Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Siu-Ming Yiu
@article{DBLP:journals/eswa/DengLY24, author = {Yiqi Deng and Yuzhi Liang and Siu{-}Ming Yiu}, title = {Towards interpretable stock trend prediction through causal inference}, journal = {Expert Syst. Appl.}, volume = {238}, number = {Part {B}}, pages = {121654}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.121654}, doi = {10.1016/J.ESWA.2023.121654}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/DengLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/0003ZJMYY24, author = {Xingwei He and Qianru Zhang and A{-}Long Jin and Jun Ma and Yuan Yuan and Siu Ming Yiu}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {Improving Factual Error Correction by Learning to Inject Factual Errors}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {18197--18205}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i16.29778}, doi = {10.1609/AAAI.V38I16.29778}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/0003ZJMYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangYZJ24, author = {Hongxiao Wang and Siu{-}Ming Yiu and Yanmin Zhao and Zoe Lin Jiang}, editor = {Qiang Tang and Vanessa Teague}, title = {Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {3--35}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_1}, doi = {10.1007/978-3-031-57722-2\_1}, timestamp = {Wed, 24 Apr 2024 16:58:28 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WangYZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-04336, author = {Ke Zhang and Lichao Sun and Bolin Ding and Siu Ming Yiu and Carl Yang}, title = {Deep Efficient Private Neighbor Generation for Subgraph Federated Learning}, journal = {CoRR}, volume = {abs/2401.04336}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.04336}, doi = {10.48550/ARXIV.2401.04336}, eprinttype = {arXiv}, eprint = {2401.04336}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-04336.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-02800, author = {Yujing Sun and Caiyi Sun and Yuan Liu and Yuexin Ma and Siu Ming Yiu}, title = {Extreme Two-View Geometry From Object Poses with Diffusion Models}, journal = {CoRR}, volume = {abs/2402.02800}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.02800}, doi = {10.48550/ARXIV.2402.02800}, eprinttype = {arXiv}, eprint = {2402.02800}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-02800.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-11224, author = {Chi Zhang and Man Ho Au and Siu Ming Yiu}, title = {Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement}, journal = {CoRR}, volume = {abs/2402.11224}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.11224}, doi = {10.48550/ARXIV.2402.11224}, eprinttype = {arXiv}, eprint = {2402.11224}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-11224.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-16656, author = {Qianru Zhang and Lianghao Xia and Xuheng Cai and Siu{-}Ming Yiu and Chao Huang and Christian S. Jensen}, title = {Graph Augmentation for Recommendation}, journal = {CoRR}, volume = {abs/2403.16656}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.16656}, doi = {10.48550/ARXIV.2403.16656}, eprinttype = {arXiv}, eprint = {2403.16656}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-16656.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-17833, author = {Shijie Na and Yuzhi Liang and Siu{-}Ming Yiu}, title = {{GPFL:} {A} Gradient Projection-Based Client Selection Framework for Efficient Federated Learning}, journal = {CoRR}, volume = {abs/2403.17833}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.17833}, doi = {10.48550/ARXIV.2403.17833}, eprinttype = {arXiv}, eprint = {2403.17833}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-17833.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangYZJ24, author = {Hongxiao Wang and Siu{-}Ming Yiu and Yanmin Zhao and Zoe Lin Jiang}, title = {Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2024}, url = {https://eprint.iacr.org/2024/027}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangYZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CongYY24, author = {Mingshu Cong and Tsz Hon Yuen and Siu Ming Yiu}, title = {zkMatrix: Batched Short Proof for Committed Matrix Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2024}, url = {https://eprint.iacr.org/2024/161}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CongYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZengHYH23, author = {Gongxian Zeng and Meiqi He and Siu{-}Ming Yiu and Zhengan Huang}, title = {Corrigendum to: {A} Self-Tallying Electronic Voting Based on Blockchain}, journal = {Comput. J.}, volume = {66}, number = {2}, pages = {523}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxab175}, doi = {10.1093/COMJNL/BXAB175}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZengHYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GongCYT23, author = {Yanan Gong and Kam{-}Pui Chow and Siu Ming Yiu and Hing{-}Fung Ting}, title = {Analyzing the peeling chain patterns on the Bitcoin blockchain}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301614}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301614}, doi = {10.1016/J.FSIDI.2023.301614}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GongCYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/CaiPYY23, author = {Cailing Cai and Shimin Pan and Tsz Hon Yuen and Siu{-}Ming Yiu}, title = {Practical fully leakage resilient signatures with auxiliary inputs}, journal = {Future Gener. Comput. Syst.}, volume = {141}, pages = {448--461}, year = {2023}, url = {https://doi.org/10.1016/j.future.2022.11.027}, doi = {10.1016/J.FUTURE.2022.11.027}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/CaiPYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/WangCDFHCDYW23, author = {Eric Ke Wang and Zicong Chen and Xilin Dang and Xuan Fan and Xuming Han and Chien{-}Ming Chen and Weiping Ding and Siu{-}Ming Yiu and Jian Weng}, title = {Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation}, journal = {Pattern Recognit.}, volume = {143}, pages = {109745}, year = {2023}, url = {https://doi.org/10.1016/j.patcog.2023.109745}, doi = {10.1016/J.PATCOG.2023.109745}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/WangCDFHCDYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/SunXYL23, author = {Yujing Sun and Hao Xiong and Siu Ming Yiu and Kwok{-}Yan Lam}, title = {BitAnalysis: {A} Visualization System for Bitcoin Wallet Investigation}, journal = {{IEEE} Trans. Big Data}, volume = {9}, number = {2}, pages = {621--636}, year = {2023}, url = {https://doi.org/10.1109/TBDATA.2022.3188660}, doi = {10.1109/TBDATA.2022.3188660}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/SunXYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLYL23, author = {Zhiwei Wang and Feng Liu and Siu{-}Ming Yiu and Longwen Lan}, title = {Online/Offline and History Indexing Identity-Based Fuzzy Message Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5553--5566}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3309477}, doi = {10.1109/TIFS.2023.3309477}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangLYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/WangCZYCHIF23, author = {Eric Ke Wang and Zicong Chen and Mingjia Zhu and Siu{-}Ming Yiu and Chien{-}Ming Chen and Mohammad Mehedi Hassan and Stefano Izzo and Giancarlo Fortino}, title = {Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {2}, pages = {2165--2172}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3202950}, doi = {10.1109/TII.2022.3202950}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/WangCZYCHIF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/WangLY23, author = {Zhiwei Wang and Longwen Lan and Siu{-}Ming Yiu}, title = {Chameleon Hash Based Efficiently Updatable Oblivious Key Management}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {6}, pages = {4503--4513}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3323630}, doi = {10.1109/TSC.2023.3323630}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/WangLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/YimZTLY23, author = {Tik Yu Yim and Yuxuan Zhang and Wenting Tan and Tak Wah Lam and Siu Ming Yiu}, editor = {Jingrui He and Themis Palpanas and Xiaohua Hu and Alfredo Cuzzocrea and Dejing Dou and Dominik Slezak and Wei Wang and Aleksandra Gruca and Jerry Chun{-}Wei Lin and Rakesh Agrawal}, title = {Meticulously Analyzing {ESG} Disclosure: {A} Data-Driven Approach}, booktitle = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023}, pages = {2884--2889}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigData59044.2023.10386467}, doi = {10.1109/BIGDATA59044.2023.10386467}, timestamp = {Fri, 02 Feb 2024 12:00:39 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/YimZTLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/XuCCZY23, author = {Shiyuan Xu and Yibo Cao and Xue Chen and Yanmin Zhao and Siu{-}Ming Yiu}, editor = {Chunpeng Ge and Moti Yung}, title = {Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, pages = {274--298}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0942-7\_14}, doi = {10.1007/978-981-97-0942-7\_14}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/XuCCZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/0003JMYY23, author = {Xingwei He and A{-}Long Jin and Jun Ma and Yuan Yuan and Siu Ming Yiu}, editor = {Houda Bouamor and Juan Pino and Kalika Bali}, title = {PivotFEC: Enhancing Few-shot Factual Error Correction with a Pivot Task Approach using Large Language Models}, booktitle = {Findings of the Association for Computational Linguistics: {EMNLP} 2023, Singapore, December 6-10, 2023}, pages = {9960--9976}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.findings-emnlp.667}, doi = {10.18653/V1/2023.FINDINGS-EMNLP.667}, timestamp = {Fri, 12 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/0003JMYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/0003GJ0D0YD23, author = {Xingwei He and Yeyun Gong and A{-}Long Jin and Hang Zhang and Anlei Dong and Jian Jiao and Siu{-}Ming Yiu and Nan Duan}, editor = {Houda Bouamor and Juan Pino and Kalika Bali}, title = {{CAPSTONE:} Curriculum Sampling for Dense Retrieval with Document Expansion}, booktitle = {Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2023, Singapore, December 6-10, 2023}, pages = {10531--10541}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.emnlp-main.651}, doi = {10.18653/V1/2023.EMNLP-MAIN.651}, timestamp = {Fri, 12 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/0003GJ0D0YD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiZHYMW23, author = {Junzuo Lai and Gongxian Zeng and Zhengan Huang and Siu Ming Yiu and Xin Mu and Jian Weng}, editor = {Carmit Hazay and Martijn Stam}, title = {Asymmetric Group Message Franking: Definitions and Constructions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {67--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_3}, doi = {10.1007/978-3-031-30589-4\_3}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiZHYMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/Zhang0LHYLCS23, author = {Qianru Zhang and Zheng Wang and Cheng Long and Chao Huang and Siu{-}Ming Yiu and Yiding Liu and Gao Cong and Jieming Shi}, title = {Online Anomalous Subtrajectory Detection on Road Networks with Deep Reinforcement Learning}, booktitle = {39th {IEEE} International Conference on Data Engineering, {ICDE} 2023, Anaheim, CA, USA, April 3-7, 2023}, pages = {246--258}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDE55515.2023.00026}, doi = {10.1109/ICDE55515.2023.00026}, timestamp = {Thu, 27 Jul 2023 14:59:05 +0200}, biburl = {https://dblp.org/rec/conf/icde/Zhang0LHYLCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/IpLLY23, author = {Cheuk Yu Ip and Fu Kay Frankie Li and Yi Anson Lam and Siu Ming Yiu}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using {BERT} Model}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {78--95}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_5}, doi = {10.1007/978-3-031-56580-9\_5}, timestamp = {Fri, 19 Apr 2024 14:40:31 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/IpLLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/ZhangHXWYH23, author = {Qianru Zhang and Chao Huang and Lianghao Xia and Zheng Wang and Siu Ming Yiu and Ruihua Han}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Spatial-Temporal Graph Learning with Adversarial Contrastive Adaptation}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {41151--41163}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/zhang23p.html}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/ZhangHXWYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prcv/FangYDJJJLY23, author = {Junbin Fang and Zewei Yang and Siyuan Dai and You Jiang and Canjian Jiang and Zoe Lin Jiang and Chuanyi Liu and Siu{-}Ming Yiu}, editor = {Qingshan Liu and Hanzi Wang and Zhanyu Ma and Weishi Zheng and Hongbin Zha and Xilin Chen and Liang Wang and Rongrong Ji}, title = {Cross-Task Physical Adversarial Attack Against Lane Detection System Based on {LED} Illumination Modulation}, booktitle = {Pattern Recognition and Computer Vision - 6th Chinese Conference, {PRCV} 2023, Xiamen, China, October 13-15, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14427}, pages = {478--491}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8435-0\_38}, doi = {10.1007/978-981-99-8435-0\_38}, timestamp = {Thu, 11 Jan 2024 22:28:04 +0100}, biburl = {https://dblp.org/rec/conf/prcv/FangYDJJJLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recomb/DuXYYS23, author = {Bing{-}Xue Du and Yi Xu and Siu{-}Ming Yiu and Hui Yu and Jian{-}Yu Shi}, editor = {Haixu Tang}, title = {{MTGL-ADMET:} {A} Novel Multi-task Graph Learning Framework for {ADMET} Prediction Enhanced by Status-Theory and Maximum Flow}, booktitle = {Research in Computational Molecular Biology - 27th Annual International Conference, {RECOMB} 2023, Istanbul, Turkey, April 16-19, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13976}, pages = {85--103}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-29119-7\_6}, doi = {10.1007/978-3-031-29119-7\_6}, timestamp = {Sat, 13 May 2023 01:07:17 +0200}, biburl = {https://dblp.org/rec/conf/recomb/DuXYYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/PunHY23, author = {Tsz Ho Pun and Yi Jun He and Siu Ming Yiu}, editor = {Guojun Wang and Haozhe Wang and Geyong Min and Nektarios Georgalas and Weizhi Meng}, title = {Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption}, booktitle = {Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {2034}, pages = {274--288}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1274-8\_18}, doi = {10.1007/978-981-97-1274-8\_18}, timestamp = {Thu, 25 Apr 2024 17:03:28 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/PunHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ZhangHXWLY23, author = {Qianru Zhang and Chao Huang and Lianghao Xia and Zheng Wang and Zhonghang Li and Siu{-}Ming Yiu}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Automated Spatio-Temporal Graph Contrastive Learning}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {295--305}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583304}, doi = {10.1145/3543507.3583304}, timestamp = {Mon, 28 Aug 2023 21:17:10 +0200}, biburl = {https://dblp.org/rec/conf/www/ZhangHXWLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-12249, author = {Junbin Fang and You Jiang and Canjian Jiang and Zoe Lin Jiang and Siu{-}Ming Yiu and Chuanyi Liu}, title = {State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems}, journal = {CoRR}, volume = {abs/2303.12249}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.12249}, doi = {10.48550/ARXIV.2303.12249}, eprinttype = {arXiv}, eprint = {2303.12249}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-12249.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-16854, author = {Xingwei He and Zhenghao Lin and Yeyun Gong and A{-}Long Jin and Hang Zhang and Chen Lin and Jian Jiao and Siu Ming Yiu and Nan Duan and Weizhu Chen}, title = {AnnoLLM: Making Large Language Models to Be Better Crowdsourced Annotators}, journal = {CoRR}, volume = {abs/2303.16854}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.16854}, doi = {10.48550/ARXIV.2303.16854}, eprinttype = {arXiv}, eprint = {2303.16854}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-16854.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-03920, author = {Qianru Zhang and Chao Huang and Lianghao Xia and Zheng Wang and Zhonghang Li and Siu{-}Ming Yiu}, title = {Automated Spatio-Temporal Graph Contrastive Learning}, journal = {CoRR}, volume = {abs/2305.03920}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.03920}, doi = {10.48550/ARXIV.2305.03920}, eprinttype = {arXiv}, eprint = {2305.03920}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-03920.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-10683, author = {Qianru Zhang and Chao Huang and Lianghao Xia and Zheng Wang and Siu{-}Ming Yiu and Ruihua Han}, title = {Spatial-Temporal Graph Learning with Adversarial Contrastive Adaptation}, journal = {CoRR}, volume = {abs/2306.10683}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.10683}, doi = {10.48550/ARXIV.2306.10683}, eprinttype = {arXiv}, eprint = {2306.10683}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-10683.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-13294, author = {Junbin Fang and Canjian Jiang and You Jiang and Puxi Lin and Zhaojie Chen and Yujing Sun and Siu{-}Ming Yiu and Zoe Lin Jiang}, title = {Imperceptible Physical Attack against Face Recognition Systems via {LED} Illumination Modulation}, journal = {CoRR}, volume = {abs/2307.13294}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.13294}, doi = {10.48550/ARXIV.2307.13294}, eprinttype = {arXiv}, eprint = {2307.13294}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-13294.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-07049, author = {Xingwei He and Qianru Zhang and A{-}Long Jin and Jun Ma and Yuan Yuan and Siu Ming Yiu}, title = {Improving Factual Error Correction by Learning to Inject Factual Errors}, journal = {CoRR}, volume = {abs/2312.07049}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.07049}, doi = {10.48550/ARXIV.2312.07049}, eprinttype = {arXiv}, eprint = {2312.07049}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-07049.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangJGZWFYW23, author = {Peng Yang and Zoe Lin Jiang and Shiqi Gao and Jiehang Zhuang and Hongxiao Wang and Junbin Fang and Siu{-}Ming Yiu and Yulin Wu}, title = {FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2023}, url = {https://eprint.iacr.org/2023/073}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YangJGZWFYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiZHYMW23, author = {Junzuo Lai and Gongxian Zeng and Zhengan Huang and Siu Ming Yiu and Xin Mu and Jian Weng}, title = {Asymmetric Group Message Franking: Definitions {\&} Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2023}, url = {https://eprint.iacr.org/2023/332}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiZHYMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuCCYZ23, author = {Shiyuan Xu and Yibo Cao and Xue Chen and Siu{-}Ming Yiu and Yanmin Zhao}, title = {Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2023}, url = {https://eprint.iacr.org/2023/591}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuCCYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuCCYY23, author = {Shiyuan Xu and Yibo Cao and Xue Chen and Yuer Yang and Siu{-}Ming Yiu}, title = {Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1715}, year = {2023}, url = {https://eprint.iacr.org/2023/1715}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/XuCCYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZengHYH22, author = {Gongxian Zeng and Meiqi He and Siu{-}Ming Yiu and Zhengan Huang}, title = {A Self-Tallying Electronic Voting Based on Blockchain}, journal = {Comput. J.}, volume = {65}, number = {12}, pages = {3020--3034}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxab123}, doi = {10.1093/COMJNL/BXAB123}, timestamp = {Sat, 14 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZengHYH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/WuWSYJYW22, author = {Yulin Wu and Xuan Wang and Willy Susilo and Guomin Yang and Zoe Lin Jiang and Siu{-}Ming Yiu and Hao Wang}, title = {Generic server-aided secure multi-party computation in cloud computing}, journal = {Comput. Stand. Interfaces}, volume = {79}, pages = {103552}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2021.103552}, doi = {10.1016/J.CSI.2021.103552}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/WuWSYJYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GongCYT22, author = {Yanan Gong and Kam{-}Pui Chow and Siu{-}Ming Yiu and Hing{-}Fung Ting}, title = {Sensitivity analysis for a Bitcoin simulation model}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301449}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301449}, doi = {10.1016/J.FSIDI.2022.301449}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GongCYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LaiKCYKWWMH22, author = {Anthony Cheuk Tung Lai and Ping Fan Ke and Kelvin Chan and Siu Ming Yiu and Dongsun Kim and Wai Kin Wong and Shuai Wang and Joseph Muppala and Alan Ho}, title = {RansomSOC: {A} More Effective Security Operations Center to Detect and Respond to Ransomware Attacks}, journal = {J. Internet Serv. Inf. Secur.}, volume = {12}, number = {3}, pages = {63--75}, year = {2022}, url = {https://doi.org/10.22667/JISIS.2022.08.31.063}, doi = {10.22667/JISIS.2022.08.31.063}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/LaiKCYKWWMH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/HeY22, author = {Xingwei He and Siu{-}Ming Yiu}, editor = {Smaranda Muresan and Preslav Nakov and Aline Villavicencio}, title = {Controllable Dictionary Example Generation: Generating Example Sentences for Specific Targeted Audiences}, booktitle = {Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), {ACL} 2022, Dublin, Ireland, May 22-27, 2022}, pages = {610--627}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.acl-long.46}, doi = {10.18653/V1/2022.ACL-LONG.46}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/HeY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/CaiQYY22, author = {Cailing Cai and Xianrui Qin and Tsz Hon Yuen and Siu{-}Ming Yiu}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {42--53}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517422}, doi = {10.1145/3488932.3517422}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/CaiQYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/0003GJQ00ZCYD22, author = {Xingwei He and Yeyun Gong and A{-}Long Jin and Weizhen Qi and Hang Zhang and Jian Jiao and Bartuer Zhou and Biao Cheng and Siu{-}Ming Yiu and Nan Duan}, editor = {Yoav Goldberg and Zornitsa Kozareva and Yue Zhang}, title = {Metric-guided Distillation: Distilling Knowledge from the Metric to Ranker and Retriever for Generative Commonsense Reasoning}, booktitle = {Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022}, pages = {839--852}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.emnlp-main.53}, doi = {10.18653/V1/2022.EMNLP-MAIN.53}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/0003GJQ00ZCYD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuWY22, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {424--443}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_21}, doi = {10.1007/978-3-031-17140-6\_21}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiuWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdis/JiangPFYLWYWF22, author = {Zoe Lin Jiang and Yijian Pan and Maoshun Fan and Lin Yao and Yang Liu and Yulin Wu and Siu{-}Ming Yiu and Xuan Wang and Junbin Fang}, title = {Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature}, booktitle = {4th International Conference on Data Intelligence and Security, {ICDIS} 2022, Shenzhen, China, August 24-26, 2022}, pages = {134--141}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDIS55630.2022.00028}, doi = {10.1109/ICDIS55630.2022.00028}, timestamp = {Wed, 04 Jan 2023 16:48:27 +0100}, biburl = {https://dblp.org/rec/conf/icdis/JiangPFYLWYWF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/GongCTY22, author = {Yanan Gong and Kam{-}Pui Chow and Hing{-}Fung Ting and Siu{-}Ming Yiu}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Analyzing the Error Rates of Bitcoin Clustering Heuristics}, booktitle = {Advances in Digital Forensics {XVIII} - 18th {IFIP} {WG} 11.9 International Conference, Virtual Event, January 3-4, 2022, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {653}, pages = {187--205}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10078-9\_11}, doi = {10.1007/978-3-031-10078-9\_11}, timestamp = {Thu, 14 Jul 2022 17:45:44 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/GongCTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuWY22, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Making Private Function Evaluation Safer, Faster, and Simpler}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {349--378}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_13}, doi = {10.1007/978-3-030-97121-2\_13}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiuWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/ZhangWLY22, author = {Qianru Zhang and Zheng Wang and Cheng Long and Siu{-}Ming Yiu}, editor = {Arindam Banerjee and Zhi{-}Hua Zhou and Evangelos E. Papalexakis and Matteo Riondato}, title = {On Predicting and Generating a Good Break Shot in Billiards Sports}, booktitle = {Proceedings of the 2022 {SIAM} International Conference on Data Mining, {SDM} 2022, Alexandria, VA, USA, April 28-30, 2022}, pages = {109--117}, publisher = {{SIAM}}, year = {2022}, url = {https://doi.org/10.1137/1.9781611977172.13}, doi = {10.1137/1.9781611977172.13}, timestamp = {Sat, 30 Sep 2023 09:55:58 +0200}, biburl = {https://dblp.org/rec/conf/sdm/ZhangWLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ZhaoWYLW22, author = {Yanmin Zhao and Yang Wang and Siu Ming Yiu and Yu Liu and Meiqin Wang}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {24--51}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_2}, doi = {10.1007/978-3-031-29504-1\_2}, timestamp = {Tue, 02 May 2023 15:31:34 +0200}, biburl = {https://dblp.org/rec/conf/stm/ZhaoWYLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaiYY22, author = {Cailing Cai and Tsz Hon Yuen and Siu{-}Ming Yiu}, title = {Hash Proof System with Auxiliary Inputs and Its Application}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {52--59}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00018}, doi = {10.1109/TRUSTCOM56396.2022.00018}, timestamp = {Mon, 27 Mar 2023 16:44:39 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaiYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShenCLLJLDJFJY22, author = {Yixuan Shen and Yu Cheng and Yini Lin and Sicheng Long and Canjian Jiang and Danjie Li and Siyuan Dai and You Jiang and Junbin Fang and Zoe Lin Jiang and Siu{-}Ming Yiu}, title = {{MLIA:} modulated {LED} illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {1020--1027}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00139}, doi = {10.1109/TRUSTCOM56396.2022.00139}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShenCLLJLDJFJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-05825, author = {Zoe Lin Jiang and Jiajing Gu and Hongxiao Wang and Yulin Wu and Junbin Fang and Siu{-}Ming Yiu and Wenjian Luo and Xuan Wang}, title = {Privacy-Preserving Distributed Machine Learning Made Faster}, journal = {CoRR}, volume = {abs/2205.05825}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.05825}, doi = {10.48550/ARXIV.2205.05825}, eprinttype = {arXiv}, eprint = {2205.05825}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-05825.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-14452, author = {Yiqi Deng and Siu Ming Yiu}, title = {Deep Multiple Instance Learning For Forecasting Stock Trends Using Financial News}, journal = {CoRR}, volume = {abs/2206.14452}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.14452}, doi = {10.48550/ARXIV.2206.14452}, eprinttype = {arXiv}, eprint = {2206.14452}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-14452.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-11708, author = {Xingwei He and Yeyun Gong and A{-}Long Jin and Weizhen Qi and Hang Zhang and Jian Jiao and Bartuer Zhou and Biao Cheng and Siu{-}Ming Yiu and Nan Duan}, title = {Metric-guided Distillation: Distilling Knowledge from the Metric to Ranker and Retriever for Generative Commonsense Reasoning}, journal = {CoRR}, volume = {abs/2210.11708}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.11708}, doi = {10.48550/ARXIV.2210.11708}, eprinttype = {arXiv}, eprint = {2210.11708}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-11708.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-08415, author = {Qianru Zhang and Zheng Wang and Cheng Long and Chao Huang and Siu{-}Ming Yiu and Yiding Liu and Gao Cong and Jieming Shi}, title = {Online Anomalous Subtrajectory Detection on Road Networks with Deep Reinforcement Learning}, journal = {CoRR}, volume = {abs/2211.08415}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.08415}, doi = {10.48550/ARXIV.2211.08415}, eprinttype = {arXiv}, eprint = {2211.08415}, timestamp = {Sun, 07 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-08415.