 +0100},
  biburl       = {https://dblp.org/rec/books/el/17/FangJLYHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZCYCL17,
  author       = {Linru Zhang and
                  Gongxian Zeng and
                  Yuechen Chen and
                  Siu{-}Ming Yiu and
                  Nairen Cao and
                  Zheli Liu},
  title        = {Constant bandwidth {ORAM} with small block size using {PIR} operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {590},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/590},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZCYCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/JanssonSVY16,
  author       = {Jesper Jansson and
                  Wing{-}Kin Sung and
                  Hoa Vu and
                  Siu{-}Ming Yiu},
  title        = {Faster Algorithms for Computing the R* Consensus Tree},
  journal      = {Algorithmica},
  volume       = {76},
  number       = {4},
  pages        = {1224--1244},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00453-016-0122-2},
  doi          = {10.1007/S00453-016-0122-2},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/JanssonSVY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/XuCSYH16,
  author       = {Chengcheng Xu and
                  Shuhui Chen and
                  Jinshu Su and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  title        = {A Survey on Regular Expression Matching for Deep Packet Inspection:
                  Applications, Algorithms, and Hardware Platforms},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {18},
  number       = {4},
  pages        = {2991--3029},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMST.2016.2566669},
  doi          = {10.1109/COMST.2016.2566669},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/XuCSYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TangFCYXFL016,
  author       = {Yanbin Tang and
                  Junbin Fang and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Jun Xu and
                  Bo Feng and
                  Qiong Li and
                  Qi Han},
  title        = {Recovery of heavily fragmented {JPEG} files},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S108--S117},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.016},
  doi          = {10.1016/J.DIIN.2016.04.016},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TangFCYXFL016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/YuWHNYFW16,
  author       = {Liyang Yu and
                  Huanran Wang and
                  Qi Han and
                  Xiamu Niu and
                  Siu{-}Ming Yiu and
                  Jun{-}bin Fang and
                  Zhifang Wang},
  title        = {Exposing frame deletion by detecting abrupt changes in video streams},
  journal      = {Neurocomputing},
  volume       = {205},
  pages        = {84--91},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.neucom.2016.03.051},
  doi          = {10.1016/J.NEUCOM.2016.03.051},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/YuWHNYFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuHY16,
  author       = {Changhui Hu and
                  Lidong Han and
                  Siu{-}Ming Yiu},
  title        = {Efficient and secure multi-functional searchable symmetric encryption
                  schemes},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {1},
  pages        = {34--42},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1376},
  doi          = {10.1002/SEC.1376},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangHYCWF16,
  author       = {Jingxuan Wang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Xingmin Cui and
                  Eric Ke Wang and
                  Jun{-}bin Fang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {A Survey on the Cyber Attacks Against Non-linear State Estimation
                  in Smart Grids},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_3},
  doi          = {10.1007/978-3-319-40253-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangHYCWF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/YaoLTYWL16,
  author       = {Haobin Yao and
                  Tak Wah Lam and
                  Hing{-}Fung Ting and
                  Siu{-}Ming Yiu and
                  Yadong Wang and
                  Bo Liu},
  editor       = {Tianhai Tian and
                  Qinghua Jiang and
                  Yunlong Liu and
                  Kevin Burrage and
                  Jiangning Song and
                  Yadong Wang and
                  Xiaohua Hu and
                  Shinichi Morishita and
                  Qian Zhu and
                  Guohua Wang},
  title        = {Accurate annotation of metagenomic data without species-level references},
  booktitle    = {{IEEE} International Conference on Bioinformatics and Biomedicine,
                  {BIBM} 2016, Shenzhen, China, December 15-18, 2016},
  pages        = {59--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BIBM.2016.7822493},
  doi          = {10.1109/BIBM.2016.7822493},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bibm/YaoLTYWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/ShiGSY16,
  author       = {Jianyu Shi and
                  Ke Gao and
                  Xue{-}Qun Shang and
                  Siu{-}Ming Yiu},
  editor       = {Tianhai Tian and
                  Qinghua Jiang and
                  Yunlong Liu and
                  Kevin Burrage and
                  Jiangning Song and
                  Yadong Wang and
                  Xiaohua Hu and
                  Shinichi Morishita and
                  Qian Zhu and
                  Guohua Wang},
  title        = {{LCM-DS:} {A} novel approach of predicting drug-drug interactions
                  for new drugs via Dempster-Shafer theory of evidence},
  booktitle    = {{IEEE} International Conference on Bioinformatics and Biomedicine,
                  {BIBM} 2016, Shenzhen, China, December 15-18, 2016},
  pages        = {512--515},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BIBM.2016.7822571},
  doi          = {10.1109/BIBM.2016.7822571},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bibm/ShiGSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TanJWYFLJH16,
  author       = {Chuting Tan and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Jun{-}bin Fang and
                  Jin Li and
                  Yabin Jin and
                  Jiajun Huang},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Generic Construction of Publicly Verifiable Predicate Encryption},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {889--894},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897919},
  doi          = {10.1145/2897845.2897919},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TanJWYFLJH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcomp/JiangZLYHWF16,
  author       = {Zoe Lin Jiang and
                  Ruoqing Zhang and
                  Zechao Liu and
                  Siu{-}Ming Yiu and
                  Lucas C. K. Hui and
                  Xuan Wang and
                  Junbin Fang},
  editor       = {Jiafu Wan and
                  Kai Lin and
                  Delu Zeng and
                  Jin Li and
                  Yang Xiang and
                  Xiaofeng Liao and
                  Jiwu Huang and
                  Zheli Liu},
  title        = {A Revocable Outsourcing Attribute-Based Encryption Scheme},
  booktitle    = {Cloud Computing, Security, Privacy in New Computing Environments -
                  7th International Conference, CloudComp 2016, and First International
                  Conference, {SPNCE} 2016, Guangzhou, China, November 25-26, and December
                  15-16, 2016, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {197},
  pages        = {145--161},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-69605-8\_14},
  doi          = {10.1007/978-3-319-69605-8\_14},
  timestamp    = {Sat, 29 Aug 2020 18:19:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcomp/JiangZLYHWF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuCZY16,
  author       = {Xiaoqi Yu and
                  Nairen Cao and
                  Jun Zhang and
                  Siu{-}Ming Yiu},
  title        = {Dynamic Proofs of Retrievability with improved worst case overhead},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {576--580},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860551},
  doi          = {10.1109/CNS.2016.7860551},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuCZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbra/LiMLKXYCY16,
  author       = {Menglu Li and
                  Angel C. Y. Mak and
                  Ernest T. Lam and
                  Pui{-}Yan Kwok and
                  Ming Xiao and
                  Kevin Y. Yip and
                  Ting{-}Fung Chan and
                  Siu{-}Ming Yiu},
  editor       = {Anu G. Bourgeois and
                  Pavel Skums and
                  Xiang Wan and
                  Alex Zelikovsky},
  title        = {Towards a More Accurate Error Model for BioNano Optical Maps},
  booktitle    = {Bioinformatics Research and Applications - 12th International Symposium,
                  {ISBRA} 2016, Minsk, Belarus, June 5-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9683},
  pages        = {67--79},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-38782-6\_6},
  doi          = {10.1007/978-3-319-38782-6\_6},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbra/LiMLKXYCY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuJWYZZ16,
  author       = {Zechao Liu and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Chunkai Zhang and
                  Xiaomeng Zhao},
  title        = {Dynamic Attribute-Based Access Control in Cloud Storage Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {129--137},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0055},
  doi          = {10.1109/TRUSTCOM.2016.0055},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuJWYZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YuCZZY16,
  author       = {Xiaoqi Yu and
                  Nairen Cao and
                  Gongxian Zeng and
                  Ruoqing Zhang and
                  Siu{-}Ming Yiu},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {{LRCRYPT:} Leakage-Resilient Cryptographic System (Design and Implementation)},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {233--244},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_20},
  doi          = {10.1007/978-3-319-56549-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YuCZZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/algo/YiuC16,
  author       = {Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  title        = {Efficient Methods for Multiple Sequence Alignment with Guaranteed
                  Error Bounds},
  booktitle    = {Encyclopedia of Algorithms},
  pages        = {621--624},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-2864-4\_123},
  doi          = {10.1007/978-1-4939-2864-4\_123},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/algo/YiuC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/algo/Yiu16,
  author       = {Siu{-}Ming Yiu},
  title        = {Local Alignment (with Concave Gap Weights)},
  booktitle    = {Encyclopedia of Algorithms},
  pages        = {1126--1128},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-2864-4\_208},
  doi          = {10.1007/978-1-4939-2864-4\_208},
  timestamp    = {Tue, 09 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/algo/Yiu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FangCYCJYRT16,
  author       = {Jun{-}bin Fang and
                  Zhen Che and
                  Xiaolong Yu and
                  Zhe Chen and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu and
                  Kui Ren and
                  Xiaoqing Tan},
  title        = {Capacity-achieving and Flicker-free {FEC} coding scheme for Dimmable
                  Visible Light Communication Based on Polar Codes},
  journal      = {CoRR},
  volume       = {abs/1608.07202},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.07202},
  eprinttype    = {arXiv},
  eprint       = {1608.07202},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FangCYCJYRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangY16a,
  author       = {Xin Wang and
                  Siu{-}Ming Yiu},
  title        = {A multi-task learning model for malware classification with useful
                  file access pattern from {API} call sequence},
  journal      = {CoRR},
  volume       = {abs/1610.05945},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.05945},
  eprinttype    = {arXiv},
  eprint       = {1610.05945},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WangY16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/ZhuLWCYQLZJLDZW15,
  author       = {Xiao Zhu and
                  Henry C. M. Leung and
                  Rongjie Wang and
                  Francis Y. L. Chin and
                  Siu{-}Ming Yiu and
                  Guangri Quan and
                  Yajie Li and
                  Rui Zhang and
                  Qinghua Jiang and
                  Bo Liu and
                  Yucui Dong and
                  Guohui Zhou and
                  Yadong Wang},
  title        = {misFinder: identify mis-assemblies in an unbiased manner using reference
                  and paired-end reads},
  journal      = {{BMC} Bioinform.},
  volume       = {16},
  pages        = {386:1--386:16},
  year         = {2015},
  url          = {https://doi.org/10.1186/s12859-015-0818-3},
  doi          = {10.1186/S12859-015-0818-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bmcbi/ZhuLWCYQLZJLDZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/ZhanYLYWT15,
  author       = {Qing Zhan and
                  Yongtao Ye and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu and
                  Yadong Wang and
                  Hing{-}Fung Ting},
  title        = {Improving multiple sequence alignment by using better guide trees},
  journal      = {{BMC} Bioinform.},
  volume       = {16},
  number       = {{S-5}},
  pages        = {S4},
  year         = {2015},
  url          = {https://doi.org/10.1186/1471-2105-16-S5-S4},
  doi          = {10.1186/1471-2105-16-S5-S4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bmcbi/ZhanYLYWT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/SchonbachHYTR15,
  author       = {Christian Sch{\"{o}}nbach and
                  Paul Horton and
                  Siu{-}Ming Yiu and
                  Tin Wee Tan and
                  Shoba Ranganathan},
  title        = {{GIW} and InCoB are advancing bioinformatics in the Asia-Pacific},
  journal      = {{BMC} Bioinform.},
  volume       = {16},
  number       = {{S18}},
  pages        = {I1},
  year         = {2015},
  url          = {https://doi.org/10.1186/1471-2105-16-s18-i1},
  doi          = {10.1186/1471-2105-16-S18-I1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bmcbi/SchonbachHYTR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbcb/HortonSRY15,
  author       = {Paul Horton and
                  Christian Sch{\"{o}}nbach and
                  Shoba Ranganathan and
                  Siu{-}Ming Yiu},
  title        = {Introduction to selected papers from GIW/InCoB 2015},
  journal      = {J. Bioinform. Comput. Biol.},
  volume       = {13},
  number       = {5},
  pages        = {1502003:1--1502003:2},
  year         = {2015},
  url          = {https://doi.org/10.1142/S0219720015020035},
  doi          = {10.1142/S0219720015020035},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jbcb/HortonSRY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/LeungYC15,
  author       = {Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  title        = {{IDBA-MTP:} {A} Hybrid Metatranscriptomic Assembler Based on Protein
                  Information},
  journal      = {J. Comput. Biol.},
  volume       = {22},
  number       = {5},
  pages        = {367--376},
  year         = {2015},
  url          = {https://doi.org/10.1089/cmb.2014.0139},
  doi          = {10.1089/CMB.2014.0139},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcb/LeungYC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/HeWKCLYL15,
  author       = {Zhian He and
                  Wai Kit Wong and
                  Ben Kao and
                  David Wai{-}Lok Cheung and
                  Rongbin Li and
                  Siu{-}Ming Yiu and
                  Eric Lo},
  title        = {{SDB:} {A} Secure Query Processing System with Data Interoperability},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {8},
  number       = {12},
  pages        = {1876--1879},
  year         = {2015},
  url          = {http://www.vldb.org/pvldb/vol8/p1876-he.pdf},
  doi          = {10.14778/2824032.2824090},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/HeWKCLYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/YeCWYZLT15,
  author       = {Yongtao Ye and
                  David Wai{-}Lok Cheung and
                  Yadong Wang and
                  Siu{-}Ming Yiu and
                  Qing Zhan and
                  Tak Wah Lam and
                  Hing{-}Fung Ting},
  title        = {GLProbs: Aligning Multiple Sequences Adaptively},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {12},
  number       = {1},
  pages        = {67--78},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCBB.2014.2316820},
  doi          = {10.1109/TCBB.2014.2316820},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/YeCWYZLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChimYLHZ15,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Victor O. K. Li and
                  Lucas Chi Kwong Hui and
                  Jin Zhong},
  title        = {{PRGA:} Privacy-Preserving Recording {\&} Gateway-Assisted Authentication
                  of Power Usage Information for Smart Grid},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {85--97},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2313861},
  doi          = {10.1109/TDSC.2014.2313861},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChimYLHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/ShiY15,
  author       = {Jianyu Shi and
                  Siu{-}Ming Yiu},
  editor       = {Jun Huan and
                  Satoru Miyano and
                  Amarda Shehu and
                  Xiaohua Tony Hu and
                  Bin Ma and
                  Sanguthevar Rajasekaran and
                  Vijay K. Gombar and
                  Matthieu{-}P. Schapranow and
                  Illhoi Yoo and
                  Jiayu Zhou and
                  Brian Chen and
                  Vinay Pai and
                  Brian G. Pierce},
  title        = {{SRP:} {A} concise non-parametric similarity-rank-based model for
                  predicting drug-target interactions},
  booktitle    = {2015 {IEEE} International Conference on Bioinformatics and Biomedicine,
                  {BIBM} 2015, Washington, DC, USA, November 9-12, 2015},
  pages        = {1636--1641},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/BIBM.2015.7359921},
  doi          = {10.1109/BIBM.2015.7359921},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bibm/ShiY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuenZCY15,
  author       = {Tsz Hon Yuen and
                  Cong Zhang and
                  Sherman S. M. Chow and
                  Siu{-}Ming Yiu},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Related Randomness Attacks for Public Key Cryptosystems},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {215--223},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714622},
  doi          = {10.1145/2714576.2714622},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YuenZCY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dawak/LiangYY15,
  author       = {Yuzhi Liang and
                  Pengcheng Yin and
                  Siu{-}Ming Yiu},
  editor       = {Sanjay Madria and
                  Takahiro Hara},
  title        = {New Word Detection and Tagging on Chinese Twitter Stream},
  booktitle    = {Big Data Analytics and Knowledge Discovery - 17th International Conference,
                  DaWaK 2015, Valencia, Spain, September 1-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9263},
  pages        = {310--321},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22729-0\_24},
  doi          = {10.1007/978-3-319-22729-0\_24},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dawak/LiangYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WangHY15,
  author       = {Jingxuan Wang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Data Framing Attacks against Nonlinear State Estimation in Smart Grid},
  booktitle    = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10,
                  2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOMW.2015.7414067},
  doi          = {10.1109/GLOCOMW.2015.7414067},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WangHY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CaoYYZY15,
  author       = {Nairen Cao and
                  Xiaoqi Yu and
                  Yufang Yang and
                  Linru Zhang and
                  Siu{-}Ming Yiu},
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {An {ORAM} Scheme with Improved Worst-Case Computational Overhead},
  booktitle    = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  pages        = {393--405},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29814-6\_33},
  doi          = {10.1007/978-3-319-29814-6\_33},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/CaoYYZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/TangTCYFNHW15,
  author       = {Yanbin Tang and
                  Zheng Tan and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Jun{-}bin Fang and
                  Xiamu Niu and
                  Qi Han and
                  Xianyan Wu},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Fragmented {JPEG} File Recovery Using Pseudo Headers},
  booktitle    = {Advances in Digital Forensics {XI} - 11th {IFIP} {WG} 11.9 International
                  Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {462},
  pages        = {215--231},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24123-4\_13},
  doi          = {10.1007/978-3-319-24123-4\_13},
  timestamp    = {Sun, 25 Oct 2020 23:10:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/TangTCYFNHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbra/LiCYHTLTWY15,
  author       = {Menglu Li and
                  Micheal Cheng and
                  Yongtao Ye and
                  Wing{-}Kai Hon and
                  Hing{-}Fung Ting and
                  Tak Wah Lam and
                  Cy Tang and
                  Thomas Wong and
                  Siu{-}Ming Yiu},
  editor       = {Robert W. Harrison and
                  Yaohang Li and
                  Ion I. Mandoiu},
  title        = {Predicting {RNA} Secondary Structures: One-grammar-fits-all Solution},