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-09353, author = {Hongxiao Wang and Zoe Lin Jiang and Yanmin Zhao and Siu{-}Ming Yiu and Peng Yang and Zejiu Tan and Bohan Jin and Shiyuan Xu and Shimin Pan}, title = {Securer and Faster Privacy-Preserving Distributed Machine Learning}, journal = {CoRR}, volume = {abs/2211.09353}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.09353}, doi = {10.48550/ARXIV.2211.09353}, eprinttype = {arXiv}, eprint = {2211.09353}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-09353.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-09114, author = {Xingwei He and Yeyun Gong and A{-}Long Jin and Hang Zhang and Anlei Dong and Jian Jiao and Siu{-}Ming Yiu and Nan Duan}, title = {Curriculum Sampling for Dense Retrieval with Document Expansion}, journal = {CoRR}, volume = {abs/2212.09114}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.09114}, doi = {10.48550/ARXIV.2212.09114}, eprinttype = {arXiv}, eprint = {2212.09114}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-09114.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWY22, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, title = {Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2022}, url = {https://eprint.iacr.org/2022/585}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangLYDZJ21, author = {En Zhang and Ming Li and Siu{-}Ming Yiu and Jiao Du and Jun{-}Zhe Zhu and Ganggang Jin}, title = {Fair hierarchical secret sharing scheme based on smart contract}, journal = {Inf. Sci.}, volume = {546}, pages = {166--176}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2020.07.032}, doi = {10.1016/J.INS.2020.07.032}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhangLYDZJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangJLY21, author = {Jun Zhang and Zoe Lin Jiang and Ping Li and Siu{-}Ming Yiu}, title = {Privacy-preserving multikey computing framework for encrypted data in the cloud}, journal = {Inf. Sci.}, volume = {575}, pages = {217--230}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.06.017}, doi = {10.1016/J.INS.2021.06.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangJLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ChenLHGYJ21, author = {Wenbin Chen and Jin Li and Zhengan Huang and Chongzhi Gao and Siu{-}Ming Yiu and Zoe Lin Jiang}, title = {Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key}, journal = {J. Comput. Syst. Sci.}, volume = {120}, pages = {137--148}, year = {2021}, url = {https://doi.org/10.1016/j.jcss.2021.03.008}, doi = {10.1016/J.JCSS.2021.03.008}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/ChenLHGYJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/LiuLYY21, author = {Zheli Liu and Jin Li and Ilsun You and Siu{-}Ming Yiu}, title = {Editorial: Security and Privacy in Computing and Communications}, journal = {Mob. Networks Appl.}, volume = {26}, number = {4}, pages = {1407--1411}, year = {2021}, url = {https://doi.org/10.1007/s11036-020-01683-4}, doi = {10.1007/S11036-020-01683-4}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/LiuLYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/GuoHYYLLYC21, author = {Xiaojie Guo and Yanyu Huang and Jinhui Ye and Sijie Yin and Min Li and Zhaohui Li and Siu{-}Ming Yiu and Xiaochun Cheng}, title = {ShadowFPE: New Encrypted Web Application Solution Based on Shadow {DOM}}, journal = {Mob. Networks Appl.}, volume = {26}, number = {4}, pages = {1733--1746}, year = {2021}, url = {https://doi.org/10.1007/s11036-019-01509-y}, doi = {10.1007/S11036-019-01509-Y}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/GuoHYYLLYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/quanbio/YanZYS21, author = {Xiao{-}Ying Yan and Shaowu Zhang and Siu{-}Ming Yiu and Jian{-}Yu Shi}, title = {Interpretable prediction of drug-cell line response by triple matrix factorization}, journal = {Quant. Biol.}, volume = {9}, number = {4}, pages = {426--439}, year = {2021}, url = {https://doi.org/10.15302/j-qb-021-0259}, doi = {10.15302/J-QB-021-0259}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/quanbio/YanZYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/DingZ0LWYG21, author = {Yaoling Ding and Liehuang Zhu and An Wang and Yuan Li and Yongjuan Wang and Siu Ming Yiu and Keke Gai}, title = {A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {17}, number = {2s}, pages = {71:1--71:21}, year = {2021}, url = {https://doi.org/10.1145/3433165}, doi = {10.1145/3433165}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/DingZ0LWYG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vc/SunXY21, author = {Yujing Sun and Hao Xiong and Siu{-}Ming Yiu}, title = {Understanding deep face anti-spoofing: from the perspective of data}, journal = {Vis. Comput.}, volume = {37}, number = {5}, pages = {1015--1028}, year = {2021}, url = {https://doi.org/10.1007/s00371-020-01849-x}, doi = {10.1007/S00371-020-01849-X}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vc/SunXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/LiuXGYLT21, author = {Chang Liu and Gang Xiong and Gaopeng Gou and Siu{-}Ming Yiu and Zhen Li and Zhihong Tian}, title = {Classifying encrypted traffic using adaptive fingerprints with multi-level attributes}, journal = {World Wide Web}, volume = {24}, number = {6}, pages = {2071--2097}, year = {2021}, url = {https://doi.org/10.1007/s11280-021-00940-0}, doi = {10.1007/S11280-021-00940-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/LiuXGYLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FanWLLYW21, author = {Yanhong Fan and Weijia Wang and Zhihu Li and Zhenyu Lu and Siu{-}Ming Yiu and Meiqin Wang}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Forced Independent Optimized Implementation of 4-Bit S-Box}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {151--170}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_8}, doi = {10.1007/978-3-030-90567-5\_8}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FanWLLYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuWY21, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {Blind Polynomial Evaluation and Data Trading}, booktitle = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12726}, pages = {100--129}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78372-3\_5}, doi = {10.1007/978-3-030-78372-3\_5}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuWY21, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, editor = {Yu Yu and Moti Yung}, title = {Improved Zero-Knowledge Argument of Encrypted Extended Permutation}, booktitle = {Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13007}, pages = {281--298}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88323-2\_15}, doi = {10.1007/978-3-030-88323-2\_15}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/WenYH21, author = {Jing Wen and Siu{-}Ming Yiu and Lucas C. K. Hui}, title = {Defending Against Model Inversion Attack by Adversarial Examples}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2021, Rhodes, Greece, July 26-28, 2021}, pages = {551--556}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSR51186.2021.9527945}, doi = {10.1109/CSR51186.2021.9527945}, timestamp = {Thu, 23 Sep 2021 14:18:07 +0200}, biburl = {https://dblp.org/rec/conf/csr2/WenYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/YauCY21, author = {Ken Yau and Kam{-}Pui Chow and Siu{-}Ming Yiu}, editor = {Jason Staggs and Sujeet Shenoi}, title = {Detecting Anomalous Programmable Logic Controller Events Using Process Mining}, booktitle = {Critical Infrastructure Protection {XV} - 15th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2021, Virtual Event, March 15-16, 2021, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {636}, pages = {119--133}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93511-5\_6}, doi = {10.1007/978-3-030-93511-5\_6}, timestamp = {Wed, 09 Mar 2022 16:41:36 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/YauCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ZhangYLSY21, author = {Ke Zhang and Carl Yang and Xiaoxiao Li and Lichao Sun and Siu{-}Ming Yiu}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Subgraph Federated Learning with Missing Neighbor Generation}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {6671--6682}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/34adeb8e3242824038aa65460a47c29e-Abstract.html}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/ZhangYLSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/NiuLWWY21, author = {Chao Niu and Muzhou Li and Meiqin Wang and Qingju Wang and Siu{-}Ming Yiu}, editor = {Riham AlTawy and Andreas H{\"{u}}lsing}, title = {Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES}, booktitle = {Selected Areas in Cryptography - 28th International Conference, {SAC} 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13203}, pages = {223--245}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-99277-4\_11}, doi = {10.1007/978-3-030-99277-4\_11}, timestamp = {Fri, 01 Apr 2022 15:49:26 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/NiuLWWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-13430, author = {Ke Zhang and Carl Yang and Xiaoxiao Li and Lichao Sun and Siu{-}Ming Yiu}, title = {Subgraph Federated Learning with Missing Neighbor Generation}, journal = {CoRR}, volume = {abs/2106.13430}, year = {2021}, url = {https://arxiv.org/abs/2106.13430}, eprinttype = {arXiv}, eprint = {2106.13430}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-13430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWY21, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, title = {Blind Polynomial Evaluation and Data Trading}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2021}, url = {https://eprint.iacr.org/2021/413}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NiuLWWY21, author = {Chao Niu and Muzhou Li and Meiqin Wang and Qingju Wang and Siu{-}Ming Yiu}, title = {Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1310}, year = {2021}, url = {https://eprint.iacr.org/2021/1310}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NiuLWWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWY21a, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, title = {Improved Zero-Knowledge Argument of Encrypted Extended Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1430}, year = {2021}, url = {https://eprint.iacr.org/2021/1430}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWY21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWY21b, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, title = {Making Private Function Evaluation Safer, Faster, and Simpler}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1682}, year = {2021}, url = {https://eprint.iacr.org/2021/1682}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWY21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20, author = {Raphael C.{-}W. Phan and Masayuki Abe and Lynn Batten and Jung Hee Cheon and Ed Dawson and Steven D. Galbraith and Jian Guo and Lucas C. K. Hui and Kwangjo Kim and Xuejia Lai and Dong Hoon Lee and Mitsuru Matsui and Tsutomu Matsumoto and Shiho Moriai and Phong Q. Nguyen and Dingyi Pei and Duong Hieu Phan and Josef Pieprzyk and Huaxiong Wang and Hank Wolfe and Duncan S. Wong and Tzong{-}Chen Wu and Bo{-}Yin Yang and Siu{-}Ming Yiu and Yu Yu and Jianying Zhou}, title = {Advances in security research in the Asiacrypt region}, journal = {Commun. {ACM}}, volume = {63}, number = {4}, pages = {76--81}, year = {2020}, url = {https://doi.org/10.1145/3378428}, doi = {10.1145/3378428}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FangXLCLLJY20, author = {Junbin Fang and Guikai Xi and Rong Li and Qian Chen and Puxi Lin and Sijin Li and Zoe Lin Jiang and Siu{-}Ming Yiu}, title = {Coarse-to-fine two-stage semantic video carving approach in digital forensics}, journal = {Comput. Secur.}, volume = {97}, pages = {101942}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101942}, doi = {10.1016/J.COSE.2020.101942}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FangXLCLLJY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangCYHAF20, author = {Eric Ke Wang and Chien{-}Ming Chen and Siu{-}Ming Yiu and Mohammad Mehedi Hassan and Majed A. AlRubaian and Giancarlo Fortino}, title = {Incentive evolutionary game model for opportunistic social networks}, journal = {Future Gener. Comput. Syst.}, volume = {102}, pages = {14--29}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.07.034}, doi = {10.1016/J.FUTURE.2019.07.034}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangCYHAF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/JiangGJLWLFYW20, author = {Zoe Lin Jiang and Ning Guo and Yabin Jin and Jiazhuo Lv and Yulin Wu and Zechao Liu and Junbin Fang and Siu{-}Ming Yiu and Xuan Wang}, title = {Efficient two-party privacy-preserving collaborative \emph{k}-means clustering protocol supporting both storage and computation outsourcing}, journal = {Inf. Sci.}, volume = {518}, pages = {168--180}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.12.051}, doi = {10.1016/J.INS.2019.12.051}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/JiangGJLWLFYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/WongY20, author = {Shing Ki Wong and Siu{-}Ming Yiu}, title = {Identification of device motion status via Bluetooth discovery}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {4}, pages = {59--69}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.11.30.059}, doi = {10.22667/JISIS.2020.11.30.059}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/WongY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WongY20, author = {Shing Ki Wong and Siu{-}Ming Yiu}, title = {Location spoofing attack detection with pre-installed sensors in mobile devices}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {4}, pages = {16--30}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.12.31.016}, doi = {10.22667/JOWUA.2020.12.31.016}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/WongY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/HuangLLLYBG20, author = {Yanyu Huang and Bo Li and Zheli Liu and Jin Li and Siu{-}Ming Yiu and Thar Baker and Brij B. Gupta}, title = {ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {13}, number = {4}, pages = {602--612}, year = {2020}, url = {https://doi.org/10.1109/TSC.2019.2962110}, doi = {10.1109/TSC.2019.2962110}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/HuangLLLYBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CaiYCWY20, author = {Cailing Cai and Tsz Hon Yuen and Handong Cui and Mingli Wu and Siu{-}Ming Yiu}, editor = {Yongdong Wu and Moti Yung}, title = {{LPPRS:} New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks}, booktitle = {Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12612}, pages = {288--303}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-71852-7\_19}, doi = {10.1007/978-3-030-71852-7\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CaiYCWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuWY20, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, editor = {Yongdong Wu and Moti Yung}, title = {An Improvement of Multi-exponentiation with Encrypted Bases Argument: Smaller and Faster}, booktitle = {Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12612}, pages = {397--414}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-71852-7\_27}, doi = {10.1007/978-3-030-71852-7\_27}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ZhangYJ20, author = {Jun Zhang and Siu{-}Ming Yiu and Zoe Lin Jiang}, editor = {Meikang Qiu}, title = {Outsourced Privacy-Preserving Reduced {SVM} Among Multiple Institutions}, booktitle = {Algorithms and Architectures for Parallel Processing - 20th International Conference, {ICA3PP} 2020, New York City, NY, USA, October 2-4, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12453}, pages = {126--141}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60239-0\_9}, doi = {10.1007/978-3-030-60239-0\_9}, timestamp = {Tue, 12 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/ZhangYJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/ChenZY20, author = {Yuechen Chen and Linru Zhang and Siu{-}Ming Yiu}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Decentralized Multi-Client Attribute Based Functional Encryption}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {118--129}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009824701180129}, doi = {10.5220/0009824701180129}, timestamp = {Wed, 29 Jul 2020 16:57:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/ChenZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangWCY20, author = {Linru Zhang and Xiangning Wang and Yuechen Chen and Siu{-}Ming Yiu}, editor = {Weizhi Meng and Dieter Gollmann and Christian Damsgaard Jensen and Jianying Zhou}, title = {Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model}, booktitle = {Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12282}, pages = {565--587}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61078-4\_32}, doi = {10.1007/978-3-030-61078-4\_32}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhangWCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/YauCY20, author = {Ken Yau and Kam{-}Pui Chow and Siu{-}Ming Yiu}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines}, booktitle = {Advances in Digital Forensics {XVI} - 16th {IFIP} {WG} 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {589}, pages = {95--108}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56223-6\_6}, doi = {10.1007/978-3-030-56223-6\_6}, timestamp = {Thu, 17 Sep 2020 14:12:05 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/YauCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/WeiCY20, author = {Yichen Wei and Kam{-}Pui Chow and Siu{-}Ming Yiu}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning}, booktitle = {Advances in Digital Forensics {XVI} - 16th {IFIP} {WG} 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {589}, pages = {273--290}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56223-6\_15}, doi = {10.1007/978-3-030-56223-6\_15}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/WeiCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/WangY20a, author = {Xin Wang and Siu{-}Ming Yiu}, editor = {Christian Bessiere}, title = {Classification with Rejection: Scaling Generative Classifiers with Supervised Deep Infomax}, booktitle = {Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI} 2020}, pages = {2980--2986}, publisher = {ijcai.org}, year = {2020}, url = {https://doi.org/10.24963/ijcai.2020/412}, doi = {10.24963/IJCAI.2020/412}, timestamp = {Mon, 20 Jul 2020 12:38:52 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/WangY20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/ZhangYH20, author = {Ke Zhang and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, title = {A Light-Weight Crowdsourcing Aggregation in Privacy-Preserving Federated Learning System}, booktitle = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020, Glasgow, United Kingdom, July 19-24, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IJCNN48605.2020.9206841}, doi = {10.1109/IJCNN48605.2020.9206841}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/ZhangYH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ZhangWCY20, author = {Linru Zhang and Xiangning Wang and Yuechen Chen and Siu{-}Ming Yiu}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Adaptive-Secure Identity-Based Inner-Product Functional Encryption and Its Leakage-Resilience}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {666--690}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_30}, doi = {10.1007/978-3-030-65277-7\_30}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ZhangWCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcom/ZhangJLY20, author = {Jun Zhang and Zoe Lin Jiang and Ping Li and Siu{-}Ming Yiu}, editor = {Meikang Qiu}, title = {Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys}, booktitle = {Smart Computing and Communication - 5th International Conference, SmartCom 2020, Paris, France, December 29-31, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12608}, pages = {215--225}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-74717-6\_23}, doi = {10.1007/978-3-030-74717-6\_23}, timestamp = {Tue, 12 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartcom/ZhangJLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WongY20, author = {Shing Ki Wong and Siu{-}Ming Yiu}, editor = {Ilsun You}, title = {Detection on {GPS} Spoofing in Location Based Mobile Games}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {215--226}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_17}, doi = {10.1007/978-3-030-65299-9\_17}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/WongY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/CongYWY20, author = {Mingshu Cong and Han Yu and Xi Weng and Siu{-}Ming Yiu}, editor = {Qiang Yang and Lixin Fan and Han Yu}, title = {A Game-Theoretic Framework for Incentive Mechanism Design in Federated Learning}, booktitle = {Federated Learning - Privacy and Incentive}, series = {Lecture Notes in Computer Science}, volume = {12500}, pages = {205--222}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63076-8\_15}, doi = {10.1007/978-3-030-63076-8\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/CongYWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-12543, author = {Tsong Yueh Chen and S. C. Cheung and Siu{-}Ming Yiu}, title = {Metamorphic Testing: {A} New Approach for Generating Next Test Cases}, journal = {CoRR}, volume = {abs/2002.12543}, year = {2020}, url = {https://arxiv.org/abs/2002.12543}, eprinttype = {arXiv}, eprint = {2002.12543}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-12543.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-14780, author = {Mingshu Cong and Xi Weng and Han Yu and Jiabao Qu and Siu{-}Ming Yiu}, title = {Optimal Procurement Auction for Cooperative Production of Virtual Products: Vickrey-Clarke-Groves Meet Cremer-McLean}, journal = {CoRR}, volume = {abs/2007.14780}, year = {2020}, url = {https://arxiv.org/abs/2007.14780}, eprinttype = {arXiv}, eprint = {2007.14780}, timestamp = {Mon, 03 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-14780.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-06680, author = {Mingshu Cong and Han Yu and Xi Weng and Jiabao Qu and Yang Liu and Siu{-}Ming Yiu}, title = {A VCG-based Fair Incentive Mechanism for Federated Learning}, journal = {CoRR}, volume = {abs/2008.06680}, year = {2020}, url = {https://arxiv.org/abs/2008.06680}, eprinttype = {arXiv}, eprint = {2008.06680}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-06680.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWY20, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, title = {An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2020}, url = {https://eprint.iacr.org/2020/567}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangWCY20, author = {Linru Zhang and Xiangning Wang and Yuechen Chen and Siu{-}Ming Yiu}, title = {Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {884}, year = {2020}, url = {https://eprint.iacr.org/2020/884}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangWCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangWCY20a, author = {Linru Zhang and Xiangning Wang and Yuechen Chen and Siu{-}Ming Yiu}, title = {Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1353}, year = {2020}, url = {https://eprint.iacr.org/2020/1353}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhangWCY20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/LiJYWYH19, author = {Ye Li and Zoe Lin Jiang and Lin Yao and Xuan Wang and Siu{-}Ming Yiu and Zhengan Huang}, title = {Outsourced privacy-preserving {C4.5} decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties}, journal = {Clust. Comput.}, volume = {22}, number = {Suppl 1}, pages = {1581--1593}, year = {2019}, url = {https://doi.org/10.1007/s10586-017-1019-9}, doi = {10.1007/S10586-017-1019-9}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/LiJYWYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmpb/ShiLMCLLY19, author = {Jian{-}Yu Shi and Jia{-}Xin Li and Kui{-}Tao Mao and Jiang{-}Bo Cao and Peng Lei and Hui{-}Meng Lu and Siu{-}Ming Yiu}, title = {Predicting combinative drug pairs via multiple classifier system with positive samples only}, journal = {Comput. Methods Programs Biomed.}, volume = {168}, pages = {1--10}, year = {2019}, url = {https://doi.org/10.1016/j.cmpb.2018.11.002}, doi = {10.1016/J.CMPB.2018.11.002}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cmpb/ShiLMCLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiLYGX19, author = {Xuan Li and Jin Li and Siu{-}Ming Yiu and Chongzhi Gao and Jinbo Xiong}, title = {Privacy-preserving edge-assisted image retrieval and classification in IoT}, journal = {Frontiers Comput. Sci.}, volume = {13}, number = {5}, pages = {1136--1147}, year = {2019}, url = {https://doi.org/10.1007/s11704-018-8067-z}, doi = {10.1007/S11704-018-8067-Z}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/LiLYGX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiHLLTY19, author = {Bo Li and Yanyu Huang and Zheli Liu and Jin Li and Zhihong Tian and Siu{-}Ming Yiu}, title = {HybridORAM: Practical oblivious cloud storage with constant bandwidth}, journal = {Inf. Sci.}, volume = {479}, pages = {651--663}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.02.019}, doi = {10.1016/J.INS.2018.02.019}, timestamp = {Thu, 01 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiHLLTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcheminf/ShiMYY19, author = {Jian{-}Yu Shi and Kui{-}Tao Mao and Hui Yu and Siu{-}Ming Yiu}, title = {Detecting drug communities and predicting comprehensive drug-drug interactions via balance regularized semi-nonnegative matrix factorization}, journal = {J. Cheminformatics}, volume = {11}, number = {1}, pages = {28:1--28:16}, year = {2019}, url = {https://doi.org/10.1186/s13321-019-0352-9}, doi = {10.1186/S13321-019-0352-9}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcheminf/ShiMYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WongY19, author = {Shing Ki Wong and Siu{-}Ming Yiu}, title = {Detection on auto clickers in mobile games}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {3}, pages = {65--80}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.09.30.065}, doi = {10.22667/JOWUA.2019.09.30.065}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WongY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nle/LiangYZY19, author = {Yuzhi Liang and Min Yang and Jia Zhu and Siu{-}Ming Yiu}, title = {Out-domain Chinese new word detection with statistics-based character embedding}, journal = {Nat. Lang. Eng.}, volume = {25}, number = {2}, pages = {239--255}, year = {2019}, url = {https://doi.org/10.1017/S1351324918000463}, doi = {10.1017/S1351324918000463}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nle/LiangYZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/YeungHCYZC19, author = {Cheuk Yu Yeung and Lucas Chi Kwong Hui and Tat Wing Chim and Siu{-}Ming Yiu and Gongxian Zeng and Jingyue Chen}, title = {Anonymous Counting Problem in Trust Level Warning System for {VANET}}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {68}, number = {1}, pages = {34--48}, year = {2019}, url = {https://doi.org/10.1109/TVT.2018.2884899}, doi = {10.1109/TVT.2018.2884899}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/YeungHCYZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/ZhangCZHY19, author = {Linru Zhang and Yuechen Chen and Jun Zhang and Meiqi He and Siu{-}Ming Yiu}, editor = {Claude Carlet and Sylvain Guilley and Abderrahmane Nitaj and El Mamoun Souidi}, title = {From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions}, booktitle = {Codes, Cryptology and Information Security - Third International Conference, {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji}, series = {Lecture Notes in Computer Science}, volume = {11445}, pages = {142--167}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16458-4\_10}, doi = {10.1007/978-3-030-16458-4\_10}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c2si/ZhangCZHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvcbt/SunXYL19, author = {Yujing Sun and Hao Xiong and Siu{-}Ming Yiu and Kwok{-}Yan Lam}, title = {BitVis: An Interactive Visualization System for Bitcoin Accounts Analysis}, booktitle = {Crypto Valley Conference on Blockchain Technology, {CVCBT} 2019, Rotkreuz, Switzerland, June 24-26, 2019}, pages = {21--25}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CVCBT.2019.000-3}, doi = {10.1109/CVCBT.2019.000-3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvcbt/SunXYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/ZhangZCCYL19, author = {Linru Zhang and Gongxian Zeng and Yuechen Chen and Nairen Cao and Siu{-}Ming Yiu and Zheli Liu}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {{OC-ORAM:} Constant Bandwidth {ORAM} with Smaller Block Size using Oblivious Clear Algorithm}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {149--160}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007924701490160}, doi = {10.5220/0007924701490160}, timestamp = {Tue, 06 Jun 2023 14:58:02 +0200}, biburl = {https://dblp.org/rec/conf/icete/ZhangZCCYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/YauCY19, author = {Ken Yau and Kam{-}Pui Chow and Siu{-}Ming Yiu}, editor = {Jason Staggs and Sujeet Shenoi}, title = {An Incident Response Model for Industrial Control System Forensics Based on Historical Events}, booktitle = {Critical Infrastructure Protection {XIII} - 13th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2019, Arlington, VA, USA, March 11-12, 2019, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {570}, pages = {311--328}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34647-8\_16}, doi = {10.1007/978-3-030-34647-8\_16}, timestamp = {Tue, 19 Nov 2019 10:46:31 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/YauCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/YuenY19, author = {Tsz Hon Yuen and Siu{-}Ming Yiu}, editor = {Joseph K. Liu and Xinyi Huang}, title = {Strong Known Related-Key Attacks and the Security of {ECDSA}}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {130--145}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_8}, doi = {10.1007/978-3-030-36938-5\_8}, timestamp = {Wed, 17 Aug 2022 14:30:35 +0200}, biburl = {https://dblp.org/rec/conf/nss/YuenY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZengHY19, author = {Gongxian Zeng and Meiqi He and Siu{-}Ming Yiu}, editor = {Ilsun You}, title = {A Secure and Self-tallying E-voting System Based on Blockchain}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {67--76}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_6}, doi = {10.1007/978-3-030-39303-8\_6}, timestamp = {Tue, 28 Jan 2020 10:04:20 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ZengHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingWY19, author = {Yaoling Ding and An Wang and Siu{-}Ming Yiu}, title = {An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2019}, url = {https://eprint.iacr.org/2019/189}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DingWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZY19, author = {Yuechen Chen and Linru Zhang and Siu{-}Ming Yiu}, title = {Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {846}, year = {2019}, url = {https://eprint.iacr.org/2019/846}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/ShiHZCY18, author = {Jianyu Shi and Hua Huang and Yan{-}Ning Zhang and Jiang{-}Bo Cao and Siu{-}Ming Yiu}, title = {{BMCMDA:} a novel model for predicting human microbe-disease associations via binary matrix completion}, journal = {{BMC} Bioinform.