  booktitle    = {Bioinformatics Research and Applications - 11th International Symposium,
                  {ISBRA} 2015, Norfolk, VA, USA, June 7-10, 2015 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9096},
  pages        = {211--222},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19048-8\_18},
  doi          = {10.1007/978-3-319-19048-8\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbra/LiCYHTLTWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangY15,
  author       = {Zhiwei Wang and
                  Siu{-}Ming Yiu},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {{CCA} Secure {PKE} with Auxiliary Input Security and Leakage Resiliency},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {319--335},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_18},
  doi          = {10.1007/978-3-319-23318-5\_18},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/LiuJYWTLLJF15,
  author       = {Xiaoyan Liu and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu and
                  Xuan Wang and
                  Chuting Tan and
                  Ye Li and
                  Zechao Liu and
                  Yabin Jin and
                  Jun{-}bin Fang},
  title        = {Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol
                  in Wireless Sensor Networks},
  booktitle    = {11th International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2015, Shenzhen, China, December 16-18, 2015},
  pages        = {124--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSN.2015.42},
  doi          = {10.1109/MSN.2015.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/LiuJYWTLLJF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WangY15,
  author       = {Zhiwei Wang and
                  Siu{-}Ming Yiu},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Attribute-Based Encryption Resilient to Auxiliary Input},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {371--390},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_21},
  doi          = {10.1007/978-3-319-26059-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WangY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CuiWHXZY15,
  author       = {Xingmin Cui and
                  Jingxuan Wang and
                  Lucas Chi Kwong Hui and
                  Zhongwei Xie and
                  Tian Zeng and
                  Siu{-}Ming Yiu},
  title        = {WeChecker: efficient and precise detection of privilege escalation
                  vulnerabilities in Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {25:1--25:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766509},
  doi          = {10.1145/2766498.2766509},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CuiWHXZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2014,
  editor       = {Lucas Chi Kwong Hui and
                  S. H. Qing and
                  Elaine Shi and
                  Siu{-}Ming Yiu},
  title        = {Information and Communications Security - 16th International Conference,
                  {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8958},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21966-0},
  doi          = {10.1007/978-3-319-21966-0},
  isbn         = {978-3-319-21965-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/HuWLCLYY14,
  author       = {Xihao Hu and
                  Thomas K. F. Wong and
                  Zhi John Lu and
                  Ting{-}Fung Chan and
                  Terrence Chi{-}Kong Lau and
                  Siu{-}Ming Yiu and
                  Kevin Y. Yip},
  title        = {Computational identification of protein binding sites on RNAs using
                  high-throughput {RNA} structure-probing data},
  journal      = {Bioinform.},
  volume       = {30},
  number       = {8},
  pages        = {1049--1055},
  year         = {2014},
  url          = {https://doi.org/10.1093/bioinformatics/btt757},
  doi          = {10.1093/BIOINFORMATICS/BTT757},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/HuWLCLYY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcgenomics/WanguYC14,
  author       = {Yi Wang and
                  Henry Chi{-}Ming Leung and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  title        = {MetaCluster-TA: taxonomic annotation for metagenomic data based on
                  assembly-assisted binning},
  journal      = {{BMC} Genom.},
  volume       = {15},
  number       = {{S-1}},
  pages        = {S12},
  year         = {2014},
  url          = {https://doi.org/10.1186/1471-2164-15-S1-S12},
  doi          = {10.1186/1471-2164-15-S1-S12},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcgenomics/WanguYC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LaiCHY14,
  author       = {Pierre K. Y. Lai and
                  Kam{-}Pui Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Modeling the initial stage of a file sharing process on a BitTorrent
                  network},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {7},
  number       = {4},
  pages        = {311--319},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12083-011-0118-2},
  doi          = {10.1007/S12083-011-0118-2},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LaiCHY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/FangJRLCLWNYH14,
  author       = {Jun{-}bin Fang and
                  Zoe Lin Jiang and
                  Kexin Ren and
                  Yunhan Luo and
                  Zhe Chen and
                  Weiping Liu and
                  Xuan Wang and
                  Xiamu Niu and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  title        = {Improved key integrity checking for high-speed quantum key distribution
                  using combinatorial group testing with strongly selective family design},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {6},
  pages        = {1425--1435},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-014-0737-7},
  doi          = {10.1007/S11128-014-0737-7},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/FangJRLCLWNYH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HeCHY14,
  author       = {Yi Jun He and
                  Patrick P. F. Chan and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {{UFLE:} a user-friendly location-free encryption system for mobile
                  users},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {10},
  pages        = {1477--1487},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.615},
  doi          = {10.1002/SEC.615},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HeCHY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ChimYHL14,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li},
  title        = {{VSPN:} VANET-Based Secure and Privacy-Preserving Navigation},
  journal      = {{IEEE} Trans. Computers},
  volume       = {63},
  number       = {2},
  pages        = {510--524},
  year         = {2014},
  url          = {https://doi.org/10.1109/TC.2012.188},
  doi          = {10.1109/TC.2012.188},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/ChimYHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiYCHYQ14,
  author       = {Xingmin Cui and
                  Da Yu and
                  Patrick P. F. Chan and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Sihan Qing},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {CoChecker: Detecting Capability and Sensitive Data Leaks from Component
                  Chains in Android},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {446--453},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_31},
  doi          = {10.1007/978-3-319-08344-5\_31},
  timestamp    = {Thu, 14 Oct 2021 10:41:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiYCHYQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/ShiYLLC14,
  author       = {Jianyu Shi and
                  Siu{-}Ming Yiu and
                  Yiming Li and
                  Henry C. M. Leung and
                  Francis Y. L. Chin},
  editor       = {Huiru Jane Zheng and
                  Werner Dubitzky and
                  Xiaohua Hu and
                  Jin{-}Kao Hao and
                  Daniel P. Berrar and
                  Kwang{-}Hyun Cho and
                  Yadong Wang and
                  David R. Gilbert},
  title        = {Predicting drug-target interaction for new drugs using enhanced similarity
                  measures and super-target clustering\({}^{\mbox{1}}\)},
  booktitle    = {2014 {IEEE} International Conference on Bioinformatics and Biomedicine,
                  {BIBM} 2014, Belfast, United Kingdom, November 2-5, 2014},
  pages        = {45--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/BIBM.2014.6999125},
  doi          = {10.1109/BIBM.2014.6999125},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bibm/ShiYLLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YuenZYL14,
  author       = {Tsz Hon Yuen and
                  Ye Zhang and
                  Siu{-}Ming Yiu and
                  Joseph K. Liu},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Identity-Based Encryption with Post-Challenge Auxiliary Inputs for
                  Secure Cloud Applications and Sensor Networks},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {130--147},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_8},
  doi          = {10.1007/978-3-319-11203-9\_8},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YuenZYL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccve/YeungLCYLH14,
  author       = {Cheuk Yu Yeung and
                  W. C. Law and
                  Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Victor O. K. Li and
                  Lucas Chi Kwong Hui},
  title        = {Distributing blackbox data to multiple vehicles in a secure and privacy-preserving
                  manner},
  booktitle    = {International Conference on Connected Vehicles and Expo, {ICCVE} 2014,
                  Vienna, Austria, November 3-7, 2014},
  pages        = {804--809},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCVE.2014.7297663},
  doi          = {10.1109/ICCVE.2014.7297663},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccve/YeungLCYLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/YangLYCC14,
  author       = {Jie Yang and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Yunpeng Cai and
                  Francis Y. L. Chin},
  editor       = {Ravi Kumar and
                  Hannu Toivonen and
                  Jian Pei and
                  Joshua Zhexue Huang and
                  Xindong Wu},
  title        = {Learning Sparse Gaussian Bayesian Network Structure by Variable Grouping},
  booktitle    = {2014 {IEEE} International Conference on Data Mining, {ICDM} 2014,
                  Shenzhen, China, December 14-17, 2014},
  pages        = {1073--1078},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDM.2014.126},
  doi          = {10.1109/ICDM.2014.126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/YangLYCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChenJYLAW14,
  author       = {Yuechen Chen and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu and
                  Joseph K. Liu and
                  Man Ho Au and
                  Xuan Wang},
  editor       = {Lucas Chi Kwong Hui and
                  S. H. Qing and
                  Elaine Shi and
                  Siu{-}Ming Yiu},
  title        = {Fully Secure Ciphertext-Policy Attribute Based Encryption with Security
                  Mediator},
  booktitle    = {Information and Communications Security - 16th International Conference,
                  {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8958},
  pages        = {274--289},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21966-0\_20},
  doi          = {10.1007/978-3-319-21966-0\_20},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChenJYLAW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ChenXXYS14,
  author       = {Xiaojun Chen and
                  Fei Xu and
                  Rui Xu and
                  Siu{-}Ming Yiu and
                  Jinqiao Shi},
  title        = {A practical real-time authentication system with Identity Tracking
                  based on mouse dynamics},
  booktitle    = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada,
                  April 27 - May 2, 2014},
  pages        = {121--122},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFCOMW.2014.6849185},
  doi          = {10.1109/INFCOMW.2014.6849185},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ChenXXYS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/JanssonSVY14,
  author       = {Jesper Jansson and
                  Wing{-}Kin Sung and
                  Hoa Vu and
                  Siu{-}Ming Yiu},
  editor       = {Hee{-}Kap Ahn and
                  Chan{-}Su Shin},
  title        = {Faster Algorithms for Computing the R* Consensus Tree},
  booktitle    = {Algorithms and Computation - 25th International Symposium, {ISAAC}
                  2014, Jeonju, Korea, December 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8889},
  pages        = {414--425},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13075-0\_33},
  doi          = {10.1007/978-3-319-13075-0\_33},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/JanssonSVY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ChanHY14,
  author       = {Dan T. F. Chan and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Assessing cryptographic signature schemes from a legal perspective},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {322--329},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890955},
  doi          = {10.1109/PST.2014.6890955},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ChanHY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recomb/LeungYC14,
  author       = {Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  editor       = {Roded Sharan},
  title        = {{IDBA-MTP:} {A} Hybrid MetaTranscriptomic Assembler Based on Protein
                  Information},
  booktitle    = {Research in Computational Molecular Biology - 18th Annual International
                  Conference, {RECOMB} 2014, Pittsburgh, PA, USA, April 2-5, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8394},
  pages        = {160--172},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-05269-4\_12},
  doi          = {10.1007/978-3-319-05269-4\_12},
  timestamp    = {Mon, 13 May 2019 09:30:09 +0200},
  biburl       = {https://dblp.org/rec/conf/recomb/LeungYC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/WongKCLY14,
  author       = {Wai Kit Wong and
                  Ben Kao and
                  David Wai{-}Lok Cheung and
                  Rongbin Li and
                  Siu{-}Ming Yiu},
  editor       = {Curtis E. Dyreson and
                  Feifei Li and
                  M. Tamer {\"{O}}zsu},
  title        = {Secure query processing with data interoperability in a cloud database
                  environment},
  booktitle    = {International Conference on Management of Data, {SIGMOD} 2014, Snowbird,
                  UT, USA, June 22-27, 2014},
  pages        = {1395--1406},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2588555.2588572},
  doi          = {10.1145/2588555.2588572},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/WongKCLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2014,
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0},
  doi          = {10.1007/978-3-319-13257-0},
  isbn         = {978-3-319-13256-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2014,
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9},
  doi          = {10.1007/978-3-319-12475-9},
  isbn         = {978-3-319-12474-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuenCZY14,
  author       = {Tsz Hon Yuen and
                  Sherman S. M. Chow and
                  Cong Zhang and
                  Siu{-}Ming Yiu},
  title        = {Exponent-inversion Signatures and {IBE} under Static Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuenCZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ChimYHL13,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li},
  title        = {VANET-based secure taxi service},
  journal      = {Ad Hoc Networks},
  volume       = {11},
  number       = {8},
  pages        = {2381--2390},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.adhoc.2013.06.003},
  doi          = {10.1016/J.ADHOC.2013.06.003},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ChimYHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/PengLYLZC13,
  author       = {Yu Peng and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Ming{-}Ju Lv and
                  Xin{-}Guang Zhu and
                  Francis Y. L. Chin},
  title        = {IDBA-tran: a more robust de novo de Bruijn graph assembler for transcriptomes
                  with uneven expression levels},
  journal      = {Bioinform.},
  volume       = {29},
  number       = {13},
  pages        = {326--334},
  year         = {2013},
  url          = {https://doi.org/10.1093/bioinformatics/btt219},
  doi          = {10.1093/BIOINFORMATICS/BTT219},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/PengLYLZC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/WuZHHCWLPY13,
  author       = {Jikun Wu and
                  Wenqian Zhang and
                  Songbo Huang and
                  Zengquan He and
                  Yanbing Cheng and
                  Jun Wang and
                  Tak Wah Lam and
                  Zhiyu Peng and
                  Siu{-}Ming Yiu},
  title        = {SOAPfusion: a robust and effective computational fusion discovery
                  tool for RNA-seq reads},
  journal      = {Bioinform.},
  volume       = {29},
  number       = {23},
  pages        = {2971--2978},
  year         = {2013},
  url          = {https://doi.org/10.1093/bioinformatics/btt522},
  doi          = {10.1093/BIOINFORMATICS/BTT522},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/WuZHHCWLPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SongWYJN13,
  author       = {Xianhua Song and
                  Shen Wang and
                  Siu{-}Ming Yiu and
                  Lin Jiang and
                  Xiamu Niu},
  title        = {Detection of Image Region Duplication Using Spin Image},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {96-D},
  number       = {7},
  pages        = {1565--1568},
  year         = {2013},
  url          = {https://doi.org/10.1587/transinf.E96.D.1565},
  doi          = {10.1587/TRANSINF.E96.D.1565},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SongWYJN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/YeWLCHY13,
  author       = {Yunming Ye and
                  Qingyao Wu and
                  Yan Li and
                  Kam{-}Pui Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Unknown Chinese word extraction based on variety of overlapping strings},
  journal      = {Inf. Process. Manag.},
  volume       = {49},
  number       = {2},
  pages        = {497--512},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ipm.2012.09.004},
  doi          = {10.1016/J.IPM.2012.09.004},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/YeWLCHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/LeungYPC13,
  author       = {Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  John Parkinson and
                  Francis Y. L. Chin},
  title        = {{IDBA-MT:} \emph{De Novo} Assembler for Metatranscriptomic Data Generated
                  from Next-Generation Sequencing Technology},
  journal      = {J. Comput. Biol.},
  volume       = {20},
  number       = {7},
  pages        = {540--550},
  year         = {2013},
  url          = {https://doi.org/10.1089/cmb.2013.0042},
  doi          = {10.1089/CMB.2013.0042},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcb/LeungYPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HouSUY13,
  author       = {Shuhui Hou and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu},
  title        = {Double Encryption for Data Authenticity and Integrity in Privacy-
                  preserving Confidential Forensic Investigation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {104--113},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.104},
  doi          = {10.22667/JOWUA.2013.06.31.104},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HouSUY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/ZhangWYMC13,
  author       = {Ye Zhang and
                  Wai Kit Wong and
                  Siu{-}Ming Yiu and
                  Nikos Mamoulis and
                  David W. Cheung},
  title        = {Lightweight Privacy-Preserving Peer-to-Peer Data Integration},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {6},
  number       = {3},
  pages        = {157--168},
  year         = {2013},
  url          = {http://www.vldb.org/pvldb/vol6/p157-zhang.pdf},
  doi          = {10.14778/2535569.2448950},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/ZhangWYMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ChinLY13,
  author       = {Francis Y. L. Chin and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu},
  title        = {Non-adaptive complex group testing with multiple positive sets},
  journal      = {Theor. Comput. Sci.},
  volume       = {505},
  pages        = {11--18},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.tcs.2013.04.011},
  doi          = {10.1016/J.TCS.2013.04.011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ChinLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChanHY13,
  author       = {Patrick P. F. Chan and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Heap Graph Based Software Theft Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {1},
  pages        = {101--110},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2012.2223685},
  doi          = {10.1109/TIFS.2012.2223685},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChanHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangFLLIKCHYP13,
  author       = {Zoe Lin Jiang and
                  Jun{-}bin Fang and
                  Frank Y. W. Law and
                  Pierre K. Y. Lai and
                  Ricci S. C. Ieong and
                  Michael Y. K. Kwan and
                  Kam{-}Pui Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kevin K. H. Pun},
  title        = {Maintaining Hard Disk Integrity With Digital Legal Professional Privilege
                  {(LPP)} Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {5},
  pages        = {821--828},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2256784},
  doi          = {10.1109/TIFS.2013.2256784},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangFLLIKCHYP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcb/YeCWYZLT13,
  author       = {Yongtao Ye and
                  David W. Cheung and
                  Yadong Wang and
                  Siu{-}Ming Yiu and
                  Qing Zhan and
                  Tak Wah Lam and
                  Hing{-}Fung Ting},
  editor       = {Jing Gao},
  title        = {GLProbs: Aligning multiple sequences adaptively},
  booktitle    = {{ACM} Conference on Bioinformatics, Computational Biology and Biomedical
                  Informatics. {ACM-BCB} 2013, Washington, DC, USA, September 22-25,
                  2013},
  pages        = {152},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2506583.2506611},
  doi          = {10.1145/2506583.2506611},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bcb/YeCWYZLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcb/ZhuLCYQLW13,
  author       = {Xiao Zhu and
                  Henry C. M. Leung and
                  Francis Y. L. Chin and
                  Siu{-}Ming Yiu and
                  Guangri Quan and
                  Bo Liu and
                  Yadong Wang},
  editor       = {Jing Gao},
  title        = {{PERGA:} {A} Paired-End Read Guided De Novo Assembler for Extending
                  Contigs Using {SVM} Approach},
  booktitle    = {{ACM} Conference on Bioinformatics, Computational Biology and Biomedical
                  Informatics. {ACM-BCB} 2013, Washington, DC, USA, September 22-25,
                  2013},
  pages        = {161},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2506583.2506612},
  doi          = {10.1145/2506583.2506612},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bcb/ZhuLCYQLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/YangLYCC13,
  author       = {Jie Yang and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Yunpeng Cai and
                  Francis Y. L. Chin},
  editor       = {Guo{-}Zheng Li and
                  Sunghoon Kim and
                  Michael Hughes and
                  Geoffrey J. McLachlan and
                  Hongye Sun and
                  Xiaohua Hu and
                  Habtom W. Ressom and
                  Baoyan Liu and
                  Michael N. Liebman},
  title        = {Intra- and inter-sparse multiple output regression with application
                  on environmental microbial community study},
  booktitle    = {2013 {IEEE} International Conference on Bioinformatics and Biomedicine,
                  Shanghai, China, December 18-21, 2013},
  pages        = {404--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/BIBM.2013.6732526},
  doi          = {10.1109/BIBM.2013.6732526},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bibm/YangLYCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiongYZYH13,
  author       = {Hao Xiong and
                  Tsz Hon Yuen and
                  Cong Zhang and
                  Siu{-}Ming Yiu and
                  Yi Jun He},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {Leakage-resilient certificateless public key encryption},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484394},
  doi          = {10.1145/2484389.2484394},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XiongYZYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangYXCYH13,
  author       = {Cong Zhang and
                  Tsz Hon Yuen and
                  Hao Xiong and
                  Sherman S. M. Chow and
                  Siu{-}Ming Yiu and
                  Yi Jun He},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Multi-key leakage-resilient threshold cryptography},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484321},
  doi          = {10.1145/2484313.2484321},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangYXCYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/LiangCHFYH13,
  author       = {Y. Liang and
                  Kam{-}Pui Chow and
                  Lucas Chi Kwong Hui and
                  Jun{-}bin Fang and
                  Siu{-}Ming Yiu and
                  Shuhui Hou},
  title        = {Towards a Better Similarity Measure for Keyword Profiling via Clustering},
  booktitle    = {{IEEE} 37th Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2013, Kyoto, Japan, July 22-26, 2013},
  pages        = {16--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/COMPSACW.2013.19},
  doi          = {10.1109/COMPSACW.2013.19},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/LiangCHFYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccve/ChimYYLH13,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Cheuk Yu Yeung and
                  Victor O. K. Li and
                  Lucas C. K. Hui},
  title        = {Secure, privacy-preserving, distributed motor vehicle event data recorder},
  booktitle    = {International Conference on Connected Vehicles and Expo, {ICCVE} 2012,
                  Las Vegas, NV, USA, December 2-6, 2013},
  pages        = {337--342},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCVE.2013.6799817},
  doi          = {10.1109/ICCVE.2013.6799817},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/iccve/ChimYYLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/HouSUY13,
  author       = {Shuhui Hou and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {Verifying Data Authenticity and Integrity in Server-Aided Confidential
                  Forensic Investigation},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {312--317},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_33},
  doi          = {10.1007/978-3-642-36818-9\_33},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/HouSUY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbra/VuCHLSSY13,
  author       = {Hoa Vu and
                  Francis Y. L. Chin and
                  Wing{-}Kai Hon and
                  Henry C. M. Leung and
                  Kunihiko Sadakane and
                  Ken Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  editor       = {Zhipeng Cai and
                  Oliver Eulenstein and
                  Daniel Janies and
                  Daniel Schwartz},
  title        = {Reconstructing \emph{k}-Reticulated Phylogenetic Network from a Set
                  of Gene Trees},
  booktitle    = {Bioinformatics Research and Applications, 9th International Symposium,
                  {ISBRA} 2013, Charlotte, NC, USA, May 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7875},
  pages        = {112--124},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38036-5\_14},
  doi          = {10.1007/978-3-642-38036-5\_14},
  timestamp    = {Thu, 20 Aug 2020 15:56:19 +0200},
  biburl       = {https://dblp.org/rec/conf/isbra/VuCHLSSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbra/LiuCTLY13,
  author       = {Xuan Liu and
                  David Wai{-}Lok Cheung and
                  Hing{-}Fung Ting and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  editor       = {Zhipeng Cai and
                  Oliver Eulenstein and
                  Daniel Janies and
                  Daniel Schwartz},
  title        = {LCR{\_}Finder: {A} de Novo Low Copy Repeat Finder for Human Genome},
  booktitle    = {Bioinformatics Research and Applications, 9th International Symposium,
                  {ISBRA} 2013, Charlotte, NC, USA, May 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7875},
  pages        = {125--136},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38036-5\_15},
  doi          = {10.1007/978-3-642-38036-5\_15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isbra/LiuCTLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XiongYZHY13,
  author       = {Hao Xiong and
                  Tsz Hon Yuen and
                  Cong Zhang and
                  Yi Jun He and
                  Siu{-}Ming Yiu},
  editor       = {Robert H. Deng and
                  Tao Feng},
  title        = {Attribute Specified Identity-Based Encryption},
  booktitle    = {Information Security Practice and Experience - 9th International Conference,
                  {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7863},
  pages        = {60--74},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38033-4\_5},
  doi          = {10.1007/978-3-642-38033-4\_5},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/XiongYZHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/XiongYHY13,
  author       = {Hao Xiong and
                  Xiaoqi Yu and
                  Yi Jun He and
                  Siu{-}Ming Yiu},
  editor       = {James J. Park and
                  Joseph Kee{-}Yin Ng and
                  Hwa{-}Young Jeong and
                  Agustinus Borgy Waluyo},
  title        = {Improved Composite Order Bilinear Pairing on Graphics Hardware},
  booktitle    = {Multimedia and Ubiquitous Engineering, {MUE} 2013, May 9-11, 2013,
                  Seoul, Korea},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {240},
  pages        = {731--737},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-94-007-6738-6\_90},
  doi          = {10.1007/978-94-007-6738-6\_90},
  timestamp    = {Wed, 14 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mue/XiongYHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prib/HsuWHLLY13,
  author       = {Bay{-}Yuan Hsu and
                  Thomas K. F. Wong and
                  Wing{-}Kai Hon and
                  Xinyi Liu and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  editor       = {Alioune Ngom and
                  Enrico Formenti and
                  Jin{-}Kao Hao and
                  Xing{-}Ming Zhao and
                  Twan van Laarhoven},
  title        = {A Local Structural Prediction Algorithm for {RNA} Triple Helix Structure},
  booktitle    = {Pattern Recognition in Bioinformatics - 8th {IAPR} International Conference,
                  {PRIB} 2013, Nice, France, June 17-20, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7986},
  pages        = {102--113},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39159-0\_10},
  doi          = {10.1007/978-3-642-39159-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/prib/HsuWHLLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/ZhouTFJCYHXMHX13,
  author       = {Gang Zhou and
                  Yanbin Tang and
                  Jun{-}bin Fang and
                  Zoe Lin Jiang and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Rongsheng Xu and
                  Yonghao Mai and
                  Shuhui Hou and
                  Fei Xu},
  editor       = {Kui Ren and
                  Xue Liu and
                  Weifa Liang and
                  Ming Xu and
                  Xiaohua Jia and
                  Kai Xing},
  title        = {Photo Forensics on Shanzhai Mobile Phone},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 8th International
                  Conference, {WASA} 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7992},
  pages        = {454--464},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39701-1\_37},
  doi          = {10.1007/978-3-642-39701-1\_37},
  timestamp    = {Mon, 01 May 2023 19:52:19 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/ZhouTFJCYHXMHX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuenZY13,
  author       = {Tsz Hon Yuen and
                  Ye Zhang and
                  Siu{-}Ming Yiu},
  title        = {Encryption Schemes with Post-Challenge Auxiliary Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuenZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ChimYHL12,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li},
  title        = {{MLAS:} Multiple level authentication scheme for VANETs},
  journal      = {Ad Hoc Networks},
  volume       = {10},
  number       = {7},
  pages        = {1445--1456},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.adhoc.2012.03.020},
  doi          = {10.1016/J.ADHOC.2012.03.020},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ChimYHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/LiuWWLYLWYCZLL12,
  author       = {Chi{-}Man Liu and
                  Thomas K. F. Wong and
                  Edward Wu and
                  Ruibang Luo and
                  Siu{-}Ming Yiu and
                  Yingrui Li and
                  Bingqiang Wang and
                  Chang Yu and
                  Xiaowen Chu and
                  Kaiyong Zhao and
                  Ruiqiang Li and
                  Tak Wah Lam},
  title        = {{SOAP3:} ultra-fast GPU-based parallel alignment tool for short reads},
  journal      = {Bioinform.},
  volume       = {28},
  number       = {6},
  pages        = {878--879},
  year         = {2012},
  url          = {https://doi.org/10.1093/bioinformatics/bts061},
  doi          = {10.1093/BIOINFORMATICS/BTS061},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/LiuWWLYLWYCZLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/PengLYC12,
  author       = {Yu Peng and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  title        = {{IDBA-UD:} a \emph{de novo} assembler for single-cell and metagenomic
                  sequencing data with highly uneven depth},
  journal      = {Bioinform.},
  volume       = {28},
  number       = {11},
  pages        = {1420--1428},
  year         = {2012},
  url          = {https://doi.org/10.1093/bioinformatics/bts174},
  doi          = {10.1093/BIOINFORMATICS/BTS174},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/PengLYC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/WangLYC12,
  author       = {Yi Wang and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  title        = {MetaCluster 5.0: a two-round binning approach for metagenomic data
                  for low-abundance species in a noisy sample},
  journal      = {Bioinform.},
  volume       = {28},
  number       = {18},
  pages        = {356--362},
  year         = {2012},
  url          = {https://doi.org/10.1093/bioinformatics/bts397},
  doi          = {10.1093/BIOINFORMATICS/BTS397},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/WangLYC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/LiuYYLXCSZLLL12,
  author       = {Binghang Liu and
                  Jianying Yuan and
                  Siu{-}Ming Yiu and
                  Zhenyu Li and
                  Yinlong Xie and
                  Yanxiang Chen and
                  Yujian Shi and
                  Hao Zhang and
                  Yingrui Li and
                  Tak Wah Lam and
                  Ruibang Luo},
  title        = {{COPE:} an accurate \emph{k}-mer-based pair-end reads connection tool
                  to facilitate genome assembly},
  journal      = {Bioinform.},
  volume       = {28},
  number       = {22},
  pages        = {2870--2874},
  year         = {2012},
  url          = {https://doi.org/10.1093/bioinformatics/bts563},
  doi          = {10.1093/BIOINFORMATICS/BTS563},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/LiuYYLXCSZLLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ChimYHL12,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li},
  title        = {Privacy-preserving advance power reservation},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {50},
  number       = {8},
  pages        = {18--23},
  year         = {2012},
  url          = {https://doi.org/10.1109/MCOM.2012.6257522},
  doi          = {10.1109/MCOM.2012.6257522},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ChimYHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HuCYHL12,
  author       = {Changhui Hu and
                  Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li},
  title        = {Efficient HMAC-based secure communication for VANETs},
  journal      = {Comput. Networks},
  volume       = {56},
  number       = {9},
  pages        = {2292--2303},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comnet.2012.04.002},
  doi          = {10.1016/J.COMNET.2012.04.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/HuCYHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/WangLYC12,
  author       = {Yi Wang and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  title        = {MetaCluster 4.0: {A} Novel Binning Algorithm for {NGS} Reads and Huge
                  Number of Species},
  journal      = {J. Comput. Biol.},
  volume       = {19},
  number       = {2},
  pages        = {241--249},
  year         = {2012},
  url          = {https://doi.org/10.1089/cmb.2011.0276},
  doi          = {10.1089/CMB.2011.0276},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcb/WangLYC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/WongY12,
  author       = {Thomas K. F. Wong and
                  Siu{-}Ming Yiu},
  title        = {Structural Alignment of {RNA} with Triple Helix Structure},
  journal      = {J. Comput. Biol.},
  volume       = {19},
  number       = {4},
  pages        = {365--378},
  year         = {2012},
  url          = {https://doi.org/10.1089/cmb.2010.0052},
  doi          = {10.1089/CMB.2010.0052},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcb/WongY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisec/ChimCYHL12,
  author       = {Tat Wing Chim and
                  Jeanno Chin Long Cheung and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li},
  title        = {{SPCS:} Secure and Privacy-Preserving Charging-Station Searching using
                  {VANET}},
  journal      = {J. Information Security},
  volume       = {3},
  number       = {1},
  pages        = {59--67},
  year         = {2012},
  url          = {https://doi.org/10.4236/jis.2012.31007},
  doi          = {10.4236/JIS.2012.31007},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisec/ChimCYHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/WongCLY12,
  author       = {Thomas K. F. Wong and
                  Y. S. Chiu and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  title        = {Memory Efficient Algorithms for Structural Alignment of RNAs with
                  Pseudoknots},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {9},
  number       = {1},
  pages        = {161--168},
  year         = {2012},
  url          = {https://doi.org/10.1109/TCBB.2011.66},
  doi          = {10.1109/TCBB.2011.66},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/WongCLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/MaWLHSY12,
  author       = {Christopher Ma and
                  Thomas K. F. Wong and
                  Tak Wah Lam and
                  Wing{-}Kai Hon and
                  Kunihiko Sadakane and
                  Siu{-}Ming Yiu},
  title        = {An Efficient Alignment Algorithm for Searching Simple Pseudoknots
                  over Long Genomic Sequence},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {9},
  number       = {6},
  pages        = {1629--1638},
  year         = {2012},
  url          = {https://doi.org/10.1109/TCBB.2012.104},
  doi          = {10.1109/TCBB.2012.104},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/MaWLHSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuenYH12,
  author       = {Tsz Hon Yuen and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Fully Leakage-Resilient Signatures with Auxiliary Inputs},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {294--307},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_22},
  doi          = {10.1007/978-3-642-31448-3\_22},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuenYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChowHHY12,
  author       = {Sherman S. M. Chow and
                  Yi Jun He and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {{SPICE} - Simple Privacy-Preserving Identity-Management for Cloud
                  Environment},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {526--543},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_31},
  doi          = {10.1007/978-3-642-31284-7\_31},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChowHHY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcb/LuoYLLWYLT12,
  author       = {Ruibang Luo and
                  Chang Yu and
                  Chi{-}Man Liu and
                  Tak Wah Lam and
                  Thomas K. F. Wong and
                  Siu{-}Ming Yiu and
                  Ruiqiang Li and
                  Hing{-}Fung Ting},
  editor       = {Sanjay Ranka and
                  Tamer Kahveci and
                  Mona Singh},
  title        = {Efficient SNP-sensitive alignment and database-assisted {SNP} calling
                  for low coverage samples},
  booktitle    = {{ACM} International Conference on Bioinformatics, Computational Biology
                  and Biomedicine, BCB' 12, Orlando, FL, {USA} - October 08 - 10, 2012},
  pages        = {163--169},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382936.2382957},
  doi          = {10.1145/2382936.2382957},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bcb/LuoYLLWYLT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YuYCYH12,
  author       = {Kin Ying Yu and
                  Tsz Hon Yuen and
                  Sherman S. M. Chow and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {{PE(AR)2:} Privacy-Enhanced Anonymous Authentication with Reputation
                  and Revocation},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {679--696},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_39},
  doi          = {10.1007/978-3-642-33167-1\_39},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/YuYCYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/YuenCZY12,
  author       = {Tsz Hon Yuen and
                  Sherman S. M. Chow and
                  Ye Zhang and
                  Siu{-}Ming Yiu},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Identity-Based Encryption Resilient to Continual Auxiliary Leakage},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {117--134},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_9},
  doi          = {10.1007/978-3-642-29011-4\_9},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/YuenCZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XiongZYZYQ12,
  author       = {Hao Xiong and
                  Cong Zhang and
                  Tsz Hon Yuen and
                  Echo P. Zhang and
                  Siu{-}Ming Yiu and
                  Sihan Qing},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State
                  Model},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {119--130},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_11},
  doi          = {10.1007/978-3-642-34129-8\_11},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/XiongZYZYQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangXWMY12,
  author       = {Ye Zhang and
                  Chun Jason Xue and
                  Duncan S. Wong and
                  Nikos Mamoulis and
                  Siu{-}Ming Yiu},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {341--348},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_31},
  doi          = {10.1007/978-3-642-34129-8\_31},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangXWMY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChimYHLMTKY12,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li and
                  Tin Wing Mui and
                  Yu Hin Tsang and
                  Chun Kin Kwok and