}, volume = {19-S}, number = {9}, pages = {169--176}, year = {2018}, url = {https://doi.org/10.1186/s12859-018-2274-3}, doi = {10.1186/S12859-018-2274-3}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/ShiHZCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/ShiHLLZDY18, author = {Jian{-}Yu Shi and Hua Huang and Jia{-}Xin Li and Peng Lei and Yan{-}Ning Zhang and Kai Dong and Siu{-}Ming Yiu}, title = {{TMFUF:} a triple matrix factorization-based unified framework for predicting comprehensive drug-drug interactions of new drugs}, journal = {{BMC} Bioinform.}, volume = {19-S}, number = {14}, pages = {27--37}, year = {2018}, url = {https://doi.org/10.1186/s12859-018-2379-8}, doi = {10.1186/S12859-018-2379-8}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/ShiHLLZDY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcsb/YuMSHCDY18, author = {Hui Yu and Kui{-}Tao Mao and Jian{-}Yu Shi and Hua Huang and Zhi Chen and Kai Dong and Siu{-}Ming Yiu}, title = {Predicting and understanding comprehensive drug-drug interactions via semi-nonnegative matrix factorization}, journal = {{BMC} Syst. Biol.}, volume = {12}, number = {1}, pages = {101--110}, year = {2018}, url = {https://doi.org/10.1186/s12918-018-0532-7}, doi = {10.1186/S12918-018-0532-7}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcsb/YuMSHCDY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/WuHNZYF18, author = {Xianyan Wu and Qi Han and Xiamu Niu and Hongli Zhang and Siu{-}Ming Yiu and Jun{-}bin Fang}, title = {{JPEG} image width estimation for file carving}, journal = {{IET} Image Process.}, volume = {12}, number = {7}, pages = {1245--1252}, year = {2018}, url = {https://doi.org/10.1049/iet-ipr.2016.0531}, doi = {10.1049/IET-IPR.2016.0531}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/WuHNZYF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/LiWJY18, author = {Ye Li and Xuan Wang and Zoe Lin Jiang and Siu{-}Ming Yiu}, title = {Outsourcing privacy-preserving {ID3} decision tree over horizontally partitioned data for multiple parties}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {12}, number = {2}, pages = {207--215}, year = {2018}, url = {https://doi.org/10.1504/IJHPCN.2016.10004531}, doi = {10.1504/IJHPCN.2016.10004531}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/LiWJY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/ChangCYH18, author = {Kuang{-}Yu Chang and Yun Cui and Siu{-}Ming Yiu and Wing{-}Kai Hon}, title = {Reconstructing One-Articulated Networks with Distance Matrices}, journal = {J. Comput. Biol.}, volume = {25}, number = {3}, pages = {253--269}, year = {2018}, url = {https://doi.org/10.1089/cmb.2017.0148}, doi = {10.1089/CMB.2017.0148}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcb/ChangCYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhangHZY18, author = {Jun Zhang and Meiqi He and Gongxian Zeng and Siu{-}Ming Yiu}, title = {Privacy-preserving verifiable elastic net among multiple institutions in the cloud}, journal = {J. Comput. Secur.}, volume = {26}, number = {6}, pages = {791--815}, year = {2018}, url = {https://doi.org/10.3233/JCS-171107}, doi = {10.3233/JCS-171107}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhangHZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuJWY18, author = {Zechao Liu and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu}, title = {Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating}, journal = {J. Netw. Comput. Appl.}, volume = {108}, pages = {112--123}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.01.016}, doi = {10.1016/J.JNCA.2018.01.016}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiuJWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/WangLYYH18, author = {Eric Ke Wang and Yueping Li and Yunming Ye and Siu{-}Ming Yiu and Lucas C. K. Hui}, title = {A Dynamic Trust Framework for Opportunistic Mobile Social Networks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {15}, number = {1}, pages = {319--329}, year = {2018}, url = {https://doi.org/10.1109/TNSM.2017.2776350}, doi = {10.1109/TNSM.2017.2776350}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/WangLYYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/WenHYZ18, author = {Jing Wen and Lucas C. K. Hui and Siu{-}Ming Yiu and Ruoqing Zhang}, title = {{DCN:} Detector-Corrector Network Against Evasion Attacks on Deep Neural Networks}, booktitle = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} Workshops 2018, Luxembourg, June 25-28, 2018}, pages = {215--221}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.ieeecomputersociety.org/10.1109/DSN-W.2018.00066}, doi = {10.1109/DSN-W.2018.00066}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WenHYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WuWJLLYLZZ18, author = {Yulin Wu and Xuan Wang and Zoe Lin Jiang and Xuan Li and Jin Li and Siu{-}Ming Yiu and Zechao Liu and Hainan Zhao and Chunkai Zhang}, editor = {Jaideep Vaidya and Jin Li}, title = {Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11337}, pages = {374--388}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05063-4\_29}, doi = {10.1007/978-3-030-05063-4\_29}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WuWJLLYLZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/SunJZYWZWZ18, author = {Wenli Sun and Zoe Lin Jiang and Jun Zhang and Siu{-}Ming Yiu and Yulin Wu and Hainan Zhao and Xuan Wang and Peng Zhang}, editor = {Jaideep Vaidya and Jin Li}, title = {Outsourced Privacy Preserving {SVM} with Multiple Keys}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11337}, pages = {415--430}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05063-4\_32}, doi = {10.1007/978-3-030-05063-4\_32}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/SunJZYWZWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/JiangGJLWYWYF18, author = {Zoe Lin Jiang and Ning Guo and Yabin Jin and Jiazhuo Lv and Yulin Wu and Yating Yu and Xuan Wang and Siu{-}Ming Yiu and Junbin Fang}, editor = {Jaideep Vaidya and Jin Li}, title = {Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11337}, pages = {447--460}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05063-4\_34}, doi = {10.1007/978-3-030-05063-4\_34}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/JiangGJLWYWYF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HeZZZCY18, author = {Meiqi He and Gongxian Zeng and Jun Zhang and Linru Zhang and Yuechen Chen and Siu{-}Ming Yiu}, editor = {Kwangsu Lee}, title = {A New Privacy-Preserving Searching Model on Blockchain}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {248--266}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_16}, doi = {10.1007/978-3-030-12146-4\_16}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HeZZZCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/YauCY18, author = {Ken Yau and Kam{-}Pui Chow and Siu{-}Ming Yiu}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {A Forensic Logging System for Siemens Programmable Logic Controllers}, booktitle = {Advances in Digital Forensics {XIV} - 14th {IFIP} {WG} 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {532}, pages = {331--349}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99277-8\_18}, doi = {10.1007/978-3-319-99277-8\_18}, timestamp = {Thu, 30 Aug 2018 16:22:35 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/YauCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/ChanCYY18, author = {Chun{-}Fai Chan and Kam{-}Pui Chow and Siu{-}Ming Yiu and Ken Yau}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers}, booktitle = {Advances in Digital Forensics {XIV} - 14th {IFIP} {WG} 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {532}, pages = {351--367}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99277-8\_19}, doi = {10.1007/978-3-319-99277-8\_19}, timestamp = {Thu, 30 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/ChanCYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/LiuJWWY18, author = {Zechao Liu and Zoe Lin Jiang and Xuan Wang and Yulin Wu and Siu{-}Ming Yiu}, editor = {Jinjun Chen and Laurence T. Yang}, title = {Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices}, booktitle = {{IEEE} International Conference on Parallel {\&} Distributed Processing with Applications, Ubiquitous Computing {\&} Communications, Big Data {\&} Cloud Computing, Social Computing {\&} Networking, Sustainable Computing {\&} Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018, Melbourne, Australia, December 11-13, 2018}, pages = {1003--1008}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BDCloud.2018.00146}, doi = {10.1109/BDCLOUD.2018.00146}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/LiuJWWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/LiuCXGYH18, author = {Chang Liu and Zigang Cao and Gang Xiong and Gaopeng Gou and Siu{-}Ming Yiu and Longtao He}, title = {MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints}, booktitle = {26th {IEEE/ACM} International Symposium on Quality of Service, IWQoS 2018, Banff, AB, Canada, June 4-6, 2018}, pages = {1--10}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IWQoS.2018.8624124}, doi = {10.1109/IWQOS.2018.8624124}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/LiuCXGYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ZengHZZCY18, author = {Gongxian Zeng and Meiqi He and Linru Zhang and Jun Zhang and Yuechen Chen and Siu{-}Ming Yiu}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514159}, doi = {10.1109/PST.2018.8514159}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ZengHZZCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenLJFYXLYWHLZ18, author = {Qian Chen and Qing Liao and Zoe Lin Jiang and Junbin Fang and Siu{-}Ming Yiu and Guikai Xi and Rong Li and Zhengzhong Yi and Xuan Wang and Lucas C. K. Hui and Dong Liu and En Zhang}, title = {File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics}, booktitle = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San Francisco, CA, USA, May 24, 2018}, pages = {140--147}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SPW.2018.00029}, doi = {10.1109/SPW.2018.00029}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChenLJFYXLYWHLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuJWYZW18, author = {Zechao Liu and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Ruoqing Zhang and Yulin Wu}, title = {A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {614--623}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00092}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00092}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuJWYZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2018, editor = {Man Ho Au and Siu{-}Ming Yiu and Jin Li and Xiapu Luo and Cong Wang and Aniello Castiglione and Kamil Kluczniak}, title = {Network and System Security - 12th International Conference, {NSS} 2018, Hong Kong, China, August 27-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11058}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02744-5}, doi = {10.1007/978-3-030-02744-5}, isbn = {978-3-030-02743-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-00939, author = {Ziliang Lai and Chris Liu and Eric Lo and Ben Kao and Siu{-}Ming Yiu}, title = {Decentralized Search on Decentralized Web}, journal = {CoRR}, volume = {abs/1809.00939}, year = {2018}, url = {http://arxiv.org/abs/1809.00939}, eprinttype = {arXiv}, eprint = {1809.00939}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-00939.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/LiuJYLW17, author = {Bo Liu and Tao Jiang and Siu{-}Ming Yiu and Junyi Li and Yadong Wang}, title = {rMFilter: acceleration of long read-based structure variation calling by chimeric read filtering}, journal = {Bioinform.}, volume = {33}, number = {17}, pages = {2750--2752}, year = {2017}, url = {https://doi.org/10.1093/bioinformatics/btx279}, doi = {10.1093/BIOINFORMATICS/BTX279}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/LiuJYLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/ShiLGLY17, author = {Jian{-}Yu Shi and Jia{-}Xin Li and Ke Gao and Peng Lei and Siu{-}Ming Yiu}, title = {Predicting combinative drug pairs towards realistic screening via integrating heterogeneous features}, journal = {{BMC} Bioinform.}, volume = {18}, number = {{S-12}}, pages = {409:1--409:9}, year = {2017}, url = {https://doi.org/10.1186/s12859-017-1818-2}, doi = {10.1186/S12859-017-1818-2}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/ShiLGLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiuJWHYS17, author = {Zechao Liu and Zoe Lin Jiang and Xuan Wang and Xinyi Huang and Siu{-}Ming Yiu and Kunihiko Sadakane}, title = {Offline/online attribute-based encryption with verifiable outsourced decryption}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {7}, year = {2017}, url = {https://doi.org/10.1002/cpe.3915}, doi = {10.1002/CPE.3915}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/LiuJWHYS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiLHLGYC17, author = {Ping Li and Jin Li and Zhengan Huang and Tong Li and Chong{-}Zhi Gao and Siu{-}Ming Yiu and Kai Chen}, title = {Multi-key privacy-preserving deep learning in cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {74}, pages = {76--85}, year = {2017}, url = {https://doi.org/10.1016/j.future.2017.02.006}, doi = {10.1016/J.FUTURE.2017.02.006}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiLHLGYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/XuLXYY17, author = {Fei Xu and Pinxin Liu and Jing Xu and Jianfeng Yang and Siu{-}Ming Yiu}, title = {Multi-Dimensional Bloom Filter: Design and Evaluation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {10}, pages = {2368--2372}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016INP0022}, doi = {10.1587/TRANSINF.2016INP0022}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/XuLXYY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdmb/YaoLTYWL17, author = {Haobin Yao and Tak Wah Lam and H. F. Ting and Siu{-}Ming Yiu and Yadong Wang and Bo Liu}, title = {Accurate annotation of metagenomic data without species-level references}, journal = {Int. J. Data Min. Bioinform.}, volume = {19}, number = {4}, pages = {283--297}, year = {2017}, url = {https://doi.org/10.1504/IJDMB.2017.10012545}, doi = {10.1504/IJDMB.2017.10012545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdmb/YaoLTYWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/WangHYWF17, author = {Jingxuan Wang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Eric Ke Wang and Jun{-}bin Fang}, title = {A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities}, journal = {Pervasive Mob. Comput.}, volume = {39}, pages = {52--64}, year = {2017}, url = {https://doi.org/10.1016/j.pmcj.2017.04.005}, doi = {10.1016/J.PMCJ.2017.04.005}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/WangHYWF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangHYZZ17, author = {Jingxuan Wang and Lucas C. K. Hui and Siu{-}Ming Yiu and Gang Zhou and Ruoqing Zhang}, title = {{F-DDIA:} {A} Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {9602357:1--9602357:12}, year = {2017}, url = {https://doi.org/10.1155/2017/9602357}, doi = {10.1155/2017/9602357}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangHYZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tlsdkcs/LiangYY17, author = {Yuzhi Liang and Pengcheng Yin and Siu{-}Ming Yiu}, title = {New Word Detection and Tagging on Chinese Twitter Stream}, journal = {Trans. Large Scale Data Knowl. Centered Syst.}, volume = {32}, pages = {69--90}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-55608-5\_4}, doi = {10.1007/978-3-662-55608-5\_4}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tlsdkcs/LiangYY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeiWZY17, author = {Puwen Wei and Wei Wang and Bingxin Zhu and Siu{-}Ming Yiu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {3--22}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_1}, doi = {10.1007/978-3-319-60055-0\_1}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WeiWZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/YangLYC17, author = {Jie Yang and Henry C. M. Leung and Siu{-}Ming Yiu and Francis Y. L. Chin}, editor = {Gao Cong and Wen{-}Chih Peng and Wei Emma Zhang and Chengliang Li and Aixin Sun}, title = {Mixed Membership Sparse Gaussian Conditional Random Fields}, booktitle = {Advanced Data Mining and Applications - 13th International Conference, {ADMA} 2017, Singapore, November 5-6, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10604}, pages = {287--302}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69179-4\_20}, doi = {10.1007/978-3-319-69179-4\_20}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/adma/YangLYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/LiYCL17, author = {Menglu Li and Siu{-}Ming Yiu and Ting{-}Fung Chan and Ernest T. Lam}, editor = {Xiaohua Hu and Chi{-}Ren Shyu and Yana Bromberg and Jean Gao and Yang Gong and Dmitry Korkin and Illhoi Yoo and Huiru Jane Zheng}, title = {An iterative algorithm for de novo optical map assembly}, booktitle = {2017 {IEEE} International Conference on Bioinformatics and Biomedicine, {BIBM} 2017, Kansas City, MO, USA, November 13-16, 2017}, pages = {1952--1958}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/BIBM.2017.8217958}, doi = {10.1109/BIBM.2017.8217958}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibm/LiYCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangWYJL17, author = {Jun Zhang and Xin Wang and Siu{-}Ming Yiu and Zoe Lin Jiang and Jin Li}, editor = {Cong Wang and Murat Kantarcioglu}, title = {Secure Dot Product of Outsourced Encrypted Vectors and its Application to {SVM}}, booktitle = {Proceedings of the Fifth {ACM} International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {75--82}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055259.3055270}, doi = {10.1145/3055259.3055270}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangWYJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YauCYC17, author = {Ken Yau and Kam{-}Pui Chow and Siu{-}Ming Yiu and Chun{-}Fai Chan}, title = {Detecting anomalous behavior of {PLC} using semi-supervised machine learning}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {580--585}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228713}, doi = {10.1109/CNS.2017.8228713}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/YauCYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/LiJWY17, author = {Ye Li and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu}, title = {Privacy-Preserving {ID3} Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 1}, pages = {548--555}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.102}, doi = {10.1109/CSE-EUC.2017.102}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/LiJWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/WuJWYZ17, author = {Yulin Wu and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Peng Zhang}, title = {Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 1}, pages = {562--567}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.104}, doi = {10.1109/CSE-EUC.2017.104}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/WuJWYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZhangHY17, author = {Jun Zhang and Meiqi He and Siu{-}Ming Yiu}, editor = {Giovanni Livraga and Sencun Zhu}, title = {Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {185--204}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_10}, doi = {10.1007/978-3-319-61176-1\_10}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ZhangHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LiJWYL17, author = {Ye Li and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Qing Liao}, title = {Outsourced Privacy-Preserving {C4.5} Algorithm over Arbitrarily Partitioned Databases}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {124--132}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.80}, doi = {10.1109/DSC.2017.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LiJWYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WangTHYW17, author = {Jingxuan Wang and Wenting Tu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Eric Ke Wang}, editor = {Kisung Lee and Ling Liu}, title = {Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2246--2251}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.25}, doi = {10.1109/ICDCS.2017.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WangTHYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangZHY17, author = {Jun Zhang and Linru Zhang and Meiqi He and Siu{-}Ming Yiu}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Privacy-Preserving Disease Risk Test Based on Bloom Filters}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {472--486}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_41}, doi = {10.1007/978-3-319-89500-0\_41}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhangZHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisa/CuiHHYZW17, author = {Xingmin Cui and Ruiyi He and Lucas C. K. Hui and Siu{-}Ming Yiu and Gang Zhou and Eric Ke Wang}, editor = {Kuinam Kim and Nikolai Joukov}, title = {Reconstruction of Task Lists from Android Applications}, booktitle = {Information Science and Applications 2017 - {ICISA} 2017, Macau, China, 20-23 March 2017}, series = {Lecture Notes in Electrical Engineering}, volume = {424}, pages = {396--403}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-4154-9\_46}, doi = {10.1007/978-981-10-4154-9\_46}, timestamp = {Wed, 05 Jun 2019 13:59:26 +0200}, biburl = {https://dblp.org/rec/conf/icisa/CuiHHYZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/FangLXJYYWHL17, author = {Junbin Fang and Sijin Li and Guikai Xi and Zoe Lin Jiang and Siu{-}Ming Yiu and Liyang Yu and Xuan Wang and Qi Han and Qiong Li}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Semantic Video Carving Using Perceptual Hashing and Optical Flow}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {223--244}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_13}, doi = {10.1007/978-3-319-67208-3\_13}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/FangLXJYYWHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/LiuZSXXY17, author = {Chang Liu and Lingwu Zeng and Junzheng Shi and Fei Xu and Gang Xiong and Siu{-}Ming Yiu}, title = {Auto-identification of background traffic based on autonomous periodic interaction}, booktitle = {36th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2017, San Diego, CA, USA, December 10-12, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PCCC.2017.8280479}, doi = {10.1109/PCCC.2017.8280479}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/LiuZSXXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/XuPCLXGY17, author = {Fei Xu and Haiqing Pan and Zigang Cao and Zhen Li and Gang Xiong and Yangyang Guan and Siu{-}Ming Yiu}, title = {Identifying malware with {HTTP} content type inconsistency via header-payload comparison}, booktitle = {36th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2017, San Diego, CA, USA, December 10-12, 2017}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PCCC.2017.8280450}, doi = {10.1109/PCCC.2017.8280450}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/XuPCLXGY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbra/ChangCYH17, author = {Kuang{-}Yu Chang and Yun Cui and Siu{-}Ming Yiu and Wing{-}Kai Hon}, editor = {Zhipeng Cai and Ovidiu Daescu and Min Li}, title = {Reconstructing One-Articulated Networks with Distance Matrices}, booktitle = {Bioinformatics Research and Applications - 13th International Symposium, {ISBRA} 2017, Honolulu, HI, USA, May 29 - June 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10330}, pages = {34--45}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59575-7\_4}, doi = {10.1007/978-3-319-59575-7\_4}, timestamp = {Thu, 20 Aug 2020 15:58:55 +0200}, biburl = {https://dblp.org/rec/conf/isbra/ChangCYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiJWYF17, author = {Ye Li and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Jun{-}bin Fang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {525--538}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_31}, doi = {10.1007/978-3-319-72359-4\_31}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiJWYF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwbbio/ShiHLLZY17, author = {Jianyu Shi and Hua Huang and Jia{-}Xin Li and Peng Lei and Yan{-}Ning Zhang and Siu{-}Ming Yiu}, editor = {Ignacio Rojas and Francisco M. Ortu{\~{n}}o Guzman}, title = {Predicting Comprehensive Drug-Drug Interactions for New Drugs via Triple Matrix Factorization}, booktitle = {Bioinformatics and Biomedical Engineering - 5th International Work-Conference, {IWBBIO} 2017, Granada, Spain, April 26-28, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10208}, pages = {108--117}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56148-6\_9}, doi = {10.1007/978-3-319-56148-6\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iwbbio/ShiHLLZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ksem/LiangZLYY17, author = {Yuzhi Liang and Jia Zhu and Yupeng Li and Min Yang and Siu{-}Ming Yiu}, editor = {Gang Li and Yong Ge and Zili Zhang and Zhi Jin and Michael Blumenstein}, title = {Relevant Fact Selection for {QA} via Sequence Labeling}, booktitle = {Knowledge Science, Engineering and Management - 10th International Conference, {KSEM} 2017, Melbourne, VIC, Australia, August 19-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10412}, pages = {399--409}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63558-3\_34}, doi = {10.1007/978-3-319-63558-3\_34}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ksem/LiangZLYY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ZengYZKA17, author = {Gongxian Zeng and Siu{-}Ming Yiu and Jun Zhang and Hiroki Kuzuno and Man Ho Au}, title = {A Nonoutsourceable Puzzle Under {GHOST} Rule}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {35--43}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00015}, doi = {10.1109/PST.2017.00015}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ZengYZKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HeZZY17, author = {Meiqi He and Jun Zhang and Gongxian Zeng and Siu{-}Ming Yiu}, title = {A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {293--302}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00042}, doi = {10.1109/PST.2017.00042}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/HeZZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangHYYLJ17, author = {Ruoqing Zhang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Xiaoqi Yu and Zechao Liu and Zoe Lin Jiang}, title = {A Traceable Outsourcing {CP-ABE} Scheme with Attribute Revocation}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {363--370}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.259}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.259}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangHYYLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiJWYZ17, author = {Ye Li and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Peng Zhang}, title = {Outsourcing Privacy Preserving {ID3} Decision Tree Algorithm over Encrypted Data-sets for Two-Parties}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1070--1075}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.354}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.354}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiJWYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/17/FangJLYHC17, author = {Junbin Fang and Zoe Lin Jiang and Sijin Li and Siu{-}Ming Yiu and Lucas C. K. Hui and Kam{-}Pui Chow}, editor = {Man Ho Allen Au and Kim{-}Kwang Raymond Choo}, title = {Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone}, booktitle = {Mobile Security and Privacy - Advances, Challenges and Future Research Directions}, pages = {205--216}, publisher = {Elsevier}, year = {2017}, url = {https://doi.org/10.1016/b978-0-12-804629-6.00009-2}, doi = {10.1016/B978-0-12-804629-6.00009-2}, timestamp = {Tue, 15 Dec 2020 17:00:09 +0100}, biburl = {https://dblp.org/rec/books/el/17/FangJLYHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZCYCL17, author = {Linru Zhang and Gongxian Zeng and Yuechen Chen and Siu{-}Ming Yiu and Nairen Cao and Zheli Liu}, title = {Constant bandwidth {ORAM} with small block size using {PIR} operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {590}, year = {2017}, url = {http://eprint.iacr.org/2017/590}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZCYCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/JanssonSVY16, author = {Jesper Jansson and Wing{-}Kin Sung and Hoa Vu and Siu{-}Ming Yiu}, title = {Faster Algorithms for Computing the R* Consensus Tree}, journal = {Algorithmica}, volume = {76}, number = {4}, pages = {1224--1244}, year = {2016}, url = {https://doi.org/10.1007/s00453-016-0122-2}, doi = {10.1007/S00453-016-0122-2}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/JanssonSVY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/XuCSYH16, author = {Chengcheng Xu and Shuhui Chen and Jinshu Su and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, title = {A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {18}, number = {4}, pages = {2991--3029}, year = {2016}, url = {https://doi.org/10.1109/COMST.2016.2566669}, doi = {10.1109/COMST.2016.2566669}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/XuCSYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TangFCYXFL016, author = {Yanbin Tang and Junbin Fang and Kam{-}Pui Chow and Siu{-}Ming Yiu and Jun Xu and Bo Feng and Qiong Li and Qi Han}, title = {Recovery of heavily fragmented {JPEG} files}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S108--S117}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.016}, doi = {10.1016/J.DIIN.2016.04.016}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TangFCYXFL016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/YuWHNYFW16, author = {Liyang Yu and Huanran Wang and Qi Han and Xiamu Niu and Siu{-}Ming Yiu and Jun{-}bin Fang and Zhifang Wang}, title = {Exposing frame deletion by detecting abrupt changes in video streams}, journal = {Neurocomputing}, volume = {205}, pages = {84--91}, year = {2016}, url = {https://doi.org/10.1016/j.neucom.2016.03.051}, doi = {10.1016/J.NEUCOM.2016.03.051}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/YuWHNYFW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuHY16, author = {Changhui Hu and Lidong Han and Siu{-}Ming Yiu}, title = {Efficient and secure multi-functional searchable symmetric encryption schemes}, journal = {Secur. Commun. Networks}, volume = {9}, number = {1}, pages = {34--42}, year = {2016}, url = {https://doi.org/10.1002/sec.1376}, doi = {10.1002/SEC.1376}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangHYCWF16, author = {Jingxuan Wang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Xingmin Cui and Eric Ke Wang and Jun{-}bin Fang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {40--56}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_3}, doi = {10.1007/978-3-319-40253-6\_3}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangHYCWF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/YaoLTYWL16, author = {Haobin Yao and Tak Wah Lam and Hing{-}Fung Ting and Siu{-}Ming Yiu and Yadong Wang and Bo Liu}, editor = {Tianhai Tian and Qinghua Jiang and Yunlong Liu and Kevin Burrage and Jiangning Song and Yadong Wang and Xiaohua Hu and Shinichi Morishita and Qian Zhu and Guohua Wang}, title = {Accurate annotation of metagenomic data without species-level references}, booktitle = {{IEEE} International Conference on Bioinformatics and Biomedicine, {BIBM} 2016, Shenzhen, China, December 15-18, 2016}, pages = {59--64}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BIBM.2016.7822493}, doi = {10.1109/BIBM.2016.7822493}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibm/YaoLTYWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/ShiGSY16, author = {Jianyu Shi and Ke Gao and Xue{-}Qun Shang and Siu{-}Ming Yiu}, editor = {Tianhai Tian and Qinghua Jiang and Yunlong Liu and Kevin Burrage and Jiangning Song and Yadong Wang and Xiaohua Hu and Shinichi Morishita and Qian Zhu and Guohua Wang}, title = {{LCM-DS:} {A} novel approach of predicting drug-drug interactions for new drugs via Dempster-Shafer theory of evidence}, booktitle = {{IEEE} International Conference on Bioinformatics and Biomedicine, {BIBM} 2016, Shenzhen, China, December 15-18, 2016}, pages = {512--515}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BIBM.2016.7822571}, doi = {10.1109/BIBM.2016.7822571}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibm/ShiGSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TanJWYFLJH16, author = {Chuting Tan and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Jun{-}bin Fang and Jin Li and Yabin Jin and Jiajun Huang}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Generic Construction of Publicly Verifiable Predicate Encryption}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {889--894}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897919}, doi = {10.1145/2897845.2897919}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TanJWYFLJH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcomp/JiangZLYHWF16, author = {Zoe Lin Jiang and Ruoqing Zhang and Zechao Liu and Siu{-}Ming Yiu and Lucas C. K. Hui and Xuan Wang and Junbin Fang}, editor = {Jiafu Wan and Kai Lin and Delu Zeng and Jin Li and Yang Xiang and Xiaofeng Liao and Jiwu Huang and Zheli Liu}, title = {A Revocable Outsourcing Attribute-Based Encryption Scheme}, booktitle = {Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, {SPNCE} 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {197}, pages = {145--161}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-69605-8\_14}, doi = {10.1007/978-3-319-69605-8\_14}, timestamp = {Sat, 29 Aug 2020 18:19:26 +0200}, biburl = {https://dblp.org/rec/conf/cloudcomp/JiangZLYHWF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuCZY16, author = {Xiaoqi Yu and Nairen Cao and Jun Zhang and Siu{-}Ming Yiu}, title = {Dynamic Proofs of Retrievability with improved worst case overhead}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {576--580}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860551}, doi = {10.1109/CNS.2016.7860551}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuCZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbra/LiMLKXYCY16, author = {Menglu Li and Angel C. Y. Mak and Ernest T. Lam and Pui{-}Yan Kwok and Ming Xiao and Kevin Y. Yip and Ting{-}Fung Chan and Siu{-}Ming Yiu}, editor = {Anu G. Bourgeois and Pavel Skums and Xiang Wan and Alex Zelikovsky}, title = {Towards a More Accurate Error Model for BioNano Optical Maps}, booktitle = {Bioinformatics Research and Applications - 12th International Symposium, {ISBRA} 2016, Minsk, Belarus, June 5-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9683}, pages = {67--79}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-38782-6\_6}, doi = {10.1007/978-3-319-38782-6\_6}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbra/LiMLKXYCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuJWYZZ16, author = {Zechao Liu and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Chunkai Zhang and Xiaomeng Zhao}, title = {Dynamic Attribute-Based Access Control in Cloud Storage Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {129--137}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0055}, doi = {10.1109/TRUSTCOM.2016.0055}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuJWYZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YuCZZY16, author = {Xiaoqi Yu and Nairen Cao and Gongxian Zeng and Ruoqing Zhang and Siu{-}Ming Yiu}, editor = {Dooho Choi and Sylvain Guilley}, title = {{LRCRYPT:} Leakage-Resilient Cryptographic System (Design and Implementation)}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {233--244}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_20}, doi = {10.1007/978-3-319-56549-1\_20}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YuCZZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/algo/YiuC16, author = {Siu{-}Ming Yiu and Francis Y. L. Chin}, title = {Efficient Methods for Multiple Sequence Alignment with Guaranteed Error Bounds}, booktitle = {Encyclopedia of Algorithms}, pages = {621--624}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-2864-4\_123}, doi = {10.1007/978-1-4939-2864-4\_123}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/algo/YiuC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/algo/Yiu16, author = {Siu{-}Ming Yiu}, title = {Local Alignment (with Concave Gap Weights)}, booktitle = {Encyclopedia of Algorithms}, pages = {1126--1128}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-2864-4\_208}, doi = {10.1007/978-1-4939-2864-4\_208}, timestamp = {Tue, 09 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/algo/Yiu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FangCYCJYRT16, author = {Jun{-}bin Fang and Zhen Che and Xiaolong Yu and Zhe Chen and Zoe Lin Jiang and Siu{-}Ming Yiu and Kui Ren and Xiaoqing Tan}, title = {Capacity-achieving and Flicker-free {FEC} coding scheme for Dimmable Visible Light Communication Based on Polar Codes}, journal = {CoRR}, volume = {abs/1608.07202}, year = {2016}, url = {http://arxiv.org/abs/1608.07202}, eprinttype = {arXiv}, eprint = {1608.07202}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FangCYCJYRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangY16a, author = {Xin Wang and Siu{-}Ming Yiu}, title = {A multi-task learning model for malware classification with useful file access pattern from {API} call sequence}, journal = {CoRR}, volume = {abs/1610.05945}, year = {2016}, url = {http://arxiv.org/abs/1610.05945}, eprinttype = {arXiv}, eprint = {1610.05945}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WangY16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/ZhuLWCYQLZJLDZW15, author = {Xiao Zhu and Henry C. M. Leung and Rongjie Wang and Francis Y. L. Chin and Siu{-}Ming Yiu and Guangri Quan and Yajie Li and Rui Zhang and Qinghua Jiang and Bo Liu and Yucui Dong and Guohui Zhou and Yadong Wang}, title = {misFinder: identify mis-assemblies in an unbiased manner using reference and paired-end reads}, journal = {{BMC} Bioinform.}, volume = {16}, pages = {386:1--386:16}, year = {2015}, url = {https://doi.org/10.1186/s12859-015-0818-3}, doi = {10.1186/S12859-015-0818-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcbi/ZhuLWCYQLZJLDZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/ZhanYLYWT15, author = {Qing Zhan and Yongtao Ye and Tak Wah Lam and Siu{-}Ming Yiu and Yadong Wang and Hing{-}Fung Ting}, title = {Improving multiple sequence alignment by using better guide trees}, journal = {{BMC} Bioinform.}, volume = {16}, number = {{S-5}}, pages = {S4}, year = {2015}, url = {https://doi.org/10.1186/1471-2105-16-S5-S4}, doi = {10.1186/1471-2105-16-S5-S4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcbi/ZhanYLYWT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/SchonbachHYTR15, author = {Christian Sch{\"{o}}nbach and Paul Horton and Siu{-}Ming Yiu and Tin Wee Tan and Shoba Ranganathan}, title = {{GIW} and InCoB are advancing bioinformatics in the Asia-Pacific}, journal = {{BMC} Bioinform.}, volume = {16}, number = {{S18}}, pages = {I1}, year = {2015}, url = {https://doi.org/10.1186/1471-2105-16-s18-i1}, doi = {10.1186/1471-2105-16-S18-I1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcbi/SchonbachHYTR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbcb/HortonSRY15, author = {Paul Horton and Christian Sch{\"{o}}nbach and Shoba Ranganathan and Siu{-}Ming Yiu}, title = {Introduction to selected papers from GIW/InCoB 2015}, journal = {J. Bioinform. Comput. Biol.}, volume = {13}, number = {5}, pages = {1502003:1--1502003:2}, year = {2015}, url = {https://doi.org/10.1142/S0219720015020035}, doi = {10.1142/S0219720015020035}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbcb/HortonSRY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/LeungYC15, author = {Henry C. M. Leung and Siu{-}Ming Yiu and Francis Y. L. Chin}, title = {{IDBA-MTP:} {A} Hybrid Metatranscriptomic Assembler Based on Protein Information}, journal = {J. Comput. Biol.}, volume = {22}, number = {5}, pages = {367--376}, year = {2015}, url = {https://doi.org/10.1089/cmb.2014.0139}, doi = {10.1089/CMB.2014.0139}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcb/LeungYC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/HeWKCLYL15, author = {Zhian He and Wai Kit Wong and Ben Kao and David Wai{-}Lok Cheung and Rongbin Li and Siu{-}Ming Yiu and Eric Lo}, title = {{SDB:} {A} Secure Query Processing System with Data Interoperability}, journal = {Proc. {VLDB} Endow.}, volume = {8}, number = {12}, pages = {1876--1879}, year = {2015}, url = {http://www.vldb.org/pvldb/vol8/p1876-he.pdf}, doi = {10.14778/2824032.2824090}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/HeWKCLYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/YeCWYZLT15, author = {Yongtao Ye and David Wai{-}Lok Cheung and Yadong Wang and Siu{-}Ming Yiu and Qing Zhan and Tak Wah Lam and Hing{-}Fung Ting}, title = {GLProbs: Aligning Multiple Sequences Adaptively}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {12}, number = {1}, pages = {67--78}, year = {2015}, url = {https://doi.org/10.1109/TCBB.2014.2316820}, doi = {10.1109/TCBB.2014.2316820}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/YeCWYZLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChimYLHZ15, author = {Tat Wing Chim and Siu{-}Ming Yiu and Victor O. K. Li and Lucas Chi Kwong Hui and Jin Zhong}, title = {{PRGA:} Privacy-Preserving Recording {\&} Gateway-Assisted Authentication of Power Usage Information for Smart Grid}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {85--97}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2313861}, doi = {10.1109/TDSC.2014.2313861}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChimYLHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/ShiY15, author = {Jianyu Shi and Siu{-}Ming Yiu}, editor = {Jun Huan and Satoru Miyano and Amarda Shehu and Xiaohua Tony Hu and Bin Ma and Sanguthevar Rajasekaran and Vijay K. Gombar and Matthieu{-}P. Schapranow and Illhoi Yoo and Jiayu Zhou and Brian Chen and Vinay Pai and Brian G. Pierce}, title = {{SRP:} {A} concise non-parametric similarity-rank-based model for predicting drug-target interactions}, booktitle = {2015 {IEEE} International Conference on Bioinformatics and Biomedicine, {BIBM} 2015, Washington, DC, USA, November 9-12, 2015}, pages = {1636--1641}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/BIBM.2015.7359921}, doi = {10.1109/BIBM.2015.7359921}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibm/ShiY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuenZCY15, author = {Tsz Hon Yuen and Cong Zhang and Sherman S. M. Chow and Siu{-}Ming Yiu}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Related Randomness Attacks for Public Key Cryptosystems}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {215--223}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714622}, doi = {10.1145/2714576.2714622}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YuenZCY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dawak/LiangYY15, author = {Yuzhi Liang and Pengcheng Yin and Siu{-}Ming Yiu}, editor = {Sanjay Madria and Takahiro Hara}, title = {New Word Detection and Tagging on Chinese Twitter Stream}, booktitle = {Big Data Analytics and Knowledge Discovery - 17th International Conference, DaWaK 2015, Valencia, Spain, September 1-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9263}, pages = {310--321}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22729-0\_24}, doi = {10.1007/978-3-319-22729-0\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dawak/LiangYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WangHY15, author = {Jingxuan Wang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Data Framing Attacks against Nonlinear State Estimation in Smart Grid}, booktitle = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOMW.2015.7414067}, doi = {10.1109/GLOCOMW.2015.7414067}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WangHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CaoYYZY15, author = {Nairen Cao and Xiaoqi Yu and Yufang Yang and Linru Zhang and Siu{-}Ming Yiu}, editor = {Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu}, title = {An {ORAM} Scheme with Improved Worst-Case Computational Overhead}, booktitle = {Information and Communications Security - 17th International Conference, {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9543}, pages = {393--405}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29814-6\_33}, doi = {10.1007/978-3-319-29814-6\_33}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/CaoYYZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/TangTCYFNHW15, author = {Yanbin Tang and Zheng Tan and Kam{-}Pui Chow and Siu{-}Ming Yiu and Jun{-}bin Fang and Xiamu Niu and Qi Han and Xianyan Wu}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Fragmented {JPEG} File Recovery Using Pseudo Headers}, booktitle = {Advances in Digital Forensics {XI} - 11th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {462}, pages = {215--231}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24123-4\_13}, doi = {10.1007/978-3-319-24123-4\_13}, timestamp = {Sun, 25 Oct 2020 23:10:13 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/TangTCYFNHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbra/LiCYHTLTWY15, author = {Menglu Li and Micheal Cheng and Yongtao Ye and Wing{-}Kai Hon and Hing{-}Fung Ting and Tak Wah Lam and Cy Tang and Thomas Wong and Siu{-}Ming Yiu}, editor = {Robert W. Harrison and Yaohang Li and Ion I. Mandoiu}, title = {Predicting {RNA} Secondary Structures: One-grammar-fits-all Solution}, booktitle = {Bioinformatics Research and Applications - 11th International Symposium, {ISBRA} 2015, Norfolk, VA, USA, June 7-10, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9096}, pages = {211--222}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19048-8\_18}, doi = {10.1007/978-3-319-19048-8\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbra/LiCYHTLTWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangY15, author = {Zhiwei Wang and Siu{-}Ming Yiu}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {{CCA} Secure {PKE} with Auxiliary Input Security and Leakage Resiliency}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {319--335}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_18}, doi = {10.1007/978-3-319-23318-5\_18}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/LiuJYWTLLJF15, author = {Xiaoyan Liu and Zoe Lin Jiang and Siu{-}Ming Yiu and Xuan Wang and Chuting Tan and Ye Li and Zechao Liu and Yabin Jin and Jun{-}bin Fang}, title = {Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks}, booktitle = {11th International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2015, Shenzhen, China, December 16-18, 2015}, pages = {124--133}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MSN.2015.42}, doi = {10.1109/MSN.2015.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/LiuJYWTLLJF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/WangY15, author = {Zhiwei Wang and Siu{-}Ming Yiu}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Attribute-Based Encryption Resilient to Auxiliary Input}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {371--390}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_21}, doi = {10.1007/978-3-319-26059-4\_21}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/WangY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CuiWHXZY15, author = {Xingmin Cui and Jingxuan Wang and Lucas Chi Kwong Hui and Zhongwei Xie and Tian Zeng and Siu{-}Ming Yiu}, title = {WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {25:1--25:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766509}, doi = {10.1145/2766498.2766509}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CuiWHXZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2014, editor = {Lucas Chi Kwong Hui and S. H. Qing and Elaine Shi and Siu{-}Ming Yiu}, title = {Information and Communications Security - 16th International Conference, {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8958}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21966-0}, doi = {10.1007/978-3-319-21966-0}, isbn = {978-3-319-21965-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/HuWLCLYY14, author = {Xihao Hu and Thomas K. F. Wong and Zhi John Lu and Ting{-}Fung Chan and Terrence Chi{-}Kong Lau and Siu{-}Ming Yiu and Kevin Y. Yip}, title = {Computational identification of protein binding sites on RNAs using high-throughput {RNA} structure-probing data}, journal = {Bioinform.}, volume = {30}, number = {8}, pages = {1049--1055}, year = {2014}, url = {https://doi.org/10.1093/bioinformatics/btt757}, doi = {10.1093/BIOINFORMATICS/BTT757}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/HuWLCLYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcgenomics/WanguYC14, author = {Yi Wang and Henry Chi{-}Ming Leung and Siu{-}Ming Yiu and Francis Y. L. Chin}, title = {MetaCluster-TA: taxonomic annotation for metagenomic data based on assembly-assisted binning}, journal = {{BMC} Genom.}, volume = {15}, number = {{S-1}}, pages = {S12}, year = {2014}, url = {https://doi.org/10.1186/1471-2164-15-S1-S12}, doi = {10.1186/1471-2164-15-S1-S12}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcgenomics/WanguYC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LaiCHY14, author = {Pierre K. Y. Lai and Kam{-}Pui Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Modeling the initial stage of a file sharing process on a BitTorrent network}, journal = {Peer-to-Peer Netw. Appl.}, volume = {7}, number = {4}, pages = {311--319}, year = {2014}, url = {https://doi.org/10.1007/s12083-011-0118-2}, doi = {10.1007/S12083-011-0118-2}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LaiCHY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/FangJRLCLWNYH14, author = {Jun{-}bin Fang and Zoe Lin Jiang and Kexin Ren and Yunhan Luo and Zhe Chen and Weiping Liu and Xuan Wang and Xiamu Niu and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, title = {Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design}, journal = {Quantum Inf. Process.}, volume = {13}, number = {6}, pages = {1425--1435}, year = {2014}, url = {https://doi.org/10.1007/s11128-014-0737-7}, doi = {10.1007/S11128-014-0737-7}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/FangJRLCLWNYH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HeCHY14, author = {Yi Jun He and Patrick P. F. Chan and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {{UFLE:} a user-friendly location-free encryption system for mobile users}, journal = {Secur. Commun. Networks}, volume = {7}, number = {10}, pages = {1477--1487}, year = {2014}, url = {https://doi.org/10.1002/sec.615}, doi = {10.1002/SEC.615}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HeCHY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ChimYHL14, author = {Tat Wing Chim and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li}, title = {{VSPN:} VANET-Based Secure and Privacy-Preserving Navigation}, journal = {{IEEE} Trans. Computers}, volume = {63}, number = {2}, pages = {510--524}, year = {2014}, url = {https://doi.org/10.1109/TC.2012.188}, doi = {10.1109/TC.2012.188}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ChimYHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiYCHYQ14, author = {Xingmin Cui and Da Yu and Patrick P. F. Chan and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Sihan Qing}, editor = {Willy Susilo and Yi Mu}, title = {CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {446--453}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_31}, doi = {10.1007/978-3-319-08344-5\_31}, timestamp = {Thu, 14 Oct 2021 10:41:30 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CuiYCHYQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/ShiYLLC14, author = {Jianyu Shi and Siu{-}Ming Yiu and Yiming Li and Henry C. M. Leung and Francis Y. L. Chin}, editor = {Huiru Jane Zheng and Werner Dubitzky and Xiaohua Hu and Jin{-}Kao Hao and Daniel P. Berrar and Kwang{-}Hyun Cho and Yadong Wang and David R. Gilbert}, title = {Predicting drug-target interaction for new drugs using enhanced similarity measures and super-target clustering\({}^{\mbox{1}}\)}, booktitle = {2014 {IEEE} International Conference on Bioinformatics and Biomedicine, {BIBM} 2014, Belfast, United Kingdom, November 2-5, 2014}, pages = {45--50}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/BIBM.2014.6999125}, doi = {10.1109/BIBM.2014.6999125}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibm/ShiYLLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YuenZYL14, author = {Tsz Hon Yuen and Ye Zhang and Siu{-}Ming Yiu and Joseph K. Liu}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {130--147}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_8}, doi = {10.1007/978-3-319-11203-9\_8}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YuenZYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccve/YeungLCYLH14, author = {Cheuk Yu Yeung and W. C. Law and Tat Wing Chim and Siu{-}Ming Yiu and Victor O. K. Li and Lucas Chi Kwong Hui}, title = {Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner}, booktitle = {International Conference on Connected Vehicles and Expo, {ICCVE} 2014, Vienna, Austria, November 3-7, 2014}, pages = {804--809}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCVE.2014.7297663}, doi = {10.1109/ICCVE.2014.7297663}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/iccve/YeungLCYLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/YangLYCC14, author = {Jie Yang and Henry C. M. Leung and Siu{-}Ming Yiu and Yunpeng Cai and Francis Y. L. Chin}, editor = {Ravi Kumar and Hannu Toivonen and Jian Pei and Joshua Zhexue Huang and Xindong Wu}, title = {Learning Sparse Gaussian Bayesian Network Structure by Variable Grouping}, booktitle = {2014 {IEEE} International Conference on Data Mining, {ICDM} 2014, Shenzhen, China, December 14-17, 2014}, pages = {1073--1078}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDM.2014.126}, doi = {10.1109/ICDM.2014.126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/YangLYCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenJYLAW14, author = {Yuechen Chen and Zoe Lin Jiang and Siu{-}Ming Yiu and Joseph K. Liu and Man Ho Au and Xuan Wang}, editor = {Lucas Chi Kwong Hui and S. H. Qing and Elaine Shi and Siu{-}Ming Yiu}, title = {Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator}, booktitle = {Information and Communications Security - 16th International Conference, {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8958}, pages = {274--289}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-21966-0\_20}, doi = {10.1007/978-3-319-21966-0\_20}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChenJYLAW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChenXXYS14, author = {Xiaojun Chen and Fei Xu and Rui Xu and Siu{-}Ming Yiu and Jinqiao Shi}, title = {A practical real-time authentication system with Identity Tracking based on mouse dynamics}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {121--122}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849185}, doi = {10.1109/INFCOMW.2014.6849185}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ChenXXYS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/JanssonSVY14, author = {Jesper Jansson and Wing{-}Kin Sung and Hoa Vu and Siu{-}Ming Yiu}, editor = {Hee{-}Kap Ahn and Chan{-}Su Shin}, title = {Faster Algorithms for Computing the R* Consensus Tree}, booktitle = {Algorithms and Computation - 25th International Symposium, {ISAAC} 2014, Jeonju, Korea, December 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8889}, pages = {414--425}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13075-0\_33}, doi = {10.1007/978-3-319-13075-0\_33}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isaac/JanssonSVY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ChanHY14, author = {Dan T. F. Chan and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Assessing cryptographic signature schemes from a legal perspective}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {322--329}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890955}, doi = {10.1109/PST.2014.6890955}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ChanHY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recomb/LeungYC14, author = {Henry C. M. Leung and Siu{-}Ming Yiu and Francis Y. L. Chin}, editor = {Roded Sharan}, title = {{IDBA-MTP:} {A} Hybrid MetaTranscriptomic Assembler Based on Protein Information}, booktitle = {Research in Computational Molecular Biology - 18th Annual International Conference, {RECOMB} 2014, Pittsburgh, PA, USA, April 2-5, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8394}, pages = {160--172}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05269-4\_12}, doi = {10.1007/978-3-319-05269-4\_12}, timestamp = {Mon, 13 May 2019 09:30:09 +0200}, biburl = {https://dblp.org/rec/conf/recomb/LeungYC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/WongKCLY14, author = {Wai Kit Wong and Ben Kao and David Wai{-}Lok Cheung and Rongbin Li and Siu{-}Ming Yiu}, editor = {Curtis E. Dyreson and Feifei Li and M. Tamer {\"{O}}zsu}, title = {Secure query processing with data interoperability in a cloud database environment}, booktitle = {International Conference on Management of Data, {SIGMOD} 2014, Snowbird, UT, USA, June 22-27, 2014}, pages = {1395--1406}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2588555.2588572}, doi = {10.1145/2588555.2588572}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/WongKCLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2014, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0}, doi = {10.1007/978-3-319-13257-0}, isbn = {978-3-319-13256-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2014, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9}, doi = {10.1007/978-3-319-12475-9}, isbn = {978-3-319-12474-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuenCZY14, author = {Tsz Hon Yuen and Sherman S. M. Chow and Cong Zhang and Siu{-}Ming Yiu}, title = {Exponent-inversion Signatures and {IBE} under Static Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2014}, url = {http://eprint.iacr.org/2014/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuenCZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ChimYHL13, author = {Tat Wing Chim and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li}, title = {VANET-based secure taxi service}, journal = {Ad Hoc Networks}, volume = {11}, number = {8}, pages = {2381--2390}, year = {2013}, url = {https://doi.org/10.1016/j.adhoc.2013.06.003}, doi = {10.1016/J.ADHOC.2013.06.003}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ChimYHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/PengLYLZC13, author = {Yu Peng and Henry C. M. Leung and Siu{-}Ming Yiu and Ming{-}Ju Lv and Xin{-}Guang Zhu and Francis Y. L. Chin}, title = {IDBA-tran: a more robust de novo de Bruijn graph assembler for transcriptomes with uneven expression levels}, journal = {Bioinform.