                  Kwun Yin Yu},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Selling Power Back to the Grid in a Secure and Privacy-Preserving
                  Manner},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {445--452},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_43},
  doi          = {10.1007/978-3-642-34129-8\_43},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ChimYHLMTKY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/FangJCYHZHT12,
  author       = {Jun{-}bin Fang and
                  Zoe Lin Jiang and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Gang Zhou and
                  Mengfei He and
                  Yanbin Tang},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones},
  booktitle    = {Advances in Digital Forensics {VIII} - 8th {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Pretoria, South Africa, January 3-5,
                  2012, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {383},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33962-2\_9},
  doi          = {10.1007/978-3-642-33962-2\_9},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/FangJCYHZHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbra/YuLYZCHW12,
  author       = {Junjie Yu and
                  Henry Chi{-}Ming Leung and
                  Siu{-}Ming Yiu and
                  Yong Zhang and
                  Francis Y. L. Chin and
                  Nathan Hobbs and
                  Amy Y. X. Wang},
  editor       = {Leonidas G. Bleris and
                  Ion I. Mandoiu and
                  Russell Schwartz and
                  Jianxin Wang},
  title        = {Phylogenetic Tree Reconstruction with Protein Linkage},
  booktitle    = {Bioinformatics Research and Applications - 8th International Symposium,
                  {ISBRA} 2012, Dallas, TX, USA, May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7292},
  pages        = {315--327},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30191-9\_29},
  doi          = {10.1007/978-3-642-30191-9\_29},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/isbra/YuLYZCHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/HeCHY12,
  author       = {Yi Jun He and
                  Tat Wing Chim and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Albert Levi and
                  Mohamad Badra and
                  Matteo Cesana and
                  Mona Ghassemian and
                  {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and
                  Nafa{\^{a}} Jabeur and
                  Marek Klonowski and
                  Antonio Ma{\~{n}}a and
                  Susana Sargento and
                  Sherali Zeadally},
  title        = {Non-Transferable Proxy Re-Encryption Scheme},
  booktitle    = {5th International Conference on New Technologies, Mobility and Security,
                  Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NTMS.2012.6208714},
  doi          = {10.1109/NTMS.2012.6208714},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/HeCHY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChanHY12,
  author       = {Patrick P. F. Chan and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {DroidChecker: analyzing android applications for capability leak},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {125--136},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185466},
  doi          = {10.1145/2185448.2185466},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChanHY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ChimYHL11,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li},
  title        = {{SPECS:} Secure and privacy enhancing communications schemes for VANETs},
  journal      = {Ad Hoc Networks},
  volume       = {9},
  number       = {2},
  pages        = {189--203},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.adhoc.2010.05.005},
  doi          = {10.1016/J.ADHOC.2010.05.005},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ChimYHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/LeungYYPWLCQLC11,
  author       = {Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Bin Yang and
                  Yu Peng and
                  Yi Wang and
                  Zhihua Liu and
                  Jing{-}Chi Chen and
                  Junjie Qin and
                  Ruiqiang Li and
                  Francis Y. L. Chin},
  title        = {A robust and accurate binning algorithm for metagenomic sequences
                  with arbitrary species abundance ratio},
  journal      = {Bioinform.},
  volume       = {27},
  number       = {11},
  pages        = {1489--1495},
  year         = {2011},
  url          = {https://doi.org/10.1093/bioinformatics/btr186},
  doi          = {10.1093/BIOINFORMATICS/BTR186},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/LeungYYPWLCQLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/PengLYC11,
  author       = {Yu Peng and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  title        = {Meta-IDBA: a \emph{de Novo} assembler for metagenomic data},
  journal      = {Bioinform.},
  volume       = {27},
  number       = {13},
  pages        = {94--101},
  year         = {2011},
  url          = {https://doi.org/10.1093/bioinformatics/btr216},
  doi          = {10.1093/BIOINFORMATICS/BTR216},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/PengLYC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/WongWHCHLY11,
  author       = {Thomas K. F. Wong and
                  Kwok{-}Lung Wan and
                  Bay{-}Yuan Hsu and
                  Brenda W. Y. Cheung and
                  Wing{-}Kai Hon and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  title        = {RNASAlign: {RNA} Structural Alignment System},
  journal      = {Bioinform.},
  volume       = {27},
  number       = {15},
  pages        = {2151--2152},
  year         = {2011},
  url          = {https://doi.org/10.1093/bioinformatics/btr338},
  doi          = {10.1093/BIOINFORMATICS/BTR338},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/WongWHCHLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChowY11,
  author       = {Sherman S. M. Chow and
                  Siu{-}Ming Yiu},
  title        = {Exclusion-intersection encryption},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {136--146},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043672},
  doi          = {10.1504/IJSN.2011.043672},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChowY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/WongLSCY11,
  author       = {Thomas K. F. Wong and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Brenda W. Y. Cheung and
                  Siu{-}Ming Yiu},
  title        = {Structural Alignment of {RNA} with Complex Pseudoknot Structure},
  journal      = {J. Comput. Biol.},
  volume       = {18},
  number       = {1},
  pages        = {97--108},
  year         = {2011},
  url          = {https://doi.org/10.1089/cmb.2009.0275},
  doi          = {10.1089/CMB.2009.0275},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcb/WongLSCY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/JiangFHYCS11,
  author       = {Zoe Lin Jiang and
                  Jun{-}bin Fang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow and
                  Meng{-}meng Sheng},
  title        = {k-Dimensional hashing scheme for hard disk integrity verification
                  in computer forensics},
  journal      = {J. Zhejiang Univ. Sci. {C}},
  volume       = {12},
  number       = {10},
  pages        = {809--818},
  year         = {2011},
  url          = {https://doi.org/10.1631/jzus.C1000425},
  doi          = {10.1631/JZUS.C1000425},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/JiangFHYCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/ChimYHL11,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li},
  title        = {{OPQ:} OT-Based Private Querying in VANETs},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {12},
  number       = {4},
  pages        = {1413--1422},
  year         = {2011},
  url          = {https://doi.org/10.1109/TITS.2011.2158208},
  doi          = {10.1109/TITS.2011.2158208},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/ChimYHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcb/LiuCWLY11,
  author       = {Xuan Liu and
                  Shing{-}Wan Choi and
                  Thomas K. F. Wong and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  editor       = {Robert Grossman and
                  Andrey Rzhetsky and
                  Sun Kim and
                  Wei Wang},
  title        = {Detection of novel tandem duplication with next-generation sequencing},
  booktitle    = {{ACM} International Conference on Bioinformatics, Computational Biology
                  and Biomedicine, BCB' 11, Chicago, IL, {USA} - July 31 - August 03,
                  2011},
  pages        = {415--419},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2147805.2147861},
  doi          = {10.1145/2147805.2147861},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bcb/LiuCWLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcb/WongYHLHY11,
  author       = {Thomas K. F. Wong and
                  Hui{-}Ting Yu and
                  Bay{-}Yuan Hsu and
                  Tak Wah Lam and
                  Wing{-}Kai Hon and
                  Siu{-}Ming Yiu},
  editor       = {Robert Grossman and
                  Andrey Rzhetsky and
                  Sun Kim and
                  Wei Wang},
  title        = {Algorithms for pseudoknot classification},
  booktitle    = {{ACM} International Conference on Bioinformatics, Computational Biology
                  and Biomedicine, BCB' 11, Chicago, IL, {USA} - July 31 - August 03,
                  2011},
  pages        = {484--486},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2147805.2147877},
  doi          = {10.1145/2147805.2147877},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bcb/WongYHLHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bicob/LeungLXYC11,
  author       = {Henry Chi{-}Ming Leung and
                  Shuen{-}Yi Leung and
                  Carlos Lu Xiang and
                  Siu{-}Ming Yiu and
                  Francis Yuk{-}Lun Chin},
  editor       = {Hisham Al{-}Mubaid},
  title        = {DMPFinder - Finding Differentiating Pathways with Gaps from Two Groups
                  of Metabolic Networks},
  booktitle    = {Proceedings of the {ISCA} 3rd International Conference on Bioinformatics
                  and Computational Biology, BICoB-2011, March 23-25, 2011, Holiday
                  Inn Downtown-Superdome, New Orleans, Louisiana, {USA}},
  pages        = {80--85},
  publisher    = {{ISCA}},
  year         = {2011},
  timestamp    = {Mon, 14 Nov 2011 12:10:34 +0100},
  biburl       = {https://dblp.org/rec/conf/bicob/LeungLXYC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChimHYL11,
  author       = {Tat Wing Chim and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Victor O. K. Li},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {\emph{MLAS}: multiple level authentication scheme for VANETs},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {471--475},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966982},
  doi          = {10.1145/1966913.1966982},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChimHYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/ChanHY11,
  author       = {Patrick P. F. Chan and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {Dynamic Software Birthmark for Java Based on Heap Memory Analysis},
  booktitle    = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  pages        = {94--107},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5\_8},
  doi          = {10.1007/978-3-642-24712-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/ChanHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ChanHY11,
  author       = {Patrick P. F. Chan and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap},
  booktitle    = {Proceedings of the 35th Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22
                  July 2011},
  pages        = {407--412},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/COMPSAC.2011.60},
  doi          = {10.1109/COMPSAC.2011.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ChanHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/CheungCYLH11,
  author       = {Jeanno Chin Long Cheung and
                  Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Victor O. K. Li and
                  Lucas Chi Kwong Hui},
  title        = {Credential-Based Privacy-Preserving Power Request Scheme for Smart
                  Grid Network},
  booktitle    = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011,
                  5-9 December 2011, Houston, Texas, {USA}},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/GLOCOM.2011.6134566},
  doi          = {10.1109/GLOCOM.2011.6134566},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/CheungCYLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/ZhengLCHY11,
  author       = {Xueling Zheng and
                  Yiu Ming Lai and
                  Kam{-}Pui Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Xiamu Niu and
                  Mingchu Li and
                  Y{\^{o}}iti Suzuki and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain},
  title        = {Sockpuppet Detection in Online Discussion Forums},
  booktitle    = {Seventh International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October
                  14-16, 2011},
  pages        = {374--377},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IIHMSP.2011.69},
  doi          = {10.1109/IIHMSP.2011.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/ZhengLCHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/HouUYHC11,
  author       = {Shuhui Hou and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow},
  editor       = {Xiamu Niu and
                  Mingchu Li and
                  Y{\^{o}}iti Suzuki and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain},
  title        = {Privacy Preserving Confidential Forensic Investigation for Shared
                  or Remote Servers},
  booktitle    = {Seventh International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October
                  14-16, 2011},
  pages        = {378--383},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IIHMSP.2011.28},
  doi          = {10.1109/IIHMSP.2011.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/HouUYHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/LaiZCHY11,
  author       = {Yuk{-}Ming Lai and
                  Xueling Zheng and
                  Kam{-}Pui Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Xiamu Niu and
                  Mingchu Li and
                  Y{\^{o}}iti Suzuki and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain},
  title        = {Automatic Online Monitoring and Data-Mining Internet Forums},
  booktitle    = {Seventh International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October
                  14-16, 2011},
  pages        = {384--387},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IIHMSP.2011.71},
  doi          = {10.1109/IIHMSP.2011.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/LaiZCHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/ChinLY11,
  author       = {Francis Y. L. Chin and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu},
  editor       = {Takao Asano and
                  Shin{-}Ichi Nakano and
                  Yoshio Okamoto and
                  Osamu Watanabe},
  title        = {Adaptive Phenotype Testing for {AND/OR} Items},
  booktitle    = {Algorithms and Computation - 22nd International Symposium, {ISAAC}
                  2011, Yokohama, Japan, December 5-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7074},
  pages        = {754--763},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25591-5\_77},
  doi          = {10.1007/978-3-642-25591-5\_77},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/ChinLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recomb/PengLYC11,
  author       = {Yu Peng and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  editor       = {Vineet Bafna and
                  S{\"{u}}leyman Cenk Sahinalp},
  title        = {{T-IDBA:} {A} de novo Iterative de Bruijn Graph Assembler for Transcriptome
                  - (Extended Abstract)},
  booktitle    = {Research in Computational Molecular Biology - 15th Annual International
                  Conference, {RECOMB} 2011, Vancouver, BC, Canada, March 28-31, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6577},
  pages        = {337--338},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20036-6\_31},
  doi          = {10.1007/978-3-642-20036-6\_31},
  timestamp    = {Mon, 13 May 2019 09:30:09 +0200},
  biburl       = {https://dblp.org/rec/conf/recomb/PengLYC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/FangJYCHCN11,
  author       = {Jun{-}bin Fang and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow and
                  Lucas Chi Kwong Hui and
                  Long Chen and
                  Xiamu Niu},
  editor       = {Robert F. Erbacher and
                  Roy H. Campbell and
                  Yong Guan},
  title        = {A Dual Cube Hashing Scheme for Solving {LPP} Integrity Problem},
  booktitle    = {2011 {IEEE} Sixth International Workshop on Systematic Approaches
                  to Digital Forensic Engineering, {SADFE} 2011, Oakland, CA, USA, May
                  26, 2011},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SADFE.2011.1},
  doi          = {10.1109/SADFE.2011.1},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/FangJYCHCN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/LawCYCKTL11,
  author       = {Frank Y. W. Law and
                  Patrick P. F. Chan and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow and
                  Michael Y. K. Kwan and
                  Hayson Tse and
                  Pierre K. Y. Lai},
  editor       = {Robert F. Erbacher and
                  Roy H. Campbell and
                  Yong Guan},
  title        = {Protecting Digital Data Privacy in Computer Forensic Examination},
  booktitle    = {2011 {IEEE} Sixth International Workshop on Systematic Approaches
                  to Digital Forensic Engineering, {SADFE} 2011, Oakland, CA, USA, May
                  26, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SADFE.2011.15},
  doi          = {10.1109/SADFE.2011.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/LawCYCKTL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/ChimYHL11,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li},
  title        = {{PASS:} Privacy-preserving authentication scheme for smart grid network},
  booktitle    = {{IEEE} Second International Conference on Smart Grid Communications,
                  SmartGridComm 2011, Brussels, Belgium, October 17-20, 2011},
  pages        = {196--201},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SmartGridComm.2011.6102316},
  doi          = {10.1109/SMARTGRIDCOMM.2011.6102316},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/ChimYHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tamc/ChinLY11,
  author       = {Francis Y. L. Chin and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu},
  editor       = {Mitsunori Ogihara and
                  Jun Tarui},
  title        = {Non-adaptive Complex Group Testing with Multiple Positive Sets},
  booktitle    = {Theory and Applications of Models of Computation - 8th Annual Conference,
                  {TAMC} 2011, Tokyo, Japan, May 23-25, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6648},
  pages        = {172--183},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20877-5\_19},
  doi          = {10.1007/978-3-642-20877-5\_19},
  timestamp    = {Sun, 25 Oct 2020 23:06:59 +0100},
  biburl       = {https://dblp.org/rec/conf/tamc/ChinLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/WongY11,
  author       = {Thomas K. F. Wong and
                  Siu{-}Ming Yiu},
  editor       = {Limin Angela Liu and
                  Dong{-}Qing Wei and
                  Yixue Li and
                  Huimin Lei},
  title        = {Structural Alignment of RNAs with Pseudoknots},
  booktitle    = {Handbook of Research on Computational and Systems Biology - Interdisciplinary
                  Applications},
  pages        = {550--571},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-491-2.ch024},
  doi          = {10.4018/978-1-60960-491-2.CH024},
  timestamp    = {Tue, 01 Jun 2021 09:58:05 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/WongY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangXWMY11,
  author       = {Ye Zhang and
                  Chun Jason Xue and
                  Duncan S. Wong and
                  Nikos Mamoulis and
                  Siu{-}Ming Yiu},
  title        = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangXWMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/YangPLYCC10,
  author       = {Bin Yang and
                  Yu Peng and
                  Henry Chi{-}Ming Leung and
                  Siu{-}Ming Yiu and
                  Jing{-}Chi Chen and
                  Francis Yuk{-}Lun Chin},
  title        = {Unsupervised binning of environmental genomic fragments based on an
                  error robust selection of \emph{l}-mers},
  journal      = {{BMC} Bioinform.},
  volume       = {11},
  number       = {{S-2}},
  pages        = {5},
  year         = {2010},
  url          = {https://doi.org/10.1186/1471-2105-11-S2-S5},
  doi          = {10.1186/1471-2105-11-S2-S5},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/YangPLYCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbra/WongLYW10,
  author       = {Thomas K. F. Wong and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu and
                  Simon C. K. Wong},
  title        = {Improving the accuracy of signal transduction pathway construction
                  using level-2 neighbours},
  journal      = {Int. J. Bioinform. Res. Appl.},
  volume       = {6},
  number       = {6},
  pages        = {542--555},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJBRA.2010.038736},
  doi          = {10.1504/IJBRA.2010.038736},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbra/WongLYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaim/HuangLSTY10,
  author       = {Songbo Huang and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Siu{-}Lung Tam and
                  Siu{-}Ming Yiu},
  editor       = {Bo Chen},
  title        = {Indexing Similar {DNA} Sequences},
  booktitle    = {Algorithmic Aspects in Information and Management, 6th International
                  Conference, {AAIM} 2010, Weihai, China, July 19-21, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6124},
  pages        = {180--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14355-7\_19},
  doi          = {10.1007/978-3-642-14355-7\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aaim/HuangLSTY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcb/YangPLYQLC10,