}, volume = {29}, number = {13}, pages = {326--334}, year = {2013}, url = {https://doi.org/10.1093/bioinformatics/btt219}, doi = {10.1093/BIOINFORMATICS/BTT219}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/PengLYLZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/WuZHHCWLPY13, author = {Jikun Wu and Wenqian Zhang and Songbo Huang and Zengquan He and Yanbing Cheng and Jun Wang and Tak Wah Lam and Zhiyu Peng and Siu{-}Ming Yiu}, title = {SOAPfusion: a robust and effective computational fusion discovery tool for RNA-seq reads}, journal = {Bioinform.}, volume = {29}, number = {23}, pages = {2971--2978}, year = {2013}, url = {https://doi.org/10.1093/bioinformatics/btt522}, doi = {10.1093/BIOINFORMATICS/BTT522}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/WuZHHCWLPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SongWYJN13, author = {Xianhua Song and Shen Wang and Siu{-}Ming Yiu and Lin Jiang and Xiamu Niu}, title = {Detection of Image Region Duplication Using Spin Image}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {96-D}, number = {7}, pages = {1565--1568}, year = {2013}, url = {https://doi.org/10.1587/transinf.E96.D.1565}, doi = {10.1587/TRANSINF.E96.D.1565}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SongWYJN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/YeWLCHY13, author = {Yunming Ye and Qingyao Wu and Yan Li and Kam{-}Pui Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Unknown Chinese word extraction based on variety of overlapping strings}, journal = {Inf. Process. Manag.}, volume = {49}, number = {2}, pages = {497--512}, year = {2013}, url = {https://doi.org/10.1016/j.ipm.2012.09.004}, doi = {10.1016/J.IPM.2012.09.004}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/YeWLCHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/LeungYPC13, author = {Henry C. M. Leung and Siu{-}Ming Yiu and John Parkinson and Francis Y. L. Chin}, title = {{IDBA-MT:} \emph{De Novo} Assembler for Metatranscriptomic Data Generated from Next-Generation Sequencing Technology}, journal = {J. Comput. Biol.}, volume = {20}, number = {7}, pages = {540--550}, year = {2013}, url = {https://doi.org/10.1089/cmb.2013.0042}, doi = {10.1089/CMB.2013.0042}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcb/LeungYPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HouSUY13, author = {Shuhui Hou and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara and Siu{-}Ming Yiu}, title = {Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {104--113}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.104}, doi = {10.22667/JOWUA.2013.06.31.104}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HouSUY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/ZhangWYMC13, author = {Ye Zhang and Wai Kit Wong and Siu{-}Ming Yiu and Nikos Mamoulis and David W. Cheung}, title = {Lightweight Privacy-Preserving Peer-to-Peer Data Integration}, journal = {Proc. {VLDB} Endow.}, volume = {6}, number = {3}, pages = {157--168}, year = {2013}, url = {http://www.vldb.org/pvldb/vol6/p157-zhang.pdf}, doi = {10.14778/2535569.2448950}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/ZhangWYMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ChinLY13, author = {Francis Y. L. Chin and Henry C. M. Leung and Siu{-}Ming Yiu}, title = {Non-adaptive complex group testing with multiple positive sets}, journal = {Theor. Comput. Sci.}, volume = {505}, pages = {11--18}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2013.04.011}, doi = {10.1016/J.TCS.2013.04.011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ChinLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChanHY13, author = {Patrick P. F. Chan and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Heap Graph Based Software Theft Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {1}, pages = {101--110}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2012.2223685}, doi = {10.1109/TIFS.2012.2223685}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChanHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangFLLIKCHYP13, author = {Zoe Lin Jiang and Jun{-}bin Fang and Frank Y. W. Law and Pierre K. Y. Lai and Ricci S. C. Ieong and Michael Y. K. Kwan and Kam{-}Pui Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kevin K. H. Pun}, title = {Maintaining Hard Disk Integrity With Digital Legal Professional Privilege {(LPP)} Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {5}, pages = {821--828}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2256784}, doi = {10.1109/TIFS.2013.2256784}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangFLLIKCHYP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcb/YeCWYZLT13, author = {Yongtao Ye and David W. Cheung and Yadong Wang and Siu{-}Ming Yiu and Qing Zhan and Tak Wah Lam and Hing{-}Fung Ting}, editor = {Jing Gao}, title = {GLProbs: Aligning multiple sequences adaptively}, booktitle = {{ACM} Conference on Bioinformatics, Computational Biology and Biomedical Informatics. {ACM-BCB} 2013, Washington, DC, USA, September 22-25, 2013}, pages = {152}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2506583.2506611}, doi = {10.1145/2506583.2506611}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bcb/YeCWYZLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcb/ZhuLCYQLW13, author = {Xiao Zhu and Henry C. M. Leung and Francis Y. L. Chin and Siu{-}Ming Yiu and Guangri Quan and Bo Liu and Yadong Wang}, editor = {Jing Gao}, title = {{PERGA:} {A} Paired-End Read Guided De Novo Assembler for Extending Contigs Using {SVM} Approach}, booktitle = {{ACM} Conference on Bioinformatics, Computational Biology and Biomedical Informatics. {ACM-BCB} 2013, Washington, DC, USA, September 22-25, 2013}, pages = {161}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2506583.2506612}, doi = {10.1145/2506583.2506612}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bcb/ZhuLCYQLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/YangLYCC13, author = {Jie Yang and Henry C. M. Leung and Siu{-}Ming Yiu and Yunpeng Cai and Francis Y. L. Chin}, editor = {Guo{-}Zheng Li and Sunghoon Kim and Michael Hughes and Geoffrey J. McLachlan and Hongye Sun and Xiaohua Hu and Habtom W. Ressom and Baoyan Liu and Michael N. Liebman}, title = {Intra- and inter-sparse multiple output regression with application on environmental microbial community study}, booktitle = {2013 {IEEE} International Conference on Bioinformatics and Biomedicine, Shanghai, China, December 18-21, 2013}, pages = {404--409}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/BIBM.2013.6732526}, doi = {10.1109/BIBM.2013.6732526}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibm/YangLYCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiongYZYH13, author = {Hao Xiong and Tsz Hon Yuen and Cong Zhang and Siu{-}Ming Yiu and Yi Jun He}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {Leakage-resilient certificateless public key encryption}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {13--22}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484394}, doi = {10.1145/2484389.2484394}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XiongYZYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYXCYH13, author = {Cong Zhang and Tsz Hon Yuen and Hao Xiong and Sherman S. M. Chow and Siu{-}Ming Yiu and Yi Jun He}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Multi-key leakage-resilient threshold cryptography}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {61--70}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484321}, doi = {10.1145/2484313.2484321}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYXCYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/LiangCHFYH13, author = {Y. Liang and Kam{-}Pui Chow and Lucas Chi Kwong Hui and Jun{-}bin Fang and Siu{-}Ming Yiu and Shuhui Hou}, title = {Towards a Better Similarity Measure for Keyword Profiling via Clustering}, booktitle = {{IEEE} 37th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2013, Kyoto, Japan, July 22-26, 2013}, pages = {16--20}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/COMPSACW.2013.19}, doi = {10.1109/COMPSACW.2013.19}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/LiangCHFYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccve/ChimYYLH13, author = {Tat Wing Chim and Siu{-}Ming Yiu and Cheuk Yu Yeung and Victor O. K. Li and Lucas C. K. Hui}, title = {Secure, privacy-preserving, distributed motor vehicle event data recorder}, booktitle = {International Conference on Connected Vehicles and Expo, {ICCVE} 2012, Las Vegas, NV, USA, December 2-6, 2013}, pages = {337--342}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICCVE.2013.6799817}, doi = {10.1109/ICCVE.2013.6799817}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/iccve/ChimYYLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/HouSUY13, author = {Shuhui Hou and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara and Siu{-}Ming Yiu}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {312--317}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_33}, doi = {10.1007/978-3-642-36818-9\_33}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict-eurasia/HouSUY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbra/VuCHLSSY13, author = {Hoa Vu and Francis Y. L. Chin and Wing{-}Kai Hon and Henry C. M. Leung and Kunihiko Sadakane and Ken Wing{-}Kin Sung and Siu{-}Ming Yiu}, editor = {Zhipeng Cai and Oliver Eulenstein and Daniel Janies and Daniel Schwartz}, title = {Reconstructing \emph{k}-Reticulated Phylogenetic Network from a Set of Gene Trees}, booktitle = {Bioinformatics Research and Applications, 9th International Symposium, {ISBRA} 2013, Charlotte, NC, USA, May 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7875}, pages = {112--124}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38036-5\_14}, doi = {10.1007/978-3-642-38036-5\_14}, timestamp = {Thu, 20 Aug 2020 15:56:19 +0200}, biburl = {https://dblp.org/rec/conf/isbra/VuCHLSSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbra/LiuCTLY13, author = {Xuan Liu and David Wai{-}Lok Cheung and Hing{-}Fung Ting and Tak Wah Lam and Siu{-}Ming Yiu}, editor = {Zhipeng Cai and Oliver Eulenstein and Daniel Janies and Daniel Schwartz}, title = {LCR{\_}Finder: {A} de Novo Low Copy Repeat Finder for Human Genome}, booktitle = {Bioinformatics Research and Applications, 9th International Symposium, {ISBRA} 2013, Charlotte, NC, USA, May 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7875}, pages = {125--136}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38036-5\_15}, doi = {10.1007/978-3-642-38036-5\_15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isbra/LiuCTLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XiongYZHY13, author = {Hao Xiong and Tsz Hon Yuen and Cong Zhang and Yi Jun He and Siu{-}Ming Yiu}, editor = {Robert H. Deng and Tao Feng}, title = {Attribute Specified Identity-Based Encryption}, booktitle = {Information Security Practice and Experience - 9th International Conference, {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7863}, pages = {60--74}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38033-4\_5}, doi = {10.1007/978-3-642-38033-4\_5}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/XiongYZHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/XiongYHY13, author = {Hao Xiong and Xiaoqi Yu and Yi Jun He and Siu{-}Ming Yiu}, editor = {James J. Park and Joseph Kee{-}Yin Ng and Hwa{-}Young Jeong and Agustinus Borgy Waluyo}, title = {Improved Composite Order Bilinear Pairing on Graphics Hardware}, booktitle = {Multimedia and Ubiquitous Engineering, {MUE} 2013, May 9-11, 2013, Seoul, Korea}, series = {Lecture Notes in Electrical Engineering}, volume = {240}, pages = {731--737}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6738-6\_90}, doi = {10.1007/978-94-007-6738-6\_90}, timestamp = {Wed, 14 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mue/XiongYHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prib/HsuWHLLY13, author = {Bay{-}Yuan Hsu and Thomas K. F. Wong and Wing{-}Kai Hon and Xinyi Liu and Tak Wah Lam and Siu{-}Ming Yiu}, editor = {Alioune Ngom and Enrico Formenti and Jin{-}Kao Hao and Xing{-}Ming Zhao and Twan van Laarhoven}, title = {A Local Structural Prediction Algorithm for {RNA} Triple Helix Structure}, booktitle = {Pattern Recognition in Bioinformatics - 8th {IAPR} International Conference, {PRIB} 2013, Nice, France, June 17-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7986}, pages = {102--113}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39159-0\_10}, doi = {10.1007/978-3-642-39159-0\_10}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/prib/HsuWHLLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/ZhouTFJCYHXMHX13, author = {Gang Zhou and Yanbin Tang and Jun{-}bin Fang and Zoe Lin Jiang and Kam{-}Pui Chow and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Rongsheng Xu and Yonghao Mai and Shuhui Hou and Fei Xu}, editor = {Kui Ren and Xue Liu and Weifa Liang and Ming Xu and Xiaohua Jia and Kai Xing}, title = {Photo Forensics on Shanzhai Mobile Phone}, booktitle = {Wireless Algorithms, Systems, and Applications - 8th International Conference, {WASA} 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7992}, pages = {454--464}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39701-1\_37}, doi = {10.1007/978-3-642-39701-1\_37}, timestamp = {Mon, 01 May 2023 19:52:19 +0200}, biburl = {https://dblp.org/rec/conf/wasa/ZhouTFJCYHXMHX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuenZY13, author = {Tsz Hon Yuen and Ye Zhang and Siu{-}Ming Yiu}, title = {Encryption Schemes with Post-Challenge Auxiliary Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2013}, url = {http://eprint.iacr.org/2013/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuenZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ChimYHL12, author = {Tat Wing Chim and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li}, title = {{MLAS:} Multiple level authentication scheme for VANETs}, journal = {Ad Hoc Networks}, volume = {10}, number = {7}, pages = {1445--1456}, year = {2012}, url = {https://doi.org/10.1016/j.adhoc.2012.03.020}, doi = {10.1016/J.ADHOC.2012.03.020}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ChimYHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/LiuWWLYLWYCZLL12, author = {Chi{-}Man Liu and Thomas K. F. Wong and Edward Wu and Ruibang Luo and Siu{-}Ming Yiu and Yingrui Li and Bingqiang Wang and Chang Yu and Xiaowen Chu and Kaiyong Zhao and Ruiqiang Li and Tak Wah Lam}, title = {{SOAP3:} ultra-fast GPU-based parallel alignment tool for short reads}, journal = {Bioinform.}, volume = {28}, number = {6}, pages = {878--879}, year = {2012}, url = {https://doi.org/10.1093/bioinformatics/bts061}, doi = {10.1093/BIOINFORMATICS/BTS061}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bioinformatics/LiuWWLYLWYCZLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/PengLYC12, author = {Yu Peng and Henry C. M. Leung and Siu{-}Ming Yiu and Francis Y. L. Chin}, title = {{IDBA-UD:} a \emph{de novo} assembler for single-cell and metagenomic sequencing data with highly uneven depth}, journal = {Bioinform.}, volume = {28}, number = {11}, pages = {1420--1428}, year = {2012}, url = {https://doi.org/10.1093/bioinformatics/bts174}, doi = {10.1093/BIOINFORMATICS/BTS174}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/PengLYC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/WangLYC12, author = {Yi Wang and Henry C. M. Leung and Siu{-}Ming Yiu and Francis Y. L. Chin}, title = {MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample}, journal = {Bioinform.}, volume = {28}, number = {18}, pages = {356--362}, year = {2012}, url = {https://doi.org/10.1093/bioinformatics/bts397}, doi = {10.1093/BIOINFORMATICS/BTS397}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/WangLYC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/LiuYYLXCSZLLL12, author = {Binghang Liu and Jianying Yuan and Siu{-}Ming Yiu and Zhenyu Li and Yinlong Xie and Yanxiang Chen and Yujian Shi and Hao Zhang and Yingrui Li and Tak Wah Lam and Ruibang Luo}, title = {{COPE:} an accurate \emph{k}-mer-based pair-end reads connection tool to facilitate genome assembly}, journal = {Bioinform.}, volume = {28}, number = {22}, pages = {2870--2874}, year = {2012}, url = {https://doi.org/10.1093/bioinformatics/bts563}, doi = {10.1093/BIOINFORMATICS/BTS563}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/LiuYYLXCSZLLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ChimYHL12, author = {Tat Wing Chim and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li}, title = {Privacy-preserving advance power reservation}, journal = {{IEEE} Commun. Mag.}, volume = {50}, number = {8}, pages = {18--23}, year = {2012}, url = {https://doi.org/10.1109/MCOM.2012.6257522}, doi = {10.1109/MCOM.2012.6257522}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ChimYHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HuCYHL12, author = {Changhui Hu and Tat Wing Chim and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li}, title = {Efficient HMAC-based secure communication for VANETs}, journal = {Comput. Networks}, volume = {56}, number = {9}, pages = {2292--2303}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2012.04.002}, doi = {10.1016/J.COMNET.2012.04.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HuCYHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/WangLYC12, author = {Yi Wang and Henry C. M. Leung and Siu{-}Ming Yiu and Francis Y. L. Chin}, title = {MetaCluster 4.0: {A} Novel Binning Algorithm for {NGS} Reads and Huge Number of Species}, journal = {J. Comput. Biol.}, volume = {19}, number = {2}, pages = {241--249}, year = {2012}, url = {https://doi.org/10.1089/cmb.2011.0276}, doi = {10.1089/CMB.2011.0276}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcb/WangLYC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/WongY12, author = {Thomas K. F. Wong and Siu{-}Ming Yiu}, title = {Structural Alignment of {RNA} with Triple Helix Structure}, journal = {J. Comput. Biol.}, volume = {19}, number = {4}, pages = {365--378}, year = {2012}, url = {https://doi.org/10.1089/cmb.2010.0052}, doi = {10.1089/CMB.2010.0052}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcb/WongY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisec/ChimCYHL12, author = {Tat Wing Chim and Jeanno Chin Long Cheung and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li}, title = {{SPCS:} Secure and Privacy-Preserving Charging-Station Searching using {VANET}}, journal = {J. Information Security}, volume = {3}, number = {1}, pages = {59--67}, year = {2012}, url = {https://doi.org/10.4236/jis.2012.31007}, doi = {10.4236/JIS.2012.31007}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisec/ChimCYHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/WongCLY12, author = {Thomas K. F. Wong and Y. S. Chiu and Tak Wah Lam and Siu{-}Ming Yiu}, title = {Memory Efficient Algorithms for Structural Alignment of RNAs with Pseudoknots}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {9}, number = {1}, pages = {161--168}, year = {2012}, url = {https://doi.org/10.1109/TCBB.2011.66}, doi = {10.1109/TCBB.2011.66}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/WongCLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/MaWLHSY12, author = {Christopher Ma and Thomas K. F. Wong and Tak Wah Lam and Wing{-}Kai Hon and Kunihiko Sadakane and Siu{-}Ming Yiu}, title = {An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {9}, number = {6}, pages = {1629--1638}, year = {2012}, url = {https://doi.org/10.1109/TCBB.2012.104}, doi = {10.1109/TCBB.2012.104}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/MaWLHSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuenYH12, author = {Tsz Hon Yuen and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Fully Leakage-Resilient Signatures with Auxiliary Inputs}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {294--307}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_22}, doi = {10.1007/978-3-642-31448-3\_22}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuenYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChowHHY12, author = {Sherman S. M. Chow and Yi Jun He and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {{SPICE} - Simple Privacy-Preserving Identity-Management for Cloud Environment}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {526--543}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_31}, doi = {10.1007/978-3-642-31284-7\_31}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChowHHY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcb/LuoYLLWYLT12, author = {Ruibang Luo and Chang Yu and Chi{-}Man Liu and Tak Wah Lam and Thomas K. F. Wong and Siu{-}Ming Yiu and Ruiqiang Li and Hing{-}Fung Ting}, editor = {Sanjay Ranka and Tamer Kahveci and Mona Singh}, title = {Efficient SNP-sensitive alignment and database-assisted {SNP} calling for low coverage samples}, booktitle = {{ACM} International Conference on Bioinformatics, Computational Biology and Biomedicine, BCB' 12, Orlando, FL, {USA} - October 08 - 10, 2012}, pages = {163--169}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382936.2382957}, doi = {10.1145/2382936.2382957}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bcb/LuoYLLWYLT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YuYCYH12, author = {Kin Ying Yu and Tsz Hon Yuen and Sherman S. M. Chow and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {{PE(AR)2:} Privacy-Enhanced Anonymous Authentication with Reputation and Revocation}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {679--696}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_39}, doi = {10.1007/978-3-642-33167-1\_39}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/YuYCYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/YuenCZY12, author = {Tsz Hon Yuen and Sherman S. M. Chow and Ye Zhang and Siu{-}Ming Yiu}, editor = {David Pointcheval and Thomas Johansson}, title = {Identity-Based Encryption Resilient to Continual Auxiliary Leakage}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {117--134}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_9}, doi = {10.1007/978-3-642-29011-4\_9}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/YuenCZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XiongZYZYQ12, author = {Hao Xiong and Cong Zhang and Tsz Hon Yuen and Echo P. Zhang and Siu{-}Ming Yiu and Sihan Qing}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {119--130}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_11}, doi = {10.1007/978-3-642-34129-8\_11}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/XiongZYZYQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangXWMY12, author = {Ye Zhang and Chun Jason Xue and Duncan S. Wong and Nikos Mamoulis and Siu{-}Ming Yiu}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {341--348}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_31}, doi = {10.1007/978-3-642-34129-8\_31}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhangXWMY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChimYHLMTKY12, author = {Tat Wing Chim and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li and Tin Wing Mui and Yu Hin Tsang and Chun Kin Kwok and Kwun Yin Yu}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {445--452}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_43}, doi = {10.1007/978-3-642-34129-8\_43}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ChimYHLMTKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/FangJCYHZHT12, author = {Jun{-}bin Fang and Zoe Lin Jiang and Kam{-}Pui Chow and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Gang Zhou and Mengfei He and Yanbin Tang}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones}, booktitle = {Advances in Digital Forensics {VIII} - 8th {IFIP} {WG} 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {383}, pages = {129--142}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33962-2\_9}, doi = {10.1007/978-3-642-33962-2\_9}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/FangJCYHZHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbra/YuLYZCHW12, author = {Junjie Yu and Henry Chi{-}Ming Leung and Siu{-}Ming Yiu and Yong Zhang and Francis Y. L. Chin and Nathan Hobbs and Amy Y. X. Wang}, editor = {Leonidas G. Bleris and Ion I. Mandoiu and Russell Schwartz and Jianxin Wang}, title = {Phylogenetic Tree Reconstruction with Protein Linkage}, booktitle = {Bioinformatics Research and Applications - 8th International Symposium, {ISBRA} 2012, Dallas, TX, USA, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7292}, pages = {315--327}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30191-9\_29}, doi = {10.1007/978-3-642-30191-9\_29}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/isbra/YuLYZCHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/HeCHY12, author = {Yi Jun He and Tat Wing Chim and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Albert Levi and Mohamad Badra and Matteo Cesana and Mona Ghassemian and {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and Nafa{\^{a}} Jabeur and Marek Klonowski and Antonio Ma{\~{n}}a and Susana Sargento and Sherali Zeadally}, title = {Non-Transferable Proxy Re-Encryption Scheme}, booktitle = {5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012}, pages = {1--4}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NTMS.2012.6208714}, doi = {10.1109/NTMS.2012.6208714}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/HeCHY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChanHY12, author = {Patrick P. F. Chan and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {DroidChecker: analyzing android applications for capability leak}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {125--136}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185466}, doi = {10.1145/2185448.2185466}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChanHY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ChimYHL11, author = {Tat Wing Chim and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li}, title = {{SPECS:} Secure and privacy enhancing communications schemes for VANETs}, journal = {Ad Hoc Networks}, volume = {9}, number = {2}, pages = {189--203}, year = {2011}, url = {https://doi.org/10.1016/j.adhoc.2010.05.005}, doi = {10.1016/J.ADHOC.2010.05.005}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ChimYHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/LeungYYPWLCQLC11, author = {Henry C. M. Leung and Siu{-}Ming Yiu and Bin Yang and Yu Peng and Yi Wang and Zhihua Liu and Jing{-}Chi Chen and Junjie Qin and Ruiqiang Li and Francis Y. L. Chin}, title = {A robust and accurate binning algorithm for metagenomic sequences with arbitrary species abundance ratio}, journal = {Bioinform.}, volume = {27}, number = {11}, pages = {1489--1495}, year = {2011}, url = {https://doi.org/10.1093/bioinformatics/btr186}, doi = {10.1093/BIOINFORMATICS/BTR186}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/LeungYYPWLCQLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/PengLYC11, author = {Yu Peng and Henry C. M. Leung and Siu{-}Ming Yiu and Francis Y. L. Chin}, title = {Meta-IDBA: a \emph{de Novo} assembler for metagenomic data}, journal = {Bioinform.}, volume = {27}, number = {13}, pages = {94--101}, year = {2011}, url = {https://doi.org/10.1093/bioinformatics/btr216}, doi = {10.1093/BIOINFORMATICS/BTR216}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bioinformatics/PengLYC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/WongWHCHLY11, author = {Thomas K. F. Wong and Kwok{-}Lung Wan and Bay{-}Yuan Hsu and Brenda W. Y. Cheung and Wing{-}Kai Hon and Tak Wah Lam and Siu{-}Ming Yiu}, title = {RNASAlign: {RNA} Structural Alignment System}, journal = {Bioinform.