  author       = {Bin Yang and
                  Yu Peng and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Junjie Qin and
                  Ruiqiang Li and
                  Francis Y. L. Chin},
  editor       = {Aidong Zhang and
                  Mark Borodovsky and
                  Gultekin {\"{O}}zsoyoglu and
                  Armin R. Mikler},
  title        = {MetaCluster: unsupervised binning of environmental genomic fragments
                  and taxonomic annotation},
  booktitle    = {Proceedings of the First {ACM} International Conference on Bioinformatics
                  and Computational Biology, {BCB} 2010, Niagara Falls, NY, USA, August
                  2-4, 2010},
  pages        = {170--179},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854776.1854803},
  doi          = {10.1145/1854776.1854803},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bcb/YangPLYQLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/LeungLXYC10,
  author       = {Shuen{-}Yi Leung and
                  Henry C. M. Leung and
                  Carlos Lu Xiang and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  title        = {Predicting metabolic pathways from metabolic networks with limited
                  biological knowledge},
  booktitle    = {2010 {IEEE} International Conference on Bioinformatics and Biomedicine
                  Workshops, {BIBMW} 2010, Hong Kong, December 18, 2010},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/BIBMW.2010.5703765},
  doi          = {10.1109/BIBMW.2010.5703765},
  timestamp    = {Wed, 24 Nov 2021 15:06:06 +0100},
  biburl       = {https://dblp.org/rec/conf/bibm/LeungLXYC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biocomp/JiaWSSY10,
  author       = {Yizhen Jia and
                  Thomas K. F. Wong and
                  You{-}Qiang Song and
                  David K. Smith and
                  Siu{-}Ming Yiu},
  editor       = {Hamid R. Arabnia and
                  Quoc{-}Nam Tran and
                  Rui Chang and
                  Matthew He and
                  Andy Marsh and
                  Ashu M. G. Solo and
                  Jack Y. Yang},
  title        = {Investigation of the Lineage and Tissue Specificity of Genes},
  booktitle    = {International Conference on Bioinformatics {\&} Computational
                  Biology, {BIOCOMP} 2010, July 12-15, 2010, Las Vegas Nevada, USA,
                  2 Volumes},
  pages        = {306--310},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biocomp/JiaWSSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/WongY10,
  author       = {Thomas K. F. Wong and
                  Siu{-}Ming Yiu},
  editor       = {Ana L. N. Fred and
                  Joaquim Filipe and
                  Hugo Gamboa},
  title        = {Structure Prediction of Simple Non-standard Pseudoknot},
  booktitle    = {{BIOINFORMATICS} 2010 - Proceedings of the First International Conference
                  on Bioinformatics, Valencia, Spain, January 20-23, 2010},
  pages        = {33--38},
  publisher    = {{INSTICC} Press},
  year         = {2010},
  timestamp    = {Fri, 29 Apr 2011 08:50:07 +0200},
  biburl       = {https://dblp.org/rec/conf/biostec/WongY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/WongY10a,
  author       = {Thomas K. F. Wong and
                  Siu{-}Ming Yiu},
  editor       = {Ana L. N. Fred and
                  Joaquim Filipe and
                  Hugo Gamboa},
  title        = {Prediction of Minimum Free Energy Structure for Simple Non-standard
                  Pseudoknot},
  booktitle    = {Biomedical Engineering Systems and Technologies - Third International
                  Joint Conference, {BIOSTEC} 2010, Valencia, Spain, January 20-23,
                  2010, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {127},
  pages        = {345--355},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18472-7\_27},
  doi          = {10.1007/978-3-642-18472-7\_27},
  timestamp    = {Sat, 19 Oct 2019 20:01:12 +0200},
  biburl       = {https://dblp.org/rec/conf/biostec/WongY10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/greencom/WangYXYHC10,
  author       = {Eric Ke Wang and
                  Yunming Ye and
                  Xiaofei Xu and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow},
  editor       = {Peidong Zhu and
                  Lizhe Wang and
                  Feng Xia and
                  Huajun Chen and
                  Ian McLoughlin and
                  Shiao{-}Li Tsao and
                  Mitsuhisa Sato and
                  Sun{-}Ki Chai and
                  Irwin King},
  title        = {Security Issues and Challenges for Cyber Physical System},
  booktitle    = {2010 {IEEE/ACM} Int'l Conference on Green Computing and Communications,
                  GreenCom 2010, {\&} Int'l Conference on Cyber, Physical and Social
                  Computing, CPSCom 2010, Hangzhou, China, December 18-20, 2010},
  pages        = {733--738},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/GreenCom-CPSCom.2010.36},
  doi          = {10.1109/GREENCOM-CPSCOM.2010.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/greencom/WangYXYHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/LawCYTLCIKHH10,
  author       = {Frank Y. W. Law and
                  Patrick P. F. Chan and
                  Siu{-}Ming Yiu and
                  Benjamin Tang and
                  Pierre K. Y. Lai and
                  Kam{-}Pui Chow and
                  Ricci S. C. Ieong and
                  Michael Y. K. Kwan and
                  Wing{-}Kai Hon and
                  Lucas Chi Kwong Hui},
  editor       = {Kam{-}Pui Chow and
                  Sujeet Shenoi},
  title        = {Identifying Volatile Data from Multiple Memory Dumps in Live Forensics},
  booktitle    = {Advances in Digital Forensics {VI} - Sixth {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010,
                  Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {337},
  pages        = {185--194},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15506-2\_13},
  doi          = {10.1007/978-3-642-15506-2\_13},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/LawCYTLCIKHH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/CheungMWYZ10,
  author       = {David W. Cheung and
                  Nikos Mamoulis and
                  Wai Kit Wong and
                  Siu{-}Ming Yiu and
                  Ye Zhang},
  editor       = {Otfried Cheong and
                  Kyung{-}Yong Chwa and
                  Kunsoo Park},
  title        = {Anonymous Fuzzy Identity-Based Encryption for Similarity Search},
  booktitle    = {Algorithms and Computation - 21st International Symposium, {ISAAC}
                  2010, Jeju Island, Korea, December 15-17, 2010, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6506},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17517-6\_8},
  doi          = {10.1007/978-3-642-17517-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/CheungMWYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbra/WongCLY10,
  author       = {Thomas K. F. Wong and
                  Brenda W. Y. Cheung and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  editor       = {Mark Borodovsky and
                  Johann Peter Gogarten and
                  Teresa M. Przytycka and
                  Sanguthevar Rajasekaran},
  title        = {Local Structural Alignment of {RNA} with Affine Gap Model},
  booktitle    = {Bioinformatics Research and Applications, 6th International Symposium,
                  {ISBRA} 2010, Storrs, CT, USA, May 23-26, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6053},
  pages        = {191--202},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13078-6\_22},
  doi          = {10.1007/978-3-642-13078-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/isbra/WongCLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/ZhangAWHMCY10,
  author       = {Ye Zhang and
                  Man Ho Au and
                  Duncan S. Wong and
                  Qiong Huang and
                  Nikos Mamoulis and
                  David W. Cheung and
                  Siu{-}Ming Yiu},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Oblivious Transfer with Access Control : Realizing Disjunction without
                  Duplication},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {96--115},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_7},
  doi          = {10.1007/978-3-642-17455-1\_7},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/ZhangAWHMCY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recomb/PengLYC10,
  author       = {Yu Peng and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  editor       = {Bonnie Berger},
  title        = {{IDBA} - {A} Practical Iterative de Bruijn Graph De Novo Assembler},
  booktitle    = {Research in Computational Molecular Biology, 14th Annual International
                  Conference, {RECOMB} 2010, Lisbon, Portugal, April 25-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6044},
  pages        = {426--440},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12683-3\_28},
  doi          = {10.1007/978-3-642-12683-3\_28},
  timestamp    = {Mon, 13 May 2019 09:30:09 +0200},
  biburl       = {https://dblp.org/rec/conf/recomb/PengLYC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-0591,
  author       = {Eric Ke Wang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {A new key establishment scheme for wireless sensor networks},
  journal      = {CoRR},
  volume       = {abs/1004.0591},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.0591},
  eprinttype    = {arXiv},
  eprint       = {1004.0591},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-0591.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCHY10,
  author       = {Yi Jun He and
                  Tat Wing Chim and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination
                  Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/DongCLYH09,
  author       = {Ying Dong and
                  Tat Wing Chim and
                  Victor O. K. Li and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  title        = {{ARMR:} Anonymous routing protocol with multiple routes for communications
                  in mobile ad hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {8},
  pages        = {1536--1550},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2009.04.010},
  doi          = {10.1016/J.ADHOC.2009.04.010},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/DongCLYH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/LiYLLYKW09,
  author       = {Ruiqiang Li and
                  Chang Yu and
                  Yingrui Li and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu and
                  Karsten Kristiansen and
                  Jun Wang},
  title        = {{SOAP2:} an improved ultrafast tool for short read alignment},
  journal      = {Bioinform.},
  volume       = {25},
  number       = {15},
  pages        = {1966--1967},
  year         = {2009},
  url          = {https://doi.org/10.1093/bioinformatics/btp336},
  doi          = {10.1093/BIOINFORMATICS/BTP336},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/LiYLLYKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/ChinLLY09,
  author       = {Francis Y. L. Chin and
                  Henry C. M. Leung and
                  Wei{-}Lin Li and
                  Siu{-}Ming Yiu},
  title        = {Finding optimal threshold for correction error reads in {DNA} assembling},
  journal      = {{BMC} Bioinform.},
  volume       = {10},
  number       = {{S-1}},
  year         = {2009},
  url          = {https://doi.org/10.1186/1471-2105-10-S1-S15},
  doi          = {10.1186/1471-2105-10-S1-S15},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/ChinLLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbra/WongLCY09,
  author       = {Thomas K. F. Wong and
                  Tak Wah Lam and
                  P. Y. Chan and
                  Siu{-}Ming Yiu},
  title        = {Correcting short reads with high error rates for improved sequencing
                  result},
  journal      = {Int. J. Bioinform. Res. Appl.},
  volume       = {5},
  number       = {2},
  pages        = {224--237},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJBRA.2009.024039},
  doi          = {10.1504/IJBRA.2009.024039},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbra/WongLCY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbcb/LeungSYCS09,
  author       = {Henry Chi{-}Ming Leung and
                  Man{-}Hung Siu and
                  Siu{-}Ming Yiu and
                  Francis Yuk{-}Lun Chin and
                  Ken Wing{-}Kin Sung},
  title        = {Clustering-Based Approach for Predicting Motif Pairs from protein
                  Interaction Data},
  journal      = {J. Bioinform. Comput. Biol.},
  volume       = {7},
  number       = {4},
  pages        = {701--716},
  year         = {2009},
  url          = {https://doi.org/10.1142/S0219720009004266},
  doi          = {10.1142/S0219720009004266},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbcb/LeungSYCS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/LeungXYC09,
  author       = {Henry C. M. Leung and
                  Qian Xiang and
                  Siu{-}Ming Yiu and
                  Francis Y. L. Chin},
  title        = {Predicting Protein Complexes from {PPI} Data: {A} Core-Attachment
                  Approach},
  journal      = {J. Comput. Biol.},
  volume       = {16},
  number       = {2},
  pages        = {133--144},
  year         = {2009},
  url          = {https://doi.org/10.1089/cmb.2008.01TT},
  doi          = {10.1089/CMB.2008.01TT},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcb/LeungXYC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsea/JiangYDHW09,
  author       = {Zoe Lin Jiang and
                  Siu{-}Ming Yiu and
                  Y. Dong and
                  Lucas Chi Kwong Hui and
                  Starsky H. Y. Wong},
  title        = {Secure Chained Threshold Proxy Signature without and with Supervision},
  journal      = {J. Softw. Eng. Appl.},
  volume       = {2},
  number       = {4},
  pages        = {267--275},
  year         = {2009},
  url          = {https://doi.org/10.4236/jsea.2009.24034},
  doi          = {10.4236/JSEA.2009.24034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsea/JiangYDHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhocnets/ChimYHJL09,
  author       = {Tat Wing Chim and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Zoe Lin Jiang and
                  Victor O. K. Li},
  editor       = {Jun Zheng and
                  Shiwen Mao and
                  Scott F. Midkiff and
                  Hua Zhu},
  title        = {{SPECS:} Secure and Privacy Enhancing Communications Schemes for VANETs},
  booktitle    = {Ad Hoc Networks, First International Conference, {ADHOCNETS} 2009,
                  Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {28},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11723-7\_11},
  doi          = {10.1007/978-3-642-11723-7\_11},
  timestamp    = {Mon, 01 Mar 2021 16:18:23 +0100},
  biburl       = {https://dblp.org/rec/conf/adhocnets/ChimYHJL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/LamLTWWY09,
  author       = {Tak Wah Lam and
                  Ruiqiang Li and
                  Alan Tam and
                  Simon C. K. Wong and
                  Edward Wu and
                  Siu{-}Ming Yiu},
  title        = {High Throughput Short Read Alignment via Bi-directional {BWT}},
  booktitle    = {2009 {IEEE} International Conference on Bioinformatics and Biomedicine,
                  {BIBM} 2009, Washington, DC, USA, November 1-4, 2009, Proceedings},
  pages        = {31--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/BIBM.2009.42},
  doi          = {10.1109/BIBM.2009.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bibm/LamLTWWY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bicob/WongYLS09,
  author       = {Thomas K. F. Wong and
                  Siu{-}Ming Yiu and
                  Tak Wah Lam and
                  Wing{-}Kin Sung},
  editor       = {Sanguthevar Rajasekaran},
  title        = {The 2-Interval Pattern Matching Problems and Its Application to ncRNA
                  Scanning},
  booktitle    = {Bioinformatics and Computational Biology, First International Conference,
                  BICoB 2009, New Orleans, LA, USA, April 8-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5462},
  pages        = {79--89},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00727-9\_10},
  doi          = {10.1007/978-3-642-00727-9\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bicob/WongYLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/YangPLYCC09,
  author       = {Bin Yang and
                  Yu Peng and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Jing{-}Chi Chen and
                  Francis Y. L. Chin},
  editor       = {Doheon Lee and
                  Russ B. Altman and
                  Min Song and
                  Jun Huan},
  title        = {Unsupervised binning of environmental genomic fragments based on an
                  error robust selection of l-mers},
  booktitle    = {Proceeding of the 3rd International Workshop on Data and Text Mining
                  in Bioinformatics, {DTMBIO} 2009, Hong Kong, China, November 6, 2009},
  pages        = {3--10},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1651318.1651322},
  doi          = {10.1145/1651318.1651322},
  timestamp    = {Wed, 14 Nov 2018 11:00:18 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/YangPLYCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/YuYH09,
  author       = {Kin Ying Yu and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Hui{-}Huang Hsu},
  title        = {{RFID} Forward Secure Authentication Protocol: Flaw and Solution},
  booktitle    = {2009 International Conference on Complex, Intelligent and Software
                  Intensive Systems, {CISIS} 2009, Fukuoka, Japan, March 16-19, 2009},
  pages        = {627--632},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISIS.2009.113},
  doi          = {10.1109/CISIS.2009.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisis/YuYH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WangHY09,
  author       = {Eric Ke Wang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {A New Practical Scheme for Protecting Web Content},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {62--66},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 04 Nov 2009 14:56:55 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WangHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WangHHY09,
  author       = {Eric Ke Wang and
                  Yi Jun He and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {A Practical SMS-based Mutual Authentication Protocol for Secure Online
                  Banking},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {179--183},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 04 Nov 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WangHHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WongJHY09,
  author       = {Starsky H. Y. Wong and
                  Zoe Lin Jiang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation
                  and Untraceability},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {307--313},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WongJHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spire/TamWLY09,
  author       = {Alan Tam and
                  Edward Wu and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  editor       = {Jussi Karlgren and
                  Jorma Tarhio and
                  Heikki Hyyr{\"{o}}},
  title        = {Succinct Text Indexing with Wildcards},
  booktitle    = {String Processing and Information Retrieval, 16th International Symposium,
                  {SPIRE} 2009, Saariselk{\"{a}}, Finland, August 25-27, 2009,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5721},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03784-9\_5},
  doi          = {10.1007/978-3-642-03784-9\_5},
  timestamp    = {Fri, 27 Mar 2020 09:02:44 +0100},
  biburl       = {https://dblp.org/rec/conf/spire/TamWLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wabi/WongLSY09,
  author       = {Thomas K. F. Wong and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  editor       = {Steven Salzberg and
                  Tandy J. Warnow},
  title        = {Structural Alignment of {RNA} with Complex Pseudoknot Structure},
  booktitle    = {Algorithms in Bioinformatics, 9th International Workshop, {WABI} 2009,
                  Philadelphia, PA, USA, September 12-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5724},
  pages        = {403--414},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04241-6\_33},
  doi          = {10.1007/978-3-642-04241-6\_33},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wabi/WongLSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangMCYW09,
  author       = {Ye Zhang and
                  Nikos Mamoulis and
                  David W. Cheung and
                  Siu{-}Ming Yiu and
                  Wai Kit Wong},
  title        = {Anonymous Fuzzy Identity-based Encryption for Similarity Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangMCYW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/LamSTWY08,
  author       = {Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Siu{-}Lung Tam and
                  Chi{-}Kwong Wong and
                  Siu{-}Ming Yiu},
  title        = {Compressed indexing and local alignment of {DNA}},
  journal      = {Bioinform.},
  volume       = {24},
  number       = {6},
  pages        = {791--797},
  year         = {2008},
  url          = {https://doi.org/10.1093/bioinformatics/btn032},
  doi          = {10.1093/BIOINFORMATICS/BTN032},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/LamSTWY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/WijayaYSRS08,
  author       = {Edward Wijaya and
                  Siu{-}Ming Yiu and
                  Ngo Thanh Son and
                  Kanagasabai Rajaraman and
                  Wing{-}Kin Sung},
  title        = {MotifVoter: a novel ensemble method for fine-grained integration of
                  generic motif finders},
  journal      = {Bioinform.},
  volume       = {24},
  number       = {20},
  pages        = {2288--2295},
  year         = {2008},
  url          = {https://doi.org/10.1093/bioinformatics/btn420},
  doi          = {10.1093/BIOINFORMATICS/BTN420},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/WijayaYSRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/LeungLCY08,
  author       = {Wing{-}Sze Leung and
                  Marie C. M. Lin and
                  David Wai{-}Lok Cheung and
                  Siu{-}Ming Yiu},
  title        = {Filtering of false positive microRNA candidates by a clustering-based