}, volume = {27}, number = {15}, pages = {2151--2152}, year = {2011}, url = {https://doi.org/10.1093/bioinformatics/btr338}, doi = {10.1093/BIOINFORMATICS/BTR338}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bioinformatics/WongWHCHLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChowY11, author = {Sherman S. M. Chow and Siu{-}Ming Yiu}, title = {Exclusion-intersection encryption}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {136--146}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043672}, doi = {10.1504/IJSN.2011.043672}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChowY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/WongLSCY11, author = {Thomas K. F. Wong and Tak Wah Lam and Wing{-}Kin Sung and Brenda W. Y. Cheung and Siu{-}Ming Yiu}, title = {Structural Alignment of {RNA} with Complex Pseudoknot Structure}, journal = {J. Comput. Biol.}, volume = {18}, number = {1}, pages = {97--108}, year = {2011}, url = {https://doi.org/10.1089/cmb.2009.0275}, doi = {10.1089/CMB.2009.0275}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcb/WongLSCY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/JiangFHYCS11, author = {Zoe Lin Jiang and Jun{-}bin Fang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow and Meng{-}meng Sheng}, title = {k-Dimensional hashing scheme for hard disk integrity verification in computer forensics}, journal = {J. Zhejiang Univ. Sci. {C}}, volume = {12}, number = {10}, pages = {809--818}, year = {2011}, url = {https://doi.org/10.1631/jzus.C1000425}, doi = {10.1631/JZUS.C1000425}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/JiangFHYCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/ChimYHL11, author = {Tat Wing Chim and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li}, title = {{OPQ:} OT-Based Private Querying in VANETs}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {12}, number = {4}, pages = {1413--1422}, year = {2011}, url = {https://doi.org/10.1109/TITS.2011.2158208}, doi = {10.1109/TITS.2011.2158208}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/ChimYHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcb/LiuCWLY11, author = {Xuan Liu and Shing{-}Wan Choi and Thomas K. F. Wong and Tak Wah Lam and Siu{-}Ming Yiu}, editor = {Robert Grossman and Andrey Rzhetsky and Sun Kim and Wei Wang}, title = {Detection of novel tandem duplication with next-generation sequencing}, booktitle = {{ACM} International Conference on Bioinformatics, Computational Biology and Biomedicine, BCB' 11, Chicago, IL, {USA} - July 31 - August 03, 2011}, pages = {415--419}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2147805.2147861}, doi = {10.1145/2147805.2147861}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bcb/LiuCWLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcb/WongYHLHY11, author = {Thomas K. F. Wong and Hui{-}Ting Yu and Bay{-}Yuan Hsu and Tak Wah Lam and Wing{-}Kai Hon and Siu{-}Ming Yiu}, editor = {Robert Grossman and Andrey Rzhetsky and Sun Kim and Wei Wang}, title = {Algorithms for pseudoknot classification}, booktitle = {{ACM} International Conference on Bioinformatics, Computational Biology and Biomedicine, BCB' 11, Chicago, IL, {USA} - July 31 - August 03, 2011}, pages = {484--486}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2147805.2147877}, doi = {10.1145/2147805.2147877}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bcb/WongYHLHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bicob/LeungLXYC11, author = {Henry Chi{-}Ming Leung and Shuen{-}Yi Leung and Carlos Lu Xiang and Siu{-}Ming Yiu and Francis Yuk{-}Lun Chin}, editor = {Hisham Al{-}Mubaid}, title = {DMPFinder - Finding Differentiating Pathways with Gaps from Two Groups of Metabolic Networks}, booktitle = {Proceedings of the {ISCA} 3rd International Conference on Bioinformatics and Computational Biology, BICoB-2011, March 23-25, 2011, Holiday Inn Downtown-Superdome, New Orleans, Louisiana, {USA}}, pages = {80--85}, publisher = {{ISCA}}, year = {2011}, timestamp = {Mon, 14 Nov 2011 12:10:34 +0100}, biburl = {https://dblp.org/rec/conf/bicob/LeungLXYC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChimHYL11, author = {Tat Wing Chim and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Victor O. K. Li}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {\emph{MLAS}: multiple level authentication scheme for VANETs}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {471--475}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966982}, doi = {10.1145/1966913.1966982}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChimHYL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/ChanHY11, author = {Patrick P. F. Chan and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {Dynamic Software Birthmark for Java Based on Heap Memory Analysis}, booktitle = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, pages = {94--107}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5\_8}, doi = {10.1007/978-3-642-24712-5\_8}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/ChanHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ChanHY11, author = {Patrick P. F. Chan and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap}, booktitle = {Proceedings of the 35th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22 July 2011}, pages = {407--412}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/COMPSAC.2011.60}, doi = {10.1109/COMPSAC.2011.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ChanHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/CheungCYLH11, author = {Jeanno Chin Long Cheung and Tat Wing Chim and Siu{-}Ming Yiu and Victor O. K. Li and Lucas Chi Kwong Hui}, title = {Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network}, booktitle = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011, 5-9 December 2011, Houston, Texas, {USA}}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/GLOCOM.2011.6134566}, doi = {10.1109/GLOCOM.2011.6134566}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/CheungCYLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/ZhengLCHY11, author = {Xueling Zheng and Yiu Ming Lai and Kam{-}Pui Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Xiamu Niu and Mingchu Li and Y{\^{o}}iti Suzuki and Jeng{-}Shyang Pan and Lakhmi C. Jain}, title = {Sockpuppet Detection in Online Discussion Forums}, booktitle = {Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October 14-16, 2011}, pages = {374--377}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IIHMSP.2011.69}, doi = {10.1109/IIHMSP.2011.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/ZhengLCHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/HouUYHC11, author = {Shuhui Hou and Tetsutaro Uehara and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Kam{-}Pui Chow}, editor = {Xiamu Niu and Mingchu Li and Y{\^{o}}iti Suzuki and Jeng{-}Shyang Pan and Lakhmi C. Jain}, title = {Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers}, booktitle = {Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October 14-16, 2011}, pages = {378--383}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IIHMSP.2011.28}, doi = {10.1109/IIHMSP.2011.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/HouUYHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/LaiZCHY11, author = {Yuk{-}Ming Lai and Xueling Zheng and Kam{-}Pui Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Xiamu Niu and Mingchu Li and Y{\^{o}}iti Suzuki and Jeng{-}Shyang Pan and Lakhmi C. Jain}, title = {Automatic Online Monitoring and Data-Mining Internet Forums}, booktitle = {Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October 14-16, 2011}, pages = {384--387}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IIHMSP.2011.71}, doi = {10.1109/IIHMSP.2011.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/LaiZCHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/ChinLY11, author = {Francis Y. L. Chin and Henry C. M. Leung and Siu{-}Ming Yiu}, editor = {Takao Asano and Shin{-}Ichi Nakano and Yoshio Okamoto and Osamu Watanabe}, title = {Adaptive Phenotype Testing for {AND/OR} Items}, booktitle = {Algorithms and Computation - 22nd International Symposium, {ISAAC} 2011, Yokohama, Japan, December 5-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7074}, pages = {754--763}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25591-5\_77}, doi = {10.1007/978-3-642-25591-5\_77}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/ChinLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recomb/PengLYC11, author = {Yu Peng and Henry C. M. Leung and Siu{-}Ming Yiu and Francis Y. L. Chin}, editor = {Vineet Bafna and S{\"{u}}leyman Cenk Sahinalp}, title = {{T-IDBA:} {A} de novo Iterative de Bruijn Graph Assembler for Transcriptome - (Extended Abstract)}, booktitle = {Research in Computational Molecular Biology - 15th Annual International Conference, {RECOMB} 2011, Vancouver, BC, Canada, March 28-31, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6577}, pages = {337--338}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20036-6\_31}, doi = {10.1007/978-3-642-20036-6\_31}, timestamp = {Mon, 13 May 2019 09:30:09 +0200}, biburl = {https://dblp.org/rec/conf/recomb/PengLYC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/FangJYCHCN11, author = {Jun{-}bin Fang and Zoe Lin Jiang and Siu{-}Ming Yiu and Kam{-}Pui Chow and Lucas Chi Kwong Hui and Long Chen and Xiamu Niu}, editor = {Robert F. Erbacher and Roy H. Campbell and Yong Guan}, title = {A Dual Cube Hashing Scheme for Solving {LPP} Integrity Problem}, booktitle = {2011 {IEEE} Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2011, Oakland, CA, USA, May 26, 2011}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SADFE.2011.1}, doi = {10.1109/SADFE.2011.1}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/FangJYCHCN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/LawCYCKTL11, author = {Frank Y. W. Law and Patrick P. F. Chan and Siu{-}Ming Yiu and Kam{-}Pui Chow and Michael Y. K. Kwan and Hayson Tse and Pierre K. Y. Lai}, editor = {Robert F. Erbacher and Roy H. Campbell and Yong Guan}, title = {Protecting Digital Data Privacy in Computer Forensic Examination}, booktitle = {2011 {IEEE} Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2011, Oakland, CA, USA, May 26, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SADFE.2011.15}, doi = {10.1109/SADFE.2011.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/LawCYCKTL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/ChimYHL11, author = {Tat Wing Chim and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li}, title = {{PASS:} Privacy-preserving authentication scheme for smart grid network}, booktitle = {{IEEE} Second International Conference on Smart Grid Communications, SmartGridComm 2011, Brussels, Belgium, October 17-20, 2011}, pages = {196--201}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SmartGridComm.2011.6102316}, doi = {10.1109/SMARTGRIDCOMM.2011.6102316}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/ChimYHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tamc/ChinLY11, author = {Francis Y. L. Chin and Henry C. M. Leung and Siu{-}Ming Yiu}, editor = {Mitsunori Ogihara and Jun Tarui}, title = {Non-adaptive Complex Group Testing with Multiple Positive Sets}, booktitle = {Theory and Applications of Models of Computation - 8th Annual Conference, {TAMC} 2011, Tokyo, Japan, May 23-25, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6648}, pages = {172--183}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20877-5\_19}, doi = {10.1007/978-3-642-20877-5\_19}, timestamp = {Sun, 25 Oct 2020 23:06:59 +0100}, biburl = {https://dblp.org/rec/conf/tamc/ChinLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/WongY11, author = {Thomas K. F. Wong and Siu{-}Ming Yiu}, editor = {Limin Angela Liu and Dong{-}Qing Wei and Yixue Li and Huimin Lei}, title = {Structural Alignment of RNAs with Pseudoknots}, booktitle = {Handbook of Research on Computational and Systems Biology - Interdisciplinary Applications}, pages = {550--571}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-491-2.ch024}, doi = {10.4018/978-1-60960-491-2.CH024}, timestamp = {Tue, 01 Jun 2021 09:58:05 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/WongY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangXWMY11, author = {Ye Zhang and Chun Jason Xue and Duncan S. Wong and Nikos Mamoulis and Siu{-}Ming Yiu}, title = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2011}, url = {http://eprint.iacr.org/2011/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangXWMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/YangPLYCC10, author = {Bin Yang and Yu Peng and Henry Chi{-}Ming Leung and Siu{-}Ming Yiu and Jing{-}Chi Chen and Francis Yuk{-}Lun Chin}, title = {Unsupervised binning of environmental genomic fragments based on an error robust selection of \emph{l}-mers}, journal = {{BMC} Bioinform.}, volume = {11}, number = {{S-2}}, pages = {5}, year = {2010}, url = {https://doi.org/10.1186/1471-2105-11-S2-S5}, doi = {10.1186/1471-2105-11-S2-S5}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/YangPLYCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbra/WongLYW10, author = {Thomas K. F. Wong and Tak Wah Lam and Siu{-}Ming Yiu and Simon C. K. Wong}, title = {Improving the accuracy of signal transduction pathway construction using level-2 neighbours}, journal = {Int. J. Bioinform. Res. Appl.}, volume = {6}, number = {6}, pages = {542--555}, year = {2010}, url = {https://doi.org/10.1504/IJBRA.2010.038736}, doi = {10.1504/IJBRA.2010.038736}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbra/WongLYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaim/HuangLSTY10, author = {Songbo Huang and Tak Wah Lam and Wing{-}Kin Sung and Siu{-}Lung Tam and Siu{-}Ming Yiu}, editor = {Bo Chen}, title = {Indexing Similar {DNA} Sequences}, booktitle = {Algorithmic Aspects in Information and Management, 6th International Conference, {AAIM} 2010, Weihai, China, July 19-21, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6124}, pages = {180--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14355-7\_19}, doi = {10.1007/978-3-642-14355-7\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaim/HuangLSTY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcb/YangPLYQLC10, author = {Bin Yang and Yu Peng and Henry C. M. Leung and Siu{-}Ming Yiu and Junjie Qin and Ruiqiang Li and Francis Y. L. Chin}, editor = {Aidong Zhang and Mark Borodovsky and Gultekin {\"{O}}zsoyoglu and Armin R. Mikler}, title = {MetaCluster: unsupervised binning of environmental genomic fragments and taxonomic annotation}, booktitle = {Proceedings of the First {ACM} International Conference on Bioinformatics and Computational Biology, {BCB} 2010, Niagara Falls, NY, USA, August 2-4, 2010}, pages = {170--179}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854776.1854803}, doi = {10.1145/1854776.1854803}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bcb/YangPLYQLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/LeungLXYC10, author = {Shuen{-}Yi Leung and Henry C. M. Leung and Carlos Lu Xiang and Siu{-}Ming Yiu and Francis Y. L. Chin}, title = {Predicting metabolic pathways from metabolic networks with limited biological knowledge}, booktitle = {2010 {IEEE} International Conference on Bioinformatics and Biomedicine Workshops, {BIBMW} 2010, Hong Kong, December 18, 2010}, pages = {7--12}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/BIBMW.2010.5703765}, doi = {10.1109/BIBMW.2010.5703765}, timestamp = {Wed, 24 Nov 2021 15:06:06 +0100}, biburl = {https://dblp.org/rec/conf/bibm/LeungLXYC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biocomp/JiaWSSY10, author = {Yizhen Jia and Thomas K. F. Wong and You{-}Qiang Song and David K. Smith and Siu{-}Ming Yiu}, editor = {Hamid R. Arabnia and Quoc{-}Nam Tran and Rui Chang and Matthew He and Andy Marsh and Ashu M. G. Solo and Jack Y. Yang}, title = {Investigation of the Lineage and Tissue Specificity of Genes}, booktitle = {International Conference on Bioinformatics {\&} Computational Biology, {BIOCOMP} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {306--310}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biocomp/JiaWSSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/WongY10, author = {Thomas K. F. Wong and Siu{-}Ming Yiu}, editor = {Ana L. N. Fred and Joaquim Filipe and Hugo Gamboa}, title = {Structure Prediction of Simple Non-standard Pseudoknot}, booktitle = {{BIOINFORMATICS} 2010 - Proceedings of the First International Conference on Bioinformatics, Valencia, Spain, January 20-23, 2010}, pages = {33--38}, publisher = {{INSTICC} Press}, year = {2010}, timestamp = {Fri, 29 Apr 2011 08:50:07 +0200}, biburl = {https://dblp.org/rec/conf/biostec/WongY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/WongY10a, author = {Thomas K. F. Wong and Siu{-}Ming Yiu}, editor = {Ana L. N. Fred and Joaquim Filipe and Hugo Gamboa}, title = {Prediction of Minimum Free Energy Structure for Simple Non-standard Pseudoknot}, booktitle = {Biomedical Engineering Systems and Technologies - Third International Joint Conference, {BIOSTEC} 2010, Valencia, Spain, January 20-23, 2010, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {127}, pages = {345--355}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18472-7\_27}, doi = {10.1007/978-3-642-18472-7\_27}, timestamp = {Sat, 19 Oct 2019 20:01:12 +0200}, biburl = {https://dblp.org/rec/conf/biostec/WongY10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/greencom/WangYXYHC10, author = {Eric Ke Wang and Yunming Ye and Xiaofei Xu and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Kam{-}Pui Chow}, editor = {Peidong Zhu and Lizhe Wang and Feng Xia and Huajun Chen and Ian McLoughlin and Shiao{-}Li Tsao and Mitsuhisa Sato and Sun{-}Ki Chai and Irwin King}, title = {Security Issues and Challenges for Cyber Physical System}, booktitle = {2010 {IEEE/ACM} Int'l Conference on Green Computing and Communications, GreenCom 2010, {\&} Int'l Conference on Cyber, Physical and Social Computing, CPSCom 2010, Hangzhou, China, December 18-20, 2010}, pages = {733--738}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/GreenCom-CPSCom.2010.36}, doi = {10.1109/GREENCOM-CPSCOM.2010.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/greencom/WangYXYHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/LawCYTLCIKHH10, author = {Frank Y. W. Law and Patrick P. F. Chan and Siu{-}Ming Yiu and Benjamin Tang and Pierre K. Y. Lai and Kam{-}Pui Chow and Ricci S. C. Ieong and Michael Y. K. Kwan and Wing{-}Kai Hon and Lucas Chi Kwong Hui}, editor = {Kam{-}Pui Chow and Sujeet Shenoi}, title = {Identifying Volatile Data from Multiple Memory Dumps in Live Forensics}, booktitle = {Advances in Digital Forensics {VI} - Sixth {IFIP} {WG} 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {337}, pages = {185--194}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15506-2\_13}, doi = {10.1007/978-3-642-15506-2\_13}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/LawCYTLCIKHH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/CheungMWYZ10, author = {David W. Cheung and Nikos Mamoulis and Wai Kit Wong and Siu{-}Ming Yiu and Ye Zhang}, editor = {Otfried Cheong and Kyung{-}Yong Chwa and Kunsoo Park}, title = {Anonymous Fuzzy Identity-Based Encryption for Similarity Search}, booktitle = {Algorithms and Computation - 21st International Symposium, {ISAAC} 2010, Jeju Island, Korea, December 15-17, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6506}, pages = {61--72}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17517-6\_8}, doi = {10.1007/978-3-642-17517-6\_8}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/CheungMWYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbra/WongCLY10, author = {Thomas K. F. Wong and Brenda W. Y. Cheung and Tak Wah Lam and Siu{-}Ming Yiu}, editor = {Mark Borodovsky and Johann Peter Gogarten and Teresa M. Przytycka and Sanguthevar Rajasekaran}, title = {Local Structural Alignment of {RNA} with Affine Gap Model}, booktitle = {Bioinformatics Research and Applications, 6th International Symposium, {ISBRA} 2010, Storrs, CT, USA, May 23-26, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6053}, pages = {191--202}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13078-6\_22}, doi = {10.1007/978-3-642-13078-6\_22}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/isbra/WongCLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/ZhangAWHMCY10, author = {Ye Zhang and Man Ho Au and Duncan S. Wong and Qiong Huang and Nikos Mamoulis and David W. Cheung and Siu{-}Ming Yiu}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {Oblivious Transfer with Access Control : Realizing Disjunction without Duplication}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {96--115}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_7}, doi = {10.1007/978-3-642-17455-1\_7}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/ZhangAWHMCY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recomb/PengLYC10, author = {Yu Peng and Henry C. M. Leung and Siu{-}Ming Yiu and Francis Y. L. Chin}, editor = {Bonnie Berger}, title = {{IDBA} - {A} Practical Iterative de Bruijn Graph De Novo Assembler}, booktitle = {Research in Computational Molecular Biology, 14th Annual International Conference, {RECOMB} 2010, Lisbon, Portugal, April 25-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6044}, pages = {426--440}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12683-3\_28}, doi = {10.1007/978-3-642-12683-3\_28}, timestamp = {Mon, 13 May 2019 09:30:09 +0200}, biburl = {https://dblp.org/rec/conf/recomb/PengLYC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-0591, author = {Eric Ke Wang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {A new key establishment scheme for wireless sensor networks}, journal = {CoRR}, volume = {abs/1004.0591}, year = {2010}, url = {http://arxiv.org/abs/1004.0591}, eprinttype = {arXiv}, eprint = {1004.0591}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-0591.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCHY10, author = {Yi Jun He and Tat Wing Chim and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2010}, url = {http://eprint.iacr.org/2010/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/DongCLYH09, author = {Ying Dong and Tat Wing Chim and Victor O. K. Li and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, title = {{ARMR:} Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {8}, pages = {1536--1550}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2009.04.010}, doi = {10.1016/J.ADHOC.2009.04.010}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/DongCLYH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/LiYLLYKW09, author = {Ruiqiang Li and Chang Yu and Yingrui Li and Tak Wah Lam and Siu{-}Ming Yiu and Karsten Kristiansen and Jun Wang}, title = {{SOAP2:} an improved ultrafast tool for short read alignment}, journal = {Bioinform.}, volume = {25}, number = {15}, pages = {1966--1967}, year = {2009}, url = {https://doi.org/10.1093/bioinformatics/btp336}, doi = {10.1093/BIOINFORMATICS/BTP336}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/LiYLLYKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/ChinLLY09, author = {Francis Y. L. Chin and Henry C. M. Leung and Wei{-}Lin Li and Siu{-}Ming Yiu}, title = {Finding optimal threshold for correction error reads in {DNA} assembling}, journal = {{BMC} Bioinform.}, volume = {10}, number = {{S-1}}, year = {2009}, url = {https://doi.org/10.1186/1471-2105-10-S1-S15}, doi = {10.1186/1471-2105-10-S1-S15}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/ChinLLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbra/WongLCY09, author = {Thomas K. F. Wong and Tak Wah Lam and P. Y. Chan and Siu{-}Ming Yiu}, title = {Correcting short reads with high error rates for improved sequencing result}, journal = {Int. J. Bioinform. Res. Appl.}, volume = {5}, number = {2}, pages = {224--237}, year = {2009}, url = {https://doi.org/10.1504/IJBRA.2009.024039}, doi = {10.1504/IJBRA.2009.024039}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbra/WongLCY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbcb/LeungSYCS09, author = {Henry Chi{-}Ming Leung and Man{-}Hung Siu and Siu{-}Ming Yiu and Francis Yuk{-}Lun Chin and Ken Wing{-}Kin Sung}, title = {Clustering-Based Approach for Predicting Motif Pairs from protein Interaction Data}, journal = {J. Bioinform. Comput. Biol.}, volume = {7}, number = {4}, pages = {701--716}, year = {2009}, url = {https://doi.org/10.1142/S0219720009004266}, doi = {10.1142/S0219720009004266}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbcb/LeungSYCS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/LeungXYC09, author = {Henry C. M. Leung and Qian Xiang and Siu{-}Ming Yiu and Francis Y. L. Chin}, title = {Predicting Protein Complexes from {PPI} Data: {A} Core-Attachment Approach}, journal = {J. Comput. Biol.}, volume = {16}, number = {2}, pages = {133--144}, year = {2009}, url = {https://doi.org/10.1089/cmb.2008.01TT}, doi = {10.1089/CMB.2008.01TT}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcb/LeungXYC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsea/JiangYDHW09, author = {Zoe Lin Jiang and Siu{-}Ming Yiu and Y. Dong and Lucas Chi Kwong Hui and Starsky H. Y. Wong}, title = {Secure Chained Threshold Proxy Signature without and with Supervision}, journal = {J. Softw. Eng. Appl.}, volume = {2}, number = {4}, pages = {267--275}, year = {2009}, url = {https://doi.org/10.4236/jsea.2009.24034}, doi = {10.4236/JSEA.2009.24034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsea/JiangYDHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhocnets/ChimYHJL09, author = {Tat Wing Chim and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Zoe Lin Jiang and Victor O. K. Li}, editor = {Jun Zheng and Shiwen Mao and Scott F. Midkiff and Hua Zhu}, title = {{SPECS:} Secure and Privacy Enhancing Communications Schemes for VANETs}, booktitle = {Ad Hoc Networks, First International Conference, {ADHOCNETS} 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {28}, pages = {160--175}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11723-7\_11}, doi = {10.1007/978-3-642-11723-7\_11}, timestamp = {Mon, 01 Mar 2021 16:18:23 +0100}, biburl = {https://dblp.org/rec/conf/adhocnets/ChimYHJL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/LamLTWWY09, author = {Tak Wah Lam and Ruiqiang Li and Alan Tam and Simon C. K. Wong and Edward Wu and Siu{-}Ming Yiu}, title = {High Throughput Short Read Alignment via Bi-directional {BWT}}, booktitle = {2009 {IEEE} International Conference on Bioinformatics and Biomedicine, {BIBM} 2009, Washington, DC, USA, November 1-4, 2009, Proceedings}, pages = {31--36}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/BIBM.2009.42}, doi = {10.1109/BIBM.2009.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibm/LamLTWWY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bicob/WongYLS09, author = {Thomas K. F. Wong and Siu{-}Ming Yiu and Tak Wah Lam and Wing{-}Kin Sung}, editor = {Sanguthevar Rajasekaran}, title = {The 2-Interval Pattern Matching Problems and Its Application to ncRNA Scanning}, booktitle = {Bioinformatics and Computational Biology, First International Conference, BICoB 2009, New Orleans, LA, USA, April 8-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5462}, pages = {79--89}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00727-9\_10}, doi = {10.1007/978-3-642-00727-9\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bicob/WongYLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/YangPLYCC09, author = {Bin Yang and Yu Peng and Henry C. M. Leung and Siu{-}Ming Yiu and Jing{-}Chi Chen and Francis Y. L. Chin}, editor = {Doheon Lee and Russ B. Altman and Min Song and Jun Huan}, title = {Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers}, booktitle = {Proceeding of the 3rd International Workshop on Data and Text Mining in Bioinformatics, {DTMBIO} 2009, Hong Kong, China, November 6, 2009}, pages = {3--10}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1651318.1651322}, doi = {10.1145/1651318.1651322}, timestamp = {Wed, 14 Nov 2018 11:00:18 +0100}, biburl = {https://dblp.org/rec/conf/cikm/YangPLYCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/YuYH09, author = {Kin Ying Yu and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, editor = {Leonard Barolli and Fatos Xhafa and Hui{-}Huang Hsu}, title = {{RFID} Forward Secure Authentication Protocol: Flaw and Solution}, booktitle = {2009 International Conference on Complex, Intelligent and Software Intensive Systems, {CISIS} 2009, Fukuoka, Japan, March 16-19, 2009}, pages = {627--632}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CISIS.2009.113}, doi = {10.1109/CISIS.2009.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisis/YuYH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WangHY09, author = {Eric Ke Wang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {A New Practical Scheme for Protecting Web Content}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {62--66}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 14:56:55 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/WangHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WangHHY09, author = {Eric Ke Wang and Yi Jun He and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {179--183}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/WangHHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WongJHY09, author = {Starsky H. Y. Wong and Zoe Lin Jiang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {307--313}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/WongJHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spire/TamWLY09, author = {Alan Tam and Edward Wu and Tak Wah Lam and Siu{-}Ming Yiu}, editor = {Jussi Karlgren and Jorma Tarhio and Heikki Hyyr{\"{o}}}, title = {Succinct Text Indexing with Wildcards}, booktitle = {String Processing and Information Retrieval, 16th International Symposium, {SPIRE} 2009, Saariselk{\"{a}}, Finland, August 25-27, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5721}, pages = {39--50}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03784-9\_5}, doi = {10.1007/978-3-642-03784-9\_5}, timestamp = {Fri, 27 Mar 2020 09:02:44 +0100}, biburl = {https://dblp.org/rec/conf/spire/TamWLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wabi/WongLSY09, author = {Thomas K. F. Wong and Tak Wah Lam and Wing{-}Kin Sung and Siu{-}Ming Yiu}, editor = {Steven Salzberg and Tandy J. Warnow}, title = {Structural Alignment of {RNA} with Complex Pseudoknot Structure}, booktitle = {Algorithms in Bioinformatics, 9th International Workshop, {WABI} 2009, Philadelphia, PA, USA, September 12-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5724}, pages = {403--414}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04241-6\_33}, doi = {10.1007/978-3-642-04241-6\_33}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wabi/WongLSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangMCYW09, author = {Ye Zhang and Nikos Mamoulis and David W. Cheung and Siu{-}Ming Yiu and Wai Kit Wong}, title = {Anonymous Fuzzy Identity-based Encryption for Similarity Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2009}, url = {http://eprint.iacr.org/2009/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangMCYW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/LamSTWY08, author = {Tak Wah Lam and Wing{-}Kin Sung and Siu{-}Lung Tam and Chi{-}Kwong Wong and Siu{-}Ming Yiu}, title = {Compressed indexing and local alignment of {DNA}}, journal = {Bioinform.}, volume = {24}, number = {6}, pages = {791--797}, year = {2008}, url = {https://doi.org/10.1093/bioinformatics/btn032}, doi = {10.1093/BIOINFORMATICS/BTN032}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/LamSTWY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/WijayaYSRS08, author = {Edward Wijaya and Siu{-}Ming Yiu and Ngo Thanh Son and Kanagasabai Rajaraman and Wing{-}Kin Sung}, title = {MotifVoter: a novel ensemble method for fine-grained integration of generic motif finders}, journal = {Bioinform.}, volume = {24}, number = {20}, pages = {2288--2295}, year = {2008}, url = {https://doi.org/10.1093/bioinformatics/btn420}, doi = {10.1093/BIOINFORMATICS/BTN420}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bioinformatics/WijayaYSRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/LeungLCY08, author = {Wing{-}Sze Leung and Marie C. M. Lin and David Wai{-}Lok Cheung and Siu{-}Ming Yiu}, title = {Filtering of false positive microRNA candidates by a clustering-based approach}, journal = {{BMC} Bioinform.}, volume = {9}, number = {{S-12}}, year = {2008}, url = {https://doi.org/10.1186/1471-2105-9-S12-S3}, doi = {10.1186/1471-2105-9-S12-S3}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/LeungLCY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChowGHY08, author = {Sherman S. M. Chow and H. W. Go and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Multiplicative Forward-Secure Threshold Signature Scheme}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {3}, pages = {397--403}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n3/ijns-2008-v7-n3-p397-403.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChowGHY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbcb/WongLYY08, author = {Thomas K. F. Wong and Tak Wah Lam and Wanling Yang and Siu{-}Ming Yiu}, title = {Finding Alternative Splicing Patterns with Strong Support from expressed Sequences on Individual exons/introns}, journal = {J. Bioinform. Comput. Biol.}, volume = {6}, number = {5}, pages = {1021--1033}, year = {2008}, url = {https://doi.org/10.1142/S0219720008003825}, doi = {10.1142/S0219720008003825}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbcb/WongLYY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mics/ChanLSWY08, author = {Ho{-}Leung Chan and Tak Wah Lam and Wing{-}Kin Sung and Prudence W. H. Wong and Siu{-}Ming Yiu}, title = {Non-overlapping Common Substrings Allowing Mutations}, journal = {Math. Comput. Sci.}, volume = {1}, number = {4}, pages = {543--555}, year = {2008}, url = {https://doi.org/10.1007/s11786-007-0030-6}, doi = {10.1007/S11786-007-0030-6}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mics/ChanLSWY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apbc/WongCLY08, author = {Thomas K. F. Wong and Y. S. Chiu and Tak Wah Lam and Siu{-}Ming Yiu}, editor = {Alvis Brazma and Satoru Miyano and Tatsuya Akutsu}, title = {A Memory Efficient Algorithm for Structural Alignment of RNAs with Embedded Simple Pseudoknots}, booktitle = {Proceedings of the 6th Asia-Pacific Bioinformatics Conference, {APBC} 2008, 14-17 January 2008, Kyoto, Japan}, series = {Advances in Bioinformatics and Computational Biology}, volume = {6}, pages = {89--100}, publisher = {Imperial College Press}, year = {2008}, url = {http://www.comp.nus.edu.sg/\%7Ewongls/psZ/apbc2008/apbc105a.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apbc/WongCLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apbc/ChinLSY08, author = {Francis Y. L. Chin and Henry C. M. Leung and Man{-}Hung Siu and Siu{-}Ming Yiu}, editor = {Alvis Brazma and Satoru Miyano and Tatsuya Akutsu}, title = {Optimal Algorithm for Finding {DNA} Motifs with Nucleotide Adjacent Dependency}, booktitle = {Proceedings of the 6th Asia-Pacific Bioinformatics Conference, {APBC} 2008, 14-17 January 2008, Kyoto, Japan}, series = {Advances in Bioinformatics and Computational Biology}, volume = {6}, pages = {343--352}, publisher = {Imperial College Press}, year = {2008}, url = {http://www.comp.nus.edu.sg/\%7Ewongls/psZ/apbc2008/apbc064a.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apbc/ChinLSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/WangHY08, author = {Eric Ke Wang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Authenticated Directed Diffusion}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {366--377}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_26}, doi = {10.1007/978-3-540-89641-8\_26}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/WangHY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/JiangYHDW08, author = {Zoe Lin Jiang and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Y. Dong and Starsky H. Y. Wong}, title = {Chained Threshold Proxy Signature without and with Supervision}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China}, pages = {837--840}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.1353}, doi = {10.1109/CSSE.2008.1353}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/JiangYHDW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/JiangHY08, author = {Zoe Lin Jiang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Indrajit Ray and Sujeet Shenoi}, title = {Improving Disk Sector Integrity Using K-Dimension Hashing}, booktitle = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008}, series = {{IFIP}}, volume = {285}, pages = {87--98}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-84927-0\_8}, doi = {10.1007/978-0-387-84927-0\_8}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/JiangHY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inc/DongLYH08, author = {Ying Dong and Victor O. K. Li and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, editor = {Paul Dowland and Steven Furnell}, title = {Strongly Anonymous Communications in Mobile Ad Hoc Networks}, booktitle = {Seventh International Network Conference {(INC} 2008), Plymouth, UK, July 8-10, 2008. Proceedings}, pages = {181--191}, publisher = {University of Plymouth}, year = {2008}, url = {http://www.cscan.org/?page=openaccess\&\#38;id=159}, timestamp = {Tue, 16 May 2023 22:42:08 +0200}, biburl = {https://dblp.org/rec/conf/inc/DongLYH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChowY08, author = {Sherman S. M. Chow and Siu{-}Ming Yiu}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Timed-Release Encryption Revisited}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {38--51}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_3}, doi = {10.1007/978-3-540-88733-1\_3}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ChowY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/LawLJIKCHYC08, author = {Frank Y. W. Law and Pierre K. Y. Lai and Zoe Lin Jiang and Ricci S. C. Ieong and Michael Y. K. Kwan and Kam{-}Pui Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and C. F. Chong}, title = {Protecting Digital Legal Professional Privilege {(LPP)} Data}, booktitle = {Third International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2008, Berkeley, California, USA, May 22, 2008}, pages = {91--101}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SADFE.2008.19}, doi = {10.1109/SADFE.2008.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/LawLJIKCHYC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/algo/ChinY08, author = {Francis Y. L. Chin and Siu{-}Ming Yiu}, editor = {Ming{-}Yang Kao}, title = {Efficient Methods for Multiple Sequence Alignment with Guaranteed Error Bounds}, booktitle = {Encyclopedia of Algorithms - 2008 Edition}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-30162-4\_123}, doi = {10.1007/978-0-387-30162-4\_123}, timestamp = {Thu, 27 Jun 2019 16:25:31 +0200}, biburl = {https://dblp.org/rec/reference/algo/ChinY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/algo/Yiu08, author = {Siu{-}Ming Yiu}, editor = {Ming{-}Yang Kao}, title = {Local Alignment (with Concave Gap Weights)}, booktitle = {Encyclopedia of Algorithms - 2008 Edition}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-30162-4\_208}, doi = {10.1007/978-0-387-30162-4\_208}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/algo/Yiu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/HonLSSY07, author = {Wing{-}Kai Hon and Tak Wah Lam and Kunihiko Sadakane and Wing{-}Kin Sung and Siu{-}Ming Yiu}, title = {A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays}, journal = {Algorithmica}, volume = {48}, number = {1}, pages = {23--36}, year = {2007}, url = {https://doi.org/10.1007/s00453-006-1228-8}, doi = {10.1007/S00453-006-1228-8}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithmica/HonLSSY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/WijayaRYS07, author = {Edward Wijaya and Kanagasabai Rajaraman and Siu{-}Ming Yiu and Wing{-}Kin Sung}, title = {Detection of generic spaced motifs using submotif pattern mining}, journal = {Bioinform.}, volume = {23}, number = {12}, pages = {1476--1485}, year = {2007}, url = {https://doi.org/10.1093/bioinformatics/btm118}, doi = {10.1093/BIOINFORMATICS/BTM118}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bioinformatics/WijayaRYS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/DongSYLH07, author = {Y. Dong and Ai Fen Sui and Siu{-}Ming Yiu and Victor O. K. Li and Lucas Chi Kwong Hui}, title = {Providing distributed certificate authority service in cluster-based mobile ad hoc networks}, journal = {Comput. Commun.}, volume = {30}, number = {11-12}, pages = {2442--2452}, year = {2007}, url = {https://doi.org/10.1016/j.comcom.2007.04.011}, doi = {10.1016/J.COMCOM.2007.04.011}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/DongSYLH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LuiHY07, author = {Richard W. C. Lui and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Accountability in organisations}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {237--255}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013954}, doi = {10.1504/IJICS.2007.013954}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LuiHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiCHYCTCP07, author = {Zichen Li and C. F. Chong and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow and Wai Wan Tsang and H. W. Chan and Kevin K. H. Pun}, title = {An Attack on Libert et al.' s ID-based Undeniable Signature Scheme}, journal = {Int. J. Netw. Secur.}, volume = {5}, number = {2}, pages = {220--223}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n2/ijns-2007-v5-n2-p220-223.pdf}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/LiCHYCTCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LuiHY07, author = {Richard W. C. Lui and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Delegation with supervision}, journal = {Inf. Sci.}, volume = {177}, number = {19}, pages = {4014--4030}, year = {2007}, url = {https://doi.org/10.1016/j.ins.2007.04.004}, doi = {10.1016/J.INS.2007.04.004}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LuiHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biocomp/WongLYY07, author = {Thomas K. F. Wong and Tak Wah Lam and W. L. Yang and Siu{-}Ming Yiu}, editor = {Hamid R. Arabnia and Mary Qu Yang and Jack Y. Yang}, title = {Finding Alternative Splicing Patterns with Strong Support From Expressed Sequences}, booktitle = {International Conference on Bioinformatics {\&} Computational Biology, {BIOCOMP} 2007, Volume I, June 25-28, 2007, Las Vegas Nevada, {USA}}, pages = {153--158}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Mon, 22 Sep 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biocomp/WongLYY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoa/LamSTWY07, author = {Tak Wah Lam and Wing{-}Kin Sung and Siu{-}Lung Tam and Chi{-}Kwong Wong and Siu{-}Ming Yiu}, editor = {Andreas W. M. Dress and Yinfeng Xu and Binhai Zhu}, title = {An Experimental Study of Compressed Indexing and Local Alignments of {DNA}}, booktitle = {Combinatorial Optimization and Applications, First International Conference, {COCOA} 2007, Xi'an, China, August 14-16, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4616}, pages = {242--254}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73556-4\_27}, doi = {10.1007/978-3-540-73556-4\_27}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cocoa/LamSTWY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ChanYH07, author = {Dan T. F. Chan and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {559--565}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 16:45:17 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ChanYH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcn/JiangHCYL07, author = {Zoe Lin Jiang and Lucas Chi Kwong Hui and Kam{-}Pui Chow and Siu{-}Ming Yiu and Pierre K. Y. Lai}, title = {Improving Disk Sector Integrity Using 3-dimension Hashing Scheme}, booktitle = {Future Generation Communication and Networking, {FGCN} 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings}, pages = {141--145}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FGCN.2007.150}, doi = {10.1109/FGCN.2007.150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgcn/JiangHCYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/DongSYLHG07, author = {Ying Dong and Ai Fen Sui and Siu{-}Ming Yiu and Victor O. K. Li and Lucas Chi Kwong Hui and H. W. Go}, title = {An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {1241--1246}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.210}, doi = {10.1109/ICC.2007.210}, timestamp = {Tue, 19 Jun 2018 07:53:33 +0200}, biburl = {https://dblp.org/rec/conf/icc/DongSYLHG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/LamSTY07, author = {Tak Wah Lam and Wing{-}Kin Sung and Siu{-}Lung Tam and Siu{-}Ming Yiu}, editor = {Takeshi Tokuyama}, title = {Space Efficient Indexes for String Matching with Don't Cares}, booktitle = {Algorithms and Computation, 18th International Symposium, {ISAAC} 2007, Sendai, Japan, December 17-19, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4835}, pages = {846--857}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77120-3\_73}, doi = {10.1007/978-3-540-77120-3\_73}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/LamSTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HuiCY07, author = {Lucas Chi Kwong Hui and Kam{-}Pui Chow and Siu{-}Ming Yiu}, editor = {Ed Dawson and Duncan S. Wong}, title = {Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {11--19}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_2}, doi = {10.1007/978-3-540-72163-5\_2}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HuiCY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcam/WangLYHCCTCP07, author = {Meiqin Wang and Lin Li and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and C. F. Chong and Kam{-}Pui Chow and Wai Wan Tsang and H. W. Chan and Kevin K. H. Pun}, editor = {Nicu Sebe and Yuncai Liu and Yueting Zhuang and Thomas S. Huang}, title = {A Hybrid Approach for Authenticating {MPEG-2} Streaming Data}, booktitle = {Multimedia Content Analysis and Mining, International Workshop, {MCAM} 2007, Weihai, China, June 30 - July 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4577}, pages = {203--212}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73417-8\_27}, doi = {10.1007/978-3-540-73417-8\_27}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mcam/WangLYHCCTCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/LianCY07, author = {Wang Lian and David W. Cheung and Siu{-}Ming Yiu}, editor = {Yookun Cho and Roger L. Wainwright and Hisham Haddad and Sung Y. Shin and Yong Wan Koo}, title = {Maintenance of maximal frequent itemsets in large databases}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007}, pages = {388--392}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1244002.1244094}, doi = {10.1145/1244002.1244094}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/LianCY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wabi/ChinLSY07, author = {Francis Y. L. Chin and Henry C. M. Leung and Wing{-}Kin Sung and Siu{-}Ming Yiu}, editor = {Raffaele Giancarlo and Sridhar Hannenhalli}, title = {The Point Placement Problem on a Line - Improved Bounds for Pairwise Distance Queries}, booktitle = {Algorithms in Bioinformatics, 7th International Workshop, {WABI} 2007, Philadelphia, PA, USA, September 8-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4645}, pages = {372--382}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74126-8\_35}, doi = {10.1007/978-3-540-74126-8\_35}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/wabi/ChinLSY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/DongLHY07, author = {Ying Dong and Victor O. K. Li and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc Networks}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2007, Hong Kong, China, 11-15 March, 2007}, pages = {2625--2630}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/WCNC.2007.488}, doi = {10.1109/WCNC.2007.488}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/DongLHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuY07, author = {Man Ho Au and Siu{-}Ming Yiu}, title = {Structural Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2007}, url = {http://eprint.iacr.org/2007/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChowHYC06, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow}, title = {Practical electronic lotteries with offline {TTP}}, journal = {Comput. Commun.}, volume = {29}, number = {15}, pages = {2830--2840}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2005.10.034}, doi = {10.1016/J.COMCOM.2005.10.034}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ChowHYC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/YiuYLLY06, author = {Siu{-}Ming Yiu and S. W. Yiu and Lap{-}Kei Lee and Eric K. Y. Li and Michael C. L. Yip}, title = {Sharing and access right delegation for confidential documents: {A} practical solution}, journal = {Inf. Manag.}, volume = {43}, number = {5}, pages = {607--616}, year = {2006}, url = {https://doi.org/10.1016/j.im.2006.03.003}, doi = {10.1016/J.IM.2006.03.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/YiuYLLY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YauHYC06, author = {Joe Cho{-}Ki Yau and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Bruce S. N. Cheung}, title = {Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience}, journal = {Int. J. Netw. Secur.}, volume = {2}, number = {1}, pages = {21--28}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v2-n1/ijns-2006-v2-n1-p21-28.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/YauHYC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbcb/ChanJLY06, author = {Ho{-}Leung Chan and Jesper Jansson and Tak Wah Lam and Siu{-}Ming Yiu}, title = {Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix}, journal = {J. Bioinform. Comput. Biol.}, volume = {4}, number = {4}, pages = {807--832}, year = {2006}, url = {https://doi.org/10.1142/S0219720006002211}, doi = {10.1142/S0219720006002211}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbcb/ChanJLY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ChanCCCCCCCHHILLPTTTYYYJ06, author = {Eric Y. K. Chan and H. W. Chan and K. M. Chan and Vivien P. S. Chan and Samuel T. Chanson and Matthew M. H. Cheung and C. F. Chong and Kam{-}Pui Chow and Albert K. T. Hui and Lucas Chi Kwong Hui and S. K. Ip and Luke C. K. Lam and W. C. Lau and Kevin K. H. Pun and Anthony Y. F. Tsang and Wai Wan Tsang and Sam C. W. Tso and Dit{-}Yan Yeung and Siu{-}Ming Yiu and Kwun Yin Yu and W. Ju}, title = {Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {24}, number = {10}, pages = {1889--1900}, year = {2006}, url = {https://doi.org/10.1109/JSAC.2006.877214}, doi = {10.1109/JSAC.2006.877214}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ChanCCCCCCCHHILLPTTTYYYJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AuSY06, author = {Man Ho Au and Willy Susilo and Siu{-}Ming Yiu}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Event-Oriented \emph{k}-Times Revocable-iff-Linked Group Signatures}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {223--234}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_19}, doi = {10.1007/11780656\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AuSY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apbc/ChanLY06, author = {P. Y. Chan and Tak Wah Lam and Siu{-}Ming Yiu}, editor = {Tao Jiang and Ueng{-}Cheng Yang and Yi{-}Ping Phoebe Chen and Limsoon Wong}, title = {A More Accurate and Efficient Whole Genome Phylogeny}, booktitle = {Proceedings of 4th Asia-Pacific Bioinformatics Conference. 13-16 February 2006, Taipei, Taiwan}, pages = {337--352}, publisher = {Imperial College Press, London}, year = {2006}, url = {http://www.comp.nus.edu.sg/\%7Ewongls/psZ/apbc2006/248.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apbc/ChanLY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/LaiYCCH06, author = {Pierre K. Y. Lai and Siu{-}Ming Yiu and Kam{-}Pui Chow and C. F. Chong and Lucas Chi Kwong Hui}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {An Efficient Bloom Filter Based Solution for Multiparty Private Matching}, booktitle = {Proceedings of the 2006 International Conference on Security {\&} Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {286--292}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/LaiYCCH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/WangYHJY06, author = {Eric Ke Wang and Joe Cho{-}Ki Yau and Lucas Chi Kwong Hui and Zoe Lin Jiang and Siu{-}Ming Yiu}, title = {A Key-Recovery System for Long-term Encrypted Documents}, booktitle = {Tenth {IEEE} International Enterprise Distributed Object Computing Conference {(EDOC} 2006), 16-20 October 2006, Hong Kong, China, Workshops}, pages = {52}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/EDOCW.2006.8}, doi = {10.1109/EDOCW.2006.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/WangYHJY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/ChowHYC05, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow}, title = {Forward-secure multisignature and blind signature schemes}, journal = {Appl. Math. Comput.}, volume = {168}, number = {2}, pages = {895--908}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2004.09.015}, doi = {10.1016/J.AMC.2004.09.015}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/ChowHYC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/YiuWLMKLC05, author = {Siu{-}Ming Yiu and Prudence W. H. Wong and Tak Wah Lam and Y. C. Mui and Hsiang{-}fu Kung and Marie C. M. Lin and Y. T. Cheung}, title = {Filtering of Ineffective siRNAs and Improved siRNA Design Tool}, journal = {Bioinform.}, volume = {21}, number = {2}, pages = {144--151}, year = {2005}, url = {https://doi.org/10.1093/bioinformatics/bth498}, doi = {10.1093/BIOINFORMATICS/BTH498}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/YiuWLMKLC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/ChanLSWYF05, author = {Ho{-}Leung Chan and Tak Wah Lam and Wing{-}Kin Sung and Prudence W. H. Wong and Siu{-}Ming Yiu and X. Fan}, title = {The mutated subsequence problem and locating conserved genes}, journal = {Bioinform.}, volume = {21}, number = {10}, pages = {2271--2278}, year = {2005}, url = {https://doi.org/10.1093/bioinformatics/bti371}, doi = {10.1093/BIOINFORMATICS/BTI371}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/ChanLSWYF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/LeungCYRT05, author = {Henry C. M. Leung and Francis Y. L. Chin and Siu{-}Ming Yiu and Ronald Rosenfeld and Wai Wan Tsang}, title = {Finding Motifs with Insufficient Number of Strong Binding Sites}, journal = {J. Comput. Biol.}, volume = {12}, number = {6}, pages = {686--701}, year = {2005}, url = {https://doi.org/10.1089/cmb.2005.12.686}, doi = {10.1089/CMB.2005.12.686}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcb/LeungCYRT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ChowHYCL05, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow and Richard W. C. Lui}, title = {A generic anti-spyware solution by access control list at kernel level}, journal = {J. Syst. Softw.}, volume = {75}, number = {1-2}, pages = {227--234}, year = {2005}, url = {https://doi.org/10.1016/j.jss.2004.05.027}, doi = {10.1016/J.JSS.2004.05.027}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/ChowHYCL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/LianMCY05, author = {Wang Lian and Nikos Mamoulis and David Wai{-}Lok Cheung and Siu{-}Ming Yiu}, title = {Indexing Useful Structural Patterns for {XML} Query Processing}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {17}, number = {7}, pages = {997--1009}, year = {2005}, url = {https://doi.org/10.1109/TKDE.2005.110}, doi = {10.1109/TKDE.2005.110}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/LianMCY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/GoCDSYHL05, author = {H. W. Go and P. Y. Chan and Y. Dong and Ai Fen Sui and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Victor O. K. Li}, editor = {M{\'{a}}rio Guimar{\~{a}}es}, title = {Performance evaluation on {CRL} distribution using flooding in mobile ad hoc networks (MANETs)}, booktitle = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2}, pages = {75--80}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1167253.1167271}, doi = {10.1145/1167253.1167271}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/GoCDSYHL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChowHYC05, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Two Improved Partially Blind Signature Schemes from Bilinear Pairings}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {316--328}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_27}, doi = {10.1007/11506157\_27}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChowHYC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LuiCHY05, author = {Richard W. C. Lui and Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Role Activation Management in Role Based Access Control}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {358--369}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_30}, doi = {10.1007/11506157\_30}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LuiCHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChowYH05, author = {Sherman S. M. Chow and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Identity Based Ring Signature}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {499--512}, year = {2005}, url = {https://doi.org/10.1007/11496137\_34}, doi = {10.1007/11496137\_34}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChowYH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apbc/YiuCLSTW05, author = {Siu{-}Ming Yiu and P. Y. Chan and Tak Wah Lam and Wing{-}Kin Sung and Hing{-}Fung Ting and Prudence W. H. Wong}, editor = {Yi{-}Ping Phoebe Chen and Limsoon Wong}, title = {Allowing mismatches in anchors for wholw genome alignment: Generation and effectiveness}, booktitle = {Proceedings of 3rd Asia-Pacific Bioinformatics Conference, 17-21 January 2005, Singapore}, pages = {1--10}, publisher = {Imperial College Press, London}, year = {2005}, url = {http://www.comp.nus.edu.sg/\%7Ewongls/psZ/apbc2005/camera-ready/192.