                  approach},
  journal      = {{BMC} Bioinform.},
  volume       = {9},
  number       = {{S-12}},
  year         = {2008},
  url          = {https://doi.org/10.1186/1471-2105-9-S12-S3},
  doi          = {10.1186/1471-2105-9-S12-S3},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/LeungLCY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChowGHY08,
  author       = {Sherman S. M. Chow and
                  H. W. Go and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Multiplicative Forward-Secure Threshold Signature Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {397--403},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n3/ijns-2008-v7-n3-p397-403.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChowGHY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbcb/WongLYY08,
  author       = {Thomas K. F. Wong and
                  Tak Wah Lam and
                  Wanling Yang and
                  Siu{-}Ming Yiu},
  title        = {Finding Alternative Splicing Patterns with Strong Support from expressed
                  Sequences on Individual exons/introns},
  journal      = {J. Bioinform. Comput. Biol.},
  volume       = {6},
  number       = {5},
  pages        = {1021--1033},
  year         = {2008},
  url          = {https://doi.org/10.1142/S0219720008003825},
  doi          = {10.1142/S0219720008003825},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbcb/WongLYY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mics/ChanLSWY08,
  author       = {Ho{-}Leung Chan and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Prudence W. H. Wong and
                  Siu{-}Ming Yiu},
  title        = {Non-overlapping Common Substrings Allowing Mutations},
  journal      = {Math. Comput. Sci.},
  volume       = {1},
  number       = {4},
  pages        = {543--555},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11786-007-0030-6},
  doi          = {10.1007/S11786-007-0030-6},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mics/ChanLSWY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apbc/WongCLY08,
  author       = {Thomas K. F. Wong and
                  Y. S. Chiu and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  editor       = {Alvis Brazma and
                  Satoru Miyano and
                  Tatsuya Akutsu},
  title        = {A Memory Efficient Algorithm for Structural Alignment of RNAs with
                  Embedded Simple Pseudoknots},
  booktitle    = {Proceedings of the 6th Asia-Pacific Bioinformatics Conference, {APBC}
                  2008, 14-17 January 2008, Kyoto, Japan},
  series       = {Advances in Bioinformatics and Computational Biology},
  volume       = {6},
  pages        = {89--100},
  publisher    = {Imperial College Press},
  year         = {2008},
  url          = {http://www.comp.nus.edu.sg/\%7Ewongls/psZ/apbc2008/apbc105a.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apbc/WongCLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apbc/ChinLSY08,
  author       = {Francis Y. L. Chin and
                  Henry C. M. Leung and
                  Man{-}Hung Siu and
                  Siu{-}Ming Yiu},
  editor       = {Alvis Brazma and
                  Satoru Miyano and
                  Tatsuya Akutsu},
  title        = {Optimal Algorithm for Finding {DNA} Motifs with Nucleotide Adjacent
                  Dependency},
  booktitle    = {Proceedings of the 6th Asia-Pacific Bioinformatics Conference, {APBC}
                  2008, 14-17 January 2008, Kyoto, Japan},
  series       = {Advances in Bioinformatics and Computational Biology},
  volume       = {6},
  pages        = {343--352},
  publisher    = {Imperial College Press},
  year         = {2008},
  url          = {http://www.comp.nus.edu.sg/\%7Ewongls/psZ/apbc2008/apbc064a.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apbc/ChinLSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/WangHY08,
  author       = {Eric Ke Wang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Authenticated Directed Diffusion},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {366--377},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_26},
  doi          = {10.1007/978-3-540-89641-8\_26},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/WangHY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/JiangYHDW08,
  author       = {Zoe Lin Jiang and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Y. Dong and
                  Starsky H. Y. Wong},
  title        = {Chained Threshold Proxy Signature without and with Supervision},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing
                  / Information Security, December 12-14, 2008, Wuhan, China},
  pages        = {837--840},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.1353},
  doi          = {10.1109/CSSE.2008.1353},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/JiangYHDW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/JiangHY08,
  author       = {Zoe Lin Jiang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Indrajit Ray and
                  Sujeet Shenoi},
  title        = {Improving Disk Sector Integrity Using K-Dimension Hashing},
  booktitle    = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference
                  on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30,
                  2008},
  series       = {{IFIP}},
  volume       = {285},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-84927-0\_8},
  doi          = {10.1007/978-0-387-84927-0\_8},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/JiangHY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inc/DongLYH08,
  author       = {Ying Dong and
                  Victor O. K. Li and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  editor       = {Paul Dowland and
                  Steven Furnell},
  title        = {Strongly Anonymous Communications in Mobile Ad Hoc Networks},
  booktitle    = {Seventh International Network Conference {(INC} 2008), Plymouth, UK,
                  July 8-10, 2008. Proceedings},
  pages        = {181--191},
  publisher    = {University of Plymouth},
  year         = {2008},
  url          = {http://www.cscan.org/?page=openaccess\&\#38;id=159},
  timestamp    = {Tue, 16 May 2023 22:42:08 +0200},
  biburl       = {https://dblp.org/rec/conf/inc/DongLYH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChowY08,
  author       = {Sherman S. M. Chow and
                  Siu{-}Ming Yiu},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Timed-Release Encryption Revisited},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {38--51},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_3},
  doi          = {10.1007/978-3-540-88733-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ChowY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/LawLJIKCHYC08,
  author       = {Frank Y. W. Law and
                  Pierre K. Y. Lai and
                  Zoe Lin Jiang and
                  Ricci S. C. Ieong and
                  Michael Y. K. Kwan and
                  Kam{-}Pui Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  C. F. Chong},
  title        = {Protecting Digital Legal Professional Privilege {(LPP)} Data},
  booktitle    = {Third International Workshop on Systematic Approaches to Digital Forensic
                  Engineering, {SADFE} 2008, Berkeley, California, USA, May 22, 2008},
  pages        = {91--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SADFE.2008.19},
  doi          = {10.1109/SADFE.2008.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/LawLJIKCHYC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/algo/ChinY08,
  author       = {Francis Y. L. Chin and
                  Siu{-}Ming Yiu},
  editor       = {Ming{-}Yang Kao},
  title        = {Efficient Methods for Multiple Sequence Alignment with Guaranteed
                  Error Bounds},
  booktitle    = {Encyclopedia of Algorithms - 2008 Edition},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-30162-4\_123},
  doi          = {10.1007/978-0-387-30162-4\_123},
  timestamp    = {Thu, 27 Jun 2019 16:25:31 +0200},
  biburl       = {https://dblp.org/rec/reference/algo/ChinY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/algo/Yiu08,
  author       = {Siu{-}Ming Yiu},
  editor       = {Ming{-}Yang Kao},
  title        = {Local Alignment (with Concave Gap Weights)},
  booktitle    = {Encyclopedia of Algorithms - 2008 Edition},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-30162-4\_208},
  doi          = {10.1007/978-0-387-30162-4\_208},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/algo/Yiu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/HonLSSY07,
  author       = {Wing{-}Kai Hon and
                  Tak Wah Lam and
                  Kunihiko Sadakane and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  title        = {A Space and Time Efficient Algorithm for Constructing Compressed Suffix
                  Arrays},
  journal      = {Algorithmica},
  volume       = {48},
  number       = {1},
  pages        = {23--36},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00453-006-1228-8},
  doi          = {10.1007/S00453-006-1228-8},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/algorithmica/HonLSSY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/WijayaRYS07,
  author       = {Edward Wijaya and
                  Kanagasabai Rajaraman and
                  Siu{-}Ming Yiu and
                  Wing{-}Kin Sung},
  title        = {Detection of generic spaced motifs using submotif pattern mining},
  journal      = {Bioinform.},
  volume       = {23},
  number       = {12},
  pages        = {1476--1485},
  year         = {2007},
  url          = {https://doi.org/10.1093/bioinformatics/btm118},
  doi          = {10.1093/BIOINFORMATICS/BTM118},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/WijayaRYS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/DongSYLH07,
  author       = {Y. Dong and
                  Ai Fen Sui and
                  Siu{-}Ming Yiu and
                  Victor O. K. Li and
                  Lucas Chi Kwong Hui},
  title        = {Providing distributed certificate authority service in cluster-based
                  mobile ad hoc networks},
  journal      = {Comput. Commun.},
  volume       = {30},
  number       = {11-12},
  pages        = {2442--2452},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comcom.2007.04.011},
  doi          = {10.1016/J.COMCOM.2007.04.011},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/DongSYLH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LuiHY07,
  author       = {Richard W. C. Lui and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Accountability in organisations},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {237--255},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013954},
  doi          = {10.1504/IJICS.2007.013954},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LuiHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiCHYCTCP07,
  author       = {Zichen Li and
                  C. F. Chong and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow and
                  Wai Wan Tsang and
                  H. W. Chan and
                  Kevin K. H. Pun},
  title        = {An Attack on Libert et al.' s ID-based Undeniable Signature Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {220--223},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n2/ijns-2007-v5-n2-p220-223.pdf},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiCHYCTCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LuiHY07,
  author       = {Richard W. C. Lui and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Delegation with supervision},
  journal      = {Inf. Sci.},
  volume       = {177},
  number       = {19},
  pages        = {4014--4030},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ins.2007.04.004},
  doi          = {10.1016/J.INS.2007.04.004},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LuiHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biocomp/WongLYY07,
  author       = {Thomas K. F. Wong and
                  Tak Wah Lam and
                  W. L. Yang and
                  Siu{-}Ming Yiu},
  editor       = {Hamid R. Arabnia and
                  Mary Qu Yang and
                  Jack Y. Yang},
  title        = {Finding Alternative Splicing Patterns with Strong Support From Expressed
                  Sequences},
  booktitle    = {International Conference on Bioinformatics {\&} Computational
                  Biology, {BIOCOMP} 2007, Volume I, June 25-28, 2007, Las Vegas Nevada,
                  {USA}},
  pages        = {153--158},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Mon, 22 Sep 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biocomp/WongLYY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoa/LamSTWY07,
  author       = {Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Siu{-}Lung Tam and
                  Chi{-}Kwong Wong and
                  Siu{-}Ming Yiu},
  editor       = {Andreas W. M. Dress and
                  Yinfeng Xu and
                  Binhai Zhu},
  title        = {An Experimental Study of Compressed Indexing and Local Alignments
                  of {DNA}},
  booktitle    = {Combinatorial Optimization and Applications, First International Conference,
                  {COCOA} 2007, Xi'an, China, August 14-16, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4616},
  pages        = {242--254},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73556-4\_27},
  doi          = {10.1007/978-3-540-73556-4\_27},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoa/LamSTWY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ChanYH07,
  author       = {Dan T. F. Chan and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {Remote Group User Authentication with Forward Secrecy and Key Agreement
                  with Smartcard},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {559--565},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ChanYH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgcn/JiangHCYL07,
  author       = {Zoe Lin Jiang and
                  Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Pierre K. Y. Lai},
  title        = {Improving Disk Sector Integrity Using 3-dimension Hashing Scheme},
  booktitle    = {Future Generation Communication and Networking, {FGCN} 2007, Ramada
                  Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings},
  pages        = {141--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FGCN.2007.150},
  doi          = {10.1109/FGCN.2007.150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgcn/JiangHCYL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/DongSYLHG07,
  author       = {Ying Dong and
                  Ai Fen Sui and
                  Siu{-}Ming Yiu and
                  Victor O. K. Li and
                  Lucas Chi Kwong Hui and
                  H. W. Go},
  title        = {An Efficient Cluster-Based Proactive Secret Share Update Scheme for
                  Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages        = {1241--1246},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICC.2007.210},
  doi          = {10.1109/ICC.2007.210},
  timestamp    = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/DongSYLHG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/LamSTY07,
  author       = {Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Siu{-}Lung Tam and
                  Siu{-}Ming Yiu},
  editor       = {Takeshi Tokuyama},
  title        = {Space Efficient Indexes for String Matching with Don't Cares},
  booktitle    = {Algorithms and Computation, 18th International Symposium, {ISAAC}
                  2007, Sendai, Japan, December 17-19, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4835},
  pages        = {846--857},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77120-3\_73},
  doi          = {10.1007/978-3-540-77120-3\_73},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/LamSTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HuiCY07,
  author       = {Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {Tools and Technology for Computer Forensics: Research and Development
                  in Hong Kong (Invited Paper)},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {11--19},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_2},
  doi          = {10.1007/978-3-540-72163-5\_2},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HuiCY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mcam/WangLYHCCTCP07,
  author       = {Meiqin Wang and
                  Lin Li and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  C. F. Chong and
                  Kam{-}Pui Chow and
                  Wai Wan Tsang and
                  H. W. Chan and
                  Kevin K. H. Pun},
  editor       = {Nicu Sebe and
                  Yuncai Liu and
                  Yueting Zhuang and
                  Thomas S. Huang},
  title        = {A Hybrid Approach for Authenticating {MPEG-2} Streaming Data},
  booktitle    = {Multimedia Content Analysis and Mining, International Workshop, {MCAM}
                  2007, Weihai, China, June 30 - July 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4577},
  pages        = {203--212},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73417-8\_27},
  doi          = {10.1007/978-3-540-73417-8\_27},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mcam/WangLYHCCTCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/LianCY07,
  author       = {Wang Lian and
                  David W. Cheung and
                  Siu{-}Ming Yiu},
  editor       = {Yookun Cho and
                  Roger L. Wainwright and
                  Hisham Haddad and
                  Sung Y. Shin and
                  Yong Wan Koo},
  title        = {Maintenance of maximal frequent itemsets in large databases},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Applied Computing (SAC),
                  Seoul, Korea, March 11-15, 2007},
  pages        = {388--392},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1244002.1244094},
  doi          = {10.1145/1244002.1244094},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/LianCY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wabi/ChinLSY07,
  author       = {Francis Y. L. Chin and
                  Henry C. M. Leung and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  editor       = {Raffaele Giancarlo and
                  Sridhar Hannenhalli},
  title        = {The Point Placement Problem on a Line - Improved Bounds for Pairwise
                  Distance Queries},
  booktitle    = {Algorithms in Bioinformatics, 7th International Workshop, {WABI} 2007,
                  Philadelphia, PA, USA, September 8-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4645},
  pages        = {372--382},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74126-8\_35},
  doi          = {10.1007/978-3-540-74126-8\_35},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/wabi/ChinLSY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/DongLHY07,
  author       = {Ying Dong and
                  Victor O. K. Li and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc
                  Networks},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2007,
                  Hong Kong, China, 11-15 March, 2007},
  pages        = {2625--2630},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/WCNC.2007.488},
  doi          = {10.1109/WCNC.2007.488},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/DongLHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuY07,
  author       = {Man Ho Au and
                  Siu{-}Ming Yiu},
  title        = {Structural Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChowHYC06,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow},
  title        = {Practical electronic lotteries with offline {TTP}},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {15},
  pages        = {2830--2840},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2005.10.034},
  doi          = {10.1016/J.COMCOM.2005.10.034},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ChowHYC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/YiuYLLY06,
  author       = {Siu{-}Ming Yiu and
                  S. W. Yiu and
                  Lap{-}Kei Lee and
                  Eric K. Y. Li and
                  Michael C. L. Yip},
  title        = {Sharing and access right delegation for confidential documents: {A}
                  practical solution},
  journal      = {Inf. Manag.},
  volume       = {43},
  number       = {5},
  pages        = {607--616},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.im.2006.03.003},
  doi          = {10.1016/J.IM.2006.03.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/YiuYLLY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YauHYC06,
  author       = {Joe Cho{-}Ki Yau and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Bruce S. N. Cheung},
  title        = {Towards a Secure Copyright Protection Infrastructure for e-Education
                  Material: Principles Learned from Experience},
  journal      = {Int. J. Netw. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {21--28},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v2-n1/ijns-2006-v2-n1-p21-28.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YauHYC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbcb/ChanJLY06,
  author       = {Ho{-}Leung Chan and
                  Jesper Jansson and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  title        = {Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance
                  Matrix},
  journal      = {J. Bioinform. Comput. Biol.},
  volume       = {4},
  number       = {4},
  pages        = {807--832},
  year         = {2006},
  url          = {https://doi.org/10.1142/S0219720006002211},
  doi          = {10.1142/S0219720006002211},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbcb/ChanJLY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ChanCCCCCCCHHILLPTTTYYYJ06,
  author       = {Eric Y. K. Chan and
                  H. W. Chan and
                  K. M. Chan and
                  Vivien P. S. Chan and
                  Samuel T. Chanson and
                  Matthew M. H. Cheung and
                  C. F. Chong and
                  Kam{-}Pui Chow and
                  Albert K. T. Hui and
                  Lucas Chi Kwong Hui and
                  S. K. Ip and
                  Luke C. K. Lam and
                  W. C. Lau and
                  Kevin K. H. Pun and
                  Anthony Y. F. Tsang and
                  Wai Wan Tsang and
                  Sam C. W. Tso and
                  Dit{-}Yan Yeung and
                  Siu{-}Ming Yiu and
                  Kwun Yin Yu and
                  W. Ju},
  title        = {Intrusion Detection Routers: Design, Implementation and Evaluation
                  Using an Experimental Testbed},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {24},
  number       = {10},
  pages        = {1889--1900},
  year         = {2006},