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apbc/YiuCLSTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/LuiHYW05, author = {Richard W. C. Lui and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Yan Woo}, editor = {Hamid R. Arabnia}, title = {A model to support fine-grained delegation of authorization}, booktitle = {Proceedings of The 2005 International Conference on Security and Management, {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005}, pages = {208--212}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Sun, 28 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/LuiHYW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WooHCY05, author = {Yan Woo and Lucas Chi Kwong Hui and Kam{-}Pui Chow and Siu{-}Ming Yiu}, editor = {Hamid R. Arabnia}, title = {Dynamic Integrity Verification for Software Self-defense}, booktitle = {Proceedings of The 2005 International Conference on Security and Management, {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005}, pages = {327--333}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/WooHCY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eee/YauHCYWLL05, author = {Joe Cho{-}Ki Yau and Lucas Chi Kwong Hui and Bruce S. N. Cheung and Siu{-}Ming Yiu and Yan Woo and K. W. Lau and Eric H. M. Li}, title = {Trustworthy Browsing - {A} Secure Web Accessing Model}, booktitle = {2005 {IEEE} International Conference on e-Technology, e-Commerce, and e-Services {(EEE} 2005), 29 March - 1 April 2005, Hong Kong, China}, pages = {542--547}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/EEE.2005.139}, doi = {10.1109/EEE.2005.139}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eee/YauHCYWLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/LuiHY05, author = {Richard W. C. Lui and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {David W. Chadwick and Gansen Zhao}, title = {Secure Role Activation and Authorization in the Enterprise Environment}, booktitle = {Public Key Infrastructure, Second European {PKI} Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3545}, pages = {22--35}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11533733\_2}, doi = {10.1007/11533733\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/LuiHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/ChowLHY05, author = {Sherman S. M. Chow and Richard W. C. Lui and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {David W. Chadwick and Gansen Zhao}, title = {Identity Based Ring Signature: Why, How and What Next}, booktitle = {Public Key Infrastructure, Second European {PKI} Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3545}, pages = {144--161}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11533733\_10}, doi = {10.1007/11533733\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europki/ChowLHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ChowHYC05, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {An e-Lottery Scheme Using Verifiable Random Function}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3482}, pages = {651--660}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424857\_72}, doi = {10.1007/11424857\_72}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/ChowHYC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/LuiCHY05, author = {Richard W. C. Lui and Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Supporting Efficient Authorization in Delegation with Supervision}, booktitle = {11th International Conference on Parallel and Distributed Systems, {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005}, pages = {240--244}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICPADS.2005.271}, doi = {10.1109/ICPADS.2005.271}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/LuiCHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/SuiCHYCTCPC05, author = {Ai Fen Sui and Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow and Wai Wan Tsang and C. F. Chong and Kevin K. H. Pun and H. W. Chan}, title = {Separable and Anonymous Identity-Based Key Issuing}, booktitle = {11th International Conference on Parallel and Distributed Systems, {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005}, pages = {275--279}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICPADS.2005.263}, doi = {10.1109/ICPADS.2005.263}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/SuiCHYCTCPC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwap/LuiYH05, author = {Richard W. C. Lui and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, editor = {Jianying Zhou and Meng{-}Chow Kang and Feng Bao and HweeHwa Pang}, title = {Efficient Authorization in Delegation Chains with Strong Non-Repudiation}, booktitle = {Applied Public Key Infrastructure - 4th International Workshop: {IWAP} 2005, Singapore, September 21-23, 2005}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {128}, pages = {66--77}, publisher = {{IOS} Press}, year = {2005}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1230}, timestamp = {Mon, 06 Nov 2017 02:05:53 +0100}, biburl = {https://dblp.org/rec/conf/iwap/LuiYH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/ChanJLY05, author = {Ho{-}Leung Chan and Jesper Jansson and Tak Wah Lam and Siu{-}Ming Yiu}, editor = {Joanna Jedrzejowicz and Andrzej Szepietowski}, title = {Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix}, booktitle = {Mathematical Foundations of Computer Science 2005, 30th International Symposium, {MFCS} 2005, Gdansk, Poland, August 29 - September 2, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3618}, pages = {224--235}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11549345\_20}, doi = {10.1007/11549345\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mfcs/ChanJLY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/ChowLHY05, author = {Sherman S. M. Chow and Richard W. C. Lui and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Ed Dawson and Serge Vaudenay}, title = {Identity Based Delegation Network}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {99--115}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_8}, doi = {10.1007/11554868\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/ChowLHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ChowYHY05, author = {Sherman S. M. Chow and Tsz Hon Yuen and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {Signcryption in Hierarchical Identity Based Cryptosystem}, booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, pages = {443--457}, publisher = {Springer}, year = {2005}, timestamp = {Fri, 19 May 2017 01:25:10 +0200}, biburl = {https://dblp.org/rec/conf/sec/ChowYHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/DongGSLHY05, author = {Y. Dong and H. W. Go and Ai Fen Sui and Victor O. K. Li and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {149--156}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.57}, doi = {10.1109/SECURECOMM.2005.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/DongGSLHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/SuiHYCTCPC05, author = {Ai Fen Sui and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow and Wai Wan Tsang and C. F. Chong and Kevin K. H. Pun and H. W. Chan}, title = {An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005, March 13-17, 2005, New Orleans, Louisiana, {USA}}, pages = {2088--2093}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/WCNC.2005.1424840}, doi = {10.1109/WCNC.2005.1424840}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/SuiHYCTCPC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowY05, author = {Sherman S. M. Chow and Siu{-}Ming Yiu}, title = {Exclusion-Intersection Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2005}, url = {http://eprint.iacr.org/2005/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/WongLLTY04, author = {Prudence W. H. Wong and Tak Wah Lam and N. Lu and Hing{-}Fung Ting and Siu{-}Ming Yiu}, title = {An efficient algorithm for optimizing whole genome alignment with noise}, journal = {Bioinform.}, volume = {20}, number = {16}, pages = {2676--2684}, year = {2004}, url = {https://doi.org/10.1093/bioinformatics/bth308}, doi = {10.1093/BIOINFORMATICS/BTH308}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/WongLLTY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/HonLYKS04, author = {Wing{-}Kai Hon and Tak Wah Lam and Siu{-}Ming Yiu and Ming{-}Yang Kao and Wing{-}Kin Sung}, title = {Subtree Transfer Distance For Degree-D Phylogenies}, journal = {Int. J. Found. Comput. Sci.}, volume = {15}, number = {6}, pages = {893--909}, year = {2004}, url = {https://doi.org/10.1142/S0129054104002807}, doi = {10.1142/S0129054104002807}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijfcs/HonLYKS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/HonKLSY04, author = {Wing{-}Kai Hon and Ming{-}Yang Kao and Tak Wah Lam and Wing{-}Kin Sung and Siu{-}Ming Yiu}, title = {Non-shared edges and nearest neighbor interchanges revisited}, journal = {Inf. Process. Lett.}, volume = {91}, number = {3}, pages = {129--134}, year = {2004}, url = {https://doi.org/10.1016/j.ipl.2004.04.003}, doi = {10.1016/J.IPL.2004.04.003}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/HonKLSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/LianCMY04, author = {Wang Lian and David Wai{-}Lok Cheung and Nikos Mamoulis and Siu{-}Ming Yiu}, title = {An Efficient and Scalable Algorithm for Clustering {XML} Documents by Structure}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {16}, number = {1}, pages = {82--96}, year = {2004}, url = {https://doi.org/10.1109/TKDE.2004.1264824}, doi = {10.1109/TKDE.2004.1264824}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/LianCMY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/alenex/HonLSTWY04, author = {Wing{-}Kai Hon and Tak Wah Lam and Wing{-}Kin Sung and Wai{-}Leuk Tse and Chi{-}Kwong Wong and Siu{-}Ming Yiu}, editor = {Lars Arge and Giuseppe F. Italiano and Robert Sedgewick}, title = {Practical aspects of Compressed Suffix Arrays and FM-Index in Searching {DNA} Sequences}, booktitle = {Proceedings of the Sixth Workshop on Algorithm Engineering and Experiments and the First Workshop on Analytic Algorithmics and Combinatorics, New Orleans, LA, USA, January 10, 2004}, pages = {31--38}, publisher = {{SIAM}}, year = {2004}, timestamp = {Fri, 21 Apr 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/alenex/HonLSTWY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apbc/WongLMYKLC04, author = {Prudence W. H. Wong and Tak Wah Lam and Y. C. Mui and Siu{-}Ming Yiu and Hsiang{-}fu Kung and Marie C. M. Lin and Y. T. Cheung}, editor = {Yi{-}Ping Phoebe Chen}, title = {Filtering of Ineffective siRNAs and Improved siRNA Design Tool}, booktitle = {Second Asia-Pacific Bioinformatics Conference {(APBC} 2004), January 18-22, 2004, Dunedin, New Zealand}, series = {{CRPIT}}, volume = {29}, pages = {247--255}, publisher = {Australian Computer Society}, year = {2004}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV29Wong.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apbc/WongLMYKLC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibe/ChanLSWY04, author = {Ho{-}Leung Chan and Tak Wah Lam and Wing{-}Kin Sung and Prudence W. H. Wong and Siu{-}Ming Yiu}, title = {A Mutation-Sensitive Approach for Locating Conserved Gene Pairs between Related Species}, booktitle = {4th {IEEE} International Symposium on BioInformatics and BioEngineering {(BIBE} 2004), 19-21 March 2004, Taichung, Taiwan}, pages = {545--552}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/BIBE.2004.1317390}, doi = {10.1109/BIBE.2004.1317390}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibe/ChanLSWY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HuiCPYTCC04, author = {Lucas Chi Kwong Hui and Kam{-}Pui Chow and Kevin K. H. Pun and Siu{-}Ming Yiu and Wai Wan Tsang and C. F. Chong and H. W. Chan}, title = {Risk Management of Corporate Confidential Information in Digital Form}, booktitle = {28th International Computer Software and Applications Conference {(COMPSAC} 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings}, pages = {88--89}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CMPSAC.2004.1342810}, doi = {10.1109/CMPSAC.2004.1342810}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/HuiCPYTCC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ChanCCY04, author = {F. T. Chan and K. P. Chan and Tsong Yueh Chen and Siu{-}Ming Yiu}, title = {Adaptive Random Testing with {CG} Constraint}, booktitle = {28th International Computer Software and Applications Conference {(COMPSAC} 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Workshop Papers}, pages = {96--99}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CMPSAC.2004.1342685}, doi = {10.1109/CMPSAC.2004.1342685}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ChanCCY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcc/HonLSSY04, author = {Wing{-}Kai Hon and Tak Wah Lam and Kunihiko Sadakane and Wing{-}Kin Sung and Siu{-}Ming Yiu}, title = {Compressed Index for Dynamic Text}, booktitle = {2004 Data Compression Conference {(DCC} 2004), 23-25 March 2004, Snowbird, UT, {USA}}, pages = {102--111}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/DCC.2004.1281455}, doi = {10.1109/DCC.2004.1281455}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dcc/HonLSSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iastedSE/CheungHYCPTCC04, author = {Venus L. S. Cheung and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow and Kevin K. H. Pun and Wai Wan Tsang and H. W. Chan and C. F. Chong}, editor = {M. H. Hamza}, title = {Delegation of signing and decryption rights using pki proxy memo}, booktitle = {{IASTED} International Conference on Software Engineering, part of the 22nd Multi-Conference on Applied Informatics, Innsbruck, Austria, February 17-19, 2004}, pages = {281--285}, publisher = {{IASTED/ACTA} Press}, year = {2004}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iastedSE/CheungHYCPTCC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/CheungHY04, author = {Venus L. S. Cheung and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {The Delegation Problem and Practical PKI-Based Solutions}, booktitle = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, April 14-17, 2004}, pages = {73--84}, year = {2004}, timestamp = {Thu, 02 Feb 2017 12:56:49 +0100}, biburl = {https://dblp.org/rec/conf/iceis/CheungHY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChowHYC04, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Secure Hierarchical Identity Based Signature and Its Application}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {480--494}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_37}, doi = {10.1007/978-3-540-30191-2\_37}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChowHYC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChowHY04, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Choonsik Park and Seongtaek Chee}, title = {Identity Based Threshold Ring Signature}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {218--232}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_17}, doi = {10.1007/11496618\_17}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChowHY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/GoDHYL04, author = {H. W. Go and Y. Dong and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Victor O. K. Li}, editor = {Hamid R. Arabnia and Laurence Tianruo Yang and Chi{-}Hsiang Yeh}, title = {Applying Forward Security and Threshold Cryptography in Ad Hoc Networks}, booktitle = {Proceedings of the International Conference on Wireless Networks, {ICWN} '04, June 21-24, 2004, Las Vegas, Nevada, USA, Volume 1}, pages = {202--209}, publisher = {{CSREA} Press}, year = {2004}, timestamp = {Mon, 22 Nov 2004 14:01:57 +0100}, biburl = {https://dblp.org/rec/conf/icwn/GoDHYL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recomb/ChinLYLRTSJ04, author = {Francis Y. L. Chin and Henry C. M. Leung and Siu{-}Ming Yiu and Tak Wah Lam and Roni Rosenfeld and Wai Wan Tsang and David K. Smith and Y. Jiang}, editor = {Philip E. Bourne and Dan Gusfield}, title = {Finding motifs for insufficient number of sequences with strong binding to transcription facto}, booktitle = {Proceedings of the Eighth Annual International Conference on Computational Molecular Biology, 2004, San Diego, California, USA, March 27-31, 2004}, pages = {125--132}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/974614.974631}, doi = {10.1145/974614.974631}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/recomb/ChinLYLRTSJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/LianMCY04, author = {Wang Lian and Nikos Mamoulis and David Wai{-}Lok Cheung and Siu{-}Ming Yiu}, editor = {Xiaofang Zhou and Stanley Y. W. Su and Mike P. Papazoglou and Maria E. Orlowska and Keith G. Jeffery}, title = {Discovering Minimal Infrequent Structures from {XML} Documents}, booktitle = {Web Information Systems - {WISE} 2004, 5th International Conference on Web Information Systems Engineering, Brisbane, Australia, November 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3306}, pages = {291--302}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30480-7\_30}, doi = {10.1007/978-3-540-30480-7\_30}, timestamp = {Sat, 08 Feb 2020 13:00:42 +0100}, biburl = {https://dblp.org/rec/conf/wise/LianMCY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowHYC04, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow}, title = {Two Improved Partially Blind Signature Schemes from Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2004}, url = {http://eprint.iacr.org/2004/108}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowHYC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowHY04, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Identity Based Threshold Ring Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2004}, url = {http://eprint.iacr.org/2004/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowHY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowYHY04, author = {Sherman S. M. Chow and Tsz Hon Yuen and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Signcryption in Hierarchical Identity Based Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2004}, url = {http://eprint.iacr.org/2004/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowYHY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuiCHYCTCPC04, author = {Ai Fen Sui and Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow and Wai Wan Tsang and C. F. Chong and Kevin K. H. Pun and H. W. Chan}, title = {Separable and Anonymous Identity-Based Key Issuing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2004}, url = {http://eprint.iacr.org/2004/322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuiCHYCTCPC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowYH04, author = {Sherman S. M. Chow and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, title = {Efficient Identity Based Ring Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2004}, url = {http://eprint.iacr.org/2004/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowYH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdet/CheungHYLKL03, author = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and J. K. W. Lee and Sylvia L. K. Kwok and Kenneth C. B. Leung}, title = {Content Engineering Agent: {A} TBL-Based E-Course Development Tool with {TQM}}, journal = {Int. J. Distance Educ. Technol.}, volume = {1}, number = {2}, pages = {57--71}, year = {2003}, url = {https://doi.org/10.4018/jdet.2003040104}, doi = {10.4018/JDET.2003040104}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdet/CheungHYLKL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/YauHCY03, author = {Joe Cho{-}Ki Yau and Lucas Chi Kwong Hui and Bruce S. N. Cheung and Siu{-}Ming Yiu}, title = {eCX: a secure infrastructure for e-course delivery}, journal = {Internet Res.}, volume = {13}, number = {2}, pages = {116--125}, year = {2003}, url = {https://doi.org/10.1108/10662240310469060}, doi = {10.1108/10662240310469060}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/YauHCY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/IeongKLSY03, author = {Samuel Ieong and Ming{-}Yang Kao and Tak Wah Lam and Wing{-}Kin Sung and Siu{-}Ming Yiu}, title = {Predicting {RNA} Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs}, journal = {J. Comput. Biol.}, volume = {10}, number = {6}, pages = {981--995}, year = {2003}, url = {https://doi.org/10.1089/106652703322756186}, doi = {10.1089/106652703322756186}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcb/IeongKLSY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/CheungHZY03, author = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and J. Zhang and Siu{-}Ming Yiu}, title = {SmartTutor: An intelligent tutoring system in web-based adult education}, journal = {J. Syst. Softw.}, volume = {68}, number = {1}, pages = {11--25}, year = {2003}, url = {https://doi.org/10.1016/S0164-1212(02)00133-4}, doi = {10.1016/S0164-1212(02)00133-4}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/CheungHZY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/ChengCY03, author = {Lok{-}Lam Cheng and David Wai{-}Lok Cheung and Siu{-}Ming Yiu}, title = {Approximate String Matching in {DNA} Sequences}, booktitle = {Eighth International Conference on Database Systems for Advanced Applications {(DASFAA} '03), March 26-28, 2003, Kyoto, Japan}, pages = {303--310}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DASFAA.2003.1192395}, doi = {10.1109/DASFAA.2003.1192395}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasfaa/ChengCY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChowYHC03, author = {Sherman S. M. Chow and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Kam{-}Pui Chow}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {352--369}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_26}, doi = {10.1007/978-3-540-24691-6\_26}, timestamp = {Thu, 17 Nov 2022 14:05:51 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ChowYHC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/LamLTWY03, author = {Tak Wah Lam and N. Lu and Hing{-}Fung Ting and Prudence W. H. Wong and Siu{-}Ming Yiu}, editor = {Toshihide Ibaraki and Naoki Katoh and Hirotaka Ono}, title = {Efficient Algorithms for Optimizing Whole Genome Alignment with Noise}, booktitle = {Algorithms and Computation, 14th International Symposium, {ISAAC} 2003, Kyoto, Japan, December 15-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2906}, pages = {364--374}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24587-2\_38}, doi = {10.1007/978-3-540-24587-2\_38}, timestamp = {Fri, 29 Dec 2023 12:40:31 +0100}, biburl = {https://dblp.org/rec/conf/isaac/LamLTWY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowHYC03, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow}, title = {A Secure Modified ID-Based Undeniable Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2003}, url = {http://eprint.iacr.org/2003/262}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowHYC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/SungYYCHL02, author = {Wing{-}Kin Sung and David Yang and Siu{-}Ming Yiu and David Wai{-}Lok Cheung and Wai{-}Shing Ho and Tak Wah Lam}, title = {Automatic construction of online catalog topologies}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {32}, number = {4}, pages = {382--391}, year = {2002}, url = {https://doi.org/10.1109/TSMCC.2002.806055}, doi = {10.1109/TSMCC.2002.806055}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/SungYYCHL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/LamSSY02, author = {Tak Wah Lam and Kunihiko Sadakane and Wing{-}Kin Sung and Siu{-}Ming Yiu}, editor = {Oscar H. Ibarra and Louxin Zhang}, title = {A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays}, booktitle = {Computing and Combinatorics, 8th Annual International Conference, {COCOON} 2002, Singapore, August 15-17, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2387}, pages = {401--410}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45655-4\_43}, doi = {10.1007/3-540-45655-4\_43}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/LamSSY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-DS-0211009, author = {Wing{-}Kai Hon and Ming{-}Yang Kao and Tak Wah Lam and Wing{-}Kin Sung and Siu{-}Ming Yiu}, title = {Improved Phylogeny Comparisons: Non-Shared Edges Nearest Neighbor Interchanges, and Subtree Transfers}, journal = {CoRR}, volume = {cs.DS/0211009}, year = {2002}, url = {http://arxiv.org/abs/cs/0211009}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-DS-0211009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibe/IeongKLSY01, author = {Samuel Ieong and Ming{-}Yang Kao and Tak Wah Lam and Wing{-}Kin Sung and Siu{-}Ming Yiu}, editor = {Nikolaos G. Bourbakis}, title = {Predicting {RNA} Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs}, booktitle = {2nd {IEEE} International Symposium on Bioinformatics and Bioengineering, Bethesda, Maryland, USA, November 4-5, 2001, Proceedings}, pages = {183--190}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/BIBE.2001.974428}, doi = {10.1109/BIBE.2001.974428}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibe/IeongKLSY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/SungYYHCL01, author = {Wing{-}Kin Sung and David Yang and Siu{-}Ming Yiu and Wai{-}Shing Ho and David Wai{-}Lok Cheung and Tak Wah Lam}, editor = {Kurt Bauknecht and Sanjay Kumar Madria and G{\"{u}}nther Pernul}, title = {Automatic Construction of Online Catalog Topologies}, booktitle = {Electronic Commerce and Web Technologies, Second International Conference, EC-Web 2001 Munich, Germany, September 4-6, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2115}, pages = {216--225}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44700-8\_21}, doi = {10.1007/3-540-44700-8\_21}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecweb/SungYYHCL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/WangCY01, author = {Lian Wang and David Wai{-}Lok Cheung and Siu{-}Ming Yiu}, editor = {Xiaoyang Sean Wang and Ge Yu and Hongjun Lu}, title = {Indexing Attributes and Reordering Profiles for {XML} Document Filtering and Information Delivery}, booktitle = {Advances in Web-Age Information Management, Second International Conference, {WAIM} 2001, Xi'an, China, July 9-11, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2118}, pages = {355--366}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47714-4\_32}, doi = {10.1007/3-540-47714-4\_32}, timestamp = {Sun, 05 Jan 2020 16:42:00 +0100}, biburl = {https://dblp.org/rec/conf/waim/WangCY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CE-0111051, author = {Samuel Ieong and Ming{-}Yang Kao and Tak Wah Lam and Wing{-}Kin Sung and Siu{-}Ming Yiu}, title = {Predicting {RNA} Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs}, journal = {CoRR}, volume = {cs.CE/0111051}, year = {2001}, url = {https://arxiv.org/abs/cs/0111051}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CE-0111051.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/LeungHYT00, author = {Karl R. P. H. Leung and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Ricky W. M. Tang}, title = {Modeling Web Navigation by Statechart}, booktitle = {24th International Computer Software and Applications Conference {(COMPSAC} 2000), 25-28 October 2000, Taipei, Taiwan}, pages = {41--47}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CMPSAC.2000.884689}, doi = {10.1109/CMPSAC.2000.884689}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/LeungHYT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/CheungWYZ00, author = {David Wai{-}Lok Cheung and Lian Wang and Siu{-}Ming Yiu and Bo Zhou}, editor = {Takao Terano and Huan Liu and Arbee L. P. Chen}, title = {Density-Based Mining of Quantitative Association Rules}, booktitle = {Knowledge Discovery and Data Mining, Current Issues and New Applications, 4th Pacific-Asia Conference, {PADKK} 2000, Kyoto, Japan, April 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1805}, pages = {257--268}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45571-X\_32}, doi = {10.1007/3-540-45571-X\_32}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/CheungWYZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/YangSYCHLL00, author = {David Yang and Wing{-}Kin Sung and Siu{-}Ming Yiu and David Wai{-}Lok Cheung and Wai{-}Shing Ho and Tak Wah Lam and Sau Dan Lee}, title = {Construction of Online Catalog Topologies Using Decision Trees}, booktitle = {Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems {(WECWIS} 2000), Milpitas, California, USA, June 8-9, 2000}, pages = {223--230}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/WECWIS.2000.853879}, doi = {10.1109/WECWIS.2000.853879}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/YangSYCHLL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webnet/CheungHY98, author = {Bruce S. N. Cheung and Sarah Ho and Siu{-}Ming Yiu}, editor = {Hermann A. Maurer and Richard G. Olson}, title = {A Survey On Online Education}, booktitle = {Proceedings of WebNet 98 - World Conference on the {WWW} and Internet {\&} Intranet, Orlando, Florida, USA, November 7-12, 1998}, publisher = {{AACE}}, year = {1998}, timestamp = {Sat, 07 Sep 2019 11:59:24 +0200}, biburl = {https://dblp.org/rec/conf/webnet/CheungHY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hk/Yiu96, author = {Siu{-}Ming Yiu}, title = {Tight bound edge guard results on art gallery problems}, school = {University of Hong Kong}, year = {1996}, url = {https://doi.org/10.5353/th\_b3123641}, doi = {10.5353/TH\_B3123641}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hk/Yiu96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cccg/Yiu95, author = {Siu{-}Ming Yiu}, title = {A generalized fortress problem using k-consecutive vertex guards}, booktitle = {Proceedings of the 7th Canadian Conference on Computational Geometry, Quebec City, Quebec, Canada, August 1995}, pages = {139--144}, publisher = {Carleton University, Ottawa, Canada}, year = {1995}, url = {http://www.cccg.ca/proceedings/1995/cccg1995\_0023.pdf}, timestamp = {Wed, 12 May 2021 14:19:37 +0200}, biburl = {https://dblp.org/rec/conf/cccg/Yiu95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cccg/YiuC94, author = {Siu{-}Ming Yiu and A. Choi}, title = {Edge Guards on a Fortress}, booktitle = {Proceedings of the 6th Canadian Conference on Computational Geometry, Saskatoon, SK, Canada, August 1994}, pages = {296--301}, publisher = {University of Saskatchewan}, year = {1994}, timestamp = {Wed, 12 May 2021 14:19:37 +0200}, biburl = {https://dblp.org/rec/conf/cccg/YiuC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.