  url          = {https://doi.org/10.1109/JSAC.2006.877214},
  doi          = {10.1109/JSAC.2006.877214},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ChanCCCCCCCHHILLPTTTYYYJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AuSY06,
  author       = {Man Ho Au and
                  Willy Susilo and
                  Siu{-}Ming Yiu},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Event-Oriented \emph{k}-Times Revocable-iff-Linked Group Signatures},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_19},
  doi          = {10.1007/11780656\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AuSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apbc/ChanLY06,
  author       = {P. Y. Chan and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  editor       = {Tao Jiang and
                  Ueng{-}Cheng Yang and
                  Yi{-}Ping Phoebe Chen and
                  Limsoon Wong},
  title        = {A More Accurate and Efficient Whole Genome Phylogeny},
  booktitle    = {Proceedings of 4th Asia-Pacific Bioinformatics Conference. 13-16 February
                  2006, Taipei, Taiwan},
  pages        = {337--352},
  publisher    = {Imperial College Press, London},
  year         = {2006},
  url          = {http://www.comp.nus.edu.sg/\%7Ewongls/psZ/apbc2006/248.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apbc/ChanLY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/LaiYCCH06,
  author       = {Pierre K. Y. Lai and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow and
                  C. F. Chong and
                  Lucas Chi Kwong Hui},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {An Efficient Bloom Filter Based Solution for Multiparty Private Matching},
  booktitle    = {Proceedings of the 2006 International Conference on Security {\&}
                  Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {286--292},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/LaiYCCH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/WangYHJY06,
  author       = {Eric Ke Wang and
                  Joe Cho{-}Ki Yau and
                  Lucas Chi Kwong Hui and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu},
  title        = {A Key-Recovery System for Long-term Encrypted Documents},
  booktitle    = {Tenth {IEEE} International Enterprise Distributed Object Computing
                  Conference {(EDOC} 2006), 16-20 October 2006, Hong Kong, China, Workshops},
  pages        = {52},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/EDOCW.2006.8},
  doi          = {10.1109/EDOCW.2006.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/WangYHJY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ChowHYC05,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow},
  title        = {Forward-secure multisignature and blind signature schemes},
  journal      = {Appl. Math. Comput.},
  volume       = {168},
  number       = {2},
  pages        = {895--908},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2004.09.015},
  doi          = {10.1016/J.AMC.2004.09.015},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/ChowHYC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/YiuWLMKLC05,
  author       = {Siu{-}Ming Yiu and
                  Prudence W. H. Wong and
                  Tak Wah Lam and
                  Y. C. Mui and
                  Hsiang{-}fu Kung and
                  Marie C. M. Lin and
                  Y. T. Cheung},
  title        = {Filtering of Ineffective siRNAs and Improved siRNA Design Tool},
  journal      = {Bioinform.},
  volume       = {21},
  number       = {2},
  pages        = {144--151},
  year         = {2005},
  url          = {https://doi.org/10.1093/bioinformatics/bth498},
  doi          = {10.1093/BIOINFORMATICS/BTH498},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/YiuWLMKLC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/ChanLSWYF05,
  author       = {Ho{-}Leung Chan and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Prudence W. H. Wong and
                  Siu{-}Ming Yiu and
                  X. Fan},
  title        = {The mutated subsequence problem and locating conserved genes},
  journal      = {Bioinform.},
  volume       = {21},
  number       = {10},
  pages        = {2271--2278},
  year         = {2005},
  url          = {https://doi.org/10.1093/bioinformatics/bti371},
  doi          = {10.1093/BIOINFORMATICS/BTI371},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/ChanLSWYF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/LeungCYRT05,
  author       = {Henry C. M. Leung and
                  Francis Y. L. Chin and
                  Siu{-}Ming Yiu and
                  Ronald Rosenfeld and
                  Wai Wan Tsang},
  title        = {Finding Motifs with Insufficient Number of Strong Binding Sites},
  journal      = {J. Comput. Biol.},
  volume       = {12},
  number       = {6},
  pages        = {686--701},
  year         = {2005},
  url          = {https://doi.org/10.1089/cmb.2005.12.686},
  doi          = {10.1089/CMB.2005.12.686},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcb/LeungCYRT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ChowHYCL05,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow and
                  Richard W. C. Lui},
  title        = {A generic anti-spyware solution by access control list at kernel level},
  journal      = {J. Syst. Softw.},
  volume       = {75},
  number       = {1-2},
  pages        = {227--234},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jss.2004.05.027},
  doi          = {10.1016/J.JSS.2004.05.027},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/ChowHYCL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/LianMCY05,
  author       = {Wang Lian and
                  Nikos Mamoulis and
                  David Wai{-}Lok Cheung and
                  Siu{-}Ming Yiu},
  title        = {Indexing Useful Structural Patterns for {XML} Query Processing},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {17},
  number       = {7},
  pages        = {997--1009},
  year         = {2005},
  url          = {https://doi.org/10.1109/TKDE.2005.110},
  doi          = {10.1109/TKDE.2005.110},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/LianMCY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/GoCDSYHL05,
  author       = {H. W. Go and
                  P. Y. Chan and
                  Y. Dong and
                  Ai Fen Sui and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Victor O. K. Li},
  editor       = {M{\'{a}}rio Guimar{\~{a}}es},
  title        = {Performance evaluation on {CRL} distribution using flooding in mobile
                  ad hoc networks (MANETs)},
  booktitle    = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005,
                  Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2},
  pages        = {75--80},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1167253.1167271},
  doi          = {10.1145/1167253.1167271},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/GoCDSYHL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChowHYC05,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Two Improved Partially Blind Signature Schemes from Bilinear Pairings},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {316--328},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_27},
  doi          = {10.1007/11506157\_27},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChowHYC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LuiCHY05,
  author       = {Richard W. C. Lui and
                  Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Role Activation Management in Role Based Access Control},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {358--369},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_30},
  doi          = {10.1007/11506157\_30},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LuiCHY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChowYH05,
  author       = {Sherman S. M. Chow and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Identity Based Ring Signature},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {499--512},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_34},
  doi          = {10.1007/11496137\_34},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChowYH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apbc/YiuCLSTW05,
  author       = {Siu{-}Ming Yiu and
                  P. Y. Chan and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Hing{-}Fung Ting and
                  Prudence W. H. Wong},
  editor       = {Yi{-}Ping Phoebe Chen and
                  Limsoon Wong},
  title        = {Allowing mismatches in anchors for wholw genome alignment: Generation
                  and effectiveness},
  booktitle    = {Proceedings of 3rd Asia-Pacific Bioinformatics Conference, 17-21 January
                  2005, Singapore},
  pages        = {1--10},
  publisher    = {Imperial College Press, London},
  year         = {2005},
  url          = {http://www.comp.nus.edu.sg/\%7Ewongls/psZ/apbc2005/camera-ready/192.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apbc/YiuCLSTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/LuiHYW05,
  author       = {Richard W. C. Lui and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Yan Woo},
  editor       = {Hamid R. Arabnia},
  title        = {A model to support fine-grained delegation of authorization},
  booktitle    = {Proceedings of The 2005 International Conference on Security and Management,
                  {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005},
  pages        = {208--212},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Sun, 28 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/LuiHYW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WooHCY05,
  author       = {Yan Woo and
                  Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu},
  editor       = {Hamid R. Arabnia},
  title        = {Dynamic Integrity Verification for Software Self-defense},
  booktitle    = {Proceedings of The 2005 International Conference on Security and Management,
                  {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005},
  pages        = {327--333},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WooHCY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eee/YauHCYWLL05,
  author       = {Joe Cho{-}Ki Yau and
                  Lucas Chi Kwong Hui and
                  Bruce S. N. Cheung and
                  Siu{-}Ming Yiu and
                  Yan Woo and
                  K. W. Lau and
                  Eric H. M. Li},
  title        = {Trustworthy Browsing - {A} Secure Web Accessing Model},
  booktitle    = {2005 {IEEE} International Conference on e-Technology, e-Commerce,
                  and e-Services {(EEE} 2005), 29 March - 1 April 2005, Hong Kong, China},
  pages        = {542--547},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/EEE.2005.139},
  doi          = {10.1109/EEE.2005.139},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eee/YauHCYWLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/LuiHY05,
  author       = {Richard W. C. Lui and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {David W. Chadwick and
                  Gansen Zhao},
  title        = {Secure Role Activation and Authorization in the Enterprise Environment},
  booktitle    = {Public Key Infrastructure, Second European {PKI} Workshop: Research
                  and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1,
                  2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3545},
  pages        = {22--35},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11533733\_2},
  doi          = {10.1007/11533733\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/LuiHY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/ChowLHY05,
  author       = {Sherman S. M. Chow and
                  Richard W. C. Lui and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {David W. Chadwick and
                  Gansen Zhao},
  title        = {Identity Based Ring Signature: Why, How and What Next},
  booktitle    = {Public Key Infrastructure, Second European {PKI} Workshop: Research
                  and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1,
                  2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3545},
  pages        = {144--161},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11533733\_10},
  doi          = {10.1007/11533733\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europki/ChowLHY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/ChowHYC05,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {An e-Lottery Scheme Using Verifiable Random Function},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3482},
  pages        = {651--660},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424857\_72},
  doi          = {10.1007/11424857\_72},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/ChowHYC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/LuiCHY05,
  author       = {Richard W. C. Lui and
                  Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Supporting Efficient Authorization in Delegation with Supervision},
  booktitle    = {11th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005},
  pages        = {240--244},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICPADS.2005.271},
  doi          = {10.1109/ICPADS.2005.271},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/LuiCHY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/SuiCHYCTCPC05,
  author       = {Ai Fen Sui and
                  Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow and
                  Wai Wan Tsang and
                  C. F. Chong and
                  Kevin K. H. Pun and
                  H. W. Chan},
  title        = {Separable and Anonymous Identity-Based Key Issuing},
  booktitle    = {11th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005},
  pages        = {275--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICPADS.2005.263},
  doi          = {10.1109/ICPADS.2005.263},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/SuiCHYCTCPC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwap/LuiYH05,
  author       = {Richard W. C. Lui and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  editor       = {Jianying Zhou and
                  Meng{-}Chow Kang and
                  Feng Bao and
                  HweeHwa Pang},
  title        = {Efficient Authorization in Delegation Chains with Strong Non-Repudiation},
  booktitle    = {Applied Public Key Infrastructure - 4th International Workshop: {IWAP}
                  2005, Singapore, September 21-23, 2005},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {128},
  pages        = {66--77},
  publisher    = {{IOS} Press},
  year         = {2005},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1230},
  timestamp    = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iwap/LuiYH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/ChanJLY05,
  author       = {Ho{-}Leung Chan and
                  Jesper Jansson and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu},
  editor       = {Joanna Jedrzejowicz and
                  Andrzej Szepietowski},
  title        = {Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance
                  Matrix},
  booktitle    = {Mathematical Foundations of Computer Science 2005, 30th International
                  Symposium, {MFCS} 2005, Gdansk, Poland, August 29 - September 2, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3618},
  pages        = {224--235},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11549345\_20},
  doi          = {10.1007/11549345\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mfcs/ChanJLY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/ChowLHY05,
  author       = {Sherman S. M. Chow and
                  Richard W. C. Lui and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Identity Based Delegation Network},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {99--115},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_8},
  doi          = {10.1007/11554868\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/ChowLHY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ChowYHY05,
  author       = {Sherman S. M. Chow and
                  Tsz Hon Yuen and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {Signcryption in Hierarchical Identity Based Cryptosystem},
  booktitle    = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  pages        = {443--457},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Fri, 19 May 2017 01:25:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ChowYHY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/DongGSLHY05,
  author       = {Y. Dong and
                  H. W. Go and
                  Ai Fen Sui and
                  Victor O. K. Li and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Providing Distributed Certificate Authority Service in Mobile Ad Hoc
                  Networks},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {149--156},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.57},
  doi          = {10.1109/SECURECOMM.2005.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/DongGSLHY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/SuiHYCTCPC05,
  author       = {Ai Fen Sui and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow and
                  Wai Wan Tsang and
                  C. F. Chong and
                  Kevin K. H. Pun and
                  H. W. Chan},
  title        = {An improved authenticated key agreement protocol with perfect forward
                  secrecy for wireless mobile communication},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005,
                  March 13-17, 2005, New Orleans, Louisiana, {USA}},
  pages        = {2088--2093},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/WCNC.2005.1424840},
  doi          = {10.1109/WCNC.2005.1424840},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/SuiHYCTCPC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowY05,
  author       = {Sherman S. M. Chow and
                  Siu{-}Ming Yiu},
  title        = {Exclusion-Intersection Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/WongLLTY04,
  author       = {Prudence W. H. Wong and
                  Tak Wah Lam and
                  N. Lu and
                  Hing{-}Fung Ting and
                  Siu{-}Ming Yiu},
  title        = {An efficient algorithm for optimizing whole genome alignment with
                  noise},
  journal      = {Bioinform.},
  volume       = {20},
  number       = {16},
  pages        = {2676--2684},
  year         = {2004},
  url          = {https://doi.org/10.1093/bioinformatics/bth308},
  doi          = {10.1093/BIOINFORMATICS/BTH308},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/WongLLTY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/HonLYKS04,
  author       = {Wing{-}Kai Hon and
                  Tak Wah Lam and
                  Siu{-}Ming Yiu and
                  Ming{-}Yang Kao and
                  Wing{-}Kin Sung},
  title        = {Subtree Transfer Distance For Degree-D Phylogenies},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {15},
  number       = {6},
  pages        = {893--909},
  year         = {2004},
  url          = {https://doi.org/10.1142/S0129054104002807},
  doi          = {10.1142/S0129054104002807},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijfcs/HonLYKS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/HonKLSY04,
  author       = {Wing{-}Kai Hon and
                  Ming{-}Yang Kao and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  title        = {Non-shared edges and nearest neighbor interchanges revisited},
  journal      = {Inf. Process. Lett.},
  volume       = {91},
  number       = {3},
  pages        = {129--134},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.ipl.2004.04.003},
  doi          = {10.1016/J.IPL.2004.04.003},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/HonKLSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/LianCMY04,
  author       = {Wang Lian and
                  David Wai{-}Lok Cheung and
                  Nikos Mamoulis and
                  Siu{-}Ming Yiu},
  title        = {An Efficient and Scalable Algorithm for Clustering {XML} Documents
                  by Structure},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {16},
  number       = {1},
  pages        = {82--96},
  year         = {2004},
  url          = {https://doi.org/10.1109/TKDE.2004.1264824},
  doi          = {10.1109/TKDE.2004.1264824},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/LianCMY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alenex/HonLSTWY04,
  author       = {Wing{-}Kai Hon and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Wai{-}Leuk Tse and
                  Chi{-}Kwong Wong and
                  Siu{-}Ming Yiu},
  editor       = {Lars Arge and
                  Giuseppe F. Italiano and
                  Robert Sedgewick},
  title        = {Practical aspects of Compressed Suffix Arrays and FM-Index in Searching
                  {DNA} Sequences},
  booktitle    = {Proceedings of the Sixth Workshop on Algorithm Engineering and Experiments
                  and the First Workshop on Analytic Algorithmics and Combinatorics,
                  New Orleans, LA, USA, January 10, 2004},
  pages        = {31--38},
  publisher    = {{SIAM}},
  year         = {2004},
  timestamp    = {Fri, 21 Apr 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/alenex/HonLSTWY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apbc/WongLMYKLC04,
  author       = {Prudence W. H. Wong and
                  Tak Wah Lam and
                  Y. C. Mui and
                  Siu{-}Ming Yiu and
                  Hsiang{-}fu Kung and
                  Marie C. M. Lin and
                  Y. T. Cheung},
  editor       = {Yi{-}Ping Phoebe Chen},
  title        = {Filtering of Ineffective siRNAs and Improved siRNA Design Tool},
  booktitle    = {Second Asia-Pacific Bioinformatics Conference {(APBC} 2004), January
                  18-22, 2004, Dunedin, New Zealand},
  series       = {{CRPIT}},
  volume       = {29},
  pages        = {247--255},
  publisher    = {Australian Computer Society},
  year         = {2004},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV29Wong.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apbc/WongLMYKLC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibe/ChanLSWY04,
  author       = {Ho{-}Leung Chan and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Prudence W. H. Wong and
                  Siu{-}Ming Yiu},
  title        = {A Mutation-Sensitive Approach for Locating Conserved Gene Pairs between
                  Related Species},
  booktitle    = {4th {IEEE} International Symposium on BioInformatics and BioEngineering
                  {(BIBE} 2004), 19-21 March 2004, Taichung, Taiwan},
  pages        = {545--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/BIBE.2004.1317390},
  doi          = {10.1109/BIBE.2004.1317390},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bibe/ChanLSWY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HuiCPYTCC04,
  author       = {Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow and
                  Kevin K. H. Pun and
                  Siu{-}Ming Yiu and
                  Wai Wan Tsang and
                  C. F. Chong and
                  H. W. Chan},
  title        = {Risk Management of Corporate Confidential Information in Digital Form},
  booktitle    = {28th International Computer Software and Applications Conference {(COMPSAC}
                  2004), Design and Assessment of Trustworthy Software-Based Systems,
                  27-30 September 2004, Hong Kong, China, Proceedings},
  pages        = {88--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CMPSAC.2004.1342810},
  doi          = {10.1109/CMPSAC.2004.1342810},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/HuiCPYTCC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ChanCCY04,
  author       = {F. T. Chan and
                  K. P. Chan and
                  Tsong Yueh Chen and
                  Siu{-}Ming Yiu},
  title        = {Adaptive Random Testing with {CG} Constraint},
  booktitle    = {28th International Computer Software and Applications Conference {(COMPSAC}
                  2004), Design and Assessment of Trustworthy Software-Based Systems,
                  27-30 September 2004, Hong Kong, China, Workshop Papers},
  pages        = {96--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CMPSAC.2004.1342685},
  doi          = {10.1109/CMPSAC.2004.1342685},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ChanCCY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcc/HonLSSY04,
  author       = {Wing{-}Kai Hon and
                  Tak Wah Lam and
                  Kunihiko Sadakane and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  title        = {Compressed Index for Dynamic Text},
  booktitle    = {2004 Data Compression Conference {(DCC} 2004), 23-25 March 2004, Snowbird,
                  UT, {USA}},
  pages        = {102--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/DCC.2004.1281455},
  doi          = {10.1109/DCC.2004.1281455},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dcc/HonLSSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iastedSE/CheungHYCPTCC04,
  author       = {Venus L. S. Cheung and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow and
                  Kevin K. H. Pun and
                  Wai Wan Tsang and
                  H. W. Chan and
                  C. F. Chong},
  editor       = {M. H. Hamza},
  title        = {Delegation of signing and decryption rights using pki proxy memo},
  booktitle    = {{IASTED} International Conference on Software Engineering, part of
                  the 22nd Multi-Conference on Applied Informatics, Innsbruck, Austria,
                  February 17-19, 2004},
  pages        = {281--285},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2004},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iastedSE/CheungHYCPTCC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/CheungHY04,
  author       = {Venus L. S. Cheung and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {The Delegation Problem and Practical PKI-Based Solutions},
  booktitle    = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise
                  Information Systems, Porto, Portugal, April 14-17, 2004},
  pages        = {73--84},
  year         = {2004},
  timestamp    = {Thu, 02 Feb 2017 12:56:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/CheungHY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChowHYC04,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Secure Hierarchical Identity Based Signature and Its Application},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {480--494},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_37},
  doi          = {10.1007/978-3-540-30191-2\_37},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChowHYC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChowHY04,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Identity Based Threshold Ring Signature},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {218--232},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_17},
  doi          = {10.1007/11496618\_17},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChowHY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/GoDHYL04,
  author       = {H. W. Go and
                  Y. Dong and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Victor O. K. Li},
  editor       = {Hamid R. Arabnia and
                  Laurence Tianruo Yang and
                  Chi{-}Hsiang Yeh},
  title        = {Applying Forward Security and Threshold Cryptography in Ad Hoc Networks},
  booktitle    = {Proceedings of the International Conference on Wireless Networks,
                  {ICWN} '04, June 21-24, 2004, Las Vegas, Nevada, USA, Volume 1},
  pages        = {202--209},
  publisher    = {{CSREA} Press},
  year         = {2004},
  timestamp    = {Mon, 22 Nov 2004 14:01:57 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/GoDHYL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recomb/ChinLYLRTSJ04,
  author       = {Francis Y. L. Chin and
                  Henry C. M. Leung and
                  Siu{-}Ming Yiu and
                  Tak Wah Lam and
                  Roni Rosenfeld and
                  Wai Wan Tsang and
                  David K. Smith and
                  Y. Jiang},
  editor       = {Philip E. Bourne and
                  Dan Gusfield},
  title        = {Finding motifs for insufficient number of sequences with strong binding
                  to transcription facto},
  booktitle    = {Proceedings of the Eighth Annual International Conference on Computational
                  Molecular Biology, 2004, San Diego, California, USA, March 27-31,
                  2004},
  pages        = {125--132},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/974614.974631},
  doi          = {10.1145/974614.974631},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/recomb/ChinLYLRTSJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/LianMCY04,
  author       = {Wang Lian and
                  Nikos Mamoulis and
                  David Wai{-}Lok Cheung and
                  Siu{-}Ming Yiu},
  editor       = {Xiaofang Zhou and
                  Stanley Y. W. Su and
                  Mike P. Papazoglou and
                  Maria E. Orlowska and
                  Keith G. Jeffery},
  title        = {Discovering Minimal Infrequent Structures from {XML} Documents},
  booktitle    = {Web Information Systems - {WISE} 2004, 5th International Conference
                  on Web Information Systems Engineering, Brisbane, Australia, November
                  22-24, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3306},
  pages        = {291--302},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30480-7\_30},
  doi          = {10.1007/978-3-540-30480-7\_30},
  timestamp    = {Sat, 08 Feb 2020 13:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/wise/LianMCY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowHYC04,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow},
  title        = {Two Improved Partially Blind Signature Schemes from Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/108},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowHYC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowHY04,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Identity Based Threshold Ring Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowHY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowYHY04,
  author       = {Sherman S. M. Chow and
                  Tsz Hon Yuen and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Signcryption in Hierarchical Identity Based Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowYHY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuiCHYCTCPC04,
  author       = {Ai Fen Sui and
                  Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow and
                  Wai Wan Tsang and
                  C. F. Chong and
                  Kevin K. H. Pun and
                  H. W. Chan},
  title        = {Separable and Anonymous Identity-Based Key Issuing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuiCHYCTCPC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowYH04,
  author       = {Sherman S. M. Chow and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  title        = {Efficient Identity Based Ring Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowYH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdet/CheungHYLKL03,
  author       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  J. K. W. Lee and
                  Sylvia L. K. Kwok and
                  Kenneth C. B. Leung},
  title        = {Content Engineering Agent: {A} TBL-Based E-Course Development Tool
                  with {TQM}},
  journal      = {Int. J. Distance Educ. Technol.},
  volume       = {1},
  number       = {2},
  pages        = {57--71},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdet.2003040104},
  doi          = {10.4018/JDET.2003040104},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdet/CheungHYLKL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/YauHCY03,
  author       = {Joe Cho{-}Ki Yau and
                  Lucas Chi Kwong Hui and
                  Bruce S. N. Cheung and
                  Siu{-}Ming Yiu},
  title        = {eCX: a secure infrastructure for e-course delivery},
  journal      = {Internet Res.},
  volume       = {13},
  number       = {2},
  pages        = {116--125},
  year         = {2003},
  url          = {https://doi.org/10.1108/10662240310469060},
  doi          = {10.1108/10662240310469060},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/YauHCY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/IeongKLSY03,
  author       = {Samuel Ieong and
                  Ming{-}Yang Kao and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  title        = {Predicting {RNA} Secondary Structures with Arbitrary Pseudoknots by
                  Maximizing the Number of Stacking Pairs},
  journal      = {J. Comput. Biol.},
  volume       = {10},
  number       = {6},
  pages        = {981--995},
  year         = {2003},
  url          = {https://doi.org/10.1089/106652703322756186},
  doi          = {10.1089/106652703322756186},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcb/IeongKLSY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/CheungHZY03,
  author       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  J. Zhang and
                  Siu{-}Ming Yiu},
  title        = {SmartTutor: An intelligent tutoring system in web-based adult education},
  journal      = {J. Syst. Softw.},
  volume       = {68},
  number       = {1},
  pages        = {11--25},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0164-1212(02)00133-4},
  doi          = {10.1016/S0164-1212(02)00133-4},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/CheungHZY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasfaa/ChengCY03,
  author       = {Lok{-}Lam Cheng and
                  David Wai{-}Lok Cheung and
                  Siu{-}Ming Yiu},
  title        = {Approximate String Matching in {DNA} Sequences},
  booktitle    = {Eighth International Conference on Database Systems for Advanced Applications
                  {(DASFAA} '03), March 26-28, 2003, Kyoto, Japan},
  pages        = {303--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DASFAA.2003.1192395},
  doi          = {10.1109/DASFAA.2003.1192395},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasfaa/ChengCY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChowYHC03,
  author       = {Sherman S. M. Chow and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Efficient Forward and Provably Secure ID-Based Signcryption Scheme
                  with Public Verifiability and Public Ciphertext Authenticity},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {352--369},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_26},
  doi          = {10.1007/978-3-540-24691-6\_26},
  timestamp    = {Thu, 17 Nov 2022 14:05:51 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ChowYHC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/LamLTWY03,
  author       = {Tak Wah Lam and
                  N. Lu and
                  Hing{-}Fung Ting and
                  Prudence W. H. Wong and
                  Siu{-}Ming Yiu},
  editor       = {Toshihide Ibaraki and
                  Naoki Katoh and
                  Hirotaka Ono},
  title        = {Efficient Algorithms for Optimizing Whole Genome Alignment with Noise},
  booktitle    = {Algorithms and Computation, 14th International Symposium, {ISAAC}
                  2003, Kyoto, Japan, December 15-17, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2906},
  pages        = {364--374},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24587-2\_38},
  doi          = {10.1007/978-3-540-24587-2\_38},
  timestamp    = {Fri, 29 Dec 2023 12:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/isaac/LamLTWY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowHYC03,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow},
  title        = {A Secure Modified ID-Based Undeniable Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/262},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowHYC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/SungYYCHL02,
  author       = {Wing{-}Kin Sung and
                  David Yang and
                  Siu{-}Ming Yiu and
                  David Wai{-}Lok Cheung and
                  Wai{-}Shing Ho and
                  Tak Wah Lam},
  title        = {Automatic construction of online catalog topologies},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {32},
  number       = {4},
  pages        = {382--391},
  year         = {2002},
  url          = {https://doi.org/10.1109/TSMCC.2002.806055},
  doi          = {10.1109/TSMCC.2002.806055},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/SungYYCHL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/LamSSY02,
  author       = {Tak Wah Lam and
                  Kunihiko Sadakane and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  editor       = {Oscar H. Ibarra and
                  Louxin Zhang},
  title        = {A Space and Time Efficient Algorithm for Constructing Compressed Suffix
                  Arrays},
  booktitle    = {Computing and Combinatorics, 8th Annual International Conference,
                  {COCOON} 2002, Singapore, August 15-17, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2387},
  pages        = {401--410},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45655-4\_43},
  doi          = {10.1007/3-540-45655-4\_43},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/LamSSY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-DS-0211009,
  author       = {Wing{-}Kai Hon and
                  Ming{-}Yang Kao and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  title        = {Improved Phylogeny Comparisons: Non-Shared Edges Nearest Neighbor
                  Interchanges, and Subtree Transfers},
  journal      = {CoRR},
  volume       = {cs.DS/0211009},
  year         = {2002},
  url          = {http://arxiv.org/abs/cs/0211009},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-DS-0211009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibe/IeongKLSY01,
  author       = {Samuel Ieong and
                  Ming{-}Yang Kao and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  editor       = {Nikolaos G. Bourbakis},
  title        = {Predicting {RNA} Secondary Structures with Arbitrary Pseudoknots by
                  Maximizing the Number of Stacking Pairs},
  booktitle    = {2nd {IEEE} International Symposium on Bioinformatics and Bioengineering,
                  Bethesda, Maryland, USA, November 4-5, 2001, Proceedings},
  pages        = {183--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/BIBE.2001.974428},
  doi          = {10.1109/BIBE.2001.974428},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bibe/IeongKLSY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/SungYYHCL01,
  author       = {Wing{-}Kin Sung and
                  David Yang and
                  Siu{-}Ming Yiu and
                  Wai{-}Shing Ho and
                  David Wai{-}Lok Cheung and
                  Tak Wah Lam},
  editor       = {Kurt Bauknecht and
                  Sanjay Kumar Madria and
                  G{\"{u}}nther Pernul},
  title        = {Automatic Construction of Online Catalog Topologies},
  booktitle    = {Electronic Commerce and Web Technologies, Second International Conference,
                  EC-Web 2001 Munich, Germany, September 4-6, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2115},
  pages        = {216--225},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44700-8\_21},
  doi          = {10.1007/3-540-44700-8\_21},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecweb/SungYYHCL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/WangCY01,
  author       = {Lian Wang and
                  David Wai{-}Lok Cheung and
                  Siu{-}Ming Yiu},
  editor       = {Xiaoyang Sean Wang and
                  Ge Yu and
                  Hongjun Lu},
  title        = {Indexing Attributes and Reordering Profiles for {XML} Document Filtering
                  and Information Delivery},
  booktitle    = {Advances in Web-Age Information Management, Second International Conference,
                  {WAIM} 2001, Xi'an, China, July 9-11, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2118},
  pages        = {355--366},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47714-4\_32},
  doi          = {10.1007/3-540-47714-4\_32},
  timestamp    = {Sun, 05 Jan 2020 16:42:00 +0100},
  biburl       = {https://dblp.org/rec/conf/waim/WangCY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CE-0111051,
  author       = {Samuel Ieong and
                  Ming{-}Yang Kao and
                  Tak Wah Lam and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu},
  title        = {Predicting {RNA} Secondary Structures with Arbitrary Pseudoknots by
                  Maximizing the Number of Stacking Pairs},
  journal      = {CoRR},
  volume       = {cs.CE/0111051},
  year         = {2001},
  url          = {https://arxiv.org/abs/cs/0111051},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CE-0111051.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/LeungHYT00,
  author       = {Karl R. P. H. Leung and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Ricky W. M. Tang},
  title        = {Modeling Web Navigation by Statechart},
  booktitle    = {24th International Computer Software and Applications Conference {(COMPSAC}
                  2000), 25-28 October 2000, Taipei, Taiwan},
  pages        = {41--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CMPSAC.2000.884689},
  doi          = {10.1109/CMPSAC.2000.884689},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/LeungHYT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/CheungWYZ00,
  author       = {David Wai{-}Lok Cheung and
                  Lian Wang and
                  Siu{-}Ming Yiu and
                  Bo Zhou},
  editor       = {Takao Terano and
                  Huan Liu and
                  Arbee L. P. Chen},
  title        = {Density-Based Mining of Quantitative Association Rules},
  booktitle    = {Knowledge Discovery and Data Mining, Current Issues and New Applications,
                  4th Pacific-Asia Conference, {PADKK} 2000, Kyoto, Japan, April 18-20,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1805},
  pages        = {257--268},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45571-X\_32},
  doi          = {10.1007/3-540-45571-X\_32},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/CheungWYZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/YangSYCHLL00,
  author       = {David Yang and
                  Wing{-}Kin Sung and
                  Siu{-}Ming Yiu and
                  David Wai{-}Lok Cheung and
                  Wai{-}Shing Ho and
                  Tak Wah Lam and
                  Sau Dan Lee},
  title        = {Construction of Online Catalog Topologies Using Decision Trees},
  booktitle    = {Second International Workshop on Advance Issues of E-Commerce and
                  Web-Based Information Systems {(WECWIS} 2000), Milpitas, California,
                  USA, June 8-9, 2000},
  pages        = {223--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/WECWIS.2000.853879},
  doi          = {10.1109/WECWIS.2000.853879},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/YangSYCHLL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webnet/CheungHY98,
  author       = {Bruce S. N. Cheung and
                  Sarah Ho and
                  Siu{-}Ming Yiu},
  editor       = {Hermann A. Maurer and
                  Richard G. Olson},
  title        = {A Survey On Online Education},
  booktitle    = {Proceedings of WebNet 98 - World Conference on the {WWW} and Internet
                  {\&} Intranet, Orlando, Florida, USA, November 7-12, 1998},
  publisher    = {{AACE}},
  year         = {1998},
  timestamp    = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl       = {https://dblp.org/rec/conf/webnet/CheungHY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hk/Yiu96,
  author       = {Siu{-}Ming Yiu},
  title        = {Tight bound edge guard results on art gallery problems},
  school       = {University of Hong Kong},
  year         = {1996},
  url          = {https://doi.org/10.5353/th\_b3123641},
  doi          = {10.5353/TH\_B3123641},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hk/Yiu96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cccg/Yiu95,
  author       = {Siu{-}Ming Yiu},
  title        = {A generalized fortress problem using k-consecutive vertex guards},
  booktitle    = {Proceedings of the 7th Canadian Conference on Computational Geometry,
                  Quebec City, Quebec, Canada, August 1995},
  pages        = {139--144},
  publisher    = {Carleton University, Ottawa, Canada},
  year         = {1995},
  url          = {http://www.cccg.ca/proceedings/1995/cccg1995\_0023.pdf},
  timestamp    = {Wed, 12 May 2021 14:19:37 +0200},
  biburl       = {https://dblp.org/rec/conf/cccg/Yiu95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cccg/YiuC94,
  author       = {Siu{-}Ming Yiu and
                  A. Choi},
  title        = {Edge Guards on a Fortress},
  booktitle    = {Proceedings of the 6th Canadian Conference on Computational Geometry,
                  Saskatoon, SK, Canada, August 1994},
  pages        = {296--301},
  publisher    = {University of Saskatchewan},
  year         = {1994},
  timestamp    = {Wed, 12 May 2021 14:19:37 +0200},
  biburl       = {https://dblp.org/rec/conf/cccg/YiuC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics